Ritesh’s Technical Blog

Posts Tagged ‘ritesh


You have often used text to speech converters software or may be right now you are using it to read this article (if you have a good one!). But have you ever thanked about it, I mean how it works? You will probably say it is simple, there must be a file which contains already spoken up words and these files have certain numbers, when a particular text is meant to be spoken up a logic runs and trace out the file that may be a wav file and run it and this is how a T2S works.

Or may be you have not even think about it, but for those developers who wanna know how this happens I’ll describe you in this article, this document will give you a technical overview of text-to-speech so you can understand how it works, and better understand some of the capabilities and limitations of the technology.

Text-to-speech fundamentally functions as a pipeline that converts text into PCM digital audio. The elements of the pipeline are:

  • Text normalization
  • Homograph disambiguation
  • Word Pronunciation
  • Prosody
  • Concatenate wave segments

I’ll cover each of these steps individually

Text Normalization

Text Normalization it is that part of text-to-speech program that converts any input text into a series of spoken words. At basic level, text normalization converts a string like “My name is Ritesh” to a series of words, “My”, “name”, “is”, “Ritesh”, along with a marker indicating that a period occurred (a comma). However, this gets more complicated when strings like “John rode home at 23.5 mph”, where “23.5 mph” is converted to “twenty three point five miles per hour”. Here’s how text normalization works:

First, text normalization isolates words in the text. For the most part this is as minor as looking for a sequence of alphabetic characters, allowing for an occasional apostrophe, space and hyphen.

Text normalization then searches for numbers, times, dates, and other symbolic representations. These are analyzed and converted to words. (Example: “$54.32” is converted to “fifty four dollars and thirty two cents.”) Someone needs to code up the rules for the conversion of these symbols into words, since they differ depending upon the language and context.

Next, abbreviations are converted, such as “in.” for “inches”, and “St.” for “street” or “saint”. The normalizer will use a database of abbreviations and what they are expanded to. Some of the expansions depend upon the context of surrounding words, like “St. John” and “John St.”

The text normalizer might perform other text transformations such as internet addresses. “http://www.Microsoft.com” is usually spoken as “w w w dot Microsoft dot com”.

Whatever remains is punctuation. The normalizer will have rules dictating if the punctuation causes a word to be spoken or if it is silent. (Example: Periods at the end of sentences are not spoken, but a period in an Internet address is spoken as “dot.”)

The rules will vary in complexity depending upon the engine.

Homograph Disambiguation

So by reading till here you were wondering that all of the main task has happened but dude there are other things also whose care must be take otherwise your text to speech wont work efficiently. This stage mainly deals with pronunciation of words.

Actually it’s not a stage by itself, but is combined into the text normalization or pronunciation components. I’ve separated homograph disambiguation out since it doesn’t fit cleanly into either.

In English and many other languages, there are hundreds of words that have the same text, but different pronunciations. A common example in English is “read,” which can be pronounced “reed” or “red” depending upon its meaning. A “homograph” is a word with the same text as another word, but with a different pronunciation. The concept extends beyond just words, and into abbreviations and numbers. “Ft.” has different pronunciations in “Ft. Wayne” and “100 ft.”. Likewise, the digits “1997” might be spoken as “nineteen ninety seven” if the author is talking about the year, or “one thousand nine hundred and ninety seven” if the author is talking about the number of people at a concert.

So the above procedure is quite tough how a computer could knows that when to pronounce “read” as “reed” or as “red”. One way is by judging what out what the text is actually talking about and decides which meaning is most appropriate given the context. Once the right meaning is know, it’s usually easy to guess the right pronunciation.

Text-to-speech engines figure out the meaning of the text, and more specifically of the sentence, by parsing the sentence and figuring out the part-of-speech for the individual word (see how complicated it is, do you remember how many part of speech are there?). This is done by guessing the part-of-speech based on the word endings, or by looking the word up in a lexicon. Sometimes a part of speech will be ambiguous until more context is known, such as for “read.” Of course, disambiguation of the part-of-speech may require hand-written rules.

Once the homographs have been disambiguated, the words are sent to the next stage to be pronounced.

Word Pronunciation

The pronunciation module accepts the text, and outputs a sequence of phonemes, just like you see in a dictionary.

To get the pronunciation of a word, the text-to-speech engine first looks the word up in it’s own pronunciation lexicon. If the word is not in the lexicon then the engine reverts to “letter to sound” rules.

Now what is Letter-to-sound rules, it guess the pronunciation of a word from the text. They’re kind of the inverse of the spelling rules you were taught in school. There are a number of techniques for guessing the pronunciation, but the algorithm described here is one of the more easily implemented ones.

The letter-to-sound rules are “trained” on a lexicon of hand-entered pronunciations. The lexicon stores the word and it’s pronunciation, such as:

hello h eh l oe

An algorithm is used to segment the word and figure out which letter “produces” which sound. You can clearly see that “h” in “hello” produces the “h” phoneme, the “e” produces the “eh” phoneme, the first “l” produces the “l” phoneme, the second “l” nothing, and “o” produces the “oe” phoneme. Of course, in other words the individual letters produce different phonemes. The “e” in “he” will produce the “ee” phoneme.

Once the words are segmented by phoneme, another algorithm determines which letter or sequence of letters is likely to produce which phonemes. The first pass figures out the most likely phoneme generated by each letter. “H” almost always generates the “h” sound, while “o” almost always generates the “ow” sound. A secondary list is generated, showing exceptions to the previous rule given the context of the surrounding letters. Hence, an exception rule might specify that an “o” occurring at the end of the word and preceded by an “l” produces an “oe” sound. The list of exceptions can be extended to include even more surrounding characters.

When the letter-to-sound rules are asked to produce the pronunciation of a word they do the inverse of the training model. To pronounce “hello”, the letter-to-sound rules first try to figure out the sound of the “h” phoneme. It looks through the exception table for an “h” beginning the word followed by “e”; Since it can’t find one it uses the default sound for “h”, which is “h”. Next, it looks in the exceptions for how an “e” surrounded by “h” and “l” is pronounced, finding “eh”. The rest of the characters are handled in the same way.

This technique can pronounce any word, even if it wasn’t in the training set, and does a very reasonable guess of the pronunciation, sometimes better than humans. It doesn’t work too well for names because most names are not of English origin, and use different pronunciation rules. (Example: “Mejia” is pronounced as “meh-jee-uh” by anyone that doesn’t know it is Spanish.) Some letter-to-sound rules first guess what language the word came from, and then use different sets of rules to pronounce each different language.

Word pronunciation is further complicated by people’s laziness. People will change the pronunciation of a word based upon what words precede or follow it, just to make the word easier to speak. An obvious example is the way “the” can be pronounced as “thee” or “thuh”. Other effects including the dropping or changing of phonemes. A commonly used phrase such as “What you doing?” sounds like “Wacha doin?”

Once the pronunciations have been generated, these are passed onto the prosody stage.


Now you will be thinking its all over but “kahani abhi baki hai dost” Now since you are able to pronounce the word but by merely pronouncing the word is not sufficient you need to speak in a tone, in a speed and other factors are also involved in a speech. This section will deals with all these factors.

Prosody is the pitch, speed, and volume that syllables, words, phrases, and sentences are spoken with. Without prosody text-to-speech sounds very robotic, and with bad prosody text-to-speech sounds like it’s drunk.

The technique that engines use to synthesize prosody varies, but there are some general techniques.

First, the engine identifies the beginning and ending of sentences. In English, the pitch will tend to fall near the end of a statement, and rise for a question. Likewise, volume and speaking speed ramp up when the text-to-speech first starts talking, and fall off on the last word when it stops. Pauses are placed between sentences.

Engines also identify phrase boundaries, such as noun phrases and verb phrases. These will have similar characteristics to sentences, but will be less pronounced. The engine can determine the phrase boundaries by using the part-of-speech information generated during the homograph disambiguation. Pauses are placed between phrases or where commas occur.

Algorithms then try to determine which words in the sentence are important to the meaning, and these are emphasized. Emphasized words are louder, longer, and will have more pitch variation. Words that are unimportant, such as those used to make the sentence grammatically correct, are de-emphasized. In a sentence such as “John and Bill walked to the store”, the emphasis pattern might be “JOHN and BILL walked to the STORE.” The more the text-to-speech engine “understands” what’s being spoken, the better it’s emphasis will be.

Next, the prosody within a word is determined. Usually the pitch and volume rise on stressed syllables.

All of the pitch, timing, and volume information from the sentence level, phrase level, and word level are combined together to produce the final output. The output from the prosody module is just a list of phonemes with the pitch, duration, and volume for each phoneme.

Play Audio

The speech synthesis is almost done by this point. All the text-to-speech engine has to do is convert the list of phonemes and their duration, pitch, and volume, into digital audio.

Methods for generating the digital audio will vary, but many text-to-speech engines generate the audio by concatenating short recordings of phonemes. The recordings come from a real person. In a simplistic form, the engine receives the phoneme to speak, loads the digital audio from a database, does some pitch, time, and volume changes, and sends it out to the sound card.

It isn’t quite that simple for a number of reasons.

Most noticeable is that one recording of a phoneme won’t have the same volume, pitch, and sound quality at the end, as the beginning of the next phoneme. This causes a noticeable glitch in the audio. An engine can reduce the glitch by blending the edges of the two segments together so at their intersections they both have the same pitch and volume. Blending the sound quality, which is determined by the harmonics generated by the voice, is more difficult, and can be solved by the next step.

The sound that a person makes when he/she speaks a phoneme, changes depending upon the surrounding phonemes. If you record “cat” in sound recorder, and then reverse it, the reversed audio doesn’t sound like “tak”, which has the reversed phonemes of cat. Rather than using one recording per phoneme (about 50), the text-to-speech engine maintains thousands of recordings (usually 1000-5000). Ideally it would have all possible phoneme context combinations recorded, 50 * 50 * 50 = 125,000, but this would be too many. Since many of these combinations sound similar, one recording is used to represent the phoneme within several different contexts.

Even a database of 1000 phoneme recordings is too large, so the digital audio is compressed into a much smaller size, usually between 8:1 and 32:1 compression. The more compressed the digital audio, the more muted the voice sounds.

Once the digital audio segments have been concatenated they’re sent off to the sound card, making the computer talk.

Generating a Voice

You might be wondering, “How do you get thousands of recordings of phonemes?”

The first step is to select a voice talent. The voice talent then spends several hours in a recording studio reading a wide variety of text. The text is designed so that as many phonemes sequence combinations are recorded as possible. You at least want them to read enough text so there are several occurrences of each of the 1000 to 5000 recording slots.

After the recording session is finished, the recordings are sent to a speech recognizer which then determines where the phonemes begin and end. Since the tools also know the surrounding phonemes, it’s easy to pull out the right recordings from the speech. The only trick is to figure out which recording sounds best. Usually an algorithm makes a guess, but someone must listening to the phoneme recordings just to make sure they’re good.

The selected phoneme recordings are compressed and stored away in the database. The result is a new voice.

Wrapping up

This was a high level overview of how text-to-speech works. Most text-to-speech engines work in a similar manner, although not all of them work this way. The overview doesn’t give you enough detail to write your own text-to-speech engine, but now you know the basics. If you want more detail you should purchase one of the numerous technical books on text-to-speech.



Whole article is somewhat modified to make it more interesting and easier to read.

The article is taken from Microsoft’s text to speech SDK.

Partially compiled & edited by – Ritesh Kawadkar


Download our free tools bar to get latest update without even visiting our website.


Download it from here


C. My Computer

1. Remove Shared Documents and My Documents Folder

2. Prevent access to certain drive
3. Remove Shared Folder
4. Add Recycle Bin in My computer
5. Hide drives in my Computer
6. Remove properties option from my computer
7. Invisible Folder and Drive
8. Remove Compression Option In Disk Cleanup


1. Remove Shared Documents and My Documents Folder

Want to remove Shared Documents and My Documents folder from My Computer here is the way how you can get rid of it.
1. Open Regedit. (type Regedit in RUN dialog box)
2. Navigate to

3. And delete the subkey

Hate editing Registry so here’s a simple and clean way
1. Open Group Policy Editor. (Type gpedit.msc in RUN dialog box)
2. Navigate to User Configuration>Administrative Templates>Windows
Components> Windows Explorer.

3. On the right pane double click on option Remove Shared Documents folder
from My Computer and Enable it.

2. Prevent access to certain drive

This is an ultimate restriction if you want that no one access you’re hard drives accept you than it is what you are looking for. This tweak will disable access to your drives even their contents are not visible by using dir command or by using search.
Navigate to
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Polici es\Explorer
And to
Policies \Explorer

Here create a new DWORD named NoViewOnDrive and set its value to 4(in dec) if you want to restrict your C drive.

For restricting other drives set the value accordingly

A 1
B 2
C 4
D 8
E 16
F 32
G 64
H 128
I 256
J 512
K 1024
L 2048
M 4096
N 8192
0 16384
P 32768
Q 65536
R 131072
S 262144
T 524288
U 1048576
V 2097152
W 4194304
X 8388608
Y 16777216
Z 33554432
ALL DRIVES 67108863

FOR EG: To hide drive C and D, you would add 4(for C) and 8(for D) which would be 12 and then set the value of NoViewOnDrive to 12 in order to restrict drives C and D.


Go to
User Configuration> Administrative Template> Windows Component> WindowsExplorer

And double click on Prevent access to drives from My Computer and Enable it and select the drives you want to prevent

3. Remove Shared Folder

To remove the Shared Documents folder follow the given steps
1. Open Regedit. (Type Regedit in RUN dialog box)
2. Navigate to

3. On right pane create a Binary value named NoSharedDocuments and set its
value to 1, to revert back just delete the key

4. Add Recycle Bin in My computer

To add recycle bin in My Computer go to

Create a subkey named {645FF040-5081-101B-9F08-00AA002F954E} under NameSpace

Complete path would like this

Explorer\MyComputer\NameSpace\ {645FF040-5081-101B-9F08-

And you will have Recycle Bin in you’re my Computer

5. Hide drives in my Computer

To hide drives in My Computer navigate through


And create a DWORD and name it NoDrives and give it value 03ffffff (in hex)

To revert back, just delete the following DWORD created.

6. Remove properties option from my

This tweak hides the system properties screen and remove the properties option from my computer.
Navigate to

And to

Create a new DWORD value in both locations called NoPropertiesMyComputer.
Set its value to 1 to hide the properties option.

7. Invisible Folder and Drive

Yes, it is possible to create invisible drives that remain there only but nobody can see it.

The idea of creating this invisible drive struck my mind when I came to knew how to create an invisible folder. So I must first tell you how to create an invisible folder. To create invisible folders first create a folder say “Ritesh”. Now right click on the folder and select Rename.

Now while pressing ALT click 0160 (ALT+0+1+6+0) and hit enter. You will get a folder with no name. So our half process is done now you need to hide the folder to hide it right click the folder and click on

Properties > customize > change icon

Now look for an empty space in the change icon dialog box and click on it and then click ok.
Now you are done!

You will have an invisible folder.

So you have created an invisible folder. Now, after creating invisible folder the idea of making
invisible hard drive is quite simple
The only 2 problem are that
1. How to change drive icons.
2. How to remove drive letters.

First, rename the drive that you want to hide by the method given above for folders. Then follow
these steps
1. To change drive icons navigate to
HKLM > Software > Microsoft > Windows > CurrentVersion > Explorer
Create a new key DriveIcons

In this key again create a key named C (Drive letter of the drive which you want to hide)
In this key again create a key name it DefaultIcon

Now the path will be

HKLM > Software > Microsoft > Windows > CurrentVersion > Explorer> DriveIcons > C> DefaultIcon

On the right pane you will find a string named Default double click the string and enter the full path of the blank icon in it which is
This is the path of blank icon.

2. Now we have hided the drive icon now to hide drive letter from appearing navigate to

HKLM > Software > Microsoft > Windows > CurrentVersion > Explorer

Now on the right pane create a DWORD name it ShowDriveLettersFirst and give it the value 2

Now Logoff/Logon your system to see the changes you have made.

8. Remove Compression Option In Disk Cleanup

Go to-
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Compress old files

Delete the Default Value Key and the next time you start Disk Cleanup, it will skip
the compression analysis


Download our free tools bar to get latest update without even visiting our website.


Download it from here

B. Folders

1. Add Command Prompt Option to Every

2. Folder Pictures in Thunbnail View
3. Thumbnail size and Quality
4. Customize “New Folder” and “New Shortcut” Text
5. Locking every Folder
6. Disable the Folder Option menu
7. Windows forgets your Folder settings
8. Add copy to/Move to at right click
9. Disable Thumbnail caching
10. Locking a particular folder
11. Invisible Folder
12. ZIP files are not Folders
13. Applying Background to any folder
14. Remove shortcut arrow
15. WIN+E single pane
16. Add copy to/Move to at right click
17. Disable Thumbnail caching


1. Add Command Prompt Option to Every

To add Command Prompt Option to every folder right click menu do the following
1. Open Regedit. (type Regedit in RUN dialog box)
2. Navigate to HKEY_CLASSES_ROOT\Directory\shell
3. Create a key named Command under shell
4. So that the path would be
5. On the right pane double click on default and set its value to Command
6. Now create a key named command under Command
7. So that the path would be
8. On the right pane double click on default and set its value to cmd.exe /k cd%1
just copy paste the following code In notepad and save it as cmd.reg
Windows Registry Editor Version 5.00
“”=”Command Prompt”
“”=”cmd.exe /k cd %1”

2. Folder Pictures in Thunbnail View

We all know that images within a folder show up in Thumbnail view of the folder.
You can manually set only one picture to show up by going to
Properties>Customize>Choose Picture.
You can do this by another way also, let say you have a Folder having a lot of
picture to show a picture in thumbnail view just RENAME the PICTURE to
and you are Done!!!

3. Thumbnail size and Quality

To increase/decrease the thumbnail size and quality just open Regedit and
navigate to
Now create two DWORD value named
ThumbnailSize and ThumbnailQuality and give their value as you wants. I
recommend ThumbnailSize=225 (decimal) and ThumbnailQuality=100 (decimal)

4. Rename New Folder

Whenever you create a new folder or a new shortcut the default name of that folder is “New Folder” or a “New shortcut” in case you created a shortcut.
In this tutorial i will show that how you can change the name of these two entries permanently, so that whenever you create a new folder you will can see your desired text.

What you need?
1. For this tutorial we need a software called Resource hacker which is freely available. Just download the software from here
2. After tweaking your system file you need to replace your system file with your modded file for that download Replacer

How to do?
1. Open “%windir%\System32\Shell32.dll” file in Resource Hacker and go to:
String Table -> 1896


2. Now in the right-side pane, you will see default “New Folder” and “New Shortcut” strings.


3. All you need to do is to replace the default string with your desired string and click Compile script at the end.


4. Then save the file as Shell32.dxx on desktop

5. Now open replacer >

6. Drag the original shell32.dll on it and press enter

7. when it ask for replcement file drag the file Shell32.dxx which you saved and hit enter

8. you need to restart your system to see changes.

5. Locking every Folder

To lock every folder so that no one can navigate in any of your computer open
Regedit and go to
And rename the subkey Shell to Shell._

6. Disable the Folder Option menu

To disable Folder Options navigate to
And to
Here, create the DWORD named NoFolderOptions
And set its value to 1(decimal) to hide the Folder Options. Reset it to 0(decimal) to enable Folder Options.

7. Windows forgets your Folder settings

Windows sometimes forgets your folder customizations i.e. whether folders are in thumbnail view, list view or in any other view their positions etc. This happens because windows by default can remember settings of 400 (in some cases it is 5000) folders only and as the 400 mark is reached it forgets the older settings.

Here’s how you can increase folder no
Navigate to
And to
And edit the value of DWORD value named BagMRU Size to any no maximum is 8000 (in decimal)

8. Add copy to/Move to at right click

Navigate to
Create a new key here called Copy To
So the path would look like this
Copy To

and set its default value to
Similarly, Create a new key called Move To under ContextMenuHandlers
So the path would look like this
Move To

And set its value to

9. Disable Thumbnail caching

Navigate to
Set the DWORD value names DisableThumbnailCache to 1
ClassicViewState to 1

10. Locking a particular folder

Let suppose you have a folder named Secret to lock this folder renames this folder
to Secret. {645FF040-5081-101B-9F08-00AA002F954E} this will convert the folder
into Recycle bin now if someone tries to open this folder he will see the contents of
recycle bin.
Similarly you can convert any folder into the following special folder by just
renaming the folder
Media Clip {00022602-0000-0000-C000-000000000046}
Cabinet File {0CD7A5C0-9F37-11CE-AE65-08002B2E1262}
Taskbar and Start Menu {0DF44EAA-FF21-4412-828E-260A8728E7F1}
My Network Places {208D2C60-3AEA-1069-A2D7-08002B30309D}
My Computer {20D04FE0-3AEA-1069-A2D8-08002B30309D}
Recycle Bin {645FF040-5081-101B-9F08-00AA002F954E}
Folder Option {6DFD7C5C-2451-11d3-A299-00C04F8EF6AF}
Network Connection {7007ACC7-3202-11D1-AAD2-00805FC1270E}

To unlock
Open Notepad and type the following as it is and save the file as unlock.bat
Ren Secret. {645FF040-5081-101B-9F08-00AA002F954E} Secret
And that’s it your folder will be unlocked.

11. Invisible Folder

To hide a folder select the folder and press F2 now press SPACE BAR and type [ALT]
+ 0160 and then press Enter.
Now, Go to Folder Properties >Customize and click on change icon
In the change Icon dialog box scroll for a blank space, select it and click Ok.
You are done!

12. ZIP files are not Folders

When you search for folders using windows search Zip files also comes in it. To make windows not to treat zip files as folder
Open RUN
Type regsvr32 /u zipfldr.dll

13. Applying Background to any folder

1. You need to first make your folder a system folder for that open Command Prompt and set folder attribute to “system”. For e.g. there is a folder “Ritesh” in “D:” drive, in which you want to set a wallpaper as background image. To do that open Command Prompt and type:

attrib +s D:\Ritesh

It’ll change the attribute to “system”.

2. Now open Notepad and paste following code:

{BE098140-A513-11D0-A3A4-00C04FD706EC} = {BE098140-A513-11D0-A3A4-00C04FD706EC}


Now change “Actualpathof_the_wallpaper” to the exact path of the wallpaper which you want to set as background. Suppose the wallpaper is located in “E:\Images\Ganesh.jpg”, then the above code will be set to:

{BE098140-A513-11D0-A3A4-00C04FD706EC} = {BE098140-A513-11D0-A3A4-00C04FD706EC}


“IconArea_Text” is the text color, you can also change the text color for a particular folder (default is Black). You just need to place the code in “IconArea_Text” section. Some of the color codes are as follows:

Black – 0x00000000
White – 0x00FFFFFF
Green – 0x0000FF00
Blue – 0x00FF0000
Purple – 0x00C000C0
Red – 0x000000FF
Yellow – 0x0000FFFF
Indigo – 0x00FFFF00

3. Now save the file with name “Desktop.ini” (including quotes) in “D:\Ritesh” as in our e.g.

4. Now when you open your folder you will see backround in your folder

14. Remove shortcut arrow

For removing shortcut arrow from icons, folder and drives go to
In the right pane create a new string value named 29. Double click on 29 and set
its value to
Now, right click on the desktop & click Properties>Appearance>Advanced from
drop down menu choose icon. Set its size to 31 and press OK.
NOTE: If default size of icon is 31 then change it to 32

15. WIN+E single pane

What happens when you press WIN+E?
Yes explorer opens but it has a two pane layout
You can tweak registry to make explorer open in single pane layout for that
navigate to
Here modify the default key and change its value to [ViewFolder(“%l”, %I, %S)]
with brackets.
To revert back the setting change the value to [ExploreFolder(“%l”, %I, %S)]


Download our free tools bar to get latest update without even visiting our website.


Download it from here


A. Mouse and Keyboard

1. Turn ON Your PC on mouse or Keyboard 1 click
2. Know your BIOS
3. Disable Windows Shortcut Key
4. Swap Ctrl + Alt + Del functioning
5. Change the Default NumLock State
6. Define keys on your Keyboard different functions
7. Windows key combination
8. Cursor’s Blink Rate
9. Swap Mouse Buttons


1. Turn ON Your PC on mouse or Keyboard 1 click

If you want to start up PC by just 1 right click of your mouse or 1 touch of Keyboard do the following-

1. Start your computer
2. Press DEL button to enter BIOS
3. Click on Power Management Setup
4. Then Enable the option which says Mouse Power On and Keyboard Power On
5. For Enabling just click on the desired option and press PageUP button
6. Then press F10 and hit enter

NOTE: Only for USB PS 2 Mouse and Keyboard. Also, you need to first start your PC manually after then for starting your PC this TWEAK will work.

2. Know your BIOS

If you want to know your Bios Version, Video Bios Date, and System Bios Date then navigate to
And on the right pane you will find all these information’s.

3. Disable Windows Shortcut Key

If you want to prevent users from using shortcuts like [Windows + R] and so on
1. Open Group Policy Editor. (Type gpedit.msc in RUN dialog box)
2. Navigate to User Configuration>Administrative Templates>Windows Components> Windows Explorer.
3. On the right pane double click on option turn off windows + X hot keys and Enable it.

4. Swap Ctrl + Alt + Del functioning

What happen when you press Ctrl + Alt + Del? Yeah, Task manager pop ups have you ever think what’s the reaction of your friend when he presses Ctrl + Alt + Del and Calculator pop ups or nay other application. Here is the way to open any application by using Ctrl + Alt + Del

1. Open Regedit. (type Regedit in RUN dialog box)
2. Navigate to
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Image File Execution Options\taskmgr.exe
3. On the right pane double click or create a string named Debugger and set its value to C:\\WINDOWS\\system32\\calc.exe
Now, whenever you press Ctrl + Alt + Del calculator program will pop up.

5. Change the Default NumLock State

Windows Registry Editor Version 5.00
[HKEY_CURRENT_USER\Control Panel\Keyboard]
[HKEY_USERS\.DEFAULT\Control Panel\Keyboard]

6. Define keys on your Keyboard different functions

If you have a multimedia keyboard then you can change the functionality of your application keys like play, pause, mute etc key to something of your choice

In my keyboard (Logitech clavier media) I have a app key which opens calculator which I am going to change. You can use this trick to change any key you want; here I am changing the functionality of key 18 which opens calculator on pressing so that it would open task manger.

Navigate to

Here create or modify the string named ShellExecute and set its value to the actual path of the program which you want to open. In my case I have set the path
to C:\WINDOWS\system32\taskmgr.exe

7. Windows key combination

The Windows logo key, located in the bottom row of most computer keyboards is not only a shortcut for opening start menu but a amalgamation key of lot shortcuts have a look below-

1. Windows: Display the Start menu
2. Windows + D: Minimize or restore all windows
3. Windows + E: Display Windows Explorer
4. Windows + F: Display Search for files
5. Windows + Ctrl + F: Display Search for computer
6. Windows + F1: Display Help and Support Center
7. Windows + R: Display Run dialog box
8. Windows + break: Display System Properties dialog box
9. Windows + shift + M: Undo minimize all windows
10. Windows + L: Lock the workstation
11. Windows + U: Open Utility Manager
12. Windows + Q: Quick switching of users (Power toys only)
13. Windows + Q: Hold Windows Key, then tap Q to scroll thru the different users on your pc.

8. Cursor’s Blink Rate

To control how fast the cursor blinks, navigate to
HKCU\Control Panel\Desktop
And change the value of string named CursorBlinkRate to anything between 1200 (slowest) to 200 (fastest) in milliseconds.

9. Swap Mouse Buttons

Navigate to
HKCU\Control Panel\Mouse
On the right pane change the value of String named SwapMouseButtons to 1.


Scared from regedit, no problem open RUN (WIN+R) and type
RUNDLL32 USER32.DLL SwapMouseButton

and press enter. Read the rest of this entry »

Understanding Regedit

The Microsoft Registry Editor enables you to view, search for, and change settings in your system registry, which contains information about how your computer runs. Windows stores its configuration information in a database called the registry which can be accessed using Regedit.exe(Registry Editor). The registry contains profiles for each user of the computer and information about system hardware, installed programs, and property settings. Windows continually references this information during its operation. Although you can use Registry Editor to inspect and modify the registry, doing so is not recommended, as making incorrect changes can damage your system.

Registry Editor overview
Registry Editor is an advanced tool for viewing and changing settings in your system registry which contains information about how your computer runs. Windows stores its configuration information in a database (the registry) that is organized in a tree format.When you view the registry in the Microsoft Registry Editor its hierarchical nature becomes obvious. The editor presents an Explorer-like view of the registry, with a tree in the left pane and data in the right

Arcitecture of regedit

The registry tree is divided into six broad sections (five in NT). HKEY_CLASSES_ROOT HKEY_CURRENT_USER HKEY_LOCAL_MACHINE HKEY_USERS HKEY_CURRENT_CONFIG HKEY_DYN_DATA Folders represent keys in the registry and are shown in the navigation area on the left side of the Registry Editor window. On the left side below My Computer their are five keys HKEY_CLASSES_ROOT, HKEY_CURRENT_USER, HKEY_LOCAL_MACHINE, HKEY_USERS, HKEY_CURRENT_CONFIG, HKEY_DYN_DATA. On expanding these Keys we’ll get the sub keys. In the right side area, the entries in a particular sub key are displayed, which are Name(Contains name of the value), Type(contains type of the value), and Data(Contains associated data of the value.)When you double-click a entry, it opens an editing dialog box. At the status bar of regedit path is shown.

navigating regedit

You should not edit your registry unless it is absolutely necessary. If there is an error in your registry, your computer may not function properly. If this happens, you can restore the registry to the same version you were using when you last successfully started your computer Regedit.exe is automatically installed during setup and is stored in same folder as is Windows. To start Regedit.exe

  1. Click Start, and then click Run.
  2. Type Regedit, and then click OK.

The navigation area of the Registry Editor displays folders, each of which represents a predefined key (a key that represents one of the main division of the registry for eg: HKEY_LOCAL_MACHINE ) on the local computer. When accessing the registry of a remote computer, only two predefined keys, HKEY_USERS and HKEY_LOCAL_MACHINE, appear.

Folder/predefined key Description
HKEY_CURRENT_USER Contains the root of the configuration information for the user who is currently logged on. The user’s folders, screen colors, and Control Panel settings are stored here. This information is referred to as a user’s profile.
HKEY_USERS Contains the root of all user profiles on the computer. HKEY_CURRENT_USER is a subkey of HKEY_USERS.
HKEY_LOCAL_MACHINE Contains configuration information particular to the computer (for any user).
HKEY_CLASSES_ROOT Is a subkey of HKEY_LOCAL_MACHINE\Software. The information stored here ensures that the correct program opens when you open a file by using Windows Explorer.
HKEY_CURRENT_CONFIG Contains information about the hardware profile used by the local computer at system startup.

The following table lists the data types currently defined and used by the system.

Data type Description
REG_BINARY Raw binary data. Most hardware component information is stored as binary data and is displayed in Registry Editor in hexadecimal format.
REG_DWORD Data represented by a number that is 4 bytes long. Many parameters for device drivers and services are this type and are displayed in Registry Editor in binary, hexadecimal, or decimal format.
REG_EXPAND_SZ A variable-length data string. This data type includes variables that are resolved when a program or service uses the data.
REG_MULTI_SZ A multiple string. Values that contain lists or multiple values in a form that people can read are usually this type. Entries are separated by spaces, commas, or other marks.
REG_SZ A fixed-length text string.
REG_FULL_RESOURCE_DESCRIPTOR A series of nested arrays designed to store a resource list for a hardware component or driver.

Add a key


  • Incorrectly editing the registry may severely damage your system. Before making changes to the registry, you should back up any valued data on your computer.
  • You must back up your registry before tweaking into it or it may lead you to reinstall your operating system.
  • You can search for lot of registry backup tool an use any one of them, like ERUNT or click here for alternate methods of backing up registry.



Blog Stats

  • 55,958 hits