Computer Registry Systems Configurations and Customize

computer Registry Systems Configurations and customize
1.Renaming you’re my computer icon
Hkey_classes_root\cslid\20D04FE0-3AEA-1069-A2D8-08002B30309
Rename localizedstring value localizedstring.old
Right click and choose create expandable string value
Value data= %Your Windows USERNAME% on %The NAME you want%
Effective after reboot


2.Listing Your Favorites in Alphabetical order
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MenuOrder\Favorites
Delete the favorites key and reboot
3. Force Internet Explorer to run full screen (this is a 2 step process)

Step 1
HKEY_CURRENT_USER\Console
Find value full screen and change it to a 1 instead of 0

Step 2
HKEY_CURRENT_USER\Software\Microsoft\InternetExplorer\Main
create a string value and name it full screen
Type is yes in the Value date

4.Settling down Windows Vista’s User Control
This is one of my favorites. This disables alerts for administrators.
 This keeps the UAC from popping upevery time you run a program
 but at the same time keeps the important protection measures intact.
 Some programs might not like this but that’s ok because you can
always change it back Pull up this

keyHKLM\Software\Microsoft\Windows\CurrentVersion\
Policies\System\ConsentPromptBehaviorAdmin

Change this value to 0
re-enable it with a 2
Hacks for Faster Performance-Careful with this one!!
Find the key HKEY_CURRENT_USER\Control Panel\Desktop]
There are several entries in here you can tweak
ForegroundLockTimeout:
This is the time, the system keeps applications from moving into the background after you are done with
them.

To speed this up change value to: 00000000

MenuShowDelay
This will speed up the start menu
Try 300 to 400

WaitToKillAppTimeout
This one effects shutdown. This is how long the system waits
 for user processes to end before logging off.
Try 4000 -5000

Hungapptimeout
This one relates to selecting end task on a process.
It controls the time it takes for the program to shutdown
Recommended setting: 400

Related Posts:
  • Whai is macro? In applications, a set of keystrokes and instructions recorded and saved under a short key code or macro name. When the key code is typed or the macro name is used, the program carries out the instructions of the macro. Us… Read More
  • what is ANSI? Acronym for American National Standards Institute. A voluntary, nonprofit organization of business and industry groups formed in 1918 for the development and adoption of trade and communication standards in the United Stat… Read More
  • What is MIME? Acronym for Multipurpose Internet Mail Extensions. A protocol widely used on the Internet that extends the SMTP Simple Mail Transfer Protocol to permit data, such as video, sound, and binary files, to be transmitted by In… Read More
  • Whst is Password Authentication Protocol Acronym for Password Authentication Protocol. A method for verifying the identity of a user attempting to log on to a Point-to-Point Protocol (PPP) server. PAP is used if a more rigorous method, such as the Challenge Hand… Read More
  • what is X Series for Network Communications A set of recommendations adopted by the International Telecommunication Union Telecommunication Standardization Sector ITU-T, formerly the CCITT, and International Organization for Standardization ISO for standardizing eq… Read More
  • What is ini file? ini file:-Short for initialization file, a text file containing information about the initial configuration of Windows and Windows-based applications, such as default settings for fonts, margins, and line spacing. Two ini… Read More
  • What is memory management? In operating systems for personal computers, procedures for optimizing the use of RAM (random access memory). These procedures include selectively storing data, monitoring it carefully, and freeing memory when the data is … Read More
  • What is Software? One way to describe the hardware of a computer system is that it provides a framework for executing programs and storing files. The kinds of programs that run on Linux platforms vary widely in size and complexity, but… Read More
  • why need For a relational database? A database or database management system that stores information in tables—rows and columns of data—and conducts searches by using data in specified columns of one table to find additional data in another table. In a rela… Read More
  • What is modem? Short for modulator/demodulator. A communications device that converts between digital data from a computer or terminal and analog audio signals that can pass through a standard telephone line. Because the telephone syst… Read More
  • What is markup language? A set of codes in a text file that instructs a computer how to format the file on a printer or video display or how to index and link its contents. Examples of markup languages are Hypertext Markup LanguageHTML and Extens… Read More
  • Os registry? A central hierarchical database in Windows 9x, Windows CE, Windows NT, and Windows 2000 used to store information necessary to configure the system for one or more users, applications, and hardware devices. The Registry c… Read More
  • what is three-tier client/server? A client/server architecture in which software systems are structured into three tiers or layers: the user interface layer, the business logic layer, and the database layer. Layers may have one or more components. For exa… Read More
  • Absolute pointing device A mechanical or physical pointing device whose location is associated with the position of the on-screen cursor. For example, if the user of a graphics tablet places the pen on the upper right corner of the tablet, the cu… Read More
  • Computer Registry Systems Configurations and Customize computer Registry Systems Configurations and customize1.Renaming you’re my computer iconHkey_classes_root\cslid\20D04FE0-3AEA-1069-A2D8-08002B30309Rename localizedstring value localizedstring.oldRight click and choose crea… Read More