1. Trang chủ
  2. » Công Nghệ Thông Tin

Hacking Windows XP (P1)

30 269 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Hacking Windows XP
Tác giả Steve Sinchak
Trường học Wiley Publishing, Inc.
Chuyên ngành Publishing
Thể loại Book
Năm xuất bản 2004
Thành phố Indianapolis
Định dạng
Số trang 30
Dung lượng 538 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

73 Chapter 4: Customizing the Appearance of the Windows Interface.. 91 Chapter 5: Hacking Windows Explorer.. 117 Chapter 6: Exploring Other Windows Enhancements.. 52 Customizing the Clas

Trang 2

Hacking Windows ® XP

Trang 4

Hacking Windows ® XP

Steve Sinchak

Wiley Publishing, Inc

Trang 5

Copyright © 2004 by Steve Sinchak

Published by Wiley Publishing, Inc., Indianapolis, Indiana

Manufactured in the United States of America

10 9 8 7 6 5 4 3 2 1

No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600 Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN

46256, (317) 572-3447, fax (317) 572-4447, E-Mail: permcoordinator@wiley.com.

LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY : THE PUBLISHER AND THE AUTHOR MAKE NO

REPRESENTATIONS OR WARRANTIES WITH RESPECT TO THE ACCURACY OR COMPLETENESS OF THE CONTENTS OF THIS WORK AND SPECIFICALLY DISCLAIM ALL WARRANTIES, INCLUDING WITHOUT LIMITATION WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE NO WARRANTY MAY BE CREATED OR EXTENDED BY SALES OR PROMOTIONAL MATERIALS THE ADVICE AND STRATEGIES CONTAINED HEREIN MAY NOT BE SUITABLE FOR EVERY SITUATION THIS WORK IS SOLD WITH THE UNDERSTANDING THAT THE PUBLISHER IS NOT ENGAGED IN RENDERING LEGAL, ACCOUNTING, OR OTHER PROFESSIONAL SERVICES IF PROFESSIONAL ASSISTANCE IS REQUIRED, THE SERVICES OF A COMPETENT PROFESSIONAL PERSON SHOULD BE SOUGHT NEITHER THE PUBLISHER NOR THE AUTHOR SHALL BE LIABLE FOR DAMAGES ARISING HEREFROM THE FACT THAT AN ORGANIZATION OR WEB SITE IS REFERRED TO IN THIS WORK AS

A CITATION AND/OR A POTENTIAL SOURCE OF FURTHER INFORMATION DOES NOT MEAN THAT THE AUTHOR OR THE PUBLISHER ENDORSES THE INFORMATION THE ORGANIZATION OR WEBSITE MAY PROVIDE OR RECOMMENDATIONS IT MAY MAKE FURTHER, READERS SHOULD BE AWARE THAT INTERNET WEBSITES LISTED IN THIS WORK MAY HAVE CHANGED OR DISAPPEARED BETWEEN WHEN THIS WORK WAS WRITTEN AND WHEN IT IS READ.

For general information on our other products and services or to obtain technical support, please contact our Customer Care Department within the U.S at (800) 762-2974, outside the U.S at (317) 572-3993 or fax (317) 572-4002.

Wiley also publishes its books in a variety of electronic formats Some content that appears in print may not be available in electronic books.

Library of Congress Cataloging-in-Publication Data: Available from Publisher

Trademarks: Wiley, the Wiley Publishing logo and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc.

and/or its affiliates, in the United States and other countries, and may not be used without written permission All other trademarks are the property of their respective owners Wiley Publishing, Inc., is not associated with any product or vendor mentioned in this book.

eISBN: 0-7645-7722-0

Trang 6

About the Author

Steve Sinchak is an entrepreneur that has started several technology-related businesses and is

currently running a Web development firm known as SSMGi that owns and operates severalWeb sites As president of the small company, he is responsible for financial, as well as techni-cal, aspects of the business, such as application programming and infrastructure design andmaintenance

Steve has been working with computers for more than 10 years Starting with a desktop whichhad a 286-based processor, 1MB of RAM, and was running DOS & Windows 3.1, he taughthimself how to make his computer run faster on the outdated hardware Driven by curiosity tocustomize Windows and make it run faster, he spent countless hours researching and experi-menting with the inner workings and features of Windows His primary claim-to-fame in thissubject matter is as the creator of TweakXP.com, the number-one site for tweaking Windows

XP What started out as an idea for a new Web site that combined his interest in tweakingWindows and Web programming has grown into a massive database of tweaks and tips forWindows XP that attracts more than 3 million visitors a year

Currently, Steve is a senior at Marquette University in Milwaukee, WI, studying management

IT and computer science He splits his spare time between classes, running his businesses, andspending time with his family and friends

Trang 7

Proofreading and Indexing

TechBooks Production Services

Cover Image

Anthony Bunyan

Trang 8

This book is dedicated to my parents Larry and Mary Jo, my brothers Jason and David,

my sisters Jackie and Kimberly, and my girlfriend Emily.

Trang 9

viii

Trang 10

Writing this book while juggling classes and my business was often pretty difficult Almost all

of my free time for the last four months has been consumed by writing, leaving very little timefor my girlfriend and friends First, I would like to thank my girlfriend, Emily, for her love,support, understanding, and help when things got really tight Thank you so much You meanthe world to me

I’d also like to thank everyone in my family for the love, support, and motivation that they havealways shown me Dad, thanks for bringing home that old IBM AT from work many yearsago Who would have thought it could start something that would lead me to eventually write

a book? Mom, thank you for your constant motivation and love throughout all of the challenges

in my life

I’d like to thank my close friends, Paul and Tom Although they made writing this book verydifficult at times, with their constant distractions, I wouldn’t want it any other way Going toMiller Time pub with you two to take breaks from writing was priceless

Next, I’d like to thank everyone at Wiley for their work on this book Chris Webb, thanks forgiving me this opportunity and for your suggestions in the early stages Scott Amerman, thankyou very much for your help and suggestions with writing the chapters Thank you for turning

me into an author

Everyone at TweakXP.com also deserves a big thank you—especially Allan Grossman, theforum administrator of the TweakXP.com support forums Thank you very much for helping

me with the site and for turning the forum into one of the best support forums for Windows

XP I would also like to thank all of the forum moderators, news posters, active members, anddaily visitors You have all played an essential role in the success of TweakXP.com Thank youvery much!

Trang 12

Contents at a Glance

Acknowledgments ix

Part I: Customizing Your System 1

Chapter 1: Customizing the Look of the Startup 3

Chapter 2: Customizing User Navigation 39

Chapter 3: Hacking the Desktop 73

Chapter 4: Customizing the Appearance of the Windows Interface 91

Chapter 5: Hacking Windows Explorer 117

Chapter 6: Exploring Other Windows Enhancements 137

Part II: Increasing Your System’s Performance 157

Chapter 7: Analyzing Your System 159

Chapter 8: Speeding Up the System Boot 183

Chapter 9: Making Your Computer Load Faster 209

Chapter 10: Making Your Computer More Responsive 231

Chapter 11: Speeding Up Your Computer 247

Part III: Securing Your System 277

Chapter 12: Protecting Your Computer from Intruders 279

Chapter 13: Fighting Spam, Spyware, and Viruses 303

Chapter 14: Protecting Your Privacy 315

Appendix A: What’s on the CD-ROM 335

Index 343

End-User License Agreement 355

Trang 14

Acknowledgments ix

Introduction xix

Part I: Customizing Your System 1 Chapter 1: Customizing the Look of the Startup 3

Customizing the Windows XP Boot Screen 3

Changing the boot screen 3

Customizing the Logon Screen 14

Working with the Welcome screen 15

Working with the classic logon screen 28

Global logon/Welcome settings 34

Summary 38

Chapter 2: Customizing User Navigation 39

Customizing the Start Panel 39

Using Group Policy Editor to customize the Start panel 40

Adding and removing navigation icons 44

Switching to small icons for frequently run apps 45

Increasing number of recently run programs displayed on the Start panel 48

Hiding programs from appearing in the Start panel 50

Pinning your programs 51

Adding Web site links to your Start panel 52

Customizing the Classic Start Menu 54

Turning the classic Start Menu back on 54

Customizing the classic Start Menu 54

Customizing the Start Menu/Panel Program Listings 55

Changing program listing display options for users of the Start panel 58

Changing program listing display options for users of the classic Start Menu 59

Removing pop-up Help for users of both the Start panel and Menu 61

Customizing the Taskbar 62

Using and adjusting program grouping 62

Quick Launching your programs 63

Hacking the Start button to replace the Start text 64

Trang 15

Modifying the taskbar location 68

Using the Taskbar Magnifier PowerToy 69

Removing the notification area 71

Removing the clock from the taskbar 71

Summary 71

Chapter 3: Hacking the Desktop 73

Customizing Desktop Icons 73

Removing all icons from the desktop 74

Customizing the icon drop shadow effect 74

Displaying the traditional Windows icons 75

Enabling large icons on the desktop 77

Removing the text below the icons 78

Renaming the Recycle Bin 79

Removing the shortcut arrow from icons on the desktop 80

Changing the icons on the desktop 81

Customizing the Behavior of the Desktop 83

Using the Virtual Desktop Manager PowerToy 84

Fun with Active Desktop 86

Using the wallpaper PowerToy 89

Summary 90

Chapter 4: Customizing the Appearance of the Windows Interface 91

Working with Themes 91

Changing the current theme 92

Making your own themes 92

Modifying the Visual Styles 100

Installing new visual styles 102

Tweaking the visual styles 108

Making your own visual styles 108

Visual Style Alternatives 112

Using WindowBlinds to change the way Windows XP looks 113

Installing additional Windows XP skins for WindowBlinds 114

Summary 115

Chapter 5: Hacking Windows Explorer 117

Hacking File Associations 117

Changing the default launch app 118

Changing the icon of any file type 119

Hacking the Context Menu 120

Removing items from the context menu 121

Adding your own items to the context menu 122

Modifying the Send To menu 125

xiv Contents

Trang 16

Customizing Your Folders 126

Changing a folder icon and picture 126

Changing the template of a folder 127

Customizing the view folder 129

Applying your folder settings to all folders 132

Working with Hidden Files 132

Unhiding hidden files 132

Revealing the super hidden files 134

Disabling the Common Tasks Pane 134

Summary 135

Chapter 6: Exploring Other Windows Enhancements 137

Modding Internet Explorer 137

Changing the logo animation 137

Changing the toolbar background 140

Making your own quick search address command 140

Other Visual Enhancements 142

Replacing the task switcher 143

Adding Special Effects to your Windows 144

Fine-Tuning ClearType 150

Branding Windows XP 152

Summary 155

Part II: Increasing Your System’s Performance 157 Chapter 7: Analyzing Your System 159

Monitoring Your System Hardware 159

Using performance 159

Using Bootvis to analyze your system start 166

Using Task Manager 170

Benchmarking Your System 173

How to benchmark your system 174

Summary 181

Chapter 8: Speeding Up the System Boot 183

Working with BIOS 183

Changing the boot order of your drives 184

Using the quick boot feature of the BIOS 186

Modifying the Operating System Boot 187

Lowering OS timeout values 187

Disabling the system boot screen 189

Disabling unneeded hardware devices 191

Removing extra fonts for speed 193

xv

Contents

Trang 17

xvi Contents

Disabling unneeded services 196

Optimizing the location of the boot files 203

Summary 207

Chapter 9: Making Your Computer Load Faster 209

Speeding Up the Logon 210

Enabling automatic logon 210

Removing user passwords 211

Adjust the startup programs 216

Customizing startup programs for different users 223

Other Time-Saving Tips 225

Assigning alternative IP addresses 225

Turning off the logon music 228

Summary 229

Chapter 10: Making Your Computer More Responsive 231

Speeding up file browsing and access 231

Disabling the file access timestamp 232

Disabling legacy filename creation 234

Speeding Up the User Interface 236

Reducing the menu delay 237

Working with the performance options 238

Disable Indexing Service 244

Summary 246

Chapter 11: Speeding Up Your Computer 247

Working with the Windows Prefetcher 247

Hacking the registry to optimize the Prefetcher 248

Accelerate specific applications with prefetch 249

Using the Intel Application Accelerator 251

How well does the Intel Application Accelerator work? 253

What are the system requirements? 253

How to install Intel Application Accelerator 255

Fine-Tuning the Windows Paging File 255

Disabling the paging file 256

Adjusting the size of the paging file 258

Changing the location of the paging file 260

Defragmenting Your Drive 263

Defragmenting the Windows paging file 263

Defragmenting the NTFS master file table 264

Adjusting Your Application Priorities 264

Using Task Manager to adjust priorities 265

Starting applications with a user set priority 265

Using WinTasks to profile your priorities 267

Speeding Up Your Network 268

Increasing network browsing speed 269

Trang 18

Disabling unneeded protocols 270

Tweaking your Internet connection for speed 271

Summary 275

Part III: Securing Your System 277 Chapter 12: Protecting Your Computer from Intruders 279

How Vulnerable Is Your System? 280

Testing your Internet security 280

Updating your computer 281

Firewalls 282

Using the Windows firewall 283

Using ZoneAlarm personal 285

Using Sygate Personal Firewall 289

Disabling Unneeded Services 290

Disabling Remote Desktop connection 290

Disabling Messenger Service 292

Disabling Universal Plug and Play 292

Disabling Remote Registry Access 295

Disable DCOM support 295

Wireless Networks 296

Using WEP for secure communication 297

Using WPA for a more secure wireless connection 298

Controlling access to your computer 298

Managing user accounts 299

Summary 301

Chapter 13: Fighting Spam, Spyware, and Viruses 303

Eliminating Spam 303

Stopping spam in the first place 304

Using filtering software 305

Blocking external links in HTML mail 305

Defending Spyware and Adware 307

Detecting and removing spyware 307

Locking down Internet Explorer 311

Immunizing your computer 312

Defending against Viruses 312

Use an antivirus program 313

Summary 314

Chapter 14: Protecting Your Privacy 315

Internet Explorer 315

Removing address bar suggestions 315

Clearing visited Web sites history 316

Clearing temporary Internet files and cookies 318

xvii

Contents

Ngày đăng: 23/10/2013, 15:15

w