Friday, March 29, 2024
10:49 AM (GMT +5)

Go Back   CSS Forums > Off Topic Section > Computers and Technology

Computers and Technology Discuss computer issues, topics, and technology. Ask your questions about computer related problems, software, gadgets, computer science & emerging technologies.

Reply Share Thread: Submit Thread to Facebook Facebook     Submit Thread to Twitter Twitter     Submit Thread to Google+ Google+    
 
LinkBack Thread Tools Search this Thread
  #11  
Old Sunday, October 25, 2009
Waseemtabish's Avatar
Senior Member
 
Join Date: Oct 2006
Location: Bhakkar
Posts: 646
Thanks: 735
Thanked 702 Times in 333 Posts
Waseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the rough
Default Programs containing spyware:

Programs containing spyware:

This section gives an overview on programs which are known to carry spyware. If known, the type of spyware is listed after the program name. Be aware that this information can change very quickly. If you find your favorite program on this list, be suspicious and do further checks. If you use a program which is not listed here, don't assume that it's free of spyware.
Quote:

Quote:
!Glance
'WE' Group ProxyChecker 3.1.8
1 Click WebSlideShow
100 Proof Cocktail Planner
100% Word Search Free
100% Word Search Free
123Search 1.0
123Search 2
123Search 2
15 Puzzle 2.1
1st Contact
1stRiadaMelt
20/20
2Minute Warning
3D Anarchy
3D Frog Man Demo
3D Maze Man Demo
3D Morris
3D-FTP 3.0
3rd block 2.0
3S Accounting
3SI Accounting & Inventory Management (Demo) 2.0
5star Free Lines 1.2
7Way 0.15
A
Aadcom Screensaver Software
Aaron's WebVacuum 0.8f
Abe's FTP Client
Abe's Image Viewer
Abe's MP3 Finder 4.0
Abe's MP3 Finder
Abe's Picture Finder 1.4
Abe's SMB Client
Absolute Telnet 1.63
Absolute Yukon Solitaire
Access Diver 2.02
Access Diver III
Access Diver
Ace of Humor 1.0
Ace Talking Jokes & Quotes
AceNotes Free 2000c
Aces and Kings Solitaire
Acorn Email 2.5
AcqURL 3.1
AcqURL 3.1
ActionOutline Light 1.6
Active 'Net 1.0
Add Remove Plus! 1.1
Add URL 1.0
Add/Remove Plus
Add/Remove Plus! 1.1
AddAce
Address Rover 98
Admiral VirusScanner
Adsubtract SE 1.66
Advanced Call Center 2.9
Advanced Call Center
Advanced Directory Printer
Advanced Internet Tool 2.2.2
Advanced Maillist Verify 1.6
Advanced Maillist Verify
AdvertBar
Advertisement Wizard
AdWizard
Afreet SiteViewer
Alchemist Demo
Alchemy Anaconda
Alexa Toolbar
Alive and Kicking 3.1
AllNetic WWW and FTP Observer
alphaScape QuickPaste
Altnet Secureinstall
America Online (AOL)
An Online Secretary
AnchorNet1
Angove CD Player
Answwwer
AnySpeed
AOL Anti-timer
Applet Game Mania 1.7
Appload Notify
Ariadne Browser
Ashampoo Uninstaller
Ashampoo WinOptimizer 2000
AskBox 3.0
ASP1-A3
Attune
Auction Central 1.02
Auction Explorer
Auction Station
Audio CD MP3 Studio 2000
Audiogalaxy Satellite
Audiogalaxy Satellite .608 (Oct. 1 through Nov. 4, 2001)
Aureate Group Mail 3.0
Aureate GroupMail 3.06.00
Aureate SpamKiller Free Edition
Aution Central 1.02
AutoFTP PRO 2.3
AutoWeb 1.0
AxelCD 2.1
Axman
B
b3d Projector
Babylon
Babylon Tools 3.1 build 35
Babylon Tools before 3.1 build 35
Balloon Pop Demo
Banner Crafter
Bavardeur Branchez-vous
BearShare all versions
Beatle
Beeline
BeFaster v2.51
BigEListener
Binary Boy 1.70
BinaryVortex 1.4
Bingo Demo
Bingo Master Demo
Bio-Rhythms
BizAgent
Blast Thru Demo
Blinkin
Blue Engine 1.0
Blue Orbb
Bonzi Buddy Dec. 2001 releases and later
BookSmith: Original 1.2
BubbleBound
Buddy Pad
BuddyPhone 2.0
BuddyShare 1.1
Buisness Letter Punch
Bullseye Searcher 2.5
BullyFrog
Business Letter Punch
Button Magic
Buzme
C
Calendar+ 2000
Calendar+
Caliban Mailer
Calypso E-mail 3.0
CamCollect 1.4c
CamGrab
Canasis vB vB-Beta
Capture Express 2000 1.0
Carlanthano 2.9.868
Cascoly Screensaver 1.0
Cash 2000
CashBar
Caveman Cards
CD Box Labeler Pro
CD Extractor
CD MP3 Studio
CD Recording Studio
CD-AID 02.00.05.23
CDDB-Reader
CDMaster 32 3
CDMaster 32 4.5x
CDMaster32
CDMaster32 3.0
Centarsia 1.01
Challenge Pool
ChanStat 3.3
Charity Banner 1.0
Chat PicPluck
Cheat Machine 3.1
Cheat Machine 3.2x
Check and Get 1.2 build
Check and Get
Check and Get
Check4New 1.7
Chinese Checkers Demo
ChinMail 1.2
Clabra clipboard viewer 1.2
Classic Peg Solitaire 1.0
Clean & Tidy 1.5
Click
ClickDough
Clipmate Student Edition 5
Clock Saver 1.0
CoffeeCup Free HTML
ColorBreak
ColorBreak 2
ComTry Music Downloader 2.2
Concentration Done Right
Connect Four
Connect?
Connection Watcher 4
Contact Plus
ContextPro
Copernic 2000 For EVER!
Copernic Shopper Beta 2
Cowon Jet-Audio
CPR 1.2
Cracker!2000
Crazy Drake Demo
Crazy Puzzle Demo
Credit Card Verifier
Crescendo (LiveUpdate) Plugin 5.1
Crescendo internet music player
Crosses & Zeroes
CrushPop
Crystal FTP
Crystal FTP 2000
CS Telnet
CSE HTML Validator Lite 2.0
CSE HTML Validator Lite
Cursor Maker
CuteFTP 3.0 beta
CuteFTP 3.0/3.5
CuteFTP > 3.0
CuteFTP
CuteFTP/Tripod
CuteMX
CutePage 2.0
CutePage
Cyber-Gold Communications
D
DALiWorld
Danzig Pref Engine
Danzig Pref Engine 1.1
DateTime 1.3
DB to HTML Express
Debt Relief
Delphi Component Test
Delphi Tester
Desk Reference 0.1
DesktopDollars
Develop Critical Thinking
Develop Critical Thinking Skills
Dialarm 1.0.1.19
Dialer 2000 1.5
Dialpad
Digi-Cam Web Page Generator
DigiBand NewsWatch
DigiCams - The WebCam Viewer
DigiCams - WebCam Viewer
DigiGuide 3.x
Digital Postman 2.0
Digital Postman
Direct Connect 0.9.963
DirectUpdate
Disconnector 2.6
Disconnector
Disk Space Recovery Wizard
DiskSpace Explorer 2000 2.1
DivX 5.0.x
DL-Mail Pro 2000
DLExpert 0.92
DNScape
Doorbell 1.18
Dope Wars
Dope Wars
dotCool Builder
dotNow! Free Internet Access
Download Accelerator Plus (DAP) 5.0
Download Minder 1.5
Download Minder 1.8
Download Wonder 1.55
DownloadAgent
DownLoader 1.1
dozeCrypt III
DuRu
Dweeps Demo
Dwyco Video Conferencing 2.3
E
eAssist
Easy Noter
Easy Phone Book
Easy Splitter
EasyFill 2.02
EasyNoter
EasySeeker 4.0
eBlaster
EconoForecast
eDonkey2000
EIS Web Monitor 1.2
EldoS Keeper
eLOL (Electronic Laugh out Loud)
Email Extractor
Email Extractor'99 2.92
EmmaSoft ChatCat
EmmaSoft dBrow
EmmaSoft KeepLan
EmmaSoft Soundz
eMNGma
Encoding Utility 2000
EnvoyMail
EpAssist
Essay-Punch
EURO Converter 2
Every Link for You 2000
eVocabFlashCard 1.0
eWork
Executive Accounting-Demo
Express Communicator
Extreme Animals Demo
Extreme Bugs Demo
Extreme Dinosaurs Demo
Extreme Orchids Demo
EZ-Forms FREE
EZForms
EzStock
EZSurfer 2000
F
Family Tree Maker 7
FenceOut
FiestaBar
File & MP3 Renamer '99
File & MP3 Renamer
File Mag-Net 3.0
File Mentor
File Seeker
File Sniffer
FileMentor
FileSeeker
FileSender
FileSniffer
FileSplit 2.2
FindShare
Fire Client 1.5b1100
FlashGet (Formerly JetCar) 0.87
FlashGet 0.76 and +
FlashGet
FlashTrack
FlexSpex
Floorplan LT
Folder Guard Jr. 4.1
Folder Guard Jr.
Folder Guard Jr. Prior to 2
FormTool LT
FourTimes 3.5
Fractal World Generator 1.1
Frazzle
Free Budget
Free Hearts for Windows
Free ImageEditor 1.0
Free IRC 1.0
Free MP3
Free Notepad 1.0
Free Pics
Free Picture Harvester
Free Solitaire 3.0
Free Solitaire
Free Solitaire
Free Spades 0.7
Free Submit 1.0
Free Submitter Pro
Free Tetris
FreeBase
FreeBudget
FreeImageEditor 1.0
FreeIRC 1.0
FreeNetMon
FreeNotePad 1.0
FreeRenju
FreeRip MP3 1,0
FreeSaver MP3 1.0
FreeSite 1.0
FreeSubmit 1.0
FreeWebBrowser 1.0
FreeWebMail 1.0
FreeZip! 2.0
FTP Editor 1.7
FTP Works
FTPEditor 1.7
Fundi e-Lert 1.4.1.29
G
Galactic Invasion Demo
Galactic Menace
Galaxy of 3D Tetrimania Demo
Gardener Demo
Garret Demo
Gator
Geno Pro 1.7
Geno Pro
GenoPro 1.7
GenoPro 1.71
GenoPro 1.9
GenoPro
GenoPro
GenoPro prior to 1.7
GetDown
GetRight 4.x
GetRight Mail Control 1.0
Gif Animator 1.00
GifLine Pro 2.0.2
Gimme IP
Glowing Bugs Demo
GluedOn
Go!Zilla 3.5
Go!Zilla WebAttack
GodeZip
GoHip!
Gold Diver
Gomuko Pro 1.1
GovernMail 1.1
GPL
Grafula
Grammar Fitness Suite
Graph Paper Printer
Grokster 1.3.3 released Dec. 2001 through Jan. 1, 2002
Gunther's PasswordSentry
Gypsee
H
HallowMeenies
HandsFree Browser
HangWeb
hesci Private Label
HexWars II
Hey, Beer, Man
HiClock
HiDialer 2000
High Seas Solitaire
Home Buyer´s Calculator Suite
Homewatcher 1.3 Demo
Host Monitor 4
Hot Dog Vendor
Hot Lingo
Hotbar Toolbar
HOTText
HTML Proxy-Spy
HTML Translator 2.5
Html Tutor pro
HTTP Proxy-Spy
Huey Color Picker 1.8
Huey v1.8 Color Picker 1.8
HumanClick
Hypersnap-DX 3.61
I
iAgent 1.0
Iban Technologies IP Tools 2000 3.1
Ice Fusion
ice9
Idyle GimmIP 4.0
iFind Graphics 1.5
iKena 1.1 released Dec. 2001
Image Carousel
Image Site Grabber
imageN
imageN
ImagerX 2000 3.0
iMesh
Implosion Screensaver
In School We Trust (Pupil Edition)
In Vircible Anti Virus
InboxSpecialist
iNetPad 3.1
Infinite Patience 2.2
InfoBlast
InnovaClub
InstallZIP 1.4
IntegrityCheck Plus 2.01
Interchange FTP 0.2.1
Interfax 6.0.0
Intergalactic Exterminator Demo
Internet 007
Internet Neighborhood
Internet Tree 2.0
Internetrix 1.0
InterWebWord Companion
InvenTV
InVircible Anti Virus
Invisible Secrets 2.0
IP-Turboscanner
iPer Std,WH, Pro 3
iPhone
IPLAY
ISoaQ Beta 15c
iSolitaire
iToday
IVOX ICQ
Iwan's MP3 Finder 1.1
IYSoft Dial-Up Connection 1.2
J
JetCar
Jewels Of Anubis
JFK Research
jIRC
JOC Email Checker 1.7
JOC Web Finder
JOC Web Spider 2.6
JOC Web Spider
JoeCartoon (All)
JPEG Optimizer 3.07
JrEdit 1.0
JSoft Mail
K
Kachat Messenger
KaZaA all since early Feb., 2002
KaZaA Dec. 2001 releases up to Jan. 3, 2002
Keyword Monitor
KFK
KFTP
Kmail
Kmp3
Kontiki 1.02
KVT Diplom
L
LapLink FTP 2.0
Laser Chess 1.0
Lexicon Demo
Lexmark Print drivers installation
Life is Good
Lightspeed
LimeWire 1.8 beta and above
LimeWire 2.0x Dec. 2001 releases
Lines '98
Lines Millennium
Lines98
Lines98´/Lines Milenium
LineSoft Download
Link Cratter
Link Keeper
LinkProver 2.0
LivePaper
Loan Calculator Plus
Locker4U
LOL Chat 2.5
Lop.com Accessory Toolbar
Lop.com Search Engine
Ludo Safari Demo
M
Magellan explorer 2.2
Magic Signs
Mahjongg Game of Four Winds demo
Mahjongg Master 2 Demo
Mahjongg Masters
Mail Alert
Mail Them
MailAlert 2.33
Mailmoa 3.8
Mailmoa before 3.8
Manifest Timetrap 3.0
Marker 1.01
Marker 1.1
Marketscore
MASH-The m*cro$oft Agent Scripting Helper 4.5.3
MasterCrypt 2.0
Match It 1.0
MatchBlox
Mattel Retail products
Maxiimus
Maxxchat 1.0 B-6
Media Player
Medusa
Meeting Planner 0.8.0.1
MegaPhone
MegaSafe 6
MemriC 1.0
Meracl FontMap 1.2
Meracl FontMap
Meracl Hexocol 1.1
Meracl ID3 Tag Writer
Meracl ImageMap Generator 3.4
Meracl ImageMap Generator
Meracl MD Recorder 1.0
MessageMates
MetaMan
Midnight Oil Solitaire 3.1
MidWaviPro
MillenniuM BReaThe beta 0.3b
Millennium BReaThe Beta 3.1
MindAlmanac
Mindjongg
MindPlanner
MindSaver
mindseti.com
MindTrivia
Mini Golf Demo
MiniMemo-Die Cheatsdatenbank 9.0
MirNik Internet Finder 1.0
Mixman Studio
MJStudio
Moeboid
MonIRC 1.0.0.2
MoNooN2DR
Monsters & Mayhem
Moonwalker 2000 2.0.0
More Space 99 3.1
MouseAssist
MP3 Album Finder 1.3
MP3 Cat
MP3 Downloader 2.3
MP3 Fiend 5.5
MP3 Grouppie 4.5
MP3 Mag-Net 1.0
MP3 Player 2000 6.2
MP3 Renamer 1.33
Mp3 Stream Recorder 2.3
MP3 Tag Studio
MP3Album Finder
MP3INFO-Editor
MR. COOL
MSi-Clip
Mudslinger
MultiSender 1.03
Music Genie 1.0
MusicCity Morpheus 1.3
MusicCity Morpheus Preview Edition 1.3.1.1
MX Inspector BIG AD
My Genie Patriots
My Genie SE
My Genie Sports Edition 2.5
My GetRight 1.0
My House
My To Do
MyInfo
N
Naviscope 8.69
NeatFTP 1.0
Nebula Fighter Demo
NeoPlanet
Net CB 1.0
Net Pal
Net Scan 2000
Net Vampire 3.3
Net-A-Car Feature Car Screensaver
Net2Phone Dec. 2001 releases and later
NetAnts
NetBoard
Netbus Pro 2.10
NetCaptor 5.0
Netcaptor
NetCounter
Netman Downloader 1.0
NetMole 1.0
NetMonitor
NetNak 4.2
Netscape 6 through 7
Netscape/AOL Smart Download
NetScoopFinance
NetSetter
NetShark 1.0
Netsonic
Netsonic Pro 2.5
NetSuck 3.10.5/3.1
NetSuperSonic
NetTime Thingy 1.5
Network Assistant 1.9
NetXtract
Netzip
NeuroStock
News-Lynx
NewsBin
NewsShark
NewsWire 1.5
NfoNak 4.1
NightSparks
NikNak 2.0.1
NotePad+
NotePads+ 2.0
Notificator 1.01b
Notificator 1.0b
O
Octopus 3.0
Odigo Messenger 2 - 3
Of the day Quizzer 1.1
Off the day Creator 1.0
Onflow Media Player
Online Call
OnLineCall 1.19
Opera 5 & 6 (freeware version)
Option Insight 0.6.2
Othello FX
Oxide Demo
P
Paint by Numbers
Paper Picker 1.2
Paragraph Punch
Password Manager
Patriot Slots
Pattern Book 1.0.0.2
PC Telephone
PC-to-Phone
PCDJ
PCDJPHAT
Peh Pai
People Seek 98
PerfectPartner Time&Billing (Demo) 2.0
Personal Auction Track
Personal internet Finder 1.7
Personal Search Agent 0.8
Personal Stock Monitor SE
PGNSetup
PhonePro
Photo Base Junior
Photocopier 2.0
Photocopier 2.01
PicPluck 2.0
Picture Line
Picture Lines
Pictures In News 1.0
Ping Thingy
PingMaster
Pixel Pirate 1.0
PKZip
Planet.Billboard
Planet.MP3Find 3.0
PlayJ Studio
PMS
ponnu CHAMY's Music
PopMon 1.0.0.1
Popup Dictionary 2.0.70
PostCryptum
Power Lotto
Power Zip Express
PowerPak Accounting and Inventory Management-Demo 2
Powerzip 2000 Lite
pqDesktop
PrePromote 1.0.0
Printshop 10
PromaSoft Autoresponder 1.0732
ProtectX 3.0
ProxyChecker
Puzzle Master Demo
Q
Q*Wallet 1.6
QMS Memory Squares
QMS Mystery of Magical Numbers
QuadSucker/Web 1.8
Quadzle Puzzles
Quickhead-E
QuikLink Explorer Freeware Edition 3.0
QuikLink Autobot
QuikLink Explorer Freeware Edition 3.0
QuikLink Explorer Gold Edition 3.0
Quo Tracker 1.1.48
Quote Ticker Bar 6.0
QuoteWatch 4.2
QuoTracker
QuoTracker
Quta
QWallet
R
RadLight 3.03 release 5
RahJongg Demo
RapidBrowser
Rapidoc
Raptor Call of the Shadows Demo
Reader Rabbit
Real Audioplayer 7.0
Real Estate Web Site Creator 1.0
RealDownload
ReallyEasy Interactor 3.0(1)
RealPlayer 7
RealReverb Convolution 1.3
Recipe Review
Red Swoosh
Rededit
RedSheriff
ReGet 1.4
ReGet 1.6
ReGet
ReGet
ReGet
ReGet Junior
RemoteShut
Rename Master
Rename-It
RespondMiter / VX2 modules
Rest Your Eyes 3.0
Resume Detective 1.5
RingSurf
RoboCam 1.10
Rosemary's Weird Web World
Rosoft CD Extractor 1.09
Rosoft Media Player 1.0
Rubber Duck H30+
RunTurkeyRun
S
SaberQuest Page Burner
SaberQuest Tag Specification Edit
SafeNetMail
Sandbar
Savings4u 1.0 Beta 3
SBJV 3.0
SBWcc 2.0
Scout's Game 1.0
Scout's Game 1.02.1
ScreenFIRE - FileKing
ScreenFIRE 3.0
ScreenFlavors
ScreenMate Movies
ScreenMates
Scripto 0.80
Sea Battle 1.0
Seawar
SelfSeek
SERanker 1.24
Servant Salamander 1.6 Beta x
Shakespeare Punch
Shapez! 1.0
Shapez!
ShellGem
Shizzam 2.6
ShortKeys Lite
Sign Language Teacher
Simple Submit 1.0
SimpleFind 1.0
SimpleSubmit v1.0
Simplicity Personal Organizer
Site Select
SiteBack
SiteChecker
Sitesniffer 1.0
SK-111
Skeek Shooting 1.1
SL4 Historical Montage
SLEdit
Slide Puzzle 1.0
Smaller Image
Smart 'n Sticky
SmartBoard 200 FREE Edition 2.6
SmartDoc 3.0
SmartSum Calculator 2.0
Snap-It 4.0
Snipsnap 2.0
SoftCuisine 2.2.0
Software Translator
Software-Lynx
Sonic Mail
SonicBurn 1.3.178
SonicMail 2.6
SortSport
Sound Agent 1.0
Space Central Screen Saver
Space Checker
Spam Buster
Speak! Lite
Speaking Email DeLuxe 5.5.0
Speaking Email Deluxe 5.6.0
Spector Standard and Pro
Speedy eggbert Demo
Spherical HTML-Templator
Spherical MP3INFO-Editor 1.0
Splash! Siterave
Sputnik / VX2 modules
SpyTech
SpyTech CipherWorks 2.0
SpyTech Eradicator
SpyTech Integrity Check Plus
SpyTech NetArmor
SpyTech PasswordLock
SpyTech SecurityWorks
SpyTech Shadow
SpyTech Shadownet
SpyTech Spyagent
SpyTech SpyLock
SquareOff
SSScanner
SSSiter
SSSpider
Star Miner Demo
StartDrive 1.0
Static FTP
StationRadio
Stats '99 1.4
Stay On Pro
StickyNote 8.x
Stock Profit Spread Calculator 32
StockBrowser 1.9
Subscriber
SunEdit 2K
SunEdit 2k Mod Manager
SunKoSoft WebNewser 1.0b
Superball Challenge Demo
SuperBot
SuperIDE 1.4
Surf+ plug-in
SurfBar
Surfsaver
SurfSaver 2.1
Sweep 1.4
SweepsWinner
System Agent
System Mechanic 3.5
T
Tagger
Task Plus
Taskbar Executive
TaskWiz 1.3
TetriMania Master Demo
Text Tally 1.2
Text Transmogrifier
The Cassette Tape Producer 4.0.6
The Dictator
The Mapper
The Receptionist Desktop Edition 5.0
The Star Wars Combine HoloCom
TheNet 3.69
TI-FindMail 2.0
TI-FindMail
Tic-Tac-Toe Done Right
TIFNY 3.0
Tile Blazer Demo
Time Manager
Time Zone Converter
TimeWarner software
Toag
ToasterMultiTester
too Many Secrets 0.0.6 beta
Tools 3.1
TopMoxie
TopText
Total Finger 1.3
Total Whois 2.0
TPS108
Tracking The Eye 1999
Trade Site Creator 1.1
Trade Trakker
Traffic Attractor 2000 4.0
Transponder / IEHelper modules
Tray note Plus
Trianle Puzzle 1.0
TrivialNet 0.6
TS-Image Mapper
TsAdBot
TUCOWS Uploader 2.11
Tunnel Blaster Demo
Tweaki for Power Users 2.7.4
TWinExplorer 2.5
TWinExplorer Standard
TypeItIn
TypeWriter 1.0
U
UdmSearch 3.0.11.2
uICE
UK Phone Codes
Universal Explorer
V
Vagabond's Realm 0.9.1
Validate CC
VeriMP3 1.0
VeriTape 1.3
Vertigo QSearch
Viewpoint Media Player
Virtual Access 5.0
Virtual Friend
Visual Batch File
Visual Cyberadio
Visual Surfer 1.4
Vocabulary Wizard
Vocabulary Wizard
VOG Backgammon Main
VOG Backgammon Table
VOG Chess 2
VOG Chess Main
VOG Chess Table
VOG Reversi Main
VOG Reversi Table
VOG Shell
VOG Shell History
W
W3Filer 3.1.3
W3Filer
W3Filer(32) Up/Downloader Internet Files 3.1.3
War Demo
WarrenView 1.0
WE Group ProxyChecker 3.1.8
Web Coupon 1.0
Web Database
Web Page Authoring Software
Web Registrant PRO 4.0
Web Resume 1.0
Web Resume Wizard
Web SurfACE 2.0
Web Word Search 1.0
Web Word Wrestle
Web-Cam VCR
Web-N-Force 1.7
WEB2SMS 1.0
WebBug
WebCam VCR
WebCam Wonder 1.0
WebCamVCR 1.0
WebCopier 1.3
WebDrive 3.0
WebHunt 2.8
Webman 5.3
Webreaper 8.0
WebSaver
Website Manager
WebStripper 1.05
WebStripper 1.05
WebSurfAce
WebType 1.0
WebZip 3.5
Whisset
Whitehouse Mambo Parody
WhizFolders Organizer
Whois
WhoIs Thingy
WildTangent Games OEM bundle
Win A Lotto
WinAce 1.5
Windows Media Player 7 and 8
Windows XP Search Assistant
WinEdit 2000
WinMP3Locator
WinMX
WinSite
WinSite Light
WinWhatWhere
Wise Wolf Notify
Wise Wolf Optin
Wise Wolf Pages
Word Connect Demo
Word Search Mania
Word Search Mania Demo
Word+
Wordwright 1.0
WorldChat Client
Worm
Writing about Reading
Writing for Business
www.cyber-gold.com/free.htm
www.devgames.com
X
X Lines
X-Mas: Santa's Rein
xBlock 1.2
xtractor Plus 2.4
Y
Yellowbase
Yo Mamma, Osama!
Youbet.com
Your ESP Test
Z
Zarko 1.9
Zarko 3D
Zion 1.51
Zip Code Finder
ZIP Express 2000
ZIP Up The Web Pro!
Zip Wrangler


How to detect and remove spyware:
To detect and remove (if possible) adware and spyware we recommend the freeware Ad-aware which is frequently updated. Also useful is the shareware BPS Spyware/Adware Remover. It's advisable to adjust your firewall to block off internet access for all programs and services which are not entitled to access the internet. Of course, this won't work with the numerous Internet Explorer plug-ins. An IE plug-in has full control over the surfing session. Blocking off IE will block off internet access completely. Try to make sure that IE is not infected with spyware, or better still, use an alternative browser like Opera (registered version)
__________________
~It is possible to fail in many ways...while to succeed is possible only in one way.~
Reply With Quote
The Following 3 Users Say Thank You to Waseemtabish For This Useful Post:
ambren_kanval (Monday, October 26, 2009), khanzada_111 (Tuesday, November 10, 2009), salik_malik (Monday, October 26, 2009)
  #12  
Old Sunday, October 25, 2009
Waseemtabish's Avatar
Senior Member
 
Join Date: Oct 2006
Location: Bhakkar
Posts: 646
Thanks: 735
Thanked 702 Times in 333 Posts
Waseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the rough
Default Spyware Information

This guide explains what spyware is and what it does. Spyware has become a massive threat to the privacy of the internet user in recent years. Operating systems aren't able to detect or defend against spyware without an external program. One of a number of 3rd party tools - along with the user's own vigilance - is required to defeat this menace.
What is Spyware?
Spyware gathers information about the contents of, and the activities on, a computer system. This information is transmitted to the producer (or the one who controls the spyware), without the approval or knowledge of the user. The most common type of spyware is adware.
Adware is software which is embedded in other software (or sometimes distributed as a stand-alone program) and gathers and transmits the user's personal data. In return, ad banners are received and displayed on your system. Possible information that leaks out of your PC includes personal data (name, *-*-*, age,...), email addresses, credit card numbers, browser history, system configuration, installed software, hard disk content and passwords.
Another kind of spyware is surveillance software which logs activities on the computer system. The main difference fromadware is that surveillance software runs secretly in the background, no apparent activity is evident. Key loggers, screen scanner, trojans,... are surveillance software, some are realized in hardware (mostly used by law enforcement or intelligence agencies).
Known spyware:
Spyware became a branch of the software industry in recent years. Many specialized firms producing spyware. They pay the software programmers to implement spyware modules into their programs. That's the reason why many shareware and freeware programs are interlaced with spyware, the programmer is able to earn some extra money. What follows is a list of some popular spyware producers and what their products are doing.
Aureate/Radiate
This module can be very easily added to any software product. While using the software, the spy module is active and delivers precise audience targeting. Even without an established internet connection, Aureate/Radiate presents the user with splash screens, dynamic messaging, customized demographic collection and real-time surveys.
Conducent Timesink
Conducent is affiliated with a lot of Internet advertising networks. Their spy module receives ad content from the internet and stores it on the hard disk. During the runtime it presents the user with advertisements, and records what the user does with the ads (clicking them, for example). This information is sent back to Conducent. The spy module (TSadbot.exe) provides no uninstall feature, i.e. even when the carrier software is removed from the system, the spyware runs on.
Cydoor
Once integrated into a program, the Cydoor spy module dynamically loads ad banners from the internet. It presents ad content in offline or online mode. A unique numerical identifier is placed on the computer during the installation, so the PC system can be identified anytime.
Comet Cursor
Comet Cursor is a browser extension (IE and Netscape) and requires enabled ActiveX. It logs cookies, referrer IDs, IP addresses and other system information. When visiting a web site, the click activities of the user are logged and analyzed. Comet analyzes this data to improve the content and performance of that particular web site.
eZula & KaZaa Toptext
KaZaa Toptext is part of the file sharing client KaZaa. Toptext takes full control of the browser and changes the content of the web site (like the SmartTags which were planned for Windows XP). The content of the website is analyzed and certain keywords are highlighted and become a link to the company who paid eZula Inc for changing that keyword.
Flashpoint/Flashtrack
Flashpoint/Flashtrack is relatively unknown spyware. It logs the user's queries to a search engine, analyzes them and creates ad pop-up windows which seem to come from the visited web site, but actually are created by Flashtrack.
Flyswat
Flyswat is a plug-in for Internet Explorer and requires enabled ActiveX. It logs the user's clicks while surfing the internet. The gathered information is given to partners affiliated with Flyswat.
Gator
Gator is a program to log any data which is entered into forms (username, password, address, credit card number, etc.) This data is stored in an encrypted file and is transmitted to Gator over the internet. Gator also replaces dynamically ad banners from other web sites with their own banners.
GoHip
This browser extension reconfigures the Internet Explorer settings (Homepage, AutoSignature, search page, etc.) To every sent message GoHip attaches an advertisement. GoHip appears as Windows Startup in the Start menu.
Hotbar
Hotbar collects information about visited web sites and viewed pages. IP address, domain name, URL, browser information, operating system, cookies are stored with the respective time stamp. Search engine queries are also redirected to Hotbar and stored there. Also stored are the clicked buttons and links, the amount of time spent at a web site and entered form data (username, address, password, credit card numbers, etc.) Hotbar is affiliated with many advertisement networks.
Lop (C2Media)
Lop installs a toolbar and uses cookies to trace the user. C2Media works in cooperation with DoubleClick and the Network Advertising Initiative (NAI) to spy and serve ads.
Mattel BrOdcast
BrOdcast collects and sends information to Mattel and in return sends the user product offers and ads. It's mostly used in Mattel's own software for children.
Morpheus
Another Peer-to-Peer agent. Different spyware agents are included.
Realplayer
The RealMedia Realplayer contains many appropriate spy modules. The removal of the spy functions will result in a non-functioning Realplayer.
Songspy (IMG Entertainment)
Songspy is a music sharing client. The spy module opens TCP port 5190 and gives it full control over the computer system.
Web3000
Web3000 changes the content of visited web sites. The browser window and pop-up windows are used for ads. The users surfing habits are logged. Web3000 replaces winsock32.dll and other Windows system files.
WebHancer
WebHancer gathers information on visited web sites (address, size, loading time, completion state and network delay time). It does traffic, web and performance analysis. WebHancer hides itself in the system. Incorrect removal will destroy the internet connection.
Other...
A lot of other spyware is available (e.g. AdBreak, AdTools Codehammer Message Mates, AdvertBar, Alexa, Back Web, BDE, Brilliant Digital, Blackstone Data Transponder, B3d, Bulla, Bookmark Express, Bonzi Buddi, Cash Bar, Click Till u Win, Click The Button, CnsMin, Common Name, Delfin, DoubleClick , Download Ware (DAP), EverAd , Etraffic - TopMoxie, Expedio Ware, EWA, Favorite Man, Gratisware, homepageware, IEPlugin, KFH, Liveshows Dialer, MarketScore, Message Mates, MediaLoads, nCase, NewDotNet (New.net), NetPal, Netzany, NetSonic, Netsetter , Network Essentials, NowBox, OnFlow , OpenMe, Porn Dialer, SaveNow, Search-Explorer, Surf+, TPS108, TopMoxie, Transponder, Twisted Humor, UCmore, Vegas Palms Casino, wbeCheck, WNAD, WurldMediaBHO, ZapSpot,...) and some programs which have their own proprietary spy modules.
__________________
~It is possible to fail in many ways...while to succeed is possible only in one way.~
Reply With Quote
The Following 3 Users Say Thank You to Waseemtabish For This Useful Post:
ambren_kanval (Saturday, October 31, 2009), khanzada_111 (Tuesday, November 10, 2009), salik_malik (Monday, October 26, 2009)
  #13  
Old Sunday, October 25, 2009
Waseemtabish's Avatar
Senior Member
 
Join Date: Oct 2006
Location: Bhakkar
Posts: 646
Thanks: 735
Thanked 702 Times in 333 Posts
Waseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the rough
Default remove a Google redirect virus

How to remove a Google redirect virus


Thefollowing guide is to cure your PC from that annoying piece of malwarewhich hijacks and redirects your Google searches and other searchengines, otherwise known as a Google redirect. Other than the searchengine redirect, some other signs that you may have this infection are:

•Not being able to download, install, or run security programs like HijackThis or Malware Bytes Anti-Malware
•Being blocked from navigating to security/malware removal sites, for example : Microsoft or GeeksToGo


This infection is also commonly known by security applications as Rootkit.Win32.TDSS, Trojan.DNS_Changer, or Troj/Rustock. It also has other aliases due to the fact that it evolves and changes over time.

You may find your anti-virus or anti-spyware programs identifies any of the following:



••C:\windows\system32\drivers\SKYNETsunjnbdw.sys
•C:\windows\system32\drivers\MSIVXvvynaffpomuyaycw koiyldjssbgligea.sys
•C:\windows\system32\drivers\UACgrevmydoyiftawolx. sys
•C:\windows\system32\drivers\ovfsthhtkoslmsqrvwsnt nkdioglrpufewidyw.sys
•c:\windows\system32\drivers\TDSSmaxt.sys
•c:\windows\system32\drivers\kungsfndqriiha.sys
•c:\windows\system32\drivers\seneka.sys


Another sign of it would be this line showing up in your HijackThis orOTL log, however this is not always present so you cant rely on itcompletely to tell whether you have the infection or not:

O17 - HKLM\System\CCS\Services\Tcpip\..\{3B8FF4B4-174F-4B7F-BE68-78043E53C8DA}: NameServer = 85.255.112.70;85.255.112.201


Now lets get onto the good stuff, removing this infection from your PC!


Before we begin, you should save these instructions in Notepad to yourdesktop, or print them, for easy reference. For the fix to workproperly we will need you to close your browser, and any securityprograms like an anti-virus or anti-spyware. If you aren't completelysure how to do that, just continue on with the guide.



Step 1 :


We need to clean out your temp files and folders to speed up the whole process.


Download TFC (Temp File Cleaner) to your desktop

•Open the file and close any other windows.
•It will close all programs itself when run, make sure to let it run uninterrupted.
•Click the Start button to begin the process. The program should not take long to finish its job
•Once its finished it should reboot your machine, if not, do this yourself to ensure a complete clean




Step 2 :


We need to make sure you don't have another infection which can causeGoogle redirects. This is unlikely to fix your problem but its best tobe safe than sorry as they say.


Please download GooredFix, making sure that you save this file to your Desktop.

•Double-click GooredFix.exe on your Desktop (Note: If you are using Vista right-click GooredFix and select Run As Administrator...)
•Select Option#1 - Find Goored (no fix), by typing 1 and pressing Enter
•A logfile should popup shortly, that will look something like this:

Check Download LinksCode: GooredFix v1.92 by jpshortstuff
Log created at 08:35 on 24/12/2008 running Option #1 (Administrator)
Firefox version 3.0.3 (en-GB)
=====Suspect Goored Entries=====

[HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Firefox\extens ions]
"{ABB56C42-1843-46EF-A93E-482DE0F5B5AA}"="C:\Documents and Settings\Administrator\Local Settings\Application Data\{ABB56C42-1843-46EF-A93E-482DE0F5B5AA}"

C:\Program Files\Mozilla Firefox\extensions\{D96F1D71-4F95-443A-8AF3-541BFDBA096D}

=====Dumping Registry Values=====

[HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Firefox 3.0.3\extensions]
"Plugins"="C:\Program Files\Mozilla Firefox\plugins"

[HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Firefox 3.0.3\extensions]
"Components"="C:\Program Files\Mozilla Firefox\components"

[HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Firefox\extens ions]
"{ABB56C42-1843-46EF-A93E-482DE0F5B5AA}"="C:\Documents and Settings\Administrator\Local Settings\Application Data\{ABB56C42-1843-46EF-A93E-482DE0F5B5AA}"

[HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Firefox\extens ions]
"jqs@sun.com"="C:\Program Files\Java\jre6\lib\deploy\jqs\ff"

[HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Firefox\extens ions]
"{20a82645-c095-46ed-80e3-08825760534b}"="C:\WINDOWS\Microsoft.NET\Framework \v3.5\Windows Presentation Foundation\DotNetAssistantExtension\"

•Take a look at the section highlighted in red.As shown in this log, there should be an entry there with a randomstring of numbers and letters enclosed in {} (in this case {ABB56C42-1843-46EF-A93E-482DE0F5B5AA}), that shows a folder in C:\Documents and Settings\<your name>\Local Settings\Application Data\{the same random numbers and letters}. A newer version of the infection just consists of a folder in Firefox's extenions directory, in this case: C:\Program Files\Mozilla Firefox\extensions\{D96F1D71-4F95-443A-8AF3-541BFDBA096D}.
•If these entries are present, and if there are no other entries that you think may be legitimate in the "Suspect Goored Entries" section, then do the following:
◦Close all Windows and Browsers, especially any Firefox Windows.
◦Double-click GooredFix.exe on your Desktop (Note: If you are using Vista right-click GooredFix and select Run As Administrator...)
◦Select Option#2 - Fix Goored by typing 2 and pressing Enter.
◦At the prompt, type y and press Enter.
◦GooredFix will now remove the infection (if it requires a reboot, please restart your computer).
◦Note : If no entries are under "Suspect GooredEntries" then that means you don't have this infection. Please do notrun Option #2, instead proceed straight to Step 3 below



Step 3 :


The following should remove the redirects and have your PC back to normal


Please download ComboFix from Here or Here to your Desktop.

**Note: In the event you already have Combofix,this is a new version that I need you to download. It is important thatit is saved and renamed following this process directly to yourdesktop**

1.If you are using Firefox, make sure that your download settings are as follows:
◦Tools->Options->Main tab
◦Set to "Always ask me where to Save the files".
2.During the download, rename Combofix to Combo-Fix as follows:




3.It is important you rename Combofix during the download, but not after.
4.Please do not rename Combofix to other names, but only to the one indicated.
5.Close any open browsers.
6.Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

-----------------------------------------------------------

◦Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before"unpredictable results". performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause
◦Click on this linkto see a list of programs that should be disabled. The list is not allinclusive. If yours is not listed and you don't know how to disable it,please ask.

-----------------------------------------------------------
◦Close any open browsers.
◦WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
◦Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
◦If there is no internet connection after running Combofix, then restart your computer to restore back your connection.

-----------------------------------------------------------
7.Double click on combo-Fix.exe & follow the prompts.
8.Note: Do not mouseclick combo-fix's window while it's running. That may cause it to stall
9.This should fix your search engine redirects. Please restart your PC, check how its running and if there are any more redirects.



Step 4 :


This step is easy and quick, it is to remove any left over pieces of malware or anything else that may be hiding


Please download Malwarebytes' Anti-Malware from Here

Double Click mbam-setup.exe to install the application.

•Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
•If an update is found, it will download and install the latest version.
•Once the program has loaded, select "Perform Quick Scan", then click Scan.
•The scan may take some time to finish,so please be patient.
•When the scan is complete, click OK, then Show Results to view the results.
•Make sure that everything is checked, and click Remove Selected.
•When disinfection is completed it is recommended you reboot your PC

Extra Note:
If MBAMencounters a file that is difficult to remove,you will be presentedwith 1 of 2 prompts,click OK to either and let MBAM proceed with thedisinfection process,if asked to restart the computer,please do soimmediatly.



Conclusion :


Let us remove those tools we used, its best not to keep them around.


•Download OTC to your desktop and run it
•Click Yes to beginning the Cleanup process and remove these components, including this application.
•You will be asked to reboot the machine to finish the Cleanup process. Choose Yes.


Your PC should hopefully be clean from those pesky redirects ! There isnothing left to do but enjoy having a normal PC again. If that isn'tthe case then you must have some other sort of infection or a newvariant. Don't worry though, its nothing we cant fix. Just pop over tothe [COLOR=Yellow]Help Desk


However, if this guide did fix your PC, I'm glad to be of assistance.Feel free to hang around as there is plenty to read and learn here.
Attached Thumbnails
PC_Tweaks-cf_download_ff.gif   PC_Tweaks-cf_download_rename.gif  
__________________
~It is possible to fail in many ways...while to succeed is possible only in one way.~
Reply With Quote
The Following 3 Users Say Thank You to Waseemtabish For This Useful Post:
ambren_kanval (Monday, October 26, 2009), khanzada_111 (Tuesday, November 10, 2009), salik_malik (Monday, October 26, 2009)
  #14  
Old Sunday, October 25, 2009
Waseemtabish's Avatar
Senior Member
 
Join Date: Oct 2006
Location: Bhakkar
Posts: 646
Thanks: 735
Thanked 702 Times in 333 Posts
Waseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the rough
Default ~*~XP secrets~*~

~*~XP secrets~*~

XP hides some system software you might want to remove, such as Windows Messenger, but you can tickle it and make it disgorge everything. Using Notepad or Edit, edit the text file /windows/inf/ sysoc.inf, search for the word 'hide' and remove it. You can then go to the Add or Remove Programs in the Control Panel, select Add/Remove Windows Components and there will be your prey, exposed and vulnerable.

Creating ****down Icon or One Click ****down:

Navigate to your desktop. On the desktop, right-click and go to New, then to Shortcut (in other words, create a new shortcut). You should now see a pop-up window instructing you to enter a command line path.
Use this path in "Type Location of the Item"
****DOWN -S -t 01

If the C: drive is not your local hard drive, then replace "C" with the correct letter of the hard drive. Click the "Next" button. Name the shortcut and click the "Finish" button. Now whenever you want to **** down, just click on this shortcut and you're done.

Increasing Band-Width By 20%:

Microsoft reserves 20% of your available bandwidth for their own purposes like Windows Updates and interrogating your PC etc

To get it back:

Click Start then Run and type " gpedit.msc" without quotes.This opens the group policy editor. Then go to:
Local Computer Policy then Computer Configuration then Administrative Templates then Network then QOS Packet Scheduler and then to Limit Reservable Bandwidth.

Double click on Limit Reservable bandwidth. It will say it is not configured, but the truth is under the 'Explain' tab I.e."By default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection, but you can use this setting to override the default."
So the trick is to ENABLE reservable bandwidth, then set it to ZERO. This will allow the system to reserve nothing, rather than the default 20%.It works on Win 2000 as well.

Renaming The Recycle Bin icon:

To change the name of the Recycle Bin desktop icon, click Start then goto Run, write Regedit and press Enter. It opens Registry Editor. Now in Registry Editor go to:

HKEY_CLASSES_ ROOT/CLSID/ {645FF040- 5081-101B- 9F08-00AA002F954 E}
And change the name "Recycle Bin" to whatever you want (don't type any quotes).

Managing Tasks:

You can at last get rid of tasks on the computer from the command line by using 'taskkill /pid' and the task number, or just 'tskill' and the process number. Find that out by typing 'tasklist', which will also tell you a lot about what's going on in your system.


Removing Shared Documents folder From My Computer window:

Open registry editor by going to Start then Run and entering regedit. Once in registry, navigate to key

HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Explorer \ My Computer \ NameSpace \ DelegateFolders

You must see a sub-key named {59031a47-3f72- 44a7-89c5- 5595fe6b30ee} . If you delete this key, you have effectively removed the my shared documents folder.
Making Google the Default Search Engine in Internet Explorer:

Open registry editor by going to Start then Run and entering regedit and navigate to following three keys separately and change it as shown below:


[HKEY_CURRENT_ USER\Software\ Microsoft\ Internet Explorer\Main]
"Search Page"=" http://WWW.google.Com "
"Search Bar"=" http://WWW.google. Com/i.e. "

[HKEY_CURRENT_ USER\Software\ Microsoft\ Internet Explorer\SearchURL]
""=" http://WWW.google. Com/keyword/ %S "

[HKEY_LOCAL_ MACHINE\SOFTWARE \Microsoft\ Internet Explorer\Search]
"SearchAssistant" =" http://WWW.google. Com/i.e. " .

Improving the Slow Boot up time:

There are a variety of reasons why your windows XP system would boot slowly. Most of the times it this has to do with the startup applications. If you would like to speed up the bootup sequence, consider removing some of the startup applications that you do not need. Easiest way to remove startup apps is through System Configuration Utility. Go to Start then Run and enter MSCONFIG and go to the Startup tab. Deselect/UnCheck application( S) that you do not want to startup at boot time.

Customize Logon prompt with your Own Words:

Open Registry by going to Start then Run, entering regedit and Navigate to

[HKEY_LOCAL_ MACHINE\SOFTWARE \Microsoft\ Windows NT\CurrentVersion\ Winlogon] . In right pane, look for key by the name "LogonPrompt" . Set its value to whatever text you want to see displayed at login screen.

IP address of your connection:

Go to Start then Run. Enter 'cmd' and then enter 'ipconfig' .Add the '/all' switch for more info .

Making Folders Private:

Open My Computer Double-click the drive where Windows is installed (usually drive (C, unless you have more than one drive on your computer). If the contents of the drive are hidden, under System Tasks, click Show the contents of this drive.

Double-click the Documents and Settings folder. Double-click your user folder. Right-click any folder in your user profile, and then click Properties. On the Sharing tab, select the Make this folder private so that only I have access to it check box.

To change Drive Letters:

Go to Start > Control Panel > Administrative Tools > Computer Management, Disk Management, then right-click the partition whose name you want to change (click in the white area just below the word "Volume") and select "change drive letter and paths."

From here you can add, remove or change drive letters and paths to the partition.

Removing the Shortcut arrow from Desktop Icons:

Goto Start then Run and Enter regedit. Navigate to HKEY_CLASSES_ ROOTlnkfile. Delete the IsShortcut registry value. You may need to restart Windows XP.

Get Drivers for your Devices:

Visit Windows Update (XP Only)
Look at the left hand pane and under Other Options click Personalize Windows Update.
Now in the right hand pane check the box - Display the link to the Windows Update Catalog under See Also
Below Choose which categories and updates to display on Windows Update - make sure you check all the boxes you want shown.
Click Save Settings
Now look in the left hand pane under See Also click Windows Update Catalog and choose what you're looking for. Choose either MS updates or drivers for hardware devices.
Start the Wizard and off you go.

Customize Internet Explorer's Title Bar:

Open Registry by going to Start then Run and Enter regedit. Navigate to HKEY_CURRENT_ USER\Software\ Microsoft\ Internet. Explorer\Main. In right hand panel look for string "Window Title" and change its value to whatever custom text you want to see.

Disabling the use of Win Key:

If your are a gaming freak then you must be sick of the Win key in your keyboard. To disable use of Win key, open registry by going to Start then Run and entering regedit.

Navigate to [HKEY_LOCAL_ MACHINE\SYSTEM\ CurrentControlSe t\Control\ Keyboard Layout] . In this look for value of "Scancode Map". Its binary data so be extra careful:
Set its value to "00 00 00 00 00 00 00 00 03 00 00 00 00 00 5B E0 00 00 5C E0 00 00 00 00" to disable the win key.

Restarting Windows without Restarting the Computer:

This one is again is. When you click on the ****DOWN button, make sure to simultaneous press SHIFT Button. If you hold the Shift key down while clicking on ****DOWN button, you computer would restart without restarting the Computer. This is equivalent to term "HOT REBOOT".

Stopping XP from displaying unread messages count on Welcome Screen:

To stop XP from displaying count of unread messages, Open registry and navigate to [HKEY_CURRENT_ USER\Software\ Microsoft\ Windows\CurrentV ersion\UnreadMai l] and look for the data key "MessageExpiryDays" . If you do not see this key, create one DWORD key by the name "MessageExpiryDays" . Setting its value to 0 would stop Windows XP from displaying the count of unread messages.

Modify Color Selection of Default Theme:

Open registry by going to Start then Run. Entering regedit, navigate to [HKEY_USERS\ .DEFAULT\ Software\ Microsoft\ Windows\CurrentV ersion\ThemeMana ger] and locate the key "ColorName".
Right Click on it and select modify its value from "NormalColor" to "Metallic"
Click Ok, and exit regedit and restart your computer.
__________________
~It is possible to fail in many ways...while to succeed is possible only in one way.~
Reply With Quote
The Following 3 Users Say Thank You to Waseemtabish For This Useful Post:
ambren_kanval (Monday, October 26, 2009), khanzada_111 (Tuesday, November 10, 2009), salik_malik (Monday, October 26, 2009)
  #15  
Old Sunday, October 25, 2009
Waseemtabish's Avatar
Senior Member
 
Join Date: Oct 2006
Location: Bhakkar
Posts: 646
Thanks: 735
Thanked 702 Times in 333 Posts
Waseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the rough
Default 100 Run Commands

100 Run Commands

Accessibility Options : access.cpl
Add Hardware: hdwwiz.cpl
Add / Remove Programs: appwiz.cpl
Administrative Tools : control admintools
Automatic Updates: wuaucpl.cpl
Wizard file transfer Bluethooth: fsquirt
Calculator: calc
Certificate Manager: certmgr.msc
Character: charmap
Checking disk : chkdsk
Manager of the album (clipboard) : clipbrd
Command Prompt : cmd
Service components (DCOM) : dcomcnfg
Computer Management : compmgmt.msc
DDE active sharing : ddeshare
Device Manager : devmgmt.msc
DirectX Control Panel (if installed) : directx.cpl
DirectX Diagnostic Utility : dxdiag
Disk Cleanup : cleanmgr
Disk Defragmenter : dfrg.msc
Disk Management : diskmgmt.msc
Partition manager : diskpart
Display Properties : control desktop
Properties of the display (2) : desk.cpl
Properties display (tab "appearance") : control color
Dr. Watson: drwtsn32
Manager vérirficateur drivers : check
Event Viewer : Eventvwr.msc
Verification of signatures of files: sigverif
Findfast (if present) : findfast.cpl
Folder Options : control folders
Fonts (fonts) : control fonts
Fonts folder windows : fonts
Free Cell ...: freecell
Game Controllers : Joy.cpl
Group Policy (XP Pro) : gpedit.msc
Hearts (card game) : mshearts
IExpress (file generator. Cab) : IExpress
Indexing Service (if not disabled) : ciadv.msc
Internet Properties : inetcpl.cpl
IPConfig (display configuration): ipconfig / all
IPConfig (displays the contents of the DNS cache): ipconfig / displaydns
IPConfig (erases the contents of the DNS cache): ipconfig / flushdns
IPConfig (IP configuration cancels maps): ipconfig / release
IPConfig (renew IP configuration maps) : ipconfig / renew
Java Control Panel (if present) : jpicpl32.cpl
Java Control Panel (if present) : javaws
Keyboard Properties: control keyboard
Local Security Settings : secpol.msc
Local Users and Groups: lusrmgr.msc
Logout: logoff
Microsoft Chat : winchat
Minesweeper (game): winmine
Properties of the mouse: control mouse
Properties of the mouse (2): main.cpl
Network Connections : control NetConnect
Network Connections (2): ncpa.cpl
Network configuration wizard: netsetup.cpl
Notepad : notepad
NView Desktop Manager (if installed): nvtuicpl.cpl
Manager links: packager
Data Source Administrator ODBC: odbccp32.cpl
Screen Keyboard: OSK
AC3 Filter (if installed) : ac3filter.cpl
Password manager (if present): Password.cpl
Monitor performance : perfmon.msc
Monitor performance (2): perfmon
Dialing Properties (phone): telephon.cpl
Power Options : powercfg.cpl
Printers and Faxes : control printers
Private Character Editor : eudcedit
Quicktime (if installed) : QuickTime.cpl
Regional and Language Options: intl.cpl
Editor of the registry : regedit
Remote desktop connection : mstsc
Removable Storage: ntmsmgr.msc
requests the operator to removable storage: ntmsoprq.msc
RSoP (traduction. ..) (XP Pro): rsop.msc
Scanners and Cameras : sticpl.cpl
Scheduled Tasks : control schedtasks
Security Center : wscui.cpl
Console management services: services.msc
shared folders : fsmgmt.msc
Turn off windows : shutdown
Sounds and Audio Devices : mmsys.cpl
Spider (card game): spider
Client Network Utility SQL server : cliconfg
System Configuration Editor : sysedit
System Configuration Utility : msconfig
System File Checker (SFC =) (Scan Now) : sfc / scannow
SFC (Scan next startup): sfc / scanonce
SFC (Scan each démarraget) : sfc / scanboot
SFC (back to default settings): sfc / revert
SFC (purge cache files): sfc / purgecache
SFC (define size CAHC x) : sfc / cachesize = x
System Properties : sysdm.cpl
Task Manager : taskmgr
Telnet client : telnet
User Accounts : nusrmgr.cpl
Utility Manager (Magnifier, etc) : utilman
Windows firewall (XP SP2) : firewall.cpl
Microsoft Magnifier: magnify
Windows Management Infrastructure: wmimgmt.msc
Protection of the accounts database: syskey
Windows update: wupdmgr
Introducing Windows XP (if not erased) : tourstart
Wordpad : write
Date and Time Properties : timedate.cpl
__________________
~It is possible to fail in many ways...while to succeed is possible only in one way.~
Reply With Quote
The Following 3 Users Say Thank You to Waseemtabish For This Useful Post:
ambren_kanval (Saturday, October 31, 2009), khanzada_111 (Tuesday, November 10, 2009), salik_malik (Monday, October 26, 2009)
  #16  
Old Monday, October 26, 2009
Waseemtabish's Avatar
Senior Member
 
Join Date: Oct 2006
Location: Bhakkar
Posts: 646
Thanks: 735
Thanked 702 Times in 333 Posts
Waseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the rough
Default make an invisible folder in xp

make an invisible folder in xp

First of all fight click on desktop in empty area.
the make a new folder and don't give it any name ok.
now right on it again and select remane .
then hold "Alt" key and while holding "Alt key" press "0160" from your num key pad which is on right side of your keyboard.
now you have named it.
there would showing nothing in its name.
now right click on it again and slect properties and then click on the customize tab and then click on change icon.
there would be a lots of icons in the list. now you scroll toward right till you find an empty place between the icons slect it and hit ok.
now you will see there is no icon on the desktop.
__________________
~It is possible to fail in many ways...while to succeed is possible only in one way.~
Reply With Quote
The Following 2 Users Say Thank You to Waseemtabish For This Useful Post:
ambren_kanval (Saturday, October 31, 2009), salik_malik (Monday, October 26, 2009)
  #17  
Old Monday, October 26, 2009
Waseemtabish's Avatar
Senior Member
 
Join Date: Oct 2006
Location: Bhakkar
Posts: 646
Thanks: 735
Thanked 702 Times in 333 Posts
Waseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the rough
Default Make USB Disable Enable In Window

Make USB Disable Enable In Window

pehle run main ja kar regedit likhna hai

Hkey_Local_Machine\System\CurrentControlset\Servic es\USBStor

IS KE BAAD START VALUE KO DOUBLE CLICK KAR KE OPEN KAREIN GE YAHAN 3 LIKHA HO GA US KO 4 KAR DEIN DISABLE HO JAYE GI DOBARA 3 KAR DEIN ENABLE HO JAYE GI...
__________________
~It is possible to fail in many ways...while to succeed is possible only in one way.~
Reply With Quote
The Following 3 Users Say Thank You to Waseemtabish For This Useful Post:
ambren_kanval (Monday, October 26, 2009), khanzada_111 (Tuesday, November 10, 2009), salik_malik (Monday, October 26, 2009)
  #18  
Old Monday, October 26, 2009
Waseemtabish's Avatar
Senior Member
 
Join Date: Oct 2006
Location: Bhakkar
Posts: 646
Thanks: 735
Thanked 702 Times in 333 Posts
Waseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the rough
Default Amaizng & Dangerus Tips

usb disable krna (Disable)
may ap ko 2 files deta hoon inhey app kise ke b memmory card ya usb main copy kr dein ya khud double click kr dein jis b pc main ye file run ho gi us main kabi usb ports kaam krna chor dein ge jab tak us pc pr window nahi ho gi tb tk us main koi b usb suported dvice kaam nhi kre gi
usb enable krna (Enable)

http://rapidshare.com/files/274798435/usb_U-D.zip
__________________
~It is possible to fail in many ways...while to succeed is possible only in one way.~
Reply With Quote
The Following 2 Users Say Thank You to Waseemtabish For This Useful Post:
ambren_kanval (Saturday, October 31, 2009), khanzada_111 (Tuesday, November 10, 2009)
  #19  
Old Monday, October 26, 2009
Waseemtabish's Avatar
Senior Member
 
Join Date: Oct 2006
Location: Bhakkar
Posts: 646
Thanks: 735
Thanked 702 Times in 333 Posts
Waseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the rough
Default Secure Your Vista PC in 10 Easy Steps

By making a few judicious changes using the security tools within Windows Vista--and in some cases by adding a few pieces of free software--you can lock down your operating system.

1. Use Windows Security Center as a Starting Point

For a quick overview of your security settings, the Windows Security Center is where you'll find the status of your system firewall, auto update, malware protection, and other security settings. Click Start, Control Panel, Security Center, or you can simply click the shield icon in the task tray. If you see any red or yellow, you are not fully protected. For example, if you have not yet installed an antivirus product on your machine, or if your current antivirus product is out-of-date, the Malware section of the Security Center should be yellow. Windows does not offer a built-in antivirus utility, so you'll want to install your own. For free antivirus, I recommend AVG Anti-Virus 8.

2. Use Windows Defender as a Diagnostic Tool

The Malware section also covers antispyware protection, and for that Windows Vista includes Windows Defender. The antispyware protection in your antivirus program usually trumps the protection Microsoft provides, but there are several good reasons to keep Windows Defender enabled. One is that every antispyware program uses a different definition of what is and what is not spyware, so redundant protection can actually offer some benefit.

Another reason to keep Windows Defender enabled: diagnostics. Click Tools, and choose Software Explorer from the resulting pane. You can display lists of applications from several categories such as Currently Running Programs, Network Connected Programs, and Winsock Service Providers, but Startup Programs is perhaps the most useful. Click on any name in the left window, and full details will appear in the right pane. By highlighting, you can remove, disable, or enable any of the programs listed.

3. Disable the Start Up menu

Windows Vista keeps track of all the documents and programs you launch in the Start Up menu. This can be convenient for some users, but it can also compromise your privacy if you share a computer within an office or household. Fortunately Windows Vista provides an easy way to tweak this setting. To protect your privacy, follow these steps:

Right click on the taskbar and select Properties.
Click on the Start Menu tab.
Uncheck Store and display a list of recently opened files.
Uncheck Store and display a list of recently opened programs.
Click OK.

4. Get Two-Way Firewall Protection

No desktop should be without a personal firewall, but even if the Security Center says you're protected, you may not be. The Windows Firewall within Vista blocks all incoming traffic that might be malicious or suspicious--and that's good. But outbound protection is not enabled by default. That's a dangerous situation if some new malicious software finds its way onto your PC. Microsoft did include the tools for Windows Vista to have a true two-way firewall, but finding the setting is a little complicated. (Hint: Don't go looking the Windows Firewall settings dialog box.)

To get two-way protection in Windows Vista, click on the Start button; in the search space, type wf.msc and press Enter. Click on the Windows Firewall with Advanced Security icon. This management interface displays the inbound and outbound rules. Click on Windows Firewalls Properties. You should now see a dialog box with several tabs. For each profile--Domain, Private, and Public--change the setting to Block, and then click OK.


5. Lock Out Unwanted Guests

If you share your computer with others (and even if you don't), Windows Vista includes a neat way to keep unwanted guests from guessing your system administrator password. When you set up users and declare one user as administrator (with full privileges), Windows Vista allows outsiders unlimited guesses at the password you chose. Here's how to limit the guesses.

Click Start, type Local Security Policy.
Click Account Lockout Policy.
Choose Account Lockout Threshold.
At the prompt, enter the number of invalid log-ins you'll accept (say, 3).
Click OK and close.

6. Now Audit Your Attackers

With the Account Lockout policy in place, you can now enable auditing to see any account attacks. To turn on auditing for failed log-on events, do the following:

Click the Start button, type secpol.msc, and click the secpol icon.
Click on Local Policies and then Audit Policy.
Right-click on Audit account logon events policy and select Properties.
Check the Failure box and click OK.
Right-click on Audit logon events policy and select Properties.
Check the Failure box and click OK.
Close the Local Security Policy window.
You can then use the Event Viewer (by running eventvwr.msc) to view the logs under Windows Logs and Security.

7. Secure Your Internet Explorer Settings

The Windows Security Center will also report whether your Internet Explorer 7 (or IE security settings are at their recommended levels. If the screen shows this section as red, you can adjust the settings within the browser itself.

Within Internet Explorer, click Tools in the menu bar.
From the drop-down menu, click Internet Options.
Choose the Security tab.
Within the Security tab, click Custom Level.
Here you'll see a window with all the security options for the browser. If any are below the recommended level (if, say, some kind of malware reconfigured your browser settings), these options will be highlighted in red. To change an individual setting, click the appropriate radio button. To reset them all, use the button near the bottom of the tab. You can also change the overall security setting for Internet Explorer from the default Medium-High setting to the recommended High or Medium, if you wish. Click OK to save and close.


8. Use OpenDNS

Domain Name System (DNS) servers act as a phone book. When you type "pcworld . com" in the address bar, for instance, Internet Explorer sends that common-name request to your Internet service provider's DNS servers to be converted into a series of numbers, or an IP address. Lately, DNS servers have come under attack, with criminals seeking to redirect common DNS preferences to servers that their interests control. One way to stop such abuse is to use OpenDNS.

Go to Start, Control Panel, Network and Internet, and then click Network and Sharing Center. Under the tasks listed on the left, click Manage Network Connections. In the Manage Network Connections window, do the following.

Right-click on the icon representing your network card.
Click Properties.
Click Internet Protocol Version 4.
Click the Properties button.
Select the Use the following DNS server addresses radio button.
Click OK.

9. Live With User Account Control

One area where some people might want to see the Windows Security Center turn red is User Account Control (UAC), perhaps the most controversial security feature within Windows Vista. Designed to keep rogue remote software from automatically installing (among other things), UAC has a tendency to thwart legitimate software installations by interrupting the process several times with useless messages. In Windows 7 you'll be able to set UAC to the level you want. Until then, you do have some options.

One is to disable UAC. I would caution against that, since UAC is meant to warn you of potential danger. Instead, install TweakUAC, a free utility that offers the ability to turn UAC on or off as well as an intermediate "quiet" mode that keeps UAC on but suppresses administration elevation prompts. With TweakUAC in quiet mode, UAC will appear to be off to those running as administrator accounts, while people with standard user accounts will still be prompted.

10. Check Your Work

Now that you've tweaked Windows Vista, you can keep tabs on your system's security with the System Health Report. This diagnostic tool takes input from the Performance and Reliability Monitor and turns it into an information-packed report that can spotlight potential security problems.

Open Control Panel.
Click System.
In the Tasks list, click Performance (near the bottom).
In the resulting Tasks list, click Advanced tools (near the top).
Click the last item on the resulting list: Generate a system health report.
The report will list any missing drivers that might be causing error codes, tell you whether your antivirus protection is installed, and declare whether UAC is turned on. You may want to run this report once a month just to make sure everything's still good.
__________________
~It is possible to fail in many ways...while to succeed is possible only in one way.~
Reply With Quote
The Following 3 Users Say Thank You to Waseemtabish For This Useful Post:
ambren_kanval (Saturday, October 31, 2009), khanzada_111 (Tuesday, November 10, 2009), salik_malik (Monday, October 26, 2009)
  #20  
Old Monday, October 26, 2009
Waseemtabish's Avatar
Senior Member
 
Join Date: Oct 2006
Location: Bhakkar
Posts: 646
Thanks: 735
Thanked 702 Times in 333 Posts
Waseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the rough
Default make your Desktop Icons Transparent

make your Desktop Icons Transparent



Go to ontrol Panel > System, > Advanced > Performance area > Settings button Visual Effects tab "Use drop shadows for icon labels on the Desktop
__________________
~It is possible to fail in many ways...while to succeed is possible only in one way.~
Reply With Quote
The Following 2 Users Say Thank You to Waseemtabish For This Useful Post:
ambren_kanval (Saturday, October 31, 2009), khanzada_111 (Tuesday, November 10, 2009)
Reply

Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On



CSS Forum on Facebook Follow CSS Forum on Twitter

Disclaimer: All messages made available as part of this discussion group (including any bulletin boards and chat rooms) and any opinions, advice, statements or other information contained in any messages posted or transmitted by any third party are the responsibility of the author of that message and not of CSSForum.com.pk (unless CSSForum.com.pk is specifically identified as the author of the message). The fact that a particular message is posted on or transmitted using this web site does not mean that CSSForum has endorsed that message in any way or verified the accuracy, completeness or usefulness of any message. We encourage visitors to the forum to report any objectionable message in site feedback. This forum is not monitored 24/7.

Sponsors: ArgusVision   vBulletin, Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.