Friday, 30 December 2011

How Make Bootable pendrive ? / How to formate computer using pen drive ?


Installing Windows from a USB flash drive has several advantages – First of all, the overall speed of the installation process will increase significantly, carrying a USB stick is much more convenient than a DVD, and finally it becomes possible to install the OS even on those systems that do not have a DVD drive, such as a netbook.
In this post, I will show you how to load the Windows installation on to your USB flash drive and make it bootable just like the DVD.
Tools Required:
1. USB flash drive with a minimum capacity of 4 GB.
2. Windows 7 set-up DVD.


Step-1: Plug-in your USB flash drive and backup all the existing data in it.

Step-2: Open the command prompt. If you are using Windows 7/Vista then open it with administrator rights*.
* Goto Start -> All Programs -> Accessories -> Right-click on “Command Prompt” and select “Run as Administrator”.

Step 3: In the command prompt, type in the following command:

DISKPART

This will start the
 Microsoft DiskPart utility as shown below:

Now issue the following command:
LIST DISK

This will show you a list of  available disks on your system.
 Disk 0 is usually the hard disk. In my case, Disk 1 is the USB drive (this can be a different one in your case). Now issue the command as shown below:
SELECT DISK 1


NOTE: In the above command, 1 is the USB drive number on my system. If you have a different number on your system, then you need to replace 1 with that number.

Step-4: Now issue the following list of commands one by one as shown below:
CLEAN

CREATE PARTITION PRIMARY

SELECT PARTITION 1

ACTIVE

FORMAT FS=NTFS QUICK

ASSIGN

EXIT


Minimize the command prompt and proceed to the next step.

Step 5: Insert the Windows 7/Vista installation disc and note down the “drive letter” of your DVD drive. In my case, it is “H:”. Now type the following list of commands as shown below:
H: CD BOOT
CD BOOT
BOOTSECT.EXE /NT60 M:(NOTE: M: is your USB drive letter)
EXIT

Step-6: Copy the contents of your Windows 7/Vista installation disk into the USB flash drive.
That’s it! Your USB stick is now ready to boot and install the OS for you. Don’t forget to enable the “USB Boot” option and change the “boot priority to USB device from hard disk” in your BIOS settings.

Read more ...

What is BCC in Email ?


Almost every user on the Internet sends/receives hundreds of emails per day. However only a handful of them know what is BCC and what are the advantages of using BCC while sending an email. If you are one such Internet user who is unaware of BCC then this is the post that you should definitely read!

What is BCC?

BCC stands Blind Carbon Copy. It refers to the practice of sending an email to multiple recipients without disclosing the individual emails addresses. While sending the same email/message to multiple recipients, it is a common practice for most users to separate the email addresses by using comma or semi-colon and insert all those addresses in theTo: filed. When emails are sent in this way, each receiver is able to see the complete list of recipient email addresses to which the same message if being sent to. Unlike To:, theBCC: option allows you to hide the recipients in email messages. In other words, when emails are sent using BCC:,  the receiver will not be able to see the list of recipient email addresses. Thus using BCC is a smart way to protect the privacy of the recipients.

Why should you use BCC?

Here are the reasons for using BCC:
Privacy – BCC provides an easy and simple option for protecting the privacy of your recipients. Under many circumstances it is necessary for us send an email without letting the recipients know who else is receiving the same message. Also it is highly recommended that you use the BCC: while forwarding a joke or a funny email to a list of your friends.  If you are sending email on behalf of a business or organization, it may be especially important to keep lists of clients, members, or associates confidential. So don’t forget to use BCC: in instances wherever privacy matters.
Respect for you recipients- While forwarding email messages, people often do not bother to remove the list of previous recipients.  As a result, messages that are repeatedly sent to many recipients may contain long lists of email addresses.  This makes it easy for the spammers to collect and target those emails for spamming.
In order to avoid the risk of spammers, it is necessary that you encourage people/friends to use BCC: while forwarding any message to you. This prevents your email address from appearing in other people’s inboxes thereby keeping yourself less exposed to spammers.

How to BCC an email message?

Most email clients provide the BCC: option under a few lines below the To: field. All you have to do is just enter the list of recipients in the BCC: field instead of entering in the To:field. You may enter only your own email address in the To: field. Once you do this just hit the Send button.
The moral is that you should use BCC: while sending bulk messages so as to protect the privacy of your recipients.
Read more ...

How to Download YouTube Videos ?


YouTube is undoubtedly the most preferred website to share and watch favorite videos. Most users prefer to watch the videos online, while a few others like me, would like to download them so that, they can be saved and retained. Well, if you are one among those few who would like to download the videos from YouTube, then here is a way to do that.
In fact, there are many ways to download videos from YouTube, but here in this post, I would like to share with you one of the easiest way to do that. This can be done as follows:

1. Download and install the latest version of Internet Download Manager.
Internet Download Manager is a great add-on for your web browser which increases the download speed by 5 times. It also helps you to pause/resume and schedule your downloads. It has got a great interface and is user friendly. It works with most of the browsers including IE, Firefox, Chrome, Safari and Opera.
2. After you complete the installation, just open your browser and start searching for your favorite video on YouTube. You will see the download button on top of the video using which you can download it instantly.
3. Click on the “Download this Video” button to save the video onto your computer. The downloaded video will be in the flash video format (.flv).
4. You can use VLC Player to play the downloaded video or use SUPER to convert it to your desired format.
By using this trick, you can download almost all the buffering content on the Internet including videos from MySpace and Google. I hope you like this small post. Don’t forget to pass your comments. Enjoy 
Read more ...

How to Find Unauthorized Activity on Your Email Account ??


Here are some signs of  unauthorized activity on an email account.
1. Your new emails are marked as Read even if you’ve not read them.
2. Your emails are moved to Trash or even permanently deleted without your notice.
3. Your emails are being forwarded to a third party email address (check your settings-> forwarding).
4. Your secondary email address is changed.
If you come across any of the above activities on your email account, then it is a clear indication that your email account is hacked.

Additional Security Features in Gmail to ensure the Safety of your Account
Gmail provides an additional security feature to protect your email account through the means of IP address logging. That is, Gmail records your IP address every time you login to your Gmail account. So, if a third party gets access to your account then even his/her IP is also recorded. To see a list of recorded IP address, scroll down to the bottom of your Gmail account and you’ll see something like this.
Gmail - Last account activity
You can see from the above figure that Gmail shows the IP address of last login (last account activity). You can click on Details to see the IP address of your last 5 activities. If you find that the IP listed in the logs doesn’t belong to you, then you can suspect unauthorized activity.
Steps to be carried out to stop unauthorized activity on your email account
If you feel/suspect that your account is hacked then you must immediately take the actions mentioned below 
1. Change your Password
2. Change your security question.
2. Remove any third party email address (if any) to which your account is set to forward emails.
3. Make sure that you can access the email account of your secondary email address.
4. Also change you secondary email password and security question.
This ensures that your account is safe from future attacks. But I strongly recommend that you read the following post to protect your email account from being hacked.
Read more ...

How to Recover Hacked Email Accounts ??


For Gmail:

It can be a big disaster if your Gmail account has been compromised as it may be associated with several services like Blogger, Analytics, Adwords, Adsense, Orkut etc. Losing access to your Gmail account means losing access to all the services associated it with too. Here is a list of possible recovery actions that you can try.

Step -1: Try resetting your password since it is the easiest way to get your account back in action. In this process Google may ask you to answer the secret question or may send the password reset details to the secondary email address associated with your compromised account. You can reset you password from the following link
If you cannot find success from the Step-1 then proceed to Step-2.
Step-2: Many times the hacker will change the secret question and secondary email address right after the account is compromised. This is the reason for the Password Reset process to fail. If this is the case then you need to contact the Gmail support team by filling out the account recovery form. This form will ask you to fill out several questions like
1. Email addresses of up to five frequently emailed contacts
2. Names of any 4 Labels that you may have created in your account
3. List of other services associated with your compromised account
4. Your last successful login date
5. Account created date
6. Last password that you remember and many more…
You need to fill out this form as much accurately as possible. It is obvious to forget the dates of last login, account creation and similar terms. However you need to figure out the closest possible date/answers and fill out this form. This is your last chance! The more accurate the information filled out in the recovery form, the more the chances of getting your account back. You may reach the account recovery page form the following link

For Yahoo and Hotmail:

Unfortunately for Yahoo/Hotmail there is no second option like filling out the form or contacting the support team. All you need to do is either answer the secret questions that you have setup or reset the password using the secondary email option. 
To initiate the password reset process just click on the Forgot password link in your login page and proceed as per the screen instructions.
Read more ...

How to Recover Deleted Files from Windows ??


How to Recover Deleted Files

Have you accidentally deleted your files from the Hard disk? Do you desperately want to recover them back? Well, you need not panic!
It is possible to recover the deleted files back from the hard disk  (even after you have Shift+Deleted)  provided you act as soon as you realize that the files are deleted and use the best deleted files recovery software.
In this post you will find a detailed information on how to recover the deleted files from your Windows PC or Mac.

How Does the File Recovery Process Works?

When you delete a file from your computer, (or even from the recycle bin) the file is not actually deleted. Unlike what most people think, the file is not permanantly deleted or dropped from your hard disk even if you have deleted them from the recycle bin.
Let’s take up a small example of a book containing 50 pages. Suppose when you delete the page 25, assume that only the entry in the index which points to the page 25 is deleted and not actually the page 25 itself. Likewise, when you delete a file from your hard disk, only the pointer which points to this file is removed and not actually the file itself. This file still exists intact and is 100% possible to recover it back in the original condition. In this condition, the file becomes invisible and hence appears to have been deleted.
Recovering the deleted files 100% back in the original condition is very much dependent on the efficiency of the Data Recovery software you use. So, it is necessary to make a right choice when it comes to the selection of file recovery software.  
Today, there exists hundreds of data recovery tools and softwares on the market which boast to recover 100% of all the deleted files back in the original condition. But in reality, most of these softwares are neither effective nor capable of recovering your files back. So, when it comes to Data Recovery, I recommend the following software as the best:
Stellar Phoenix is one of the best company specializing in deleted files recovery services and solutions since 1993. Stellar’s Data Recovery Solutions encompasses a wide range of software for almost any data loss situation ranging from accidental formats to virus attacks to software malfunctions. Hence Stellar provides the best tools to recover deleted files with over 1,000,000 satisfied customers across 137 countries.

What are the Chances of Recovering my Files Back?

Since the operating system doesn’t immediately re-use the space from the deleted files, it is most certainly possible to recover the deleted files back in 100% original condition. It may take up a very long time for those files to be completely deleted since the modern hard disks have ample capacity. Hence the chances are too less that the space from the deleted files are re-used immediately.
So, it is really worth to try out the file recovery softwares like Stellar Data Recovery for Windows or Stellar Data Recover for Mac. Some files are reported to have been recovered even after years of it’s deletion. However, for the best results, it is recommended that you use the file recovery software as immediately as possible to recover your deleted files.

Recovering the Deleted Files

In order to recover the deleted files all you need to do is perform a scan (search) for the deleted files using a File Recovery Software. Please be informed that there is no manual way to recover the deleted files. The Phoenix Data Recovery software performs a thorough scanning of the hard disk sector by sector and will locate the existence of deleted files to restore them back in the original condition. It is the only software that supports 185 popular file types including Windows NT Registry, JPEG, MP4, GIF, BMP and MS Word files. The software offers rich graphical support and incorporates advanced scanning methods to completely scan and recover deleted files from your hard drive. With this recovery software, it is possible to
  • Recover FAT16, FAT32, VFAT, NTFS, and NTFS5 file system partitions
  • Recover deleted emails
  • Recover deleted documents
  • Recover deleted photos
  • Recover deleted music
  • Formatted Hard-Drive recovery
  • Recover files from USB Drives, CDs, DVDs and memory cards
  • Recover almost all the camera format files
Visit the following links for more information on Stellar Data Recovery
Read more ...

How to Hide Data in Image, Audio & Video Files ?


Ever wondered to know how to hide secret messages in images, audio and video files? Well, in this post I will take you through a concept called steganography using which, it is possible to hide your secret information in image files, songs or any other file of your choice. At the end of this post, you can also download free stegnographic tools and start hiding your data.

What is Steganography?

Steganography is a means of obscuring data where secret messages are hidden inside computer files such as images, sound files, videos and even executable files so that, no one except the sender and the receiver will suspect the existence of stealth information in it. Steganography may also involve the usage of cryptography where the message is first encrypted before it is concealed in another file. Generally, the messages appear to be something else such as an image, sound or video so that the transfer of secret data remains unsuspected.

The main advantage of steganography over other methods such as cryptography is that, it will not arose suspicion even if the files fall in the hands of a third party. Unlike cryptographic messages, stegnographic messages will no way attract the attention of a third party by themselves. Thus stegnanography has an upper hand over cryptography as it involves both encryption and obscurity.

What are the Applications of Steganography?

Steganography is mainly used to obscure confidential information/data during storage or transmission. For example, one can hide a secret message in an audio file and send this to another party via email instead of sending the message in the textual format. The receiver on the other end will decrypt the hidden message using the private decryption key. In a worst case scenario, even if a third party does manage to gain access to the email, all he can find is the audio file and not the hidden data inside it. Other usage of steganography include digital watermarking of images for reasons such as copyright protection.
Eventhough steganography has many useful applications, some may use this technique for illegitimate purposes such as hiding a pornographic content in other large files. Roumors about terrorists using steganography for hiding and communicating their secret information and instructions are also reported. An article claiming that, al-Queda had used steganography to encode messages in images and transported them via e-mails, was reported by New York Times, in October 2001.

How do Steganography Tools Work?

Stegnography tools implement intelligent algorithms to carefully embed the encrypted text messages or data inside other larger files such as an image, audio, video or an executable file. Some tools will embed the encrypted data at the end of another file so that there will be enough room for storing larger data.
There are many steganography tools available online but only a few are able to work flawlessly. I did not find any tool that worked perfectly on both small and large data. However I have  managed to develop my own tool that can work perfectly on all types of files and all size of data. The tool is called “Stego Magic“. You can download it from the following link.
The zip file contains two versions of Stego Magic: One for encrypting the text messages and the other for encrypting binary files. StegoMagic_TXT can be used to hide text messages in other files such as an image or a sound file. StegoMagic_BIN can be used to hide one binary file in another such as an executable file inside an image or an image inside a video file.
With Stego Magic, there is no limitation on the size and type of the file that you are intending to hide. For example, you can hide a video of size 1 GB in an image of size 1 MB or hide an executable file inside a WORD document. The tool is pretty straightforward to use and requires no special understanding of the concept.
At the end of the encryption process, a secret decryption key will be generated and the same is required during the decryption process.

How to Use Stego Magic?

Suppose you want to hide a text message inside a JPG file:
1. Place the JPG and the text file (.txt) in the same folder as that of StegoMagic_TXT.exe
2. Run StegoMagic_TXT.exe and follow the screen instructions to embed the text message inside the JPG image.
3. Note down the secret decryption key.
Now you can send this image to your friend via email. To decrypt the hidden message, your friend should load this JPG file onto the Stego Magic tool and use the secret decryption key.
Read more ...

Book Online Aakash Tablet

Read more ...

Thursday, 15 December 2011

How to Change Product id in windows ?


If you are running a Microsoft Windows operating system on your computer, then you are most likely aware of the fact that your PC will have a Product ID. This Product ID is a system specific alphanumeric code which is derived/calculated based on the Windows product key you use and the hardware configuration of your Computer. In simple words, Product ID is the alphanumeric code that you see when you Right-Click on the My Computer icon and select the Properties option.


It is possible to alter the Windows Product ID and change it to what ever you like. For example, you can change the Product ID and put your nickname in place of the formal Product ID displayed by the Operating System. This hack is too easy and can be done within minutes. The screenshot showing the altered Product ID is given below
Win 7 PC showing Original PID
Win 7 Product ID (Unaltered)
Windows 7 PC showing Altered PID

As you can see from the above screenshot it is simple and easy to make your Windows display what ever you want in the place of the real Product ID. Here is a step-by-step procedure to alter your Windows Product ID.
1. Goto Start->Run and type the following in the Run dialog box
regedit
2. After you open the Registry Editor, navigate to the following key
HKey_Local_Machine\Software\Microsoft\Windows NT\Current Version
3. On the right hand side, you can see an entry by name ProductID listed under the heading Name.
4. Double-Click on ProductID, a dialog box will pop-up showing your Windows PID. Now you can delete the original PID and enter anything of your choice.
5. Once you are done, just click on OK and close the Registry Editor. Now you can see the altered Product ID in the Windows Properties window.
Read more ...

How to Change the Logon Screen Background in Windows 7 ??


How would you like to change the logon screen background in Windows 7 so as to give your Windows a customized look and feel? With a small tweak it is possible to customize the Windows 7 logon screen and set your own picture/wallpaper as the background. Changing logon screen background in Windows 7 is as simple as changing your desktop wallpaper. Well here is a step by step instruction to customize the logon screen background.

1. The image you need to set as the background should be a .jpg file and it’s size should not exceed 245KB.
2. The image resolution can be anything of your choice. However I prefer 1440 x 900 or1024 x 768. You can use any of the photo editing software such as Photoshop to compress and set the resolution for your image. Once you’re done, save this image as backgroundDefault.jpg.
3. You will need to copy this image to
C:\Windows\system32\oobe\info\backgrounds
You will need to create that path if it does not already exist on your computer.
4. Now open the Registry Editor (Start -> Run -> Type regedit) and navigate to the following key

HKLM\Software\Microsoft\Windows\CurrentVersion\Authentication\
LogonUI\Background
If Background does not exist rightclick LogonUI, select New and then Key, and then name it Background. Now locate OEMBackground (listed on the right side). If it does not exist, right-click Background and select New and then DWORD and name it OEMBackground.
5. Double-click on OEMBackground and set the Value Data to 1.
6. Now log-off to see the new logon screen background. If you would like to revert back to the default background, just set the Value Data back to 0.
Read more ...

Tips n tricks for Windows Xp


XP Secret

Easter Eggs (Definition) - A hidden message or feature in an application. This guide covers the undocumented and hidden features in Windows XP. All of the following were tested in Windows XP only.


Defrag
Secret - Hidden Command Line Switch
Instructions - Go to "Start", "Run" and Type defrag c: -b to defragment the Boot and Application Prefetch information.



Notes - Windows XP will run this automatically every three days or so, during system idle periods. BootVis will evoke this when you run the "Optimize System" function. There is no need to manually run this unless you wish to immediately optimize a newly installed application's load time.


IExpress
Secret - Hidden Install Creator
Instructions - Go to Start, Run, type iexpress 


Notes - IExpress is a technology designed to simplify creation of a setup program. Using the step-by-step IExpress Wizard, you can create self-extracting files that automatically run the setup program contained inside. The setup program can be an .inf file or an executable program. IExpress technology automatically removes the setup files after installation, saving the user time and frustration.






Netmeeting
Secret - Hidden Internet Conference Application
Instructions - Go to Start, Run, type conf 


Notes - Windows XP is the last version of Microsoft Windows to include NetMeeting. NetMeeting delivers a complete Internet conferencing solution for all Windows users with multi-point data conferencing, text chat, whiteboard, and file transfer, as well as point-to-point audio and video.



Notepad
Secret - Create a Log File
Instructions - Launch Notepad, Type .LOG on the first line, and then press Enter to move to the next line. On the File menu, click Save As, type a descriptive name for your file in the File name box, and then click OK. When you next open the file, note that the date and time have been appended to the end of the log, immediately preceding the place where new text can be added. You can use this functionality to automatically add the current date and time to each log entry.






Paint
Secret - Image Trails
Instructions - Open an image and hold down Shift then drag the image around to create an image trail.


Secret - 10x Zoom
Instructions - Open an image and select the magnifying glass icon. Left-Click exactly on the line below the 8x.


Private Character Editor
Secret - Hidden Font Editor
Instructions - Go to Start, Run, type eudcedit 

Notes - You can use Private Character Editor to create unique letters and logos for your font library.






Windows Media Player 6.4
Secret - Hidden Windows Media Player
Instructions - Go to Start, Run, type mplayer2 
Notes - Windows Media Player 6.4 (Classic) is installed along with Windows Media Player 7. The only update is that it now supports the latest codecs.



GAME SECRETS

FreeCell

Secret - Instant Win
Instructions - Hold down Ctrl + Shift + F10 during game play. Then you will be asked if you want to Abort, Retry or Ignore. Choose Abort, then move any card to instantly win.




Secret - Hidden Game Modes
Instructions - In the "Game" menu choose "Select Game". Enter -1 or -2 to activate the hidden game modes.



Hearts 

Secret - Show All Cards
Instructions - Edit this registry key: HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Applets\Hearts and create a new String value named ZB with a Data value of 42. Start Hearts and Press Ctrl + Alt + Shift + F12 to show all the cards.



Background - This secret is a reference to Douglas Adams' book the Hitch Hiker's Guide to the Galaxy. 'ZB' is the initials of the character Zaphod Beeblebrox, the Galactic President. '42' is the answer to The Ultimate Question Of Life, the Universe and Everything.



Minesweeper

Secret - Reveal Mines


Instructions - Minimize or close all running applications. Launch Minesweeper, then type xyzzy. Next hold down either shift key for one second. Now when you move the mouse cursor over a Minesweeper square you will see a tiny white pixel in the top left corner of your desktop screen. This pixel will change to black when your mouse moves over a mine. You may need to change you desktop background to a solid color other then white or black to see the pixel.



Secret - Stop Timer


Instructions - Launch Minesweeper and start a game so the timer starts counting, then press the Windows Key + D to show the desktop. Now when you select minesweeper from the taskbar you can continue playing with the timer stopped.



Pinball 



Secret - Extra Balls
Instructions - Type 1max at the start of a new ball to get extra balls.

Secret - Gravity Well
Instructions - Type gmax at the start of a new game to activate the Gravity Well.


Secret - Instant Promotion
Instructions - Type rmax at the start of a new game to go up in ranks.


Secret - Skill Shot
Instructions - Launch the ball partially up the chute past the third yellow light bar so it falls back down to get 75,000 points. There are six yellow light bars that are worth a varying amount of points:
First: 15,000 points
Second: 30,000 points
Third: 75,000 points
Fourth: 30,000 points
Fifth: 15,000 points
Sixth: 7,500 points


Secret - Test Mode
Instructions - Type hidden test at the start of a new ball to activate Test Mode. No notification will be given that this is activated but you can now left-click the mouse button and drag the ball around. While in test mode press the following keys for more secrets:
H - Get a 1,000,000,000 High Score
M - Shows the amount of system memory
R - Increases your rank in game
Y - Shows the Frames/sec rate


Secret - Unlimited Balls

Instructions - Type bmax at the start of a new ball. No notification will be given that this is activated but when a ball is lost a new ball will appear from the yellow wormhole indefinitely. Once this is activated you will be unable to activate other secrets without restarting the game.


Solitaire 
Secret - Instant Win

Instructions - Press Alt + Shift + 2 during game play to instantly win.

Secret - Draw single cards in a Draw Three game

Instructions - Hold down CTRL + ALT + SHIFT while drawing a new card. Instead of drawing three cards you will only draw one.

OS SECRETS

Add/Remove

Secret - Hidden Uninstall Options

Instructions - Warning: Proceed at your own risk! Browse to C:\Windows\inf\ and make a backup copy of sysoc.inf. Then open the original file C:\Windows\inf\sysoc.inf in notepad. Go to "Edit" and select "Replace". In "Find what:" type ,hide and in "Replace with:" type , then select "Replace All", save and close the file. Go to the "Control Panel", "Add/Remove", select "Add/Remove Windows Components". You will now see many more Windows components to uninstall. Do not remove anything with no label or that you do not recognize or fully understand what it does. Doing so can break certain functionality in Windows.

Control Panel

Secret - Hidden Control Panel Extensions

Instructions - Download and install TweakUI, launch, go to "Control Panel" and check any item not selected, then "Apply" and "OK". You will now see the hidden control panel extensions.


Device Manager

Secret - Hidden Devices

Instructions - Go to the "Control Panel", "System" icon, "Hardware" tab and select "Device Manager". Select "View" and Show hidden devices.

Secret - Phantom Devices

Instructions - Go to "Start", "Programs", "Accessories" and select "Command Prompt". At the command prompt, type "set devmgr_show_nonpresent_devices=1" and press Enter. At the command prompt, type "start devmgmt.msc" and press Enter. Select "View" and Show hidden devices. You can see devices that are not connected to the computer. - Source

Notes - When you close the command prompt window, Windows clears the "devmgr_show_nonpresent_devices=1" variable that you set and prevents phantom devices from being displayed when you select "Show hidden devices".

Music

Secret - Music from the Installer


Instructions - Browse to C:\Windows\system32\oobe\images\title.wma and play.

Notes - "OOBE" stands for "Out-of-Box Experience". 

Shutdown

Secret - Display Hibernate Option on the Shut Down dialog

Instructions - Go to "Start", "Turn Off Computer..." and press either Shift key to change the "Stand By" button to "Hibernate".
Read more ...