Skip to main content

How to Change Processor Name Permanently

It is very easy to change your processor name permanently by creating a registry key and placing a shortcut to it in the windows start up folder. To do so, just follow the steps given below:-

Steps :-

1.  Open Notepad.

2.  Copy and paste the exact code given below:-

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0]"ProcessorNameString"="My Processor name 50000MHz"


To change the processor name, edit the part of the code given in blue. Also understand that \0 in the above code should only be present if Windows store your processor name at that location. Please open Registry Editor and navigate to the above mentioned keys to check whether or not to include the \0.

3.  Click on File Menu, click on Save As and select "All Types" in Save as Type option. Save the file as ProcessorNameChange.reg or *.reg.


4.  Create a new shortcut on your desktop. Enter regedit / S "Location of the .reg file" as the location of the item. For example, enter regedit /S "C:\Processor Name.reg" if your registry file is located in the root of C:\ drive.



Processor_Name

5.   Copy the created Shortcut file.

6.  Navigate to C:\Documents and Settings\All Users\Start Menu\Programs\Startup (in Windows XP) or toC:\Users\ User-Name\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup (in Windows 8, Windows 7 and Windows Vista. Also remember that AppData is a hidden folder.)  if C: is your System drive.

7.  Paste the copied file.

This registry file would now execute each time when Windows starts and the Processor Name String would be modified each time. So, even upon restarting your computer, you will see that the changed processor name is permanent.

Comments

Popular posts from this blog

How To Grab Someone's IP Address ?

In this tutorial I will you show you how to grab someone’s IP address using  PHP script.  This method can be used to grab someone Ip address on yahoo or Facebook  chat  or by sending mail to victim. So Lets get started. How To  Hack  Someone Ip Address ? 1. Copy the below codes into  Notepad  and save it as  Grab.php  (.php is must)  <?php $hostname = gethostbyaddr($_SERVER['REMOTE_ADDR']); $img_number = imagecreate(400,95); $backcolor = imagecolorallocate($img_number,10,102,153); $textcolor = imagecolorallocate($img_number,255,255,255); imagefill($img_number,0,0,$backcolor); $number0 = " This is Your IP/Proxy"; $number1 = " IP: $_SERVER[HTTP_X_FORWARDED_FOR]"; $number2 = " Host/Proxy: $hostname"; $number4 = " _________________________________"; Imagestring($img_number,10,5,5,$number0,$textcolor); Imagestring($img_number,10,5,25,$number1,$textcolor); Imagestring($img_number,10,5,45,$number2,$textcolor); Imagestring...

How to Trace Any IP Address

How to Trace the IP Address Back to the Source? In fact, tracing an IP address back to its location is a lot simpler than what many people imagine. There exists many online tools using which you can accomplish this job. One of my favorite site is  IP2Location.com . Just go to  http://www.ip2location.com/demo.aspx  and enter the IP address that you want to trace in the dialog box and click on “Find Location”‘. With just a click of a button you can find the following information for any given IP address: Country  in which the IP is located City  to which the IP address belongs to Latitude/Longitude  of the IP’s location Zip Code  of the region to which the IP belongs to Time Zone  associated with the IP Name of the ISP  to which the IP address belong to Internet Speed  of the computer associated with the IP Weather Station  associated with the region of the IP Domain name  associated with the I...

Windows Security

Security Architecture of Windows  There are three components of Windows Security:  LSA (Local Security Authority)  SAM (Security Account Manager)  SRM (Security Reference Monitor) LSA (Local Security Authority)  LSA is the Central Part of NT Security. It is also known as Security Subsystem. The Local Security Authority or LSA is a key component of the logon process in both Windows NT and Windows 2000. In Windows 2000, the LSA is responsible for validating users for both local and remote logons. The LSA also maintains the local security policy.  During the local logon to a machine, a person enters his name and password to the logon dialog. This information is passed to the LSA, which then calls the appropriate authentication package. The password is sent in a nonreversible secret key format using a one-way hash function. The LSA then queries the SAM database for the User’s account information. If the key provided matches the one in the SAM, the ...