Posts Tagged ‘windows’

Codename Threshold: Free Windows 10 released

The Microsoft company has announced last Tuesday at San Francisco conference the released of Windows 10 preview. Instead of Windows 9 which most are awaiting, they skip 9 and jump to 10.

win10x

It is expected that this Windows 10’s (Threshold) final stable released will become available throughout next year. For the eagerness of the public, we can download free and try the technical preview.

It is a platform that will be available to any devices although it is expected that there is a variance a little bit.

DOWNLOAD AND TRY IT NOW

 

How to Fix Corrupted Files?

** How to fix corrupted files in XP **

/ Introduction //
This tutorial has been made so people that are having problems with corrupted files, can learn how to fix them easy.

// Required //
+ Windows XP operating system
+ Windows XP cd

// Right to the tutorial //
+ Place the xp cd in your cd/dvd drive
+ Go to start
+ run
+ type in ‘sfc /scannow’ (without the ‘)

Now it should all load, and fix all your corrupted file on windows XP 🙂

Note: The author does not take any responsibility for your actions and not responsible for any damage caused by this tutorial. Thanks to H|LLJD00

 

 

How to Bypass BIOS Password?

This depends on what BIOS the machine has. Common BIOS’s include AMI, Award, IBM and Phoenix. Numerous other BIOS’s do exist, but these are the most common.

Some BIOS’s allow you to require a password be entered before the system will boot. Some BIOS’s allow you to require a password to be entered before the BIOS setup may be accessed.

Every BIOS must store this password information somewhere. If you are able to access the machine after it has been booted successfully, you may be able to view the password. You must know the memory address where the password is stored, and the format in which the password is stored. Or, you must have a program that knows these things.

The most common BIOS password attack programs are for Ami BIOS. Some password attack programs will return the AMI BIOS password in plain text, some will return it in ASCII codes, some will return it in scan codes. This appears to be dependent not just on the password attacker, but also on the version of Ami BIOS.

To obtain Ami BIOS password attackers, ftp to oak.oakland.edu/simtel/msdos/sysutil/.

If you cannot access the machine after if has been powered up, it is still possible to get past the password. The password is stored in CMOS memory that is maintained while the PC is powered off by a small battery, which is attached to the motherboard. If you remove this battery, all CMOS information will be lost. You will need to re-enter the correct CMOS setup information to use the machine. The machines owner or user will most likely be alarmed when it is discovered that the BIOS password has been deleted.

On some motherboards, the battery is soldered to the motherboard, making it difficult to remove. If this is the case, you have another alternative. Somewhere on the motherboard you should find a jumper that will clear the BIOS password. If you have the motherboard documentation, you will know where that jumper is. If not, the jumper may be labeled on the motherboard. If you are not fortunate enough for either of these to be the case, you may be able to guess which jumper is the correct jumper. This jumper is usually standing alone near the battery.

Content Protected Using Blog Protector By: PcDrome. & GeekyCube.