• Content count

  • Joined

  • Last visited

Community Reputation

0 Neutral

About mhc

  1. You can remove the parentheses, but as mentioned above, it would require editing the resource string table in a core Windows system file (SHELL32.DLL). That's probably not a good idea in your situation, but if you're interested anyway, I can point you to what requires editing in SHELL32.DLL.
  2. Your .VBS file will add the .lnk extension to items in the Start Menu folder. It will not add extensions to other types of shortcuts, nor will it add extensions to items in the Send To folder. The following file, if imported into the registry via RegEdit, will add all those extensions as well as a couple others: Windows Registry Editor Version 5.00 [HKEY_CLASSES_ROOT\CLSID\{888DCA60-FC0A-11CF-8F0F-00C04FD7D062}] "NeverShowExt"=- [HKEY_CLASSES_ROOT\CLSID\{9E56BE60-C50F-11CF-9A2C-00A0C90A90CE}] "NeverShowExt"=- [HKEY_CLASSES_ROOT\CLSID\{ECF03A32-103D-11d2-854D-006008059367}] "NeverShowExt"=- [HKEY_CLASSES_ROOT\DocShortcut] "NeverShowExt"=- [HKEY_CLASSES_ROOT\InternetShortcut] "NeverShowExt"=- [HKEY_CLASSES_ROOT\lnkfile] "NeverShowExt"=- [HKEY_CLASSES_ROOT\piffile] "NeverShowExt"=- [HKEY_CLASSES_ROOT\SHCmdFile] "NeverShowExt"=- [HKEY_CLASSES_ROOT\ShellScrap] "NeverShowExt"=- And here's an "undo" file: Windows Registry Editor Version 5.00 [HKEY_CLASSES_ROOT\CLSID\{888DCA60-FC0A-11CF-8F0F-00C04FD7D062}] "NeverShowExt"="" [HKEY_CLASSES_ROOT\CLSID\{9E56BE60-C50F-11CF-9A2C-00A0C90A90CE}] "NeverShowExt"="" [HKEY_CLASSES_ROOT\CLSID\{ECF03A32-103D-11d2-854D-006008059367}] "NeverShowExt"="" [HKEY_CLASSES_ROOT\DocShortcut] "NeverShowExt"="" [HKEY_CLASSES_ROOT\InternetShortcut] "NeverShowExt"="" [HKEY_CLASSES_ROOT\lnkfile] "NeverShowExt"="" [HKEY_CLASSES_ROOT\piffile] "NeverShowExt"="" [HKEY_CLASSES_ROOT\SHCmdFile] "NeverShowExt"="" [HKEY_CLASSES_ROOT\ShellScrap] "NeverShowExt"=""
  3. Wow. Where do I begin. Oh yeah, I know. Have you ever looked at the hex code in RSHX32.DLL or SFC_OS.DLL? I have, and what I did above is a FAR better way to hack these programs than, for example, finding the mysterious "-63" check in SFC_OS.DLL. Are you aware that SFC_OS.DLL does a simple check for safe mode just like it does a simple check for -63? And that RSHX32.DLL checks for safe mode for the sole reason to determine whether to display the Security tab in XP Home? And that for these reasons, the above patches affect no other operation in XP? Geez, these patches aren't like eliminating core XP components that can break the most popular programs sold in the's just altering simple checks in two DLLs! I would be reacting differently if you actually TRIED the hacks and found problems with them. Right now you're shooting from the hip with statements that IMO have no basis in reality. Oh, FWIW, what I did above is hex editing. And what you call hex editing is also fooling the operating system as much as what I did above. The difference is that the above way is a better solution, period, than attempting to hack actual code since it is version-independent. And since the registry value set by NTOSKRNL.EXE to signify safe mode is checked by so many DLLs when they are loaded, that value will not change at this point in XP, so hacking that location in SFC-OS.DLL and RSHX32.DLL will remain valid for the remainder of XP's life.
  4. Please read your post name was never mentioned, and that, combined with the lack of a link, was why I reacted as I did. So for the record, here is the link to my post on Neowin which was "quoted" above.
  5. Since I was the "Neowinian" who originally posted the above patches, I'm wondering why the OP didn't put a link to my post (don't care about credit per se, but this seems like "ripping"). Anyway, to GrofLuigi...note that this patch moves "OptionValue" in the two DLLs to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot from HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Option and effectively gives the user control over operation of the Security tab and WFP. By setting OptionValue to 1, you see the Security tab and WFP is disabled. By setting it to 0, WFP is enabled and the Security tab disappears. The possible downside is that the patched OptionValue now takes precedence over Safe Mode for these two functions -- which for my purposes is no downside whatsoever, but it might be a problem for others. I also documented this possible downside in the patch posted above. All other DLLs will respect the OptionValue that XP puts in HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Option when it loads in Safe Mode.
  6. Paste the following into Notepad, save it as UNTERMDD.REG, import the file into RegEdit, then reboot your system. Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server] "TSEnabled"=dword:00000000 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\TermDD] "Start"=dword:00000004 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\TermService] "Start"=dword:00000004
  7. I learned stuff like this by snooping on my own. If you're running XP Home edition, here's another hack of mine that you can also do.
  8. You can't use the normal methods to restore icons changed by Foxit, because it resets them in the registry to its own icons every time the program loads. Firefox is like this as well, as is Spybot S&D. Truly insidious, needless, and disgusting programming! can use a hex editor to hack Foxit so it leaves your icon settings alone. Just search for "DefaultIcon" in the executable and change every occurance to another 11-character word. I use "GotchaSucka". Now use the procedure mentioned above to reset the PDF icon to what you want. The next time you load Foxit, it will leave your selected icon settings alone. Note that this hack works for every program that is written in this awful fashion, except SpyBot S&D, which performs an internal hacking check when it loads. For this reason I no longer use Spybot S&D, and I recommend that others not use it as well...when it comes to anti-virus and anti-spyware programs, I refuse to use or recommend one written so poorly.
  9. I'm using a circa-1990 keyboard from an IBM PS/2 Model 70. Young 'uns don't know how great these old and durable "clickety-clack" keyboards are! As for drivers, the generic 101-key PS/2 keyboard driver was installed and it works just fine. Since the keyboard obviously doesn't have a Windows key, I used the following registry hack to give it one: Windows Registry Editor Version 5.00 ;Map Scroll Lock key to Windows key (IBM PS/2 Keyboard) [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout] "Scancode Map"=hex:00,00,00,00,00,00,00,00,02,00,00,00,5B,E0,46,00,00,00,00,00
  10. I just noticed that I forgot an important step in the registry hack I suggested... It's been edited to add the important step of rebooting.
  11. Add the subkey cmd.exe to the following registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options You don't need anything else except the cmd.exe subkey. NOTE: You must reboot your system before this registry change will work!
  12. If you have disabled WFP, replace your current SFCFILES.DLL with the one in the .ZIP file in the attachment. If you have not disabled WFP, replace the SFCFILES.DLL in the DLLCACHE directory with the one in the .ZIP file in the attachment, and then go to the command prompt and rename the SFCFILES.DLL in the SYSTEM32 directory to SFCFILES.OLD. WFP will then replace SFCFILES.DLL with your copy in the DLLCACHE directory. In either case, reboot your system, and the directories you listed can be permanently deleted. Please note that this "hack" will disable WFP if you previously had it enabled, and SFC /SCANNOW will not work because there will no longer be any files to scan. SFCFILES.ZIP
  13. Nice list! A few comments... Workstation can be disabled if the system is not connected to a network. Windows Image Acquisition can be disabled if you're using devices which came with their own software to download images. In addition to checking digital signing of drivers, Cryptographic Services is the part of Windows File Protection that automatically replaces protected files when you attempt to delete or rename them. For that reason alone I keep the service disabled! There is no need to have Logical Disk Manager or Windows Installer set to Automatic. If set to manual, Windows will start the services when they are needed, and stop them when they are no longer needed. Disabling Windows Management Instrumentation WILL NOT break your system!!! I've been running without it for years...the only thing I notice is that my hard disk is quiet most of the time because it's not collecting useless (to me) performance data and writing them to countless logs!
  14. Sounds like you're running DOS (CMD.EXE) in full-screen mode. If you're accessing DOS through a shortcut, right-click on the shortcut, select properties, click the Options tab, and make sure the Display Option is set to Window and not Full Screen. mhc
  15. I'm sure there's a better way to do it, but you can create zero-length files using the DEBUG program. To automate the process you'll first need to create a file (we'll call it TEST.DBG) containing two lines, as follows: w q The first line will tell DEBUG to write a file, the second will end DEBUG. You can now use the TEST.DBG file to create a zero-length file. Here's an example: DEBUG ZEROLEN.TXT <TEST.DBG The above command will create a zero-length file of the name ZEROLEN.TXT. A possible limitation is that DEBUG is a DOS program and only understands 8-dot-3 names for files and directories. You can use this method to change the size of any file to zero bytes, but the TEST.DBG file would be six lines: rbx 0 rcx 0 w q The above is limited to files whose original size was 512K or smaller. It also will not work on .EXE files, or on those which cannot be modified due to lack of permission or read-only status. mhc