Skip to main content

How to Change the Start Button Text in Window XP


Stage 1:

Create a system restore point just incase if something goes wrong you can roll back to the primary settings. Make a back up copy of explorer.exe in a safe place, maybe in a different folder.

Stage 2:

You would need to download a small freeware utility called Resource Hacker. "Resource HackerTM is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit Windows executables and resource files (*.res). It incorporates an internal resource script compiler and decompiler and works on Win95, Win98, WinME, WinNT, Win2000 and WinXP operating systems." excerpt from Resource Hacker's Website

Step 3:

Open Resource Hacker utility. Click on File ---> Open. Type "explorer.exe" in the text box.

Step 4:

Expand String Table ---> 37 from the tree view and click on 1033

Step 5:

From the right window next to where start is written in front of 578 edit the text to what you want on your start button. For example I edited it to GDDon

Step 7:
Open registry editor by clicking on Start ---> Run and typing "regedit" at the text box. Navigate to HKEY_Local_Machine -> Software -> Microsoft -> Windows NT -> CurrentVersion -> Winlogon

From the right pane double click on shell and replace "explorer.exe" with "GDDon.exe" and then exit registry editor


Step 8: Restart your computer to see the changes. ....... [TK]

By Jay Nagar

Comments

Popular posts from this blog

How to Learn free Ethical Hacking Tutorial 1 :- Introduction 1

Welcome to  Hackers !!! Today, I am going to start a series on  Ethical Hacking Tutorials  to spread awareness.  This series of Ethical Hacking Tutorial is for Educational purpose only, any wrong and illegal activity is not promoted by me or my team of Dark Street Hackers.  In this first tutorial, we will be looking at what is cyber security, why we need it, who are the hackers and much more. So, without wasting time, let's get started with it. What is Cyber Security? Cybersecurity is the act of securing frameworks, systems, and projects from advanced assaults. These cyberattacks are typically initiated for changing, or crushing touchy data; blackmailing cash from clients; or intruding on ordinary business forms. In simple words, I can say, it is a process of making digital data secure using various tools and techniques before an attacker or bad guy tries to access it. Why we need Cyber security? Nowadays, everything is online and lots data is being saved in the di

Best Books