Categories

Archives

By Mark Russinovich and Bryce Cogswell

Introduction

This utility, which has the most comprehensive knowledge of auto-starting locations of any startup monitor, shows you what programs are configured to run during system bootup or login, and shows you the entries in the order Windows processes them. These programs include ones in your startup folder, Run, RunOnce, and other Registry keys. You can configure Autoruns to show other locations, including Explorer shell extensions, toolbars, browser helper objects, Winlogon notifications, auto-start services, and much more. Autoruns goes way beyond the MSConfig utility bundled with Windows Me and XP.

Autoruns' Hide Signed Microsoft Entries option helps you to zoom in on third-party auto-starting images that have been added to your system and it has support for looking at the auto-starting images configured for other accounts configured on a system. Also included in the download package is a command-line equivalent that can output in CSV format, Autorunsc.

You'll probably be surprised at how many executables are launched automatically!

Screenshot

Autoruns


Usage

See the November 2004 issue of Windows IT Pro Magazine for Mark's article that covers advanced usage of Autoruns . If you have questions or problems, visit the Sysinternals Autoruns Forum.

Simply run Autoruns and it shows you the currently configured auto-start applications as well as the full list of Registry and file system locations available for auto-start configuration. Autostart locations displayed by Autoruns include logon entries, Explorer add-ons, Internet Explorer add-ons including Browser Helper Objects (BHOs), Appinit DLLs, image hijacks, boot execute images, Winlogon notification DLLs, Windows Services and Winsock Layered Service Providers. Switch tabs to view autostarts from different categories.

To view the properties of an executable configured to run automatically, select it and use the Properties menu item or toolbar button. If Process Explorer is running and there is an active process executing the selected executable then the Process Explorer menu item in the Entry menu will open the process properties dialog box for the process executing the selected image.

Navigate to the Registry or file system location displayed or the configuration of an auto-start item by selecting the item and using the Jump menu item or toolbar button.

To disable an auto-start entry uncheck its check box. To delete an auto-start configuration entry use the Delete menu item or toolbar button.

Select entries in the User menu to view auto-starting images for different user accounts.

More information on display options and additional information is available in the on-line help.

Autorunsc Usage

Autorunsc is the command-line version of Autoruns. Its usage syntax is:

Usage: autorunsc [-a] | [-c] [-b] [-d] [-e] [-g] [-h] [-i] [-l] [-m] [-n] [-p] [-r] [-s] [-v] [-w] [-x] [user]

-aShow all entries.
-bBoot execute.
-cPrint output as CSV.
-dAppinit DLLs.
-eExplorer addons.
-gSidebar gadgets (Vista and higher).
-hImage hijacks.
-iInternet Explorer addons.
-lLogon startups (this is the default).
-mHide signed Microsoft entries.
-nWinsock protocol and network providers.
-pPrinter monitor drivers.
-rLSA providers.
-sAutostart services and non-disabled drivers.
-tScheduled tasks.
-vVerify digital signatures.
-wWinlogon entries.
-x Print output as XML.
userSpecifies the name of the user account for which autorun items will be shown.



Download Autoruns and Autorunsc (565 KB)

By Mark Russinovich

Ever wondered which program has a particular file or directory open? Now you can find out. Process Explorer shows you information about which handles and DLLs processes have opened or loaded.

The Process Explorer display consists of two sub-windows. The top window always shows a list of the currently active processes, including the names of their owning accounts, whereas the information displayed in the bottom window depends on the mode that Process Explorer is in: if it is in handle mode you'll see the handles that the process selected in the top window has opened; if Process Explorer is in DLL mode you'll see the DLLs and memory-mapped files that the process has loaded. Process Explorer also has a powerful search capability that will quickly show you which processes have particular handles opened or DLLs loaded.

The unique capabilities of Process Explorer make it useful for tracking down DLL-version problems or handle leaks, and provide insight into the way Windows and applications work.



Download Process Explorer (1.6 MB)

Do you use windows network file sharing. If yes then here is a lightweight utility from windows that helps you to quickly over view the current network shares and their security settings.

Network share is the most vulnerable aspect of windows systems and a system can easily be compromised if the security settings of your network shares is not properly configured. The worst part is that windows does not provide any standard utility to over view network shares and their settings. Hence Microsoft recommends ShareEnum which gives a control over your network shares.


Download ShareEnum (94 KB)

Runs on:

  • Client: Windows XP and higher.
  • Server: Windows Server 2003 and higher.

Multiple desktops or virtual desktops is one utility that Microsoft never supplied with the default windows installation. But Microsoft provides a third party small utility software called Desktops that enables a windows user to have multiple desktops at once.

Microsoft Desktops helps to organize your applications over four alternate desktops. Now you can surf web on one, edit documents on second and watch movies or listen to songs on the third in a simple and easy way without any burden on the computer. Using Desktops you can configure your own hot keys for switching in between desktops or directly use the icon in system tray.

Unlike other third party software Desktops implements this functionality in a neat and simple way making it very lightweight and bug free. Though Desktops does not provide very advanced features like moving applications across desktops or deleting a desktop, it makes the multiple desktops functionality simple, safe and lightweight.




Red color is considered as the symbol for danger everywhere except in the world of windows. In windows world danger is attributed to the color blue. Blue is one of the most feared colors in windows world. In windows whenever some thing terribly goes wrong the first thing you will see is the blue screen infamously called as the "blue screen of death"(BSOD).

In fact this screen is so popular that people at Microsoft released a screen saver that mimics a BSOD(Blue Scren of Death) and simulates a reboot. It simulates the whole system crash and reboot process so perfectly that it leaves even the most experienced windows user in panic. So what are you waiting for, download this screen saver and install it on one of your friend or colleague PC and watch n enjoy while he panics for a moment.

Download link

Microsoft page for Installation/Use instructions
http://technet.microsoft.com/en-us/sysinternals/bb897558.aspx

BigString can be simply defined as "Control over your email". With its new 'SelfDestruct' email technology BigString brings the latest innovation in email world. BigString is the Erasable, Recallable, Non-Printable Email.

Big Brother is Watching
Every time that you send an email, copies are stored permanently on multiple email servers as well as the recipient's inbox and anyone they decide to send it to. Your emails can be stored and scanned in more places than you can imagine. Do you want people storing your email messages forever? Do you want something that you type today to be used against you tomorrow, next week, next month or even in the next decade?

Until now, everyone else has had control of the email that you have sent. BigString gives you back control of your email, acting like an automatic shredder for your email. You can self-destruct or change an email that's already been sent or read. Don't leave your messages sitting in peoples' inboxes forever. Get a free BigString email account to protect your privacy.

BigString takes the risk out of email
Now, with BigString, you can finally take the risk out of email and put an end to "sender regret." It is the world's first & only email service that thoroughly protects your safety and privacy.

BigString's exclusive, patent-pending technology enables you to prevent your personal or business information from lingering indefinitely in someone else's inbox. It also restricts private pictures or messages from being indiscriminately spread throughout cyberspace! Now your sensitive photos can't be posted to unseemly web sites or printed for circulation amongst total strangers.

BigString lets you have second thoughts
BigString shifts the control from the recipient to YOU the sender. BigString grants the luxury of second thoughts, the power to limit message viewings, and the choice to delay email transmission.

You can reword a message fired off in anger or haste or completely delete it! You can recall a botched résumé for revision or erase a tasteless joke. You can make a work of art or photograph print-proof. You can prevent a love letter from being forwarded. You can set an expiration date on an emailed price quote or business offer or you can simply pull back an email to eliminate typos.

BigString takes the danger out of clicking
BigString guarantees that clicking "send" will never again be an irreversible disaster. Now YOU decide the fate of your emails. You decide where they end up, who sees them and for how long. BigString emails can be destroyed, recalled or changed even after they've been opened! The freedom is yours, the options are yours, and you're the boss with BigString.

BigString is easy to use
BigString is as easy to use as any other email and there's nothing to download! Don't be resigned to the mercy of your recipient. You don't want your every action to be carved in stone because sometimes you just NEED to take it back!

Here are just a few of the many applications of BigString
Erasable, Recallable, Non-Printable Email.

Executives: Protect your business and safeguard your email. Now you never have to worry about sending the wrong attachment or completely forgetting it. Misspelled words, incorrect dates, or other typos can all be fixed even after your message has been sent. You can even "pull an email back" to delete expired price quotes, old business offers or dated legal material. BigString is your email insurance.

On-Line Daters: You don't want your personal information like pictures, phone numbers or intimate notes, circulated around the Internet! BigString prevents your pictures and messages from being printed or forwarded. You can set an expiration date for an email or self-destruct it at will. You can choose the number of times you'll allow a picture to be viewed before it disappears. BigString protects your privacy!

Artists and Photographers: Now with BigString you can confidently email proofs and samples without the slightest fear that they will be printed or saved for later use without your authorization. Use BigString to make your image non-savable and non-printable! Limit the number of times a client can view a piece before you have it self-destruct. You can even recall a sent email to delete an old price quote or alter a new one. You can also prevent it from being forwarded to other customers. BigString protects your rights of ownership!

Copywriters: Spelling or punctuation errors that can cost time, money, or embarrassment are now a thing of the past. With BigString, clicking "send" is no longer an action "carved in stone." Accidentally arranging paragraphs in the wrong order will no longer mean a lost account. With the technology of BigString you can recall that mistake-ridden copy and correct the errors even after your email has left the outbox. You can self-destruct what you sent all together and replace it with a fully revised version. Only you will know this switch has occurred! With BigString you can confidently send non-printable, non-savable sample copy. You no longer have to worry that it will be used without your knowledge. You're the boss with BigString.

Counter

Search

Recent Posts

Donate

Please Donate To My Blog

Amount

Currency

Recent Comments