Windows Screensavers Explained

In this article you will find some background information about screensavers and their history. You will also learn how Windows screensavers differ from other programs and how you can use it to your own advantage. Also there are some tips for users owning laptops, notebooks or CD-burning devices.

Have you ever asked yourself a question like "What is a screensaver actually?" I did. And now I will gladly share the results of my investigation. As you can see easily, splitting the word "screensaver" into two words will give us the phrase "screen saver". This isn't a rocket science and it's clear that the phrase suggests our subject somehow saving the screen. So the word "screensaver" can be applied to some sort of good things that save the screen of our so much beloved baby-computer. But what does it mean exactly? Who is going to harm our computer screen? Who could be such a bad person? The answer lies in the exact definition of screensavers.

If you are a meticulous person then you can search the Internet and come up with some of the existing definitions. But don't hurry. I will list some of the most often found. Here they are:

  • A moving picture or pattern that appears on your screen when you have not moved the mouse or pressed a key on the computer for a specified period of time. Screensavers prevent screen damage that is caused when the same areas of light and dark are displayed for long periods of time.

  • A program that "wakes up" after a certain amount of time has elapsed with no keyboard or mouse activity and blanks the screen or displays various moving objects across the screen; these are used to prevent your screen from getting "burn in".

  • An animated picture or graphic that can be programmed through the Display control panel to come on the computer screen after so much inactivity time has elapsed. The main reason for a screensaver is to reduce wear and tear on the CRT (Cathode Ray Tube) inside the monitor that can burn out or become etched if the same window is left on for extended periods of time.

The picture is getting clearer, isn't it? Let's make it plain. The "burn in" or "damage" used in these definitions refer us to the time before 90-ies. At that time many cathode ray tubes in TVs, computer monitors or elsewhere were prone to be damaged if the same pattern (e.g., the WordPerfect status line; the Pong score readout; or a TV channel-number display) was shown at the same position on the screen for very long periods of time. The phosphor on the screen would "fatigue" and that part of the screen would seem grayed out, even when the CRT was off.

TIP: Be careful when using a screensaver on a computer with an LCD screen (most laptops and notebooks). A pixel on an LCD screen is on when it's dark; therefore, blacking the screen as some screensavers do would cause more damage.

Eventually CRTs which were resistant to burn-in (and which sometimes went into sleep mode after a period of inactivity) were developed. But in the meantime, solution was found: home video game systems of the era (e.g., Atari 2600s) would, when not being played, change the screen every few seconds, to avoid burn-in; and computer screensaver programs were developed.

The first screensavers were simple screen blankers - they just set the screen to all black, but, in the best case of creeping featurism ever recorded, these tiny (often under 1K long) programs grew without regard to efficiency or even basic usefulness. At first, small, innocuous display hacks (generally on an almost-black screen) were added. Later, more complex effects appeared, including animations (often with sound effects!) of arbitrary length and complexity.

And now we live in the world full of fun and entertaining screensavers. Many of them produce amazing and very attractive effects. You can find a screensaver on any theme you like, download it, install and enjoy.

This means that a typical screensaver is a program. And it really is. But isn't there something different? Is there something that distinguishes a program running as screensaver from other typical programs? You're right, there is a bit of mystery. In order to demystify it we should plunge deeper into screensaver mechanics. But don't be afraid. It isn't complicated at all.

First, as you already know, screensavers are launched automatically by the operating system.

TIP: Be careful if you use CD-Burning devices regularly and your system is configured to launch screensaver after some period of inactivity. Some screensavers produce very sophisticated effects but for the price of intensive CPU load. If you leave your computer while CD-Burning software is working, screensaver will be launched. This can sometimes lead to the CD-R/RW disks burned improperly.

During their installation process screensavers are copied to the system directory (years ago users had even to copy screensavers by themselves). Once they are there, Windows finds them and puts in the list of available screensavers. You can see this list in the Display Properties dialog. But how does the system know that the program in its system directory is a screensaver? The answer is simple. Any screensaver program has a name ending with ".SCR" extension, while a typical program has the ".EXE" extension at the end. This is the first difference.

Second, almost every screensaver has a bunch of settings allowing you to change its appearance in many ways. This isn't a much difference because many typical programs have options and settings too. The difference lies in the way the user invokes configuration dialogs. Windows provides the only way to do it. It's the Display Properties dialog mentioned above. Other programs usually have their own buttons or menus to do that. Why are we talking about it? It's simple. The whole process means that the system has a way to communicate with screensavers: to launch them, preview and configure on your demand while other typical programs don't have it. Usually they are simply launched and that's all. This is the second difference.

So what? How can we use it to our own advantage? Imagine yourself downloading a new screensaver, running it and finding it rather amazing. The screensaver can be so amazing and entertaining, that you would like to show it running on your screen to the friend of yours. But wait. How do you do that? What if your system is configured to launch the screensaver after 5 minutes of inactivity only? Or after 10 minutes or even more? Will you wait for this eternity? You can say that there is always a way to launch the screensaver from the Dialog Properties. But in order to do that you should launch the dialog, find the Screen Savers tab and click the Preview button. Quite a lot of things to do. And if you are willing to demonstrate two or even more screensavers the things get complicated even more. And what if the screensaver you've found looks best when the whole desktop wallpaper is seen on the screen? The Display Properties dialog will simply destroy this unique beauty you were willing to share.

Now imagine that double-clicking an icon on your desktop could do all this. Simple action, no unnecessary dialogs. Sure, some preparation steps are needed. But they are done once. After that you can enjoy launching screensavers using icons as many times as you wish. Is it worth doing? Try it, the result can be very effective. Once you manage the process, you can proudly call yourself a "Professional Screensaver User". If you like the idea then there's the way to achieve it:

  • Use Windows explorer to navigate to your system directory. Usually it is C:Windows or C:WindowsSystem if you use Windows 95/98/Me. If you use Windows NT/2000/XP, then you should look in C:WINNT or C:WINNTSystem32

  • Look through the list of programs there. It can be quite large, but you can easily find the name of the screensaver you are looking for. Alternatively you can use the "Find Files or Folders" facility.

  • Once you've found it, use the right mouse button to drag the file onto the desktop. After releasing the mouse select "Create Shortcut Here" from the popup menu. The icon for the screensaver should appear on your desktop.

    Now you can launch the screensaver at any time. Simply double-click the created icon. Enjoy! I will be glad if you feel a bit more control over the system.

    About The Author

    Roman Kramar is a software developer who enjoys writing screensavers as his time permits. Visit his site at http://www.elasticsystems.com/ to find out more about screensavers and his work.

    http://www.elasticsystems.com/

    express cleaning service Arlington Heights ..
    In The News:

    Researchers from Osaka Metropolitan University designed a 21-foot dome that combines aquaculture and hydroponics to create a self-sustaining urban food system.
    The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
    ChatGPT data breach exposes personal info of users through partner Mixpanel. OpenAI confirms names, emails compromised in security incident.
    Android rolls out Emergency Live Video for 911 calls, letting dispatchers see real-time scenes during emergencies. Great for holiday travel safety.
    Malicious Chrome and Edge extensions collected browsing history, keystrokes and personal data from millions of users before Google and Microsoft removed them.
    Google's new Call Reason feature lets Android users mark calls as urgent before dialing, displaying an urgent label to recipients using Phone by Google app.
    Medical history made as surgeons successfully restore sight to legally blind patient using world's first 3D printed corneal implant grown from human cells.
    Data brokers aggressively collect your holiday shopping data to fuel scams and targeted ads. Learn how to delete your digital profile before 2025 starts.
    Scammers are sending fake MetaMask wallet verification emails using official branding to steal crypto information through phishing links and fraudulent domains.
    Learn what background permissions, push notifications, security updates, auto-join networks and app refresh mean to better manage your phone's privacy settings.
    Criminals test stolen data by applying for deposit accounts in victims' names to prepare bigger attacks. Learn why banks won't share fraud details.
    New study of 10,500+ kids reveals early smartphone ownership linked to depression, obesity, and poor sleep by age 12. Earlier phones mean higher risks.
    A phone phishing attack compromised Harvard's alumni and donor database, marking the second security incident at the university in recent months.
    AutoFlight's zero-carbon floating vertiport uses solar power to charge eVTOL aircraft while supporting emergency response, tourism, and marine energy maintenance.
    A new phone return scam targets recent buyers with fake carrier calls. Learn how criminals steal devices and steps to protect yourself from this fraud.
    New Anthropic research reveals how AI reward hacking leads to dangerous behaviors, including models giving harmful advice like drinking bleach to users seeking help.
    The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
    Holiday email scams, including non-delivery fraud and gift card schemes, spike in November and December, costing victims hundreds of millions, the FBI says.
    Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.
    Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
    Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
    Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
    Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
    Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
    iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
  • It?s Back!! WordPerfect?s Amazing Comeback

    Have you noticed WordPerfect is gearing up for a comeback... Read More

    Information Products: A Business Owners Best Friend

    We live in a post-industrial age where information is the... Read More

    Tripwire for Linux File Integrity

    What is Tripwire?Tripwire is a form intrusion detection system (IDS)... Read More

    Microsoft CRM Data Import FAQ

    Microsoft CRM has built-in conversion tool, however you should probably... Read More

    Five Tips For A Great Software Demo

    Whether you need to close a sale, gather end-user feedback,... Read More

    Instant Messenger Clients

    If you have been using the Internet for any amount... Read More

    CROOK: A Methodology for the Refinement of Forward-Error Correction

    Table of Contents1) Introduction 2) Related Work 3) Framework 4)... Read More

    Configure Windows Indexing Service for Performance

    The Windows Indexing Service provides you with the ability to... Read More

    Microsoft Navision Database Selection: C/SIDE or MS SQL Server - Overview For IT Specialist

    There are certain pluses and minuses in both cases and... Read More

    How to Tell You Have Spyware, Ad-ware or Viruses

    Usually, the easiest way to tell you have spyware is... Read More

    Review on QuarkXpress 6.0

    After almost two decades of existence, Quark has become the... Read More

    New SQL Delta Version 3.1

    COMMAND LINE FUNCTIONA powerful command line script processor has been... Read More

    MySQL for Beginners ? How to Create a MySQL Database

    Whether you are an experienced web programmer or a complete... Read More

    Microsoft Great Plains ? Licensing & Product Versions

    Current Microsoft Business Solutions Great Plains has more that 10... Read More

    Microsoft CRM ? Typical Customizations

    Microsoft CRM was designed to be easily customizable. Microsoft CRM... Read More

    Partitioning, Formatting and Reinstalling in Windows 98

    Formatting and reinstalling windows 98 is very easy if you... Read More

    Guide to Software Marketing

    Intro This concise article will tell you in plain English... Read More

    Microsoft Great Plains: exchange & brokerage ? implementation notes

    If you company is small or mid-size special products or... Read More

    Software Development in 2005 - Back to the Future

    2005 ? Back to the Future.What does the future hold?... Read More

    Resume Software ? Advantages Revealed

    The various resume software offered, particularly on the internet, can... Read More

    How to Choose the Right Accounting Software for Your Business

    With any good luck and a good amount of hard... Read More

    Manufacturing Outsourcing: Microsoft Great Plains Implementation, Customization & Reporting

    Manufacturing in the USA is far away down from mid... Read More

    eStore Advantage ? Extending Microsoft eConnect for MBS Great Plains

    eStore Advantage allows front-office applications to communicate with back-office business... Read More

    How to Make Attractive and Effective PowerPoint Presentations

    Microsoft PowerPoint has dramatically changed the way in which academic... Read More

    3 Reasons Why Medical Billing Software is Leading the Way

    Since technology changes so quickly, it is hard to begin... Read More

    tidy up service Arlington Heights ..