My blog is about Windows troubleshooting, tips and tricks. You need to know that this blog address is fixyourwindows.blogspot.com and the tiny url is tinyurl.com/ykv2rga
Friday, November 9, 2012
Instant Shutdown in Windows 8
2. Go to New then Shourtcut
3. Type : shutdown /s /t 0 (that's a zero, not an "O")
4. Click Next
5. Name your shortcut
6. Click Finish
Tuesday, July 31, 2012
Get rid of a fake antivirus
1. Enter Windows in save mode
2. Disable "System Restore" if you have Windows XP/Vista/7 as an operating system
3. Clean your computer with a real antivirus
4. Repair Windows registry by making a file with notepad.
Open your notepad then type the script below, if you've finished typing, save it as REPAIR.INF.
[Version]
Signature="$Chicago$"
Provider=Vaksincom
[DefaultInstall]
AddReg=UnhookRegKey
DelReg=del
[UnhookRegKey]
HKLM, Software\CLASSES\batfile\Shell\open\command,,,"""%1""%*"
HKLM, Software\CLASSES\comfile\Shell\open\command,,,"""%1""%*"
HKLM, Software\CLASSES\exefile\Shell\open\command,,,"""%1""%*"
HKLM, Software\CLASSES\piffile\Shell\open\command,,,"""%1""%*"
HKLM, Software\CLASSES\regfile\Shell\open\command,,, "regedit.exe"%1""
HKLM, Software\CLASSES\scrfile\Shell\open\command,,,"""%1""%*"
[del]
HKCU, Software\Microsoft\Windows\CurrentVersion\Run, Inspector
5. Go to Folder Options. Choose option "Show hidden files and folders", uncheck option "Hide extension for known file types", also uncheck option "Hide protected operating system files (Recommended)".
6. Delete these files made by viruses:
a. Protector-pma.exe (located in C:\Documents and Settings\%user%\Application Data\)
b. result.db (located in C:\Documents and Settings\%user%\Application Data\)
c. Windows Basic AntiVirus.Ink (located in C:\Documents and Settings\%user%\Desktop\)
7. Re scan with an updated real antivirus program.
Saturday, July 7, 2012
Problem Steps Recorder in Windows 7
Start --> Run --> type: PSR then press Enter
and then the program will be launched as you see in a picture below
Just simply click on "Start Record" button to start saving your steps and click on "Stop Record" to stop saving.
I've just revealed a great tool in Windows 7, now you can try further by yourself.
Saturday, May 5, 2012
Activating Hibernate in Windows 7
Sleep Mode saves files and opened documents to memory while Hibernate saves opened documents to harddisk and cuts off the electric current. With Hibernate, you don't need to reboot your laptop to back to last edited document.
These are the steps:
1. Open Command Prompt through Administrator Privilege.
2. Type "cmd" in Start Menu then press Ctrl + Shift + Enter
3. Type the following instruction: "powercfg /hibernate on"
then press Enter.
4. Type "exit" then press Enter to close Command Prompt.
Then You will see an option "Hibernate" in Start Menu. Good Luck !
Tuesday, January 17, 2012
The important commands of Windows 7
driverquery
If you need a bit more information, you can append the -v switch. Another option is to append the -si switch, which causes the tool to display signature information for the drivers. Here’s how they look:
driverquery -v
driverquery -si
2. Ping
Ping is probably the simplest of all diagnostic commands. It’s used to verify basic TCP/IP connectivity to a network host. To use it, simply enter the command, followed by the name or IP address of the host you want to test. For example:
ping 192.168.1.1Keep in mind that this command will work only if Internet Control Message Protocol (ICMP) traffic is allowed to pass between the two machines. If at any point a firewall is blocking ICMP traffic, the ping will fail.
3. System File Checker
Malicious software will often attempt to replace core system files with modified versions in an effort to take control of the system. The System File Checker can be used to verify the integrity of the Windows system files. If any of the files are found to be missing or corrupt, they will be replaced. You can run the System File Checker by using this command:
sfc /scannow4. File Signature Verification
One way to verify the integrity of a system is to make sure that all the system files are digitally signed. You can accomplish this with the File Signature Verification tool. This tool is launched from the command line but uses a GUI interface. It will tell you which system files are signed and which aren’t. As a rule, all the system files should be digitally signed, although some hardware vendors don’t sign driver files. The command used to launch the File Signature Verification tool is:
sigverif5. Nslookup
The nslookup tool can help you to verify that DNS name resolution is working correctly. When you run nslookup against a host name, the tool will show you how the name was resolved, as well as which DNS server was used during the lookup. This tool can be extremely helpful when troubleshooting problems related to legacy DNS records that still exist but that are no longer correct.
To use this tool, just enter the nslookup command, followed by the name of the host you want to resolve. For example:
nslookup dc1.contoso.com6. Repair-bde
If a drive that is encrypted with BitLocker has problems, you can sometimes recover the data using a utility called repair-bde. To use this command, you will need a destination drive to which the recovered data can be written, as well as your BitLocker recovery key or recovery password. The basic syntax for this command is:
repair-bdeYou must specify the source drive, the destination drive, and either the rk (recovery key) or the rp (recovery password) switch, along with the path to the recovery key or the recovery password. Here are two examples of how to use this utility:
repair-bde c: d: -rk e:\recovery.bekrepair-bde c: d: -rp 111111-111111-111111-111111-111111-1111117. Taskkill
The taskkill command terminates a task, either by name (which is referred to as the image name) or by process ID. The syntax for this command is simple. You must follow the taskkill command with -pid (process ID) or -im (image name) and the name or process ID of the task that you want to terminate. Here are two examples of how this command works:
taskkill -pid 4104taskkill -im iexplore.exe8. Pathping
Ping does a good job of telling you whether two machines can communicate with one another over TCP/IP, but if a ping does fail, you won’t receive any information regarding the nature of the failure. This is where the pathping utility comes in.
Pathping is designed for environments in which one or more routers exist between hosts. It sends a series of packets to each router that’s in the path to the destination host in an effort to determine whether the router is performing slowly or dropping packets. At its simplest, the syntax for pathping is identical to that of the ping command (although there are some optional switches you can use). The command looks like this:
pathping 192.168.1.19. Ipconfig
The ipconfig command is used to view or modify a computer’s IP addresses. For example, if you wanted to view a Windows 7 system’s full IP configuration, you could use the following command:
ipconfig /allAssuming that the system has acquired its IP address from a DHCP server, you can use the ipconfig command to release and then renew the IP address. Doing so involves using the following commands:
ipconfig /releaseipconfig /renewAnother handy thing you can do with ipconfig is flush the DNS resolver cache. This can be helpful when a system is resolving DNS addresses incorrectly. You can flush the DNS cache by using this command:
ipconfig /flushdns10. Tasklist
The tasklist command is designed to provide information about the tasks that are running on a Windows 7 system. At its most basic, you can enter the following command:
tasklistThe tasklist command has numerous optional switches, but there are a couple I want to mention. One is the -m switch, which causes tasklist to display all the DLL modules associated with a task. The other is the -svc switch, which lists the services that support each task. Here’s how they look:
tasklist -mtasklist -svc