My Blog List
Google search
11/27/08
10 Steps to prevent Fake antivirus
2. Keep your computer updated with the latest antivirus and anti-spyware software, and be sure to use a good firewall.
3. Never open an email attachment unless you are POSITIVE about the source.
4. Do NOT click on any pop-up that advertises anti-virus or anti-spyware software, especially a program promising to provide every feature known to mankind. (Also remember: the fakes often mimic well-known brands such as Grisoft AVG, Norton and McAfee.)
5. If a virus alert appears on your screen, do NOT touch it. Don't use your mouse to eliminate or scan for viruses, and DON'T use your mouse to close the window. Instead, hit control + alt + delete to view a list of programs currently running. Delete the "rogue" from the list of running programs, and call your computer maker's phone or online tech support service to learn if you can safely use your computer.
6. Do not download freeware or shareware unless you know it's from a reputable source.
7. Avoid questionable websites. Some sites may automatically download malicious software onto your computer.
8. Reset your current security settings to a higher level.
9. Although fake software may closely resemble the real thing, it's rarely an exact match. Look for suspicious discrepancies.
10. Check out this list of rogue/fake anti-virus and anti-spyware products.
List of rogue / fake antivirus / anti spyware products
Advanced Cleaner[3]
AlfaCleaner
AntiSpyCheck 2.1
AntiSpyStorm
AntiSpywareBot [4]
AntiSpywareExpert
AntiSpywareMaster
AntiSpywareSuite
AntiSpyware 2008 XP
Antivermins
Antivirgear
Antivirus 2008
Antivirus 2009
AntiVirus Gold [5]
Antivirus Master
Antivirus XP 2008 [6]
Awola 6.0
Brave Sentry
BestsellerAntivirus
Cleanator
ContraVirus
Doctor Antivirus
DriveCleaner [7]
Disk Knight
EasySpywareCleaner
Errorsafe
free-viruscan.com
IE Antivirus
IEDefender
InfeStop
KVMSecure
MacSweeper
MalCrush 3.7
MalwareCore
MalwareAlarm
Malware Bell 3.2
Microsoft AntiVirus
PCSecureSystem [8]
PC Antispy [9]
PC Clean Pro [10]
PC SpeedScan Pro
PestTrap [11]
Perfect Cleaner
PAL Spyware Remover
PCPrivacytool
PC-Antispyware
PSGuard
SecurePCCleaner
Security toolbar 7.1
SpyAxe [12]
Spy Away
SpyCrush
Spydawn [13]
SpyGuarder
SpyHeal
Spylocked [14]
SpySheriff [15]
SpySpotter
Spyware Cleaner
Spyware Quake [16]
Spyware Stormer
SpywareStrike
Spy-Rid
SpyWiper
System Live Protect [17]
SystemDoctor
TrustedAntivirus
TheSpyBot
UltimateCleaner
VirusHeat
Virus Isolator
VirusProtectPro
VirusRanger
Vista Antivirus 2008
WinAntiVirus Pro 2006
WinFixer [18]
WinSpywareProtect
WorldAntiSpy
XP Antivirus
XoftSpySE
Zinaps 2008
Microsoft Word Metadata Scrubber
Metadata in Word documents can reveal information that the creator of the document had no intention to distribute. This ranges from information about the author to comments and a unique identifying ID. It can lead to all kind of privacy leaks. Microsoft even recommends to distribute documents in paper form only on their website.
Doc Scrubber is a Microsoft Word metadata scrubber which can be used to analyze and scrub Word documents. The software program is compatible with Windows 98, ME, NT, 2000 or Windows XP. It has been designed with simplicity in mind. It basically is managed by the two buttons Analyze and Scrub.
Analyze lets the user analyze one specific Word document to see if and which information it reveals in the metadata. The Scrub button is where the real action takes place. It can be used to scrub a single document, all Word documents in a folder or selected documents of folder.


iPod Accessories For Fitness Freaks
Music is regarded as the great motivation tool for loosing fat, its impossible to not see an iPod when you go to a gym. An iPod is almost everywhere. But that’s just one job an iPod or a Mac, if it is played with the right applications vis-à-vis fitness, it can act as a personal trainer, dietitian and trail guide aswell. Let’s see whats more it has stored for you. Nike + iPod Nike + iPod system is one accessory for you which works with compatible video iPods like the iPod nano and iPod touch. Nike + iPod have a software that runs on the iPod, a sensor compatible Nike shoe is slipped into shoes and connected with a receiver unit at the base of the iPod (built-in receiver is must like the latest iPod touch).
|
11/26/08
Basics Of Dual-Core Process Computer
The computer has been one of the most amazing and fruitful discoveries man has ever made. It has revolutionized the way man does his things. The way he eats, drinks, sleeps and even thinks. And computer itself has evolved over the years. From the Eniac I to the hand-held palmtops in executives` hands today, computer has changed with the technology. And it has changed our lives too. The latest addition to this revolution of technical upgrading of computers is the dual-core processor technology. It refers to the CPU (Central Processing Unit- the brains of the computer) that possesses two independent and complete execution cores for each of its two processors. The concerned CPU contains two combined processors along with their cache memories and their respective controllers integrated into a singular circuit (commonly known as a silicon chip). The dual-core process computer is suited to multitasking and handling miscellaneous tasks (often unrelated to each other). Because its CPU has two completely independent execution cores and both have independent interfaces to the front bus, it has excellent capacity to execute several programs and tasks simultaneously. Similarly, dual-core process computers may have more processor cores which is actually named as a multi-core process computer. These are highly efficient machines to conduct intensive tasks of computing or program execution at the same instance of time. The Pentium dual-core process computer is the most preferred brand of computer in the market. It has x86-architectured microprocessors integrated onto its circuit. The 32-bit Yonah processors are a base for mobile computers while the 64-bit Allendale processors are maintained for the desktop computers. Both have absolutely different architecture as far as microprocessor technical build is concerned. By early 2007, Intel decided to launch dual-core process computers in the field of notebooks or laptops too. This was a very important and vital decision as there were no other rivals in this phase if the market of computer architecture. Intel had only decided to launch the dual-core process computer system applying to notebooks on the behest of notebook or laptop manufacturers. The first processors to appear in notebooks using the dual-core process computer technology were the Pentium T2060, T2080 and a 32-bit Pentium M based on the Yonah core with a 1 MB L2 cache, instead of the usual 2MB cache memory. Intel had forced a return of the Pentium brand to the market arena on 2006 with a host of low-cost single core Conroe-L core architecture processors with a 1 MB cache. These were numbered `1` to distinguish them from dual core process computer cores that had been labeled with the digit `2`. More recently, on June 3, 2007, Intel released desktop dual-core processors from the Pentium brand. They were named as E2140 and E2160. September 2007 saw the late release of a better and updated model named E2180. These processors support the Intel64 extensions, because of their Allendale derived Core architecture. The power of these dual-core process computers was very imminent as most companies` demands exceeded supply over these multi-processor machines. Dual-core process computer systems have taken over the world of computing today. As of its multi-tasking ability, it has gained world-wide acclaim due to its efficient, quick and yet superior quality program execution and task completion abilities. Heavier programs and complex games may be run with these dual-core process computer systems at the regular pace of conventional single-core processor systems did with light programs on the execution chart. The age of computers had begun a long time back. But the age of sleek and efficient computing with the help of razor-edge technology has just begun with the dual-core process computer systems. |
11/16/08
Convert .vp6 to .avi
that part of the game each time.
Yeah, I know how it feels as I also enjoy playing various games. Now it was when I wanted to have that little snippet from one of my favorite games NFS Most Wanted which pushed me to find out “how I can convert vp6 to avi”.
The best possible way available to convert it is by using software called “NFSC vp6 Player”. The software comes free and clean which can be downloaded from here.
Advantages of NFSC vp6 Player
1. Unbelievable video quality and that too exactly similar to the one packed inside the game.
2. The final video after conversion is small in size.
3. It is free to download.
4. The software can be used unlimited times.
Disadvantages of NFSC vp6 Player
1. Well this is the only disadvantage, the software can’t sync sound with video however we can easily put the sound file along with the video using other applications like Windows Movie Maker.
Solution to remove Write Protection from USB Pen Drive
What is Write Protected error and why it happens?
In the Write Protected error, we can’t write or copy any data in our flash drives and even can’t format the drive.
There are many reasons that cause this problem, let’s see solutions of them.
Solutions:
• First of all try to locate a small switch (if any, that you may have not noticed) at some place on the drive or memory card reader. This is the prime reason for this error. If there is one, switch it to the other side to turn the protection off.
• Yes I know this problem is also occurring these days without this switch but not to worry. Just download this helpful software from here and run it to execute a “low-level format” on the drive. This software is quite handy and may take few attempts to actually remove the error.
• The problem can also be caused by some virus activity so just get it scanned by some updated good anti virus which may solve your problem.
• BUT if none of the methods listed above solves your problem then your pen drive might have gone corrupted, so just get it replaced.
Hope any of the methods listed above solves your problem.
Remove Newfolder.exe Virus easily
Now that we know the difference between virus, worm and Trojan lets get on the work to detect and remove some common viruses. This tutorial will help you remove the Newfolder.exe virus from your computer and let it breath free.
Removal through Tool:
Run the following tool in safe mode and the virus cleaned in seconds, yes it is that easy.
Download Tool
Manual removal:
1. Find out all the locations of the “newfolder.exe” virus.
2. Open the task manager and end the newfolder.exe process running in background.
3. Open cmd and then type “dir /a XXX” where XXX is the name of the folder where the virus is.
4. Then type “cd XXX”.
5. Delete the file by typing “del name_of_file”.
6. Then remove the whole folder by typing “rmdir /s XXX”.
7. The virus has been removed just see the task manager once again and end the newfolder.exe process running in the background (if any).
8. Restart the system.
Remove Happy Birthday virus easily
Following are the problems that this virus causes:
1. Disables registry editor, folder options and command prompt.
2. Shows a tool tip near the mouse cursor with the texts ‘Happy Birthday’.
3. Runs a process named either “explorce.exe” or “explorcr.exe” in the background processes that confuses with explorer.exe
4. Operating system shows “NTLDR Missing” problem.
Solution to fix the problem:
1. First of all we need to get our folder options and registry editor .
2. Now kill the process “explorcr.exe” or “explorce.exe” running in background.
3. Now go to Folder options -> tick Show Hidden Files and Folders and uncheck Hide Protected Operating System Files.
4. Delete the exe from “C:\Windows\system32” folder.
5. Also delete the “autorun.inf” file from the root drive.
6. Now to fix NTLDR missing problem, insert XP CD and Copy ‘NTLDR’ from i386\NTLDR to %SystemDrive%
7. Reboot the system.
The problem must have gone.
Steps to Remove regsvr.exe Virus
It has become a daily routine that when I plug my pen drive in my college systems (full of all kinds of viruses), it gets infected by the viruses instantly. Though the Anti Virus I use (Symantec) successfully detects and remove them but I feel that I should discuss the steps to remove regsvr.exe virus.
What the regsvr.exe virus does?
• This worm creates folders and a registry entry to enable its automatic execution at every system startup.
• This worm also creates a scheduled task to enable its automatic execution at a specified date and/or time.
• It also creates Autorun.inf file for its auto execution.
Solution to fix the problem:
1. If the task manager and registry editor is disabled then we need to enable them first.
2. Delete the Autorun.inf file created by the virus.
3. Now type msconfig in the Run dialog and click on startup tab.
4. Look for regsvr and uncheck any options, click OK.
5. Now traverse to control panel -> scheduled tasks, and delete the At1 task that might be listed there.
6. Type regedit in the Run dialog to open the registry editor.
7. Click on Edit -> Find and search for regsvr.exe
8. Just delete all the occurrences of regsvr.exe virus (do not confuse it with regsvr32.exe which is not a virus).
9. Navigate to entry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon and modify the entry Shell = “Explorer.exe regsvr.exe” to delete the regsvr.exe from it.
10. Now to actually delete the virus from the system go to system32 folder and delete the regsvr.exe virus file from there (you will need to uncheck the option of “Hide Protected System Files and Folders” in Folder Options to view the virus file).
Reboot the system for changes to take place.
11/10/08
http VS https
The main difference between http:// and https:// is, It's all about keeping you secure HTTP stands for HyperText Transport Protocol, which is just a fancy way of saying it's a protocol (a language, in a manner of speaking) for information to be passed back and forth between web servers and clients. The important thing is the letter S which makes the difference between HTTP and HTTPS. The S (big surprise) stands for "Secure". If you visit a website or webpage, and look at the address in the web browser, it will likely begin with the following: http://. This means that the website is talking to your browser using the regular 'unsecure' language. In other words, it is possible for someone to "eavesdrop" on your computer's conversation with the website. If you fill out a form on the website, someone might see the information you send to that site. This is why you never ever ever enter your credit card number in an http website! But if the web address begins with https://, that basically means your computer is talking to the website in a secure code that no one can eavesdrop on. You understand why this is so important, right? If a website ever asks you to enter your credit card information, you should automatically look to see if the web address begins with https://. If it doesn't, there's no way you're going to enter sensitive information like a credit card number! ******* |