Enter your Keyword, Search here,

Windows Tips - Limit the hard disk space available for users

You can set quota limits to restrict the amount of hard disk space available for users to store files on your computer. Limiting the amount of disk space for users is useful when you have multiple users set up on your computer and limited hard disk space.

For example, you may want to prevent your children from filling up space on the hard disk with music and video files.

You must be logged on to Windows as a computer administrator to limit hard disk space for users. In addition, your hard disk must use the NTFS file system. Most new computers use the NTFS file system.

The quota limit you set for users must be at least 2 MB. If you set a user’s quota limit below 2 MB, the user may not be able to log on to Windows. You can set a quota limit for new users that you add to your computer. You cannot set a quota limit for users that are already set up on your computer.
  • Click Windows Start Menu
  • Select My Computer to view the contents of your computer
  • Right-click the hard disk you want to limit the available space on
  • Select Properties
  • Select Quota tab
  • Click Enable Quota Management by Checking Check box
Adding Warning!!
Set the warning level an adequate amount below the quota limit, so each user has sufficient notice before they run out of disk space. You should set the warning level to about 80 percent of the quota limit.
For example, if you limit the amount of disk space available to each user to 10 GB, you should set the warning level to about 8 GB, so a warning message will appear when the amount of used hard disk space for a user reaches 8 GB.

Manual Removal of W32/Buzus.BDHC Trojan » rundm.exe

Manual Removal of W32/Buzus.BDHC Trojan » rundm.exe, oute.exe
W32/Buzus.BDHC is a trojan. The trojan will infect Windows systems.

This Trojan Copies its files to %Windows, Windows Root folder as hidden files or active non-hidden files.
This trojan information updated on August 12, 2009.
Other names of W32/Buzus.BDHC Trojan:
This trojan is also known as Trojan.Win32.Buzus.bdhc, Trojan.Agent.ATV.

Damage Level : Medium/High
Distribution Level:
Low/Medium
Download Registry, Taskmanager and Folder Options Repair Tool
W32/Buzus.BDHC Trojan Manual Removal Instructions
Recommend Removal from Safe Mode:

How to Start in Safe mode:
Restart your Computer, Press F8 Repeatedly, when your Screen turns on, Select Safe mode, press enter.

The Infected Files Can be Seen in these folders and names also Running in Tasks
End the Following Active Process Before Removal
  • [ Kill the Process, Use Killbox if your Access Denied ]
Download W32/Buzus.BDHC Trojan Known File Removal Tool
[In Windows Vista Run As Administrator, After Execution System Will Restart]
  • %Windows\rundm.exe
  • %Root of Windows Installed drive\oute.exe
    [ No Exact Information about Files, search above related files in Program files Folder ]
    If you have any of these files in running process from task manger, end the process before removal.
    Note: if task manager is disabled, Download the following file, Click to Download - Enable Registry.reg
    [ Right Click - Save Target As/Linked Content As ]
    Open it with Regedit.exe [%system32\regedit.exe], then it Confirms Add to registry Yes or No, Confirm Yes, then click Ok.

W32/Buzus.BDHC Trojan Entries Manual Removal From Registry
Click Start, Run,Type regedit,Click OK.
Note: If the registry editor fails to open the threat may have modified the registry to prevent access to the registry editor.
  • Download this UnHookExec.inf, [ Right Click - Save Target As/Linked Content As ] 
  • Save it to your Windows desktop.
  • Do not run it at this time, download it only.
  • After booting into the Safe Mode or VGA Mode
  • Right-click the UnHookExec.inf file and click Install. [This is a small file. It does not display any notice or boxes when you run it.]
  • Or Download Regfile to enable Registry editor
  • Download Registry Enabler [ Right click - Save Target As ]
  • Open it with Registry editor
W32/Buzus.BDHC Trojan modifies registry at the following locations to ensure its automatic execution at every system Startup:
Delete The Entries

HKEY_USERS\S-1-5-21-XXXXXXXXXX-XXXXXXXXXX-XXXXXXXXX-XXXX\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
Delete file entries from right side

Search Registry For W32/Buzus.BDHC Trojan File Names listed above to remove completely,
Edit Menu - Find, enter Keyword and remove all value that find in search.


Exit the Registry Editor,
Restart your Computer.

Recommended Removal Tools:
Killbox (Freeware)

Manual Removal of W32/Magania.BPKA Trojan » olhrwef.exe

Manual Removal of W32/Magania.BPKA Trojan » olhrwef.exe, nmdfgds0.dll, nmdfgds1.dll, cdaudio.sys, p0ijj.bat, oiwj.exe
W32/Magania.BPKA is a trojan. The trojan will infect Windows systems.
The following Internet downloads were started (the retrieved bits are saved into the local file):
URL to be downloaded and
Filename for the downloaded bits
http://456229.net/mg/am1.rar - %Temp%\am1.rar   
http://sderfg.com/1m/c.rar - %System%\c.exe

This Trojan Copies its files to %Windows\system32, %Windows\system32\dllcache, Windows Root folder as hidden files or active non-hidden files.
This trojan information updated on August 11, 2009.
Other names of W32/Magania.BPKA Trojan:
This trojan is also known as Worm/AutoRun.GV, Trojan-GameThief.Win32.Magania.bpka, Trojan.Magania.RBT.

Damage Level : Medium/High
Distribution Level:
Low/Medium
Download Registry, Taskmanager and Folder Options Repair Tool
W32/Magania.BPKA Trojan Manual Removal Instructions
Recommend Removal from Safe Mode:

How to Start in Safe mode:
Restart your Computer, Press F8 Repeatedly, when your Screen turns on, Select Safe mode, press enter.

The Infected Files Can be Seen in these folders and names also Running in Tasks
End the Following Active Process Before Removal
  • [ Kill the Process, Use Killbox if your Access Denied ]
Download W32/Magania.BPKA Trojan Known File Removal Tool
[In Windows Vista Run As Administrator, After Execution System Will Restart]
  • %Windows\system32\olhrwef.exe [282.62 KB]
  • %Windows\system32\nmdfgds0.dll
  • %Windows\system32\nmdfgds1.dll
  • %Windows\system32\dllcache\cdaudio.sys
  • %Root of Windows Installed drive\p0ijj.bat
  • %Root of Windows Installed drive\oiwj.exe 
  • %Root of Windows Installed drive\autorun.inf
    [ No Exact Information about Files, search above related files in Program files Folder ]
    If you have any of these files in running process from task manger, end the process before removal.
    Note: if task manager is disabled, Download the following file, Click to Download - Enable Registry.reg
    [ Right Click - Save Target As/Linked Content As ]
    Open it with Regedit.exe [%system32\regedit.exe], then it Confirms Add to registry Yes or No, Confirm Yes, then click Ok.

W32/Magania.BPKA Trojan Entries Manual Removal From Registry
Click Start, Run,Type regedit,Click OK.
Note: If the registry editor fails to open the threat may have modified the registry to prevent access to the registry editor.
  • Download this UnHookExec.inf, [ Right Click - Save Target As/Linked Content As ] 
  • Save it to your Windows desktop.
  • Do not run it at this time, download it only.
  • After booting into the Safe Mode or VGA Mode
  • Right-click the UnHookExec.inf file and click Install. [This is a small file. It does not display any notice or boxes when you run it.]
  • Or Download Regfile to enable Registry editor
  • Download Registry Enabler [ Right click - Save Target As ]
  • Open it with Registry editor
W32/Magania.BPKA Trojan modifies registry at the following locations to ensure its automatic execution at every system Startup:
Delete The Entries

HKEY_USERS\S-1-5-21-XXXXXXXXXX-XXXXXXXXXX-XXXXXXXXX-XXXX\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL / CheckedValue = 0x00000000
Delete file entries from right side

Search Registry For W32/Magania.BPKA Trojan File Names listed above to remove completely,
Edit Menu - Find, enter Keyword and remove all value that find in search.


Exit the Registry Editor,
Restart your Computer.

Recommended Removal Tools:
Killbox (Freeware)

Manual Removal of W32/FraudLoad.WNHS Trojan » PC_Antispyware2010.exe

Manual Removal of W32/FraudLoad.WNHS Trojan » PC_Antispyware2010.exe, wisdstr.exe, Uninstall.exe, AVEngn.dll
W32/FraudLoad.WNHS is a trojan. The trojan will infect Windows systems.

This Trojan Copies its files to  Windows\system32, Program Files\PC_Antispyware2010 folder as hidden files or active non-hidden files.
This trojan information updated on August 10, 2009.
Other names of W32/FraudLoad.WNHS Trojan:
This trojan is also known as Trojan-Downloader.Win32.FraudLoad.wnhs, Injector.FH, TrojanDownloader:Win32/Renos.

Damage Level : Medium/High
Distribution Level:
Low/Medium
Download Registry, Taskmanager and Folder Options Repair Tool
W32/FraudLoad.WNHS Trojan Manual Removal Instructions
Recommend Removal from Safe Mode:

How to Start in Safe mode:
Restart your Computer, Press F8 Repeatedly, when your Screen turns on, Select Safe mode, press enter.

The Infected Files Can be Seen in these folders and names also Running in Tasks
End the Following Active Process Before Removal
  • [ Kill the Process, Use Killbox if your Access Denied ]
Download W32/FraudLoad.WNHS Trojan Known File Removal Tool
[In Windows Vista Run As Administrator, After Execution System Will Restart]
  • %Windows\system32\wisdstr.exe
  • %Program Files\PC_Antispyware2010\PC_Antispyware2010.exe
  • %Program Files\PC_Antispyware2010\Uninstall.exe
  • %Program Files\PC_Antispyware2010\AVEngn.dll
    [ No Exact Information about Files, search above related files in Program files Folder ]
    If you have any of these files in running process from task manger, end the process before removal.
    Note: if task manager is disabled, Download the following file, Click to Download - Enable Registry.reg
    [ Right Click - Save Target As/Linked Content As ]
    Open it with Regedit.exe [%system32\regedit.exe], then it Confirms Add to registry Yes or No, Confirm Yes, then click Ok.

W32/FraudLoad.WNHS Trojan Entries Manual Removal From Registry
Click Start, Run,Type regedit,Click OK.
Note: If the registry editor fails to open the threat may have modified the registry to prevent access to the registry editor.
  • Download this UnHookExec.inf, [ Right Click - Save Target As/Linked Content As ] 
  • Save it to your Windows desktop.
  • Do not run it at this time, download it only.
  • After booting into the Safe Mode or VGA Mode
  • Right-click the UnHookExec.inf file and click Install. [This is a small file. It does not display any notice or boxes when you run it.]
  • Or Download Regfile to enable Registry editor
  • Download Registry Enabler [ Right click - Save Target As ]
  • Open it with Registry editor
W32/FraudLoad.WNHS Trojan modifies registry at the following locations to ensure its automatic execution at every system Startup:
Delete The Entries

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_USERS\S-1-5-21-XXXXXXXXXX-XXXXXXXXXX-XXXXXXXXX-XXXX\Software\Microsoft\Windows\ShellNoRoam\MUICache
Delete file entries from right side

Search Registry For W32/FraudLoad.WNHS Trojan File Names listed above to remove completely,
Edit Menu - Find, enter Keyword and remove all value that find in search.


Exit the Registry Editor,
Restart your Computer.

Recommended Removal Tools:
Killbox (Freeware)

Manual Removal of W32/Agent.CKAD Trojan » ctfmon_eo.exe

Manual Removal of W32/Agent.CKAD Trojan » ctfmon_eo.exe, xa5196000.exe, wr35032.dll
W32/Agent.CKAD is a trojan. The trojan will infect Windows systems.

This Trojan Copies its files to  Windows\system32 folder as hidden files or active non-hidden files.
This trojan information updated on August 8, 2009.
Other names of W32/Agent.CKAD Trojan:
This trojan is also known as Trojan.Win32.Agent.ckad, trojan:win32/chepdu.p.

Damage Level : Medium/High
Distribution Level:
Low/Medium
Download Registry, Taskmanager and Folder Options Repair Tool
W32/Agent.CKAD Trojan Manual Removal Instructions
Recommend Removal from Safe Mode:

How to Start in Safe mode:
Restart your Computer, Press F8 Repeatedly, when your Screen turns on, Select Safe mode, press enter.

The Infected Files Can be Seen in these folders and names also Running in Tasks
End the Following Active Process Before Removal
  • [ Kill the Process, Use Killbox if your Access Denied ]
Download W32/Agent.CKAD Trojan Known File Removal Tool
[In Windows Vista Run As Administrator, After Execution System Will Restart]
  • %Windows\system32\ctfmon_eo.exe
  • %Windows\system32\xa5196000.exe
  • %Windows\system32\wr35032.dll
    [ No Exact Information about Files, search above related files in Program files Folder ]
    If you have any of these files in running process from task manger, end the process before removal.
    Note: if task manager is disabled, Download the following file, Click to Download - Enable Registry.reg
    [ Right Click - Save Target As/Linked Content As ]
    Open it with Regedit.exe [%system32\regedit.exe], then it Confirms Add to registry Yes or No, Confirm Yes, then click Ok.

W32/Agent.CKAD Trojan Entries Manual Removal From Registry
Click Start, Run,Type regedit,Click OK.
Note: If the registry editor fails to open the threat may have modified the registry to prevent access to the registry editor.
  • Download this UnHookExec.inf, [ Right Click - Save Target As/Linked Content As ] 
  • Save it to your Windows desktop.
  • Do not run it at this time, download it only.
  • After booting into the Safe Mode or VGA Mode
  • Right-click the UnHookExec.inf file and click Install. [This is a small file. It does not display any notice or boxes when you run it.]
  • Or Download Regfile to enable Registry editor
  • Download Registry Enabler [ Right click - Save Target As ]
  • Open it with Registry editor
W32/Agent.CKAD Trojan modifies registry at the following locations to ensure its automatic execution at every system Startup:
Delete The Entries

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options
HKEY_LOCAL_MACHINE\Software\Classes
Delete file entries from right side

Search Registry For W32/Agent.CKAD Trojan File Names listed above to remove completely,
Edit Menu - Find, enter Keyword and remove all value that find in search.


Exit the Registry Editor,
Restart your Computer.

Recommended Removal Tools:
Killbox (Freeware)

Manual Removal of W32/Agent.ATMG Trojan » 98840616.exe»18830624.exe

Manual Removal of W32/Agent.ATMG Trojan » 98840616.exe, 18830624.exe
W32/FraudLoad.EZV is a trojan. The trojan will infect Windows systems.

This Trojan Copies its files to  Documents and Settings\All Users\Application Data folder with sub-folder as hidden files or active non-hidden files.
This trojan information updated on August 7, 2009.
Other names of W32/Agent.ATMG Trojan:
This trojan is also known as Trojan:Win32/Winwebsec, Trojan-Dropper.Win32.Agent.atmg.

Damage Level : Medium/High
Distribution Level:
Low/Medium
Download Registry, Taskmanager and Folder Options Repair Tool
W32/Agent.ATMG Trojan Manual Removal Instructions
Recommend Removal from Safe Mode:

How to Start in Safe mode:
Restart your Computer, Press F8 Repeatedly, when your Screen turns on, Select Safe mode, press enter.

The Infected Files Can be Seen in these folders and names also Running in Tasks
End the Following Active Process Before Removal
  • [ Kill the Process, Use Killbox if your Access Denied ]
Download W32/Agent.ATMG Trojan Known File Removal Tool
[In Windows Vista Run As Administrator, After Execution System Will Restart]
  • %Documents and Settings\All Users\Application Data\98840616\98840616.exe
  • %Documents and Settings\All Users\Application Data\18830624\18830624.exe
    [ No Exact Information about Files, search above related files in Program files Folder ]
    If you have any of these files in running process from task manger, end the process before removal.
    Note: if task manager is disabled, Download the following file, Click to Download - Enable Registry.reg
    [ Right Click - Save Target As/Linked Content As ]
    Open it with Regedit.exe [%system32\regedit.exe], then it Confirms Add to registry Yes or No, Confirm Yes, then click Ok.

W32/Agent.ATMG Trojan Entries Manual Removal From Registry
Click Start, Run,Type regedit,Click OK.
Note: If the registry editor fails to open the threat may have modified the registry to prevent access to the registry editor.
  • Download this UnHookExec.inf, [ Right Click - Save Target As/Linked Content As ] 
  • Save it to your Windows desktop.
  • Do not run it at this time, download it only.
  • After booting into the Safe Mode or VGA Mode
  • Right-click the UnHookExec.inf file and click Install. [This is a small file. It does not display any notice or boxes when you run it.]
  • Or Download Regfile to enable Registry editor
  • Download Registry Enabler [ Right click - Save Target As ]
  • Open it with Registry editor
W32/Agent.ATMG Trojan modifies registry at the following locations to ensure its automatic execution at every system Startup:
Delete The Entries

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Delete file entries from right side

Search Registry For W32/Agent.ATMG Trojan File Names listed above to remove completely,
Edit Menu - Find, enter Keyword and remove all value that find in search.


Exit the Registry Editor,
Restart your Computer.

Recommended Removal Tools:
Killbox (Freeware)

Windows Tips - Prevent other people from accessing your computer


You can increase the security of your computer by creating a password, called a startup key, to start your computer. You use the Syskey (Sam Lock Tool) program to create the password that you will need to enter to start the computer.

You must be logged on to Windows as a computer administrator to use the Syskey program. Creating a password to start your computer makes it virtually impossible for an unauthorized user to log onto your computer.

In addition, since the Welcome screen that prompts you to enter your Windows account password cannot be displayed without first entering the startup password, a hacker will not have the opportunity to try to determine your user account password.

After you create a startup password, a dialog box will appear when you start your computer, asking you to enter the password. Passwords are case sensitive. When you enter your password, you will need to enter the characters in the password precisely.

For example, if your password is abcdef123456, you cannot enter ABCDEF123456 to start your computer.

HOW TO INSTALL SYSKEY:
  • Click Start, Select Run
  • Type syskey to start the Syskey program, press Enter or Ok button
  • Click Update to add additional security to your computer
  • The Startup Key dialog box appears
  • Click Password Startup (Radio button Selection) to create a password you will enter to start your computer
  • Enter Password and Confirm Password
    Note: For the best security, you should choose a password that is at least twelve characters long and contains a combination of letters, numbers and symbols.
The Success dialog box appears, stating that the Account Database Startup Key was changed.
When you start your computer, a Windows Startup Password dialog box will appear, asking you to enter your password. To start your computer, type the password you created and then press the Enter key.

Note: Make sure you do not forget the password required to start your computer. You may want to write the password on a piece of paper and store the paper in a secure location. If you forget the password, you will not be able to start your computer.

How To Remove Installed Password:
If you no longer want to enter a password to start your computer, you can stop Windows from requesting a password.
Again Open syskey and click update, When Password Dialog appears Click the “System Generated Password” option and then choose the “Store Startup Key Locally” option.
Click OK to confirm your changes.
In the dialog box that appears, type the password you enter to start your computer and then press the Enter key twice.
Ultimate Links PC Tips

More Posts that you may be interested...