Technodaddys

Latest technology newsreviews,tips and tricks

Technodaddys

Daily Technology News Update

Technodaddys

Latest News and Reviews

Technodaddys

Best User Friendly Website

Technodaddys

Technodaddys.blogspot.com

Friday, December 31, 2010

Top 10 Most Deadly Computer Virus In The World

A computer virus can cause a lot of destructive damage. VIRUS is an acronym which stands for Vital Information Resources Under Siege. Viruses are sometimes confused with worms and Trojan horses, which are technically different. So, I recommend you to read this article Difference Between a Virus, Trojan Horse and Worm. You just imagine how big organizations, governments, schools,businesses and IT sector were affected when certain viruses attacked their systems.
Computer Virus creates lots of problem in an organization which would result in millions, even billions of dollars in damages and losses. Though not all of these malicious computer programs are massively destructive, there are still some that have caused a lot of damage.Checkout6 Techniques used by malware composers to know more about malwares. Here are the top 10 most destructive computer viruses of all time.
1. Bagle
Bagle was detected in 2004, it infected users through an email attachment, and also used email to spread itself. Bagle did not rely on the MS Outlook contact list to make a list of where to send itself. It harvested email addresses from various document files stored in the infected computer – from plain-text files to MS Excel files. The danger of this virus was that its design opened a backdoor where a remote user could gain access and control of the infected computer. It could download additional components to either spy and steal information from the user or launch DDoS attacks to certain networks and computers.
2. Melissa
Melissa virus was made in 1999 by David L. Smith, created with Basic program, exactly with Microsoft Word macros. The Melissa virus was mass-mailing malware that was said to have infected up to 20 percent of computers worldwide. This virus spreads via email with the document “Here is That document you asked for, do not show it to anybodey else”. When this file will be opened or clicked it will automatically run the virus replication and automatically send a pass up to the top 50 in the address book of an email. Email servers around the world were forced to shut down in order to prevent the virus from spreading, as well as to remove the virus from their system.Smith was jailed 20 months and fined $ 5,000 and prohibited from accessing the computer without supervision.
3. Sasser
Creator by 17 year old German student, Sven Jaschan in 2004. Sasser attack Microsoft Windows. Sasser does not spread via email. The virus is usually spread through the network. It infected computers by exploiting vulnerability present in both Windows 2000 and Windows XP machines, known as the RPC (Remote Procedure Call) exploit. This will create a computer virus could not be shutdown without unplug the power. Jaschan Finally caught but he’s not jail, was only given probation 1 year 9 months, because at that time still under the age of 18.
4. ILOVEYOU a.k.a. Lovebug/Loveletter Virus
This virus started spreading in the Philippines, these virus classified as worm, which has the ability to do her own replication. Creator Onel de Guzman was from the Philippines. ILOVEYOU spread via email, with the title “love letters” from a secret admirer. Once opened, it loaded itself to the memory, infecting executable files. When a user received and opened the email containing the attachment “LOVE-LETTER-FOR-YOU.txt.vbs”, the computer became automatically infected. It then spread itself by infecting *.exe,*.jpg,*.mp3 files. After that, the virus sent itself to others by looking up the addresses contained in the MS Outlook contact list. The virus was written by a Filipino programmer who was still a college student at that time. He said the release of the virus was only “accidental.” This virus spread throughout the world in just a day, infecting computers of large corporations and governments, including the Pentagon in the United States. It caused billions of dollars in damages. The actual “damage” occurred during the removal of the infection from computers, as email servers and computer networks had to be shut down before the virus could be removed.His original file LOVE-LETTER-FOR-YOU.TXT. vbs.
5. MyDome
MyDome virus was detected in 2004. This virus is making a backdoor on the OS. Computer was first known attack on first February by doing DDoS. Then reported back to attack on the 12th of Feb, after that the virus stopped spreading and start creating backdoors. MyDoom spreads via email. MyDoom slowed down global Internet access by ten percent, and caused some website access to be reduced by 50%.
6. Leap-A/Oompa- A
Mac that has a concept of security through obscurity, Mac believe thea system can’t be infected by a virus of cause of the OS system is a closed. But in the year 2006, Leap-A virus or commonly known as Oompa-A appears and spreads via iChat on the Mac. Having a Mac attack, the virus will search for contacts via iChat and send messages to each contact. The message will contain a form of corrupt JPEG file. It’s not dangerous, but this proved that the Mac OS systems are not immune to the virus.
7. SQL Slammer
Appeared in January in the year 2003, spread quickly via the Internet. It caused a considerable amount of damage, though, by overwhelming routers, causing them to shut down. The target of this virus was web servers running a vulnerable version of Microsoft SQL Server. Upon infection of a server, the virus generated random IP addresses through which it attempted to further infect other computers.This virus has also been a U.S. Bank ATMs crash, the collapse of Seattle’s 911 service, and Continental Airlines.
8. Nimda
Reported attacks in 2001, call Nimda taken from opposite the word “Admin”. With its multi-pronged attack, Nimda appears to be the most troublesome virus of its type that has yet appeared. Its name (backwards for “admin”) apparently refers to an “admin.DLL” file that, when run, continues to propagate the virus.These viruses spread very quickly, according to TruSecure CTO Peter Tippett, Nimda only takes 22 minutes to make the Top Ten Virus at the time. The main target of this virus is Internet servers, Nimda spread through Internet network by creating a backdoor into the OS.
9. Code Red
The world had not yet recovered from the damage caused by the ILOVEYOU virus when Code Red was released in simmer 2001.Code red virus attacks only Windows 2000 & NT OS. This virus will create a buffer becomes full so make the memory becomes full. Once a computer was compromised by the virus, it would modify the handled website, displaying the message “Welcome to http://www.worm.com! Hacked by Chinese!” Then, it would later seek other computers running the web server software and do the same thing. After about two weeks of infection, the virus was programmed to launch DDoS (Distributed Denial of Service) attacks on certain websites, including the server of the White House.
10. The Klez
This virus was first known infected on 2001, this virus spreads via email by conducting continuous replication, and sent to all email addresses in the victim’s address book. This virus makes the victim computer becomes very slow and can also turn off the antivirus application.
Checkout these Antivirus | Spyware | Security articles to secure your Pc from Malware attacks.

If I missed out any destructive virus add it in comment.

Suspicious Account Activity Now Shown In Google Account Dashboard

Google introduced a suspicious account activity warning system in Gmail back in march 2010. Google just compares gmail login system IP addresses of computers. Gmail logins from different regions in the world, for example the U.K and India in short time would trigger the warning notification, giving Gmail users the chance to react promptly by changing the account password to protect further abuse.
I recommend you to read these 2 articles,
How To Check Whether My Orkut/Gmail Account Hacked or Not ?
How To Get Back Your Hacked Gmail/Orkut/Google Account ?

The above two articles must me know to every Gmail users.
How does this work?
Using the IP address you provide to us, our automated system can determine your broad geographic location. If you log in using a remote IP address, our system will flag it for you. So if you normally log into your account from your home in India and then a few hours later your account is logged in from U.K, you’ll get a notice like the one above at the top of your Dashboard page – alerting you to the change and providing links for more details.
Recently Google rolled out this Security feature to all Google services, and will display suspicious account activity in the Google Dashboard.
Two links are provided in the Dashboard notification message,
1. Details &
2. Change Password.
Check the below screenshot which clearly reveals Gmail login details from different IP address within minutes,

Detials:
Details opens a small popup with additional information about the account activity listing the location, IP address and date and time. The alert can be ignored or closed in this popup.
Change Password:
The other option is to change the Google Account password, an option that is also provided directly in the initial notification message.
I recommand you to read this article which will guide you to create a strong password for your email accounts.
Stay protected with your Google accounts…

5 Way to Have Fun With Google Search


Google search engine
got lots of fun oriented search results and easter eggs. Impress your friends with these fun search and have a nice time in using Google search engine.Lets now play with Google,

1. Go to Google.com, type in “Lol limewire” and click “I’m Feeling Lucky”
Just see whta happens.
2. Type “world cup” in Google Search box and hit google search.
On search result page you will see GOOOOOOOOOOAL instead of gooOOOgle at bottom of page!!
3. Type “Who Is The Cutest” in Google Search and hit search.
Biggest Lie Ever waiting in first result.
4. Type in “Ewmew Fudd”. Click “I’m feeling lucky”
5. Make Google Dance
Typegoogle loco and Click “I’m feeling lucky”
The google loco starts dancing!
Check out more Google fun by typing the follwing things and click “I’m Feeling Lucky”
  1. Google 133t 
  2. Google gothic 
  3. xx~klingon
  4. xx~piglatin
  5. Google easter egg
  6. Google Bearshare
Checkout, Gtalk/Google Talk Tips & Tricks
Add if you know more…Add it in Comment.

How to Install Ubuntu Control Center in Ubuntu 10.04

Simple Tool for Ubuntu Administration
Ubuntu Control Center(UCC) is an application inspired by Mandriva Control Center and aims to centralize and organize in a simple and intuitive form the main configuration tools for Ubuntu 10.04. Ubuntu Control Center uses all the native applications already bundled with Ubuntu, but it also utilize some third-party apps like “Hardinfo”, “Boot-up Manager”, “GuFW” and “Font-Manager”.
Here I provide step by step tutorial for installing Ubuntu Control Center,
1. First download these three packages.



  • Font Manager.
  • jstest-gtk.
  • UCC
2. Then install Font Manager .deb package by double clicking it.
3. After that double click jstect-gtk .deb package the installation process will start.

4. Finally install Ucc .deb package.

5. Now we have successfully installed Ubuntu Control Center.
6. To use UCC goto Applications –> System Tools –> Ubuntu Control Center.
Now take some administrative control over Ubuntu 10.04 Linux
Read these 2 useful Ubuntu articles from Geekyard,
Ubuntu 10.04 Adds New Lightware Themes
Ubuntu 10.04 Radiance & Ambiance Themes For Google Chrome.

Top 10 Popular Posts for June 2010

Here is the Google Analytics pageview report of June 2010 . Totally 9800 visitors visted &  total of 21,440 pageviews were viewed.Here is the list of Top 10 articles of the month,
1. How To Fix “Bootmgr is missing” in Windows Vista
There are 5 Methods to solve this Problem.Firstly, I’ll start with the easier solutions just in case one of those happens to work. If not, we’ll go to the more complicated solutions.
2. Top 5 Windows Xp Logon Screen – Part 1
Windows Xp Logon Screens in different categories like Nature,FBI,CIA,Windows 7, Dragons,Hitman,Abstract,Biohazard,Umbrella Corporation etc.
3. How to Make Any Portable Application
In this Tutorial i am going to provide step-by-step instruction along with Screenshot to create Portable Appz .
4. Top 10 ways to Tweak your Windows Xp
Got bored with Same old Xp Themes and Boot Screens and Logon Screens ?
I am going to discuss briefly about 10 different ways to Tweak your Xp and Make it totally different from Others.
5. Remove AUTORUN.INF from infected computers
Remove Autorun.inf Manually here i have given 3 methods .Choose anyone Method to remove the Virus…
6. How to remove write protected error for the flash drive
Some times USB drive becomes write protected and deleting/Copying files or Folders on the USB drive is not Possible.
Let’s now see how to remove write protection on your portable devices like pen drives, memory cards, iPod and other USB mass storage devices.
7. The 10 Best Hacker Movies
Here is a list of 10 Best movies for computer lovers. Most of these hacker movies are good escapist fun. You can’t learn hacking into computers by watching these movies. But surely you can get some keywords regarding hacking into remote box.
8. Ubuntu 10.04 LTS Released
Ubuntu 10.04 LTS is also the 12th release of the Ubuntu OS and, being an LTS (Long Term Support) release it will be supported for 3 years on desktops and 5 years on servers.
9. Remove Khatra.exe | gHost.exe | Xplorer.exe virus From Your Computer
I face many problems with Khatra.exe virus on my computer,it runs in Process how can I remove it ? Checkout to Manually Remove instructions.
10. Tansparent/Glass Command Prompt For Xp and Vista
When you think of Linux or Mac what strikes your mind first is Transparent Terminal.But this freature of Transparent Command Prompt is missing in Windows XP or Vista.If you like to work in a Stylish Windows Atmosphere this hack is an addon.Ok,let us first see how to do this hack in Windows Xp.

How do I set the sleep time in Windows 7?

Problem:
I am new to Windows 7 I dono where is the settings to alter sleep time in Windows 7.
Solution:
The System administration settings on Windows 7 are totally different from Windows XP. You can use the built-in Windows 7 help system. Just type in “sleep” and see what you need!
1. Goto Control Panel in Windows 7.
2. Click “System and Security” , look for “Change when the computer sleeps” within the “Power Options” section,

3. Click on that and you’ll find that it’s really easy to tweak things as you desire,
4. Make the changes you want then click on “Save changes”.
Done!

Block Virus Or Trojans Being Transferred to Pendrive

Want to protect your USB Flash Drive, iPod and other removable USB storage device from getting infected from virus ?
Viruses spread fastly through pendrives when we use in schools, colleges and office. In order to prevent your USB Drive from getting infected, you will need to create some files on your pen drive like Autorun.inf file(Check this if you face Autorun.inf problem) and some other files which will later prevent the virus infection as these files being already created and cannot be deleted, so that virus or trojan cannot copy files and folders or create them on your USB Drive when you connect your drive to virus infected PC.
There some freeware to vaccinate your USB drives from virus infection. I have already discussed in detail about Panda USB Vaccine 1.0.1.4 .Today I came across a similar tool called USB Defender. Its really cool !!!

Features of “USB Defender”
USB Defender is a simple tool which extremely easy to use.
You can see just two buttons on it: “Protect” and “Unprotect”. First button you are using to vaccinate your drive,
Second button – to remove protection.

When you insert any pendrive USB defender program automatically detects it, if there is any protection active and only one button will be available for you.
USB Defender is fully portable – so you can take it with you wherever you want. Get USB Defender and take it for a spin to see what it can actually do for you!
I enabled show hidden files option and checked pendrive in windows Xp but I found no files. Then I rebooted the sytem and entered Ubuntu 10.04
I inserted pendrive and found USB defender added Autorun.inf and vaccinated it….

Give it a try today !!! icon smile Block Virus Or Trojans Being Transferred to Pendrive
0.0down Block Virus Or Trojans Being Transferred to Pendrive
USB Defender

Gmail Introduces Rich-Text Signatures

Gmail has introduced one of Gmail’s most requested features, rich-text signatures are now available to users who want to liven up their messages. Gmail users can now change the font size, font color, include images into their signatures.
What’s Cool feature in Rich-Text Signatures? 
Those who got several accounts linked to Gmail can set up different signatures for every email address. And some features added in Gmail from last year are,
  • Gmail Adds Fast New Windows
  • Gmail Login Adds CSRF Protection
  • Gmail Labs comes up with more emoticons
  • Gmail Users Can Now Import Windows Live Hotmail Email
  • How To Add Embedded Image To Gmail
And more articles are available here.
“Rich text signatures have long been one of our most widely requested features. Some of you have tried your own solutions, including Greasemonkey scripts, browser plugins, and even using canned responses from Gmail Labs,” Mark Knichel, Software Engineer at Google, explained.
“Others have simply lived with frustration of not being able to change the colors or font size of your signature, or insert images and links. Either way, you’ll be happy to know that today we’re launching the ability to write your own rich text signatures right in Gmail,” he announced.
How to make Rich-Text Signatures?
1. Login to your Gmail Account.
2. Go to the Settings page in Gmail.

3. Under Gereral tab, goto Signature section.
4. By default, the feature is set to “No signature,” but that’s not what you’re there for. Below that you’ll notice the rich-text editor where you’ll be able to compose the wittiest and most original email signature since the invention of webmail.

5. In the above screenshot I have added a computer Icon and my blog links & Geekyard in signature.
5. You can use different fonts of different sizes.And if you want to insert an image (like company logo, or a rose). You can also add a link, to your company’s website, your blogl. The rich-text signatures are just available for the regular version of Gmail for now, meaning that users of the old HTML version and of the mobile one won’t be joining in on the fun.
What’s the use of adding blog links?
Adding website or blog links in email signature is one way of site promotion.If you run a blog and want to know more about blogging checkout www.geekyard.com.

Top 25 Linux Quotes for Linux Lovers

Here is a collection of Top 25 “Linux Quotes” for Linux users. Some are anti windows quotes and are really funny. Most of you might have heard some of these Linux quotes.I love working in Linux platform.I am using Ubuntu 10.04 LTS .The more I run Ubuntu, the more I love it.I have posted a funny video What happens when Matrix Run on Windows OS? Check it out…
25 Linux Quotes for Linux Lovers

1.
One OS to rule them all,
One OS to find them.
One OS to call them all,
And in salvation bind them.
In the bright land of Linux,
Where the hackers play.
2. Avoid the Gates of Hell. Use Linux.
3. I’ve run DOOM more in the last few days than I have the last few months. I just love debugging.
4. By golly, I’m beginning to think Linux really *is* the best thing since sliced bread.
5. Linux poses a real challenge for those with a taste for late-night hacking (and/or conversations with God).
6. Linux is obsolete.
7. Your job is being a professor and researcher: That’s one hell of a good excuse for some of the brain-damages of minix.
8. If Bill Gates is the Devil then Linus Torvalds must be the Messiah.
9. “Linux is not user-friendly. It _is_ user-friendly. It is not ignorant-friendly and idiot-friendly.
10.
“In a world of no walls or fences,we don’t need WINDOWS or GATES” (I love this quote very much icon wink Top 25 Linux Quotes for Linux Lovers )
11. Some people have told me they don’t think a fat penguin really embodies the grace of Linux, which just tells me they have never seen an angry penguin charging at them in excess of 100mph. They’d be a lot more careful about what they say if they had.
12. Other than the fact Linux has a cool name, could someone explain why should use Linux over BSD?
13. “Linux: the operating system with a CLUE… Command Line User Environment”
14. “Problem solving under linux has never been the circus that it is under AIX.”
15. “Besides, I think Slackware sounds better than ‘Microsoft,’ don’t you?”
16. “And the next time you consider complaining that running Lucid Emacs 19.05 via NFS from a remote Linux machine in Paraguay doesn’t seem to get the background colors right, you’ll know who to thank.”
17. “…Deep Hack Mode–that mysterious and frightening state of consciousness where Mortal Users fear to tread.”
18. Sigh. I like to think it’s just the Linux people who want to be on the “leading edge” so bad they walk right off the precipice.
19. Microsoft Corp., concerned by the growing popularity of the free 32-bit operating system for Intel systems, Linux, has employed a number of top programmers from the underground world of virus development. Bill Gates stated yesterday: “World domination, fast — it’s either us or Linus”.
20. Who wants to remember that escape-x-alt-control-left shift-b puts you into super-edit-debug-compile mode?
21. It’s a bird.. It’s a plane.. No, it’s KernelMan, faster than a speeding bullet, to your rescue. Doing new kernel versions in under 5 seconds flat.
22. Those who don’t understand Linux are doomed to reinvent it, poorly.
23. “How do you power off this machine?”
24. “What happens when you read some doc and either it doesn’t answer your question or is demonstrably wrong? In Linux, you say “Linux sucks” and go read the code. In Windows/Oracle/etc you say “Windows sucks” and start banging your head against the wall.”
25. When you say “I wrote a program that crashed Windows”, people just stare at you blankly and say “Hey, I got those with the system, *for free*”.’
Try Linux Os
In a world of no walls or fences,we don’t need WINDOWS or GATES….. Why wasting your time in Windows? Just tryout Linux….Many user friendly Linux available.Enjoy working in Linux environment.
Here are some useful Linux article collections from Geekyard

Top 50 Absolutely Hilarious Computer Quotes

Here is a collection of Top 50 humorous computer quotes. Since this blog is full of technical articles related to Computer Tips & Tricks, I tought this post will add some fun to my blog readers. My previous post was about Top 25 Linux Quotes for Linux Lovers. Enjoy reading these funny computer quotes
50 humorous computer quotes
1. “If at first you don’t succeed; call it version 1.0″
2. “The Internet: where men are men, women are men, and children are FBI agents.”
3. “Some things Man was never meant to know. For everything else, there’s Google.”
4. “unzip; strip; touch; finger; mount; fsck; more; yes; unmount; sleep” – my daily unix command list
5. “… one of the main causes of the fall of the Roman Empire was that, lacking zero, they had no way to indicate successful termination of their C programs.” – Robert Firth
6. “If Python is executable pseudocode, then perl is executable line noise.”
7. “The more I C, the less I see.”
8. “After Perl everything else is just assembly language.”
9. “If brute force doesn’t solve your problems, then you aren’t using enough.”
10. “Life would be so much easier if we only had the source code.”
11. “Unix is user-friendly. It’s just very selective about who its friends are.”
12. “COBOL programmers understand why women hate periods.”
13. “Programming is like sex, one mistake and you have to support it for the rest of your life.” — Michael Sinz
14. “There are 10 types of people in the world: those who understand binary, and those who don’t.”
15. Microsoft: “You’ve got questions. We’ve got dancing paperclips.”
16. “Microsoft is not the answer. Microsoft is the question. NO is the answer.” – Erik Naggum
17. “Windows95: It’s like upgrading from Reagan to Bush.
18. “People say Microsoft paid 14M$ for using the Rolling Stones song ‘Start me up’ in their commercials. This is wrong. Microsoft payed 14M$ only for a part of the song. For instance, they didn’t use the line ‘You’ll make a grown man cry’.”
19. “I’m not anti-social; I’m just not user friendly”
20. “A printer consists of three main parts: the case, the jammed paper tray and the blinking red light”
21. “A computer lets you make more mistakes faster than any invention in human history – with the possible exceptions of handguns and tequila”
22. “1f u c4n r34d th1s u r34lly n33d t0 g37 l41d”
23. “To go forward, you must backup.”
24. “I would love to change the world, but they won’t give me the source code”
25. “A Windows user spends 1/3 of his life sleeping, 1/3 working, 1/3 waiting.”
26. “My software never has bugs. It just develops random features.”
27. “Better to be a geek than an idiot.”
28. “Windows isn’t a virus, viruses do something.”
29. “Geek’s favorite pickup line: Hey, does this rag smell like chloroform? “
30. “Be nice to geeks when you’re in school, you might end-up working for one when you grow-up.”
31. “Difference between a virus and windows ? Viruses rarely fail.”
32. “Evolution is God’s way of issuing upgrades.”
33. “The only problem with troubleshooting is that sometimes trouble shoots back.”
34. “It’s a little-known fact that the Y1K problem caused the Dark Ages.”
35. “The box said ‘Required Windows 95 or better’. So, I installed LINUX.”
36. “Computer are like air conditioners: they stop working when you open windows.”
37. While i clicked my fav’rite bookmark, suddenly there came a warning, and my heart was filled with mourning, mourning for my dear amour,
38. quoth the server, 404.”
39. “Like car accidents, most hardware problems are due to driver error.”
40. “Dating a girl is just like writing software. Everything’s going to work just fine in the testing lab (dating), but as soon as you have contract with a customer (marriage), then your program (life) is going to be facing new situations you never expected. You’ll be forced to patch the code (admit you’re wrong) and then the code (wife) will just end up all bloated and unmaintainable in the end.”
41. “Real men don’t use backups, they post their stuff on a public ftp server and let the rest of the world make copies.” – Linus Torvalds
42. “There are 10 kinds of people in the world, those that understand trinary, those that don’t, and those that confuse it with binary.”
43. “If you give someone a program, you will frustrate them for a day; if you teach them how to program, you will frustrate them for a lifetime.”
44. “It is easier to change the specification to fit the program than vice versa.”
45. “I had a fortune cookie the other day and it said: ‘Outlook not so good’. I said: ‘Sure, but Microsoft ships it anyway’.”
46. “The nice thing about standards is that there are so many to choose from.”
47. “The term reboot comes from the middle age (before computers). Horses who stopped in mid-stride required a boot to the rear to start again. Thus the term to rear-boot, later abbreviated into reboot.”
48. “Programmers are tools for converting caffeine into code.”
49. “The great thing about Object Oriented code is that it can make small, simple problems look like large, complex ones.”
50. “Hacking is like sex. You get in, you get out, and hope that you didn’t leave something that can be traced back to you.”
Checkout,
The 10 Best Hacker Movies
Have you enjoyed reading these quotes? Need some technical articles?
Checkout 850+ Articles Tips | Tricks | Xp | Vista | Windows 7 | Tutorials | Linux

Play with your computer after reading these articles. icon wink Top 50 Absolutely Hilarious Computer Quotes

Tizer Rootkit Razor -Free Anti RootKit Scanner


 

Tizer Rootkit Razor detects and removes malicious rootkits that are hidden on your computer through multiple methodologies.Tizer Rootkit Razor is a powerful freeware tool and easy to use tool. Rootkits can open a secret backdoor and once this happens, attackers can use rootkits to secretly alter files, change processes, distribute spam, and use data mining tools to steal login IDs and passwords.
What Is a Rootkit?

At the core of the term “rootkit” are two words- “root” and “kit”. Root refers to the all-powerful, “Administrator” account on Unix and Linux systems, and kit refers to a set of programs or utilities that allow someone to maintain root-level access to a computer. However, one other aspect of a rootkit, beyond maintaining root-level access, is that the presence of the rootkit should be undetectable.
Tizer Rootkit Razor does 9 scanning methods to detect rootkits,

  1. Process Scan
  2. Registry Scan
  3. Kernal Scan
  4. Running services scan
  5. SPI(Service Provider Interface) Scan
  6. SSDT Scan
  7. Port Scan
  8. Thread Scan
  9. And of course it aslo does Files and Object scan.

 Tizer Rootkit Razor  Free Anti RootKit Scanner



Cool Features of “Tizer Rootkit Razor”:


  • Displays information about your operating system and memory usage.
  • Provides information about all running processes in the system.
  • Detects hidden processes, threads, modules, services, drivers, files, registry keys, and alternate data streams.
  • Allows the user to clean and remove the malicious objects from the system by deleting the hidden files or registry.
  • Allows users to terminate malicious processes or modules/threads.
  • Detects hidden objects if a file is hidden using IAT, EAT, or SSDT hooks.
  • Allows users to start, stop, pause, or resume installed services.
0.0download Tizer Rootkit Razor  Free Anti RootKit Scanner
Tizer Rootkit Razor

How to Hide Desktop Icons in Ubuntu?

Do you wish to hide desktop icons in Ubuntu linux just like Windows?
Then read this post post to hide home, computer, network, drives, and trash desktop icons in Ubuntu Linux.
Simply open Configuration Editor by pressing Alt+F2, type gconf-editor, and run it.

Inside the Configuration Editor, navigate to Apps –> Nautilus –> Desktop. At the right-hand pane, just uncheck the box that corresponds to the icon that you would like to hide.

What to Hide all the desktop icons?
To hide all the icons from your Ubuntu desktop, open the Configuration Editor, navigate to Apps –> nautilus –> preferences, and then locate show_desktop item from the right-hand pane. Uncheck the box and voila, all of your desktop icons should be gone by then.
Thats it !!!

How To Extract Windows and Microsoft Office 2010 Product Key?


ProductKey+Viewer How To Extract Windows and Microsoft Office 2010 Product Key?
If you have lost your product key or CD key of Windows Os or Microsoft office.Then here is a solution to recover your Ms Office 2010 Product Key with ProduKey. Produkey is small freeware utility to extract the product keys of Microsoft Office 2003, Microsoft Office 2007, Microsoft Office 2010 as well as product keys of Windows 7, Vista, and XP with a single click. It works smoothly on Windows 7, Vista, XP, Exchange Server and SQL Server.
1. Download and run Productkey.
2. Its a portable application and no need any installations.
3. You can find Windows and Micosoft Office Product Keys.
4. Just right click on Ms Office and click Properties.
ProductKey+Viewer+v4.1 How To Extract Windows and Microsoft Office 2010 Product Key?
5. From here you can copy the Product key.
Checkout How to Make Any Portable Application, this will help you to make portable applocation in few easy steps.
No worries even if you lost your Cd Keys after Installtions icon wink How To Extract Windows and Microsoft Office 2010 Product Key?

3 Simple Ways to Open DOCX File Format


 
3+Simple+Ways+to+Open+DOCX+File+Format 3 Simple Ways to Open DOCX File Format
Recently Microsoft released Ms Office 2010, but most of them are still using MS Office 2003.They have not even upgraded to Ms Office 2007. Ms Office 2007 default file format are  .pptx .xlsx .docx files. Ms office 2003 or other earlier versions doesn’t support this file format.Here I provide 3 easy solutions to open docx file format.
1. Microsoft Office Compatibility Pack
Microsoft released a tool named “Microsoft Office Compatibility Pack” ,Using this tool you can convert office 2007 files to the compactable file format for older versions.
2. OpenOffice
OpenOffice is a multi-platform (Windows, Mac, Linux) and multi-lingual office suite which is compatible with all major office suites (i.e. Microsoft Office). It includes Writer (word processing), Impress (presentation), Math, Draw, Calc (spreadsheet), and Base applications.You can open and edit MS Office 2007 Docx file format in OpenOffice.Ubuntu Linux comes with OpenOffice Software.
3. DevVicky Word 2010
DevVicky Word 2010 is another freeware application that can also open DOCX formats. It is a lightweight application when compared to OpenOffice.org, and is much lighter when compared to MS Office as well. This is another cool way of opening Docx file format.
Its better you switch over to Ms Office 2007 or Ms Office 2010.

Get Free Ashampoo Anti Malware 180 Days License Key



Ashampoo Anti Malware 1 Get Free Ashampoo Anti Malware 180 Days License Key
The Ashampoo Anti-Malware is a combination of both Ashampoo AntiSpyWare and Ashampoo AntiVirus technologies.Ashampoo Anti-malware is now offering 180 days free genuine license key for new users.Ashampoo Anti-Malware protects your PC from external threats and blocks viruses, trojans, worms, malware, rootkits, bots, spyware and adware efficiently without putting so much as a strain on your computer’s performance.
Some key features of “Ashampoo Anti-Malware”:
Two integrated engines of renowned software producers offer advanced protection from viruses, trojans, worms, malware, rootkits, bots, spyware and adware
During file execution and file copying, the onAccess guard offers maximum protection against all kind of threats before they can affect the entire system
Heuristic analysis designed to detect unknown threats
Protection against more than 3.000.000 potential threats from the web
Rootkit Detector
Get Free Ashampoo Anti-Malware 1.2 Licence For 3 Months:
1. Goto Ashampoo Promo Page.
2. Enter a valid Email address. And click Send.
Get+Free+Ashampoo+Anti+Malware+180+Days+License+Key Get Free Ashampoo Anti Malware 180 Days License Key


3. Download the Ashampoo Anti-Malware.
4. Just install and enter the activation key.
Stay Protected icon smile Get Free Ashampoo Anti Malware 180 Days License Key

Good-Tutorials- Photoshop,Flash,CSS Tutorials

Good Tutorials +Photoshop,Flash,CSS+Tutorials Good Tutorials  Photoshop,Flash,CSS Tutorials














Are you looking for great Photoshop,Flash,CSS Tutorials ?

Good-Tutorials lists thousands of tutorials for Photoshop, Flash, Illustrator, and other topics. The tutorials on Good-Tutorials.com covers tutorials from basic concepts to tips and tricks, and advanced concepts.
Tutorial Categories:
  • CSS tutorials
  • Flash Tutorials
  • HTML tutorials
  • Java
  • JavaScript
  • Illustrator
  • Photography
  • Photoshop
  • PHP
  • Maya tutorials
  • Ruby tutorials
  • 3D Max Tutorials.
About Good-Tutorials:
Good-Tutorials is the largest source of tutorials on the web today. It has been featured on the BBC, SkyNews, TechTV (now G4), in the British magazine iCreate, PC World, and has been linked to by thousands of sites, blogs and forums.
Also Checkout Photoshop tutorials covered in Geekyard.

My Computer takes a long time to load the desktop

 
My+Computer+takes+a+long+time+to+load+the+desktop My Computer takes a long time to load the desktop






















Problem:
When I turn on my computer and log in, my computer takes a long time to load the desktop and system tray icons.How do i get rid of it? And fix the the desktop problem?
Solution:
Your windows takes long time to load because of so many reasons like Virus,Damaged Registry, Fragmented Hard Disk, too many startup items, less memory space.I have already discussed in detail about these things in 5 Reasons that slows down your computer performance post.In this post I am going to show to easy fix a slower PC.
  • Removing Unwanted startup Items.
  • Fixing HDD Errors.
Now lets see these things in detail.
1. Remove Unwanted Startup Items
  • Goto Start–>Run.
  • Type msconfig and hit Enter.
  • Navigate to Startup tab.
Remove+Unwanted+Startup+Items My Computer takes a long time to load the desktop
  • Keep Antivirus,Instant messenger, and other important applications to load in system tray.
  • Remove unwanted application.It will pull down your PC performance.
2. Fixing Hard Disk Errors
Hard disk error occurs mainly due to improper shutdown.Its also one of the main reason which makes windows to take long time to load.
  • Goto Start –> Run.
  • Type CMD and hit enter.
  • Type chkdsk and hit enter.
Fixing+Hard+Disk+Errors My Computer takes a long time to load the desktop
  • It Check disk command checks error in HDD and fixes it.
  • Now fix errors in other drives. D,E,F,G,H,….
  • Type CHKDSK /F for drives other than C and fix HDD error.

I hope these two simple methods will fix your problem icon wink My Computer takes a long time to load the desktop

MP3 AddIn – Easily Embed MP3 Files Into Powerpoint For Free

 
MP3+AddIn+ +Easily+Embed+MP3+Files+Into+Powerpoint+For+Free MP3 AddIn   Easily Embed MP3 Files Into Powerpoint For Free












Microsoft Office users can’t embed Mp3 files in their PowerPoint presentation.Its because PowerPoint requires the WAV sound file format to be embedded.This problem is easily solved my using MP3 AddIn.
After installing this Mp3 AddIn its possible to insert MP3 files without converting them in a difficult way with external tools to the WAV file format.MP3 AddIn automatically converts the files by changing the name of the MP3 file and Powerpoint deals with it as if it were a WAV file, letting you easily embed MP3 files into PowerPoint presentations for free.
Many PowerPoint users will feel adding MP3 will make their presentation effective.MP3 AddIn is a lightweight application and does not occupy much space.
Cool Features of MP3 Addin:
  • Easy to use
  • Lightweight
  • Free of cost
  • No need to attach MP3 files while sending them to friends.
0.0download MP3 AddIn   Easily Embed MP3 Files Into Powerpoint For Free


Also Read:


Thursday, December 30, 2010

Microsoft Money Plus Sunset Deluxe – FREE

 
Microsoft+Money+Plus+Sunset+Deluxe Microsoft Money Plus Sunset Deluxe   FREE
Microsoft stopped selling Money last year. Recently Microsoft released two Money Packages for free download.Anyone can download and use Microsoft Money fro FREE .
  1. Money Plus Sunset Deluxe and
  2. Money Plus Sunset Home and Business
The last version Money 2008 required online activation.But this Microsoft Money Plus Sunset Deluxe package does not require any activation.
The Microsoft Money Plus Sunset versions provide an alternative version of Money with the following:
  • File conversions from older versions of Money,
  • No required activation,
  • No online services and
  • No assisted support.
0.0down Microsoft Money Plus Sunset Deluxe   FREE
Money Plus Deluxe Sunset – Designed to replace Essentials, Deluxe and Premium
Money Plus Home & Business Sunset – Designed to replace Home & Business

5 Features To Look For In A Business Backup Service

 
A+Business+Backup+Service 5 Features To Look For In A Business Backup Service






There is a lot of online discussion about consumer-oriented online backup services. But what should businesses look for when looking to protect their own computers? As you can imagine, businesses face some very different challenges than the average home laptop user.
Here are a few key points to think about:
Speed Of Recovery
The larger your business is, the more money you will lose during downtime. That’s why it’s so vital that you get up and running ASAP when your servers go down.
If you only need immediate access to a few working files, a simple selective online backup download will do. But in the case of a full system recovery, you may want to consider a D2D2C (Disk-to-Disk-To-Cloud) online backup, or a remotely hosted emergency failover facility.
This will help minimize the threat of damage from unplanned downtime.
Automation
Since time is money, a 100% hands-free automate backup service will help you save both. Also, an automated solution eliminates the possibility of human error. (One of the most common causes of data loss)
Security
Make sure that your backup system encrypts your data, and that you’re the only one with the encryption password.
With an online backup solution, encryption should be done twice. Once on your server before being taken off-site, and then these packets should be transferred over an encrypted SSL connection as an added precaution.
Compliance
It’s always a good idea to consult with your legal team when establishing your data protection plan. This is especially true when handling large volumes of data, or very sensitive information.
Some good “best practices”, when backing up online, would be to make sure that your data is stored in the same country as your primary servers. This way, you only need to comply with a single set of laws, while avoiding potential international legal conflicts.
Also, you should make sure that you have access to fast and powerful search tools. These can come in handy in case of a legal discovery request.
Frequency
How much data can your company afford to lose?
· A Week?
· A day?
· 12 Hours?
· Zero seconds?
The frequency of your backups will determine your potential risk. The best option would be a continuous backup plan, where data is constantly updated every time someone saves a file. This eliminates the possibility of ANY data loss whatsoever.
Although this is not meant to be a comprehensive business backup buying guide, the points outlined above should be a good start for any company thinking of protecting their data over the Internet.
About The Author:
Storagepipe offers a number feature-rich server backup of solutions designed specifically for businesses.

Windows Security Release ISO Image for August 2010


Security+Release+ISO+Image Windows Security Release ISO Image for August 2010
This DVD5 ISO image is intended for administrators that need to download multiple individual language versions of each security update and that do not use an automated solution such as Windows Server Update Services (WSUS). You can use this ISO image to download multiple updates in all languages at the same time.
August 2010 Security Release ISO contains the following updates:
  • KB2286198 / (MS10-046)
  • KB981852 / (MS10-047)
  • KB2160329 / (MS10-048)
  • KB980436 / (MS10-049)
  • KB981997 / (MS10-050)
  • KB2079403 / (MS10-051)
  • KB2115168 / (MS10-052)
  • KB2183461 / (MS10-053)
  • KB982214 / (MS10-054)
  • KB982665 / (MS10-055)
  • KB978886 / (MS10-058)
  • KB982799 / (MS10-059)
  • KB983582 / (MS10-060)
  • KB983583 / (MS10-060)
  • KB983587 / (MS10-060)
  • KB983588 / (MS10-060)
  • KB983589 / (MS10-060)
  • KB983590 / (MS10-060)
0.0download Windows Security Release ISO Image for August 2010

BitDefender Antivirus 2010 FREE FOR 24 Hours

 
BitDefender+Antivirus+2010 BitDefender Antivirus 2010 FREE FOR 24 Hours
Get free license of BitDefender Antivirus 2010 worth $25. The promotion is run by the popular UK website v3.co.uk and runs for just 24 hours starting midday CEST Friday 13 August and ends on midday CEST Saturday 14 August.

Whats written on Promo Page?
WORLD EXCLUSIVE: BitDefender Antivirus 2010, worth $24.95, download for FREE between Friday midday CET 13 August and midday CET Saturday 14 of August
About Bitdefender
BitDefender Antivirus 2010 is a powerful, accurate and highly configurable antivirus tool that delivers everything you need to keep your PC malware-free.
The core antivirus engine is constantly scanning all your internet, email and instant messaging traffic, for instance, detecting and blocking known threats before they’re able to install. Two additional proactive technologies are used to uncover brand new threats, while keeping false alarms to a minimum. And the results are so good that independent testing labs AV-Comparatives awarded the program their highest Advanced+ rating in the May 2010 Retrospective/ Proactive test.
Get 1 year Free Licence Key
1. Goto Bitdefender 2010 Promo page.
2. Fill Name and a valid email Id.
3. Download Bitdefender 2010
Enjoy the Free offer icon wink BitDefender Antivirus 2010 FREE FOR 24 Hours

iCare Data Recovery Software Free Giveaways Worth $69.95

iCare Data Recovery Software Free Giveaways Worth 69.95 iCare Data Recovery Software Free Giveaways Worth $69.95
Get iCare Data Recovery Software worth $69.95, its free until July 15.With icare you can easily recover deleted or formated files from your partitions.It is a file recovery software to undelete, unformat, undo shift+delete. It is pretty useful when you accidently formatted hard drive, partition unintentionally deleted, emptied files from recycle bin, lost photos from digital camera sd card, lost files from memery card, flash card, pen drive, removable hard drive.
Key Features of “iCare Data Recovery Software”:
  • Format recovery: You can use this application to files from formatted partition.
  • SD card recovery: iCare Data Recovery Software is sd card supported to recover photos from formatted partition, raw drive, accidently deleted photos recovery supported.
  • Shift+delete recovery: iCare Data Recovery Software performs a perfect job when searching files that were emptied from recycle bin, or performed shift plus delete.
Step To Get Free iCare Data Recovery Software
1. Download the Software,
Main: http://www.icare-recovery.com/icaredrs.exe
Option: http://www.icare-recovery.com/icaredrs.rar
Free code: “2K1XB2X964MPHOCJ8M1R6IJF0OVHFOFH”
Note:
  • You need to select a recovery module before you could see the active button.
  • Run the program as OS admin and internet connection is required.
  • No space included when copy and paste the code.

I Love PDF: Merge and Split Your PDF Files Online

 
I+Love+PDF+Merge+and+Split+Your+PDF+Files+Online I Love PDF: Merge and Split Your PDF Files Online
I love using Nitro PDF software for editing PDF files.If you wish to edit PDF files online then try out I Love PDF.Its a free web application that lets you merge and split PDF files online. I Love PDF is easy to use.You can upload a PDF file to I Love PDF and start doing your editing work.I
  1. Merge Multiple PDF to single PDF file
  2. Split a single PDF to multiple PDF files.

1. Merge Multiple PDF to single PDF file
In order to merge all your PDF files, simply upload PDF files to ILovePDF website.You can upload up to 10 PDF files, and each file can be up to 8 MB. Once you have uploaded the files, ILovePDF will merge all of them into 1 PDF file in the order that you uploaded them.
2. Split a single PDF to multiple PDF files.
If you wish to split your PDF file into mulitple PDF files, just upload your PDF file to ILovePDF. The file size can be up to 8 MB. After slitting the PDF file you can download it icon smile I Love PDF: Merge and Split Your PDF Files Online
Checkout,
I Love PDF website

Top 10 Free Online Logo Design Sites


Top+10+Logo+Design+Sites Top 10 Free Online Logo Design Sites
The logo becomes “mark” when it is registered with a dedicated office and becomes an identification of one particular company or product.
It may be formed only by company name or the name or a slogan or an image. Often, the logo becomes almost more famous name, just enough so that the graphic symbol to identify the company.
The logo must reflect the theme, objectives and target the company or product, so it’s always good to clarify through a briefing with the client all these issues and produce paper first drafts and ideas. It must also enclose a symbol or picture of the mission or characteristics of the product.Now lets see,
Top 10 Free Online Logo Design Site
1. Logoease
Creating logos made as easy as blowing bubbles with Logoease. Logo Ease is owned by Graphic Design Ltd in the UK. It is the internet’s only totally free professional grade logo maker.
2. Logo Maker
Logomaker provides over 10,000 images for you to use as a base in your logo. These images are professionally designed by logo experts that understand the type of art that will work effectively in a logo. In addition, the design tool was made to intuitively draw its customers to the important aspects of a quality logo, including the proportion between text and image, and colors.
3. Logo Design Engine
You can design a logo for FREE! Professional Designers worked hard to create FREE Logo Designs Gallery in order to give you the freedom to create your Company Logo Identity Without cost.
4. LogoYes
LogoYes is the leading provider of do-it-yourself logos and other premium design products to small businesses around the world. We pioneered do-it-yourself logo creation and have a patent pending on our unique processes. What’s more, our site’s superior quality of symbols and ease of use have made it one of the web’s most popular design sites.
5. Freelogoservices
FreeLogoServices.com is doing their part to help entrepreneurs start a business, students, and other organizations. The highly acclaimed free logo maker and creator web site builds thousands of free logos each week for businesses and others worldwide.
6. Logosnap
If you need a fast, free, professional logo design and business card, then you’ve come to the right website. Now you can design your own unique company logo and business cards in as little as five minutes, for Free!
7. Logofactoryweb
100% free! Intuitive and simple design interface allows you to create your own free business logo designs in just minutes.
8. Web 2.0 Free Logo Generator
Design a professional free web 2.0 logo.
9. Templatesbox
Download and use high quality logo designs to enhance your website design.
10. Cooltext
Cool Text is a free graphics generator for web pages and anywhere else you need an impressive logo without a lot of design work. Simply choose what kind of image you would like. Then fill out a form and you’ll have your own custom image created on the fly.
Enjoy the list icon smile Top 10 Free Online Logo Design Sites

LinkWithin

Related Posts Plugin for WordPress, Blogger...
Twitter Delicious Facebook Digg Stumbleupon Favorites More