Skip to main content

Posts

Showing posts from January, 2009

Firefox add-in Live Search auto-suggestions from Microsoft

Microsoft has just released a Firefox extension that provides auto-suggestions from Live Search right in your browser while you're typing your query. The officially supported add-on, written by the Live Search team in Microsoft, gives faster search results through this auto-suggestions feature. Auto-suggestion means when you type a search term into the Live Search box , it shows relevant suggestions that match your search query and as you continue typing or when you change the query it refreshes the suggestion. You can click the suggestion that best matches you. You can install the add-on from here According to them the extension is based on the Open Search standard and uses the JSON interface supported by Firefox to retrieve autosuggestions.[Via - blogs.msdn ]

Titan Backup – the best backup software for free

Titan Backup is an easy-to-use and complete solution, designed for secure backups of all your important files. There could be various reasons that lead to massive data loss on your hard drive, either by storage device failure, accidental delete , computer crash , or by a hacker or malware attack . And also, backup software is not used only for emergencies, for instance, if you buy a new computer and want to transfer all backed up documents from your old computer to new, you need it. By using Titan Backup you can do it very easily, even if you change the Windows version. With Titan Backup, you can backup to virtually any storage device (including local and external disk drives, LAN, CD/DVD, removable USB devices, remote FTP servers, etc.). More details here. You can create backup of your most important data - files, windows registry, mails and user settings for Microsoft Outlook, Outlook Express, Firefox, Opera, Thunderbird, Eudora, Windows settings, and more... Protect your backu...

Discover hidden objects from your computer with ESET SysInspector

ESET SysInspector is free, portable tool for inspecting your computer for any possible threats. It checks the most critical spots – the registry , running processes , startup items and network connections of Windows XP and Vista and informs the user about the existing security risks with the help of log files. The program doesn’t require installation and can also be run directly from a USB stick. Just run the program, set the Filtering slider to Risk level (level 7 to 9) and if you find any files marked in red, you need to check it before removing it. Sysinspector can not delete a suspected file, so make a note of the displayed items and remove it manually. Before removing any suspected files, it is wise to check the file really a malicious one. You can use RunScanner for this.

A-squared HiJackFree-a detailed system analyzing tool

A-squared HiJackFree is a system analyzing tool which helps you detect and remove all types of HiJackers, Spyware, Adware, Trojans and Worms from your computer. Meant to advanced users, this free tool allows you to control all kind of Auto-run programs from your computer, view and mange open ports and the processes, manage running process , view all DNS entries in the host file, control Windows explorer and browser plug-ins ( BHOs, Toolbars, etc) and more. a-squared HiJackFree processes section lists all processes with detailed information about each process. You can filter out trusted process and can be delete unnecessary processes. The port section shows open ports and the processes which listens on the ports so you can quickly see which processes must be shut down to close a specific port. From the auto run section you can view and edit all auto-run entries. More than 30 different auto-run locations are displayed and can be edited as well. It also shows auto-runs in files lik...

Permanently wipe out data from your Hard disk with Hard Drive Eraser

Hard Drive Eraser is free program for Windows that permanently wipe out all data from your hard disk by filling the magnetic surface multiple times with a useless binary data. So you can discard your hard drive or resell your PC with out any fear, no one can recover your personal or important data from it. The program works with Windows XP and Vista and doesn’t require any installation. Just double click the Hard Drive Eraser exe file and select a drive (this is the main defect of this program. There is no option for erasing data from the whole hard drive; you need to select individual partitions one by one.), select a shredding scheme (DoD5220-22M is recommended scheme, Gutmann is more secure, but processing is slow) and click on ‘start’ button. Why this program? Just formatting a hard drive is not able to destroy all data. It is very easy to recover all data using either commercial solution or one of applications for data recovery. So, for a security reason, this type of tool is ...

Download Free PDF edition of Ubuntu Pocket Guide and Reference e-book

The Ubuntu Pocket Guide and Reference (written by Keir Thomas) is an easy to understand reference guide to Ubuntu , the free Linux operating system. In seven chapters it explains the essentials of day-to-day Ubuntu administration in a very simple manner. Installing Ubuntu, with in Windows, on a dual booting system, on a virtual machine, on an Apple Mac, installing drivers, software, sound, Bluetooth, installing printers, scanners, removable media, etc. etc are very neatly described in this book. The PDF Edition of Ubuntu Pocket Guide and Reference is available entirely free of charge. It is practically identical to the Print Edition. You can download the free e-book from here .

Find out how virus infects your computer

There might be a potential weak spots on your computer through which viruses or hackers can get in to your hard disk. It may be your security programs, firewall, browser or any installed software. Here is a simple program for checking your computer security against viruses, spyware and hackers. It is especially useful, for instance, if you have found and cured a virus infection, you may also want to find out how they could get in to your computer. PC Security Test is a free program that helps you to test this. It simulates different attacks on your computer and monitors the responses of your protection software. So the users can easily control the efficiency of their protection software such as anti-virus programs, spyware scanners and firewalls. After installing (while installing just ignore your security program’s warning) the software, run it and click on ‘Standard checks’, then ‘Start’. If your Anti-virus program or Firewall reports the attack, it is a good sign. If the security p...

USB Stick Watcher

USB Stick Watcher is a reminding and error checking software for USB pen drives. It reminds you in frequent intervals (45 minutes to 3 hours, according to your settings) about the status of your USB pen drive, if your pen drive is still plugged in a computer. This is useful for people who transfer their data across different computers or using a public computer, as leaving it unplugged may pose a security risk especially when you are using public computers. USB Stick Watcher also checks for disk errors. Moreover it will show a warning message every time when you try to turn off your computer, or log off without unplugging your pen drive. So that this program will ensure that you never leave your USB Stick plugged in to a computer, as leaving it unplugged may cause a confidential file theft especially when you are using public computers.[ via ]

Microsoft officially released Internet Explorer 8 RC1

Before releasing the final version of their new web browser Internet Explorer 8 , Microsoft has just released the Release candidate version (Internet Explorer 8RC1) and is available for download from Microsoft download center. This new version provides many security features such as InPrivate Browsing , Smart Screen filter (helps to detect phishing websites and protect you from installing malicious software or malware), pop up blocker , InPrivate Filtering (helps you prevent websites from sharing your browsing habits), etc for your security and privacy. At first look it seems to be a perfect browser and provides many advanced features. With the new ‘Safety’ button you can very easily access and control security and privacy features such as SmartScreen Filter, InPrivate Browsing, Inprivate filtering, Windows update, deleting browser history, etc Even though Microsoft has not said any thing about the final release of their new browser; it is expected to be released later this year. Us...

Beware of Total Defender- new rogue anti-virus software

Total Defender is the latest rogue anti-virus program appeared on the Internet that pretends to be real security software for Microsoft Windows Vista and XP confusing the users to make them buy it. [Be careful about such rogue antivirus software. Such fake security programs (for example Antivirus 2009, Spyware Guard 2009) are circulating over the internet these days] The Total Defender site looks as shown below. Get more information and solution for removing it (if you are a victim) from Panda lab and Sunbelt .

MS Office 2003/XP Add-in for Removing Hidden Data (Meta data)

Remove Hidden Data is an add-in to MS Office 2003 /XP that allows you to remove personal or hidden information (Meta data) from your Microsoft Office application. Meta data includes document properties and history - things you deleted from the documents, your name and initials, name of your computer, name of the network server or hard disk where you saved the document, the name of previous author, hidden text, tracking comments, etc which are hidden in the document. From a security standpoint you wouldn’t want to share these data with others (when you send these documents electronically). With this add-in you can permanently remove all these hidden data from MS Word 2003/XP, Excel 2003/XP, and PowerPoint 2003/XP files. Download ‘ Remove Hidden Data ’ add-in from Microsoft and install it. After finishing your document, save it (preferably in a different file name). Open, for example Word, click ‘File’ menu and select ‘Remove hidden data’. Select the document for removing Meta data and ...

Comodo free online scanner

Comodo AV Scanner is an online free service that lets you find out whether your computer is infected with viruses, spyware and malware. Almost every anti-virus program developers have their own online scanner; this one is also quite effective and very easy to use. It works with Internet explorer 6 and 7 (ActiveX enabled) and performs an in depth scans of every hard drive and files on your computer. Heuristic analysis method (behavioral detection) finds unknown threats also (of course there is also ant- heuristic technique among virus code writers to hide their code). Moreover it constantly updated with the latest virus definitions so that it can also detect latest viruses. [The scanner requires the download of a small ActiveX control to scan your computer]

Protect your computer from virus infection through USB pen drives

You might hear about the latest computer virus Conficker ( aka Downup, Downadup and Kido. If infected it disables many system services like computer Automatic Update, normally difficult to find out ), which is widely propagating through networks and USB drives. One of the main causes of virus infection is careless use of pen drives (USB sticks). Because of its auto run feature, virus can easily get in to your system. Here is a freeware zero-configuration program –Ninja designed to protect computers from virus infection through USB pen disks. Simply download (679Kb) and run it. It sits quietly in the system tray. Whenever a USB pen disk is inserted on the computer, ninja will examine it to uncover the commonly malicious or virulent files known as "autorun.inf" and "ctfmon.exe" amongst many others. Besides removing known virulent files, this tool will also immunize your pen disk and create a folder called autorun.inf with special protection permissions to protect yo...

Vit Registry Fix-Windows Registry Cleaner and System Optimizer

Vit registry fix is an easy to use powerful suite of utilities that allow you to make your Windows XP or Vista computer faster and more efficient. There are five useful modules in this optimization tool such as Registry Fix, Registry optimizer, Disc cleaner, Start up manager and an Uninstall manager. Moreover it gives a full backup mechanism for any repaired files (for registry), so that you can use it confidently. Vit registry fix has a simple interface and very easy to use. The installation process is also quite simple. After installation just run the program. The default window is Registry fix window- you can scan and fix for registry errors from this window. It automatically back up all repaired files, you can always restore it from the 'Rescue Center' , if any problems found. From the ‘Tools’ tab you can access other tools: - Registry optimizer – It eliminates all structural mistakes and defects. - Disc cleaner – Cleans temporary files, old prefetch data and other unused...

Free link tracking service

Click meter is a free service for monitoring clicks on your links. It allows you to check how many users are clicking on a particular link, how many times they click, where those user are coming from, etc. Implementation of this online tool is also simple. Just give a link you want to monitor and your email address, in a few seconds you will receive an email with another link for tracking. Publish this new link on your website (email, forum, blog, etc.) instead of publishing your original link. When a user clicks this link, he / she will be redirected to your destination link, the redirection is immediate and during this action ClickMeter will collect the data necessary for its analysis. There is also a paid version of ClickMeter that adds many important features to the free service and does not contain ads. [ via ]

Ad-Aware anti-spyware Anniversary Edition for free download

Lavasoft released an anniversary edition (2009 marks their 10th anniversary ) of their world's most popular anti-spyware, Ad-Aware, which is available for free download. This new FREE anniversary edition (8.0) has a neat interface and comes with real time protection , Track Sweep an utility to remove traces of web browsing in Internet Explorer and Firefox., Windows context menu inclusion for easy file and folder scanning, five different skins , etc. Moreover, like its previous version Ad-Aware utilizes only a little system resources and protects you against identity theft, online fraud, and other cyber crimes. The Windows context menu option makes every one to analyze Files and folders very quickly. Features of anniversary edition free version: >> Ad-Watch Live – Real-time process protection blocks malicious processes and infected files that try to start or run on your system. >> Comprehensive Malware Protection – Protection against spyware, Trojans, rootkits, hija...

Check your Windows XP /Vista boot time and speed up it

BootRacer is a free tool for checking computer boot time. Normally a typical computer takes less than a minute for booting and it is depends on many factors. If your computer takes more than one minute you need to speed up your computer boot. A total boot time s a time since your computer started till the Windows desktop appears and your computer is free for using. BootRacer waits for continues 10 seconds interval when the CPU activity is less or equal than normal. The Excellent boot time is less than one minute. If you Boot Time more than 3 minutes you should check your Windows startup and remove useless software using programs like Ccleaner. Download it from here Supports Windows XP/2003/Vista/2008

Batch delete empty folders with RED (New version available for free download)

Installing and uninstalling lots of freeware programs on a computer create or left many empty folders. Moreover there might be many empty folders created by you also left undeleted. If you have many of them it might slow down your computer and takes hard drive space. Some of them might cause problem to other programs also. Cleaning or deleting them one by one also is not an easy task. Here is a great free program for batch deleting empty folders. RED (Remove Empty Directories) from Jonasjohn.de searches for empty program files folders or any folders from your computer and safely deletes it, thus saves your hard drive space. Using this program is also simple. After installation run it. Select a directory, e.g. ‘C’ for scanning and click on ‘Scan folders’ button. After scanning finishes click on ‘Delete folders’ button to delete. You can also define some custom rules for keeping and deleting folders from ‘Settings’ tab if necessary. The program will not touch registry keys or system fi...

A new service to scan webpage link for harmful threats

No doubt, everyone is depended on internet everyday for different reasons. In recent times the increase in cyber threats are also very high. Hidden threats, unwanted contents and other illegal things are dominating the net. Before visiting a suspicious URL, knowing about its activities is very useful, because, whatever security precautions you have been taken; still there is a chance to an attack just by clicking on a link from such web sites. Here is a new service ‘ Online Link Scan ’ that scans a web page link for any threats. Just entering a web page URL, Online Link Scan analyses it and provides a detailed report. According to the site “The mission of Online Link Scan is to not only make the internet safe for web surfing; but they are also dedicated to eliminating the threats that exist within legitimate links and so as to give those websites, those that have something genuine to offer to the general public, a safe and reputable standing, giving web surfers and developers alike pea...

Discover and close open ports and suspicious processes very easily

Seeing and verifying an open port of a computer is always useful, because malicious programs transfer sensitive files from a computer to the web via open ports. Here is a simple method to find out whether there is an open port in your computer or which process opened this port for transferring data. And you can close unwanted open ports and kill suspicious process also. CurrPorts from Nirsoft is a tiny application that displays the list of all currently opened TCP/IP and UDP ports on your computer and gives information about the process that opened the port , including the process name, full path of the process, version information of the process, the time that the process was created, and the user that created it. This program automatically marks suspicious TCP/UDP ports owned by unidentified applications with pink color. So that you can easily veryfy and close unwanted TCP connections, kill the process that opened the ports. [ You can also do these without software, by the command ‘...

A new worm spreads rapidly (disables important Windows services and blocks antivirus packages)

Recently security companies like Kaspersky, Symantec, PandaLabs, F-Secure, Bitdefender, etc have discovered a new worm known as Win32/Conficker worm which propagates rapidly by exploiting a critical vulnerability ( MS08-067 ) in Microsoft Windows ( See details here ). The threat is considered to be critical and it disables several important system services and prevent Anti-virus package from functional mode work. This worm has some other variants also such as W32.Downadup, Win32.Conficker.A, W32.Downadup.A, Conficker.A, Net-Worm.Win32.Kido, etc. It infects other computers across a network by exploiting the Windows Server service (SVCHOST.EXE) vulnerability and also spreads through USB Drives, external hard drives and MP3 players. Moreover this worm constantly updates by downloading new versions of it onto infected machines and keeps itself memory resident and is difficult to cleanup. The worm infects - in computer that has no latest security updates, in shared systems with weak passwo...

Extract text from a PDF file

Conversion from PDF files to text file is not all that simple. A PDF file is a complex one; difficulties arise when there are complex layouts, overlapping elements, etc. The text recognition software analyses the picture and text of the PDF and creates a text document. The main disadvantages of this kind software are we can not expect a 100% conversion. Here is simple, free tool for converting PDF file to text document. A-PDF Text Extractor which is designed to extract text from Adobe PDF files for use in other applications. However, to extract text from a PDF file, the PDF file must meet the following conditions: The file is formatted to contain text and not just images and the file contains no security restrictions which disable text selecting. Using this program is simple. Download and install it. Run the application and open a PDF file to extract. There are three mode of output text: In PDF Order, Smart Rearrange and With Position. Select any of this from the ‘Option’ menu and ...

Free Privacy Sweeper

Violation of a person’s privacy is a common occurrence nowadays, traces of your surfing habits left behind on a computer, especially on public terminals, cookie tracks and traces of other computer activities are common practices. As privacy has prime importance we need to take extra care in order to protect it. Free Window Sweeper is a free privacy tool for cleaning up the history of your activities on a computer. It allows you to remove Internet and computer traces, browser history, cookies, index.dat files, typed URLs and more with a single click. It also offers support for many 3rd party applications Such as Firefox, Opera, Real player, etc and can clean custom file, folder or registry locations. It also has a cookie keeper and has a secure deletion method to completely eliminate all traces of the deleted data. The application not requires any advanced knowledge to operate. After installation just select what you want to clean from program’s window. Then click ‘Test’ and then ‘Clea...

Find out how hackers steal information from your computer?

Usually malicious programs transfer sensitive data from your computer to the hackers through the open ports of your system (an open port always results in security loopholes). Using a port scan and with the help of Process Explorer tool you can easily discover who is sending information from your computer. To find out an open port, you will need to carry out a port scan. Open the Command Prompt from ‘Start | Run | cmd.exe’ and enter the command netstat -ano and hit ‘Enter’ (e.g. C:\Documents and Settings\Administrator>netstat –ano).This will list all currently active network connections. To know if any port is open for data transferring, look the note under ‘State’. For example, see under ‘Foreign address’ (Remote address) column. If the value of the field is ‘0.0.0.0:0’ then no one can send data through these ports. If you find an IP address instead, you need to verify the program with the help of the displayed process ID (numbers shown under PID). The best tool for finding this i...

A tiny color picker tool for free download

Colorpad is a tiny (81Kb) portable application designed to assist graphic designers of all sorts, from beginner to expert in their development of computer graphics. ColorPad can capture colors from the screen, or generate them on the fly. How to use it? Just download , unzip and run the program. To get any color currently on the screen, left-click on the color screen (program window) and hold down the left mouse button until the cursor turns into a crosshair (+). At this point, you can now move your mouse over any part of the screen while still holding down the left mouse button. The bottom part of ColorPad's color screen will be updated with the color currently under the crosshair, and that color's value will be displayed in the text fields. Once you find the color that you decide (hex, decimal or floating point), let go of the left mouse button and the color will be successfully loaded. Program Features: Supported Color Format: Hexadecimal (RR GG BB, mainly for webpage),...

FingerPrint – Detects file changes in system directory

Finger Print is a kind of security software for Windows that let's you check if any file in a directory have been created, deleted, or modified since its last scan. This is useful for checking if a program, for instance viruses and Trojans, has changed a system file (In Windows system 32 directory where viruses are usually hang). The use of MD5 checksums guarantees detection of any file changes. FingerPrint can also be used to find duplicate files, search for files with a specific MD5 value, and save MD5 values to file (and compare with). With its integration with the Windows Task Scheduler, you can automate your scans, e.g. scan your Windows directory every night. How to use it? After installation run FingerPrint and create a profile. There are two types of profiles - ‘Hash file in a directory’ and ‘Group profile’ (a group profile is a collection of profiles, so you can perform many scans at one time). Select Hash files in a directory and create a profile by giving a name. Next, ...

Get all information about Mozilla and its products from one location

All information relating to Mozilla and its products are distributed through blogs, newsletters, wikis and other resources. But now you can have all that information in a centralized location at Lizard Feeder. The Lizard Feeder is a compilation of data feeds representing activity within the Mozilla community. This feed aggregator updated every moment. The LizardFeeder presented by Mozilla Web dev shows all available resource updates such as codes , add-ons, discussion, blogs, etc, but the user can choose the most appropriate one like review of wiki, code repositories, blogs, discussions, microblogs like Twitter, bookmarks or events. And also, from the options tab you can view the information from a specific date and can vary the speed of update like x1, x25 or x50.

Backup all important files automatically with Fbackup

FBackup is an automatic backup software for Windows which is very useful for saving important data from losing because of a hard disk failure, system crashes or virus infection. Performing a manual back up everyday is not always practical and it takes a lot of time. Using FBackup you can easily backup important files to any local or network drive and removable media such as USB or Firewire drives automatically. Using this software is quite simple. After installation, you can define the back up job using the wizard mode. Firstly select a location to save the file, then add a file or folder or select one from the drop down list. Next, select mirror mode (a mirror backup is identical to a full backup, with the exception that the files are not compressed in zip files and they cannot be protected with a password) or full mod (Full backup is the starting point for all other backups and contains all the data in the folders and files that are selected to be backed up). Then select the mode...

Microsoft released a security update for Windows

As part of its normal update cycles, Microsoft plans to launch the first security bulletin of the year on next Tuesday, 13 January 2009. As per the advance notification bulletin report , this month, Microsoft plans to release only a security patch to its operating systems. It was 8 updates on December 2008. Although, Microsoft did not offer many details by this time, this might be a critical vulnerability that could be exploited by executing the arbitrary code. The affected versions of Windows are Windows 2000, XP, Vista and Windows server 2008. Moreover, Microsoft will release an updated version of its Malicious Software Removal Tool for download. Both the security updates and Malicious Software Removal tool are available from Microsoft download center .

Beware of fake CNN news site which steal your financial information

The RSA FraudAction Research Lab has discovered a social engineering scam which redirect users to a fake news site looks like CNN.com (see the image below). This scam site first sends legitimate like email (see the image below)to the internet users asking them to view the latest news coverage on Israel-Hamas conflict in Gaza. If you click on this link it will redirect to a fake CNN like website. This fake webpage includes another link which appears to be a legitimate video. When visitors click on the video to view, an error message popping up and ask them to install the latest Adobe Flash Player 10 to play the video. If you click to install flash player, it will download malicious software and installed a Trojan on your computer. Fake email Fake CNN site The Trojan that is launched when the link to the fake software installation is accessed is called a Trojan “SSL stealer” that captures financial and personal information of the infected user found on their computer. More information.....

Download SafeSpace and prevent malware

SafeSpace is an internet security product which isolates your favorite internet applications such as Web browser, Instant Messengers and File sharing applications in a virtual sandbox which prevents Malwares like viruses, spyware, root-kits, Trojans, Key loggers and bots from infecting your computer and stealing your confidential information. As everyone knows, cyber criminals are engineering new technologies which target internet applications and web content, exploiting browsers and documents without trace. Firewalls, Antivirus and other traditional counter measures are no longer capable of protecting against this new breed of financially motivated threats. So we have to think more than an Antivirus or a Firewall. SafeSpace can have: Isolate internet applications in a virtual barrier Contain all viruses, Trojans and any other form of internet Malware Protect all private information from Spyware Block all Rootkits and Key Loggers Preserve your computer configuration Browse any website...

Identity Finder free edition now available for download

Identity Finder is a security program that will find out unprotected instances of passwords, credit card or debit card numbers and other personal information that existed without your knowledge in files and hidden areas of your computer. Identity Finder also includes complete tools for protecting such personal information such as Hidden web data security tool, File shredder tool for completely deleting files and folders and Password vault for encrypting your personal data. Identity Finder Free edition provides following benefits for consumers: Identity Finder for free will determines whether or not Credit Cards, Debit Cards, and passwords exist on your computer in an unprotected manner. You may then take action to secure anything you find. Browser clean up tools : Remove personal information from your web browsers (Firefox and Internet Explorer). File shredder : permanently delete any file or folder on your computer Password vault : This tool allows you to securely store and manage...

Windows front-end for MPlayer

MPlayer is one of the best media player applications in the world, which is also very different from common Windows players. What makes MPlayer different? You need not install a third party codec packs for playing different media files. Of course, VLC player can handle all these, but what is different about MPlayer is its command line interface, you can control everything via the key board. Originally designed for Linux systems, MPlayer for Windows has available for download from various sources. MPUI-HCB is one such application which is an easy-to-use Windows front-end. You can play hundreds of different video and audio formats, including MPEG-1, MPEG 2, DivX, H.264, MP3, Ogg Vorbis and AAC. It playback different files, network streams and supports drag and drop ( drag and drop a media file to the desktop short cut), multiple audio and subtitle tracks on DVDs, lyric in rar, 7z, zip and multi-volume archive. You can download latest version of MPUI-HCB from here . Installation is just l...

Complete Windows 7 Transformation pack for Windows XP

Windows 7 is the upcoming operating system by Microsoft. The beta version of Windows 7 has already been released for beta testing and it comes with many new features and visual styles like Vista. If you like to have visual style of Windows 7 on your Windows XP machine, here is a complete skin pack (transformation pack) for free downloading. Seven Skin Pack 2.0 Ultimate is a complete Windows 7 transformation pack, no other files required to download. It supports all Windows XP (32bit) editions, 2003, Media center and Tablet PC editions. Seven Skin Pack 2.0 Ultimate is developed by a Deviantart user and can be downloaded from here. See more screen shots here .

Panda Antivirus GUI front-end

This is a graphical user interface (GUI) for the free Panda Antivirus Command-Line scanner (PAVCL). Using the Panda Antivirus GUI, anyone can easily scan and remove malware, spyware, dialers and hacking tools from your computer. This free little tool allows configuring the scan, updating the signature database, selecting what you want to scan and launch the scan without any difficulty. However, the installer does not include a signature file (pav.sig) for size reasons. You can download a free signature file from the developer’s page. However within the PAVCL GUI utility you can enter your registered Panda Customer ID to download updated signatures on-demand. Using this tool is simple. Download the installer (2.45Mb) from http://research.pandasecurity.com and install it. (Supports Windows XP only and required .NET frame work 2 installed on your PC). Download and unzip the signature file (pav.zip). Copy and paste this signature file ( pav.sig ) in to pav installed directory (normally C:...

Vistalizator – To change display language (MUI or LIP) in Vista

Vistalizator is a free application that allows to change display language (MUI or LIP) in Vista Starter, Home Basic, Home Premium and Business editions (32 bit and 64bit), that is very easily. This is mostly useful, if for example, you buy a Vista laptop from abroad and want to change its display language to your mother language. Vistalizator is small, just 642Kb in size and no need to install it, just run it. The program runs both Windows 32bit and 64 bit systems. Using this program is also very easy, download Vistalizator and Microsoft language packs, run the app and selects a language pack(s) to install. Features of this new version Supports 36 MUI languages: most of them provide full translation of user interface Supports 40 LIP languages: they can be installed upon installing their parent MUI language Multiple languages can be installed at a time Built-in conversion is used for MUI language packs in EXE format Built-in file integrity validation is used when loading language pac...

Speed-up Windows right click menu

Mmm is a tiny application that lets you customize your windows context menus (right click menu) in a very simple manner. Because of a growing list of applications that one uses, almost every application adds one or two items on to the context menu. This results in a long list context menu which has a lot of stuff you don’t even need. Moreover it takes longer to load when right clicking on a file. This freeware application lets you configure any right-click menu, no matter which file you right-click on, just by dragging and dropping. You can remove menu-items you never use (like third parties advertisements) or put rarely used functions out on a sub-menu. How to use it? Download (857Kb) and install it. Right click any file or items. You can see a colored bar in the right-click menu. Drag menu-items you never use to the Hidden items and drag the items you use occasionally to the Rarely used sub-menu (see image). Keep only those items you often use in the root-menu (the left side). Click...

Vertor- Helps to avoid virus infected, fake torrent files from downloading

BitTorrent sites are very popular among users, but one important disadvantages of BitTorrent sites are, downloaded file often might be a fake, virus-infected, DRM-encrypted or password-protected one. This discourages users from using torrent protocol. Users had to spend their valuable time to find a good quality torrent file to download. Vertor (short for ‘verified torrent’) is a new torrent site that provides users with links to verified torrent files. The site checks each file for viruses, DRM protection or password protection. More over, Vertor takes several screenshots of a video file, so the users can verify the original video before downloading it. Likewise, users can preview 20 seconds of the audio tracks, to avoid downloading the wrong music files. [ Via ]

UltraSurf Firefox add-on

UltraSurf is a popular, free proxy software that enables users to surf the internet anonymously. This is useful in countries with heavy Internet censorship to visit any public web sites. Users in countries without internet censorship can also use it to protect their internet privacy and security. But, one of the disadvantages of UltraSurf is that, when browsing with Firefox browser it does not change your IP address automatically, instead you need to change the settings manually. Now it is possible with this Firefox add-on. How to use it? First of all download (442Kb) and install UltraSurf software from here ( No installation required, just double click the exe file when needed ). Then download (23Kb) Ultrasurf Firefox add-on and unzip it. Open Firefox browser and drag the wjbutton_en.xpi file to Firefox window. Click the "Install" button to install it. The UltraSurf icon / text will show at the right-bottom of the Firefox window. Close all Firefox windows and re-open Fir...

Browser Security Handbook from Google

Google has released a Browser Security Handbook intending to provide additional help to web application developers, browser engineers, and security researchers. This hand book gives a one-stop reference to key security properties of contemporary web browsers. According to this book “Insufficient understanding of these often poorly-documented characteristics is a major contributing factor to the prevalence of several classes of security vulnerabilities” . The Handbook covers all major browsers, such as Internet Explorer, Firefox, Apple Safari, Opera, Google Chrome and Android embedded browser. The content of Browser Security Handbook divided into three main parts, such as ‘Basic concepts behind web browsers, Standard browser security features, and Experimental and legacy security mechanisms’. You can read or download the book from http://code.google.com/p/browsersec/wiki/Main . [ via ]

Get free Parallels Workstation Virtualization Software for Windows and Linux

Parallels Workstation is an easy to use, powerful virtualization software (like VMWare) that lets you run multiple operating system side-by-side on a single PC without rebooting. You can run Windows XP or Linux from your Windows Vista machine or vice-versa, without suffering from loss of speed. Virtual PC boot up quicker than normal PC, because not all hardware need to be initiated on start-up. Virtual machine technology allows users to install any operating system in the virtual machine, no matter what operating system is installed on your computer. The guest operating system and its applications are isolated inside this virtual machine and share physical hardware resources with the primary operating system. Switching between operating systems does not require rebooting and it consolidate and virtualizes a computing environment which reduces hardware costs, lower operating expenses and increase productivity. "Parallels Workstation has a sophisticated virtualization engine that ...

Windows Registry back up

The registry is one of the most important parts of Windows Operating system. Any corruption to it can prevent Windows from even booting up. It is sensible to back up the registry periodically. Using Regbak you can back up your Windows system registry quite easily. You can later restore it any time you want if your Computer malfunctioning. Using this tool is very simple. Download it from http://www.acelogix.com/regbak.html . Run the exe file (no installation required). Select a destination folder. The default backup folder created is 'Regbak' inside your 'Windows' folder. Now, select the 'Registry Hives' to backup. By default, the 'System' and 'Current User' hives are selected. You can instruct the program to backup the rest of the hives also by enabling the 'Other Available Hives' option. Now click 'Next'. This will take you to a confirmation page. Click 'Start' to begin the backup process. After successfully saving the R...