Dear Readers: HWS has recently started a new project for the students of engineering ====> The Engineering Projects


Write at HWS !!!

Guest Posting

How secure is your Computer ?

Check out your computer safety here . A lot of tools , tricks and hacks related to computer .

Blogger Tips and Tricks

A Lot of tips ,tricks and hacks related to blogger . Seo tricks to get maximum targetted traffic to your blog.

Easy ways to Earn Online

Online earning is not so difficult but it needs a lot of patience and hardwork. Here are some techniques to earn money through internet.

Facebook Tricks

A lot of facebook tips , tricks and hacks.It requires a lot of time but reading is must.

Pro Hacking

If you have knowledge about basic techniques then try this,but be careful as it is highly toxic.

Showing posts with label Computer Tricks. Show all posts
Showing posts with label Computer Tricks. Show all posts

Saturday, November 26, 2011

Batch File To Start Program In Start up of Computer

Whenever I start my computer it is usually so in the beginning I have to start the same program, which in my case is FrontPage. I update my webpage everyday so I decided to get rid of this thing so I created a batch file to start this program automatically at start up so it is always ready for me to useand no need to run it manually.

Batch File to Start Desired Programs on Start up of Computer

  1. First of all open notepad. It is located at Start Menu >> All Programs >> Accessories >> Notepad (Windows XP)
  2. Then type start frontpg.exe
  3. Now click on save as and save this file with .bat filename extension. I have called mine startup.bat
  4. Now you can double click on it on the desktop to test if it opens FrontPage.
  5. Now Right click on the Start Menu.
  6. Now open the Programs folder, then The Startup Folder.
  7. Paste your file in the Startup folder.
  8. Now whenever you start your computer, your program will automatically start for you. You do not even have to click on the batch file to start your program.
You can start any exe file with this simple little batch file. An exe file is an executable file that usually starts a program. Here are some variations of the simple batch file.
  • start /min frontpg.exe
  • start /min iexplorer.exe
  • start /min notepad.exe
  • start /min iexplorer.exe
  • start /min msimn.exe

Notes:

  • /min = When the program opens it is minimized in the task bar
  • /max = When the program opens it will be maximized and open on your screen Also writing nothing does the same thing.
  • winword.exe Microsoft words .exe filename.
  • msimn.exe Opens Outlook Express.
  • Leave your batch file on your desktop You can just press on it yourself to start all your programs. It starts them so quick!!!   I would rather do it this way. It is even quicker than pressing on the icon on the desktop…Don’t ask me why.
  • You can also drop a shortcut to a program into the startup folder and it should do the same thing.. Give it a try
  • start /min 10.0.0.1  This will take you to a network computer. You need to replace the IP address with the address of the computer you want to connect to. You can also put a server name or computer name as long as it is on the network.

Friday, October 21, 2011

3 Ways to Open MS Excel 2007 Files in MS Excel 2003

In MS Excel 2003 the extension of files is .xls but after the release of MS Excel 2007 ,Microsoft changed the extension of .xlsx and now we can't open the MS Excel 2007 Files in MS Excel 2003 Software,which causes a lot of trouble sometimes and there's a need to resolve this problem. So today I am going to share some ways through which we can easily open Excel 2007 file in Excel 2003. So here are some ways to do it :

Microsoft Compatibility Pack

Microsoft was also aware of this issue and was continuously getting negative response from the users,so they thought of making some bridge between between them and this gives birth to Microsoft Compatibility Pack . Through this pack you can save ,edit and convert your file from 2007 to 2003 easily.This pack also converts MS Word 2007 files into 2003 files.

Open Office Software

Open Office is a free software which is used to open the MS Excel files if you dont have the MS Excel 2007 software. Its an open Source Software from Sun Microsystems. It also has many other features like you can easily make presentations on it.

Excel Viewer

Excel Viewer is another product of microsoft which is used to open excel files of any format,if you dont have the MS Excel software.

Hope you guys like it .... Tell us which method among them you like the most :>

Wednesday, October 19, 2011

Multiple Homepages in Mozilla Firefox

Did you people ever wish to set-up multiple home pages in Firefox?If you said yes, then you are at the right place. Here’s the way to do this little but, useful little trick.Suppose you would like to set Facebook, Google and YouTube as your homepages. Then try this tweak in Firefox to set multiple homepages. This is what you should do:

  • Go to Tools>Options>Main
  • In the When Firefox starts drop down menu choose Show my home page.
  • In Home page give your homepages separated by a | (pipe symbol).
  • Click OK
  • Example: 
http://www.hackwithstyle.com/|http://www.google.com|http://www.facebook.com/
  • Now next time when you start Firefox all of your three home pages will be displayed simultaneously.
Do you have questions, comments, or suggestions? Feel free to post a comment!

Tuesday, October 18, 2011

How to Reset RAM in a Computer

RAM, otherwise known as Random Access Memory, is basically the memory that your computer uses at short term, in order to keep track of all the actions you are currently doing on the computer. If your computer does not have enough free system memory, your programs will begin to run slow, and your computer may actually crash. Usually when you finish with a program, the RAM that was being used is released back into the system; however, there are times that this does not occur. To solve this problem and reset your system RAM, all you need to is defragment your system RAM with a program.

Instructions

Follow these Steps carefullt to reset a ram :

Step1

  • Download RAM Def 2.6 Xtreme
  • Save the file to your computer. 
  • This software has been tested for spyware and viruses, so you have nothing to worry about. Best of all, the software is completely free.

Step2

  • Unzip the file, and run the .exe file to install the software to your computer by following the on screen instructions. 
  • This installation will take you around five minutes, and will not take up much storage space on your hard drive. 
  • Programs like these are perfectly fine for your computer system, and will help you keep up maintenance on it.

Step3

  • Run the program. 
  • The first time you run the program you will be prompted to choose settings. 
  • You'll need to click "Yes" on the box that pops up in order to choose the settings. 
  • These settings will dictate how the program will behave from now on, in terms of the way it will display information to you, and how often it will run.

Step4

  • Choose settings that appropriate to your liking. 
  • It is suggested to allow the program to run at all times, and when Windows starts, so that you may always keep an eye on your memory resources. 
  • You can set the program to alert you when your resources have reached 1/3 of the total system memory available. 
  • Once you have chosen these settings, click OK.

Step5

  • Click Start to begin the defragmenting process. 
  • When you are finished, you can click Send to Tray so that the program will continue to run in the background and notify you of your status.
Credits : This post is actually posted on ehow.com so all credits go to this site. 

Monday, October 17, 2011

Make a photo background in drives

Perform the following steps ..
  • Open notepad and copy the following code :
Code: [{BE098140-A513-11D0-A3A4-00C04FD706EC}]
iconarea_image=D:\Wallpapers\celeb\Genelia.jpg
iconarea_text=0x00FFFFFF
  • Here, the path in the 2nd line of code represents the path of your picture.
  • Now save this file as DESKTOP.INI in the location(any drive or any folder) where you desire to set the background picture.
  • After setting it in your favourite location,close the drive and open the location again.
  • DONE !! .. your picture has been set as background picture for your desired location.
NOTE : Make sure that the extension in the path should be .jpg only and file should be saved as DESKTOP.INI only.

Sunday, October 16, 2011

How to hack a computer - Cain and able

Cain and Abel (sometimes called simply "Cain") is a Windows password recovery tool. It can recover many kinds of passwords using methods such as network packet sniffing, cracking various password hashes by using methods such as dictionary attacks, brute force and cryptanalysis attacks. Cryptanalysis attacks are done via rainbow tables which can be generated with the winrtgen.exe program provided with Cain and Abel. Cain and Abel is maintained by Massimiliano Montoro.Kumar has already posted about how to use Cain and Abel to hack Networks.

Cain & Abel is a useful tool for network administrators, teachers, security consultants/professionals, forensic staff, security software vendors, professional penetration tester and everyone else that plans to use it for ethical reasons. 

How to hack a Computer with Cain and Able

  • This hack will only work for Computers connected on LAN.
  • First of all download Cain and Abel Software.
  • Now install the software and open it . Make sure that you dont have any active antivirus on your pc.
  • First Click the Sniffer Tab.
  • Now Click on the sniffer button in the top toolbar. On clicking ,the sniffer will start.
  • Now click on + button to add the range of ip address you want to hack on LAN. Like in my hostel my ip is something like 15.15.15.04 so I have given the range from 15.15.15.1 to 15.15.15.254 .
  • Tick the option which says " All Tests ".
  • Click OK and you will see the software will start all the test.
  • After completion of these tests you will see the MAC Addresses ,IP addresses and OUI fingerprints of all computers running in your LAN .
  • Now click on APR tab below.In APR there are two windows .
  • Click on the above window and the + button will appear above .Now Click that button and a new window will open.
  • Left side window will show all the ip addresses and right window will be empty.
  • Click on any IP address in the Left Window and all other IPs will automatically appear in right window.Suppose I click on 15.15.15.1 .
  • Press Cntrl and select all the ips in the right window and Click OK.
NOTE: What you are doing ? Actually you are going to poison all the other ips using 15.15.15.1 . In this way you will be totally safe . If someones tries to know who is poisoning then he will get the ip of 15.15.15.1 and you are safe here :)
  • All these ips will be shown in above window.
  • Now Click on APR Button in the top toolbar and as you click on that button poisoning will start.It will show in the below window.
  • Now click on the Password tab below.
  • In the left  list you will see HTML .Click on it.
  • Hurrah you got the passwords of all the PCs and also the sites they have recently visited .
NOTE: APR poisoning is very dangerous , and during this hack your LAN is fully loaded and it affects the speed a lot .

Status with Virus Scanners

  • Some virus scanners, notably Avast! detect Cain and Abel as 'malware' "Win32:Cain-B [Tool]". It's classified in Avast! as "Other potentially dangerous program". 
  • The author, and owner of oxid.it states that his programs are not Malware. Even if Cain's install directory, as well as the word "Cain", are added to Avast's exclude list, the real-time scanner will stop Cain from functioning. 
  • The latest version of Avast no longer blocks

Attacks Available in Cain and Abel

  • The latest version of this Computer Tool is faster and contains a lot of new features like APR (Arp Poison Routing) which enables sniffing on switched LANs Man-in-the-Middle attacks. 
  • The sniffer in this version can also analyze encrypted protocols such as SSH-1 and HTTPS, and contains filters to capture credentials from a wide range of authentication mechanisms. 
  • The new version also ships routing protocols authentication monitors and routes extractors.
  • Dictionary and brute-force crackers for all common hashing algorithms and for several specific authentications, password/hash calculators, cryptanalysis attacks, password decoders and some not so common utilities related to network and system security.

Features

  • WEP cracking
  • Speeding up packet capture speed by wireless packet injection
  • Ability to record VoIP conversations
  • Decoding scrambled passwords
  • Calculating hashes
  • Traceroute
  • Revealing password boxes
  • Uncovering cached passwords
  • Dumping protected storage passwords
  • ARP spoofing
  • IP to MAC Address resolver
  • Network Password Sniffer

Simplest way to hide Folders - Computer Tricks

In the previous post we have checked How To Partition Hard Drive Without Losing Data. In this post i want to show you a very simple, but really cool and pretty useful trick to keep folders hidden, and best of all, no software needed.After reading this you will really laugh as its just a simple trick .

Follow these steps

  • Create a new folder somewhere on your hard drive. 
  • When you name it hold down "Alt" and press "0160" this will create and invisible space so it will appears as if it has no name.
  • Right click it and select "Properties" select the tab "customize" and select "change icon" scroll along and you should a few blanc spaces click on any one and click ok and save it. 
  • When you have saved the settings the folder will be invisible to hide all your personal files.

How To Partition Hard Drive Without Losing Data - Computer Tricks

Before starting note that:
  • We can partition any drive, even a system drive 
  • We can do it only in Windows XP, Windows 7 and Vista specifically

Follow these simple steps

  • Go to Start > Right click on My Computer and choose Manage.
  • Disk Management Window will Pop-up, it may take time to load it since it fetches for all the hardware and system information in your PC. 
  • After it’s fully loaded, go to Storage> Disk management at the left sidebar. This is where we’ll have all the information about storage devices that are in our PC currently connected and active. 
  • At the right column all the storage media will be listed with their basic information like File system type, and status. 
  • Now choose the Volume that you want to partition. Right Click on it and select Shrink Volume option from menu. 
  • As soon as you click on the Shrink Volume option, system will search for available space in your selected Disk Volume.
  • This will not take much longer than few seconds. After querying, Shrink window will pop-up. This is where you’ll have to specify the Volume for next partition.
  • Look at the total size of available shrink space. Below it, you’ll have to Enter the space to shrink.you must make sure that the size is not below the total size of space taken by files in that drive.
  • You can check the used space by right clicking on the drive you are going to partition and choose Properties.
  • Click on Shrink button after specifying the size to shrink. 
  • The shrink size is for the value for the partition where your old files will be contained and remaining size will allocated for your next partition.
  • But you’ll still not able to access this new drive. You’ll have to format it and specify the drive letter to access them. To do so, continue reading...... :))

Format the new drive

  • Right click on unallocated drive and choose New Simple Volume option.
  • New Simple Volume Wizard Window will popup.
  • Click on Next button to continue.
  • In next window, you’ll have to specify the size for your new volume.
  • Set full size if you are satisfied with two partitions; else divide it again for new partition.
  • Next choose any drive letter from the available list and click on Next button.
  • In next window, leave everything as default.
  • Click on Finish window to complete the wizard.
If you’ve autoplay enabled in your computer, then New Volume will be auto played for the first and last time.
With similar method you can also format your empty drive to create multiple partitions.

Saturday, October 8, 2011

Use your USB hard drive or Pen Drive as virtual OS - Lupo Pensuite

Pen drive and portable USB hard disks are nowdays become a common method to transfer data between systems. But do you know that you can use any application directly from your pen drive or portable USB hard disk just by connecting your Pen drive to the any PC or laptop. Ahha you all are still in confusion, what actually i am talking about, so lets have better view.

Suppose you gone to your friends or simply college and there you want to use Microsoft excel or any other application but that is not installed on that system. Then what happen you got stuck and your work got halted there but if you have portable application for that which you can keep in your pen drive or portable hard disk and use it where ever you want then you will never face situations like above. But now you all will be thinking we need a lot of portable applications for that, right... yes are thinking in right way but Lupo pensuite has done that for us. Why don't we keep everything in our pocket and use it whenever , wherever we need the application. What it has done, it has kept all the daily use and critical applications in one portable installation which consist of all daily use applications like:
  • WEB BROWSERS
  • E-MAIL CLIENTS
  • MESSENGERS
  • P2P CLIENTS
  • WEB SERVERS
  • DOWNLOAD MANAGERS
  • FEED READERS
  • REMOTE CONTROL
  • BOOKMARKS MANAGERS:
  • FTP/SSH CLIENTS
  • PORTABLE WIKI
  • LINK CHECKER
  • PROXY SERVER
  • VIDEO PLAYERS
  • AUDIO PLAYERS
  • MEDIA EDITORS
  • MEDIA CONVERTERS
  • CD/DVD RIPPERS
  • TAG EDITORS
  • STREAM MANAGERS
  • CD/DVD BURNERS
  • VIDEO CAPTURE
  • IPOD MANAGERS
  • MEDIA INFO
  • MEDIA CATALOGERS
  • CD/DVD TOOLS
  • TEXT TO SPEECH
  • MEDIA CENTER
  • IMAGE VIEWERS
  • IMAGE EDITORS
  • GRAPHICS EDITORS
  • SCREEN CAPTURE
  • SCREEN ZOOMERS
  • ICON/CURSOR EDITORS
  • IMAGE PROCESSING
  • ALBUM CREATORS
  • COVER CREATOR
  • SYSTEM MANAGERS
  • SYSTEM INFORMATION
  • NETWORK TOOLS
  • MONITORING/TESTING TOOLS
  • PROGRAM LAUNCHERS
  • STARTUP MANAGERS
  • SCHEDULING MANAGERS
  • TWEAKERS
  • REGISTY TOOLS
  • DISK DEFRAG
  • VIRTUAL DESKTOP
  • UNINSTALL TOOLS
  • CLIPBOARD TOOLS
  • MOUSE/KEYBOARD TOOLS
  • FOLDER/WINDOW TOOLS
  • SHELL TOOLS
  • FILE ASSOCIATIONS
  • DEVICE TOOLS
  • DESKTOP TOOLS
  • PARTITION MANAGERS
  • MALWARE DETECTION
  • DISK/REGISTRY CLEANERS
  • ENCRYPTING
  • PASSWORD MANAGERS
  • FILE RECOVERY
  • SECURE DELETION
  • INTEGRITY CHECKERS
  • UNLOCKING TOOLS
  • Office SUITES
  • WORD PROCESSORS
  • SPREADSHEETS
  • TEXT EDITORS
  • PDF/TEXT READERS
  • PDF TOOLS
  • ORGANIZERS
  • PROJECT MANAGERS
  • FINANCIAL TOOLS
  • PUBLISHING
  • POST-IT
  • DIAGRAMMING
  • TEXT PROCESSING
  • FILE MANAGERS
  • FILE ARCHIVERS
  • FILE RENAMERS
  • FILE LISTERS
  • FILE SPLITTERS
  • BACKUP TOOLS
  • SYNCHRONIZERS
  • SEARCH/REPLACE TOOLS:
  • DUPLICATE FINDERS
  • FOLDER COMPARISON
  • FILE COPIERS
  • FONT MANAGERS
  • ATTRIBUTE TOOLS
  • DISK SIZE TOOLS
  • INSTALLER BUILDERS
  • DATABASE TOOLS
  • PROGRAMMING TOOLS
  • HEX EDITORS
  • EMULATORS
  • MATHEMATICS
  • UNIT CONVERTERS
  • ASTRONOMY
  • GENEALOGY
  • MUSIC TOOLS
  • DIDACTIC TOOLS
  • GAMES
  • LOGIC/PUZZLES
The list is little small but when you listen this installers size then you will be more shocked its only 200MB pen drive suite. Basically its a virtual OS that run from your pendrive and contains the all the applications that you need in day to day life...:P contains more than that..

Also you can add more and more portable application to your pensuite. That's the beauty of Lupo pensuite. So no need to worry while going to other's PC or system that he might have this software or not, keep everything in your pocket friends and enjoy the flavor of portability

How to use Lupo Pensuite to use all applications from pen drive?

  • Download the Lupo Pensuite.
  • Install the Pen drive suite into you pendrive or portable USB hardisk.
  • Now go anywhere and just start exe to open the suite.
  • Select the application and use it directly from your pen drive.
That's all friends.Hope you guys like it . Waiting for your reviews ... :))

Tuesday, October 4, 2011

Convert 1Gb Pendrive To 2G

Hello guys hope you all are enjoying good health. As the topic name shows its a trick to convert 1 GB pendrive to 2 GB Pen just show that it is converted to 2gb ...but it is actually 1gb only.While I was searching online ,I found this trick where people want to try whether this crack is really working or not. But they are not aware of it so they don’t want to take risk. And they didn’t even mention what the application is and from where it can be downloaded and etc. So i spent half day for searching the application here and there and finally got the crack in a small forum. So i was in a confusion that will this work or not. I just cant trust it and go blindly so i scanned it in all circumstances and started to convert the card. I was shocked when i completed the process of the application. I was amazed seeing my 1 GB memory card to 2 GB and all the data can be copied according to 2GB size. So just want to give this application to all our friends. But after some time I realized that it just showing 2GB but in actual its just the same 1 GB drive. But its working really great .

Steps to follow

  • First of all we have to make sure that its a 1 GB ( 970+ Mb ) memory card. This only works on 1GB (970+ Mb) And it supports only in some of the rare cases of memory cards.
  • Now Backup all your data in that because we have to format the drive.
  • After backing up now open the Skimedi Fix 2GB Capacity application.
  • A small window will pop up showing the FIX and Cancel option. And you have to browse the drive where it is located (generally G: or L: drive for USB sticks)
  • After selecting the drive press on FIX and then the updating process will be followed up. It will ask your conformation whether you agree to format or not. click on yes.
  • Later it will ask to replug the device. Just replug the memory stick card and put it back.
  • The size of the memory will be increased from 1Gb to 2Gb, you can see the properties before and after the cracking process.
Note : I am again telling that this trick will just show that it is converted to 2GB but in actual its still the same 1 GB drive and if you want to get the original size just format it and you will be left again with 1 GB drive.

Hope you guys like it .... :>

Friday, February 4, 2011

Map Serial, Windows MIDI Ports & Load DLS or UDP With Oxmidi

Oxmidi is port to port mapper which can be used to links ports or to load DLS/UDP to send signals over the ethernet. This portable application can be used to link and configure different ports such as a serial port (RS 232, Com port), DirectMidi, Windows MIDI and UDP (over an ethernet). User can select ports such as DirectMidi for better sound quality or to load DLS or UDP to transmit convey via an ethernet. According to the developer, it was originally developed to link serial port (e.g RS232, COM port) to internal Windows MIDI port.

Oxmidi can be accessed from the system tray, from where users can go to the Show option to map ports and monitor the results via Monitor.
System tray
From Show (via the system tray), any two port can be selected and linked. After selecting the relevant ports, click Connect to link them. User profiles can also be managed via the New (for new profile), Save (to save a profile and Delete (to delete an existing profile) buttons.
Oxmidi
The Toub MIDI and Sanford MIDI options can be used to link numerous instruments (by selecting a device from the MIDI Devices section). It is however, worth mentioning here that DirectMidi does not currently work with Windows 7. And the current version supports NoteOn and NoteOff commands.
Instruments
Oxmidi works on Windows XP, Windows Vista and Windows 7.
Download Oxmidi

Encrypt And Save Text Files With Cryptographic Text Converter

Cryptographic Text Converter is an open source text encryption software that allows saving text documents in a password protected and encrypted format. All text files are saved in the native (.tc) format of the application. The encrypted data can be easily decrypted by a single click after logging in with the account credentials. The text is encrypted using 128-bit AES (Advanced Encryption Standard).

You will be prompted to setup a username and password, when the application starts for the first time. Make sure you remember the login credentials otherwise you may end up losing your text files as the account is created as a local account and does not have a cloud based sign in system.
TextConverter
Simply enter the desired text and click Encrypt to encrypt it.
Enter Text
This will encrypt the text and display it in the 128-bit AES format. You can save your text document either from the File menu or by clicking on the Floppy icon from the toolbar. To decrypt the file, click the Decrypt button.Encrypt
You can change the account password by opening a text document and going to Account –> Change Password. The File and Edit menus contain common cut, copy, paste and file saving options, whereas, the Window menu can be used for modifying the look of the text document (such as changing the interface colors).
Change Password
All files are saved in .tc format and can be accessed only after providing the login credentials.
Files
Cryptographic Text Converter works on Windows XP, Windows Vista and Windows 7.
Download Cryptographic Text Converter

Thursday, February 3, 2011

Get eBook Information From Your Desktop With eBook Info Grabber

eBook Info Grabber is a portable application that displays instant information about any eBook that you search on. E-books can be search either by title and author name or the ISBN (International Standard Book Number), which is a unique 9 digit book identifying code. Both ISBN-10 and ISBN-13 are supported. This provides the utility to get information such as book summary, publishing date, number of pages, etc right from the desktop. eBook Info Grabber is a good way of finding out general information on any ebook with the least bit of effort. To get started, select a search criteria (ISBN or by book title).
eBook Info Grabber
Enter the author name and title (if searching by the Book Title option) or the ISBN number (in case the ISBN search is performed) and click on the Get Info button.
Search
This will instantly display a text file containing the title, publish date, eBook/ print ISBN number, page count and book summary.
Information
eBookInfoGrabber uses Sony eBook Store to gather all information. It works with Windows XP, Windows Vista and Windows 7.
Download eBook Info Grabber

ClipSize – Clear Clipboard Data And Monitor Size Of Clipboard

ClipSize allows clearing the clipboard, as well as showing the memory being utilized by it. This can be quite helpful for users who have limited memory for their systems and use memory intensive applications such as video editing, graphic designing and desktop publishing software.
ClipSize works from the system tray, from where content from the clipboard can be viewed and erased via the right click context menu.
Clip Size
To see the amount of memory being utilized by the clipboard, simply hover your mouse over the ClipSize icon. Keeping an eye on the memory for systems with less RAM can be quite useful to avoid system crashes and application crashes. For example, if you are running Adobe Premiere Pro (video editing software) with the minimum system requirements, you might end up loosing your edited video if the application crashes before you can save the changes. A system crash may also occur if the memory limit is reached. This can to some extent be avoided by making sure that the clipboard is not using a large amount of the memory.
Memory
ClipSize works on Windows XP, Windows Vista and Windows 7.
Download ClipSize

Erase Your Files Permanently With Secure Wipe

Deleted data is recoverable even after it is removed from the Recycle Bin. Many data recovery software, in fact are designed to recover such data. This poses a potential threat to any confidential information being recovered by a malicious source. For example, you may wish to permanently remove all trace of confidential information before selling your PC or lending it to someone temporarily. Secure Wipe is an application that permanently deletes data from a specified directory or file. It is quite similar to the previously reviewed Moo0 Anti-Recover, however, it provides choosing file deletion parameters unlike the latter.

To delete data, select a file or folder to delete data from and click Erase.
Secure Wipe
This will instantly delete the selected data from the specified location.
Erase
You can also configure advanced settings from the Settings tab. From here, memory usage can be restrained (useful for systems with less RAM), sub folder deletion can be activated, file erasing parameters can be defined and silent mode can be enabled to allow Secure Wipe to run in the backdrop. You can choose to delete files using Pseudorandom – 1 Pass, RCMP – 3 Pass, Gutman 35- Pass US DoD E – 3 Pass,etc and define the number of passes per file.
Settings
Portable version of Secure Wipe is also available. It works on Windows XP, Windows Vista and Windows 7.
Download Secure Wipe

Monday, January 31, 2011

Ninite Easy PC setup

Install multiple apps at once without toolbars or clicking Next using Ninite .

1. Pick your favorite software .
2. Click "Get Installer" and run it.
3. You're done!  

No Toolbars
Ninite says "No" to toolbars
and other junk.
    No Clicking Ninite automates installers offscreen.
    32 and 64-bit Ninite installs the best version of an app for your PC.
    International Ninite installs apps in your PC's language.
    Fast No manual labor means installs finish quickly.
    And More Ninite Pro has even more features.
    CLICK HERE to enjoy the site.

Sunday, January 30, 2011

70 Things Every Computer Geek Should Know.

The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field. A geek is one who isn’t satisfied knowing only the surface facts, but instead has a visceral desire to learn everything possible about a particular subject.
A techie geek is usually one who knows a little about everything, and is thus the person family and friends turn to whenever they have a question. If you’re that type of person and are looking for a few extra skills to pick up, or if you’re a newbie aiming to get a handhold on the honor that is geekhood, read on to find out what skills you need to know.

1. The Meaning of Technical Acronyms

  • USB – Universal Serial Bus
  • GPU – Graphics Processing Unit
  • CPU – Central Processing Unit
  • SATA – Serial ATA
  • HTML – Hyper-text Markup Language
  • HTTP – Hypertext Transfer Protocol
  • FTP – File Transfer Protocol
  • P2P -  peer to peer

2. How to Reset RAM

If you rolled your eyes here, that is a good thing. If not, you have many things to learn, young padawan. It’s amazing how few people know how to do this. If you’re unsure, hit up the link below to find out how:
Link : http://www.hackwithstyle.com/2011/10/how-to-reset-ram-in-computer.html

3. Identify Keyloggers

Internet cafes are the most likely place you’ll find them, followed by library, perhaps, and maybe even you own house if you’ve some unscrupulous friends/family. Identity theft groups warn about keyloggers and advocate checking out the keyboard yourself before continuing. Can you identify a keylogger, however, if one is plugged into the back of the system?
Here’s what one looks like:
Hit up this link for excellent info on keyloggers on public computers and how to protect yourself:
, http://www.ghacks.net/2007/06/28/how-to-defeat-most-keyloggers-on-public-computers/

4. Surf the Web Anonymously

We won’t make any assumptions about why you may need this particular skill, but the fact remains that every geek should know how to traverse the Internet with the highest amount of security possible.
Aside from the safest method–which is using a connection that is not yours–you will need the ultimate in proxies…Tor. Tor is an onion-routing system which makes it ‘impossible’ for someone to find out who you actually are.

5. Bypass a Computer Password on All Major Operating Systems

Obviously you shouldn’t use this to gain unlawful access to a computer. If you’re a geek, however, you’ll eventually end up in a situation where someone forgets their password, you acquire a machine with an operating system you cannot access, or similar situation.
See this tutorial for info on how to bypass the password on the three major operating systems: Windows, Mac, and Linux.
Link : http://www.hackwithstyle.com/2011/10/crack-account-password-on-any-operating.html

6. Find a Users IP Address on AIM

Knowing someones IP address is actually pretty useless in this case, but most people don’t realize that. If someone is harassing you via AIM and you can’t get them to stop, discovering their IP and sending it to them–with a nicely worded threat of law enforcement involvement should they not stop–is likely enough to send them scamping away with tail between legs.
http://www.elitehackers.info/forums/archive/index.php/t-2827.html

7. Hide a File Behind a JPEG

So you need a nice spot to hide your blackmail personal files. You could, of course, bury them deeply within a series of random, useless folders, but there’s always the chance of them being discovered. A password protected RAR is the best choice, but it’s a bit obvious despite the most boring title you could give it.
A sneaky person would hide the important file behind a completely random and boring family reunion photo, where no person in their right mind would shift through.
http://www.online-tech-tips.com/computer-tips/hide-file-in-picture/

8. Crack a Wifi Password

This is one of those things you don’t need to do (hopefully), but that you still need to know just for the sake of knowledge. A strong WPA password is very secure, but most people don’t want to bother learning a convoluted series of letters, numbers, and symbols, instead opting for random everyday words.
A good overall tutorial on wifi and cracking can be found here: http://docs.lucidinteractive.ca/index.php/Cracking_WEP_and_WPA_Wireless_Networks

9. Monitor Network Traffic

The Internet is a vast place with a bit of everything. Whether you’re curious about what your roommate is downloading, your kid is getting into, or any leeches living around you who’ve unscrupulously breached your wifi, knowing how to analyze network traffic is an invaluable skill.
Here is a list of dozens of network analyzers, as well as some general info to get you started: http://www.slac.stanford.edu/xorg/nmtf/nmtf-tools.html

10. Recover Master Boot Record

A virus or other problem can lead to an MBR error, which will make it impossible to access install. Many users would simply become frustrated and reinstall, but not you! Every geek should know how to recover the master book record.
Here is an excellent guide to get started: http://www.ntfs.com/mbr-damaged.htm

11. Retrieve Data off Hard Drive

There will come some point in your life when a hard drive craps out sans warning. It could be due to a number of reasons–physical damage, file corruption, etc. There are computer service centers that would be happy to extract the data for a (hefty) fee; a true geek would be the one working at center, not taking his or her drive there.
To find out how to retrieve data off a damaged hard drive, read here: http://laptoplogic.com/resources/5-ways-to-retrieve-data-off-a-crashed-hard-drive

12. Load Rockbox onto an MP3 Player

The firmware that comes on your average mp3 player is intended for those who are scared of advanced features; often, the only audio settings available are a few prearranged EQs. If you’re an audiophile–or simply frustrated with the lack of control over your music settings–Rockbox is the firmware for you. Open source and free, it can be installed on several different types of players and enables full control over what you listen to.
http://rockbox.org

13. Unbrick a Smartphone

No geek can resist the allure of flashing the newest beta firmware onto their shiny smartphone. The byproduct of that is sometimes a bricked phone, which would leave many sobbing into their pillow at night. To avoid rendering your $400 gadget into a door stopper, learn the fine art of unbricking and then flash away.
As the method used to fix a phone will vary, this is the best place to start looking for answers: http://www.howardforums.com/

14. Replace a Laptop Keyboard

Keyboards get gummy after awhile. If you use yours a lot (aka: all day), then you probably eat over it at some point. Crumbs get into the keys and things are sticking, and before you know it, you need a new keyboard.
http://www.refurbished-laptop-guide.com/how-to-remove-a-laptop-keyboard.html

15. Rip Streaming Videos

Streaming videos are officially in vogue. We’re not going to make any assumptions about what type of videos you are streaming and may want to keep, but no matter what it is, any geek could rip them while sipping a Red Bull and watching the latest episode of BSG.
Here’s a hint to get you started: http://applian.com/download-videos/

16. Strip Windows DRM

DRM is incredibly annoying. With many online stores now offering DRM-free mp3 audio files, it would seem it’s not as big of an issue as it used to be. That is not not the case, however, with all videos bearing a DRM as well as music of a higher-quality than MP3.
Stripping Windows DRM is not legal. If you’re a geek, your probably don’t care: http://undrm.info/remove-DRM-protection/FairUse4WM-freeware-DRM-removal-Windows-software-Strip-copy-protection-from-WMV-ASF-WMA-Windows-Media-Player.htm

17. Homebrew Hack Game Systems

Gaming consoles are notorious for having features you can’t use simply because the manufacturer decided to lock them down. As a geek, you can’t just be satisfied with the features they decided to give you. No, you have to crack that case open and take a peek inside. Every geek should know how to homebrew hack their system and unlock it’s full potential.

18. Find a Website IP Address Without Web/Command Prompt Access

Some school admins think they’re being sneaky when they lock down the command prompt and block all major IP search websites and block all the websites you actually want to visit. Of course, that is child’s play for any geek.
First, to get a new command prompt, open Notepad and type: command.com. Then, save as “cmd.bat”. You now have a command prompt.
Now, open the command prompt and type “ping http://www.website.com/” to find the IP address of that website.
Enter the website into the browser and you will officially have impressed all your friends.

19. Bypass School or Work Website Blocks

What is a horrific situation for an average computer user is a simple irritation for an everyday geek. To bypass a website block/filter, simply enter that websites IP address in instead of the actual site address.

20. Screw with Wifi Leeches

Nobody likes a wifi leech. At best, they’re simply using up your valuable bandwidth. At the worst–and far more likely, they’re stealing your identity and watching your activities. After watching your network and identifying the leech, use this trick to flip their browser upside down and let them know you don’t appreciate the intrusion.
http://tech.nocr.at/hacking-security/baffle-wifi-leeches-with-an-upside-down-ternet-2/

21. Hexadecimal and Binary Number Systems

Everyone knows the normal, everyday digit system used. It takes a special–possibly psychotic person–to also know hexadecimal and binary number systems.
Here is an excellent interactive tutorial on learning the two systems: http://www.wisc-online.com/objects/index_tj.asp?objID=DIG1102

22. How to Hot Wire a Car

If your family always turns to you any time their computer hiccups, their DVD player needs fixed, or their home security system doesn’t activate, it’s only a matter of time before someone asks you how to hot wire a car. Wouldn’t it be great to be able to answer them?
To learn this unique skill, read here: http://howto.wired.com/wiki/Hot_Wire_Your_Car

23. Increase Wifi Range

With so many small portable gadgets gaining more and more sophisticated web browsers, in addition to gaming systems like the PSP and DS, getting the most use out of your wifi is practically a geek necessity.
Here is a good guide on extending your wifi’s range: http://www.mavromatic.com/archives/000451

24. Carrying a Computer Cleaning Arsenal on Your USB Drive

A good geek prepares for their friends stupidity. No matter how many times you tell them to stop downloading porn, they keep doing it until their machine is so infected it can’t drag itself into a grave. An arsenal of portable malware cleaners, a portable task manager, anti-virus, etc, will make those impromptu purging sessions all the easier.

25. Running an Operating System from a USB Thumb Drive

Most people don’t even understand what the magical operating system is. As a geek, you should transcend that basic knowledge and have a small operating system on your thumb drive handy for those times you need computer access but don’t know the password to a nearby computer.
http://www.pendrivelinux.com/

26. Understand What “There’s no Place Like 127.0.0.1″ Means

A lot of geeks wear this shirt as a short hand code for their computer finesse–or maybe just to screw with other people who stare but cannot figure out what it means. No matter the reason, if you’d like an answer, check out the link below.
http://www.tech-faq.com/127.0.0.1.shtml

27. Read 1337 At Normal Speed

Sure, everyone knows about it and it’s no longer cool, but if you’re going to proclaim yourself as a geek, you should be able to read it full speed. Who wants to choke in front of the wannabe that learned to read it full speed and flaunts it in your face?
http://www.wikihow.com/Read-and-Write-in-1337

28. At Least One Fictional Language

And not only should you know a fictional language, but you should use it to say something about yourself. Do you choose Klingon or Quenya?
Here’s a list of constructed languages: http://en.wikipedia.org/wiki/List_of_constructed_languages

29. How to Survive in a Linux Argument

Linux is gaining an all around higher standing in the geeksphere, and it’s bound to enter a conversation at some point (which will invariably end up turning into an argument). If you want to keep up, you’ll need to understand the basic points of Linux, as well as the general info of all basic things.
Here’s a good place to read and gain a foothold: http://www.linux.com/articles/feature/

30. Identify Major Constellations

For those times you venture from the air-conditioned, computer filled basement of your parents house (or something like that), look up at the stars and have yourself a Galileo moment. The stars may just be dots to many people, but with the handy website below, you’ll be stopping man-belts and lions in no time.
http://www.sky-watch.com/astronomy-guide/major-constellations.html

31. Use a Camera in Manual Mode

Sure, you could just use auto mode like everyone else too afraid to learn what some letters and numbers mean, but then you wouldn’t be much of a geek, would you? The oft-ignored dial on a camera is the key that unleashes the best quality photos possible, and every geek should be a whiz at using one.
http://digital-photography-school.com/digital-camera-modes

32. Who Mulder and Scully Are

It seems that in the plethora of geek websites, there always appears a joke about Mulder and Scully, the two main characters from the X-Files. If you don’t know who they are, you’ll be left in the dark, alone, contemplating what exactly it was you were doing in the 90′s that you wouldn’t understand the joke.
http://en.wikipedia.org/wiki/Mulder_and_Scully_(song)

33. Javascript

HTML is running the world (not really). Everyone knows some HTML and it makes them feel empowered. As a geek, you want to transcend that basic knowledge others share and know a little more. JavaScript is the answer–it is easy to learn if you’re not actually interested in web programming, but simply curious, and it looks scary to anyone who doesn’t know it.
http://www.yourhtmlsource.com/javascript/basicjavascript.html

34. How to Unlock an iPhone

Sure, most geeks wouldn’t be caught dead with an iPhone, but what about your friends? You’re the smart techie, they’ll expect your to know how to unlock it.
http://www.pcworld.com/article/137223/how_to_unlock_an_iphone.html

35. How to Install Mac OS X on a PC

Just because you don’t want Mac on your PC doesn’t mean you shouldn’t know how to do it. Knowledge is power, right? Go ahead, use this to stump your friends and family.
http://dailyapps.net/2007/10/hack-attack-install-leopard-on-your-pc-in-3-easy-steps/

36. Build a PC

If you purchase a ready-made PC, you can be sure of one thing–you’re paying more than you should. Assembling your own PC isn’t too hard, and is the first thing you should be aiming to accomplish as a geek.
Here is a massive article on assembling your own PC: http://www.pcmech.com/byopc/

37. Tethering a Smartphone

Nothing like a little wifi on the move, eh? Tethering a smartphone means using the Internet on your laptop/netbook via your cell phone. Of course, the method to do this depends on your phone, but here’s an article to get your started:
http://www.tech-recipes.com/rx/2276/smartphones_bb_treo_tether_modem_usa_carriers/

38. Wiring a Home Theater System

Home theater systems used to consist of a TV and a chair. Gone are those days of simplicity, however, and setting up a modern system can be pure mind-boggling horror. Where does the modulator go, why does the DVD player have no video and the cable box no sound?
Here’s a tutorial, including excellent diagrams, to show you how: http://www.prillaman.net/ht_info_8-wiring.html

39. Replacing a Laptop LCD

Laptop LCDs are vulnerable to many different mishaps: accidental pressure spots, shadows, airsoft pellets…. No matter, there will come a point when you need to swap your LCD for a new one. Now, as a geek, you probably don’t have an extended warranty. If that’s the case, here are some excellent pages and pictures on replacing the display:
http://www.fonerbooks.com/laptop_4.htm

40. Make a Laptop Cooling Pad

Can you believe these cost $50?! A geek will need one, because data crunching/DVD ripping/videos playing/rendering at the same times tends to cause excess heat. Instead of shelling out your hard earned dollars, make your own like so: http://www.instructables.com/id/Lazy-mans-laptop-cooler/

41. Unleash a Laser Pointer’s full potential

A normal person uses a laser pointer to drive their dog crazy. A geek uses it to melt butter for their grilled cheese sandwich. To unless a laser pointer’s full strength, crack open the case, fry the resistor with a hot soldering iron, then snap it back together and keep it away from flesh/eyes/airplanes. The pointer will burn out after a few hours, but what a fun few hours they will be.
Note: this is dangerous. Don’t do anything stupid.

42. Keyboard Shortcuts

This will depend on your operating system and the apps you use, so there’s no tutorial available. However, that is irrelevant–you’re a geek, you can find them yourself. Shortcuts are the difference between a slow computer user and a geek. The geek will always will out in a speed contest, because they do practically everything from their keyboard.

43. Soldering Glasses Together

Nerds use tape on broken glasses; geeks use solder. ‘Nuff said.

44. How to Execute a Shell Script

If you’re a true geek, you’ll need to do this at some point. Below are instructions on how to do so. Remember: always be cautious when running a script, you don’t want your computer to turn into a door stop, now do ya?
http://www.mcsr.olemiss.edu/unixhelp/scrpt/scrpt1.2.html

45. How to Hack a Pop Machine

Okay, so stealing isn’t cool. Still, hacking is simply a misunderstood art, right? So hacking a pop machine isn’t really stealing, because it’s not about the pop, it about the pleasure of getting your way. Or something like that. (Newsflash, it is illegal, don’t do it.) If you want to try your fingers at getting a free Coke, check out this link:
http://skattertech.com/soda-machine-hack/

46. Turn a Laptop into a Digital Picture Frame

So you want to show off pictures of your dog and that girl you once met, but you want to do it in an uber geeky way. Any schmuck can go to Walmart and buy a digital picture frame for a grossly inflated price. But you…oh, you’re too smart for that. No, instead you’ll find an old laptop on eBay for $5 and turn it into a true work of art.
http://repair4laptop.org/notebook_picture_frame.html

47. How to Mod a Flash Drive Case

All the geeks are doing it…. Whatever. The case your flash drive came in is probably weak and most certainly plain. Why not jazz it up with your own unique style?
Here’s one such case mod, and dozens of related projects: http://www.instructables.com/id/Metal-USB—Flash-drive-case-mod/

48. Do Cool Things to Altoids Tins

People are obsessed with these things. Altoids tins are durable, small, and just begging to be filled with LEDs, mp3 players, audio amps, and maybe some snuff. A good geek will find millions of uses for these little metal wonders. If you need a mental boost, however, here’s some interesting links:
http://www.squidoo.com/altoids-tins

49. Convert Cassette Tapes to Digital Audio Files

If your geekhood started in the 90′s, then you probably have a least a few (dozen) cassette tapes still sitting around. Why not breathe digital life into them before they fall ill to mortal fate?
http://lifehacker.com/software/mp3/alpha-geek-how-to-digitize-cassette-tapes-222394.php

50. Lock Your Computer with a USB Drive

You don’t want anyone getting into your files while you’re gone. A normal password would be enough to keep most people out, but what if you got super-secret X files on your computer? You can lock your machine down with a USB drive via these instructions:
http://lionjkt.wordpress.com/2008/12/31/how-to-lock-your-computer-with-usb-drive/

51. Run Your Own Ethernet Line

Wifi has taken the place of a wired connection in many homes, and with good reasons–you can go anywhere, no cables necessary. What about those…sensitive…activities that you’d rather the neighborhood script kiddie didn’t see on your wifi? An Ethernet cable is your solution.
To wire your own Ethernet, hit up this link: http://www.ertyu.org/steven_nikkel/ethernetcables.html

52. Set Up a Streaming Media Server

With digital files becoming the ultimate medium, many people have hundreds of gigabytes worth of music, videos, and pictures. You could keep them on a portable hard drive, but then you’re have to take it everywhere, and only one person could use it at a time. The solution is a streaming media server, something no geek can live without.
http://www.n00tz.net/2008/07/vlc-media-server-ubuntu-hardy/

53. Setting up a VPN

If you’re like most geeks, you can’t live without your computers. They store your life in some poetic fashion, holding files you feel a personal connection with…. Anyway, if you are at work and suddenly realize you left an important picture at home (or you need blackmail material pronto), having a VPN ready to go will save you big time.
http://www.computernetworkinghelp.com/content/view/41/1/

54. Turn Webcams into Security Cameras

Is someone stealing your Netflix DVDs? Do you suspect it is a fat hairy man in his boxers taking them each morning? If so, you can get your proof using a couple webcams and a bit of software.
http://www.simplehelp.net/2006/09/27/how-to-use-your-pc-and-webcam-as-a-motion-detecting-and-recording-security-camera/

55. Control Your House Lights with a Computer

Controlling the lights in your house via computer is a great way to freak out the neighborhood kids ding-dong-ditching (assuming you wire up a Halloween scream motion sensor, also). If you reasons are less nefarious, you simply use it to turn on and off lights without having to life ye butt from thy seat, which is a good reason in itself.
http://www.instructables.com/id/Control-lights-in-your-house-with-your-computer/

56. Play Retro Games without Retro Consoles

This applies to the geeks who enjoy gaming. Setting up an emulation PC on your TV is a great way to relive those games of old.

57. Put LEDs Inside a Lightbulb

The days of hot incandescent and mercury-laden fluorescent are gone, and in are the days of long lasting, low heat, low consumption LEDs. As any good geek, you want to be able to say “I was doing X long before it became mainstream.” Here’s your chance–the following link will show you how to put an LED inside a lightbulb, something sure to stump your friends the same way Grandpa’s ship-in-a-wine-bottle used to stump you.
http://blog.makezine.com/archive/2006/06/make_a_led_bulb.html

58. Create Music with Keyboard

How awesome is KeyBored? This little app gives all of your QWERTY keys a piano note. When you type, it sounds like an infant monkey punching a keyboard. If you’ve got some musical chops, it won’t take you long to figure out the Star Wars theme or find a hidden musical message in Counter Strike control buttons.
http://agdoa.net/ [edit:link updated]

59. Make Your Office Ergonomic

Face it–you spend a lot of time at your desk. You might even have a few extra pounds and pallid skin to show for it. While those things are temporary, far to common and more serious is the carpal tunnel, eye strain, and back problems you’ll develop from having a poor workspace.
Hit up this link to create a body-friendly workspace that will keep you limber and flexible: http://www.ergotron.com/tabid/305/language/en-US/default.aspx

60. Adding a Third Monitor

Studies show that dual monitor increase work productivity by 30%. As a geek, you’ll need a third monitor to equal the dual setup of a layman (if that makes sense). While any hack with a VGA port can add a second monitor, it takes a true geek to add a third (or more). This will vary based on graphics/OS, so hit up Google for a tutorial or two.

61. How to Convert a DVD to x264 (or XviD or DivX)

It might seem like child’s play to you, but many individuals do not understand the fine art of converting a DVD into a digital file, let alone the careful skills it takes to achieve a happy balance between size and quality.
Here is an excellent tutorial demonstrating how to rip a DVD with the multi-platform free software Handbrake: http://howto.diveintomark.org/ipod-dvd-ripping-guide/

62. Flash System BIOS

Ya gotta do it some time, so stop putting it off and man up. Flashing the BIOS on your laptop might seem scary (as it should–fear keeps you on your toes and prevents mistakes), but it’s not (actually, it is, but if you even understand why you need to do this, you’ve gotta have at least a few chops by now). Warning–you can seriously bork your computer doing this!
http://www.pcstats.com/articleview.cfm?articleID=1605

63. How to Irrecoverably Protect Data

TrueCrypt, my friends. Learn to use TrueCrypt. If you have ask why, you don’t need it.

64. The Fastest way to Kill a Computer

It’s said that you have to get into a killers mind to understand their weaknesses, right? Same goes for the unfortunate boobs who always kill their laptops. Here’s a list of all the different ways you can accidentally kill a computer–arm your family and friends, and save yourself grief (because it’s surely you they will call when something goes horribly, horribly wrong).
http://www.pcstats.com/articleview.cfm?articleID=1720

65.GK for every drunken Geek

Describing the advantages and disadvantages in various alcoholic drinks
http://www.aagneyam.com/blog/?p=797

66.Microsoft Network Monitor

Microsoft Network Monitor is a network protocol analyzer that lets you capture, view, and analyze network traffic. Version 3.3 of Network Monitor is available in 32- and 64-bit versions

67.Windows Sysinternals Suite

The Windows Sysinternals Suite is a set of advanced tools for troubleshooting issues with Windows-based computers. These tools were originally developed by Winternals Software LP, which Microsoft acquired in 2006.
http://download.sysinternals.com/Files/SysinternalsSuite.zip

68.NTFS support for Mac OS.

Mac OS X v10.3 and later include read-only support for NTFS-formatted partitions. The GPL-licensed NTFS-3G also works on Mac OS X through FUSE and allows reading and writing to NTFS partitions. A performance enhanced commercial version, called Tuxera NTFS for Mac, is also available from the NTFS-3G developers. NTFS write support has been discovered in Mac OS X 10.6, but has not been activated as of version 10.6.1, although hacks do exist to enable the functionality. However, user reports indicate the functionality is unstable and tends to cause kernel panics, probably the reason why write support has not been enabled or advertised.
Download Tuxera NTFS for Mac 2010.9-RC

69.15 Web Alternatives to Popular Desktop Software.

Web applications have come a long way. They used to be amateur imitations of their desktop counterparts, with only one or two functions and not at all practical. But my, have these web apps grown. Web apps these days have become so powerful and useful that in some cases, they’ve begun to replace desktop software.
http://web.appstorm.net/roundups/15-web-alternatives-to-popular-desktop-software/

70.Top 6 Underground Search Engines You Never Knew About

In many cases, these search engines are tapped into what is currently termed the “invisible web,” which is the information available on the Internet that standard search engines don’t have access to, because they are buried behind query forms or directory requests.
http://www.makeuseof.com/tag/top-7-underground-search-engines-knew/

Spyware and Security - I'm Having No Trouble!

Sygate Personal Firewall

I had been running Sygate for over a year when I received an offer to upgrade via a system notification. Unfortunately, the automated upgrade within the program didn't work so I pulled up the Sygate web page and found out that they had been purchased by Symantec. I'm not a Symantec fan because when my computer was new it came with a trial copy of Symantec fire wall but when it came time to pay up, I decided not to license the software and when I tried to uninstall their software it locked up my system! I had a terrible time uninstalling it. Therefore, I wasn't happy when I found out that Sygate was purchased by Symantec so I decided to look at other free firewalls. I downloaded Kerio and Zone Labs and I had problems with both. I liked Zone Labs but for some reason it locked up my system and I couldn't figure it out so I had to uninstall it. I was bummed out because I really liked the interface. So I tried Kerio and that worked OK for a while but then I started having core memory dumps. I had three very scary events and after the third event I booted up my system and there was a window from Kerio apologizing for the event and saying that it was their fault and it wanted me to send them an automatically generated report. It took too long to compile the report so I had to hit cancel before it was complete and then I uninstalled it. So after all of my efforts I ended up finding my old, and free, version of Sygate again. It's available on twocows. The free version is not available from Symantec's page. The Sygate firewall works pretty well for me. I've had no problems with it. The GUI isn't as fancy as some but it works and you can get the information you need. Best of all, it's reliable. The motto of this whole experience... If it works don't fix it!!!

http://www.tucows.com/preview/213160


Spyware Guard
This is a great freeware application that provides the real-time monitoring that your system needs. It protects against browser hijacking and notifies you if a program tries to write to your registry. I don't run it all the time but it is nice to have on hand so you can engage it if things "heat up".

http://www.javacoolsoftware.com/sgdownload.html


LavaSoft

One of the standard freeware packages for finding spyware that has hidden itself on your PC is LavaSoft. It scans your system and fixes the problems. LavaSoft has been around for a long time and they continually update their database. Every home computer should run this freeware at least once a month.

http://www.lavasoftusa.com/


Avast

I think Avast is the best suite of anitvirus software on the market. They update regularly because they have a good fee based business that demands them to stay current and there is not any difference between the products that are free and their fee based stuff. Basically, Avast is free for the home user but it is a pay service if you are a business user. They provide a great service and have a strong business. The Avast suite is a little resource intensive but antivirus is an important function so this is a good spot to spend cycles. Every home user that runs Avast owes them a big thank you because we are getting a lot of value free of charge. If I were a business owner or if I had influence in a business where I worked, I would definitely be using Avast because they have proven themselves to me. I recommend them to you with confidence.

http://www.avast.com/eng/programs.html


CC Cleaner

I've run CC Cleaner for years and it'’s always provided a good service. It enables you to clean just about every temporary file that is stored on your computer. Of course, you can select which files to delete. After it's set up, you push one button, and your system is cleaned in less than a minute. It also has a good software de-installer (under the "tools" tab).

http://www.ccleaner.com/ccdownload.asp


Harden It

This is a security patch that tightens up some of the loop holes in your XP software. Run it and forget about it.

http://www.sniff-em.com/harden-it.shtml


SpyBot Search and Destroy

Spybot is a very popular adware and virus scanner. Spybot is an essential part of any home computer system. The GUI is pretty intuitive so download it, learn what it does, and your computer will benefit. I don't spend much time protecting my PC from all the crap that is out there. If you take a few precautions (running spybot 1 time a month is one of them) you shouldn't have any trouble either.

http://www.safer-networking.org/en/download/index.html


XP Antispy


This is a must have program for anyone running Windows XP. There are all kinds of things in Windows XP that you don't necessarily want to run. This program allows you to shut off a lot of the unnecessary services that your XP is running. This program puts a GUI around the administrative chore of shutting down the services. The GUI tells you what it is doing and provides some great information about the services so you can make the right choice on whether or not it is important for each service to run in your environment. Everyone running Windows XP should install and run this product because it tightens up your security and saves you a lot of resources.

http://xp-antispy.org/index.php?option=com_remository&func=sellang&iso=en

Administration Tools - Power to Change Your World!

Process Explorer

This is a replacement for task manager that provides more information and is more customizable. It took me several weeks to feel comfortable to disable Task Manager but I've completely migrated now. I've been running it for over three years now and it has proven itself to be a very stable program. Process Explorer is a very impressive freeware program and I think most people running XP, that know what they are doing, use this program in place of task manager. I think you will like it, you can change the colors of OS based services vs the services you start so it gives the user more flexibility. It also lists out the complete path and even more information on the dlls of each running process. Everyone should be running process explorer instead of task manager. Consider it a free upgrade from Task Manager!

http://www.sysinternals.com/ntw2k/freeware/procexp.shtml


Filemon

This is another great free product from sysinternals. They have so many different products but I have found the combination of Process Explorer and Filemon to be very effective. If my machine disk is spinning like crazy and my CPU is off the chart I can find out what is going on by utilizing these 2 products. Process Explorer will tell me what is using CPU and ram but filemon tells me what products are opening files on your disk. This is crucial information... After you set up filemon and then open it up you will get a window "on the run" one of the buttons on top, I believe 2nd from the left, stops the scrolling so you can have a good hard look at which programs are causing your disk to spin. This is very useful.

http://www.sysinternals.com/Utilities/Diskmon.html


AutoRun

You need to have some kind of window into your “start menu”. When you install programs a lot of them put an executable in your "start menu" and they automatically run when you turn on your computer. The good programs give you an option to place it there but many programs do it without asking you. Even for the programs that ask you if you want to run them on start up you always want to make changes to what runs and what doesn't at startup. This is the best program for looking into all the "start files" on your PC.

http://www.sysinternals.com/ntw2k/freeware/autoruns.shtml


Sysinternals
A word of thanks to Sysinternals who has put out more quality free utilities than anyone else I know. There are several applications that I have not highlighted here because I personally have not found a need for them. However, I'm sure that some of my readers may find a need for some of them. If you are interested in really digging into things yourself just go to the Sysinternal's website and check out all the administrative tools they have for you!

http://www.sysinternals.com/

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 

Recent Posts

Join Me On Facebook

700+ Followers

Followers


meet women in Ukraine contatore visite website counter
DMCA.com

Recent Comments

Follow Me On Twitter

1112+ Followers