Thursday, November 27, 2008
Speed UP your Computer
Tuesday, November 25, 2008
Protect USB Pen-Drive
Do you use a Pen-Drive for transferring data across different systems in your office/network, then there is a high possibility of virus infections for transferring across with the pen-drive as a medium.Here are collection of freeware tools that you could as your first line of defense before using your pen drive on other systems.
USB Write Protector –This freeware application prevents write access to a USB drives. This will protect USB drives from viruses, malwares, spywares etc.Using this tool you can just copy data from your pendrive to the system but not copy data into the pen drive from the client system.Its only 190 KB and works with XP with SP2.
HomePage Download
protect PEN DRIVE from Virus
What is Pen Drive? Now this questions come into our mind. Actualy pen drive is a device which contain a chip (memory) which store all the data in it or we can call removable Hard Disk of Computer.
This is used to transfer data from one computer to another.
But Now big problem is that It is also becoming dangerious for the PCs , because in large amount it is affected by the virus. This virus is very hurmful it can damge all the data's of computer or some virus's are so dangerious it can damage Hard Disk also.
Don't be panic, Here I am going to show you how you can save or protect your PEN DRIVE from Virus. Just simply follow this steps in your computer and you will ammaged to see it.
Ok Let us try to solve it
STEP 1. Open your Computer or Laptop, Click on START then go to RUN then type CMD now check the letter of your pen drive (eg. H:)
STEP 2. In the command promt now type H: and press ENTER
STEP 3. Now Type dir/w/o/a/p and press ENTER, now you will get list of file. Check this file for "Autorun.inf, new folder.exe, bha.vbs,explore.vbs, info.exe, ravon.exe,ravon.exe, mntdrcore.exe,rvhost.exe or other exe file extention.
STEP 4. If you found any of the above file then run the command [attrib -h -r -s -a*.* ] in comman promt and then press Enter
STEP 5. Now Delete each file one by one using del file name eg. del autorun.inf .
STEP 6. Now scan your pen drive from any anti-virus, Now you will find that your pen drive does't get affected from virus.
Friday, November 21, 2008
DAP Premium 8.7 Free
Features:
- Preview pane
Download Accelerator Plus registered version includes:
- Zip Extract
Only with DAP Premium:
- Extremely faster
Tuesday, November 18, 2008
Hack Windows XP Password
Another method to login to a password protected Windows even if you do not have the password is by making Windows accepting any passwords.
There is a far better way to get into Windows XP. It is easy and it does not reset the password. Hack into a computer running Windows XP without changing the password and find out all and any passwords on the machine (including admin accounts). You do not need access to any accounts to do this. Of course, do not do this on anyone elses computer without proper authorisation.
Steps to Hack into a Windows XP Computer without changing password:
1. Get physical access to the machine. Remember that it must have a CD or DVD drive.
3. Unzip the downloaded dpl.zip and you’ll get dpl.ISO.
4. Use any burning program that can burn ISO images.
5. After you have the disk, boot from the CD or DVD drive. You will see Windows 2000 Setup and it will load some files.
6. Press “R” to install DreamPackPL.
7. Press “C” to install DreamPackPL by using the recovery console.
8. Select the Windows installation that is currently on the computer (Normally is “1″ if you only have one Windows installed)
9. Backup your original sfcfiles.dll by typing:“ren C:WindowsSystem32sfcfiles.dll sfcfiles.lld” (without quotes)
10. Copy the hacked file from CD to system32 folder. Type:“copy D:i386pinball.ex_ C:WindowsSystem32sfcfiles.dll” (without quotes and assuming your CD drive is D:)
11. Type “exit”, take out disk and reboot.
12. In the password field, type “dreamon” (without quotes) and DreamPack menu will appear.
13. Click the top graphic on the DreamPack menu and you will get a menu popup.
14. Go to commands and enable the options and enable the god command.
15. Type “god” in the password field to get in Windows.You can also go to Passwords and select “Logon with wrong password and hash”. This option allows you to login with ANY password.
Note: I was unable to bring up the DreamPackPL for the first time because I have Kaspersky Anti-Virus already running in background. I believe most antivirus already labelled this tool as a Hack-Tool. A Hack-Tool is NOT a virus. DreamPackPL helps you bypass the Windows Login screen and it is not destructive.
Monday, November 17, 2008
How To Speed Up XP
Monday, November 10, 2008
iPHONE-3G
Apple - iPhone - Features - 3G:
3G technology gives iPhone fast access to the Internet and email over cellular networks around the world. iPhone 3G also makes it possible to do more in more places: Surf the web, download email, get directions, and watch video — even while you're on a call.
iPhone 3G uses a technology protocol called HSDPA (High-Speed Downlink Packet Access) to download data fast over UMTS (Universal Mobile Telecommunications System) networks. Email attachments and web pages load twice as fast on 3G networks as on 2G EDGE networks. 1 And since iPhone 3G seamlessly switches between EDGE, faster 3G, and even faster Wi-Fi, you always get the best speeds possible.
iPhone 3G meets worldwide standards for cellular communications, so you can make calls and surf the web from practically anywhere on the planet. And if you're in an area without a 3G network, iPhone connects you via GSM for calls and EDGE for data.
iPhone already gives you mobile multitasking. But 3G technology lets you multitask in more places — without connecting via Wi-Fi. Since 3G networks enable simultaneous data and voice, you can talk on the phone while surfing the web, checking email, or using Maps. All from your 3G cellular network.
iPhone 3G delivers UMTS, HSDPA, GSM, Wi-Fi, EDGE, GPS, and Bluetooth 2.0 + EDR in one compact device — using only two antennas. Clever iPhone engineering integrates those antennas into a few unexpected places: the metal ring around the camera, the audio jack, the metal screen bezel, and the iPhone circuitry itself. And intelligent iPhone power management technology gives you up to 5 hours of talk time over 3G networks. 2 That's some of the best in the business.
hasEML = false;
ReplyReply All
JSifyForm("forward_bottom645704434");
Move...My Mail
Tuesday, November 4, 2008
McAfee's focus as a one-stop shop
The Web site Dictionary.com defines the word focus as "a central point, as of attraction, attention, or activity." This is an apt description of McAfee's inaugural customer event, McAfee Focus.
McAfee customers received the message that the company is focused in three areas:
1. Growth through acquisition. McAfee is intent on becoming a one-stop shop for governance, compliance, and risk management. To this end, the company purchased outside firms like Reconnex, SafeBoot, and Secure Computing. Look for McAfee to continue this trend by buying companies in areas like application security, identity management, IT operations management, and security management.
2. Product integration. McAfee has two areas for integration: the endpoint (i.e., one agent for security, encryption, network access control, etc.) and its management platform Enterprise Policy Orchestrator (ePO). McAfee wants to surround its customers with broad functionality AND central command-and-control.
3. Industry relationships. In the past few weeks, McAfee announced partnerships with Commvault, HP, Intel, and VMware. The goal? Make McAfee a development nexus for anything related to security integration.
These initiatives come right from the playbook of McAfee CEO, Dave DeWalt, a veteran of the software industry. The results of this game plan seem good so far: McAfee reported record revenue of $410 million (27 percent growth) in the third quarter.
So will this focus and aggressive behavior continue? I expect McAfee to back off the gas pedal a bit to feel its way through muddy economic waters but the company will also capitalize on deflated market capitalization values to acquire more companies and a softening job market to grab top talent. In this growing global recession, McAfee may be one company that is able to swim against the tide.
Inside Windows 7's new desktop
This point was exacerbated by the fact that the build that developers were given a chance to take home last week doesn't have the new taskbar that represents the most visual difference between Windows 7 and today's Vista desktop.
Microsoft went to the trouble of shifting all the computer kiosks at the Professional Developers Conference over to Windows 7 on Tuesday. But because the version lacked some of the key visual features, some attendees didn't even notice they were running the newer Windows.
But Microsoft felt that keeping the user interface features out of the developer build was critical to keeping the features a surprise at the conference. The company's earlier M1, M2, and M3 builds all leaked out, said Chaitanya Sareen, a program manager in the Windows unit.
As the conference was winding down on Thursday, Sareen and another program manager--Rebecca Deutsch--offered an in-depth look at the changes Microsoft made to the desktop as well as the rationale for them. To get the best understanding of the changes, check out the two embedded videos (apologies for the lack of tripod).
With Vista and all its recent predecessors, there are a host of different icons at the bottom of the screen, with one group representing favorite items, another representing open program windows and a third representing notifications and items that launch at start-up.
Window 7 aims to do away with most of that redundancy in favor of one collection of large icons that live at the bottom of the screen. The icons represent applications chosen by the user and live there whether an application is running or not.
The large icons serve several purposes. The icon can, of course, be used simply to switch to or launch an application. It is also home to what is known as a "jumplist," sort of like a mini start menu for each program that can contain a series of actions, a link to recent documents, or even a series of controls that let a user take an action without switching to the program itself.
When a program is open, the icon also allows a user to preview that application's open windows. Clicking on a thumbnail naturally brings that window to the front. Hovering over the preview, though, temporarily previews that window as if it were in front, but doesn't actually complete the change--a feature Microsoft is calling "Aero Peek."
The idea came as the company tried to solve a riddle: what was the perfect size for a thumbnail window? For things like graphical Web pages or a pair of photos, a small representation might do the trick. But when one is trying to, say, flip between two similar Word documents or e-mails, it gets harder.
"The perfect size of the thumbnail is the actual size of the window," Sareen said. And that's how Aero Peek was born.
The goal with that feature and others, Sareen said, is to find ways to remove some of the things that make computing harder, what he calls "paper cuts." They aren't bugs, so much as things that are needlessly complicated or nonintuitive.
"We kind of went on a war against paper cuts," he said.
The company is also trying to reduce all of those annoying notifications that pop up along the right hand side of the computer. Developers can still write code that makes them appear, Deutsch said, but with each one that pops up, users have the option of disabling all such warnings from that program. The idea is to use social engineering to convince developers to bother the user far less often.
Core Security finds critical Adobe Reader hole
The vulnerability affects version 8.1.2 of Reader, Core Security said in a statement issued on Tuesday to coincide with Adobe's planned release of a security update to fix the vulnerability.
An attacker could put malicious code in JavaScript embedded in a PDF and spread that via a Web site or e-mail. Once the file is opened, the code could manipulate the program's memory allocation pattern and trigger the vulnerability to execute arbitrary code with the privileges of the user.
Damian Frizza, a CoreLabs researcher, discovered the vulnerability in May while he was investigating a similar vulnerability in a different PDF viewer application called Foxit Reader. Core Security immediately reported the new hole to Adobe.
Adobe representatives did not return a call seeking comment on Monday.
The complexity of desktop software increases the chances of applications having bugs that result from the implementation of the software, said Ivan Arce, chief technology officer of Core Security.
"We've seen similar vulnerabilities in JavaScript engines in Adobe software in the past and in other applications," he said. "It's difficult to avoid implementation bugs like this one."
The fact that both PDF Readers have the same bug indicates that even though vendors are building products with different technologies and code bases, they ought to check for such bugs in their applications when rival software is found to be vulnerable, Arce said.
Elinor Mills covers Internet security and privacy. She joined CNET News in 2005 after working as a foreign correspondent for Reuters in Portugal and writing for The Industry Standard, the IDG News Service, and the Associated Press.
Yahoo signs up BOSS search partner
Delver, a search start-up that personalizes search results by paying attention to a person's social connections, has signed up for Yahoo's BOSS (Build Your Own Search Service).
BOSS lets larger search sites use Yahoo's search results, tailored in any way desired but stripped of any Yahoo branding, in exchange for showing Yahoo ads or sharing revenue. Delver plans to mix those results in with its own technology, which shows results drawn from publicly visible parts of social sites such as profiles, blogs, bookmarks, and videos. Smaller sites and academic projects can use BOSS for free.
"Leveraging Yahoo Search BOSS allows us to keep focusing on social-graph ranking and indexing, while providing our users with a solution that intelligently mixes social results with traditional Web results," Delver Chief Executive Liad Agmon said in a statement Tuesday.
Saturday, November 1, 2008
Modify XP System Properties logo
The Windows XP System Properties logo is often changed by computer manufacturers. Hardware vendors use this general system information dialog to brand your computer with their own logo and support contact information.
In this tip you can learn how you can insert your own logo in the system properties dialog and complete it with your own contact information.
To invoke the system properties dialog, click the Start button, right-click "My Computer" and select "Properties".
This will open up your general system information dialog. On our Fujitsu-Siemens Amilo Pro laptop, the Windows XP System Properties logo looks like this :
>>In the "open" field, enter "cmd" (without the quotes) and click ok
>>Windows will open up a dos command window
>>In the command window, type "set system" (without the quotes)
>>Look for the line that contains "SystemRoot", this is where your system directory is (generally, the Windows XP system folder is c:\windows)
Make your own icons
Now add type, color, or do whatever you'd like to your image. I like to shrink photos (headshots work best) to 32x32 and simply paste them into my Paint document. When you're finished, open the File menu and click Save As. Use the dialog box to choose where you want to save your file, then give it a name followed by ".ico" (without the quotes), and click Save. (The extension ".ico" tells Windows that it's an icon file.) You just created an icon! Now you can change any shortcut or folder to your own icon—just browse to it on your hard drive.