Enter your Keyword, Search here,

List of rundll32.dll shortcut commands for Windows Vista

Here is a list of RUNDLL32 shortcuts that can be used in Windows Vista.

I use them all the time to create shortcut icons for my users or when creating batch files.

Add/Remove Programs
RunDll32.exe shell32.dll,Control_RunDLL appwiz.cpl,,0

Content Advisor
RunDll32.exe msrating.dll,RatingSetupUI

Control Panel
RunDll32.exe shell32.dll,Control_RunDLL

Delete Temporary Internet Files:
RunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 8

Delete Cookies:
RunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 2

Delete History:
RunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 1

Delete Form Data:
RunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 16

Delete Passwords:
RunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 32

Delete All:
RunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 255

Delete All + files and settings stored by Add-ons:
RunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 4351

Date and Time Properties
RunDll32.exe shell32.dll,Control_RunDLL timedate.cpl

Display Settings
RunDll32.exe shell32.dll,Control_RunDLL access.cpl,,3

Device Manager
RunDll32.exe devmgr.dll DeviceManager_Execute

Folder Options - General
RunDll32.exe shell32.dll,Options_RunDLL 0

Folder Options - File Types
RunDll32.exe shell32.dll,Control_Options 2

Folder Options - Search
RunDll32.exe shell32.dll,Options_RunDLL 2

Folder Options - View
RunDll32.exe shell32.dll,Options_RunDLL 7

Forgotten Password Wizard
RunDll32.exe keymgr.dll,PRShowSaveWizardExW

Hibernate
RunDll32.exe powrprof.dll,SetSuspendState

Internet Explorer’s Internet Properties dialog box.
Rundll32 Shell32.dll,ConBring up trol_RunDLL Inetcpl.cpl,,6

Keyboard Properties
RunDll32.exe shell32.dll,Control_RunDLL main.cpl @1

Lock Screen
RunDll32.exe user32.dll,LockWorkStation

Mouse Button - Swap left button to function as right
Rundll32 User32.dll,SwapMouseButton

Mouse Properties Dialog Box
Rundll32 Shell32.dll,Control_RunDLL main.cpl @0,0

Map Network Drive Wizard
Rundll32 Shell32.dll,SHHelpShortcuts_RunDLL Connect

Network Connections
RunDll32.exe shell32.dll,Control_RunDLL ncpa.cpl

Organize IE Favourites
Rundll32.exe shdocvw.dll,DoOrganizeFavDlg

Open With Dialog Box
Rundll32 Shell32.dll,OpenAs_RunDLL Any_File-name.ext

Printer User Interface
Rundll32 Printui.dll,PrintUIEntry /?

Printer Management Folder.
Rundll32 Shell32.dll,SHHelpShortcuts_RunDLL PrintersFolder

Power Options
RunDll32.exe Shell32.dll,Control_RunDLL powercfg.cpl

Process Idle Tasks
rundll32.exe advapi32.dll,ProcessIdleTasks

Regional and Language Options
Rundll32 Shell32.dll,Control_RunDLL Intl.cpl,,0

Stored Usernames and Passwords
RunDll32.exe keymgr.dll,KRShowKeyMgr

Safely Remove Hardware Dialog Box
Rundll32 Shell32.dll,Control_RunDLL HotPlug.dll

Sound Properties Dialog Box
Rundll32 Shell32.dll,Control_RunDLL Mmsys.cpl,,0

System Properties Box
Rundll32 Shell32.dll,Control_RunDLL Sysdm.cpl,,3

System Properties - Advanced
RunDll32.exe shell32.dll,Control_RunDLL sysdm.cpl,,4

System Properties: Automatic Updates
RunDll32.exe shell32.dll,Control_RunDLL sysdm.cpl,,5

Taskbar Properties
RunDll32.exe shell32.dll,Options_RunDLL 1

User Accounts
RunDll32.exe shell32.dll,Control_RunDLL nusrmgr.cpl

Unplug/Eject Hardware
RunDll32.exe shell32.dll,Control_RunDLL hotplug.dll

Windows Security Center
RunDll32.exe shell32.dll,Control_RunDLL wscui.cpl

Windows - About
RunDll32.exe SHELL32.DLL,ShellAboutW

Windows Fonts Installation Folder
Rundll32 Shell32.dll,SHHelpShortcuts_RunDLL FontsFolder

Windows Firewall
RunDll32.exe shell32.dll,Control_RunDLL firewall.cpl

Wireless Network Setup
RunDll32.exe shell32.dll,Control_RunDLL NetSetup.cpl,@0,WNSW

Related:

Mobile phone and Problems


The mobile phone (also called a wireless phone or cellular phone) is a short-range, portable electronic device used for mobile voice or data communication over a network of specialized base stations known as cell sites. In addition to the standard voice function of a telephone, current mobile phones may support many additional services, and accessories, such as SMS for text messaging, email, packet switching for access to the Internet, gaming, bluetooth, infrared, camera with video recorder and MMS for sending and receiving photos and video. Most current mobile phones connect to a cellular network of base stations (cell sites), which is in turn interconnected to the public switched telephone network (PSTN) (the exception is satellite phones).

The first commercial mobile phone service was launched in Japan by NTT in 1978. By November 2007, the total number of mobile phone subscriptions in the world had reached 3.3 billion, or half of the human population (although some users have multiple subscriptions, or inactive subscriptions), which also makes the mobile phone the most widely spread technology and the most common gadget in the world.

Mobile phones send and receive radio signals with any number of cell site base stations fitted with microwave antennas. These sites are usually mounted on a tower, pole or building, located throughout populated areas, then connected to a cabled communication network and switching system. The phones have a low-power transceiver that transmits voice and data to the nearest cell sites, normally not more than 8 to 13 km (approximately 5 to 8 miles) away.

Handsets

Nokia is currently the world's largest manufacturer of mobile phones, with a global device market share of approximately 40% in 2008. Other major mobile phone manufacturers (in order of market share) include Samsung (14%), Motorola (14%), Sony Ericsson (9%) and LG (7%).These manufacturers account for over 80% of all mobile phones sold and produce phones for sale in most countries.

Other manufacturers include Apple Inc., Audiovox (now UTStarcom), Benefon, BenQ-Siemens, CECT, High Tech Computer Corporation (HTC), Fujitsu, Kyocera, Mitsubishi Electric, NEC, Neonode, Panasonic (Matsushita Electric), Pantech Curitel, Philips, Research In Motion, Sagem, Sanyo, Sharp, Siemens, Sierra Wireless, SK Teletech, Sonim Technologies, T&A Alcatel, Huawei, Trium and Toshiba. There are also specialist communication systems related to (but distinct from) mobile phones.

Mobile phones often have features beyond sending text messages and making voice calls, including Internet browsing, music (MP3) playback, memo recording, personal organizer functions, e-mail, instant messaging, built-in cameras and camcorders, ringtones, games, radio, Push-to-Talk (PTT), infrared and Bluetooth connectivity, call registers, ability to watch streaming video or download video for later viewing, video calling and serve as a wireless modem for a PC, and soon will also serve as a console of sorts to online games and other high quality games. The total value of mobile data services exceeds the value of paid services on the Internet, and was worth 31 billion dollars in 2006 (source Informa).The largest categories of mobile services are music, picture downloads, videogaming, adult entertainment, gambling, video/TV.

View Detailed
Mobile phone radiation and health

The enormous increase in the use of wireless mobile telephony throughout the world (as of August 2005, there were more than 2 billion users worldwide). Mobile phones use electromagnetic radiation in the microwave range, and some believe this may be harmful to human health. These concerns have induced a large body of research (both epidemiological and experimental, in non-human animals as well as in humans). Concerns about effects on health have also been raised regarding other digital wireless systems, such as data communication networks.

The World Health Organization, based upon the consensus view of the scientific and medical communities, states that health effects (e.g. headaches) are unlikely to be caused by cellular phones or their base stations and expects to make recommendations about mobile phones in October 2009.

However, some national radiation advisory authorities, including those of Austria, France, Germany, and Sweden recommended to their citizens measures to minimize exposure. Examples of the recommendations are:

Use hands-free to decrease the radiation to the head.
Keep the mobile phone away from the body.
Do not telephone in a car without an external antenna.

However, the use of "hands-free" was not recommended by the British Consumers' Association in a statement in November 2000 as they believed that exposure was increased.However, measurements for the (then) UK Department of Trade and Industry and others for the French l’Agence française de sécurité sanitaire environnementale showed substantial reductions. In 2005 Professor Lawrie Challis and others said clipping a ferrite bead onto hands-free kits stops the radio waves travelling up the wire and into the head.

Health hazards of handsets

Part of the radio waves emitted by a mobile telephone handset are absorbed by the human head. The radio waves emitted by a GSM handset, can have a peak power of 2 watts, and a US analogue phone had a maximum transmit power of 3.6 watts. Other digital mobile technologies, such as CDMA and TDMA, use lower output power, typically below 1 watt. The maximum power output from a mobile phone is regulated by the mobile phone standard it is following and by the regulatory agencies in each country. In most systems the cellphone and the base station check reception quality and signal strength and the power level is increased or decreased automatically, within a certain span, to accommodate for different situations such as inside or outside of buildings and vehicles.

Thermal effects

Microscope photographs of lenses incubated in organ culture conditions for 12 days. Right frame shows Control lens with no damage. Bottom frame demonstrates the effect of microwave radiation on bovine lens sutures for a total exposure of 192 cycles (1.1 GHz, 2.22 mW). Each cycle lasts 50 min followed by 10 min pause. In the absence of microwave radiation, the bubbles are generated by temperature increase to 39.5 °C during 4 h; see left frame. Credit: IsraCast Technology News

One well-understood effect of microwave radiation is dielectric heating, in which any dielectric material (such as living tissue) is heated by rotations of polar molecules induced by the electromagnetic field. In the case of a person using a cell phone, most of the heating effect will occur at the surface of the head, causing its temperature to increase by a fraction of a degree. In this case, the level of temperature increase is an order of magnitude less than that obtained during the exposure of the head to direct sunlight. The brain's blood circulation is capable of disposing of excess heat by increasing local blood flow. However, the cornea of the eye does not have this temperature regulation mechanism and exposure of 2-3 hours' duration has been reported to produce cataracts in rabbits' eyes at SAR values from 100-140W/kg, which produced lenticular temperatures of 41°C.Premature cataracts have not been linked with cell phone use, possibly because of the lower power output of mobile phones.

Non-thermal effects

The communications protocols used by mobile phones often result in low-frequency pulsing of the carrier signal. Whether these modulations have biological significance has been subject to debate.

Also Causes, Blood Brain Barrier effects, Electromagnetic hypersensitivity, Genotoxic effects, Mobile phones and cancer, Sleep and EEG effects

View Detailed

What is Spyware and Malware ?

Spyware is computer software that is installed surreptitiously on a personal computer to intercept or take partial control over the user's interaction with the computer, without the user's informed consent.Malicious software goes by many names: Spyware, worms, viruses, Trojans, Adware, keystroke loggers, pests, and more. "Spyware" often is used to mean all malicious software other than viruses. I prefer the term "malware" as it's a bit more descriptive. This page is for removing any type of malware.

Unlike viruses and worms, Spyware does not usually self-replicate. Like many recent viruses; however, Spyware by design exploits infected computers for commercial gain.

Typical tactics furthering this goal include delivery of unsolicited pop-up advertisements; theft of personal information (including financial information such as credit card numbers, other account Details); monitoring of Web-browsing activity for marketing purposes; or routing of HTTP requests to advertising sites.

Spyware can also come bundled with Shareware or other Downloadable software, as well as music CDs. The user downloads a program and installs it, and the installer additionally installs the Spyware. Although the desirable software itself may do not harm, the bundled Spyware does. In some cases, Spyware authors have paid shareware authors to bundle Spyware with their software. In other cases, Spyware authors have repackaged desirable freeware with installers that add Spyware.

A third way of distributing Spyware involves tricking users by manipulating security features designed to prevent unwanted installations. Internet Explorer prevents websites from initiating an unwanted download. Instead, it requires a user action, such as clicking on a link. However, links can prove deceptive: for instance, a pop-up ad may appear like a standard Windows dialog box. The box contains a message such as "Would you like to optimize your Internet access?" with links which look like buttons reading Yes and No. No matter which "button" the user presses, a download starts, placing the spyware on the user's system. Later versions of Internet Explorer offer fewer avenues for this attack.

How Affects, Effects and behaviors

A Spyware program is rarely alone on a computer: an affected machine can rapidly be infected by many other components. Users frequently notice unwanted behavior and degradation of system performance. A spyware infestation can create significant unwanted CPU activity, disk usage, and network traffic, all of which slows the computer down. Stability issues, such as application or system-wide crashes, are also common. Spyware, which interferes with networking software commonly causes difficulty connecting to the Internet.

In some infections, the spyware is not even evident. Users assume in those situations that the issues relate to hardware, Windows installation problems, or a virus. Some owners of badly infected systems resort to contacting technical support experts, or even buying a new computer because the existing system "has become too slow". Badly infected systems may require a clean reinstallation of all their software in order to return to full functionality.

Many spyware programs display advertisements. Some programs simply display pop-up ads on a regular basis; for instance, one every several minutes, or one when the user opens a new browser window. Others display ads in response to specific sites that the user visits. Spyware operators present this feature as desirable to advertisers, who may buy ad placement in pop-ups displayed when the user visits a particular site. It is also one of the purposes for which spyware programs gather information on user behavior.

Many users complain about irritating or offensive advertisements as well. As with many banner ads, many spyware advertisements use animation or flickering banners which can be visually distracting and annoying to users. Pop-up ads for pornography often display indiscriminately. Links to these sites may be added to the browser window, history or search function. When children are the users, this could possibly violate anti-pornography laws in some jurisdictions.

Anti-spyware programs often report Web advertisers' HTTP cookies, the small text files that track browsing activity, as spyware. While they are not always inherently malicious, many users object to third parties using space on their personal computers for their business purposes, and many anti-spyware programs offer to remove them.

It is recommended that users DO NOT INSTALL any Freeware claiming to be anti-spyware unless it is verified to be legitimate. Some known offenders include:
AntiVirus Gold
ContraVirus
Errorsafe (AKA system doctor)
MacSweeper
PAL Spyware Remover
Pest Trap
PSGuard
SpywareStrike
Spyware Quake Spydawn
Spylocked
SpyShredder
Spy Sheriff
Spy Wiper
UltimateCleaner
WinAntiVirus Pro 2006
WinFixer
WorldAntiSpy

How To Remove Spyware

Spyware Removal
Magoo's Guide to Eliminating Spyware
Spyware Doctor

Secure Your Internet Browser

Related:

Mobile Tips and Tricks

Tips on Mobile Maintenance

Looking after your mobile helps to ensure it has a long and productive life. There are 8 easy maintenance tips to help you get the best out of your mobile phone. All of the points below should also apply to your battery, charger and any other accessories.

KEEP YOUR MOBILE:
1. Charged: Ensure your battery is fully charged, and then completely run it down before recharging. Recharging too early causes your battery to run out of power more quickly.

2. Secure: For security reasons, enable the PIN on your SIM Card and Phone-lock on your phone to avoid unauthorized used. These security checks will also be activated when the phone is power cycled. You can check with your carrier or the phone manual for the features and also for information on blocking your SIM card and phone IMEI number if the phone is stolen. For more information please see the Security Tips located on the AMTA Lost and Stolen website.

3. Protected: Make sure you use a keypad lock to lock your phone. Unplanned calls can cost a fortune and even though your phone may be in a safe place, such as in a bag, your phone will still get knocked around to a surprising degree. Rough treatment can damage electronic circuit boards so avoid dropping or unnecessarily shaking your phone.

4. Battery: Be safe with your batteries. Use only genuine batteries from your phone manufacturer and only buy from authorized dealers. Going for the cheap option of a counterfeit battery can be dangerous.

5. Clean: Don't use harsh detergents, cleaning solvents or harsh chemicals to clean your phone. Wipe only with a soft cloth.

6. Covered: a protective cover will help repel dust and dirt, and prevent scratches. Make sure the cover you choose is of good quality. Low quality covers with no air pockets can damage you phone by creating humidity inside the cover.

7. Storing your phone: Always store your phone in a dry place. Avoid rain, high humidity and liquids. All of these may contain minerals that could corrode the electronic circuits.

8. At the right temperature: To ensure a long life, keep your phone in a stable temperature. Avoid exposing your phone to liquid and/or exposing your phone to extreme temperature change from hot to cold and vice versa. This might create condensation and damage the phone.

Keep this in mind and run your Mobile to it's Maximum Life...

Related:

Mozilla Firefox Shortcuts Keys

Shortcut Keys - Action

CTRL+A - Selects the all items on active page

CTRL+B - Display the "Organize Bookmarks" dialog box

CTRL+D - Include the active page to your Bookmarks list

CTRL+F - Display the “Find” dialog box to search tex

CTRL+I - Display the Bookmarks pane

CTRL+H - Display the History sidebar of Mozilla Firefox

CTRL+N - Use to open new Mozilla Firefox page

CTRL+P - Use to print the active web page

CTRL+R - Use to reload the active web page

CTRL+T - Display a new Tab in active Firefox window

CTRL+U - View the source code of active web page

CTRL+W - Closes the active Mozilla Firefox window

(CTRL++) - Use to increase the font size of active page

(CTRL+ -) - Use to decrease the font size of active page

CTRL+Tab - Move to next Tab in Mozilla Firefox

ALT+Home - Use to open the home page of internet explorer

ALT+Left Arrow - Go to previous page of active page

ALT+Right Arrow - Go to next page of active page

ALT+B - Go to Mozilla Firefox Favorites Menu

ALT+D - Go to address bar of current Firefox page

ALT+E - Go to Mozilla Firefox Edit Menu

ALT+F - Go to Mozilla Firefox File Menu

ALT+S - Go to Mozilla Firefox History Menu

ALT+T - Go to Mozilla Firefox Tools Menu

ALT+V - Go to Mozilla Firefox View Menu

Tab - Move forward between all items on active web page

F5 - Refresh the active web page

F7 - F7 activate the cursor to move with keyboard

CTRL+SHIFT+DEL - Use to clear all Private Data history

CTRL+SHIFT+D - Use to Bookmarks all Firefox Tabs

F11 - Press F11 key to view any webpage in full-screen view and then again press for normal view.

Press Ctrl+Enter - Windows will automatically add both "www" and ".com". For example, if we type rahulmg.blogspot in an address bar and then press Ctrl+Enter, Browser will take us to the www.rahulmg.blogspot.com

Press Shift+Enter - Windows will automatically add both "www" and ".net"
Press Ctrl+Shift+Enter - Windows will automatically add both "www" and ".org"

Related:

Quick Format Vs Default Format

Formatting your Hard disk partitions. When you ready to format you partitions, you have two methods to format a partition, you can work with default formatting and other quick format method.

When you first time format your system partition, you should use default method. This is slow and low-level formatting but with this method you can remove all data from the partition as well as the hard disk is scanned for bad sectors. Here you can fix your system bad sectors.

If you select the quick format method, you can save time but you can remove only data from the partition and does not scan the disk for bad sectors. If you sure about your hard disk health then quick format should be fine to remove data with in short time.

Related:

More Posts that you may be interested...