Microsoft Error 1000 Win7 Explorer 6.1

 

If you experience an problem with Windows explorer, crashing (restarting) and “checking for solutions” frequently, please check your event log (start menu – Control Panel ->All Control Panel Items ->Administrative Tools ->Event viewer) and check your system for details:

Error 1000

Faulting application name: explorer.exe, version: 6.1.7601.17567, time stamp: 0x4d6727a7
Faulting module name: DivXMFSource.dll, version: 1.0.0.72, time stamp: 0x4cffcf66
Exception code: 0xc0000005
Fault offset: 0x0009b8a1
Faulting process id: 0x1120
Faulting application start time: 0x01cde647c43c2960
Faulting application path: C:Windowsexplorer.exe
Faulting module path: C:Program FilesDivXDivX Plus Media Foundation ComponentsDivXMFSource.dll
Report Id: 05f99130-523b-11e2-ab4f-000000540400

Temporary Solution – Uninstall Divx

As you can see, the problem can easily be rectified, but only if you know what your doing. The conflicting / manifested dll or other file, could be malware or linked to a bigger program.

p.s this error had to be placed here as the Microsoft site has changed to only promote bug reports on, evaluating software only 🙂

IP Routing Explained

IP Routing

We now take up the question of finding the host that datagram’s go to based on the IP address. Different parts of the address are handled in different ways; it is your job to set up the files that indicate how to treat each part.

IP Networks

When you write a letter to someone, you usually put a complete address on the envelope specifying the country, state, and Zip Code. After you put it in the mailbox, the post office will deliver it to its destination: it will be sent to the country indicated, where the national service will dispatch it to the proper state and region. The advantage of this hierarchical scheme is obvious: wherever you post the letter, the local postmaster knows roughly which direction to forward the letter, but the postmaster doesn’t care which way the letter will travel once it reaches its country of destination.

IP networks are structured similarly. The whole Internet consists of a number of proper networks, called autonomous systems. Each system performs routing between its member hosts internally so that the task of delivering a datagram is reduced to finding a path to the destination host’s network. As soon as the datagram is handed to any host on that particular network, further processing is done exclusively by the network itself.

Subnetworks

This structure is reflected by splitting IP addresses into a host and network part, as explained previously. By default, the destination network is derived from the network part of the IP address. Thus, hosts with identical IP network numbers should be found within the same network.[1]

It makes sense to offer a similar scheme inside the network, too, since it may consist of a collection of hundreds of smaller networks, with the smallest units being physical networks like Ethernets. Therefore, IP allows you to subdivide an IP network into several subnets.

A subnet takes responsibility for delivering datagram’s to a certain range of IP addresses. It is an extension of the concept of splitting bit fields, as in the A, B, and C classes. However, the network part is now extended to include some bits from the host part. The number of bits that are interpreted as the subnet number is given by the so-called subnet mask, or netmask. This is a 32-bit number too, which specifies the bit mask for the network part of the IP address.

The campus network of Groucho Marx University is an example of such a network. It has a class B network number of 149.76.0.0, and its netmask is therefore 255.255.0.0.

Internally, GMU’s campus network consists of several smaller networks, such various departments’ LANs. So the range of IP addresses is broken up into 254 subnets, 149.76.1.0 through 149.76.254.0. For example, the department of Theoretical Physics has been assigned 149.76.12.0. The campus backbone is a network in its own right, and is given 149.76.1.0. These subnets share the same IP network number, while the third octet is used to distinguish between them. They will thus use a subnet mask of 255.255.255.0.

Figure 2-1 shows how 149.76.12.4, the address of quark, is interpreted differently when the address is taken as an ordinary class B network and when used with subnetting.

Figure 2-1. Subnetting a class B network

It is worth noting that subnetting (the technique of generating subnets) is only an internal division of the network. Subnets are generated by the network owner (or the administrators). Frequently, subnets are created to reflect existing boundaries, be they physical (between two Ethernets), administrative (between two departments), or geographical (between two locations), and authority over each subnet is delegated to some contact person. However, this structure affects only the network’s internal behaviour, and is completely invisible to the outside world.

Gateways

Subnetting is not only a benefit to the organization; it is frequently a natural consequence of hardware boundaries. The viewpoint of a host on a given physical network, such as an Ethernet, is a very limited one: it can only talk to the host of the network it is on. All other hosts can be accessed only through special-purpose machines called gateways. A gateway is a host that is connected to two or more physical networks simultaneously and is configured to switch packets between them.

Figure 2-2 shows part of the network topology at Groucho Marx University (GMU). Hosts that are on two subnets at the same time are shown with both addresses.

Figure 2-2. A part of the net topology at Groucho Marx University

Different physical networks have to belong to different IP networks for IP to be able to recognize if a host is on a local network. For example, the network number 149.76.4.0 is reserved for hosts on the mathematics LAN. When sending a datagram to quark, the network software on erdos immediately sees from the IP address 149.76.12.4 that the destination host is on a different physical network, and therefore can be reached only through a gateway (sophus by default).

sophus itself is connected to two distinct subnets: the Mathematics department and the campus backbone. It accesses each through a different interface, eth0 and fddi0, respectively. Now, what IP address do we assign it? Should we give it one on subnet 149.76.1.0, or on 149.76.4.0?

The answer is: “both.” sophus has been assigned the address 149.76.1.1 for use on the 149.76.1.0 network and address 149.76.4.1 for use on the 149.76.4.0 network. A gateway must be assigned one IP address for each network it belongs to. These addresses—along with the corresponding netmask—are tied to the interface through which the subnet is accessed. Thus, the interface and address mapping for sophus would look like this:

Interface
Address
Netmask

eth0
149.76.4.1
255.255.255.0

fddi0
149.76.1.1
255.255.255.0

lo
127.0.0.1
255.0.0.0

The last entry describes the loopback interface lo, which we talked about earlier.

Generally, you can ignore the subtle difference between attaching an address to a host or its interface. For hosts that are on one network only, like erdos, you would generally refer to the host as having this-and-that IP address, although strictly speaking, it’s the Ethernet interface that has this IP address. The distinction is really important only when you refer to a gateway.

The Routing Table

We now focus our attention on how IP chooses a gateway to use to deliver a datagram to a remote network.

We have seen that erdos, when given a datagram for quark, checks the destination address and finds that it is not on the local network. erdos therefore sends the datagram to the default gateway sophus, which is now faced with the same task. sophus recognizes that quark is not on any of the networks it is connected to directly, so it has to find yet another gateway to forward it through. The correct choice would be niels, the gateway to the Physics department. sophus thus needs information to associate a destination network with a suitable gateway.

IP uses a table for this task that associates networks with the gateways by which they may be reached. A catch-all entry (the default route) must generally be supplied too; this is the gateway associated with network 0.0.0.0. All destination addresses match this route, since none of the 32 bits are required to match, and therefore packets to an unknown network are sent through the default route. On sophus, the table might look like this:

Network
Netmask
Gateway
Interface

149.76.1.0
255.255.255.0

fddi0

149.76.2.0
255.255.255.0
149.76.1.2
fddi0

149.76.3.0
255.255.255.0
149.76.1.3
fddi0

149.76.4.0
255.255.255.0

eth0

149.76.5.0
255.255.255.0
149.76.1.5
fddi0




0.0.0.0
0.0.0.0
149.76.1.2
fddi0

If you need to use a route to a network that sophus is directly connected to, you don’t need a gateway; the gateway column here contains a hyphen.

The process for identifying whether a particular destination address matches a route is a mathematical operation. The process is quite simple, but it requires an understanding of binary arithmetic and logic: A route matches a destination if the network address logically ANDed with the netmask precisely equals the destination address logically ANDed with the netmask.

Translation: a route matches if the number of bits of the network address specified by the netmask (starting from the left-most bit, the high order bit of byte one of the address) match that same number of bits in the destination address.

When the IP implementation is searching for the best route to a destination, it may find a number of routing entries that match the target address. For example, we know that the default route matches every destination, but datagram’s destined for locally attached networks will match their local route, too. How does IP know which route to use? It is here that the netmask plays an important role. While both routes match the destination, one of the routes has a larger netmask than the other. We previously mentioned that the netmask was used to break up our address space into smaller networks. The larger a netmask is, the more specifically a target address is matched; when routing datagram’s, we should always choose the route that has the largest netmask. The default route has a netmask of zero bits, and in the configuration presented above, the locally attached networks have a 24-bit netmask. If a datagram matches a locally attached network, it will be routed to the appropriate device in preference to following the default route because the local network route matches with a greater number of bits. The only datagram’s that will be routed via the default route are those that don’t match any other route.

You can build routing tables by a variety of means. For small LANs, it is usually most efficient to construct them by hand and feed them to IP using the route command at boot time. For larger networks, they are built and adjusted at runtime by routing daemons; these daemons run on central hosts of the network and exchange routing information to compute “optimal” routes between the member networks.

Depending on the size of the network, you’ll need to use different routing protocols. For routing inside autonomous systems (such as the Groucho Marx campus), the internal routing protocols are used. The most prominent one of these is the Routing Information Protocol (RIP), which is implemented by the BSD routed daemon. For routing between autonomous systems, external routing protocols like External Gateway Protocol (EGP) or Border Gateway Protocol (BGP) have to be used; these protocols, including RIP, have been implemented in the University of Cornell’s gated daemon.

Metric Values

We depend on dynamic routing to choose the best route to a destination host or network based on the number of hops. Hops are the gateways a datagram has to pass before reaching a host or network. The shorter a route is, the better RIP rates it. Very long routes with 16 or more hops are regarded as unusable and are discarded.

RIP manages routing information internal to your local network, but you have to run gated on all hosts. At boot time, gated checks for all active network interfaces. If there is more than one active interface (not counting the loopback interface), it assumes the host is switching packets between several networks and will actively exchange and broadcast routing information. Otherwise, it will only passively receive RIP updates and update the local routing table.

When broadcasting information from the local routing table, gated computes the length of the route from the so-called metric value associated with the routing table entry. This metric value is set by the system administrator when configuring the route, and should reflect the actual route cost.[2] Therefore, the metric of a route to a subnet that the host is directly connected to should always be zero, while a route going through two gateways should have a metric of two. You don’t have to bother with metrics if you don’t use RIP or gated.

Notes

[1]

Autonomous systems are slightly more general. They may comprise more than one IP network.

[2]

The cost of a route can be thought of, in a simple case, as the number of hops required to reach the destination. Proper calculation of route costs can be a fine art in complex network designs.

Windows 7 installation

Hi a lot of people seem to be having problems installing windows7, there are many ways to complete this;

fresh install

Network

3 party (usb, ext HDD) etc

Local pre install

and

Upgrade

The latter seems to be what I would suggest to the public and most end-users, yes this was the least favourable option in the overall Microsoft Operating Systems but proven to be the most stable. You get the updates to the install files and keep your existing drivers, which you can update later, for example your Graphics driver. Many users and professionals are reporting driver problems with the RC with regarding the Fresh install option and network install, because the DVD image (which you should burn with ISO Burn, Nero, or something similar) has to provide the generic drivers for your system, if there is an issues with the DVD then the setup will not complete, also the downloaded image supplied from Microsoft will not always automatically create the partitions needed for the install so you would get an error code like “0x80070570” indicating that you do not have enuff space to place Windows 7. so you can see if you are not sure or want some reliability in your new installation use the upgrade option in the Windows 7 install and have fun.

http://www.microsoft.com/windows/windows-7/download.aspx

http://www.microsoft.com/windows/windows-vista/get/upgrade-advisor.aspx

Windows 7 v’s Vista v’s XP

Hey there fellas, I have some results on Windows 7!! Thanks to people like Nicholas Wilkinson and others for dropping me a message, I’ve built some information up for you, I hope you enjoy it.

How does Windows 7 beta 1 compare to Vista and XP in terms of performance? That’s a question that’s been hitting my inbox regularly over the past few weeks. Let’s see if we can’t answer it!

Important note: Before I go any further I feel I need to make a point, and make it clear. The build I’m testing of Windows 7 (build 6.1.7000.0.081212-1400) is a beta build, and as a rule beta builds are usually more geared towards stability than performance. That said, the performance of this build should give us a clue as to how the OS is coming along.

Rather than publish a series of benchmark results for the three operating systems (something which Microsoft frowns upon for beta builds, not to mention the fact that the final numbers only really matter for the release candidate and RTM builds), I’ve decided to put Windows 7, Vista and XP head-to-head in a series of real-world tests to find out which OS comes out top.

The tests

There are 23 tests in all, most of which are self explanatory:

  1. Install OS – Time it takes to install the OS
  2. Boot up – Average boot time to usable desktop
  3. Shut down – Average shut down time
  4. Move 100MB files – Move 100MB of JPEG files from one hard drive to another
  5. Move 2.5GB files – Move 2.5GB of mixed size files (ranging from 1MB to 100MB) from one hard drive to another
  6. Network transfer 100MB files – Move 100MB of JPEG files from test machine to NAS device
  7. Network transfer 2.5GB files – Move 2.5GB of mixed size files (ranging from 1MB to 100MB) from test machine to NAS device
  8. Move 100MB files under load – Move 100MB of JPEG files from one hard drive to another while ripping DVD to .ISO file
  9. Move 2.5GB files under load – Move 2.5GB of mixed size files (ranging from 1MB to 100MB) from one hard drive to another while ripping DVD to .ISO file
  10. Network transfer 100MB files under load – Move 100MB of JPEG files from test machine to NAS device while ripping DVD to .ISO file
  11. Network transfer 2.5GB files under load – Move 2.5GB of mixed size files (ranging from 1MB to 100MB) from test machine to NAS device while ripping DVD to .ISO file
  12. Compress 100MB files – Using built-in ZIP compression
  13. Compress 1GB files – Using built-in ZIP compression
  14. Extract 100MB files – Using built-in ZIP compression
  15. Extract 1GB files – Using built-in ZIP compression
  16. Install Office 2007 – Ultimate version, from DVD
  17. Open 10 page Word doc – Text only
  18. Open 100 page Word doc – Text and images only
  19. Open simple Excel doc – Basic formatting
  20. Open complex Excel doc – Including formula and charts
  21. Burn DVD – Win 7 beta 1 .ISO to disc using CDBurnerXP
  22. Open 10 page PDF – Text only, using latest Adobe Reader 8
  23. Open 100 page PDF – Text and images, using latest Adobe Reader 8

These series of tests will pitch Windows 7 build 7000 32-bit against Windows Vista SP1 32-bit and Windows XP SP3 32-bit. The scoring for each of the tests is simple. The winning OS scores 1, the runner up 2 and the loser scores a 3. The scores are added up and the OS with the lowest score at the end wins.

The test systems

I’ve used two desktop systems as the test machines:

  • An AMD Phenom 9700 2.4GHz system fitted with an ATI Radeon 3850 and 4GB of RAM
  • An Intel Pentium Dual Core E2200 2.2GHz fitted with an NVIDIA GeForce 8400 GS and 1GB of RAM

The results

Here are the results of the tests for the two systems:

Conclusion

The bottom line is that the more I use Windows 7 the more I like it. Sure, we’re looking at a beta build here and not the final code, so things could change between now and release (although realistically final code ends up being faster than beta code). Also I still have some nagging issues relating to the interface, and some concerns that the UAC changes will break applications and other code, especially installers, but overall Windows 7 beta 1 is a robust, solid bit of code.

Sure, Windows 7 is not XP, and never will be (thankfully). And if you’re put off by things such as activation and DRM, then Windows isn’t the OS for you (good news is there are others to choose from). But if you’re looking for a solid OS then Windows 7 seems ready to deliver just that – a fast, reliable, relatively easy to use platform for your hardware and software.

Reinstall Ubuntu after Windows wipes it out!

If your install of Linux is a dual boot setup with windows you have run into this problem before.  You reinstall windows and suddenly you can no longer access your Linux partition or the Grub bootloader. You can always go through the entire install of Ubuntu again, or you can try to repair the bootload, but how do you repair the bootloader?

Well if you have the live CD for which ever distro you are using (that installed Grub) it is quite easy and can save you hours of reconfiguration as well as install time.
1. Find your Live CD and boot it up (set your BIOS to boot from CD first, or if your BIOS allows it you can select the boot device.
2. After the Live CD does its thing you will need to open a terminal screen and type in the command: sudo grub.  This command will bring you into the grub prompt

3. Type the following commands assuming sda0 is which ever partition you are using (hd0,0 would be first hard drive and first prompt, hd1,1 would be the second hard drive and second partition).

> root (hd0,0)
> setup (hd0)
> exit

4. Reboot the system and remember to remove your Live CD before your system reboots

5. At reboot you should now see the Grub boot loader along with all your previous setting.

If with the new setup you now see Ubuntu but no longer see a windows menu item follow the following steps.

If Ubuntu was installed before your Windows version there will be no information in the Grub configuration for your windows setup. To get windows setup in Grub you will need to do a bit more tweeking.

Boot into Ubuntu and run the following command:
sudo gedit /boot/grub/menu.lst

Inside this file you will see an example for a windows choice for when Grub runs.  *COPY* the example and remove the “#” from the beginning of each line

# title   Windows 95/98/NT/2000
# root   (hd0,0)
# makeactive
# chainloader   +1
Remember you will need to change the hd0,0 to which ever if your windows partition, it may take a few try’s, but if you were able to select the correct partition for Linux when resetting up Grub you should be able to figure out the correct partition for Windows.

Tip and Tricks to XP

Hello again. On regards to the last blog, if you find that a little to much then you can have a try at the tips that come a standard XP Pro and its registry, so here is one of two. however if you’ve got some ideas of your own feel free to post them. Please note that you should all ways back up your registry as well and looking into VMWare and also these tweaks do not need any 3rd party software in order to complete and I will give some long over due Linux tips next blog:

Automatic Administrator Login:
Well here’s the trick which you can use to prove that Windows XP is not at all secure as multi-user operating system. Hacking the system registry from any account having access to system registry puts you in to the administrator account.
REGEDIT 4
[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWinlogon]
"AutoAdminLogon"="1"

Menu Delays:

Another minor and easy tweak to remove any delay from menus sliding out. For this you will need to use regedit (open regedit by going to Start -> Run…, then typing ‘regedit’ and pressing enter). The key you need to change is located in HKEY_CURRENT_USERControl PanelDesktop. The actual key is called MenuShowDelay – all you have to do is change the value to 0. Remember, you will have to re-boot your computer for this tweak to take effect.

 

Automatically Kill Programs At Shutdown:

don’t you hate it when, while trying to shut down, you get message boxes telling you that a program is still running? Making it so that Windows automatically kills applications running is a snap. Simply navigate to the HKEY_CURRENT_USERControl PanelDesktop directory in the Registry, then alter the key AutoEndTasks to the value 1.

 

Shutdown Computers Over The Network.

To make this 1. Open Notepad, 2.Type Shutdown -s -m \xxx.xxx.xxx.xxx (IP Address)
3. Save To Desktop As (Anything).bat (DONT FORGET THE .BAT)
4.Double click on the icon and wait.
5. Now there is of course other ways of doing this, read the post on the front page,
you can also open CMD and type "Shutdown -i"

The XP Prefetcher

Windows XP has a service called the Prefetcher. It basically monitors the different programs that start during startup and helps them launch faster.
To find this tool browse to HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory ManagementPrefetchParameters
The important key is EnablePrefetcher. Default value for this is 3. You will want to try numbers between 1 and 6. 5 seems to work best for me but your mileage may vary.
[HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSessionManagerMemory ManagementPrefetchParameters]
"EnablePrefetcher"="5"

NLiteOS

Ger Day ALL

If you want to make your own Windows OS or ever thort about using an fully automated install then NLiteOS has the rite software for you. Nlite uses an fully customisation list of most tasks used in the all known famous Microsoft OPK’s! I recently became a Microsoft Partner and thort Way Hey, I’ve got the best way of deploying windows LEGALY! but to my disadvantage this was not the result I found, as I said the OPK’s has just the same tools as Nlite. so if you want to check it out for your-self you can here as these web addresses:

I have found that these have the beat advantages than most, I have created all know main stream Operating Systems available through these methods and integrated Office 07 into them, although the best Office integration method is  Microsoft configuration software supplied on the Office disk or BDD software. So if you want some advice on unattended installations then you can use the IM Messenger in my Events page link on this page or just leave me a comment. There are so many things you can do if you just put your mind to it, you might know you can customise you desktop before you install you OS or put your logo on the Billboard screens /  make your own web hosted pages to use in the setup / install process, create your own explorer or even make a ultimate Boot Disk with all your needed tools on it to stop any further mishaps from forming ether in your home or office.

User Accounts and Privileges

Okay so we all know admin is the big cheese of the computer well guess what you are
wrong SYSTEM is the most powerful and is the top of the food chain 😛
so I am going to teach you how become SYSTEM even with a limited account!!
so open up run type
*time* refers to current time on system you want the time to be about two minutes ahead than what it is right now so if time is 3:45 than type 3:47 😉
at *time* /interactive "cmd.exe"
hit enter run whatever
now wait until specified time and the system32 command prompt should pop up
now hit ctrl+alt+del bring up taskmanager and end the explorer.exe process
after you have ended explorer.exe
on the open cmd prompt type explorer.exe to restart explorer
don’t worry about all your settings disappearing it is because you are on the SYSTEM account !!!! have fun
**note this only works for users with abilities to run the at command
**courtesy of demo Dave at cracked productions check em out 😉
**disclaimer if you mess your PC up doing this then you need help!! 😛

Hide your IP

 

With proxy server u can hide your IP on the net. Which means while u r posting on a forum, sending a email, chatting with someone and whatnot, your real IP will not be revealed. Follow the steps to do the same

1. Go to http://www.proxy4free.com/page1.html and Copy any IP with high anonymity along with its port number.

2. Open Internet explorer > Tools > Internet Options > Connections Tab > Lan Settings > Check the box which says "Use a Proxy Server for your LAN……"

3. Paste the IP in the Address field and Port in the Port field
4. OK

5. Apply
6. OK

Now to verify if your proxy server is working or not Go to
http://www.whatismyipaddress.com/ and check your IP, if you are unble to open any sites, then your proxy server is dead. In that case choose another proxy from http://www.proxy4free.com/page1.html
Hope that was useful.

Default Vista for XP

 

Hey, have you ever wanted your XP to look more like vista with out installing a theme pack or a shell addon / extension? well you can, I’ve been working on my own type of explorer for a few days now and my god it get a bit boring but least you can say its worth it because you can import your default .BMP’s (bit maps) in to the DLL’s and don’t forget to compile. There is I simplified version shown here at AskVG.com click this link and you’ll find some inspiration to improve you system and here’s another one Icon list that will tell you more about theShell32 .DLL so that’s the best bet if if you windows to be a bit better with out giving in to Bill Gates HA HA or you can wait till I’ve finish this one! Also there’s BlackBox which isn’t a shell but a explorer and engine, that’s the best one for all platforms including mac, you can find it though Shell City, BlackBox is great and well worth having if you want to learn more about skinning. If you just want a bit of code for your project and some more projects to join in on then there’s more on CodeDump.org and SourceForge.net and I’ve made an easy way of finding what you want when your surfing the net for torrents, new film releases, codes, cracks, keygens, and games as well as much more and it’s called Hackers. I’m planing to put it on my home page just as soon as I get my forums sorted in order to host the second page, I would it with Google’s API but live spaces don’t support some of their features, well there the link to Hackers home page and I hope it help you guys find what ya looking for.

Later TC