Skip to main content

Turn ON Your PC Very Fast As Less Then In 10 Seconds.


I am going to tell you something very cool, interesting and very useful.

  Alright so you wanna know how to Turn ON your PC very fast as less then in 10 seconds.

  Here’s what you have to do to Turn your PC ON in 10 seconds.

  Y ou have to do these following steps:-

  1.Click on the START button then,

  2.Go to RUN.

  3.type Regedit and hit Enter.

  4.this will open Registery Editor

  5.Now look for the below key

  HKEY_LOACAL_MECHINE-SYSTEM-CurrentControlSet-Control

  ContentIndex

  6.Now there find the Key Called “Startup Delay” Double Click On It.

  7.Now where its Base Click Decimal.

  8.Now its Default Value Is 4800000(75300:hexadecimal)

  9.Change The Value To 40000 and click on OK

  10.Now close the Registery Editor.

  11.Now Y ou have Done it and Restart your PC and check the speed.

  =======DO IT ON YOUR RISK!!==========
 _________________________

Comments

Popular posts from this blog

Top 20 Tools for hacking 2018

What are Hacking Tools? Hacking Tools are computer programs and scripts that help you find and exploit weaknesses in computer systems, web applications, servers and networks. There is a variety of such tools available on the market. Some of them are open source while others are commercial solution. In this list we highlight the top 20 tools for Ethical Hacking of web applications, servers and networks 1)  Netsparker Netsparker  is an easy to use web application security scanner that can automatically find SQL Injection, XSS and other vulnerabilities in your web applications and web services. It is available as on-premises and SAAS solution. Features Dead accurate vulnerability detection with the unique Proof-Based Scanning Technology. Minimal configuration required. Scanner automatically detects URL rewrite rules, custom 404 error pages. REST API for seamless integration with the SDLC, bug tracking systems etc. Fully scalable s...

crypthography and network security

Cryptography, which translates as "secret writing," refers to the science of concealing the meaning of data so only specified parties understand a transmission's contents. Cryptography has existed for thousands of years; for most of history, however, the users of cryptography were associated with a government or organized group and were working to conceal secret messages from enemies. These days, millions upon millions of secure, encoded transmissions happen online each day -- and cryptographic standards are used to protect banking data, health information, and much more. Without cryptography, e-commerce as we know it would be impossible. Since online security threats evolve so quickly, there are dozens of different schools of thought on how best to use encryption to enhance network security -- not just for governments, but for businesses and end users, too. Classical Encryption Techniques Classical Encryption Techniques Explained at Purdue University (PDF) : These...

12 ways to hack-proof your smartphone

A s we’ve recently seen from  leaked CIA documents , no one is immune to hacking attacks. Here’s how to protect yourself against them, whether they come from opportunist thieves or state-sponsored spies. 1. Keep up to date – and don’t open up holes yourself When it comes to protecting yourself against hackers, step one is always to install software updates as soon as they become available: that’s as true on smartphones as it is on computers. Yes, updating can be a tiresome and intrusive process, and it sometimes brings annoying changes to the interface that you’re used to. All the same, a huge proportion of successful hacks exploit vulnerabilities that have already been patched; exposing yourself unnecessarily is just daft. I’d also strongly advise against using unofficial tools to “root” your phone (known as “jailbreaking” on iOS), unless you know exactly what you’re doing. On a rooted phone, technical safeguards can be defeated, allowing apps to perform all sort...