IMRAN KHAN

IMRAN KHAN
IT CS

Tuesday, 29 December 2015

How to Convert FAT File System to NTFS File System

How to Convert FAT File System to NTFS File System

FAT फाइल सिस्टम को NTFS में बदलना
Step1:- Open CMD Prompt with Admin priviledge.

Step2:- Suppose you want to convert your E: Drive then type the following Command.

CONVERT  E: /FS:NTFS
 

Note:- Converting FAT32 into NTFS is easy and safe, but converting NTFS to FAT32 will wipe out all your data and programs on that specific partition.
But if you want to convert NTFS into FAT32 you can use EASUS PARTITION MANAGER
if you want this click here

How To Break Windows 7 Password Without Any Third Party Software/USB Media...

How To Break Windows 7 Password Without Any Third Party Software/USB Media...

विंडोज ७ का पासवर्ड कैसे तोड़े बिना किसी टूल्स के उपयोग से.… 

स्टेप १ :- सबसे पहले उस मशीन को रीस्टार्ट करेंगे जिसका पासवर्ड ब्रेक करना है।
स्टेप २ :- जब मशीन स्टार्टिंग विंडोज स्क्रीन पर पहुंचे तो तुरंत मशीन के पावर बटन को दबाएं जैसा की निचे के चित्र में दिखाया गया है.
फिर से मशीन को रीस्टार्ट करेंगे तो एक Launch Startup Repair ऑप्शन दिखाई देगा
Launch Startup Repair पर एंटर करने के बाद ऑपरेटिंग सिस्टम लोडिंग स्क्रीन आयेगा.
इस विंडो के बाद स्टार्टअप रिपेयर विंडो ओपन होगा।
स्टेप ३ :- यहाँ पर आप View Problems Details लिंक पर क्लिक करेंगे तो निचे एक और लिंक नोटपैड फाइल का आयेगा.
उस लिंक पर क्लिक करते ही नोटपैड ओपन हो जायेगा जिसके फाइल मेनू से आप ओपन कमांड से  Computer के ड्राइव पर जा सकते है.

स्टेप ४ :- यहाँ से आप  उस ड्राइव पर जायेंगे जिसमे आपका विंडोज ७ इनस्टॉल है.
स्टेप ५ :- Windows Drive के अंदर System32 Directory होती है.

स्टेप ६ :- निचे Files of Type Box से All Files select करेंगे.
स्टेप ७ :- फिर उस विंडोज  में से Sethc  file को सर्च करेंगे.
स्टेप ८ :- फिर Sethc file को rename करके King करेंगे।
स्टेप ९ :- फिर cmd file को rename करके sethc करेंगे।
और मशीन को रीस्टार्ट कर लेंगे।






स्टेप १० :- और Login Screen पर पांच बार Shift दबाएंगे तो तुरंत कमांड प्रांप्ट ओपन हो जाएगा। 


स्टेप ११ :- और यहाँ पर आप net user command को उपयोग करके किसी भी यूजर अकाउंट का पासवर्ड ब्रेक कर सकते है. 

Command                                                                                           Action

net user                                                                                          See users list
net user username password                                                         Change user password
net user username /active:yes                                                       Enable user account
net localgroup administrators username /add                               To move user in admin groups.

Microsoft Windows' Registry All Changing Tricks

What programs do I use to edit the registry?

Windows comes with one to three different registry editing tools for you to use:
1. RegEdit
2. Regedt32
3. Reg
Another tool you may wish to have is RegEditX, a free tool from DC Software (http://www.dcsoft.com) RegEditX adds extensions to
RegEdit. It does not replace RegEdit, and is not a standalone program.

What is the registry?
The registry is nothing more then a central place to store all settings on the computer. While a program doesn't have to store any data in the
registry, it's free to if it likes. It's like the configuration files for Linux and Unix, but rather then being stored in folders, it's stored in hives, a
folder-like structure.
The registry is implemented by the Configuration Manager part of the Windows Kernel.
What are the registry keys?
When opening the registry in RegEdit, you are presented with 5 keys, or hives. The five keys are:
HKey_Classes_Root (HKCR)
HKey_Current_User (HKCU)
HKey_Local_Machine (HKLM)
HKey_Users (HKU)
HKey_Current_Config (HKCC)
HKEY_DYN_DATA (HKDD) (Win9x Only)
Of the five, three are actually subtrees of other keys. HKey_Users and HKey_Local_Machine are the two "full" keys. The other keys are
sub keys of these two, or combinations of two or more keys. HKey_Users holds all "Per User" settings in the registry. If you make a change
to a program that records to the registry, and another user is not effect by it, then it must be in this section. You can also use this key to edit
.default, the key that is used to make the default keys for all new users. When a new user is made, .default is copied into the new hive, using
their SID to tell them apart.
HKey_Current_User is the HKey_Users key for the user running regedit. It is a shortcut to the current users settings, so you don't have to
find out what one of the HKey_Users you need to edit.
HKey_Current_Config is the current hardware profile listed in HKey_Local_Machine\System\ControllSet001\Hardware Profiles. HKCC
is nothing more then a pointer to this key.
HKey_Classes_Root is a combo of HKEY_LOCAL_MACHINE\Software\Classes and HKEY_CURRENT_USER\Software\Classes keys.
The data is a merged, so if there's no data listed for the current user, then the one for the local machine is used.

What are Keys? Hives? Values?
When most people say hives, they normally mean the five (5) main keys, but sometimes they talk about sub-keys. Keys are the ones that
look like small folders in regedit. Values for each of the keys can be binary, string, dword, multi-string ,expandable string, and a few others.
In general, you do not need to know what these values mean when editing them , since you have to use the type that value needs. You can
not use a string when a dword is called for. Strings and dwords are the most common. On windows 2K, regedit only supports string, dword
and binary. You will have to use regedt32 to edit multi and expandable strings.
The types of values in the registry are listed on by Microsoft as the following: (Note: This is taken directly from Microsoft’s site)
REG_BINARY
REG_DWORD
REG_EXPAND_SZ
REG_MULTI_SZ
REG_SZ
REG_RESOURCE_LIST
REG_RESOURCE_REQUIREMENTS_LIST
REG_FULL_RESOURCE_DESCRIPTOR
REG_NONE
REG_LINK
REG_QWORD
REG_BINARY Raw binary data. Most hardware component information is stored as binary data and is displayed in Registry Editor in
hexadecimal format.
REG_DWORD Data represented by a number that is 4 bytes long (a 32-bit integer). Many parameters for device drivers and services are
this type and are displayed in Registry Editor in binary, hexadecimal, or decimal format. Related values are DWORD_LITTLE_ENDIAN
(least significant byte is at the lowest address) and REG_DWORD_BIG_ENDIAN (least significant byte is at the highest address).
REG_EXPAND_SZ A variable-length data string. This data type includes variables that are resolved when a program or service uses the
data.
REG_MULTI_SZ A multiple string. Values that contain lists or multiple values in a form that people can read are generally this type. Entries
are separated by spaces, commas, or other marks.
REG_SZ A fixed-length text string.
REG_RESOURCE_LIST A series of nested arrays that is designed to store a resource list that is used by a hardware device driver or one of
the physical devices it controls. This data is detected and written in the \ResourceMap tree by the system and is displayed in Registry Editor
in hexadecimal format as a Binary Value.
REG_RESOURCE_REQUIREMENTS_LIST A series of nested arrays that is designed to store a device driver's list of possible hardware
resources the driver or one of the physical devices it controls can use. The system writes a subset of this list in the \ResourceMap tree. This
data is detected by the system and is displayed in Registry Editor in hexadecimal format as a Binary Value.
REG_FULL_RESOURCE_DESCRIPTOR A series of nested arrays that is designed to store a resource list that is used by a physical
hardware device. This data is detected and written in the \HardwareDescription tree by the system and is displayed in Registry Editor in
hexadecimal format as a Binary Value.
REG_NONE - Data with no particular type. This data is written to the registry by the system or applications and is displayed in Registry
Editor in hexadecimal format as a Binary Value
REG_LINK A Unicode string naming a symbolic link.
REG_QWORD Data represented by a number that is a 64-bit integer. This data is displayed in Registry Editor as a Binary Value and was
first introduced in Windows 2000.

What is group policy?
Group policy is used to ease the change of many registry settings on a Windows computer. This is generally only done on windows 2000,
XP, and 2003 or newer machines. Administrative tools should have group policy editor, listed as local policy editor. If not listed there, from
the run menu, type in mmc, and file -> Add\Remove Snap in. In the local computer policy, you have two keys, computer and user
configuration.
These change settings in HKU and HKLM. There are a fair amount of options here predefined, like computer configuration, windows
settings, startup\shutdown scripts. while called scripts, these can be .bat or .exe files ran when the computer starts up\shuts down. This is
NOT the same as log on\log off. Most normal users will want to play with the user configurations, computer configuration is more for
higher level users.
In the user section, you have options for login\logoff scripts, and administrative templates. The templates are the main thing here that users
will want to mess with. Click on desktop, and there's a listing of options. This is mostly simple stuff, hide icons or show them, nothing in
there should really be considered advanced. What options you have depends on windows version, 2K has less options then 2K3 and XP.
Lets look in system, under CTRL-ALT-DEL. There's options to control what buttons you get in ctrl-alt-del. There are all sorts of options
that you may never known you could do, like network -> network connections.
In almost every key, clicking on it will get you a dialog with three options, enable, disable, and not set. And an explain tab. Make sure you
read the explain to understand what the option does.
Group policy isn't really meant to change settings on a single computer. It's meant to change settings on hundreds, or thousands of
computers at once. In a Windows Active Directory network, you have what's called OU's. They're basically folders, and the network
administrators can put computers and users into these OU's. For example, maybe you’re in the Sales\Users OU. All people in the Sales
department are required to have the same desktop settings. The administrator makes a group policy setting, and hooks the group policy onto
Sales\Users. It now effects all users in sales. What if a user moved to Tech\Desktop Administrators? The administrator simply change what
OU the user is in, and the settings for their desktop change based on the new rules. With the group policy templates, plus security settings,
and the ability to assign permissions and programs to users and\or computers, group policy is a powerful tool. Any registry changes learned
here can be applied via group policy to effect all users in a company with a few clicks of the mouse.

HOW DOES OPEN REGISTRY EDIT

TYPE------------------------------- WINDOWS BUTTON + R-------------------------
Type                                                          Regedit


Sample Registry Keys
Notes: Keys with (1) and (2) need to be used together.
System Settings
Notes: The settings here apply to system-wide configurations. These settings are all applied to computers, not users.
Registered Owner
Key: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion
Value Name: RegisteredOwner
Value Type: REG_SZ
Set To: New Owner's Name
Notes: This key controls the Owner's name in the system tab of control panel, and in any programs that reads this data. This
has little to no effect in Windows, it's merely a cosmetic change.
Explorer Settings
Notes: All the settings here work with explorer. They should not be used for a sole means of security, as they do not remove
the rights to perform actions. They merely remove the ability to do an action via Explorer.
Disable Desktop Right Click
Key: (HKCU|HKLM)\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
Value Name: NoViewContextMenu
Value Type: REG_DWORD
Set To: 1 to enable, 0 to disable (0 Default)
Notes: Use this to disable right click context menu on the desktop.
Show Windows Version On Desktop
Key: HKCU\Control Panel\Desktop
Value Name: PaintDesktopVersion
Value Type: REG_DWORD
Set To: 1 to enable, 0 to disable (0 Default)
Notes: Displays the current Windows version on top of the desktop wallpaper.
Disable Shutdown
Key: (HKCU|HKLM)\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
Value Name: NoClose
Value Type: REG_DWORD
Set To: 1 to enable, 0 to disable (0 Default)
Notes: Removes the shutdown option from the start menu. This should be used with removal the shutdown system right. This
key does not prevent the user from turning off the computer, it only removes the shutdown button from the start menu.
Disallow These Programs From Running (1)
Key: (HKCU|HKLM)\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
Value Name: DisallowRun
Value Type: REG_DWORD
Set To: 1
Notes: This enables disallow run. Any programs later added to the DisallowRun subkey will not be ran from explorer.
Programs can still be ran by other means, and they can be renamed to bypass this.
Disallow These Programs From Running (2)
Key: (HKCU|HKLM)\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun
Value Name: 1+
Value Type: REG_SZ
Set To: Application's Name
Notes: This is the container for the DisallowRun. Each program should be placed in the DisallowRun key. The first program's
value should be called 1. And if the program was, for example, cmd.exe, then the string value should be cmd.exe. Renaming
files will bypass this.
Allow ONLY These Programs To Run (1)
Key: (HKCU|HKLM)\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
Value Name: RestrictRun
Value Type: REG_DWORD
Set To: 1
Notes: This enables RestrictRun. This is like Disallow Run, but explorer will only run programs listed in this key. Make sure
you enable regedit for your account, or have some other means to reverse this. This is Opt-In security.
Allow ONLY These Programs To Run (2)
Key: (HKCU|HKLM)\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\RestrictRun
Value Name: 1+
Value Type: REG_SZ
Set To: Application's Name
Notes: This is the container for the Restrict Run. Each program should be placed in the Restrict Run key. The first program's
value should be called 1. And if the program was, for example, cmd.exe, then the string value should be cmd.exe. Renaming
files will bypass this.
Shell Folders
Key: HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
Value Name: Various
Value Type: REG_SZ
Set To: New Path
Notes: This key contains different paths to special folders for the user, such as desktop, CD Burning, Programs, Start Menu
and the like. I personally like to use NTFS Junctions rather then change the folder location, since some programs write to the
default location without checking for the correct value.
Application Specific
Notes: The settings here are for the listed applications only. These can be used to set options on all computers on a network
remotely, or to lock in settings by disabling the write permission to the key.
Application: Notepad
Set Font (Notepad)
Key: HKCU\Software\Microsoft\Notepad
Value Name: lfFaceName
Value Type: REG_SZ
Set To: Font name (For example: Lucida Console)
Notes: Sets the default font used in notepad.
Italics (Notepad)
Key: HKCU\Software\Microsoft\Notepad
Value Name: lfItalic
Value Type: REG_DWORD
Set To: 0 to disable, 1 to enable (default is 0)
Notes: Sets the italics for notepad.

Font Size (Notepad)
Key: HKCU\Software\Microsoft\Notepad
Value Name: iPointSize
Value Type: REG_DWORD
Set To: Desired font size.
Notes: This setting controls the font size. The value should be 10x the desired size. For example, to set a font of size 24, then
enter a decimal value of 240.
Window Size (Notepad)
Key: HKCU\Software\Microsoft\Notepad
Value Name: iWindowPosDX & iWindowPosDY
Value Type: REG_DWORD
Set To: Desired Window Size
Notes: Change these two values to control the default size of notepad when opened.
Internet Explorer
Disable ability to close browser (Internet Explorer)
Key: (HKCU|HKLM)\Software\Policies\Microsoft\Internet Explorer\Restrictions
Value Name: NoBrowserClose
Value Type: REG_DWORD
Set To: 1 to enable, 0 to disable (0 by default)
Notes: When the user presses the close button, or tries to close view the file menu, the action is denied with a message stating
"The operation has been canceled due to restrictions in effect on this computer. Please contact your system administrator" IE
can still be closed by killing the process. If this restriction is in place on a user account, and IE is ran under the context of a
different user, the first user can not kill the process of the second user. This allows internet explorer to be always active in
kiosk computers.
Remove Favorites
Key: (HKCU|HKLM)\Software\Policies\Microsoft\Internet Explorer\Restrictions
Value Name: NoFavorites
Value Type: REG_DWORD
Set To: 1 to enable, 0 to disable (0 by default)
Notes: Removes the Favorites menu from Internet Explorer.
Disable Context Menu (Right Click)
Key: (HKCU|HKLM)\Software\Policies\Microsoft\Internet Explorer\Restrictions
Value Name: NoBrowserContextMenu
Value Type: REG_DWORD
Set To: 1 to enable, 0 to disable (0 by default)
Notes: Removes the ability to right click in IE
Remove File -> Open Menu
Key: (HKCU|HKLM)Software\Policies\Microsoft\Internet Explorer\Restrictions
Value Name: NoFileOpen
Value Type: REG_DWORD
Set To: 1 to enable, 0 to disable (0 by default)
Notes: Removes the File -> Open that can be used to launch other programs. Helps keep a cleaner look in a Kiosk machine,
but NTFS permissions should still be used to limit what programs the end user may run.
Remove File -> Save As Menu
Key: (HKCU|HKLM)Software\Policies\Microsoft\Internet Explorer\Restrictions
Value Name: NoBrowserSaveAs
Value Type: REG_DWORD
Set To: 1 to enable, 0 to disable (0 by default)
Notes: Removes the File -> Save As that can be used to launch other programs. Helps keep a cleaner look in a Kiosk
machine, but NTFS permissions should still be used to limit what programs the end user may run.

Remove Address Bar
Key: HKLM\Software\Policies\Microsoft\Internet Explorer\Toolbars\Restrictions
Value Name: NoAddressBar
Value Type: REG_DWORD
Set To: 1 to enable, 0 to disable (0 by default)
Notes: By removing the address bar, and disabling Explorer, you can use a single HTML page as the computers interface on a
kiosk machine.
Automatic Update Settings
Notes: These settings allow the user to fine-tune how Automatic Updates run on a system. Most of these settings can be set
via Group Policy using default templates shipped in 2K and 2K3.
Automatic Updates
Key: HKLM\Software\Policies\Microsoft\Windows\WindowsUpdate\AU
Value Name: NoAutoUpdate
Value Type: REG_DWORD
Set To: 1 to enable, 0 to disable (0 by default)
Notes: This is the key to DISABLE auto updates. So setting it to 1 enables disable automatic updates. In other words, set it to 1
to turn off automatic updates.
Automatic Updates - Options
Key: HKLM\Software\Policies\Microsoft\Windows\WindowsUpdate\AU
Value Name: AUOptions
Value Type: REG_DWORD
Set To: 2, 3, 4, 5
Notes: These options control if it downloads the updates on it's own, or if it just tells the user when downloads are out. It also
controls if the service will install the updates, or prompt the user to install them later. 2 will tell you when there are updates to
download. 3 will download them automatically, and ask for an install. 4 will fully automate the process, but may not finish the
installs till you reboot. To use 4, you must have ScheduledInstallDay and ScheduledInstallTime set. 5 forces automatic
updates to be enabled, but allows the end users to configure it.
Automatic Updates - Install Options
Key: HKLM\Software\Policies\Microsoft\Windows\WindowsUpdate\AU
Value Name: ScheduledInstallDay
Value Type: REG_DWORD
Set To: 0~7
Notes: Controls on what day the updates will be installed. 0 is daily, while 1~7 is a set day of the week, Sunday to Saturday.
Automatic Updates - Install Options 2
Key: HKLM\Software\Policies\Microsoft\Windows\WindowsUpdate\AU
Value Name: ScheduledInstallTime
Value Type: REG_DWORD
Set To: 0~23
Notes: Controls at what time Windows will install the updates, in 24 hour format.
Automatic Updates - Auto Reboot When Logged On
Key: HKLM\Software\Policies\Microsoft\Windows\WindowsUpdate\AU
Value Name: NoAutoRebootWithLoggedOnUsers
Value Type: REG_DWORD
Set To: 0 or 1
Notes: Controls if Windows will automatically reboot when a user is logged on. Setting to 1 will prompt the user to reboot, while
setting to 0 will cause Automatic Updates to notify the user that the computer will reboot. Default time till reboot is five (5)
minutes.

TCP\IP Settings in Windows 2003
Notes: These settings are based off of Windows 2003. Some may apply to 2K and XP, and a few keys may work on 9x based
systems. But these are primarily aimed for Windows 2K3 servers. All keys listed here, plus many many more, can be found
inside the paper “Microsoft Windows Server 2003 TCP/IP Implementation Details”, listed in the references section of this paper.
Allow Raw Sockets For Users (Windows 2003)
Key: HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters
Value Name: AllowUserRawAccess
Value Type: REG_DWORD
Set To: 1 to enable, 0 to disable (0 by default)
Notes: By default, only Administrators can access raw sockets on a Windows 2003 system. Setting this value to 1 allows rawsocket
usage for all users.
Arp Cache Keep Alive
Key: HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters
Value Name: ArpCacheLife
Value Type: REG_DWORD
Set To: 0 to 0xFFFFFFFF (4,294,967,295 Decimal)
Notes: Controls the time, in seconds, that an entry stays within the ARP cache. Without this key, defaults are two minutes for
unused entries, and ten minutes for used entries.
Data Base Path
Key: HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters
Value Name: DatabasePath
Value Type: REG_EXPAND_SZ
Set To: Path to files. (Default: %SystemRoot%\system32\drivers\etc)
Notes: This controls the path to TCP\IP's database files, Hosts, Lmhosts, Network, Protocols, Services. Sometimes changed
by malware to bypass restrictions on the hosts file.
Default Time To Live
Key: HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters
Value Name: DefaultTTL
Value Type: REG_DWORD
Set To: 0~0xFF (0~255 Decimal, 128 Default)
Notes: Adjusts the TTL of outgoing IP packets. Raising TTL can cause larger broadcast storms if routing loops are formed in
network topology.
Disable Offloading to Network Card
Key: HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters
Value Name: DisableTaskOffload
Value Type: REG_DWORD
Set To: 1 to enable, 0 to disable (0 by default)
Notes: Allows functions in the TCP\IP stack to be performed by the hardware in the network card. Disabling this will cause
greater load onto the CPU as the system must handle all functions. This is used for troubleshooting only.
Enable Detect Dead Gateway
Key: HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters
Value Name: EnableDeadGWDetect
Value Type: REG_DWORD
Set To: 1 to enable, 0 to disable (1 by default)
Notes: This causes TCP to detect if the main gateway has went down, and will switch to any secondary gateways configured in
TCP\IP properties.
13

Enable Multicast Forwarding
Key: HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters
Value Name: EnableMulticastForwarding
Value Type: REG_DWORD
Set To: 1 to enable, 0 to disable (0 by default)
Notes: This controls if the computer will forward Multicasts across other networks. This is only used when the computer is
running as a Routing and Remote Access Server (RRAS).
Enable Path MTU Discovery
Key: HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters
Value Name: EnablePMTUDetect
Value Type: REG_DWORD
Set To: 1 to enable, 0 to disable (1 by default)
Notes: Controls if windows will try to discover the Maximum Transmission Unit (MTU) over the path to a remote host. If the
MTU used is larger then what is supported, then the packet will become fragmented in transport. Fragmentation can cause
network congestion and excess load on networking devices as they assemble the packets back into whole units of data.
Syn Attack Protection
Key: HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters
Value Name: SynAttackProtect
Value Type: REG_DWORD
Set To: 1 to enable, 0 to disable (1 by default on Windows 2K3 with SP1, 0 by default on 2K3 with SP0)
Notes: Enables the SYN attack protection in SYN-ACK floods. Please see the Windows 2003 TCP\IP Implementation in the
References section for more information. It is recommended that it is set to 1 on all SP0 configurations, if SP1 can not be
installed for some reason.



Sunday, 27 December 2015

How to Make a USB Bootable

Have an old USB drive lying around that you don't use anymore? Turn it into an operating install disk for Windows, Linux or Mac, or a diagnostic tool for your PC. Follow this guide to learn how

Method 1 of 5: On Any PC

  1. Image titled Make a USB Bootable Step 1
    1
    Open the Command Prompt. You will need to run Command Prompt as an Administrator. Right-click on it and select Run as Administrator. You may need to enter the Administrator password.
    • This method will create a USB drive that is bootable. You can then copy the contents of an operating installation disc onto the drive to create a portable installation drive.
    • This method only works in Windows Vista, 7, and 8.
    1. Image titled Make a USB Bootable Step 2
      2
      Open the disk management utility. This can be opened by entering the command "diskpart".
    2. Image titled Make a USB Bootable Step 3
      3
      Display the connected disks. Type the command list disk to show a list of all the drives connected to your computer. Your USB drive should be listed here as well. Make note of the number next to your USB drive.
    3. Image titled Make a USB Bootable Step 4
      4
      Select the USB drive. Enter the command select disk #, replace “#” with the number from the previous step.
    4. Image titled Make a USB Bootable Step 5
      5
      Clean the flash drive. Enter the command clean to have the disk management utility verify the integrity of the USB drive, and erase all data.
    5. Image titled Make a USB Bootable Step 6
      6
      Create a bootable partition. Once the USB drive is clean, type in create partition primary. You will see a message saying that the operation was successful.
    6. Image titled Make a USB Bootable Step 7
      7
      Select the new partition. Enter the command select partition 1 and press Enter. Once you receive a confirmation message, type active and press Enter. This will activate the partition.
    7. Image titled Make a USB Bootable Step 8
      8
      Format the USB drive. Input the command format fs=fat32 . When you press Enter, the program will work for a few minutes (if it is a small USB, e.g. 4Gb could actually take hours to slow format), and the progress will be displayed as a percentage.
    8. Image titled Make a USB Bootable Step 9
      9
      Assign the USB a drive letter. Enter the command assign to give the thumb drive a letter designation. Type exit to end the disk management program.
    9. Image titled Make a USB Bootable Step 10
      10
      Copy the operating system. Once the USB drive has been made bootable, you can copy over the installation files for the operating system you want to install. You can do this by dragging and dropping using your preferred file manager/explorer.
      • Copy over any drivers you might need during the operating system installation to make the process much smoother.
      Ad

    Method 2 of 5: On Windows Vista or 7

    1. Image titled Make a USB Bootable Step 11
      1
      Create or Obtain A Windows Vista/7 ISO. Install a free burning program. There are a number of free burning utilities available online. You need one that can create ISO files. If you received your Windows 7 as a downloadable ISO file from Microsoft, you can skip to Step 2.
      • Insert your Windows 7 DVD. Open your new burning program. Look for an option such as “Copy to Image” or “Create Image.” If prompted, select your DVD drive as the source.
        Image titled Make a USB Bootable Step 11Bullet1
      • Save your ISO file. Choose an easy to remember name and location for the file. The ISO you make will be equal in size to the disc you are copying. This means it can take up several gigabytes of space on your hard drive. Be sure you have enough storage available.
        Image titled Make a USB Bootable Step 11Bullet2
      • Creating the ISO can take a long time, depending on the speed of your computer and DVD drive.
    2. Image titled Make a USB Bootable Step 12
      2
      Download Windows 7 USB/DVD Download Tool. This is available for free from Microsoft. Despite its name, this tool works with Windows Vista ISOs as well. You can run this tool on virtually any version of Windows.
    3. Image titled Make a USB Bootable Step 13
      3
      Select the Source file. This is the ISO that you created or downloaded in the first section. Click Next.
    4. Image titled Make a USB Bootable Step 14
      4
      Select USB device. You are given the option to either burn to a DVD or create a USB device. For this guide, click USB Device.
    5. Image titled Make a USB Bootable Step 15
      5
      Choose your USB device. Make sure that your flash drive is connected correctly. You will need at least 4GB space on your flash drive to copy over the Windows installation.
    6. Image titled Make a USB Bootable Step 16
      6
      Wait while the program works. The program will format the USB drive to boot correctly, then copy the ISO file onto the drive. The copying process can take up to 15 minutes to complete, depending on the speed of your machine.
      Ad

    Method 3 of 5: On Windows XP

    1. 1
      Gather your software and hardware. You will need USB_Prep8 and bootsect.exe. These are developer tools both freely available online. You will also need a flash drive at least 1GB in size, and a Windows XP installation CD or DVD.
      • Insert the USB drive and the Windows XP disc. Close any Autoplay windows that open.
        Image titled Make a USB Bootable Step 17Bullet1
    2. Image titled Make a USB Bootable Step 18
      2
      Extract and run USB_Prep8. Once you extract the USB_Prep8 .zip file, open the folder it creates and run usb_prep8.cmd. This will open a command prompt. Press any key to format the USB drive with PeToUSB. Note: In Windows 7, you will need to open a cmd as administrator and run usb_prop8.cmd from prompt, otherwise nothing works.
    3. Image titled Make a USB Bootable Step 19
      3
      Start the format. Do not change any of the settings in the PeToUSB window. Once the format is complete, leave both windows open and start a new command prompt by pressing Windows key + R and typing “cmd” into the field.
    4. Image titled Make a USB Bootable Step 20
      4
      Extract boots. Once it is extracted, navigate to the boots folder using the new command window. Once you are in the boots directory on your computer, type “bootsect.exe /nt52 Z:”. Change the “Z” to the drive letter of your USB drive.
      • You cannot have any windows open showing the contents of the USB drive at this point, or the operation will fail and you will need to restart
      • Bootsect copies the files necessary to allow your computer to boot from the flash drive. When it is complete you will see the message “Bootcode was successfully updated on all targeted volumes.” You can close this window and PeToUSB now, but keep the usb_prep8 command window open.
    5. 5
      Adjust the Prep8 settings. Once the boots are done copying, the usb_prep8 command window will display a numbered menu allowing you to change some settings. You will need to change the first 3 settings:
      • Press 1 and then Enter. A Browse for Folder window will open. Select the drive that contains your Windows XP disc and press OK.
        Image titled Make a USB Bootable Step 21Bullet1
      • Press 2 and then Enter. If you have a drive on your computer that is already assigned to the letter T:, then change this option to a free letter. Otherwise, you can leave this as is.
        Image titled Make a USB Bootable Step 21Bullet2
      • Press 3 and then Enter. Enter the drive letter for your USB flash drive.
        Image titled Make a USB Bootable Step 21Bullet3
    6. Image titled Make a USB Bootable Step 22
      6
      Start the copy process. To do this, press 4 and then Enter. You will be notified that proceeding will format the virtual disk from the earlier menu. Press Y to continue. Once the format is complete, press any key to continue.
      • Files will scroll up the screen as the copy process progresses. You will be prompted to press any key to continue again. After a few moments, a window will open confirming that you want to copy TempDrive Files. Press Yes, and wait around 15 minutes, then press Yes for the next two windows that open.
        Image titled Make a USB Bootable Step 22Bullet1
    7. Image titled Make a USB Bootable Step 23
      7
      Begin Windows XP setup. At this point, the USB drive is complete. Insert it into the computer that you want to install Windows XP on. You will need to set the BIOS to boot from a USB drive. Check outour guide on setting your BIOS correctly.
      • When the startup menu opens, select Option 1 for a text mode installation. The Windows XP installation will now begin as normal.
      • After the computer reboots after the text mode portion, select Option 2 to start the GUI (Graphical User Interface) portion of the installation.
      • Keep your USB drive plugged in during the entire installation process.
        Image titled Make a USB Bootable Step 23Bullet3
      Ad

    Method 4 of 5: PC Repair Toolkit

    1. Image titled Make a USB Bootable Step 24
      1
      Download the Ultimate Boot CD (UBCD) ISO file. This file is available for free from the developershere. The UBCD is a collection of diagnostic tools that can be run before the operating system loads. Having them all on one thumb drive makes for a convenient PC repair tool. You will also need the Universal USB Installer, which can be found here. Place the Universal USB Installer in the same folder as the UBCD .iso file.
    2. Image titled Make a USB Bootable Step 25
      2
      Run the Universal USB Installer. Select Ultimate Boot CD from the menu. Make sure that the directory in the field is correct. Select the correct drive letter for your USB flash drive. Click the Create button.
    3. Image titled Make a USB Bootable Step 26
      3
      Boot from the USB drive. After the USB is done being created, you’re ready to boot from the drive and run the diagnostic tool.
      Ad

    Method 5 of 5: Mac OS X 10.7 or 10.8

    1. Image titled Make a USB Bootable Step 27
      1
      Assemble the hardware and software that you will need. You will need an 8GB or larger USB flash drive. You will also need the OS X installer app from the Mac App Store. Download the app and insert the USB drive.
    2. Image titled Make a USB Bootable Step 28
      2
      Launch the Disk Utility. It can be found in the Utility folder inside the Applications folder. The Disk Utility will allow you to manipulate the USB drive. In the left frame, select your USB drive and then open the Partition tab. Under Partition Layout, select 1 Partition.
    3. Image titled Make a USB Bootable Step 29
      3
      Select the format. From the format drop-down menu, select Mac OS Extended (Journaled). This will allow your drive to be read by any Mac OS computer. Click the Options button and select GUID Partition Table.
    4. Image titled Make a USB Bootable Step 30
      4
      Find the Install Mac OS X file. This is the .app file that you downloaded from the Mac App Store. It is installed in the Applications folder by default. Right-click on the file and select Show Package Contents. Open Contents and then Shared Support. You should see a file called InstallESD.dmg. Drag this file to your desktop.
    5. Image titled Make a USB Bootable Step 31
      5
      Open the Disk Utility again. Click on the USB drive in the left frame. Open the Restore tab and click the Image… the button next to the Source box. Select the InstallESD.dmg file. For Destination, drag the newly created partition into the field.
    6. Image titled Make a USB Bootable Step 32
      6
      Click the Restore button. You will be asked for confirmation before the copy process begins. Press Erase to continue. The process can take up to an hour to complete, depending on the speed of your Mac. Once it is finished, you can boot from the USB drive and install Mac OS X as if you were using a disc.