throbber
Lenovo EX-1036, Page 001
`IPR2021-00786 (Lenovo Inc. v. LiTL LLC.)
`
`

`

`Windows® XP
`Hacks & Mods
`
`FOR
`
`DUMmIES‰
`
`by Woody Leonhard
`
`Lenovo EX-1036, Page 002
`IPR2021-00786 (Lenovo Inc. v. LiTL LLC.)
`
`

`

`Lenovo EX-1036, Page 003
`IPR2021-00786 (Lenovo Inc. v. LiTL LLC.)
`
`

`

`Windows® XP
`Hacks & Mods
`
`FOR
`
`DUMmIES‰
`
`Lenovo EX-1036, Page 004
`IPR2021-00786 (Lenovo Inc. v. LiTL LLC.)
`
`

`

`Lenovo EX-1036, Page 005
`IPR2021-00786 (Lenovo Inc. v. LiTL LLC.)
`
`

`

`Windows® XP
`Hacks & Mods
`
`FOR
`
`DUMmIES‰
`
`by Woody Leonhard
`
`Lenovo EX-1036, Page 006
`IPR2021-00786 (Lenovo Inc. v. LiTL LLC.)
`
`

`

`Windows® XP Hacks & Mods For Dummies®
`Published by
`Wiley Publishing, Inc.
`111 River Street
`Hoboken, NJ 07030-5774
`www.wiley.com
`Copyright © 2005 by Wiley Publishing, Inc., Indianapolis, Indiana
`Published by Wiley Publishing, Inc., Indianapolis, Indiana
`Published simultaneously in Canada
`No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or
`by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permit-
`ted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written
`permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the
`Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600.
`Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing,
`Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at
`http://www.wiley.com/go/permissions.
`Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Reference for the
`Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, and related trade
`dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United
`States and other countries, and may not be used without written permission. Windows XP is a registered
`trademark of Microsoft Corporation in the United States and/or other countries. All other trademarks are
`the property of their respective owners. Wiley Publishing, Inc., is not associated with any product or
`vendor mentioned in this book.
`
`LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: THE PUBLISHER AND THE AUTHOR MAKE NO REP-
`RESENTATIONS OR WARRANTIES WITH RESPECT TO THE ACCURACY OR COMPLETENESS OF THE CON-
`TENTS OF THIS WORK AND SPECIFICALLY DISCLAIM ALL WARRANTIES, INCLUDING WITHOUT
`LIMITATION WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE. NO WARRANTY MAY BE CRE-
`ATED OR EXTENDED BY SALES OR PROMOTIONAL MATERIALS. THE ADVICE AND STRATEGIES CON-
`TAINED HEREIN MAY NOT BE SUITABLE FOR EVERY SITUATION. THIS WORK IS SOLD WITH THE
`UNDERSTANDING THAT THE PUBLISHER IS NOT ENGAGED IN RENDERING LEGAL, ACCOUNTING, OR
`OTHER PROFESSIONAL SERVICES. IF PROFESSIONAL ASSISTANCE IS REQUIRED, THE SERVICES OF A
`COMPETENT PROFESSIONAL PERSON SHOULD BE SOUGHT. NEITHER THE PUBLISHER NOR THE
`AUTHOR SHALL BE LIABLE FOR DAMAGES ARISING HEREFROM. THE FACT THAT AN ORGANIZATION
`OR WEBSITE IS REFERRED TO IN THIS WORK AS A CITATION AND/OR A POTENTIAL SOURCE OF FUR-
`THER INFORMATION DOES NOT MEAN THAT THE AUTHOR OR THE PUBLISHER ENDORSES THE INFOR-
`MATION THE ORGANIZATION OR WEBSITE MAY PROVIDE OR RECOMMENDATIONS IT MAY MAKE.
`FURTHER, READERS SHOULD BE AWARE THAT INTERNET WEBSITES LISTED IN THIS WORK MAY HAVE
`CHANGED OR DISAPPEARED BETWEEN WHEN THIS WORK WAS WRITTEN AND WHEN IT IS READ.
`
`For general information on our other products and services, please contact our Customer Care
`Department within the U.S. at 800-762-2974, outside the U.S. at 317-572-3993, or fax 317-572-4002.
`For technical support, please visit www.wiley.com/techsupport.
`Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may
`not be available in electronic books.
`Library of Congress Control Number: 2005927631
`ISBN-13: 978-0-471-74897-7
`ISBN-10: 0-471-74897-8
`Manufactured in the United States of America
`10 9 8 7 6 5 4 3 2 1
`1O/RZ/QZ/QV/IN
`
`Lenovo EX-1036, Page 007
`IPR2021-00786 (Lenovo Inc. v. LiTL LLC.)
`
`

`

`About the Author
`
`In the past fifteen years, Woody Leonhard has written more than computer
`books, drawing an unprecedented six Computer Press Association awards
`and two American Business Press awards. Woody was one of the first
`Microsoft Consulting Partners and is a charter member of the Microsoft
`Solutions Provider organization. He’s widely quoted — and reviled — on the
`Redmond campus.
`
`Woody’s Web site, askwoody.com, keeps an eye on the computer industry,
`covering the latest shenanigans from Microsoft, the best software for your
`computer, the worst pitfalls (and patches!) to avoid, updates to his books,
`and all the other information you need to keep your PC chugging away.
`
`Woody lives just this side of paradise in Phuket, Thailand, along with his
`most significant other, Add, and his son, Justin. Most mornings, you can find
`him jogging on Patong Beach with their beagle, Chronos, or sipping a latte at
`Khun Woody’s Bakery. Drop by when you get a chance!
`
`Lenovo EX-1036, Page 008
`IPR2021-00786 (Lenovo Inc. v. LiTL LLC.)
`
`

`

`Lenovo EX-1036, Page 009
`IPR2021-00786 (Lenovo Inc. v. LiTL LLC.)
`
`

`

`Dedication
`
`To Duangkhae Tongthueng (better known as “Add”), and to Justin, the best
`parts of my life. Forgive me for all the long hours slaving away on this project.
`
`Author’s Acknowledgments
`
`Justin Leonhard contributed numerous ideas, warnings, and hacks to the
`sections on gaming and the iPod, in particular, and helped with insightful
`comments in several other parts of the book. Thanks, Justin!
`
`Many thanks, as always, to Claudette Moore and Debbie McKenna at Moore
`Literary Agency, my guides for nearly 15 years. Thanks, too, to Steve Hayes,
`Becky Huehls, Colleen Totz, Lee Musick, and all the people at Wiley who
`made this project work.
`
`What a concept: Windows hacking made accessible to regular Windows
`users. With your help, I think this book succeeds marvelously.
`
`Lenovo EX-1036, Page 010
`IPR2021-00786 (Lenovo Inc. v. LiTL LLC.)
`
`

`

`Publisher’s Acknowledgments
`We’re proud of this book; please send us your comments through our online registration form
`located at www.dummies.com/register/.
`Some of the people who helped bring this book to market include the following:
`
`Acquisitions, Editorial, and
`Media Development
`Project Editor: Rebecca Huehls
`Senior Acquisitions Editor: Steven Hayes
`Development and Copy Editor: Colleen Totz
`Technical Editor: Lee Musick
`Editorial Managers: Leah Cameron,
`Carol Sheehan
`Media Development Manager: Laura VanWinkle
`Media Development Supervisor:
`Richard Graves
`Editorial Assistant: Amanda Foxworth
`Cartoons: Rich Tennant
`(www.the5thwave.com)
`
`Composition Services
`Project Coordinator: Adrienne Martinez
`Layout and Graphics: Carl Byers, Andrea Dahl,
`Lauren Goddard, Joyce Haughey,
`Julie Trippetti
`Proofreaders: TECHBOOKS Production
`Services, Leeann Harney
`Indexer: TECHBOOKS Production Services
`Special Help: Andy Hollandbeck
`
`Publishing and Editorial for Technology Dummies
`Richard Swadley, Vice President and Executive Group Publisher
`Andy Cummings, Vice President and Publisher
`Mary Bednarek, Executive Acquisitions Director
`Mary C. Corder, Editorial Director
`Publishing for Consumer Dummies
`Diane Graves Steele, Vice President and Publisher
`Joyce Pepple, Acquisitions Director
`Composition Services
`Gerry Fahey, Vice President of Production Services
`Debbie Stailey, Director of Composition Services
`
`Lenovo EX-1036, Page 011
`IPR2021-00786 (Lenovo Inc. v. LiTL LLC.)
`
`

`

`Contents at a Glance
`
`Introduction ................................................................1
`Part I: The Nuts & Bolts of Hacks & Mods .....................7
`Chapter 1: Windows XP: What’s Not to Love? ...............................................................9
`Chapter 2: Tools of the Hacking Trade .........................................................................17
`Chapter 3: A Quick XP Makeover ..................................................................................25
`Part II: Controlling the Look and Feel of Windows XP ...45
`Chapter 4: TweakUI, the Power User’s PowerToy .......................................................47
`Chapter 5: Pinning Down the Start Menu .....................................................................57
`Chapter 6: Taking On the Taskbar .................................................................................85
`Chapter 7: Decking Out the Desktop .............................................................................97
`Part III: Adjusting Everyday Activities ......................113
`Chapter 8: Reining In Windows Explorer ....................................................................115
`Chapter 9: Cool Keyboard Hacks and Menu Mods ....................................................129
`Chapter 10: Searching on the Desktop .......................................................................139
`Chapter 11: Switching to Better Online Software ......................................................151
`Chapter 12: Pulling Off Pictures ...................................................................................173
`Part IV: Modding to Monitor and Manage ..................191
`Chapter 13: Seeing What’s Happening ........................................................................193
`Chapter 14: Decoding IDs, Accounts, and Passwords ..............................................209
`Chapter 15: Using Remote Assistance ........................................................................225
`Chapter 16: Retooling Disks .........................................................................................237
`Part V: Protecting Yourself (And Your PC) ................247
`Chapter 17: Changing (In)Security Settings ...............................................................249
`Chapter 18: Taking the “Mal” out of Malware ............................................................261
`Chapter 19: Keeping Your Privates Private ................................................................271
`Part VI: Entertaining Yourself ...................................283
`Chapter 20: Making the Most of Media Player ...........................................................285
`Chapter 21: Buying Music and Videos ........................................................................293
`Chapter 22: Trading Music and Videos .......................................................................305
`Chapter 23: Getting Games to Work ............................................................................311
`
`Lenovo EX-1036, Page 012
`IPR2021-00786 (Lenovo Inc. v. LiTL LLC.)
`
`

`

`Part VII: The Part of Tens .........................................319
`Chapter 24: Ten Steps to Mastering the Registry ......................................................321
`Chapter 25: Ten Speed-Up Hacks — Maybe ...............................................................333
`Index ......................................................................347
`
`Lenovo EX-1036, Page 013
`IPR2021-00786 (Lenovo Inc. v. LiTL LLC.)
`
`

`

`Table of Contents
`
`Introduction .................................................................1
`About This Book ..............................................................................................1
`Conventions Used in This Book ....................................................................2
`What You’re Not to Read ................................................................................3
`Foolish Assumptions ......................................................................................3
`How This Book Is Organized ..........................................................................3
`Part I: The Nuts & Bolts of Hacks & Mods ..........................................3
`Part II: Controlling the Look and Feel of Windows XP ......................4
`Part III: Adjusting Everyday Activities ................................................4
`Part IV: Modding to Monitor and Manage ..........................................4
`Part V: Protecting Yourself (And Your PC) .........................................4
`Part VI: Entertaining Yourself ..............................................................4
`Part VII: The Part of Tens .....................................................................4
`Icons Used in This Book .................................................................................5
`Where to Go from Here ...................................................................................5
`
`Part I: The Nuts & Bolts of Hacks & Mods ......................7
`
`Chapter 1: Windows XP: What’s Not to Love? . . . . . . . . . . . . . . . . . . . . .9
`Well, Perhaps There’s Room for Improvement ............................................9
`When to Hack Windows XP — and When to Let It Be ..............................10
`Hacks that don’t work .........................................................................11
`Keeping hacks and mods in perspective ..........................................12
`A Quick Look at Some Cool XP Hacks and Mods ......................................13
`Staying Safe and Sound While You Work ....................................................14
`Chapter 2: Tools of the Hacking Trade . . . . . . . . . . . . . . . . . . . . . . . . . .17
`Understanding How Windows Hangs Together .........................................17
`A world of processes ...........................................................................17
`Windows as referee .............................................................................19
`Amoebus interruptus ..........................................................................20
`Programs talk, talk, talk ......................................................................21
`The Role of the Registry ...............................................................................21
`Great Sources for Hacking Tools .................................................................23
`Chapter 3: A Quick XP Makeover . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25
`Do You Need a Makeover? ............................................................................25
`Security Check — NOW ................................................................................26
`Get up-to-date ......................................................................................26
`Check your firewall .............................................................................30
`
`Lenovo EX-1036, Page 014
`IPR2021-00786 (Lenovo Inc. v. LiTL LLC.)
`
`

`

`xii
`
`Windows XP Hacks & Mods For Dummies
`
`Fire your antivirus program ...............................................................32
`Show filename extensions ..................................................................33
`Protect against spyware .....................................................................34
`Personalize Your eXPerience .......................................................................35
`Change the wallpaper .........................................................................35
`Set the screensaver .............................................................................36
`Align your accounts ............................................................................37
`Eliminate the Obnoxious ..............................................................................38
`Tame (or trash!) Messenger ...............................................................38
`Remove the Language Bar ..................................................................40
`Get Better (Free!) Software ..........................................................................41
`Dump Microsoft’s browser .................................................................41
`Search like a pro ..................................................................................41
`Read PDFs .............................................................................................43
`
`Part II: Controlling the Look and Feel of Windows XP ...45
`
`Chapter 4: TweakUI, the Power User’s PowerToy . . . . . . . . . . . . . . . .47
`Downloading and Installing TweakUI ..........................................................48
`TweakUI from 30,000 Feet ............................................................................50
`Knowing the Essential TweakUI Lingo ........................................................51
`Squeezing TweakUI .......................................................................................52
`Making your mouse sensitive ............................................................52
`Changing places ...................................................................................54
`Disabling Autoplay ..............................................................................55
`Chapter 5: Pinning Down the Start Menu . . . . . . . . . . . . . . . . . . . . . . . .57
`Scoping Out the Start Menu .........................................................................58
`Customizing the Left Side of the Start Menu .............................................60
`Pinning the Tail on This Donkey .................................................................62
`Pinning a program ...............................................................................63
`Pinning a folder ....................................................................................65
`Pinning a file .........................................................................................66
`Pinning a Web page .............................................................................67
`Renaming, moving, and unpinning ....................................................68
`Controlling the Frequently Used Programs List ........................................70
`Rearranging All Programs ............................................................................73
`Controlling the My Recent Documents List ...............................................78
`Advanced Start Tweaks ................................................................................80
`Chapter 6: Taking On the Taskbar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .85
`Customizing the Taskbar ..............................................................................86
`Sizing the Taskbar .........................................................................................87
`Taming the System Tray ...............................................................................88
`Controlling Groups of Buttons ....................................................................90
`
`Lenovo EX-1036, Page 015
`IPR2021-00786 (Lenovo Inc. v. LiTL LLC.)
`
`

`

`Table of Contents
`
`xiii
`
`Modifying Quick Launch ..............................................................................91
`Deleting Quick Launch icons .............................................................92
`Adding programs to Quick Launch ...................................................92
`Adding folders and files to Quick Launch ........................................93
`Adding Web pages to Quick Launch .................................................94
`Making room for more icons ..............................................................94
`Changing Quick Launch screen tips ..................................................95
`Changing Quick Launch icons ...........................................................96
`Chapter 7: Decking Out the Desktop . . . . . . . . . . . . . . . . . . . . . . . . . . . .97
`Making Your Desktop Home ........................................................................97
`Wrangling with Icons ....................................................................................99
`Exploring and installing Iconoid ......................................................100
`“Snapping” icons to Windows’ invisible grid .................................101
`Autoarranging icons ..........................................................................101
`Moving all icons to the upper-left corner of the screen ...............102
`Working with Themes .................................................................................102
`Using a purpose-built installer ........................................................103
`Installing a Theme manually ............................................................104
`Getting the Most from ClearType ..............................................................108
`Understanding ClearType ................................................................108
`Modifying ClearType .........................................................................109
`
`Part III: Adjusting Everyday Activities .......................113
`
`Chapter 8: Reining In Windows Explorer . . . . . . . . . . . . . . . . . . . . . . .115
`Fixing Key Explorer Settings ......................................................................115
`How programs start ..........................................................................115
`Changing filename extension associations ....................................116
`Showing filename extensions and hidden/system files ................118
`Setting File Folder Templates ....................................................................121
`Setting a folder’s template ................................................................122
`Curing template amnesia by setting aside extra memory ...........123
`Customizing Shortcuts ...............................................................................124
`Renaming Files en Masse ...........................................................................126
`Chapter 9: Cool Keyboard Hacks and Menu Mods . . . . . . . . . . . . . . .129
`Listing Files in a Folder ...............................................................................129
`Copy to Folder and Move to Folder ..........................................................134
`Creating Custom Keyboard Shortcuts ......................................................136
`Key Combinations You Need to Know ......................................................137
`Chapter 10: Searching on the Desktop . . . . . . . . . . . . . . . . . . . . . . . . .139
`The Lowdown on Searching .......................................................................139
`Installing Google Desktop Search ....................................................141
`Running Google Desktop Search .....................................................143
`
`Lenovo EX-1036, Page 016
`IPR2021-00786 (Lenovo Inc. v. LiTL LLC.)
`
`

`

`xiv
`
`Windows XP Hacks & Mods For Dummies
`
`Google Desktop Search Mods ....................................................................145
`Preventing GDS from indexing specific files ..................................145
`Removing files from the index .........................................................146
`Moving GDS’s index file ....................................................................148
`Chapter 11: Switching to Better Online Software . . . . . . . . . . . . . . .151
`Surfing with the Fox ....................................................................................151
`Installing Firefox ................................................................................152
`Working with tabs ..............................................................................154
`Installing extensions .........................................................................156
`Hacking and modding Firefox ..........................................................160
`Keyboard shortcuts for Firefox and IE ...........................................163
`Printing a page in Firefox and IE ......................................................164
`IMing with Trillian .......................................................................................165
`Installing Trillian ................................................................................166
`Adding contacts with Trillian ..........................................................167
`Disabling MSN Messenger ..........................................................................169
`Shutting down MSN Messenger the polite way .............................170
`Shutting down MSN Messenger the IMpolite way .........................171
`Chapter 12: Pulling Off Pictures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .173
`Removing Problematic Camera Software .................................................173
`Transferring Pictures from a Camera .......................................................175
`Copying from a Camera Memory Card .....................................................179
`Rummaging Through New Photos ............................................................181
`Undeleting Images on a Camera ................................................................182
`Resizing Pictures .........................................................................................185
`Converting Picture File Formats ...............................................................188
`Changing file formats with Paint .....................................................189
`Saving the contents of the Clipboard as a picture file ..................189
`
`Part IV: Modding to Monitor and Manage ...................191
`
`Chapter 13: Seeing What’s Happening . . . . . . . . . . . . . . . . . . . . . . . . .193
`Using Windows Event Viewer ....................................................................193
`Opening the event logs from the Start menu .................................194
`Poking around Windows Event Viewer ...........................................195
`Saving a log file ..................................................................................198
`Hardware Troubleshooting with Windows Device Manager .................199
`Making it easy to start Device Manager .........................................199
`Taking full advantage of Device Manager views ............................200
`Looking up Device Manager error codes .......................................200
`Check for “ghosted” hardware .........................................................200
`Controlling Applications with Task Manager ..........................................202
`Tracking Memory with Task Manager ......................................................204
`Tracking CPU Usage with Task Manager ..................................................206
`
`Lenovo EX-1036, Page 017
`IPR2021-00786 (Lenovo Inc. v. LiTL LLC.)
`
`

`

`Table of Contents
`
`xv
`
`Chapter 14: Decoding IDs, Accounts, and Passwords . . . . . . . . . . . .209
`Activating and Reactivating Windows ......................................................209
`Activating shrink-wrapped Windows ..............................................210
`Dealing with preinstalled Windows .................................................211
`Using volume licenses ......................................................................213
`Changing Registered User and Organization ...........................................215
`Tweaking User Accounts ............................................................................217
`Working with Guest ...........................................................................218
`Changing usernames .........................................................................219
`Showing/hiding accounts at logon ..................................................219
`Changing the picture .........................................................................221
`Bypassing the Windows Welcome screen ................................................222
`Chapter 15: Using Remote Assistance . . . . . . . . . . . . . . . . . . . . . . . . .225
`Helping a Friend — Long Distance ............................................................225
`Asking for Help ............................................................................................226
`Connecting via MSN or Windows Messenger ................................227
`Connecting via e-mail or by file .......................................................231
`Poking Through the Firewalls ....................................................................233
`Setting Up RA So That You Can Always Use It .........................................234
`Chapter 16: Retooling Disks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .237
`Installing a Second Hard Drive ..................................................................237
`Reassigning Drive Letters ..........................................................................241
`Converting a FAT Disk to NTFS ..................................................................243
`Finding out what kind of drive you have ........................................243
`Converting FAT32 to NTFS ................................................................244
`Maintenance Hacks .....................................................................................245
`Stifling the disk cleanup warning ....................................................245
`Forcing a defrag .................................................................................246
`
`Part V: Protecting Yourself (And Your PC) ................247
`
`Chapter 17: Changing (In)Security Settings . . . . . . . . . . . . . . . . . . . . .249
`Don’t Let Microsoft Muck with Your Computer ......................................249
`Patch Keystone Kops ........................................................................250
`What is a critical patch? ...................................................................250
`Turning off automatic updating .......................................................251
`Analyzing Updates ......................................................................................253
`Applying Updates ........................................................................................254
`Dealing with Windows Firewall .................................................................256
`Setting up Windows Firewall ............................................................256
`Testing your firewall .........................................................................258
`
`Lenovo EX-1036, Page 018
`IPR2021-00786 (Lenovo Inc. v. LiTL LLC.)
`
`

`

`xvi
`
`Windows XP Hacks & Mods For Dummies
`
`Chapter 18: Taking the “Mal” out of Malware . . . . . . . . . . . . . . . . . .261
`Catching Viruses Free .................................................................................261
`Installing AVG Free ............................................................................262
`Adjusting AVG Free settings .............................................................263
`Fighting Spyware .........................................................................................264
`Using Microsoft Antispyware ...........................................................265
`Running CounterSpy .........................................................................265
`Blocking your Registry with Mike Lin’s StartupMonitor ..............267
`Startup sleuthing ...............................................................................268
`Chapter 19: Keeping Your Privates Private . . . . . . . . . . . . . . . . . . . . .271
`Covering Your Tracks Online .....................................................................271
`Anonymous surfing ...........................................................................272
`Browser amnesia ...............................................................................273
`Covering Your Tracks in Windows ............................................................277
`Protecting from prying eyes ............................................................277
`Clobbering the MRU lists ..................................................................278
`Keeping Windows from phoning home ...........................................280
`
`Part VI: Entertaining Yourself ...................................283
`
`Chapter 20: Making the Most of Media Player . . . . . . . . . . . . . . . . . .285
`Knowing Your File Format$ ........................................................................285
`Installing the Latest Windows Media Player ............................................286
`Setting Up WMP ...........................................................................................289
`Using TweakMP ...........................................................................................290
`Chapter 21: Buying Music and Videos . . . . . . . . . . . . . . . . . . . . . . . . .293
`Music Restrictions .............................................................

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket