Run the right version of Windows for your PC

I said I was done writing about system optimization. I changed my mind. I have one more thing, and it seems appropriate, now that Vista upgrades are available.

Be very wary about upgrading your version of Windows.There are a few Vista-only titles out there, and there will be some more, but the majority of titles aren’t. Walk into a software aisle and you’ll still find a lot of software that will run on Windows 95 (or possibly 98), assuming the computer meets the hardware requirements.

I’m typing this on an 800 MHz HP Pavilion 6835. Sure, it’s outmoded–for around $125, I could swap in an Athlon 64 motherboard that would give me 4-5x the CPU power and that would be considered a low-end PC by today’s standards–but this one’s peppy. I run Windows ME on it. Windows 2000 would be more stable but I’m lazy. I wouldn’t try XP on it. When XP came out, this system was already old.

Technically, XP will install on a 133 MHz Pentium if it has enough RAM. I’ve seen it done, and I’ve seen it try to run on one. It’s not pretty. I really wouldn’t try running XP on anything less than a 1 GHz PC with 256 megs of RAM, because that was the standard PC at the time of XP’s release. But believe it or not, if you install Windows 95 and Office 95 on that Pentium-133, it’s a reasonably nice machine–because that was a high-end box in 1995 when Windows 95 and Office 95 came out.

So when you’re refurbishing an old machine, try to install whatever the current version of Windows was when it was new. The PC will run a lot better. Here’s a guide.

Windows 95: Released August 1995
Typical PC of the time: 486, 66 MHz
Hot PC of the time: Pentium, 133 MHz

Windows NT 4.0: Released July 1996
Typical PC of the time: Pentium, 75 MHz
Hot PC of the time: Pentium Pro, 200 MHz

Windows 98: Released June 1998
Typical PC of the time: Pentium, 233 MHz
Hot PC of the time: Pentium II, 333 MHz

Windows 2000: Released February 2000
Typical PC of the time: Pentium III or Athlon, 600 MHz
Hot PC of the time: Pentium III or Athlon, 1 GHz

Windows XP: Released October 2001
Typical PC of the time: Pentium 4, 1.5 GHz
Hot PC of the time: Pentium 4 or Athlon, 2+ GHz

Windows Vista: Released January 2007
From what I understand, even a hot PC of 2007 has difficulty running it. I haven’t seen Vista yet; my employer is still running XP for everything.

Of course, if you install as much memory as the system will take, you can push your limits, since Windows is often more memory-bound than CPU-bound. I also try to replace the hard drive with the fastest model I can budget for. Don’t worry if the drive has a faster DMA rate than the controller on the board; you’ll still benefit from the faster seek times and better throughput of a newer drive. If the new drive saturates the bus, it could be worse–I guarantee the old one didn’t.

How I became interested in system optimization

I’ve talked system optimization a lot over the past week. I think I’m done for now, so I’ll talk about why you would want to do these things, and how I got interested in it.My first computer was a Commodore 64. With Commodores, all optimization was software. The hardware was all finely tuned and the timing was precise, so you couldn’t just ramp up the clock speed of the CPU to make the system go faster. But there were lots of things you could do in software to do things like improve the speed of the disk drive.

I moved to an Amiga in the early 1990s and I became interested in a project called ARP, short for AmigaDOS Replacement Project. The Amiga had a command line, and its command line tools were mostly ports of old tools from an obsolete operating system called Tripos, written in BCPL, a predecessor of C. ARP tools were written in either C or 68K assembler and gave the functionality of the originals, but they were smaller, so they loaded and ran faster. I always looked for ways to make my Amiga run faster and use less memory.

In 1994 I took a job selling PCs. My boss talked about how his 16 MHz 386sx felt more responsive than the 33 MHz 486s we sold so many of. So I started learning about PC optimization too. There was a lot you could do just in software.

So I’ve remained interested in this idea for probably 20 years.

Just this week I put an old Windows ME box through the regimen, and it’s definitely a lot peppier now.

I talked about registry optimization and file cleanup, defragmentation, antivirus, firewalls, and defragmentation again.

Do these things, and in most cases you can squeeze at least an extra year out of the life of a system. I squeeze more like five.

How to defrag when defrag just keeps starting over and over

I’ve seen many spyware-infested Windows 95/98 boxes that just won’t defrag no matter what you do. Defrag starts, gets part of the way through, then the disk changes and it starts over again. Leave the system alone for dozens of hours and it might finish, but probably not.Microsoft has some remedies, starting with hitting ctrl-alt-del and killing everything except explorer and systray, and disabling your quick launch bar (right-click on the gray bar on the bottom of the screen, select Toolbars, and de-select Quick Launch). That can help, but not always.

I’ve also heard of downloading the Windows ME version of Defrag.exe and running that instead of the older version if you’re running an older version of Windows 9x, since Windows ME’s defrag is supposed to work better. I guess that and the USB support were the only things in Windows ME that worked better.

Disabling your antivirus realtime scanning also helps, since it’s always accessing the disk.

But sometimes even doing those things won’t work. The system in my living room is a prime example. It’s clean, has no spyware or anything else but still won’t defrag. I could blow it away and reinstall, but I’m too lazy. For the most part the system works well enough for what I need it to do, so I’d rather not mess with it too much.

One thing you can do is reboot the system into safe mode, and run Defrag from there. The performance won’t be stellar since Windows will be using generic drivers rather than the optimized drivers for your particular computer, but Windows won’t be running anything else special, so the process will be able to finish without interference. Boot in safe mode, give your computer a few hours, and it will at least have a chance to finish.

Another option is to boot off a live CD, such as BartPE, and run JKDefrag on it. This would give you the advantage of a fully 32-bit environment with better drivers than Windows 9x safe mode, so the defragment will finish more quickly.

Defragmenting this way is terribly inconvenient of course, but like I’ve said before, it’s something you don’t have to do very often. Once a year will probably keep your computer running acceptably.

The best way to optimize your firewall: Use hardware

Let’s get back to talking about utility replacements. We last talked about antivirus programs, but what about the other component of what’s commonly now called a “security suite,” the firewall?

The answer is, don’t use firewall software if at all possible–which means every man, woman and child who has a cable or DSL connection. Use a separate device.There are several good reasons for this. First, there’s the fundamental problem with running your security on the same system you’re trying to protect. If your firewall software goes haywire and crashes, you run the risk of being unprotected. It’s much safer to rely on an external device that doesn’t have an Intel or AMD processor in it and isn’t running Windows. So when someone tries to send a Windows exploit or virus to it, it bounces off because the device just doesn’t understand.

The second reason is price. A plain no-frills cable/DSL router/firewall costs about $20 at Newegg today. The unit I generally recommend is the Linksys WRT54G, which sells for about $50 new or as little as $25 used and adds wireless capability. That’s about the same as the retail price of a software firewall anyway, and it gives you better protection without robbing your system of performance.

A cheaper alternative, which was what I used to do when these devices cost $200, was to take an obsolete PC, put in a couple of cheap network cards, and run Freesco on it. It will run on any PC with a 386 processor or better (I recommend a Pentium with PCI slots for ease of setup). A 100 MHz Pentium is more than powerful enough and if you don’t already have an obsolete PC to run it on, you probably won’t have to ask around very long before finding one for a very low price or free. Today I prefer a Linksys-type box though, since they take less space, consume less electricity, generate less heat and noise, and take less time to set up.

Performance is the third reason. Two years ago I was working at a large broadband ISP that will remain nameless. It provides a “high speed security suite” as part of the subscription price. The system requirements for this suite are ridiculous–the suite itself needs anywhere from 128 to 192 megabytes of RAM all to itself to function. Basically, if you have a PC with 256 megs of RAM (which is what a fair number of PCs out there still have), loading this security suite on it will bring it to its knees. But if your firewall is running on a separate device, 256 megs of RAM is a comfortable amount of memory to run Windows XP or 2000 and basic applications.

Reliability is the fourth reason. Every high-speed security suite I’ve ever dealt with, be it a freebie provided by your ISP, or an off-the-shelf suite, hooks itself into winsock.dll. Three of the last four computer problems I’ve fixed have been related to this problem, and the symptoms are difficult to diagnose unless you’ve seen the problem before. Basically the computer loses any and all ability to do any networking, but when you call tech support, enough things work that tech support will probably tell you to reload your operating system. Unfortunately, the WinSockFix utility doesn’t seem to be well-known at ISPs.

If messing around with your Winsock isn’t bad enough, the security suite my former employer provided was overly paranoid about piracy. If you did any number of things, including but not limited to trying to install it on a second PC without getting a second key from the ISP, it would disable itself and not necessarily warn the user that it had left the PC unprotected. It was my job, when I was working there, to go through all of the disabled accounts by hand. It wasn’t an automated process. So if the security suite decided to go jump off a cliff sometime on Friday after I’d pulled the current report, it would be sometime on Monday before I would even be aware of the problem. Given that it usually takes about 20 minutes for some exploit to find an unprotected Windows box sitting on the Internet, that 48-72 hour window that you could be sitting unprotected is anything but ideal.

Things may have changed since I left that employer in November 2005, but if it’s my PC, I’m not willing to risk it. I’d much rather spend $20-$50 on a cable/DSL router to give myself firewall protection that I know I can just set up once and then ignore for a few years and won’t cause my PC to constantly fall behind on the upgrade treadmill.

And finally, the fifth reason to use a hardware firewall is apathy. Software firewalls tend to throw a lot of popups at the user, warning the user that this or that is trying to access the Internet, or come in, or whatever. Most users are likely to do one of two things: either allow everything or deny everything. The result is either a PC on which nothing works, or whose firewall is full of so many holes there might as well not be one. It’s much better to have a hardware firewall that just does its job. If you’re worried about unauthorized applications hitting the Internet, that’s the job of antivirus and antispyware software, not the firewall.

Replace your Antivirus software with this freebie and regain your performance

Antivirus software is the worst culprit in PC slowdowns. I am not alone in this belief. I don’t suggest going without (not completely) but it’s certainly possible to save lots of money, eliminate subscriptions, eliminate most of the overhead, and still practice (relatively) safe computing while running Windows.

Use Clamwin, the Windows version of ClamAV, and don’t engage in risky behavior (more on that later).Clamwin is free, GPL software, meaning you never have to pay for or renew it. It lacks a realtime scanner, which is the main resource hog for PCs. This may leave you vulnerable to infections, but think about where the majority of infections come from: E-mail, downloads, and drive-by installations. Clamwin comes with hooks into Outlook to scan e-mail attachments for you, and Clamglue is a plugin for Firefox that automatically scans all downloaded files. Of course you’re using Firefox, right? Using a non-Internet Explorer browser is the most effective way to prevent drive-by installations. I don’t use IE on my personal PCs for anything other than running Windows update.

Realtime protection made lots of sense when the main distribution point for viruses was infected floppies, but those days are long gone. This approach protects you against modern viruses without making your multi-gigahertz computer run like a Pentium-75.

I do suggest periodically scanning your system, something that even antivirus packages with realtime protection do. It makes you wonder how much confidence they have in that resource-hogging realtime protection, doesn’t it? Weekly scans are usually adequate; daily scans are better if you suspect some users of your computer engage in risky behavior.

Risky computer behavior

The last virus that ever hit any computer I was using was LoveLetter, which was way back in May 2000. The only reason I got that one was because I had a client who got infected and she just happened to have me in her address book. I don’t know the last time I got a virus before that.

It’s not because I’m lucky, it’s because I’m careful. There are lots of things I don’t do with my computers.

I stay off filesharing networks. Not everything on your favorite MP3-sharing site is what it claims to be, and there are people who believe that if you’re downloading music without paying them for it, they are entirely justified in doing anything they want to you, such as infecting you with a computer virus.

I don’t open e-mail attachments from strangers, or unexpected e-mail attachments from people I know. For that matter, if I don’t recognize the sender of an e-mail message, I probably won’t open it at all, attachment or no attachment.

I don’t run Internet Explorer if I can possibly avoid it. Internet Explorer’s tight integration into the operating system makes it far too easy for people to run software on your computer if you so much as visit a web page. Google tries to identify web pages that might be trying to do this, but a safer option is to use a different web browser that doesn’t understand ActiveX and doesn’t have ties into your underlying operating system.

I don’t install a lot of software downloaded from the Internet. A good rule is not to install any “free” software whatsoever unless it’s licensed under the GNU GPL or another similar open-source license. If you don’t know what that means, learn. Open source means the computer code behind the program is freely available and outside programmers can examine it. If a program distributed that way does anything malicious, someone’s going to figure it out really fast. If I’m going to download and install something that isn’t open source, I only do so when somebody I trust (be it a trusted colleague, a magazine columnist, etc.) recommends it.

I don’t rely on software firewalls. I have a separate cable/DSL router that acts as a firewall and sits between my computers and the Internet. So when the random virus comes around looking for a computer to infect, my firewall doesn’t even speak their language (it doesn’t run Windows and doesn’t have an Intel or AMD processor inside), so the potential infection just bounces right off.

Use a web-based e-mail service instead of a program like Outlook or Outlook Express if you can. If you use something like Yahoo Mail or Hotmail, that company’s servers scan your incoming and outgoing e-mail for viruses, so if someone sends a virus to your Yahoo account, you won’t get it. Does your ISP scan your e-mail for you? If you don’t know, you probably should consider getting your e-mail from someone else. Your antivirus should catch it, of course, but it never hurts to have someone else looking out for you too.

If you avoid these practices, you can join me in throwing out your commercial, for-pay antivirus software and reclaim a lot of computer performance too.

The best defragmenter for Windows NT, 2000, XP and Vista

Want Diskeeper’s features without ponying up 50 bucks?

Sorry, I can’t help you. The combination of My Defrag, Scandefrag, and Pagedefrag is better and it’s free.

Scandefrag defragments your system during the boot process, as early as it can. It works better on NT-based systems like Windows 2000 and XP than it does on 98 or ME. All it does is launch the other tools.

Pagedefrag is, of course, a classic. It’s just convenient to bundle it up with these other tools. This tool defragments your registry and swap file(s) at boot time, which is the only time the system allows it.

My Defrag (actually Jerrod Kessels’ defrag) is, to put it simply, the best general purpose defragmenter for Windows NT, 2000 and XP that I’ve ever seen. Period.

If My Defrag can’t do an ideal job, it does the best it can do. Some defragmenters leave a file alone if they can’t defragment it, but this one will defragment as much as possible and move it as close to the front of the disk as possible, where performance is much better. On full disks, this is important. Since ideal conditions almost never exist (except when a system is first built), a defragmenter’s performance under less than ideal conditions is very important.

The most exciting thing about My Defrag is its ability to sort files. I like Sort alphabetically.

Sorting alphabetically (the -a7 switch) helps because it uses the full pathname. This means all of your files that are part of, say, Mozilla Firefox will be put as close together on the disk as possible, so when you launch Firefox, all of those files are close together and the disk head doesn’t have to move around a lot. The result is an application that launches faster.

So how often should you defragment? Once a year, I would do a boot-time defragmentation with Scandefrag to whip the Registry and swap files into shape. When that finishes, I would run My Defrag in full optimization mode, with file sorting. If you make a major change to your system (say, upgrading your office suite), do a quick defragmentation after the install and a full defragmentation a month or so after.

As part of your routine system maintenance, a faster, automatic defrag with no options specified is a good idea on occasion. The author says to do it no more than once a day and I agree. In my experience, once a week or even once a month is almost always fine. The way My Defrag works, the system shouldn’t get terribly fragmented on a daily basis, even if you use your system heavily. Defragmenting too frequently can shorten a hard disk’s life expectancy, although the occasional defragmentation seems to help it. I defragment a few times a year (and always have), and I generally get five or six years out of a hard disk, which is a year or two longer than most experts say to expect.

Don’t waste your money on any other tools. Download this trio, install it, use it, and watch your system performance climb.

A better registry cleaner

Note: I wrote this back in the Windows XP days. It worked really well under XP, but if you’re going to run the registry cleaner portion in Windows 7 or Windows 10, be sure to create a restore point first.

I’ve been messing around with a registry cleaner called CCleaner. I like it a lot better than the commercial tools that used to come with Norton Utilities and the like, and I like it better than the freebies that we used to use like Microsoft’s Regclean.

And you’ll never beat the price.CCleaner runs on Windows 95, 98, 98SE, ME, NT4, 2000, XP, and Vista.

One thing that I liked about it is that the program is intelligent and relatively dummy-proof. If you click around and do all of the defaults, it’s not likely to harm your computer. I inadvertently wiped out my Firefox browser history (I wanted to keep that) but that’s not a showstopper. It will populate itself again in a few weeks. Unlike commercial utility suites, where I’ve written 20-page explanations how to use them safely, this program doesn’t really need any explanation.

CCleaner actually does more than just clean up the Registry, although it does a fine job of that. It also does a great job of weeding out useless temporary files. I ran it on my old laptop and it found 386 megabytes of junk on my crowded C drive. I’ve been manually cleaning it up by searching it by hand, and I think I do a pretty good job of finding a lot of stuff, but what can I say? The program found 386 megs of stuff that I didn’t.

There are three benefits to getting rid of that cruft. First, Windows needs quite a bit of free space just to function properly. When you start getting too little free space, the system just acts goofy. Second, large numbers of temp files in the system directory just seem to make the system act funny. This was a bigger problem in Windows 9x than in the newer NT-based Windows versions, but there’s still no reason to have hundreds of those laying around. In my desktop support days, just getting rid of temp files used to clear up all sorts of mysterious problems. And finally, not having all those large and useless files on the disk makes your defragmentation programs work better. Those programs need free space to work with, and they don’t have to work as hard when they don’t have hundreds of extra worthless files to move around.

Cleaning the Registry is another important job, since a lot of uninstallation programs don’t do a very thorough job of cleaning up after themselves. The extra bloat chews up memory and slows down searches for the legitimate data the programs you actually use need. Since I tend not to install many programs and I use most of the ones I do install, CCleaner didn’t find a whole lot in my Registry, but it found some stuff to clean up.

So what happened after I ran it? The most noticeable effects were that my Start menu was a lot peppier, and my Web browsers loaded and ran a little bit faster. I understand the Web browser speedup, but the Start menu puzzled me a bit. Not that I’m complaining–it’s irritating when you press Start and have to wait for your list of programs to come up.

CCleaner isn’t a miracle worker and it won’t turn my P3-700 into a Core Duo, but the two systems I’ve run it on do run noticeably faster afterward. It was certainly more than worth the 10 minutes it took for me to download it and run it on each.

So what about the commercial utilities suites? Skip them. In this day and age, there are better, free alternatives for everything those utilities suites could do. CCleaner is one of the superstars. In coming days, I’ll talk about free substitutes for the other most important components of the utility suites.

Event ID 1202 with error code 0x8 (8)

I had a small number of servers getting event ID 1202 with error code 0x8 (8) when I tried to manually force a group policy change with the command secedit /refreshpolicy machine_policy /enforce.

From searching the Web, it appears I’m not the first to have the error, but it appears I may be the first to have solved it. I have contacted Microsoft, and none of the support reps I worked with have seen this particular error. I do have a ticket open with them and will share this information with them in hopes of it helping someone else.

In the meantime, I might as well share the information with the rest of the world too.

Read more

What to do when you can’t upgrade WinZIP because wkqkpick.exe is in use

So you’ve got WinZIP installed and have to upgrade it for security reasons. Like a good compliance-minded sysadmin, you run the patch, and the installation fails. You get the error message that wkqkpick.exe is in use.

Since you’re smarter than the computer, you fire up Task Manager to go show wkqkpick.exe who’s boss, only the operating system tells you Access Denied. Now what?

Read more

Something to try when ERD Commander’s Locksmith doesn’t work

So maybe you’re like me and you’re administering a system that fell off its Windows domain, and the system was built by your predecessor’s predecessor, the local administrator account was renamed, and nobody has any clue what the account name or password is.

And you try ERD Commander because it worked in the past, but not this time…Usually the Locksmith works. But in this case, it didn’t, and of course everyone wanted the server back online an hour ago. We tried everything else we could think of for about three days, including downloading some things that I was sure would get me a visit from a security officer. Nothing worked. At least when I got the visit from the security officer, he just wanted to know why there were repeated attempts to log in with certain accounts.

“I was trying to hack into my own server and it seems I’m not a very good hacker,” I said. Duh.

So I found myself standing at the server with another sysadmin, having used my last idea. “I don’t suppose you have any ideas?” I asked. “I figured if you did, you would have said so by now, but…”

He shook his head.

Finally, I had one last idea. I asked him what he set the password to when he used ERD Commander.

“Password,” he said. “To make it easy to remember.”

Aha! A light went off. This system was hardened to require stronger passwords than just an 8-character alphabetic password. I had a hunch that was what was keeping us from being able to log in using our hacked account.

So we booted off the ERD Commander CD yet again, connected to the Windows installation, located what we were pretty sure was the renamed local adminstrator account, and I reset it to the standard mixed-case special character password we use for the local admin accounts.

We held our breath, rebooted, and tried to log in.

Success. Finally.

So if ERD Commander isn’t working for you, try using a stronger password to satisfy your local system policy.

And just in case you’re wondering why a computer falls off a domain, computers have usernames and passwords just like users do. Occasionally the passwords get reset. If for some reason the domain controller thinks a member computer’s password is one thing, and the member computer thinks it’s something else, you end up with a computer that says it’s on the domain, but can’t authenticate against it. The solution is to log in with a local administrator account, then either run NTDOM.EXE from the Windows Support Tools, or remove the computer from the domain and add it back in. You can just put the computer in a workgroup, ignore the dialog box that says you have to reboot, then add it to the domain, and then reboot.