rss
@rohhy
Showing posts with label Windows 7. Show all posts
Showing posts with label Windows 7. Show all posts

Add anything to MY Computer!

Here is a simple but useful trick to add your favorite software to access from My Computer {now it called ‘Computer’ only! not ‘My Computer’} window, all you have to do is just copy and paste those shortcuts which you like to appear in Computer:

Rohhy

1. Go to following folder:
%userprofile%\AppData\Roaming\Microsoft\Windows\Network Shortcuts
The user %userprofile% is the location like; ‘C:\Users\ABC’ where ‘ABC’ is the user name

So in my case I would open;
image C:
image Users
imageABC
imageAppData
imageRoaming
imageMicrosoft
imageWindows
imageNetwork Shortcuts

2. Copy a shortcut 
For e.g. I’ve copied Calculator from start menu by right clicking on it and selecting ‘Copy’ option.

3. Paste the shortcut in “Network Shortcuts” folder

4. Start ‘Computer’ from start menu and you will see those shortcuts you have added, under ‘Network Location’.

You can add files, folders, and application in this folder! and have direct access to theme through ‘MY Computer’!

-Rohy Chopda

follow me @rohhy

Microsoft confirms 17-year-old Windows bug

Google engineer reveals ancient flaw in all 32-bit versions of Windows


 

Computerworld - Microsoft late yesterday issued its second advisory of the last week, warning users that a 17-year-old bug in the kernel of all 32-bit versions of Windows could be used by hackers to hijack PCs.
The vulnerability in the Windows Virtual DOS Machine (VDM) subsystem was disclosed Tuesday by Google engineer Tavis Ormandy on the Full Disclosure security mailing list. Coincidentally, Ormandy received credit for reporting the single vulnerability that Microsoft fixed last week on its regular Patch Tuesday.
The VDM subsystem was added to Windows with the July 1993 release of Windows NT, Microsoft's first fully 32-bit operating system. VDM allows Windows NT and later to run DOS and 16-bit Windows software.
Yesterday's advisory spelled out the affected software -- all 32-bit editions of Windows, including Windows 7 -- and told users how to disable VDM as a workaround. Windows' 64-bit versions are not vulnerable to attack.
It was Microsoft's second advisory in seven days; last week, the company posted a warning of a critical flaw in Internet Explorer after Google said its corporate computers had been hacked by Chinese attackers. That bug is to be patched later today.
"An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode," said the newest advisory. "An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights."
Jerry Bryant, a program manager with the Microsoft Security Response Center (MSRC), said that the company had not seen any actual attacks using the vulnerability, and also downplayed the threat if hackers do exploit the flaw. "To exploit this vulnerability, an attacker must already have valid logon credentials and be able to log on to a system locally, meaning they must already have an account on the system," Bryant said in an e-mail.
Typically, Microsoft ranks this kind of vulnerability -- which it classified as an elevation of privilege flaw -- as "important," the second-highest of the four ratings in its four-step system.
Ormandy said that the vulnerability goes back nearly 17 years to Windows NT 3.1's release, and exists in every version of Windows since. He reported the bug to Microsoft more than seven months ago.
"Regrettably, no official patch is currently available," Ormandy wrote on Full Disclosure Tuesday. "As an effective and easy-to-deploy workaround is available, I have concluded that it is in the best interest of users to go ahead with the publication of this document without an official patch." The workaround Ormandy included in his message was the same as Microsoft's: Edit group policies to block 16-bit applications from running.
Although Ormandy divulged information about the vulnerability, even posted attack code that works on Windows XP, Server 2003, Vista, Server 2008 and Windows 7, Microsoft didn't take him to task in the advisory for prematurely revealing the bug, as it almost always does researchers who spill the beans before a patch is ready. Presumably, Microsoft will issue a fix for the flaw at some point, but as is its practice in security advisories, it didn't promise to do so.

The Past is Future!




The new OS coming out on October 22nd from Microsoft, and we call it Windows 7. It looks pretty good and more reliable ever since Microsoft’s Windows Vista was release! There are many enhancement in Windows 7 but one of it’s best future is XP Mode! Yes it runs productive Windows XP software as it was run on Windows XP platform. This is made possible with the help of Hardware based visualization and virtualization technology. The Windows XP Mode (XPM) is a virtual machine package for Windows Virtual PC containing a pre-installed, licensed copy of Windows XP SP3 as its guest OS. Pre-installed integration components allow applications running within the virtualized environment to appear as if running directly on the host, sharing the native desktop and Start Menu of Windows 7 as well as participating in file type associations. XP Mode applications run in a Terminal Services session in the virtualized Windows XP, and are accessed via Remote Desktop Protocol by a client running on the Windows 7 host. Applications running in Windows XP mode do not have compatibility issues as they are actually running inside a Windows XP virtual machine and redirected using RDP to the Windows 7 host.



It has many advantages like:
Start from Windows 7 start menu
Support USB
Use printers and other ports
Internet connectivity






Virtualization supported motherboards from INTEL:
VT-d is enabled on the following chipsets:

Intel Q35 GMCH with ICH9 DO (Bearlake chipset)
The following chipsets have VT-d capability, but OEMs may not have enabled in systems based on these:

Intel X38

Intel X48

VT-d will be enabled on these future products:

Intel Q45 (Eaglelake)
For Intel Desktop Boards, these have VT-d support enabled:

Intel DQ35JO

Intel DQ35MP

Intel DX38BT

Intel DX48BT2

These future Intel Desktop Boards will have VT-d support:

Intel DQ45CB

Intel DQ45EK

*************************************

@rohhy