Download this Registry File. (adware, spyware tested, clean and malware free)
This file changes the values in windows 7 registry to make things work faster work faster, smoother and more stable. This is a small release and doesn't change much yet, but mostly makes folders work and load faster, increases internet and download speed and shows hidden and protected files, which, in most cases makes spotting unwanted files a lot easier.
Few more Windows 7 Tweaks to optimize and speed up.
1. Click on start
2. Search for Run
3. Typ: msconfig
4. Click on the tab Boot
5. Click on Advanced options...
6. Turn on Number of processors
7. And make your choose how many core u want use 2,4 or maybe 8
8. Click on OK
8. Reset your computer and next time computer will start up faster!
ReadeyBoot and ReadyBoost
ReadyBoot is a tool designed to analyze the boot processes and it allocates additional random access memory (RAM) to optimize the process. ReadyBoost is also available to the ReadyBoot feature when actual system RAM is in short supply. ReadyBoot will then pull the needed RAM from a USB 2.0 flash drive.
the second thing is simply use readyboot with a good clean usb stick, fastest way is to have the usb formatted as ntfs. also a tip, if you think you need the fast boot times and don't have a proper usb stick, pay close attention to read and write speeds when you buy one, a label "readyboost ready" doesn't make it a fast usb stick. values over 20MB/s make it a fast stick.
Here is a great Windows tip to remove your unnecessary files stored by Kaspersky Internet Security and Kaspersky Anti Virus. You can save a huge amount of your hard drive space by applying this method.
Let's see how to do it in few steps.
Enable “Show Hidden files and folders” option from the folder options of My Computer window.
Disable the Kaspersky Security system.
Then open Kaspersky Application --> Settings --> Options then disable the Self -Defense by removing the mark of the check box.
NowExit from the Kaspersky application ( KAV or KIS ).
Then Go to C:\Documents and Settings\All Users\Application Data\Kaspersky Lab\AVP8.
Open the “Data” folder where you will see many files named as av1A.tmp, av2A.tmp..... etc. and with other files and folders.
Then select all the files having a .tmp extension (Click on Search Button in the same window --> click on all files and folders --> type " *tmp " to search for all temporary files in that folder )
Then delete all the temporary files (.tmp files) you have selected. Make sure not to delete other files. You will now notice a high reduction in your disk space.
( You can do this automatically by downloading Ccleaner application. Ccleaner can increase your hard drive space by removing unwanted files from it. Just give a run on everyday and see how much of files it can remove.)
Free hotspots operate in two ways:
- Using an open public network is the easiest way to create a free HotSpot. All that is needed is a Wi-Fi router. Private users of wireless routers can turn off their authentication requirements, thus opening their connection, intentionally or not, for sharing by anyone in range. The disadvantage is that access to the router cannot be controlled.
- Closed public networks use a HotSpot Management System to control the HotSpot. This software runs on the router itself or an external computer. With this software, operators can authorize only specific users to access the Internet, and they often associate the free access to a menu or to a purchase limit. Operators are also now able to limit each user's available bandwidth - each user is therefore restricted to a certain speed to ensure that everyone gets a good quality service. Often this is done through Service Level Agreements.
The websites you are visiting exposed. While not necessarily a big deal to some, it’s only the tip of the iceberg.
· Login information to any unsecure (Non-SSL) site that you sign into. This can include but is not limited to banking and email, which can include a vast amount of personal information. Even sites such as web forums or a majority of social networking sites such as Twitter, MySpace, and Facebook are also available to hackers.
Using an unsecured hotspot or entering your password into an unsecured web site while on one is basically like leaving your front door unlocked where complete strangers can wander in and find any information about you.
A few key bits of information to keep in mind are:
· Never connect to an unsecured network. The various encryption settings for wireless networks are:
o Unsecure – No encryption at all. Anything broadcasted over the network can be seen by anyone.
o WEP Encrypted – The bare minimum of encryption and safety on wireless networks. Although it provides protection against random people, anyone that wants to break the encryption can do so easily in 5 minutes.
o WPA & WPA2 – the definite choice for security. Although they can be broken, information sent over these networks is encrypted and take much more to break.
· Only connect to crucial sites using HTTPS (You should see the lock symbol in your browser and also https://websiteyourarevisiting).
· Make sure your antivirus/malware software is up to date and running.
· Make sure your firewall is up and running.
· Make sure Windows is updated with all the latest security patches from Windows Update.
· Turn off file and printer sharing before connecting to public networks. Although you may not have sensitive files on your computer, there are still malicious attacks that can be launched with it on.
· If you do have sensitive files on your network and must connect to public hotspots, consider encrypting that data using a program such as True Crypt.
These are only a few key points to keep you safe while connecting to wireless hotspots. Basically when you are on them your need to be extra cautious of sites you visit and information you enter into your pc onto these sites.
Some times viruses and other malicious programs may not allowed or completely wipe out your hidden files and other private folders in C:\ such as hidden folders in 'Documents and Settings'.
Virus may block the access to those hidden files even you enable 'show hidden files and folders' by going to "Folder Options".
The virus implements a policy such as “Shockwave.dll” that’s forcing system to keep hidden files forever not visible or hidden.
Your virus guard may some times failed to block or quarantine those viruses. So the following guide will help you to enable the access to your hidden files and folders.
- Go to Start Menu and click on Run (Windows Vista and Windows 7 uses Start Search instead).
- Type RegEdit and press Enter to run Registry Editor.
- Navigate to the following registry key:
- In the right pane, verify that the CheckedValue value data is REG_DWORD type. If it’s not (such as belongs to REG_SZ), then delete the CheckedValue value data.
- If CheckedValue has been delete, create a new DWORD (32-bit) Value and name it as CheckedValue.
- Double click on CheckedValue and change its value data to 1 (virus may change it to 0 or 2).
- Within the same registry key, verify that the Type value data is of REG_SZ type, and has the value data radio. If not, set it to radio. Virus may change it to blank.
- Set the system to show all hidden files and folders by going to Folder options, and then check if hidden files and folders are show.