tips for hacking, Google tips,computer terms, spyware ,administrator hack,types of viruses,dvd movie backup,MICROSOFT, articles .

*******************************************WELCOME*************************************************

Welcome to all the people to COMPUTER MANIA , those who want to grow interest in computer world and become a perfect computer operator with having good knowledge of hacking,viruses ,worms,computer functinality,softwares,solution of many pc problems and many more.....

spott

Spottt
Spottt

Google search

11/27/08

10 Steps to prevent Fake antivirus

1. Use Firefox as your browser rather than Internet Explorer.

2.
Keep your computer updated with the latest antivirus and anti-spyware software, and be sure to use a good firewall.


3. Never open an email attachment unless you are POSITIVE about the source.

4. Do NOT click on any pop-up that advertises anti-virus or anti-spyware software, especially a program promising to provide every feature known to mankind. (Also remember: the fakes often mimic well-known brands such as Grisoft AVG, Norton and McAfee.)

5. If a virus alert appears on your screen, do NOT touch it. Don't use your mouse to eliminate or scan for viruses, and DON'T use your mouse to close the window. Instead, hit control + alt + delete to view a list of programs currently running. Delete the "rogue" from the list of running programs, and call your computer maker's phone or online tech support service to learn if you can safely use your computer.

6. Do not download freeware or shareware unless you know it's from a reputable source.

7. Avoid questionable websites. Some sites may automatically download malicious software onto your computer.

8. Reset your current security settings to a higher level.

9. Although fake software may closely resemble the real thing, it's rarely an exact match. Look for suspicious discrepancies.

10. Check out this list of rogue/fake anti-virus and anti-spyware products.


List of rogue / fake antivirus / anti spyware products

Advanced Cleaner[3]
AlfaCleaner
AntiSpyCheck 2.1
AntiSpyStorm
AntiSpywareBot [4]
AntiSpywareExpert
AntiSpywareMaster
AntiSpywareSuite
AntiSpyware 2008 XP
Antivermins
Antivirgear
Antivirus 2008
Antivirus 2009
AntiVirus Gold [5]
Antivirus Master
Antivirus XP 2008 [6]
Awola 6.0
Brave Sentry
BestsellerAntivirus
Cleanator
ContraVirus
Doctor Antivirus
DriveCleaner [7]
Disk Knight
EasySpywareCleaner
Errorsafe
free-viruscan.com
IE Antivirus
IEDefender
InfeStop
KVMSecure
MacSweeper
MalCrush 3.7
MalwareCore
MalwareAlarm
Malware Bell 3.2
Microsoft AntiVirus
PCSecureSystem [8]
PC Antispy [9]
PC Clean Pro [10]
PC SpeedScan Pro
PestTrap [11]
Perfect Cleaner
PAL Spyware Remover
PCPrivacytool
PC-Antispyware
PSGuard
SecurePCCleaner
Security toolbar 7.1
SpyAxe [12]
Spy Away
SpyCrush
Spydawn [13]
SpyGuarder
SpyHeal
Spylocked [14]
SpySheriff [15]
SpySpotter
Spyware Cleaner
Spyware Quake [16]
Spyware Stormer
SpywareStrike
Spy-Rid
SpyWiper
System Live Protect [17]
SystemDoctor
TrustedAntivirus
TheSpyBot
UltimateCleaner
VirusHeat
Virus Isolator
VirusProtectPro
VirusRanger
Vista Antivirus 2008
WinAntiVirus Pro 2006
WinFixer [18]
WinSpywareProtect
WorldAntiSpy
XP Antivirus
XoftSpySE
Zinaps 2008

Microsoft Word Metadata Scrubber



Metadata in Word documents can reveal information that the creator of the document had no intention to distribute. This ranges from information about the author to comments and a unique identifying ID. It can lead to all kind of privacy leaks. Microsoft even recommends to distribute documents in paper form only on their website.

Doc Scrubber is a Microsoft Word metadata scrubber which can be used to analyze and scrub Word documents. The software program is compatible with Windows 98, ME, NT, 2000 or Windows XP. It has been designed with simplicity in mind. It basically is managed by the two buttons Analyze and Scrub. 

Analyze lets the user analyze one specific Word document to see if and which information it reveals in the metadata. The Scrub button is where the real action takes place. It can be used to scrub a single document, all Word documents in a folder or selected documents of folder.

By default a new document will be created after the scrubbing with the metadata removed which is another option that can be changed in the program’s settings. The user is given the choice to remove only the metadata that he selects.

iPod Accessories For Fitness Freaks


Music is regarded as the great motivation tool for loosing fat, its impossible to not see an iPod when you go to a gym. An iPod is almost everywhere. But that’s just one job an iPod or a Mac, if it is played with the right applications vis-à-vis fitness, it can act as a personal trainer, dietitian and trail guide aswell. Let’s see whats more it has stored for you.

Nike + iPod

Nike + iPod system is one accessory for you which works with compatible video iPods like the iPod nano and iPod touch. Nike + iPod have a software that runs on the iPod, a sensor compatible Nike shoe is slipped into shoes and connected with a receiver unit at the base of the iPod (built-in receiver is must like the latest iPod touch).



The software helps users keep an account of distance, speed, calories burned, and the time elapsed in workout, all of them can be synced via your Mac to nikeplus.com. Besides this, it allows users choose or set goals for workouts in terms of time, distance, or calories to burn. The “PowerSong” is a unique feature that allows users to program a kick in when they need instant stimulus for exercise.

In the gym, even cardio machines are connected with Nike + iPod, delivering similar information tracking and motivation features as on the cardio machine’s consoles.

Obviously all equipments donot requires Nike + iPod, although some newer machines connect and charge video iPods, allowing users listen and view content on larger, built-in console screens.

Downloadable Workouts

There are downloadable programs available online for rock solid abs, stronger arms, glutes to run on an iPod both for Men’s and Women’s workouts. Some are free and some are chargeable starting at US$9.99. The workouts feature audio that directs you what to do and videos show the live demonstration of exercises.

Organisation like Podfitness.com and iTrain, take the iPod workouts even beyond with features like fitness profiles, goals and customization that can be done online which creates custom or recommended fitness workout downloads.

Apple’s App Store

Apple’s App Store comes to as an icing on cake for iPod touch and iPhone owners. The Healthcare & Fitness section boasts 225 third-party applications that can be downloaded to iPod touch or iPhone. Some of the apps are specially customized for doctors or healthcare professionals focussing on healthy eating, exercise, Body Mass Index (BMI) calculators.

The iPump is like a personal trainer on iPod which is reasonably cheap at $2.99. it is Total Body app that stores 80 male and female exercise videos demonstrating proper form including an audio coaching. It can be customised for multi-week progressive workout plans, and intensity features covering reps, sets, and rest intervals during each of the workouts.

MyNetDiary is an Online Diet Log helping the health nuts keeping track total calories consumed and total calories burned. Recommends Exercises to achieve an ideal BMI based on height of the person.
aSleep is a programmable timer that runs relaxing sounds like ocean waves, rain, instruments, scuba breathing and keyboard typing to sooth the listener for rest.

A virtual jump rope application of iPhone or iPod touch accelerometer when switched on, the listener starts jumping as if the iPhone or iPod touch is skipping rope handle. The Jump Rope app counts the number of jumps during a session, as well as the time spent per skips.

Tangible Accessories Talking about accessories there are dozens of ipod cases and belt clips already selling in market set to protect iPods and iPhones against shocks from spilling on ground or sweat. The versatile arm band style of case is targeted specifically at exercisers. The nekFIT is a sunglass shaped is yet another accessory that ties up with an iPod and mounts it on a person’s shoulders at the base of their neck. These ipod accessories are very terrific that helps in keeping out the iPod and ear bud cord off the way while exercising.

11/26/08

Basics Of Dual-Core Process Computer


The computer has been one of the most amazing and fruitful discoveries man has ever made. It has revolutionized the way man does his things. The way he eats, drinks, sleeps and even thinks. And computer itself has evolved over the years. From the Eniac I to the hand-held palmtops in executives` hands today, computer has changed with the technology. And it has changed our lives too.

The latest addition to this revolution of technical upgrading of computers is the dual-core processor technology. It refers to the CPU (Central Processing Unit- the brains of the computer) that possesses two independent and complete execution cores for each of its two processors. The concerned CPU contains two combined processors along with their cache memories and their respective controllers integrated into a singular circuit (commonly known as a silicon chip). 
The dual-core process computer is suited to multitasking and handling miscellaneous tasks (often unrelated to each other). Because its CPU has two completely independent execution cores and both have independent interfaces to the front bus, it has excellent capacity to execute several programs and tasks simultaneously. Similarly, dual-core process computers may have more processor cores which is actually named as a multi-core process computer. These are highly efficient machines to conduct intensive tasks of computing or program execution at the same instance of time.

The Pentium dual-core process computer is the most preferred brand of computer in the market. It has x86-architectured microprocessors integrated onto its circuit. The 32-bit Yonah processors are a base for mobile computers while the 64-bit Allendale processors are maintained for the desktop computers. Both have absolutely different architecture as far as microprocessor technical build is concerned.

By early 2007, Intel decided to launch dual-core process computers in the field of notebooks or laptops too. This was a very important and vital decision as there were no other rivals in this phase if the market of computer architecture. Intel had only decided to launch the dual-core process computer system applying to notebooks on the behest of notebook or laptop manufacturers. The first processors to appear in notebooks using the dual-core process computer technology were the Pentium T2060, T2080 and a 32-bit Pentium M based on the Yonah core with a 1 MB L2 cache, instead of the usual 2MB cache memory.

Intel had forced a return of the Pentium brand to the market arena on 2006 with a host of low-cost single core Conroe-L core architecture processors with a 1 MB cache. These were numbered `1` to distinguish them from dual core process computer cores that had been labeled with the digit `2`.

More recently, on June 3, 2007, Intel released desktop dual-core processors from the Pentium brand. They were named as E2140 and E2160. September 2007 saw the late release of a better and updated model named E2180. These processors support the Intel64 extensions, because of their Allendale derived Core architecture. The power of these dual-core process computers was very imminent as most companies` demands exceeded supply over these multi-processor machines.

Dual-core process computer systems have taken over the world of computing today. As of its multi-tasking ability, it has gained world-wide acclaim due to its efficient, quick and yet superior quality program execution and task completion abilities. Heavier programs and complex games may be run with these dual-core process computer systems at the regular pace of conventional single-core processor systems did with light programs on the execution chart.

The age of computers had begun a long time back. But the age of sleek and efficient computing with the help of razor-edge technology has just begun with the dual-core process computer systems.

11/16/08

Convert .vp6 to .avi

Vp6 is a popular format used by the EA Games with which they include various movies in the game, though we can only watch the movies while playing the games. It often happens (at least to me) that we wish to see those videos again and again but the only way to do that is to play
that part of the game each time.
Yeah, I know how it feels as I also enjoy playing various games. Now it was when I wanted to have that little snippet from one of my favorite games NFS Most Wanted which pushed me to find out “how I can convert vp6 to avi”.
The best possible way available to convert it is by using software called “NFSC vp6 Player”. The software comes free and clean which can be downloaded from
here.
Advantages of NFSC vp6 Player
1. Unbelievable video quality and that too exactly similar to the one packed inside the game.
2. The final video after conversion is small in size.
3. It is free to download.
4. The software can be used unlimited times.
Disadvantages of NFSC vp6 Player
1. Well this is the only disadvantage, the software can’t sync sound with video however we can easily put the sound file along with the video using other applications like Windows Movie Maker.

Solution to remove Write Protection from USB Pen Drive

This seems to be the problem of most of us these days and some of our readers who wanted to know the methods how they can remove the Write Protected error from their USB drives like Pen Drives and memory cards.

What is Write Protected error and why it happens?
In the Write Protected error, we can’t write or copy any data in our flash drives and even can’t format the drive.
There are many reasons that cause this problem, let’s see solutions of them.
Solutions:
• First of all try to locate a small switch (if any, that you may have not noticed) at some place on the drive or memory card reader. This is the prime reason for this error. If there is one, switch it to the other side to turn the protection off.
• Yes I know this problem is also occurring these days without this switch but not to worry. Just download this helpful software from here and run it to execute a “low-level format” on the drive. This software is quite handy and may take few attempts to actually remove the error.
• The problem can also be caused by some virus activity so just get it scanned by some updated good anti virus which may solve your problem.
• BUT if none of the methods listed above solves your problem then your pen drive might have gone corrupted, so just get it replaced.
Hope any of the methods listed above solves your problem.

Remove Newfolder.exe Virus easily


Now that we know the difference between virus, worm and Trojan lets get on the work to detect and remove some common viruses. This tutorial will help you remove the Newfolder.exe virus from your computer and let it breath free.

Removal through Tool:
Run the following tool in safe mode and the virus cleaned in seconds, yes it is that easy.
Download Tool
Manual removal:
1. Find out all the locations of the “newfolder.exe” virus.

2. Open the task manager and end the newfolder.exe process running in background.

3. Open cmd and then type “dir /a XXX” where XXX is the name of the folder where the virus is.

4. Then type “cd XXX”.

5. Delete the file by typing “del name_of_file”.

6. Then remove the whole folder by typing “rmdir /s XXX”.

7. The virus has been removed just see the task manager once again and end the newfolder.exe process running in the background (if any).

8. Restart the system.

Remove Happy Birthday virus easily

The Happy Birthday virus is picking up great deal of popularity and is spreading a lot faster as compared to other virus. This virus mostly spreads through E-mails and flash drives like pen drives.
Following are the problems that this virus causes:
1. Disables registry editor, folder options and command prompt.
2. Shows a tool tip near the mouse cursor with the texts ‘Happy Birthday’.
3. Runs a process named either “explorce.exe” or “explorcr.exe” in the background processes that confuses with explorer.exe
4. Operating system shows “NTLDR Missing” problem.
Solution to fix the problem:
1. First of all we need to get our folder options and registry editor .

2. Now kill the process “explorcr.exe” or “explorce.exe” running in background.
3. Now go to Folder options -> tick Show Hidden Files and Folders and uncheck Hide Protected Operating System Files.
4. Delete the exe from “C:\Windows\system32” folder.
5. Also delete the “autorun.inf” file from the root drive.
6. Now to fix NTLDR missing problem, insert XP CD and Copy ‘NTLDR’ from i386\NTLDR to %SystemDrive%
7. Reboot the system.
The problem must have gone.

Steps to Remove regsvr.exe Virus

There are so many types of computer viruses in this world that removing them and finding a specific solution for each of them is a big ask. One such virus that screwed me is regsvr.exe classified as a W32.Imaut worm.
It has become a daily routine that when I plug my pen drive in my college systems (full of all kinds of viruses), it gets infected by the viruses instantly. Though the Anti Virus I use (Symantec) successfully detects and remove them but I feel that I should discuss the steps to remove regsvr.exe virus.
What the regsvr.exe virus does?
• This worm creates folders and a registry entry to enable its automatic execution at every system startup.
• This worm also creates a scheduled task to enable its automatic execution at a specified date and/or time.
• It also creates Autorun.inf file for its auto execution.
Solution to fix the problem:
1. If the task manager and registry editor is disabled then we need to enable them first.

2. Delete the Autorun.inf file created by the virus.
3. Now type msconfig in the Run dialog and click on startup tab.
4. Look for regsvr and uncheck any options, click OK.
5. Now traverse to control panel -> scheduled tasks, and delete the At1 task that might be listed there.
6. Type regedit in the Run dialog to open the registry editor.
7. Click on Edit -> Find and search for regsvr.exe
8. Just delete all the occurrences of regsvr.exe virus (do not confuse it with regsvr32.exe which is not a virus).
9. Navigate to entry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon and modify the entry Shell = “Explorer.exe regsvr.exe” to delete the regsvr.exe from it.
10. Now to actually delete the virus from the system go to system32 folder and delete the regsvr.exe virus file from there (you will need to uncheck the option of “Hide Protected System Files and Folders” in Folder Options to view the virus file).
Reboot the system for changes to take place.

11/10/08

http VS https

  • http:// & https://

The main difference between http:// and https:// is, It's all about keeping you secure

HTTP stands for HyperText Transport Protocol, which is just a fancy way of saying it's a protocol (a language, in a manner of speaking) for information to be passed back and forth between web servers and clients.

The important thing is the letter S which makes the difference between HTTP and HTTPS.

The S (big surprise) stands for "Secure".


If you visit a website or webpage, and look at the address in the web browser, it will likely begin with the following: http://.

This means that the website is talking to your browser using the regular 'unsecure' language.

In other words, it is possible for someone to "eavesdrop" on your computer's conversation with the website.

If you fill out a form on the website, someone might see the information you send to that site.

This is why you never ever ever enter your credit card number in an http website!

But if the web address begins with https://, that basically means your computer is talking to the website in a secure code that no one can eavesdrop on.

You understand why this is so important, right?

If a website ever asks you to enter your credit card information, you should automatically look to see if the web address begins with https://.

If it doesn't, there's no way you're going to enter sensitive information like a credit card number!

*******