|
Computers and Technology Discuss computer issues, topics, and technology. Ask your questions about computer related problems, software, gadgets, computer science & emerging technologies. |
Share Thread: Facebook Twitter Google+ |
|
LinkBack | Thread Tools | Search this Thread |
#11
|
||||
|
||||
Programs containing spyware:
Programs containing spyware:
This section gives an overview on programs which are known to carry spyware. If known, the type of spyware is listed after the program name. Be aware that this information can change very quickly. If you find your favorite program on this list, be suspicious and do further checks. If you use a program which is not listed here, don't assume that it's free of spyware. Quote: Quote: !Glance 'WE' Group ProxyChecker 3.1.8 1 Click WebSlideShow 100 Proof Cocktail Planner 100% Word Search Free 100% Word Search Free 123Search 1.0 123Search 2 123Search 2 15 Puzzle 2.1 1st Contact 1stRiadaMelt 20/20 2Minute Warning 3D Anarchy 3D Frog Man Demo 3D Maze Man Demo 3D Morris 3D-FTP 3.0 3rd block 2.0 3S Accounting 3SI Accounting & Inventory Management (Demo) 2.0 5star Free Lines 1.2 7Way 0.15 A Aadcom Screensaver Software Aaron's WebVacuum 0.8f Abe's FTP Client Abe's Image Viewer Abe's MP3 Finder 4.0 Abe's MP3 Finder Abe's Picture Finder 1.4 Abe's SMB Client Absolute Telnet 1.63 Absolute Yukon Solitaire Access Diver 2.02 Access Diver III Access Diver Ace of Humor 1.0 Ace Talking Jokes & Quotes AceNotes Free 2000c Aces and Kings Solitaire Acorn Email 2.5 AcqURL 3.1 AcqURL 3.1 ActionOutline Light 1.6 Active 'Net 1.0 Add Remove Plus! 1.1 Add URL 1.0 Add/Remove Plus Add/Remove Plus! 1.1 AddAce Address Rover 98 Admiral VirusScanner Adsubtract SE 1.66 Advanced Call Center 2.9 Advanced Call Center Advanced Directory Printer Advanced Internet Tool 2.2.2 Advanced Maillist Verify 1.6 Advanced Maillist Verify AdvertBar Advertisement Wizard AdWizard Afreet SiteViewer Alchemist Demo Alchemy Anaconda Alexa Toolbar Alive and Kicking 3.1 AllNetic WWW and FTP Observer alphaScape QuickPaste Altnet Secureinstall America Online (AOL) An Online Secretary AnchorNet1 Angove CD Player Answwwer AnySpeed AOL Anti-timer Applet Game Mania 1.7 Appload Notify Ariadne Browser Ashampoo Uninstaller Ashampoo WinOptimizer 2000 AskBox 3.0 ASP1-A3 Attune Auction Central 1.02 Auction Explorer Auction Station Audio CD MP3 Studio 2000 Audiogalaxy Satellite Audiogalaxy Satellite .608 (Oct. 1 through Nov. 4, 2001) Aureate Group Mail 3.0 Aureate GroupMail 3.06.00 Aureate SpamKiller Free Edition Aution Central 1.02 AutoFTP PRO 2.3 AutoWeb 1.0 AxelCD 2.1 Axman B b3d Projector Babylon Babylon Tools 3.1 build 35 Babylon Tools before 3.1 build 35 Balloon Pop Demo Banner Crafter Bavardeur Branchez-vous BearShare all versions Beatle Beeline BeFaster v2.51 BigEListener Binary Boy 1.70 BinaryVortex 1.4 Bingo Demo Bingo Master Demo Bio-Rhythms BizAgent Blast Thru Demo Blinkin Blue Engine 1.0 Blue Orbb Bonzi Buddy Dec. 2001 releases and later BookSmith: Original 1.2 BubbleBound Buddy Pad BuddyPhone 2.0 BuddyShare 1.1 Buisness Letter Punch Bullseye Searcher 2.5 BullyFrog Business Letter Punch Button Magic Buzme C Calendar+ 2000 Calendar+ Caliban Mailer Calypso E-mail 3.0 CamCollect 1.4c CamGrab Canasis vB vB-Beta Capture Express 2000 1.0 Carlanthano 2.9.868 Cascoly Screensaver 1.0 Cash 2000 CashBar Caveman Cards CD Box Labeler Pro CD Extractor CD MP3 Studio CD Recording Studio CD-AID 02.00.05.23 CDDB-Reader CDMaster 32 3 CDMaster 32 4.5x CDMaster32 CDMaster32 3.0 Centarsia 1.01 Challenge Pool ChanStat 3.3 Charity Banner 1.0 Chat PicPluck Cheat Machine 3.1 Cheat Machine 3.2x Check and Get 1.2 build Check and Get Check and Get Check4New 1.7 Chinese Checkers Demo ChinMail 1.2 Clabra clipboard viewer 1.2 Classic Peg Solitaire 1.0 Clean & Tidy 1.5 Click ClickDough Clipmate Student Edition 5 Clock Saver 1.0 CoffeeCup Free HTML ColorBreak ColorBreak 2 ComTry Music Downloader 2.2 Concentration Done Right Connect Four Connect? Connection Watcher 4 Contact Plus ContextPro Copernic 2000 For EVER! Copernic Shopper Beta 2 Cowon Jet-Audio CPR 1.2 Cracker!2000 Crazy Drake Demo Crazy Puzzle Demo Credit Card Verifier Crescendo (LiveUpdate) Plugin 5.1 Crescendo internet music player Crosses & Zeroes CrushPop Crystal FTP Crystal FTP 2000 CS Telnet CSE HTML Validator Lite 2.0 CSE HTML Validator Lite Cursor Maker CuteFTP 3.0 beta CuteFTP 3.0/3.5 CuteFTP > 3.0 CuteFTP CuteFTP/Tripod CuteMX CutePage 2.0 CutePage Cyber-Gold Communications D DALiWorld Danzig Pref Engine Danzig Pref Engine 1.1 DateTime 1.3 DB to HTML Express Debt Relief Delphi Component Test Delphi Tester Desk Reference 0.1 DesktopDollars Develop Critical Thinking Develop Critical Thinking Skills Dialarm 1.0.1.19 Dialer 2000 1.5 Dialpad Digi-Cam Web Page Generator DigiBand NewsWatch DigiCams - The WebCam Viewer DigiCams - WebCam Viewer DigiGuide 3.x Digital Postman 2.0 Digital Postman Direct Connect 0.9.963 DirectUpdate Disconnector 2.6 Disconnector Disk Space Recovery Wizard DiskSpace Explorer 2000 2.1 DivX 5.0.x DL-Mail Pro 2000 DLExpert 0.92 DNScape Doorbell 1.18 Dope Wars Dope Wars dotCool Builder dotNow! Free Internet Access Download Accelerator Plus (DAP) 5.0 Download Minder 1.5 Download Minder 1.8 Download Wonder 1.55 DownloadAgent DownLoader 1.1 dozeCrypt III DuRu Dweeps Demo Dwyco Video Conferencing 2.3 E eAssist Easy Noter Easy Phone Book Easy Splitter EasyFill 2.02 EasyNoter EasySeeker 4.0 eBlaster EconoForecast eDonkey2000 EIS Web Monitor 1.2 EldoS Keeper eLOL (Electronic Laugh out Loud) Email Extractor Email Extractor'99 2.92 EmmaSoft ChatCat EmmaSoft dBrow EmmaSoft KeepLan EmmaSoft Soundz eMNGma Encoding Utility 2000 EnvoyMail EpAssist Essay-Punch EURO Converter 2 Every Link for You 2000 eVocabFlashCard 1.0 eWork Executive Accounting-Demo Express Communicator Extreme Animals Demo Extreme Bugs Demo Extreme Dinosaurs Demo Extreme Orchids Demo EZ-Forms FREE EZForms EzStock EZSurfer 2000 F Family Tree Maker 7 FenceOut FiestaBar File & MP3 Renamer '99 File & MP3 Renamer File Mag-Net 3.0 File Mentor File Seeker File Sniffer FileMentor FileSeeker FileSender FileSniffer FileSplit 2.2 FindShare Fire Client 1.5b1100 FlashGet (Formerly JetCar) 0.87 FlashGet 0.76 and + FlashGet FlashTrack FlexSpex Floorplan LT Folder Guard Jr. 4.1 Folder Guard Jr. Folder Guard Jr. Prior to 2 FormTool LT FourTimes 3.5 Fractal World Generator 1.1 Frazzle Free Budget Free Hearts for Windows Free ImageEditor 1.0 Free IRC 1.0 Free MP3 Free Notepad 1.0 Free Pics Free Picture Harvester Free Solitaire 3.0 Free Solitaire Free Solitaire Free Spades 0.7 Free Submit 1.0 Free Submitter Pro Free Tetris FreeBase FreeBudget FreeImageEditor 1.0 FreeIRC 1.0 FreeNetMon FreeNotePad 1.0 FreeRenju FreeRip MP3 1,0 FreeSaver MP3 1.0 FreeSite 1.0 FreeSubmit 1.0 FreeWebBrowser 1.0 FreeWebMail 1.0 FreeZip! 2.0 FTP Editor 1.7 FTP Works FTPEditor 1.7 Fundi e-Lert 1.4.1.29 G Galactic Invasion Demo Galactic Menace Galaxy of 3D Tetrimania Demo Gardener Demo Garret Demo Gator Geno Pro 1.7 Geno Pro GenoPro 1.7 GenoPro 1.71 GenoPro 1.9 GenoPro GenoPro GenoPro prior to 1.7 GetDown GetRight 4.x GetRight Mail Control 1.0 Gif Animator 1.00 GifLine Pro 2.0.2 Gimme IP Glowing Bugs Demo GluedOn Go!Zilla 3.5 Go!Zilla WebAttack GodeZip GoHip! Gold Diver Gomuko Pro 1.1 GovernMail 1.1 GPL Grafula Grammar Fitness Suite Graph Paper Printer Grokster 1.3.3 released Dec. 2001 through Jan. 1, 2002 Gunther's PasswordSentry Gypsee H HallowMeenies HandsFree Browser HangWeb hesci Private Label HexWars II Hey, Beer, Man HiClock HiDialer 2000 High Seas Solitaire Home Buyer´s Calculator Suite Homewatcher 1.3 Demo Host Monitor 4 Hot Dog Vendor Hot Lingo Hotbar Toolbar HOTText HTML Proxy-Spy HTML Translator 2.5 Html Tutor pro HTTP Proxy-Spy Huey Color Picker 1.8 Huey v1.8 Color Picker 1.8 HumanClick Hypersnap-DX 3.61 I iAgent 1.0 Iban Technologies IP Tools 2000 3.1 Ice Fusion ice9 Idyle GimmIP 4.0 iFind Graphics 1.5 iKena 1.1 released Dec. 2001 Image Carousel Image Site Grabber imageN imageN ImagerX 2000 3.0 iMesh Implosion Screensaver In School We Trust (Pupil Edition) In Vircible Anti Virus InboxSpecialist iNetPad 3.1 Infinite Patience 2.2 InfoBlast InnovaClub InstallZIP 1.4 IntegrityCheck Plus 2.01 Interchange FTP 0.2.1 Interfax 6.0.0 Intergalactic Exterminator Demo Internet 007 Internet Neighborhood Internet Tree 2.0 Internetrix 1.0 InterWebWord Companion InvenTV InVircible Anti Virus Invisible Secrets 2.0 IP-Turboscanner iPer Std,WH, Pro 3 iPhone IPLAY ISoaQ Beta 15c iSolitaire iToday IVOX ICQ Iwan's MP3 Finder 1.1 IYSoft Dial-Up Connection 1.2 J JetCar Jewels Of Anubis JFK Research jIRC JOC Email Checker 1.7 JOC Web Finder JOC Web Spider 2.6 JOC Web Spider JoeCartoon (All) JPEG Optimizer 3.07 JrEdit 1.0 JSoft Mail K Kachat Messenger KaZaA all since early Feb., 2002 KaZaA Dec. 2001 releases up to Jan. 3, 2002 Keyword Monitor KFK KFTP Kmail Kmp3 Kontiki 1.02 KVT Diplom L LapLink FTP 2.0 Laser Chess 1.0 Lexicon Demo Lexmark Print drivers installation Life is Good Lightspeed LimeWire 1.8 beta and above LimeWire 2.0x Dec. 2001 releases Lines '98 Lines Millennium Lines98 Lines98´/Lines Milenium LineSoft Download Link Cratter Link Keeper LinkProver 2.0 LivePaper Loan Calculator Plus Locker4U LOL Chat 2.5 Lop.com Accessory Toolbar Lop.com Search Engine Ludo Safari Demo M Magellan explorer 2.2 Magic Signs Mahjongg Game of Four Winds demo Mahjongg Master 2 Demo Mahjongg Masters Mail Alert Mail Them MailAlert 2.33 Mailmoa 3.8 Mailmoa before 3.8 Manifest Timetrap 3.0 Marker 1.01 Marker 1.1 Marketscore MASH-The m*cro$oft Agent Scripting Helper 4.5.3 MasterCrypt 2.0 Match It 1.0 MatchBlox Mattel Retail products Maxiimus Maxxchat 1.0 B-6 Media Player Medusa Meeting Planner 0.8.0.1 MegaPhone MegaSafe 6 MemriC 1.0 Meracl FontMap 1.2 Meracl FontMap Meracl Hexocol 1.1 Meracl ID3 Tag Writer Meracl ImageMap Generator 3.4 Meracl ImageMap Generator Meracl MD Recorder 1.0 MessageMates MetaMan Midnight Oil Solitaire 3.1 MidWaviPro MillenniuM BReaThe beta 0.3b Millennium BReaThe Beta 3.1 MindAlmanac Mindjongg MindPlanner MindSaver mindseti.com MindTrivia Mini Golf Demo MiniMemo-Die Cheatsdatenbank 9.0 MirNik Internet Finder 1.0 Mixman Studio MJStudio Moeboid MonIRC 1.0.0.2 MoNooN2DR Monsters & Mayhem Moonwalker 2000 2.0.0 More Space 99 3.1 MouseAssist MP3 Album Finder 1.3 MP3 Cat MP3 Downloader 2.3 MP3 Fiend 5.5 MP3 Grouppie 4.5 MP3 Mag-Net 1.0 MP3 Player 2000 6.2 MP3 Renamer 1.33 Mp3 Stream Recorder 2.3 MP3 Tag Studio MP3Album Finder MP3INFO-Editor MR. COOL MSi-Clip Mudslinger MultiSender 1.03 Music Genie 1.0 MusicCity Morpheus 1.3 MusicCity Morpheus Preview Edition 1.3.1.1 MX Inspector BIG AD My Genie Patriots My Genie SE My Genie Sports Edition 2.5 My GetRight 1.0 My House My To Do MyInfo N Naviscope 8.69 NeatFTP 1.0 Nebula Fighter Demo NeoPlanet Net CB 1.0 Net Pal Net Scan 2000 Net Vampire 3.3 Net-A-Car Feature Car Screensaver Net2Phone Dec. 2001 releases and later NetAnts NetBoard Netbus Pro 2.10 NetCaptor 5.0 Netcaptor NetCounter Netman Downloader 1.0 NetMole 1.0 NetMonitor NetNak 4.2 Netscape 6 through 7 Netscape/AOL Smart Download NetScoopFinance NetSetter NetShark 1.0 Netsonic Netsonic Pro 2.5 NetSuck 3.10.5/3.1 NetSuperSonic NetTime Thingy 1.5 Network Assistant 1.9 NetXtract Netzip NeuroStock News-Lynx NewsBin NewsShark NewsWire 1.5 NfoNak 4.1 NightSparks NikNak 2.0.1 NotePad+ NotePads+ 2.0 Notificator 1.01b Notificator 1.0b O Octopus 3.0 Odigo Messenger 2 - 3 Of the day Quizzer 1.1 Off the day Creator 1.0 Onflow Media Player Online Call OnLineCall 1.19 Opera 5 & 6 (freeware version) Option Insight 0.6.2 Othello FX Oxide Demo P Paint by Numbers Paper Picker 1.2 Paragraph Punch Password Manager Patriot Slots Pattern Book 1.0.0.2 PC Telephone PC-to-Phone PCDJ PCDJPHAT Peh Pai People Seek 98 PerfectPartner Time&Billing (Demo) 2.0 Personal Auction Track Personal internet Finder 1.7 Personal Search Agent 0.8 Personal Stock Monitor SE PGNSetup PhonePro Photo Base Junior Photocopier 2.0 Photocopier 2.01 PicPluck 2.0 Picture Line Picture Lines Pictures In News 1.0 Ping Thingy PingMaster Pixel Pirate 1.0 PKZip Planet.Billboard Planet.MP3Find 3.0 PlayJ Studio PMS ponnu CHAMY's Music PopMon 1.0.0.1 Popup Dictionary 2.0.70 PostCryptum Power Lotto Power Zip Express PowerPak Accounting and Inventory Management-Demo 2 Powerzip 2000 Lite pqDesktop PrePromote 1.0.0 Printshop 10 PromaSoft Autoresponder 1.0732 ProtectX 3.0 ProxyChecker Puzzle Master Demo Q Q*Wallet 1.6 QMS Memory Squares QMS Mystery of Magical Numbers QuadSucker/Web 1.8 Quadzle Puzzles Quickhead-E QuikLink Explorer Freeware Edition 3.0 QuikLink Autobot QuikLink Explorer Freeware Edition 3.0 QuikLink Explorer Gold Edition 3.0 Quo Tracker 1.1.48 Quote Ticker Bar 6.0 QuoteWatch 4.2 QuoTracker QuoTracker Quta QWallet R RadLight 3.03 release 5 RahJongg Demo RapidBrowser Rapidoc Raptor Call of the Shadows Demo Reader Rabbit Real Audioplayer 7.0 Real Estate Web Site Creator 1.0 RealDownload ReallyEasy Interactor 3.0(1) RealPlayer 7 RealReverb Convolution 1.3 Recipe Review Red Swoosh Rededit RedSheriff ReGet 1.4 ReGet 1.6 ReGet ReGet ReGet ReGet Junior RemoteShut Rename Master Rename-It RespondMiter / VX2 modules Rest Your Eyes 3.0 Resume Detective 1.5 RingSurf RoboCam 1.10 Rosemary's Weird Web World Rosoft CD Extractor 1.09 Rosoft Media Player 1.0 Rubber Duck H30+ RunTurkeyRun S SaberQuest Page Burner SaberQuest Tag Specification Edit SafeNetMail Sandbar Savings4u 1.0 Beta 3 SBJV 3.0 SBWcc 2.0 Scout's Game 1.0 Scout's Game 1.02.1 ScreenFIRE - FileKing ScreenFIRE 3.0 ScreenFlavors ScreenMate Movies ScreenMates Scripto 0.80 Sea Battle 1.0 Seawar SelfSeek SERanker 1.24 Servant Salamander 1.6 Beta x Shakespeare Punch Shapez! 1.0 Shapez! ShellGem Shizzam 2.6 ShortKeys Lite Sign Language Teacher Simple Submit 1.0 SimpleFind 1.0 SimpleSubmit v1.0 Simplicity Personal Organizer Site Select SiteBack SiteChecker Sitesniffer 1.0 SK-111 Skeek Shooting 1.1 SL4 Historical Montage SLEdit Slide Puzzle 1.0 Smaller Image Smart 'n Sticky SmartBoard 200 FREE Edition 2.6 SmartDoc 3.0 SmartSum Calculator 2.0 Snap-It 4.0 Snipsnap 2.0 SoftCuisine 2.2.0 Software Translator Software-Lynx Sonic Mail SonicBurn 1.3.178 SonicMail 2.6 SortSport Sound Agent 1.0 Space Central Screen Saver Space Checker Spam Buster Speak! Lite Speaking Email DeLuxe 5.5.0 Speaking Email Deluxe 5.6.0 Spector Standard and Pro Speedy eggbert Demo Spherical HTML-Templator Spherical MP3INFO-Editor 1.0 Splash! Siterave Sputnik / VX2 modules SpyTech SpyTech CipherWorks 2.0 SpyTech Eradicator SpyTech Integrity Check Plus SpyTech NetArmor SpyTech PasswordLock SpyTech SecurityWorks SpyTech Shadow SpyTech Shadownet SpyTech Spyagent SpyTech SpyLock SquareOff SSScanner SSSiter SSSpider Star Miner Demo StartDrive 1.0 Static FTP StationRadio Stats '99 1.4 Stay On Pro StickyNote 8.x Stock Profit Spread Calculator 32 StockBrowser 1.9 Subscriber SunEdit 2K SunEdit 2k Mod Manager SunKoSoft WebNewser 1.0b Superball Challenge Demo SuperBot SuperIDE 1.4 Surf+ plug-in SurfBar Surfsaver SurfSaver 2.1 Sweep 1.4 SweepsWinner System Agent System Mechanic 3.5 T Tagger Task Plus Taskbar Executive TaskWiz 1.3 TetriMania Master Demo Text Tally 1.2 Text Transmogrifier The Cassette Tape Producer 4.0.6 The Dictator The Mapper The Receptionist Desktop Edition 5.0 The Star Wars Combine HoloCom TheNet 3.69 TI-FindMail 2.0 TI-FindMail Tic-Tac-Toe Done Right TIFNY 3.0 Tile Blazer Demo Time Manager Time Zone Converter TimeWarner software Toag ToasterMultiTester too Many Secrets 0.0.6 beta Tools 3.1 TopMoxie TopText Total Finger 1.3 Total Whois 2.0 TPS108 Tracking The Eye 1999 Trade Site Creator 1.1 Trade Trakker Traffic Attractor 2000 4.0 Transponder / IEHelper modules Tray note Plus Trianle Puzzle 1.0 TrivialNet 0.6 TS-Image Mapper TsAdBot TUCOWS Uploader 2.11 Tunnel Blaster Demo Tweaki for Power Users 2.7.4 TWinExplorer 2.5 TWinExplorer Standard TypeItIn TypeWriter 1.0 U UdmSearch 3.0.11.2 uICE UK Phone Codes Universal Explorer V Vagabond's Realm 0.9.1 Validate CC VeriMP3 1.0 VeriTape 1.3 Vertigo QSearch Viewpoint Media Player Virtual Access 5.0 Virtual Friend Visual Batch File Visual Cyberadio Visual Surfer 1.4 Vocabulary Wizard Vocabulary Wizard VOG Backgammon Main VOG Backgammon Table VOG Chess 2 VOG Chess Main VOG Chess Table VOG Reversi Main VOG Reversi Table VOG Shell VOG Shell History W W3Filer 3.1.3 W3Filer W3Filer(32) Up/Downloader Internet Files 3.1.3 War Demo WarrenView 1.0 WE Group ProxyChecker 3.1.8 Web Coupon 1.0 Web Database Web Page Authoring Software Web Registrant PRO 4.0 Web Resume 1.0 Web Resume Wizard Web SurfACE 2.0 Web Word Search 1.0 Web Word Wrestle Web-Cam VCR Web-N-Force 1.7 WEB2SMS 1.0 WebBug WebCam VCR WebCam Wonder 1.0 WebCamVCR 1.0 WebCopier 1.3 WebDrive 3.0 WebHunt 2.8 Webman 5.3 Webreaper 8.0 WebSaver Website Manager WebStripper 1.05 WebStripper 1.05 WebSurfAce WebType 1.0 WebZip 3.5 Whisset Whitehouse Mambo Parody WhizFolders Organizer Whois WhoIs Thingy WildTangent Games OEM bundle Win A Lotto WinAce 1.5 Windows Media Player 7 and 8 Windows XP Search Assistant WinEdit 2000 WinMP3Locator WinMX WinSite WinSite Light WinWhatWhere Wise Wolf Notify Wise Wolf Optin Wise Wolf Pages Word Connect Demo Word Search Mania Word Search Mania Demo Word+ Wordwright 1.0 WorldChat Client Worm Writing about Reading Writing for Business www.cyber-gold.com/free.htm www.devgames.com X X Lines X-Mas: Santa's Rein xBlock 1.2 xtractor Plus 2.4 Y Yellowbase Yo Mamma, Osama! Youbet.com Your ESP Test Z Zarko 1.9 Zarko 3D Zion 1.51 Zip Code Finder ZIP Express 2000 ZIP Up The Web Pro! Zip Wrangler How to detect and remove spyware: To detect and remove (if possible) adware and spyware we recommend the freeware Ad-aware which is frequently updated. Also useful is the shareware BPS Spyware/Adware Remover. It's advisable to adjust your firewall to block off internet access for all programs and services which are not entitled to access the internet. Of course, this won't work with the numerous Internet Explorer plug-ins. An IE plug-in has full control over the surfing session. Blocking off IE will block off internet access completely. Try to make sure that IE is not infected with spyware, or better still, use an alternative browser like Opera (registered version) |
The Following 3 Users Say Thank You to Waseemtabish For This Useful Post: | ||
ambren_kanval (Monday, October 26, 2009), khanzada_111 (Tuesday, November 10, 2009), salik_malik (Monday, October 26, 2009) |
#12
|
||||
|
||||
Spyware Information
This guide explains what spyware is and what it does. Spyware has become a massive threat to the privacy of the internet user in recent years. Operating systems aren't able to detect or defend against spyware without an external program. One of a number of 3rd party tools - along with the user's own vigilance - is required to defeat this menace.
What is Spyware? Spyware gathers information about the contents of, and the activities on, a computer system. This information is transmitted to the producer (or the one who controls the spyware), without the approval or knowledge of the user. The most common type of spyware is adware. Adware is software which is embedded in other software (or sometimes distributed as a stand-alone program) and gathers and transmits the user's personal data. In return, ad banners are received and displayed on your system. Possible information that leaks out of your PC includes personal data (name, *-*-*, age,...), email addresses, credit card numbers, browser history, system configuration, installed software, hard disk content and passwords. Another kind of spyware is surveillance software which logs activities on the computer system. The main difference fromadware is that surveillance software runs secretly in the background, no apparent activity is evident. Key loggers, screen scanner, trojans,... are surveillance software, some are realized in hardware (mostly used by law enforcement or intelligence agencies). Known spyware: Spyware became a branch of the software industry in recent years. Many specialized firms producing spyware. They pay the software programmers to implement spyware modules into their programs. That's the reason why many shareware and freeware programs are interlaced with spyware, the programmer is able to earn some extra money. What follows is a list of some popular spyware producers and what their products are doing. Aureate/Radiate This module can be very easily added to any software product. While using the software, the spy module is active and delivers precise audience targeting. Even without an established internet connection, Aureate/Radiate presents the user with splash screens, dynamic messaging, customized demographic collection and real-time surveys. Conducent Timesink Conducent is affiliated with a lot of Internet advertising networks. Their spy module receives ad content from the internet and stores it on the hard disk. During the runtime it presents the user with advertisements, and records what the user does with the ads (clicking them, for example). This information is sent back to Conducent. The spy module (TSadbot.exe) provides no uninstall feature, i.e. even when the carrier software is removed from the system, the spyware runs on. Cydoor Once integrated into a program, the Cydoor spy module dynamically loads ad banners from the internet. It presents ad content in offline or online mode. A unique numerical identifier is placed on the computer during the installation, so the PC system can be identified anytime. Comet Cursor Comet Cursor is a browser extension (IE and Netscape) and requires enabled ActiveX. It logs cookies, referrer IDs, IP addresses and other system information. When visiting a web site, the click activities of the user are logged and analyzed. Comet analyzes this data to improve the content and performance of that particular web site. eZula & KaZaa Toptext KaZaa Toptext is part of the file sharing client KaZaa. Toptext takes full control of the browser and changes the content of the web site (like the SmartTags which were planned for Windows XP). The content of the website is analyzed and certain keywords are highlighted and become a link to the company who paid eZula Inc for changing that keyword. Flashpoint/Flashtrack Flashpoint/Flashtrack is relatively unknown spyware. It logs the user's queries to a search engine, analyzes them and creates ad pop-up windows which seem to come from the visited web site, but actually are created by Flashtrack. Flyswat Flyswat is a plug-in for Internet Explorer and requires enabled ActiveX. It logs the user's clicks while surfing the internet. The gathered information is given to partners affiliated with Flyswat. Gator Gator is a program to log any data which is entered into forms (username, password, address, credit card number, etc.) This data is stored in an encrypted file and is transmitted to Gator over the internet. Gator also replaces dynamically ad banners from other web sites with their own banners. GoHip This browser extension reconfigures the Internet Explorer settings (Homepage, AutoSignature, search page, etc.) To every sent message GoHip attaches an advertisement. GoHip appears as Windows Startup in the Start menu. Hotbar Hotbar collects information about visited web sites and viewed pages. IP address, domain name, URL, browser information, operating system, cookies are stored with the respective time stamp. Search engine queries are also redirected to Hotbar and stored there. Also stored are the clicked buttons and links, the amount of time spent at a web site and entered form data (username, address, password, credit card numbers, etc.) Hotbar is affiliated with many advertisement networks. Lop (C2Media) Lop installs a toolbar and uses cookies to trace the user. C2Media works in cooperation with DoubleClick and the Network Advertising Initiative (NAI) to spy and serve ads. Mattel BrOdcast BrOdcast collects and sends information to Mattel and in return sends the user product offers and ads. It's mostly used in Mattel's own software for children. Morpheus Another Peer-to-Peer agent. Different spyware agents are included. Realplayer The RealMedia Realplayer contains many appropriate spy modules. The removal of the spy functions will result in a non-functioning Realplayer. Songspy (IMG Entertainment) Songspy is a music sharing client. The spy module opens TCP port 5190 and gives it full control over the computer system. Web3000 Web3000 changes the content of visited web sites. The browser window and pop-up windows are used for ads. The users surfing habits are logged. Web3000 replaces winsock32.dll and other Windows system files. WebHancer WebHancer gathers information on visited web sites (address, size, loading time, completion state and network delay time). It does traffic, web and performance analysis. WebHancer hides itself in the system. Incorrect removal will destroy the internet connection. Other... A lot of other spyware is available (e.g. AdBreak, AdTools Codehammer Message Mates, AdvertBar, Alexa, Back Web, BDE, Brilliant Digital, Blackstone Data Transponder, B3d, Bulla, Bookmark Express, Bonzi Buddi, Cash Bar, Click Till u Win, Click The Button, CnsMin, Common Name, Delfin, DoubleClick , Download Ware (DAP), EverAd , Etraffic - TopMoxie, Expedio Ware, EWA, Favorite Man, Gratisware, homepageware, IEPlugin, KFH, Liveshows Dialer, MarketScore, Message Mates, MediaLoads, nCase, NewDotNet (New.net), NetPal, Netzany, NetSonic, Netsetter , Network Essentials, NowBox, OnFlow , OpenMe, Porn Dialer, SaveNow, Search-Explorer, Surf+, TPS108, TopMoxie, Transponder, Twisted Humor, UCmore, Vegas Palms Casino, wbeCheck, WNAD, WurldMediaBHO, ZapSpot,...) and some programs which have their own proprietary spy modules.
__________________
~It is possible to fail in many ways...while to succeed is possible only in one way.~ |
The Following 3 Users Say Thank You to Waseemtabish For This Useful Post: | ||
ambren_kanval (Saturday, October 31, 2009), khanzada_111 (Tuesday, November 10, 2009), salik_malik (Monday, October 26, 2009) |
#13
|
||||
|
||||
remove a Google redirect virus
How to remove a Google redirect virus
Thefollowing guide is to cure your PC from that annoying piece of malwarewhich hijacks and redirects your Google searches and other searchengines, otherwise known as a Google redirect. Other than the searchengine redirect, some other signs that you may have this infection are: •Not being able to download, install, or run security programs like HijackThis or Malware Bytes Anti-Malware •Being blocked from navigating to security/malware removal sites, for example : Microsoft or GeeksToGo This infection is also commonly known by security applications as Rootkit.Win32.TDSS, Trojan.DNS_Changer, or Troj/Rustock. It also has other aliases due to the fact that it evolves and changes over time. You may find your anti-virus or anti-spyware programs identifies any of the following: ••C:\windows\system32\drivers\SKYNETsunjnbdw.sys •C:\windows\system32\drivers\MSIVXvvynaffpomuyaycw koiyldjssbgligea.sys •C:\windows\system32\drivers\UACgrevmydoyiftawolx. sys •C:\windows\system32\drivers\ovfsthhtkoslmsqrvwsnt nkdioglrpufewidyw.sys •c:\windows\system32\drivers\TDSSmaxt.sys •c:\windows\system32\drivers\kungsfndqriiha.sys •c:\windows\system32\drivers\seneka.sys Another sign of it would be this line showing up in your HijackThis orOTL log, however this is not always present so you cant rely on itcompletely to tell whether you have the infection or not: O17 - HKLM\System\CCS\Services\Tcpip\..\{3B8FF4B4-174F-4B7F-BE68-78043E53C8DA}: NameServer = 85.255.112.70;85.255.112.201 Now lets get onto the good stuff, removing this infection from your PC! Before we begin, you should save these instructions in Notepad to yourdesktop, or print them, for easy reference. For the fix to workproperly we will need you to close your browser, and any securityprograms like an anti-virus or anti-spyware. If you aren't completelysure how to do that, just continue on with the guide. Step 1 : We need to clean out your temp files and folders to speed up the whole process. Download TFC (Temp File Cleaner) to your desktop •Open the file and close any other windows. •It will close all programs itself when run, make sure to let it run uninterrupted. •Click the Start button to begin the process. The program should not take long to finish its job •Once its finished it should reboot your machine, if not, do this yourself to ensure a complete clean Step 2 : We need to make sure you don't have another infection which can causeGoogle redirects. This is unlikely to fix your problem but its best tobe safe than sorry as they say. Please download GooredFix, making sure that you save this file to your Desktop. •Double-click GooredFix.exe on your Desktop (Note: If you are using Vista right-click GooredFix and select Run As Administrator...) •Select Option#1 - Find Goored (no fix), by typing 1 and pressing Enter •A logfile should popup shortly, that will look something like this: Check Download LinksCode: GooredFix v1.92 by jpshortstuff Log created at 08:35 on 24/12/2008 running Option #1 (Administrator) Firefox version 3.0.3 (en-GB) =====Suspect Goored Entries===== [HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Firefox\extens ions] "{ABB56C42-1843-46EF-A93E-482DE0F5B5AA}"="C:\Documents and Settings\Administrator\Local Settings\Application Data\{ABB56C42-1843-46EF-A93E-482DE0F5B5AA}" C:\Program Files\Mozilla Firefox\extensions\{D96F1D71-4F95-443A-8AF3-541BFDBA096D} =====Dumping Registry Values===== [HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Firefox 3.0.3\extensions] "Plugins"="C:\Program Files\Mozilla Firefox\plugins" [HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Firefox 3.0.3\extensions] "Components"="C:\Program Files\Mozilla Firefox\components" [HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Firefox\extens ions] "{ABB56C42-1843-46EF-A93E-482DE0F5B5AA}"="C:\Documents and Settings\Administrator\Local Settings\Application Data\{ABB56C42-1843-46EF-A93E-482DE0F5B5AA}" [HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Firefox\extens ions] "jqs@sun.com"="C:\Program Files\Java\jre6\lib\deploy\jqs\ff" [HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Firefox\extens ions] "{20a82645-c095-46ed-80e3-08825760534b}"="C:\WINDOWS\Microsoft.NET\Framework \v3.5\Windows Presentation Foundation\DotNetAssistantExtension\" •Take a look at the section highlighted in red.As shown in this log, there should be an entry there with a randomstring of numbers and letters enclosed in {} (in this case {ABB56C42-1843-46EF-A93E-482DE0F5B5AA}), that shows a folder in C:\Documents and Settings\<your name>\Local Settings\Application Data\{the same random numbers and letters}. A newer version of the infection just consists of a folder in Firefox's extenions directory, in this case: C:\Program Files\Mozilla Firefox\extensions\{D96F1D71-4F95-443A-8AF3-541BFDBA096D}. •If these entries are present, and if there are no other entries that you think may be legitimate in the "Suspect Goored Entries" section, then do the following: ◦Close all Windows and Browsers, especially any Firefox Windows. ◦Double-click GooredFix.exe on your Desktop (Note: If you are using Vista right-click GooredFix and select Run As Administrator...) ◦Select Option#2 - Fix Goored by typing 2 and pressing Enter. ◦At the prompt, type y and press Enter. ◦GooredFix will now remove the infection (if it requires a reboot, please restart your computer). ◦Note : If no entries are under "Suspect GooredEntries" then that means you don't have this infection. Please do notrun Option #2, instead proceed straight to Step 3 below Step 3 : The following should remove the redirects and have your PC back to normal Please download ComboFix from Here or Here to your Desktop. **Note: In the event you already have Combofix,this is a new version that I need you to download. It is important thatit is saved and renamed following this process directly to yourdesktop** 1.If you are using Firefox, make sure that your download settings are as follows: ◦Tools->Options->Main tab ◦Set to "Always ask me where to Save the files". 2.During the download, rename Combofix to Combo-Fix as follows: 3.It is important you rename Combofix during the download, but not after. 4.Please do not rename Combofix to other names, but only to the one indicated. 5.Close any open browsers. 6.Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix. ----------------------------------------------------------- ◦Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before"unpredictable results". performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause ◦Click on this linkto see a list of programs that should be disabled. The list is not allinclusive. If yours is not listed and you don't know how to disable it,please ask. ----------------------------------------------------------- ◦Close any open browsers. ◦WARNING: Combofix will disconnect your machine from the Internet as soon as it starts ◦Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished. ◦If there is no internet connection after running Combofix, then restart your computer to restore back your connection. ----------------------------------------------------------- 7.Double click on combo-Fix.exe & follow the prompts. 8.Note: Do not mouseclick combo-fix's window while it's running. That may cause it to stall 9.This should fix your search engine redirects. Please restart your PC, check how its running and if there are any more redirects. Step 4 : This step is easy and quick, it is to remove any left over pieces of malware or anything else that may be hiding Please download Malwarebytes' Anti-Malware from Here Double Click mbam-setup.exe to install the application. •Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish. •If an update is found, it will download and install the latest version. •Once the program has loaded, select "Perform Quick Scan", then click Scan. •The scan may take some time to finish,so please be patient. •When the scan is complete, click OK, then Show Results to view the results. •Make sure that everything is checked, and click Remove Selected. •When disinfection is completed it is recommended you reboot your PC Extra Note: If MBAMencounters a file that is difficult to remove,you will be presentedwith 1 of 2 prompts,click OK to either and let MBAM proceed with thedisinfection process,if asked to restart the computer,please do soimmediatly. Conclusion : Let us remove those tools we used, its best not to keep them around. •Download OTC to your desktop and run it •Click Yes to beginning the Cleanup process and remove these components, including this application. •You will be asked to reboot the machine to finish the Cleanup process. Choose Yes. Your PC should hopefully be clean from those pesky redirects ! There isnothing left to do but enjoy having a normal PC again. If that isn'tthe case then you must have some other sort of infection or a newvariant. Don't worry though, its nothing we cant fix. Just pop over tothe [COLOR=Yellow]Help Desk However, if this guide did fix your PC, I'm glad to be of assistance.Feel free to hang around as there is plenty to read and learn here.
__________________
~It is possible to fail in many ways...while to succeed is possible only in one way.~ |
The Following 3 Users Say Thank You to Waseemtabish For This Useful Post: | ||
ambren_kanval (Monday, October 26, 2009), khanzada_111 (Tuesday, November 10, 2009), salik_malik (Monday, October 26, 2009) |
#14
|
||||
|
||||
~*~XP secrets~*~
~*~XP secrets~*~
XP hides some system software you might want to remove, such as Windows Messenger, but you can tickle it and make it disgorge everything. Using Notepad or Edit, edit the text file /windows/inf/ sysoc.inf, search for the word 'hide' and remove it. You can then go to the Add or Remove Programs in the Control Panel, select Add/Remove Windows Components and there will be your prey, exposed and vulnerable. Creating ****down Icon or One Click ****down: Navigate to your desktop. On the desktop, right-click and go to New, then to Shortcut (in other words, create a new shortcut). You should now see a pop-up window instructing you to enter a command line path. Use this path in "Type Location of the Item" ****DOWN -S -t 01 If the C: drive is not your local hard drive, then replace "C" with the correct letter of the hard drive. Click the "Next" button. Name the shortcut and click the "Finish" button. Now whenever you want to **** down, just click on this shortcut and you're done. Increasing Band-Width By 20%: Microsoft reserves 20% of your available bandwidth for their own purposes like Windows Updates and interrogating your PC etc To get it back: Click Start then Run and type " gpedit.msc" without quotes.This opens the group policy editor. Then go to: Local Computer Policy then Computer Configuration then Administrative Templates then Network then QOS Packet Scheduler and then to Limit Reservable Bandwidth. Double click on Limit Reservable bandwidth. It will say it is not configured, but the truth is under the 'Explain' tab I.e."By default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection, but you can use this setting to override the default." So the trick is to ENABLE reservable bandwidth, then set it to ZERO. This will allow the system to reserve nothing, rather than the default 20%.It works on Win 2000 as well. Renaming The Recycle Bin icon: To change the name of the Recycle Bin desktop icon, click Start then goto Run, write Regedit and press Enter. It opens Registry Editor. Now in Registry Editor go to: HKEY_CLASSES_ ROOT/CLSID/ {645FF040- 5081-101B- 9F08-00AA002F954 E} And change the name "Recycle Bin" to whatever you want (don't type any quotes). Managing Tasks: You can at last get rid of tasks on the computer from the command line by using 'taskkill /pid' and the task number, or just 'tskill' and the process number. Find that out by typing 'tasklist', which will also tell you a lot about what's going on in your system. Removing Shared Documents folder From My Computer window: Open registry editor by going to Start then Run and entering regedit. Once in registry, navigate to key HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Explorer \ My Computer \ NameSpace \ DelegateFolders You must see a sub-key named {59031a47-3f72- 44a7-89c5- 5595fe6b30ee} . If you delete this key, you have effectively removed the my shared documents folder. Making Google the Default Search Engine in Internet Explorer: Open registry editor by going to Start then Run and entering regedit and navigate to following three keys separately and change it as shown below: [HKEY_CURRENT_ USER\Software\ Microsoft\ Internet Explorer\Main] "Search Page"=" http://WWW.google.Com " "Search Bar"=" http://WWW.google. Com/i.e. " [HKEY_CURRENT_ USER\Software\ Microsoft\ Internet Explorer\SearchURL] ""=" http://WWW.google. Com/keyword/ %S " [HKEY_LOCAL_ MACHINE\SOFTWARE \Microsoft\ Internet Explorer\Search] "SearchAssistant" =" http://WWW.google. Com/i.e. " . Improving the Slow Boot up time: There are a variety of reasons why your windows XP system would boot slowly. Most of the times it this has to do with the startup applications. If you would like to speed up the bootup sequence, consider removing some of the startup applications that you do not need. Easiest way to remove startup apps is through System Configuration Utility. Go to Start then Run and enter MSCONFIG and go to the Startup tab. Deselect/UnCheck application( S) that you do not want to startup at boot time. Customize Logon prompt with your Own Words: Open Registry by going to Start then Run, entering regedit and Navigate to [HKEY_LOCAL_ MACHINE\SOFTWARE \Microsoft\ Windows NT\CurrentVersion\ Winlogon] . In right pane, look for key by the name "LogonPrompt" . Set its value to whatever text you want to see displayed at login screen. IP address of your connection: Go to Start then Run. Enter 'cmd' and then enter 'ipconfig' .Add the '/all' switch for more info . Making Folders Private: Open My Computer Double-click the drive where Windows is installed (usually drive (C, unless you have more than one drive on your computer). If the contents of the drive are hidden, under System Tasks, click Show the contents of this drive. Double-click the Documents and Settings folder. Double-click your user folder. Right-click any folder in your user profile, and then click Properties. On the Sharing tab, select the Make this folder private so that only I have access to it check box. To change Drive Letters: Go to Start > Control Panel > Administrative Tools > Computer Management, Disk Management, then right-click the partition whose name you want to change (click in the white area just below the word "Volume") and select "change drive letter and paths." From here you can add, remove or change drive letters and paths to the partition. Removing the Shortcut arrow from Desktop Icons: Goto Start then Run and Enter regedit. Navigate to HKEY_CLASSES_ ROOTlnkfile. Delete the IsShortcut registry value. You may need to restart Windows XP. Get Drivers for your Devices: Visit Windows Update (XP Only) Look at the left hand pane and under Other Options click Personalize Windows Update. Now in the right hand pane check the box - Display the link to the Windows Update Catalog under See Also Below Choose which categories and updates to display on Windows Update - make sure you check all the boxes you want shown. Click Save Settings Now look in the left hand pane under See Also click Windows Update Catalog and choose what you're looking for. Choose either MS updates or drivers for hardware devices. Start the Wizard and off you go. Customize Internet Explorer's Title Bar: Open Registry by going to Start then Run and Enter regedit. Navigate to HKEY_CURRENT_ USER\Software\ Microsoft\ Internet. Explorer\Main. In right hand panel look for string "Window Title" and change its value to whatever custom text you want to see. Disabling the use of Win Key: If your are a gaming freak then you must be sick of the Win key in your keyboard. To disable use of Win key, open registry by going to Start then Run and entering regedit. Navigate to [HKEY_LOCAL_ MACHINE\SYSTEM\ CurrentControlSe t\Control\ Keyboard Layout] . In this look for value of "Scancode Map". Its binary data so be extra careful: Set its value to "00 00 00 00 00 00 00 00 03 00 00 00 00 00 5B E0 00 00 5C E0 00 00 00 00" to disable the win key. Restarting Windows without Restarting the Computer: This one is again is. When you click on the ****DOWN button, make sure to simultaneous press SHIFT Button. If you hold the Shift key down while clicking on ****DOWN button, you computer would restart without restarting the Computer. This is equivalent to term "HOT REBOOT". Stopping XP from displaying unread messages count on Welcome Screen: To stop XP from displaying count of unread messages, Open registry and navigate to [HKEY_CURRENT_ USER\Software\ Microsoft\ Windows\CurrentV ersion\UnreadMai l] and look for the data key "MessageExpiryDays" . If you do not see this key, create one DWORD key by the name "MessageExpiryDays" . Setting its value to 0 would stop Windows XP from displaying the count of unread messages. Modify Color Selection of Default Theme: Open registry by going to Start then Run. Entering regedit, navigate to [HKEY_USERS\ .DEFAULT\ Software\ Microsoft\ Windows\CurrentV ersion\ThemeMana ger] and locate the key "ColorName". Right Click on it and select modify its value from "NormalColor" to "Metallic" Click Ok, and exit regedit and restart your computer.
__________________
~It is possible to fail in many ways...while to succeed is possible only in one way.~ |
The Following 3 Users Say Thank You to Waseemtabish For This Useful Post: | ||
ambren_kanval (Monday, October 26, 2009), khanzada_111 (Tuesday, November 10, 2009), salik_malik (Monday, October 26, 2009) |
#15
|
||||
|
||||
100 Run Commands
100 Run Commands
Accessibility Options : access.cpl Add Hardware: hdwwiz.cpl Add / Remove Programs: appwiz.cpl Administrative Tools : control admintools Automatic Updates: wuaucpl.cpl Wizard file transfer Bluethooth: fsquirt Calculator: calc Certificate Manager: certmgr.msc Character: charmap Checking disk : chkdsk Manager of the album (clipboard) : clipbrd Command Prompt : cmd Service components (DCOM) : dcomcnfg Computer Management : compmgmt.msc DDE active sharing : ddeshare Device Manager : devmgmt.msc DirectX Control Panel (if installed) : directx.cpl DirectX Diagnostic Utility : dxdiag Disk Cleanup : cleanmgr Disk Defragmenter : dfrg.msc Disk Management : diskmgmt.msc Partition manager : diskpart Display Properties : control desktop Properties of the display (2) : desk.cpl Properties display (tab "appearance") : control color Dr. Watson: drwtsn32 Manager vérirficateur drivers : check Event Viewer : Eventvwr.msc Verification of signatures of files: sigverif Findfast (if present) : findfast.cpl Folder Options : control folders Fonts (fonts) : control fonts Fonts folder windows : fonts Free Cell ...: freecell Game Controllers : Joy.cpl Group Policy (XP Pro) : gpedit.msc Hearts (card game) : mshearts IExpress (file generator. Cab) : IExpress Indexing Service (if not disabled) : ciadv.msc Internet Properties : inetcpl.cpl IPConfig (display configuration): ipconfig / all IPConfig (displays the contents of the DNS cache): ipconfig / displaydns IPConfig (erases the contents of the DNS cache): ipconfig / flushdns IPConfig (IP configuration cancels maps): ipconfig / release IPConfig (renew IP configuration maps) : ipconfig / renew Java Control Panel (if present) : jpicpl32.cpl Java Control Panel (if present) : javaws Keyboard Properties: control keyboard Local Security Settings : secpol.msc Local Users and Groups: lusrmgr.msc Logout: logoff Microsoft Chat : winchat Minesweeper (game): winmine Properties of the mouse: control mouse Properties of the mouse (2): main.cpl Network Connections : control NetConnect Network Connections (2): ncpa.cpl Network configuration wizard: netsetup.cpl Notepad : notepad NView Desktop Manager (if installed): nvtuicpl.cpl Manager links: packager Data Source Administrator ODBC: odbccp32.cpl Screen Keyboard: OSK AC3 Filter (if installed) : ac3filter.cpl Password manager (if present): Password.cpl Monitor performance : perfmon.msc Monitor performance (2): perfmon Dialing Properties (phone): telephon.cpl Power Options : powercfg.cpl Printers and Faxes : control printers Private Character Editor : eudcedit Quicktime (if installed) : QuickTime.cpl Regional and Language Options: intl.cpl Editor of the registry : regedit Remote desktop connection : mstsc Removable Storage: ntmsmgr.msc requests the operator to removable storage: ntmsoprq.msc RSoP (traduction. ..) (XP Pro): rsop.msc Scanners and Cameras : sticpl.cpl Scheduled Tasks : control schedtasks Security Center : wscui.cpl Console management services: services.msc shared folders : fsmgmt.msc Turn off windows : shutdown Sounds and Audio Devices : mmsys.cpl Spider (card game): spider Client Network Utility SQL server : cliconfg System Configuration Editor : sysedit System Configuration Utility : msconfig System File Checker (SFC =) (Scan Now) : sfc / scannow SFC (Scan next startup): sfc / scanonce SFC (Scan each démarraget) : sfc / scanboot SFC (back to default settings): sfc / revert SFC (purge cache files): sfc / purgecache SFC (define size CAHC x) : sfc / cachesize = x System Properties : sysdm.cpl Task Manager : taskmgr Telnet client : telnet User Accounts : nusrmgr.cpl Utility Manager (Magnifier, etc) : utilman Windows firewall (XP SP2) : firewall.cpl Microsoft Magnifier: magnify Windows Management Infrastructure: wmimgmt.msc Protection of the accounts database: syskey Windows update: wupdmgr Introducing Windows XP (if not erased) : tourstart Wordpad : write Date and Time Properties : timedate.cpl
__________________
~It is possible to fail in many ways...while to succeed is possible only in one way.~ |
The Following 3 Users Say Thank You to Waseemtabish For This Useful Post: | ||
ambren_kanval (Saturday, October 31, 2009), khanzada_111 (Tuesday, November 10, 2009), salik_malik (Monday, October 26, 2009) |
#16
|
||||
|
||||
make an invisible folder in xp
make an invisible folder in xp
First of all fight click on desktop in empty area. the make a new folder and don't give it any name ok. now right on it again and select remane . then hold "Alt" key and while holding "Alt key" press "0160" from your num key pad which is on right side of your keyboard. now you have named it. there would showing nothing in its name. now right click on it again and slect properties and then click on the customize tab and then click on change icon. there would be a lots of icons in the list. now you scroll toward right till you find an empty place between the icons slect it and hit ok. now you will see there is no icon on the desktop.
__________________
~It is possible to fail in many ways...while to succeed is possible only in one way.~ |
The Following 2 Users Say Thank You to Waseemtabish For This Useful Post: | ||
ambren_kanval (Saturday, October 31, 2009), salik_malik (Monday, October 26, 2009) |
#17
|
||||
|
||||
Make USB Disable Enable In Window
Make USB Disable Enable In Window
pehle run main ja kar regedit likhna hai Hkey_Local_Machine\System\CurrentControlset\Servic es\USBStor IS KE BAAD START VALUE KO DOUBLE CLICK KAR KE OPEN KAREIN GE YAHAN 3 LIKHA HO GA US KO 4 KAR DEIN DISABLE HO JAYE GI DOBARA 3 KAR DEIN ENABLE HO JAYE GI...
__________________
~It is possible to fail in many ways...while to succeed is possible only in one way.~ |
The Following 3 Users Say Thank You to Waseemtabish For This Useful Post: | ||
ambren_kanval (Monday, October 26, 2009), khanzada_111 (Tuesday, November 10, 2009), salik_malik (Monday, October 26, 2009) |
#18
|
||||
|
||||
Amaizng & Dangerus Tips
usb disable krna (Disable)
may ap ko 2 files deta hoon inhey app kise ke b memmory card ya usb main copy kr dein ya khud double click kr dein jis b pc main ye file run ho gi us main kabi usb ports kaam krna chor dein ge jab tak us pc pr window nahi ho gi tb tk us main koi b usb suported dvice kaam nhi kre gi usb enable krna (Enable) http://rapidshare.com/files/274798435/usb_U-D.zip
__________________
~It is possible to fail in many ways...while to succeed is possible only in one way.~ |
The Following 2 Users Say Thank You to Waseemtabish For This Useful Post: | ||
ambren_kanval (Saturday, October 31, 2009), khanzada_111 (Tuesday, November 10, 2009) |
#19
|
||||
|
||||
Secure Your Vista PC in 10 Easy Steps
By making a few judicious changes using the security tools within Windows Vista--and in some cases by adding a few pieces of free software--you can lock down your operating system.
1. Use Windows Security Center as a Starting Point For a quick overview of your security settings, the Windows Security Center is where you'll find the status of your system firewall, auto update, malware protection, and other security settings. Click Start, Control Panel, Security Center, or you can simply click the shield icon in the task tray. If you see any red or yellow, you are not fully protected. For example, if you have not yet installed an antivirus product on your machine, or if your current antivirus product is out-of-date, the Malware section of the Security Center should be yellow. Windows does not offer a built-in antivirus utility, so you'll want to install your own. For free antivirus, I recommend AVG Anti-Virus 8. 2. Use Windows Defender as a Diagnostic Tool The Malware section also covers antispyware protection, and for that Windows Vista includes Windows Defender. The antispyware protection in your antivirus program usually trumps the protection Microsoft provides, but there are several good reasons to keep Windows Defender enabled. One is that every antispyware program uses a different definition of what is and what is not spyware, so redundant protection can actually offer some benefit. Another reason to keep Windows Defender enabled: diagnostics. Click Tools, and choose Software Explorer from the resulting pane. You can display lists of applications from several categories such as Currently Running Programs, Network Connected Programs, and Winsock Service Providers, but Startup Programs is perhaps the most useful. Click on any name in the left window, and full details will appear in the right pane. By highlighting, you can remove, disable, or enable any of the programs listed. 3. Disable the Start Up menu Windows Vista keeps track of all the documents and programs you launch in the Start Up menu. This can be convenient for some users, but it can also compromise your privacy if you share a computer within an office or household. Fortunately Windows Vista provides an easy way to tweak this setting. To protect your privacy, follow these steps: Right click on the taskbar and select Properties. Click on the Start Menu tab. Uncheck Store and display a list of recently opened files. Uncheck Store and display a list of recently opened programs. Click OK. 4. Get Two-Way Firewall Protection No desktop should be without a personal firewall, but even if the Security Center says you're protected, you may not be. The Windows Firewall within Vista blocks all incoming traffic that might be malicious or suspicious--and that's good. But outbound protection is not enabled by default. That's a dangerous situation if some new malicious software finds its way onto your PC. Microsoft did include the tools for Windows Vista to have a true two-way firewall, but finding the setting is a little complicated. (Hint: Don't go looking the Windows Firewall settings dialog box.) To get two-way protection in Windows Vista, click on the Start button; in the search space, type wf.msc and press Enter. Click on the Windows Firewall with Advanced Security icon. This management interface displays the inbound and outbound rules. Click on Windows Firewalls Properties. You should now see a dialog box with several tabs. For each profile--Domain, Private, and Public--change the setting to Block, and then click OK. 5. Lock Out Unwanted Guests If you share your computer with others (and even if you don't), Windows Vista includes a neat way to keep unwanted guests from guessing your system administrator password. When you set up users and declare one user as administrator (with full privileges), Windows Vista allows outsiders unlimited guesses at the password you chose. Here's how to limit the guesses. Click Start, type Local Security Policy. Click Account Lockout Policy. Choose Account Lockout Threshold. At the prompt, enter the number of invalid log-ins you'll accept (say, 3). Click OK and close. 6. Now Audit Your Attackers With the Account Lockout policy in place, you can now enable auditing to see any account attacks. To turn on auditing for failed log-on events, do the following: Click the Start button, type secpol.msc, and click the secpol icon. Click on Local Policies and then Audit Policy. Right-click on Audit account logon events policy and select Properties. Check the Failure box and click OK. Right-click on Audit logon events policy and select Properties. Check the Failure box and click OK. Close the Local Security Policy window. You can then use the Event Viewer (by running eventvwr.msc) to view the logs under Windows Logs and Security. 7. Secure Your Internet Explorer Settings The Windows Security Center will also report whether your Internet Explorer 7 (or IE security settings are at their recommended levels. If the screen shows this section as red, you can adjust the settings within the browser itself. Within Internet Explorer, click Tools in the menu bar. From the drop-down menu, click Internet Options. Choose the Security tab. Within the Security tab, click Custom Level. Here you'll see a window with all the security options for the browser. If any are below the recommended level (if, say, some kind of malware reconfigured your browser settings), these options will be highlighted in red. To change an individual setting, click the appropriate radio button. To reset them all, use the button near the bottom of the tab. You can also change the overall security setting for Internet Explorer from the default Medium-High setting to the recommended High or Medium, if you wish. Click OK to save and close. 8. Use OpenDNS Domain Name System (DNS) servers act as a phone book. When you type "pcworld . com" in the address bar, for instance, Internet Explorer sends that common-name request to your Internet service provider's DNS servers to be converted into a series of numbers, or an IP address. Lately, DNS servers have come under attack, with criminals seeking to redirect common DNS preferences to servers that their interests control. One way to stop such abuse is to use OpenDNS. Go to Start, Control Panel, Network and Internet, and then click Network and Sharing Center. Under the tasks listed on the left, click Manage Network Connections. In the Manage Network Connections window, do the following. Right-click on the icon representing your network card. Click Properties. Click Internet Protocol Version 4. Click the Properties button. Select the Use the following DNS server addresses radio button. Click OK. 9. Live With User Account Control One area where some people might want to see the Windows Security Center turn red is User Account Control (UAC), perhaps the most controversial security feature within Windows Vista. Designed to keep rogue remote software from automatically installing (among other things), UAC has a tendency to thwart legitimate software installations by interrupting the process several times with useless messages. In Windows 7 you'll be able to set UAC to the level you want. Until then, you do have some options. One is to disable UAC. I would caution against that, since UAC is meant to warn you of potential danger. Instead, install TweakUAC, a free utility that offers the ability to turn UAC on or off as well as an intermediate "quiet" mode that keeps UAC on but suppresses administration elevation prompts. With TweakUAC in quiet mode, UAC will appear to be off to those running as administrator accounts, while people with standard user accounts will still be prompted. 10. Check Your Work Now that you've tweaked Windows Vista, you can keep tabs on your system's security with the System Health Report. This diagnostic tool takes input from the Performance and Reliability Monitor and turns it into an information-packed report that can spotlight potential security problems. Open Control Panel. Click System. In the Tasks list, click Performance (near the bottom). In the resulting Tasks list, click Advanced tools (near the top). Click the last item on the resulting list: Generate a system health report. The report will list any missing drivers that might be causing error codes, tell you whether your antivirus protection is installed, and declare whether UAC is turned on. You may want to run this report once a month just to make sure everything's still good.
__________________
~It is possible to fail in many ways...while to succeed is possible only in one way.~ |
The Following 3 Users Say Thank You to Waseemtabish For This Useful Post: | ||
ambren_kanval (Saturday, October 31, 2009), khanzada_111 (Tuesday, November 10, 2009), salik_malik (Monday, October 26, 2009) |
#20
|
||||
|
||||
make your Desktop Icons Transparent
make your Desktop Icons Transparent
Go to ontrol Panel > System, > Advanced > Performance area > Settings button Visual Effects tab "Use drop shadows for icon labels on the Desktop
__________________
~It is possible to fail in many ways...while to succeed is possible only in one way.~ |
The Following 2 Users Say Thank You to Waseemtabish For This Useful Post: | ||
ambren_kanval (Saturday, October 31, 2009), khanzada_111 (Tuesday, November 10, 2009) |
Thread Tools | Search this Thread |
|
|