Senin, 25 Maret 2013

Focus Effects


Focus Effects are usually used in a photo in order to produce a sharp image on the selected object. Actually, the effect of this focus can be set in a camera before shooting, but not all types of cameras that provide a focus effect, depending on the type of camera and of course the price of the camera. Well, if agan have a camera that does not have the facility to give effect to focus on a photo, agan not need to grieve because of the sophistication of the program Adobe Photoshop, can be given in addition to photo vignette effects, Adobe Photoshop also provides the facility to change the photo that has no effect focus, a photo that has a different focus between background and objects are selected.
Pay attention and do the steps below:
1. Which must first open Adobe Photoshopnya Program and open the photo that will be the focus effect by clicking File> Open or by pressing Ctrl + O on the keyboard or Double Click on the work area. Here I took a sample photo as below:

2. Double click on the Background layer to the New Layer dialog box appears, then the Focus name in the Name field, click OK.
Layer that has been given the name of Focus
3. Furthermore, we conduct background photo selection on the object by using the Brush Tool. Press Ctrl + Shift + N on the keyboard or click the Create a New Layer icon in the Layer Pallete.
It will show a new layer with the name Layer 1
4. In an Layer 1 still selected, change the Opacity value to 35%.
5. Select the Brush Tool
Then in the Properties Bar select the type of Hard Brush with Fashion = NormalOpacity = 100%, dan Flow = 100%
6. Further objects throughout the brush brush photo. Remember the background but not the object or photo that we choose which will be the focus effect. To speed up the brush, hold down [on the keyboard to shrink the brush size and] to increase the size of the brush.
And the first step to give effect brush object side photo!
Furthermore, throughout the brush object pictures, not to get left!


Screen display that has been given effect brush.
7. When finished sweeping brush objects throughout the photo like the example above. Then click the menu Select> Reselect or press Ctrl + left click on the image of the object on Layer 1 to make a selection on the object brush.
The results will be as shown below:

8. Enable Focus layer on the Layers Palette.
Then go to Select> Inverse or press Shift + Ctrl + I to invert the selected object.
The results are as shown below:
                                                          

9. Click the menu Filter> Blur> Radial Blur.
In the Radial Blur dialog box Rate Amount = 10, Blur = menthod Zoom, and click Ok Quality = Good.

10. Actually, the process of giving up the steps here focus effect is complete.

11.Lalu Press Ctrl + D to remove the selection of work on display.
12. Now remove / dispose of Layer 1 via drag / drag Layer 1 to the trash.

Success. . . Here's the final photo that has been given focus effect.

Done gan hopefully bermanfa'at. . . Good luck!


Minggu, 24 Maret 2013

Photography


where someone who wanted to paint, but could not paint such a reliable painter. well now is the era of increasingly sophisticated technology. where one can document what they see and they kagumkan through media, called Camera. that allows a person to produce an image with just a camera and snapped a picture will result.
The work produced by the camera can also be said to be an art and is more often referred to Photography is an art.
photography now growing more years. and many artists produce a picture called a Photographer. Photographer always produce a beautiful works through media images produced by the camera is raised to the Almighty God of creation Cultural diversity, ethnicity, Natural beauty, flora and fauna that exist on earth

















Jumat, 22 Maret 2013

On AIR

click on the image below to listen GEnFM ....

Internet Protocol


Understanding and various protocol
A protocol is a set of rules or standards or allow a relationship, communication, and data transfer between two or more computer points. The protocol can be implemented in hardware, software or a combination of both. At the lowest level, a protocol defines the hardware connection. Protocol used to determine the type of services to be performed on the Internet.
• HTTP (HyperText Transfer Protocol) is a protocol used to transfer documents on the World Wide Web (WWW). This protocol is a lightweight protocol, not a generic status and can be used many different types of documents.
• Gopher is an application that can search for existing ordinance on the Internet, but only the "base text" only, or by teks.Untuk receive notice via Gopher, we have to connect ourselves with the Gopher servers on the Internet. Gopher is a protocol that has been a long time and is starting on the left because sesedeharna not use HTTP.
• FTP (File Transfer Protocol) is an Internet protocol that runs on the application layer which is the standard for transferring files (files) between the computer machines in an internetwork. FTP is one of the earliest Internet protocols developed, and is still used today to perform the download (download) and penggugahan (upload) files between your computer and the FTP client FTP server. In general, the latest version browsers already support FTP.
• Mailto, mailto protocol used to send mail through the Internet. The protocol format is: mailto: nama_email @ hostname example: mailto: eko@yahoo.com
• TCP / IP (Transmission Control Protocol / Internet Protocol) is a standard data communication that is used by the Internet community in the process of exchanging data from one computer to another computer on the network Internet.
Communication Protocols
In the TCP / IP protocol, there are several sub that handles the communication between computers. TCP / IP merngimplemenasikan layered architecture consisting of four layers, which are:
1. Application layer protocols: responsible for providing access to applications to services TCP / IP network. This protocol includes the Dynamic Host Configuration Protocol (DHCP), Domain Name System (DNS), Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), Telnet, Simple Mail Transfer Protocol (SMTP), Simple Network Management Protocol (SNMP) , and many other protocols. In some protocol stack implementations, such as Microsoft TCP / IP application layer protocols interact with the interface using Windows Sockets (Winsock) or NetBIOS over TCP / IP (NetBT).
2. Inter-layer protocol host: useful for making communications connections using session connection-oriented or connectionless broadcast nature. The protocols in this layer is the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP).
3. Internetwork layer protocol: responsible for mapping (routing) and the encapsulation of network data packets into IP packets. The protocol works in this layer is the Internet Protocol (IP), Address Resolution Protocol (ARP), Internet Control Message Protocol (ICMP), and Internet Group Management Protocol (IGMP).
4. Protocol network interface layer: responsible for putting the network frames on the media network used. TCP / IP can work with many transport technologies, ranging from transport technologies in the LAN (such as Ethernet and Token Ring), MAN and WAN (such as dial-up modems that run on the Public Switched Telephone Network (PSTN), Integrated Services Digital Network (ISDN) and Asynchronous Transfer Mode (ATM)).

KNOW INTERNET PROTOCOL

In order applies intrenet network should have no rules that govern standard because it required an internet protocol.
History of TCP / IP
Internet Protocol was first developed by the Defense Advanced Research Projects Agency (DARPA) in 1970 as the beginning of an effort to develop protocols to interconnect separate computer networks, each network uses a different technology. The main protocol of the project is the Internet Protocol (IP). The same research also developed some of the high level protocol that is designed to work with IP. The most important of these projects is the Transmission Control Protocol (TCP), and all protocol groups replaced with TCP / IP suite. First TCP / IP implemented in the ARPANET, and began to develop after the University of California at Berkeley started using TCP / IP with the UNIX operating system. In addition to the Defense Advanced Research Projects Agency (DARPA) that develops Internet Protocol, which also developed the TCP / IP is the Department of defense (DOD).
The terms in the Internet Protocol
There are several terms that are often found in the discussion of TCP / IP, which include:
Host or end-system, A subscriber on network communications services. Hosts usually individual workstations or personal computers (PCs) in which the task of the host is usually a running application and server software program that serves as a user and implementer of communication network services.
Internet, which is a set of network (network of networks) are thorough and use TCP / IP to connect as virtual networks.
Node, is the term applied to the router and host.protocol, which is a standard procedure or rules for defining and setting the data transmission between computers.
Router, are devices whose use as a link between two or more networks. Different from the host router because the router is usually not a goal or data traffic. Routing of IP datagram has usually been done with software. So the routing function can be performed by a host who has two or more networks connection.
Overview of TCP / IP
As noted above, the TCP / IP was developed by the Department of Defense (DOD). DOD has conducted a research project to connect networks designed by different vendors to be a networks of networks (Internet). At the beginning it is successful because it provides basic services such as file transfer, electronic mail, remote logon. Several computers in a department can use TCP / IP (along with other protocols) in a single LAN. The IP component provides routing from the department to the enterprise network, then to regional networks, and finally to the global Internet. It can make the network communication can be broken, so to fix it then DOD designed TCP / IP to automatically repair if any node or phone line failure. The results of this design makes it possible to build very large networks with little central setting. Due to the problems in the auto repair network is not checked and is not repaired for a long time.
As with other communication protocols, the TCP / IP also has several layers, the layers are:
 IP (internet protocol) that play a role in the transmission of data packets from node to node. IP precedes each data packet by 4 bytes (for version IPv4) destination address (the IP number). Internet authorities created a range of numbers to different organizations. Organization created by the group number for the department. IP works on gateway machines that move data from department to organization to region and then later to the rest of the world.
 TCP (transmission transfer protocol) play a role in improving delivery of correct data from the client to the server. Data can be lost in the middle of the network. TCP can detect errors or lost data and then conduct retransmissions until the data is correctly and completely.
 Sockets is a name given to the package of subroutines that provide access to TCP / IP on most systems.
Bebrapa important things in the TCP / IP
1. Low Requesting Network (Network of Lowest bidders)
IP was developed to create a network of networks (the Internet). Individual machine connected to a LAN (Ethernet or Token Ring). TCP / IP LAN share with other users (Novell file server, windows, etc.). One devais provides a TCP / IP connection between the LAN to the outside world.
To ensure that all types of systems from different vendors can communicate, then the use of TCP / IP on the LAN standardized. With increasing speed mikroprossesor, fiber optics, and digital phone line that has created several new technology options that include ISDN, frame relay, FDDI, Asynchronous Transfer Mode (ATM).
Original design of TCP / IP is as a network of networks that match the use of technology today. TCP / IP data can be transmitted over a LAN, or can be brought to an internal corporate SNA network, or data can be connected to cable TV. Furthermore, the machines are connected on one network can communicate with other networks through gateways provided by the network vendor.
2. Addressing Problems
In an SNA network, every machine has Logical Units with their respective network addresses. DECNET, Appletalk, and Novell IPX has a plan to make the numbers for each local network and for each workstation connected to the network.
In the main part of the local network addressing, TCP / IP makes a unique number for each workstation in the world. IP Number is the value of 4 bytes (IPv4) to the convention to change each byte to a decimal number (0 to 255 for an IP that is used now) and separates each bytes with a period. For instance 130.132.59.234.
An organization started by sending electronic mail to ask for the creation Hostmaster@INTERNIC.NET network number. It is possible for almost anyone to get the number for a network of "small class C" with the first three bytes and the last byte network meyatakan claimed individual computer. Larger organizations can obtain the network "Class B" with the first two bytes and the network states declared states last 2 bytes each workstation to reach 64,000 individual workstations. Examples Yale Class B Network is 130 132, so all computers with IP address 130 132. *. * Is connected through Yale.
Then the organization related to the intenet via one of several regional networks or dedicated network. network vendors are numbered customer networks and added to the routing configuration on each machine.
There is no mathematical formula that turns numbers 192.35.91 or 130 132 to "Yale University" or "New Haven". The machines are set up networks of large regional or central Internet routers can determine the location of these networks by looking each network number in the table. It is estimated there are thousands of networks and millions of class B class C network Customers who connect to the Internet, even large companies like IBM do not need to maintain information on a network-jatingan others. They send all external data to their regional carrier customers, and the regional carrier to observe and maintain routing tables and do the right.
3. Subnets
Although individual customers do not need table numbers or provide explicit routing network, but for most of the class B network can be set internally so a smaller version and a simpler network organization. Usually divides two bytes of internal assignment into one byte and one byte department number Workstation ID.
Enterprise networks are built using TCP / IP router box commercial. each router has a table with 255 entries to change one byte department number to be preferred destination ethernet connected to a router. For example, a message to 130.132.59.234 over a regional network of National and New England by part number 130 132. Arriving at Yale, 59 department ID choose an ethernet connector. 234 choosing a particular workstation on the LAN. Yale network must be updated as new ethernet and the department added, but is not affected by changes from outside the department or displacement engines.
4. Indeterminate lines
Every time a message arrives at an IP router, the router will make a decision as to where the next message will be sent. There is the concept of a time with preselected path for all the traffic. Suppose a company with facilities in New York, Los Angeles, Chicago and Atlanta. Networks can be made from four telephone lines to form a loop (NY to Chicago to LA to Atlanta to NY). A message arrives at the router NY to go to LA via Chicago or through Atlanta. answers can be returned to the other.
How does a router to make a decision between a router with a router? there is no correct answer. Traffic can be mapped to the algorithm "clockwise" (go to NY to Atlanta, LA to chicago). Router can determine, send a message to Atlanta and then onward to Chicago. Routing better is to measure traffic patterns and sends data through the least busy link.
If one phone line in a tissue is damaged, messages can still achieve its goal through the other paths. After losing track of NY to Chicago, the data can be sent from NY to Atlanta to LA to Chicago. That way, the path will continue despite the loss of performance decline.
Improvements like these are additional sections on design IP.
5. Issues Not Inspected (undiagnosed Problem)
If no error occurs, the network reported to the authorities. The error to be corrected or repaired. IP, is designed to be resistant and strong. Loss of nodes or paths are common, but the network must continue. So IP automatically re-configure themselves when something goes wrong. If a lot of redundancy built into the system so komuniksi persists and awake. TCP is designed to recover a failed node or channel in which the propagation of routing table changes for all router nodes. Since the updating process takes a long time, TCP is rather slow to initiate recovery.
6. Regarding IP Number
Every large company or university that is connected to the Internet must have an intermediate level network. some routers may be configured to connect to the LAN bebarapa department. All traffic outside the organization associated with a single connection to a regional provider network.
Thus, the end user can install TCP / IP on the PC without having to know the regional network. Three pieces of information are needed:
 IP address created on PC
 The part of the IP address (subnet mask) that distinguishes other machines in the same LAN (messages can be sent directly) with the machines in other departments atao anywhere in the world (which is sent to the router machine)
 IP address of the router machine that connects the LAN to the outside world.
7. The composition of the TCP / IP protocol
Internet was originally designed with two main criteria. Two criteria influencing and shaping the hardware and software used today. The criteria are: The network must perform communication among researchers in different parts of the world, allowing the They can share and communicate about their research with one another. Unfortunately, the research needs of the diverse range of computer platforms and different network architectures for scientific purposes. It became necessary protocol suite to be associated with a variety of different hardware platforms and even different network systems. Furthermore, the network must be a strong communication network that has the ability to withstand a nuclear attack. This design memebawa towards decentralized network that consists of a network of separate, smaller, isolated network that has the ability to automatically when needed.
Layer provides abstrsaksi level and increase the ability for software reuse and platform independence. Layers were intended to completely separate from each other and also independent. Layer does not rely on detailed information from other layers. Architectural design makes it easier to do maintenance because the layer can be redesigned or developed without destroying the integrity of the protocol stack.
TCP / IP protocol suite consists of four layers: Application, Transport, Internetwork, and network interfaces. Layer can be seen as a hierarchy like this:
Application Layer is an application that sends data to the transport layer. For example, FTP, email programs and web browsers.
Transport layer is responsible for communication between applications. Layer is set brook information and may provide error checking. The data is divided into packets that are sent to the Internet layer with a header. The header contains the destination address, source address, and checksum. Checksum checked by the receiving machine to see if the package is lost on route.
Internetwork layer is responsible for communication between machines. This layer-engcapsul meg of transport layer packets into IP datagrams and routing algorithm to determine where datagaram should be sent. The entry datagram is processed and inspected prior kesahannya through the Transport layer.
Layer interface networks is the bottom level of the arrangement of TCP / IP. This layer is a device driver that enables IP datagaram sent to or from the physical network. Dapaat form a network cable, Ethernet, frame relay, Token Ring, ISDN, ATM networks, radio, satellite or other device that can transfer data from system to system. Network interface is an abstraction layer that facilitates communication between the multitude of network architectures.

Facing effects destabilize



Step 1 – Setting Up Background
Create a document of size 750×550 pixels.
Fill the Background layer with #000000.
Place the face at the center of the document and use Soft Eraser tool to remove the other unwanted background.


Step 2a – Drawing Face Grids
Create a new document of size 20×20 pixels and create a new layer. Use Pencil tool with size 1px and color #FFFFFF, draw left and bottom border to form a “L”. Hide the Background layer and click Ctrl+A. Go to Edit > Define Pattern. Name this pattern as Grid.
Back to Jessica Alba’s document, create a new layer above the Face. Use the Paint Bucket tool and select to fill with Grid pattern
Step 2b – Drawing Face Grids
Remove those grids that cross outside of the face area.
Go to Edit > Transform > Warp.
Distort the grids the way shown in the diagram.
Step 2c – Drawing Face Grids
Set the opacity of the grid layer to 20%.
Right-click on the grid layer and choose Blending Options.
Activate Outer Glow and set its Blend Mode to Color Dodge, Opacity to 100%, Color to #FFFFFF, Spread to 0 and Size to 5px. Leave the rest of the settings as default.
Step 3a – Shattered Blocks
Create a new layer and name it as Holes.
With Pen tool, path out several square holes according to the face grids.
Go to the Paths tab, Ctrl+left click on the work path layer created. Back to Layers tab, select the Holes layer and fill the selection with #000000.
Step 3b – Shattered Blocks
Ctrl+left click on the Holes layer to load selection.
Select the Face layer and hit Ctrl+X to cut out the pixels. Then press Ctrl+V to paste and then name this new layer as Blocks.
Drag the blocks to the right with Move tool. Go to Edit > Free Transform to reduce the size slightly.
Step 3c – Shattered Blocks
Duplicate the Blocks layer. Shift the lower Blocks layer 1 pixel to the left. Repeat this for 10 times and you will get some sort of extruding effect. Merge these 10 layers of duplicated Blocks and name this new merged layer as Sides. Right-click on the Sides layer and choose Blending Options. Activate Gradient Overlay and set Blend Mode to Normal, Opacity to 80%, Gradient from #000000 to #D58761 and Angle to 180. Leave the rest as default.
Step 3d – Shattered Blocks
Activate Pattern Overlay and set Blend Mode to Multiply, Opacity to 100% Pattern to Metal Landscape. Leave the rest as default.
Right-click on Blocks layer and choose Blending Options. Activate Outer Glow and set Blend Mode to Color Dodge, Opacity to 75%, Color to #FFFFFF and Size to 10px. Leave the rest as default.
Step 3e – Shattered Blocks
Repeat Step 3a to 3d for 2-3 more times to form more blocks floating towards the right.
Step 4 – Adding Depth to Holes
Merge all the Holes layers. Right-click on the merged layer and choose Blending Options.
Activate Bevel and Emboss, set the Style to Inner Bevel, Depth to 72%, Size to 5px, Soften to 0px, Angle to 0, Altitude to 50, Highlight Mode to Screen, Highlight Color to #DCA57E, Highlight Opacity to 100%, Shadow Mode to Multiply, Shadow Color to #000000 and Shadow Opacity to 75%. Leave the rest of settings as default.
Step 5 – Adding Smoke
Create a new layer below the Blocks and name it as Smoke. Set the foreground color to #FFFFFF. Load the Reborn brushes downloaded earlier and paint a few smoke of different sizes on this layer.
Right-click on the Smoke layer and choose Blending Options. Activate Outer Glow and set its Blend Mode to Linear Dodge (Add), Opacity to 75%, Color to #FFFFFF, Spread to 0px and Size to 5px. Leave the rest of settings as default.
Step 6 – Adding Dark Blocks
Create a new layer and name it as Dark Blocks.
Using Pen tool, path out few more blocks along the face grid. Fill the shapes with #000000.
Set the Blend Mode of Dark Blocks layer to Soft Light.
Step 7 – Adding Light Blocks
Create a new layer and name is as Light Blocks.
Similar to Step 6 but this time fill the shapes with #FFFFFF.
Set the Blend Mode of Light Blocks layer to Soft Light.
Step 8 – Adjusting Colors
Now we need to smooth the face a little. Select the Face layer and go to Filter > Blur > Surface Blur. Set the Radius to 5px and Threshold to 15 levels.
Create a new Levels Adjustment Layer and key in 10, 1.25, 244.
Create a new layer and using a large Soft Brush tool with color #000000 and opacity 40%, paint some dark areas on the right to fade the blocks slightly.
Optional
I merely added a barcode on her right arm to complete the design.
This is another long tutorial and I hope you will like this effect.

Tips and tricks windows XP registry


Tips and tricks registry is only for Windows XP. Do not forget to backup before tweaking your Registry. Ok ... immediately wrote, below there are many tips and tricks windows XP registry

Speeding Update Registry
Press the Start> Log Off> Log Off.

Changing the Wallpaper
HKEY_CURRENT_USER / Control Panel / Desktop
Double-click on the wallpaper image and enter the desired path in Value Data.

Renaming the Recycle Bin
HKEY_CLASSES_ROOT / CLSID / {645FF040-5081-101B-9F08-00AA002F954E}
Double click on the option (Default value) and give it a new name as desired in Value Data.

Bring up the Rename the Recycle Bin
HKEY_CLASSES_ROOT / CLSID / {645FF040-5081-101B-9F08-00AA002F954E} / ShellFolder
Double click on Attributes> Edit Binary Value. In the Value Data, change that number to 0000 50 01 00 20.

Hide the Recycle Bin
HKEY_LOCAL_MACHINE / Software / Microsoft / Windows / CurrentVersion / Explorer / Desktop / NameSpace
Delete subkey {645FF040-5081-101B-9F08-00AA002F954E}, then Restart the computer to see the results.
To bring it back, to re-combinations of numbers {645FF040-5081-101B-9F08-00AA002F954E}.


Adding Shortcut Content Menu In Recycle Bin
HKEY_CLASSES_ROOT / CLSID / {645FF040-5081-101B-9F08-00AA002F954E} / ShellFolder
Double click Attributes and change the number in the Value Data with the following numbers:
0000 50 01 00 20> Rename
0000 60 01 00 20> Delete
0000 70 01 00 20> Rename & Delete
0000 41 01 00 20> Copy
0000 42 01 00 20> Cut
0000 43 01 00 20> Copy & Cut
0000 44 01 00 20> Paste
0000 45 01 00 20> Copy & Paste
0000 46 01 00 20> Cut & Paste
0000 47 01 00 20> Cut, Copy & Paste

Adding Shortcut Content Menu In Recycle Bin With Menu Options
HKEY_CLASSES_ROOT / CLSID / {645FF040-5081-101B-9F08-00AA002F954E} / Shell
Click the Edit menu> New> Key and name it as desired (example: Go To Windows Explorer). Under the new key, press the menu Edit> New> Key and create a new key named Command.
Double click option (Default), and in the Value Data, fill in the path of Windows Explorer (C: \ WINDOWS \ Explorer.exe).

Restoring Lost Documents Folder In My Computer
HKEY_LOCAL_MACHINE / Software / Microsoft / Windows / CurrentVersion / Explorer / DocFolderPaths
Select Edit menu> New> String Value and name it according to the username used diWindows (eg: Chippers) Double click on the value and enter the path where you are Documents (eg D: \ Documents)

Getting rid of Stored Files From My Computer

Delete subkey {59031a47-3f72-44a7-89c5-5595fe6b30ee} by pressing the Del key.

Hide the My Recent Documents
HKEY_CURRENT_USER / Software / Microsoft / Windows / CurrentVersion / Policies / Explorer
Click the Edit menu> New> DWORD Value and name NoRecentDocsMenu.
Then double click on DWORD Value and give value 1 to enable it.

Hiding Menu Find
HKEY_CURRENT_USER / Software / Microsoft / Windows / CurrentVersion / Policies / Explorer
Click the Edit menu> New> DWORD Value and name NoFind.
Then double click on DWORD Value and give value 1 to enable it. Restart the computer.

Hiding Help And Support
HKEY_CURRENT_USER / Software / Microsoft / Windows / CurrentVersion / Policies / Explorer
Make a new DWORD Value - Menu Edit> New> DWORD Value, and name NoSMHelp. Then double click on NoSMHelp and content with value 1 in Value Data. Restart the computer.

Hiding Menu Run
HKEY_CURRENT_USER / Software / Microsoft / Windows / CurrentVersion / Policies / Explorer
Create a new DWORD Value and give name NoRun. Double click and enter the number 1 as the Value Data.

Hiding Menu Run from the Start Menu (2)
HKEY_CURRENT_USER / Software / Microsoft / Windows / CurrentVersion / Explorer / Advanced
Find a value named Start_ShowRun, double click and enter the number 0 in the Value Data.

Hide the Log Off
HKEY_CURRENT_USER / Software / Microsoft / Windows / CurrentVersion / Policies / Explorer
Click the Edit menu> New> Binary Value and name NoLogOff.
Double click on NoLogOff and enter the numbers 01 00 00 00 in the Value Data.

Hiding Menu Turn Off Computer
HKEY_CURRENT_USER / Software / Microsoft / Windows / CurrentVersion / Policies / Explorer
Click the Edit menu> New> DWORD Value and name noclose.
Double click noclose and give value 1 in Value Data.
ClearType In Logon Screen
HKEY_USERS / DEFAULT / Control Panel / Desktop
Double click FontSmoothingType and enter the number 2 in the Value Data.

Creating Different Views On Window Logon
HKEY_USERS / DEFAULT / Software / Microsoft / Windows / CurrentVersion / themeManager
Double click ColorName and insert Metallic text in Value Data.

Showing Administrator In Welcome Screen
HKEY_LOCAL_MACHINE / SOFTWARE / Microsoft / Windows NT / CurrentVersion / Winlogon / SpecialAccounts / UserList
Create a new DWORD Value and name it Administrator.
Double click Administrator and enter the value 1 in Value Data.

Automatic Login
HKEY_LOCAL_MACHINE / SOFTWARE / Microsoft / Windows NT / CurrentVersion / Winlogon
Double click AltDefaultUserName and enter the username of the selected account.
Double click AutoAdminLogon and insert value 1 in Value Data.
Create a new DWORD Value and give name DefaultPassword.
Double click and enter your account password DefaultPassword selected in Value Data.

Hiding Icons Printers & Faxes from the Start Menu
HKEY_CURRENT_USER / Software / Microsoft / Windows / CurrentVersion / Explorer / Advanced
Find a value named Start_ShowPrinters and give the value 0 in Value Data.

Hiding the Control Panel from the Start Menu
HKEY_CURRENT_USER / Software / Microsoft / Windows / CurrentVersion / Explorer / Advanced
Find a value named Start_ShowControlPanel and double-click on that section.
Enter the number 0 in Value Data.

Hiding Menu My Pictures from the Start Menu
HKEY_CURRENT_USER / Software / Microsoft / Windows / CurrentVersion / Explorer / Advanced
Double click on Start_ShowMyPics and enter the number 0 in the Value Data.

Bring up the Administrative Tools menu
HKEY_CURRENT_USER / Software / Microsoft / Windows / CurrentVersion / Explorer / Advanced
Double-click on StartMenuAdminTools and give value 1 in Value Data.

Minimize Start Menu Icons
HKEY_CURRENT_USER / Software / Microsoft / Windows / CurrentVersion / Explorer / Advanced
Double click on Start_LargeMFUIcons and insert value 1 in Value Data.

Eliminating Username On the Start Menu
HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ Curre ntVersion \ Policies \ Explorer
Choose Edit> New> DWORD Value and name NoUserNameInStartMenu.
Double click NoUserNameInStartMenu and insert value 1 in Value Data.

Prevent Start Menu Changes
HKEY_CURRENT_USER / Software / Microsoft / Windows / CurrentVersion / Policies / Explorer
Create a new DWORD Value and give name NoChangeStartMenu.
Double click NoChangeStartMenu and insert value 1 in Value Data.

Hide the My Recent Documents
HKEY_CURRENT_USER / Software / Microsoft / Windows / CurrentVersion / Explorer / Advanced
Double click on Start_ShowRecentDocs and insert value 0 in Value Data.

Changing Name Default Shortcut Key In Desktop
HKEY_CURRENT_USER / Software / Microsoft / Windows / CurrentVersion / Explorer / CLSID
Double click on the default value in each subkey below:
My Network Places:
{208D2C60-3AEA-1069-A2D7-08002B30309D}
My Computer:
{20D04FE0-3AEA-1069-A2D8-08002B30309D}
My Documents:
{450D8FBA-AD25-11D0-98A8-0800361B1103}
Recycle Bin:
{645FF040-5081-101B-9F08-00AA002F954E}
Default IE Icon:
{871C5380-42A0-1069-A2EA-08002B30309D}
enter unique names instead of the default name.

Hiding Icons In Desktop
HKEY_CURRENT_USER / Software / Microsoft / Windows / CurrentVersion / Explorer / Advanced
Double click on HideIcons and insert value 1 in Value Data.

Cleaning All Icon On Desktop
HKEY_CURRENT_USER / Software / Microsoft / Windows / CurrentVersion / Policies / Explorer
Create a new DWORD Value and give name NoDesktop.
Double click on NoDesktop and insert value 1 in Value Data.

Make Desktop More Stable
HKEY_CURRENT_USER / Software / Microsoft / Windows / CurrentVersion / Explorer
Create a new DWORD Value and give name DesktopProcess.
Double click DesktopProcess and insert value 1 in Value Data.

Deleting Program List In Menu Run
HKEY_CURRENT_USER / Software / Microsoft / Windows / CurrentVersion / Explorer / RunMRU
In the right pane, you'll see a row of software (marked by
alphabet a, b, c, d, and so on).
To remove it, simply by choosing one (or all) the name of the program
existing and press the Del key.
If the confirmation window appears for data deletion, tap Yes.

Cleaning Recent Documents
HKEY_CURRENT_USER / Software / Microsoft / Windows / CurrentVersion / Policies / Explorer
Create a new DWORD Value and give name NoRecentDocsHistory.
Double click on NoRecentDocsHistory and enter the number 1 in the Value Data.

Eliminating Info Tip At Folders Icon On Desktop
HKEY_CURRENT_USER / Software / Microsoft / Windows / CurrentVersion / Explorer / Advanced
Double click on FolderContentsInfoTip with the number 0.

Lock the Taskbar
HKEY_CURRENT_USER / Software / Microsoft / Windows / CurrentVersion / Explorer / Advanced
Double click on TaskBarSizeMove and insert value 0 in Value Data.

Removing Past Items Icons In Taskbar
HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ Curre ntVersion \ Explorer \ TrayNotify
Remove IconStreams and PastIconsStream, then open the Task Manager, the Tab
Processes right click on explorer.exe and select End Process.
Click the File menu> New Task (Run) and type explorer and press OK again.

Hiding System Tray
HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows \ Curr entVersion \ Policies \ Explorer
If no key Explorer create a new DWORD Value and name
NoTrayItemsDisplay.
Double click NoTrayItemsDisplay and insert value 1 in Value Data.
To restore the System Tray insert value 0 in Value Data.

Disabling Right-click the Desktop
HKEY_CURRENT_USER / Software / Microsoft / Windows / CurrentVersion / Policies / Explorer
Create a new DWORD Value and give name NoViewContextMenu.
Double click on NoViewContextMenu and insert value 1 in Value Data.

Changing Time Delay When Opening Menu
HKEY_CURRENT_USER / Control Panel / Desktop
Double-click on MenuShowDelay and change the number of milliseconds of the original 400 to
other figures. The smaller the faster.

Set Icon Size On Desktop And Start Menu
HKEY_CURRENT_USER / Control Panel / Desktop / WindowMetrics
Double click on the Shell Icon Size and change the number 32 to any other number, eg 10.

Color Changing Windows
HKEY_CURRENT_USER / Control Panel / Colors
Double-click the window and enter the RGB color combinations (using Adobe PhotoShop to find a suitable color combination).

Changing Text Color In Windows
HKEY_CURRENT_USER / Control Panel / Colors
Double click WindowText and enter the RGB color combination.

Eliminating Tab Screen Saver
HKEY_CURRENT_USER / Software / Microsoft / Windows / CurrentVersion / Policies / System
HKEY_LOCAL_MACHINE / Software / Microsoft / Windows / CurrentVersion / Policies / System
Create a new DWORD Value and give name NoDispScrSavPage.
Double click NoDispScrSavPage and insert value 1 in Value Data.

Changing the Screen Saver Through the Registry
HKEY_CURRENT_USER / Control Panel / Desktop
Double click SCRNSAVE.EXE then enter the file path where the desired Screen Saver.
Example: C: \ WINDOWS \ ScreenSaver.scr

Disabling the Default Screen Saver
HKEY_USERS / DEFAULT / Control Panel / Desktop
Double click ScreenSaveActive and insert value 0 in Value Data.
To return insert value 1 in Value Data.

Eliminate Darts Signs On Shortcut Icons
HKEY_CLASSES_ROOT / Inkfile
HKEY_CLASSES_ROOT / piffile
Change the name IsShortcut be IsShortcuts.

Changing Style Wallpaper
HKEY_CURRENT_USER / Control Panel / Desktop
Double click on WallpaperStyle and insert the following in Value Data:
1> Center
2> Stretch
3> Tile

Disabling Low Disk Space Warning
HKEY_CURRENT_USER / Software / Microsoft / Windows / CurrentVersion / Policies \ Explorer
Make a new DWORD Value and give name NoLowDiskSpaceChecks.
Double click NoLowDiskSpaceChecks and insert value 1 in Value Data.

Disabling Menu Properties My Computer
HKEY_CURRENT_USER / Software / Microsoft / Windows / CurrentVersion / Policies / Explorer
Create a new DWORD Value and give name NoPropertiesMyComputer.
Double click NoPropertiesMyComputer and insert value 1 in Value Data.
HKEY_LOCAL_MACHINE / Software / Microsoft / Windows / CurrentVersion / Policies / Explorer
Create a new DWORD Value and give name NoPropertiesMyComputer.
Double click NoPropertiesMyComputer and insert value 1 in Value Data.
If the Explorer key does not exist, create a new one by clicking on the Edit menu> New> Key and
Explorer name.

Sizing CoolSwitch
(Try Press Alt + Tab, it is called with CoolSwitch)
HKEY_CURRENT_USER / Control Panel / Desktop
HKEY_USERS / DEFAULT / Control Panel / Desktop
Click CoolSwitchColumns and set CoolSwitch how long it will be displayed by entering the desired number in the Value Data.
Then click CoolSwitchRows and do the same.

Disabling Function CoolSwitch
HKEY_CURRENT_USER / Control Panel / Desktop
HKEY_USERS / DEFAULT / Control Panel / Desktop
Double click on CoolSwitch and enter the number 0.

Disabling Animations In Windows XP
HKEY_CURRENT_USER / Control Panel / Desktop / WindowMetrics
Double click on MinAnimate and enter the numbers 1 to disable, and 0 to turn it back on.

Changing Keys Being Left Right Button On Mouse
HKEY_CURRENT_USER / Control Panel / Mouse
Double-click on SwapMouseButtons and give value 1 in Value Data.

Changing Lines On Scroll Mouse Scrolls
HKEY_CURRENT_USER / Control Panel / Desktop
Double click WheelScrollLines enter the desired number (corresponding to the lines going to rolled) in Value Data.

Hiding System Properties In Control Panel
HKEY_CURRENT_USER / Control Panel / don 't load
Make a new String Value and give name sysdm.cpl.
Double click Yes sysdm.cpl and insert input in the Value Data.

Disabling Display Properties
HKEY_CURRENT_USER / Software / Microsoft / Windows / CurrentVersion / Policies
On the Policies subkey, create a new key by Edit> New> Key and name it System.
Then in the System subkey, create a new DWORD Value and give name NoDispCPL.
Double click NoDispCPL and insert value 1 in Value Data.

Speed ​​Adjust Keyboard Repeat Rate
HKEY_CURRENT_USER / Control Panel / Keyboard
Double click KeyboardSpeed ​​and enter the desired value. The higher the number, the faster the Repeat Rate.

Text Striped Down In Notepad
HKEY_CURRENT_USER / Software / Microsoft / Notepad
Double click lfUnderline and insert value 1 in Value Data.
Word Wrap Mode In Notepad
HKEY_CURRENT_USER / Software / Microsoft / Notepad
Double click fWrap and insert value 1 in Value Data.

Status Bar In Notepad
HKEY_CURRENT_USER / Software / Microsoft / Notepad
Double click StatusBar and insert value 1 in Value Data.
DVD in Windows Media Player
HKEY_CURRENT_USER / Software / Microsoft / MediaPlayer / Player / Settings
Select Edit menu> New> String Value and name DVDUI.
Double click DVDUI and insert text Yes in Value Data.

Adding Identity Windows Media Player
HKEY_CURRENT_USER / Software / Policies / Microsoft
HKEY_LOCAL_MACHINE / SOFTWARE / Policies / Microsoft / Windows
Click Edit> New> Key and name WindowsMediaPlayer.
Click Edit> New> String Value and name titlebar.
Double-click the titlebar and enter the desired text in Value Data.

Changing Button Button Stop Being Play In Windows Media Player
HKEY_LOCAL_MACHINE / SOFTWARE / Microsoft / MediaPlayer / Objects / StopButton
Double click and enter text player.controls.play onclick () in Value Data.

Selecting Default Audio CD
HKEY_CLASSES_ROOT / AudioCD / Shell / Play / Command
Double click (Default) and enter the path to the software that you want as the default audio CD player.
For example: C: \ Program Files \ Windows Media Player \ wmplayer.exe

Restoring Access to CD-ROM
After uninstalling a CD burning program, sometimes a CD-ROM can no longer be accessed, the solution:
HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Contro l \ Class \ {4D36E965-E325-
11CE-BFC1-08002BE10318}
Delete the subkey LowerFilters and UpperFilters by pressing the Del key.

Minimize Thumbnail Size For Windows Explorer
HKEY_CURRENT_USER / Software / Microsoft / Windows / CurrentVersion / Explorer
Select Edit> New> Binary Value and name ThumbnailSize.
Double click ThumbnailSize and insert number 20 in Value Data.

Creating Personal Menu Shortcut In Windows Explorer
HKEY_CLASSES_ROOT / Drive / Shell
Choose Edit> New> Key and name the Winamp for example.
Double click option (Default) on the right registry editor and insert text Winamp.
Click the subkey Winamp and choose Edit> New> Key and name it Command.
Double click option (Default) and enter the path C: \ Program Files \ Winamp \ Winamp.exe in Value Data

Through Encryption Context Menu
HKEY_LOCAL_MACHINE / Software / Microsoft / Windows / CurrentVersion / Explorer / Advanced
Create a new DWORD Value and give name EncryptionContextMenu.
Double click EncryptionContextMenu and insert value 1 in Value Data.

Changing Icon On Drives
HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ Curr entVersion \ Explorer
If not, select Edit> New> Key and name it according to the desired drive
[For example: C for drive C:]
At that value, create a new Key and name it DefaultIcon again.
Double click option (Default) and enter the path where the icon is located (for example: D: \ Documents \ C Drive Icon.ico)

Hiding Drive
HKEY_CURRENT_USER / Software / Microsoft / Windows / CurrentVersion / Policies / Explorer
Choose Edit> New> DWORD Value and name NoDrives.
Double click NoDrives and specify which drive you wish to remove the Value Data.
Example: if you want to eliminate the drive E:, insert value 16 in Value Data.
The combination of numbers in the Value Data is as follows:
A:> 1
B:> 2
C:> 4
D:> 8
E:> 16
F:> 32
G:> 64
H:> 128
I:> 256
A:> 512
K:> 1024
L:> 2048
M:> 4096
All:> 67108863

Making Tip Of The Day Windows Explorer
To enable open Windows Explorer and then select the menu View> Explorer Bar
> Tip of the Day.
HKEY_LOCAL_MACHINE / SOFTWARE / Microsoft / Windows / CurrentVersion / Explorer / Tips
In the right pane will be visible rows of tip-tip stored in the value 0-49.
Two things that can be done is to replace the tips with a double click each value with the desired text.
Both are adding new tips starts with the order after the value 49 (eg 50 ff.).
Choose Edit> New> String Value and name-shaped figures continue to tip the last digit (eg 50 ff.).
Double-click on the new value and enter the desired text in Value Data.

Hiding Advanced Settings In Windows Explorer Folder Options
HKEY_LOCAL_MACHINE / SOFTWARE / Microsoft / Windows / CurrentVersion / Explorer
Under Explorer key will be found subkey named Advanced. Right click and select Rename. Advanced rename a Advancedx.