Skip to main content

How to add Safe Mode to Windows Boot Menu

Add Safe Mode to Windows Boot Menu ! Windows XP is a best OS, but it also a truth that it’s security against virus or other malware activities is so poor. Some time you install any Hardware or Computer Software, this changes make windows corrupt and you can’t start Windows normally as you have started before this problem. So what can you do. Your answer will be “Format Windows and reinstall it. But if you have some extra computer knowledge then i think you can revert this problem by just starting your PC into Safe Mode. When in trouble on Windows, you need to boot the computer into the “Safe Mode”,  Where you have to boot your device and pounce on the "F8" key ... I will show a simple way to add the Safe Mode to the Windows boot menu, you can easily and simply select it while starting your computer and start your computer in Safe Mode without pressing F8.

\Add Safe Mode to Windows Boot Menu
1.   First right-click on My Com­puter then go to Prop­er­ties in the right click menu. A dialog box named “System Properties” will be open.
2.  Now in the dialog box click on Advanced Tab.
 3.  Click Setting under Startup and Recovery option.
4.  Click on Edit button.
5.  You will see the "boot.ini" window, just add the fol­low­ing to the end of the line.
It we'll look like this:

    [boot loader] timeout=30 default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS [operating systems] multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /fastdetect /NoExecute=OptIn


7.  After “OptIn” copy-paste this line :

multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Safe Mode"/safeboot:minimal/sos/bootlog

8.  Finally click File menu and Save command, and close file. (Don’t try to Save as) Restart your PC to check this tricks. if you have any problem after applying this trick, then just revert this file and save it.

You are done and Next time when you run the computer you we'll choose between two options:
Till now if you have any difficulty then don’t hesitate to comment your problem. I will give reply of your comments. see you later with new tricks…

Comments

Popular posts from this blog

Place Files Inside EXE and Execute them using Gamemaker

I am fond of creating games in Gamemaker and Mugen. However I found an interesting way to create executable files that may contain anything inside them (may be a whole cracked Program) and may act as extractors or copy protectors Tools required  GameMaker 7 or above Procedure  1) Download and Install Gamemaker and start a Game Project by going to File -> New.  2) Every game consists of a Room in which all objects shall act and interact with each other.So Create a new room by either clicking on the icon on Standard toolbar or by going to Resources Menu -> Create Room.Name it anything you want.In my case ROOM0  3)Every Game consists of Objects which are responsible for all interactions. So create a new object by either clicking on the icon on Standard toolbar or by going to Resources Menu -> Create Object.Name it anything you want.In my case VIRUS  4)Now create a new script (Press CTRL+ALT+C or Resources Menu -> Create Script),Name it SCRIPT0...

Basic Introduction To SQL Injection

SQl injection is a vulnerability that allows an attacker to influence the queries that are passed to the back-end database.It has been present since the time databases have been attached to the web applications.However, the main credit of bringing SQL injection into public notice goes to Rain Forest Puppy who in 1998 wrote an article on it and in 2000 he wrote another article describing how he hacked one of the popular website on the internet using SQL injection. Before understanding the how SQL injection attacks we need to understand the Simple Three Tier Architectureor a Four Tier Architecture.This will clear your basics and give you a rough idea of how database-driven web applications work. Three Tier Architecture In a simple three tier datbase-driven architecture the three layers that are used are:- Presentation Tier(Browsers) Logic Tier Storage Tier(Database) The three tier architecture follows a linear relationship i.e Presentation Tier connects to the Logic Tier and...

How to Hack a Twitter Account

Twitter is one of the topmost widely running social networking sites,Its alexa ranking is 14(As per now).So therefore it is largely becoming target of hackers,Many requests keep coming to me ,please tell us a way to Hack twitter accounts or How to hack twitter accounts,so therefore i today i have written a post on How to hack twitter accounts Well for this purpose i will tell you the most used method to hack twitter accounts i.e phishing How to hack twitter accounts - Phishing First of all download:   Twitter fake login page ( Latest Version ) Click Here To Download : NOTE : You will be asked to enter a password while extracting the Documents. Please Insert the password as : IHA Step 1 First extract the contents into a folder Step 2 Then edit login.php .(right click and then select edit) In that ,find (CTRL+F) ‘http://rafayhackingarticles.blogspot.com’ then change it to your destined URL but don’t forget ‘'. Now rename the script to pass....