Thursday, March 26, 2009

Windows XP Tricks & Tips for Stopping Unneeded Startup Services and Making XP boot faster

Stopping Unneeded Startup Services and Making XP boot faster !

Along with the core operating system and programs that Windows XP runs when it
starts, there is also a host of services involved. Many of these services are necessary
for Windows XP to operate correctly. However, many of them are for features in
Windows XP that you may not use at all. You can peruse the services and disable any
service that you do not want to run. The fewer services that run, the more quickly
Windows XP will boot.
To reduce the number of services that start on bootup, you can access two different
areas of Windows XP.
o The first is the System Configuration Utility. You can do that by entering the
command “msconfig” in the run menu.
Start Run “msconfig” (without quotes) Hit Enter
The Services tab shows you the services that start when the computer
boots. You can stop a service from starting by simply clearing the check box
next to the service and clicking OK.
o However, before you do so, there is another way to disable services that you
may prefer because the interface gives you more information about the service
in question.
Open Control Panel Administrative Tools Services or
Start Run “services.msc” Hit Enter

Take a quick look at common services you may want to live without:
Automatic Updates: This service enables Windows XP to check the Web
automatically for updates. If you don't want to use Automatic Updates, you can
disable the service.
Computer Browser: If your computer is not on a network, you don't need this service.
If you are on a network, leave it alone.
DHCP Client: If you are not on a network, you do not need this service. If you are on
a small workgroup, you can still increase boot time by configuring manual IP.
DNS Client: If you are not on a network, you do not need this service.
Error Reporting and Event Log: You don't have to use these services but they can be
very helpful, so I would leave them configured as automatic.
Fax: If you don't use your computer for fax services, you can disable this one.
Help and Support: Disable if you never use the Windows XP Help and Support
Center.
IMAPI CD-Burning COM: This service enables you to burn CDs on your computer.
If you never burn CDs, you can disable the service without any second thoughts.
Indexing Service: Your computer keeps an index of all the files. But if you rarely
search for files, the service is just a resource hog. You can stop it
Windows Firewall/Internet Connection Sharing: If you do not use these features, plz
disable.
Infrared Monitor: If you do not use infrared devices, you can disable this service.
Messenger: This service sends alert messages on a local area network (it is not the
same as Windows Messenger). If you are not on a network, you can disable this
service.
Print Spooler: If you do not do any printing from the computer, you can disable this
service. If you print, make sure you leave it as automatic.
Remote Registry: This service allows remote users to modify the Registry on your
computer. If you are not on a network, you can disable this service.
System Restore Service: This service allows you to use System Restore. If you have
turned off System Restore anyway, you do not need to turn off the service.
Themes: If you do not use themes, you can disable this service.
Windows Image Acquisition: If you do not use scanners or digital cameras, you can
disable.
Wireless Zero Configuration: If do not use wireless networking devices, you can
disable.

Famous Unsolved Codes and Ciphers

Beale Ciphers -
In 1885, a small pamphlet was published in Virginia containing a story and three encrypted messages. According to the pamphlet, around 1820 a man named Beale buried two wagons-full of treasure at a secret location in Bedford County, Virginia. He then left a small locked box with a local innkeeper, and left town, never to be seen again. The pamphlet went on to state that the innkeeper, after having not heard from Beale for many years, opened the box and discovered encrypted messages. Never able to read them, he eventually passed them along to a young friend shortly before the innkeeper's death in 1863. According to the pamphlet, the friend spent the next 20 years trying to decrypt the messages, solving only one which detailed the tons of gold, silver and jewels that were buried, along with a general location. The still unsolved messages supposedly give exact directions, and a list of who the treasure belongs to. According to the story, the friend finally decided to walk away from the quest, and publish everything they knew about the situation in the (anonymous) pamphlet, which was supposedly published by another friend of the innkeeper. There have been many exhaustive searches for the treasure, and much effort spent on decoding the other messages, without (confirmed) success. There are many claimed solutions, usually bannered in combination with a book that someone is trying to sell, but no one has ever been able to produce a duplicatable decryption method. There have also been some pretty compelling arguments that the entire original story was a hoax. There are several inconsistencies in the pamphlet's text, and even speculation that the story was a parable related to Masonic rituals

Voynich Manuscript -
At least 400 years old, this is a 232-page illuminated manuscript entirely written in a secret script. It is filled with copious drawings of unidentified plants, herbal recipes of some sort, astrological diagrams, and many small human figures in strange plumbing-like contraptions. The script is unlike anything else in existence, but is written in a confident style, seemingly by someone who was very comfortable with it. In 2004 there were some compelling arguments which described a technique that would seemingly prove that the manuscript was a hoax, but to date, none of the described techniques have been able to replicate a single section of the Manuscript, so speculations continue. More information about the hoax possibility is here and more information about the Manuscript can be found at voynich.net and crystalinks.com.

Dorabella Cipher -
In 1897, the well-known composer Edward Elgar (of "Pomp and Circumstance" fame) sent an encrypted message to a 23-year-old friend, Miss Dora Penny. To this day, it still has not been solved.

Zodiac Killer ciphers - From 1966 to 1974, the Zodiac serial killer sent more than 20 written communications to police officials. Most of these messages have been cracked, but there are still some that remain unsolved. The killer was never caught.

Kryptos -
In 1990, a sculpture was installed at CIA Headquarters in Langley Virginia, as a challenge to the employees at the Agency. Its thousands of characters contain encrypted messages, of which three have been solved, but there is still a fourth section at the bottom consisting of 97 or 98 characters which remains uncracked. The sculpture was created and encoded by Washington DC sculptor Jim Sanborn, using encryption systems designed by the Chairman of the CIA's Cryptographic Center, Ed Scheidt.

D'Agapeyeff -
Alexander d'Agapeyeff wrote an elementary book on cryptography in 1939, entitled "Codes and Ciphers." In the first edition, he included a challenge cipher. Nobody's solved it, and he embarrassedly admitted later that he no longer knew how he'd encrypted it. It was left out of the second and later editions. Some think it was botched, and many think it could still be solved despite that. It has lots of "phenomena" noted, but nothing close to a crack.

Linear A -
In 1900, a large number of clay tablets dating back to 1800 BC were discovered in Crete. The tablets appear to use two different types of scripts, which were named "Linear A" and "Linear B." Linear B was finally deciphered in the 1950s. Linear A remains unsolved.

The Phaistos Disk -
A circular clay tablet about six inches across, discovered in Crete in the early 1900s, and believed to date back to 1800 BC. With an "alphabet" of 45 different symbols, 241 signs are stamped into both sides in spiral patterns. There has been much speculation about its meaning, with wildly variant claimed solutions so far. It's also been suggested that the disk might turn out to be a Rosetta Stone to help decipher Linear A, since it was discovered near a fragment of a Linear A tablet.

Chaocipher - In 1918, J.F. Byrne created a machine-based cryptographic system. In 1953, he used it to create a code challenge as part of his autobiography "Silent Years". There are at least three people who know how the system works: his son, and two editors of Cryptologia who were let in on the secret in 1990. There's a lot of known plaintext available, as well as some hints, but no break yet. The mechanism used to generate it fits in a cigar box.

Chinese "Gold Bar" ciphers -
In 1933, seven gold bars were allegedly issued to a General Wang in Shanghai, China. These gold bars appear to represent metal certificates related to a bank deposit with a U.S. Bank. The gold bars themselves have pictures, Chinese writing, some form of script writing, and cryptograms in latin letters.

RSA Challenges -
There are a number of modern computer-based challenges, including several factoring challenges from RSA Labs that have implications for the strength of public-key systems, and some equivalently difficult elliptic curve challenges, also relating to public-key cracking (check here for Bruce Schneier's high-math analysis of the RSA/Elliptic Curve debate). As of this writing, the most recently-cracked RSA Challenge was in November 2005, when RSA-640, a 193-digit number, was successfully factored (which won a $20,000 prize). There are several more on the list, with prizes up to $200,000, which have not yet been cracked. Many fly-by-night snake-oil crypto companies also put out challenges that are arguably famous because the media sometimes pick up the challenge uncritically, but they are usually not worth mentioning on this list.

Indus Script -
The Indus Valley civilization flourished around 2600 to 1800 BC on the Indian sub-continent, leaving behind thousands of objects inscribed with a pictographic script that seems to have been composed of about 400 signs. A great deal of work has been done on analyzing the messages that are available, but to this date the script still has not been deciphered.

Richard Feynman's Challenge Ciphers -
In 1987, someone posted a message to an internet cryptology list, saying that Caltech Physics Professor Richard Feynman was given three samples of code by a fellow scientist at Los Alamos. Only one of the three was ever solved.
Unsolved World War II Systems - Though the Enigma encryption system was cracked, and the Bletchley Park crypto project is quite famous, there are still some scattered unsolved Enigma messages from World War II. There are also various other WWII encryption systems that were never solved, but they have not been included on this list because the focus is more on specific famous messages or entire well-known systems that have not yet been cracked.

Rongorongo Script of Easter Island -
In 1868, Europeans first reported seeing wooden tablets on the incredibly remote Easter Island in the south Pacific. The tablets were covered with an unknown hieroglyphic script. Only 20 or so tablets are thought to be in existence, with little progress in determining what it is that they say.

Other Uncracked Ancient Ciphers -
There are several other ancient writing systems that are still undeciphered, such as the 13,000 Etruscan inscriptions, Proto-Elamite, Meroitic, and various other obscure glyphs. More information about some of these can be found in a review of Andrew Robinson's book Lost Languages