If you don't like the new Windows 7 taskbar, this is how you can make it look like the one in Windows Vista. Don't forget to comment and subscribe to our channel. Visit www.hackyourwindows.com for more videos and full details.
Windows 7 has more themes than it shows and this is how you can enable them all! Four new beautiful themes are available: South Africa, Great Britain, Australia and Canada. If you like this tutorial check out www.hackyourwindows.com for more! Don't forget to comment and subscribe to our channel!
This is a introduction to the Aero Shake feature in Windows 7. We also give you the option to disable it if you don't like it. Visit hackyourwindows.com for more videos. Don't forget to comment and subscribe to our videos.
If you like a clean Desktop and you're using some alternative way to start your programs (Start Menu, Windows Sidebar, other sidebar-like software) then this is the option for you.
If you want to check if your computer is online from the web, this is a safe way to do it, instead of disabling the firewall. Although opening ports can't be safe for your computer, the ping port (ICMP ECHO REQUEST) is not dangerous for your system.
This is a very dangerous option, only to be used by advanced users. More info on our website. If you like this video don't forget to bookmark, comment, subscribe or visit our website for more! Thanks!
In Windows Vista you can hear the startup sound even if you disable the Windows Sounds. In earlier beta version of Windows Vista this sound was mandatory, from marketing point of view.... More info on the website. Don't forget to subscribe to our channel, bookmark us or comment.
In this video tutorial you will learn how to get rid of that boring Live Search engine from Internet Explorer and unleash the real power of Google or any provider you want. As example in this video I added Google, weather.com and wikipedia.org, but you can add a wide variety of providers, even custom ones!
Usually an attack is made by trying to guess the users password. It can be a dictionary attack, when the hacker tries to guess the password from a list of common words, or a brute force attack, when random letters are send until the passwords match. Either way, this is how you can lock the account after a specified number of unsuccessful logon attempts, so that the attacker can't force his way into your computer. If you like this video don't forget to comment, subscribe to our channel and bookmark! Thanks!
This is a way to add some performance to you hard drive. If you like this video don't forget to comment, subscribe to our channel or bookmark us! Thanks!