Friday, February 26, 2010
OPHCrack LiveCD
Lost password in Windows? Or want to know someone else that will help you OPHCrack LiveCD - specialized distribution, built on SLAX 6 and containing utility ophcrack, known for its unique features. Namely - hacking alphanumeric passwords OS Windows XP / VISTA
OPHCrack XP LiveCD 2.3.1 - Selection of Passwords
Year: 2009
Genre: Selection of passwords
Version: 2.3.1
Developer: Objectif Securite
Platform: Windows XP / VISTA
Language: English
Tablet: Not required
File size: 415 MB
Features:
»Runs on Windows, Linux / Unix, Mac OS X, ...
»Cracks LM and NTLM hashes.
»Free tables available for Windows XP and Vista.
»Brute-force module for simple passwords.
»Audit mode and CSV export.
»Real-time graphs to analyze the passwords.
»LiveCD available to simplify the cracking.
»Loads hashes from encrypted SAM recovered from a Windows partition, Vista included.
»Free and open source software (GPL).
OPHCrack XP LiveCD 2.3.1 - Selection of Passwords
Launch:
1) Write the appropriate ISO image to disk
2) After the recorded disc was bootable!, Reboot your PC, a menu OPHCrack LiveCD
3) Choose Ophcrack Graphics mode (or simply wait 8 seconds, it automatically downloaded)
4) OPHCrack show each user's password.
5) remember (or write) take out the password disk, restart PC and now you can sign in under the user that you needed!
6) If you do not run OPHCrack, it must be in the BIOS to put on the 1st place of loading CD / DVD
OPHCrack XP LiveCD 2.3.1 - Selection of Passwords
Code:
http://rapidshare.com/files/337384018/ophcrack-xp-livecd-2.3.1.part1.rar
http://rapidshare.com/files/337386261/ophcrack-xp-livecd-2.3.1.part2.rar
http://rapidshare.com/files/337388495/ophcrack-xp-livecd-2.3.1.part3.rar
http://rapidshare.com/files/337390729/ophcrack-xp-livecd-2.3.1.part4.rar
http://rapidshare.com/files/337391422/ophcrack-xp-livecd-2.3.1.part5.rar
ppt to PDF Converter 1.0.4.1
Image
Moyea PPT to PDF Converter 1.0.4.1 | 7.97 Mb
Moyea PPT to PDF Converter (PowerPoint to PDF) is a smart, integrated PDF creation program that converts most printable Windows applications including Word, Excel & PowerPoint to PDF file in one mouse click.
The software goes beyond what its name suggests as PPT to PDF. It can enable users to quickly save their PPT data onto protective PDF files. Also, it works well in creating a standard PDF file from Word, Excel documents.
With an intuitive interface and powerful settings, the PPT to PDF converter offers an easy access for both novice users and professionals to produce PDF files from Windows documents, and thus makes it flexible to save, print and email their contents.
Input Variety
Capable to convert 3 printable Windows Office documents - DOC, XLS & PPT to accessible PDF files.
High Compatibility
Convert PowerPoint to PDF files that supported by Adobe Acrobat 3.0/4.0/5.0.
Flexible Settings
Supply a series of custom settings for the PPT-to-PDF conversion, including output resolution, page compression, color modes, font embedding and several misc functions.
Easy to Navigate
The PPT to PDF converter is designed with a simple yet practical interface to guides users best in creating a professional PDF file.
Excellent Output
Reproduce the original look of Office documents in PDF. Retain razor-sharp images from your PowerPoint presentation into the output PDF file.
Smaller PDF Size
Support page compression of the converted PDF file for a much smaller size. Save the space on your disc and make it more accessible via Web.
PDF Security
Convert Word, Excel and PowerPoint documents to PDF files that are password protected. Offer a shortcut for you to control over the converted PDF files, e.g. should it be viewed, printed, modified, copied, and annotated or not.
Auto-open after Conversion
Allow the PDF file out of PowerPoint, Word and Excel document to open automatically once processed. Save your time and effort to find it at the specified folder on a hard drive.
WEB:
Code:
http://www.dvd-ppt-slideshow.com/ppt-pdf-converter/
Download
Code:
rapidshare
http://rapidshare.com/files/316516038/Moyea_PPT_to_PDF_Converter_1.0.4.1.rar
megaupload
http://www.megaupload.com/?d=CO2QNDK2
hotfile
http://hotfile.com/dl/19546848/e490db4/Moyea_PPT_to_PDF_Converter_1.0.4.1.rar.html
Antivirus for USB Flash Disk
Antivirus for USB Flash Disk
By means of the given set of antiviruses-scanners you can check up your system on presence of viruses.
All programs work without installation, from any replaceable carrier. The given set covers all spectrum of virus dangers.
include :
Ad-Aware SE
Avira Antivir
AVAST!
McAfee Virus Scan
nod32AntiVirus
ClamWin
http://rapidshare.com/files/88775068/Antivirus_for_USB_Flash_.rar
TeamViewer
Tuesday, February 16, 2010
ADRecycleBin
ADRecycleBin
ADRecycleBin.exe (Active Directory Recycle Bin) allows administrators to quickly restore deleted Active Directory objects via an easy to use GUI (Graphical User Interface). This is a free Active Directory Recycle Bin tool.
If you or a colleague happen to mistakenly delete an object in Active Directory the results can be disastrous. ADRecycleBin allows administrators to quickly find and restore deleted objects in Active Directory. If you are running Active Directory in Windows 2008 R2 native mode you can enable the Active Directory Recycle Bin. If you are running Active Directory in an earlier mode you can re-animate deleted objects.
Features
- Supports Windows 2008 R2 Active Directory Recycle Bin technology
- Supports Object reanimation in earlier versions of Active Directory
- Review deleted objects
- Restore multiple objects at the same time
http://www.overall.ca/index.
What is Phishing ?
What is Phishing ?
Phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by appearing as a trustworthy entity in an electronic communication. eBay, PayPal and other online banks are common targets. Phishing is typically carried out by email or instant messaging and often directs users to enter details at a website, although phone contact has also been used. Phishing is an example of social engineering techniques used to fool users. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical measures.
Recent phishing attempts have targeted the customers of banks and online payment services. Social networking sites such as Orkut are also a target of phishing.
Spoofed/Fraudulent e-mails are the most widely used tools to carry out the phishing attack. In most cases we get a fake e-mail that appears to have come from a Trusted Website . Here the hacker may request us to verify username & password by replaying to a given email address.
TECHNIQUES BEHIND PHISHING ATTACK
1.Link Manipulation
instead of http://www.microsoft.com/
2.Filter Evasion
Phishers have used images instead of text to make it harder for anti-phishing filters to detect text commonly used in phishing emails. This is the reason Gmail or Yahoo will disable the images by default for incoming mails.
How does a phishing attack/scam look like?
As scam artists become more sophisticated, so do their phishing e-mail messages and pop-up windows. They often include official-looking logos from real organizations and other identifying information taken directly from legitimate Web sites. Here is an example of how the phishing scam email looks like
These copycat sites are also called “spoofed” Web sites. Once you’re at one of these spoofed sites, you may send personal information to the hackers.
How to identify a fraudulent e-mail?
Here are a few phrases to look for if you think an e-mail message is a phishing scam.
“Verify your account.”
Legitimate sites will never ask you to send passwords, login names, Social Security numbers, or any other personal information through e-mail.
“If you don’t respond within 48 hours, your account will be closed.”
These messages convey a sense of urgency so that you’ll respond immediately without thinking.
“Dear Valued Customer.”
“Click the link below to gain access to your account.”
Notice in the following example that resting the mouse pointer on the link reveals the real Web address, as shown in the box with the yellow background. The string of cryptic numbers looks nothing like the company’s Web address, which is a suspicious sign.
print spooler problem
Print ques stackup there and show's deleting and it never does and we get to reboot PC to get through it and user is screaming for rebooting...
If you've ever had a print job hang, you're probably familiar with the Windows Print Spooler window. You get to this window simply by selecting the relevant printer from the Control Panel's Printers and Faxes applet (simply Printers in Vista). In the somewhat unusual event of a printer queue jam, you can go to the Print Spooler and simply delete the job. Sometimes, though, the system won't let you cut off print jobs that way: It marks the job "Deleting…" but never quite gets there, and you end up rebooting. But there's an easier way.
Open a command prompt (go to Start | Run, then type cmd) and enter the following:
net stop spooler
del c:\windows\system32\spool\
del c:\windows\system32\spool\
net start spooler
How to rename your Microsoft Outlook Mail Profile
How to rename your Microsoft Outlook Mail Profile
If you are using MS Outlook (any version), you will notice that there is no way to rename the mail profile from Control Panel (see Figures A and B).
Figure A
Figure B
I knew that most of these settings are stored in the registry, so I ran a search for every instance of Profile. I did find where the change was and confirmed my suspicion that this setting can be modified using the registry.
Note: As always, edit the registry at your own risk. Make sure you have a reliable backup of the registry; some erroneous edits could render your system unbootable.
The only way to rename your Mail Profile is through direct editing of the registry.
Figure C
1. Launch Regedit and browse to
HKEY_CURRENT_USER\Software\
2. Now, edit the DefaultProfile key by right-clicking and selecting Modify.
3. Rename the key to how you would like it to appear.
4. Next, right-click the profile you just renamed. It will be located at HKEY_CURRENT_USER\Software\
5. Right-click the profile and click Rename and rename it to the same as above.
6. Close the Registry editor and then re-open the Mail Applet in Control Panel to find that the Mail Profile has been successfully renamed, as shown in Figure D.
Figure D
10 things you should know about USB 2.0 and 3.0
USB 3.0 is here! After long delays and much touted promotion of the new specification, USB 3.0 is now finally available or soon will be on some new ASUS and Gigabyte motherboards. ASUS has also announced an add-in PCIe x4 card with USB 3.0 support, though it is compatible only with its P55 series of motherboards after a BIOS upgrade. Dane-Elec has announced a family of external SuperSpeed SSD drives and add-in card, but you will have to pay a hefty premium for the extra performance.
There is some bad news, though: Intel has announced that it will not include USB 3.0 in its chipsets until 2011. AMD may not support USB 3.0 until 2011 either. That means that USB 3.0 is not likely to go mainstream until then.
Current versions of Windows do not support USB 3.0, but support is expected for Windows Vista and Windows 7 at a later date via an update or service pack. The Linux kernel supports USB 3.0 as of version 2.6.31.
Now that USB has finally arrived, albeit barely, this is a good time to compare the previous USB specifications with USB 3.0.
Note: I have taken great care to verify the accuracy of this information, but USB is complex. If you find an error in the documentation or have additional information, please post it in the forum. The examples in this document all use Windows 7.
This article is also available as a PDF download.
1: USB release dates
USB (universal serial bus) was developed as an alternative to serial and parallel data transfer protocols. USB 1.0 was introduced in January 1996. As you can see in Table A, it has been a long time since the USB 2.0 specification was released.
Table A
2: Changes in USB 3.0
USB 3.0 is one of the most anticipated changes to the PC in years. Here is a summary of the major changes:
- SuperSpeed — New higher signaling rate of 5Gbps (625MB/sec)
- Dual-bus architecture — Low-Speed, Full-Speed, and High-Speed bus plus SuperSpeed bus
- Asynchronous instead of polled traffic flow
- Dual-simplex simultaneous bi-directional data flow for SuperSpeed instead of half-duplex unidirectional data flow
- Support for streaming
- Fast Sync –N-Go technology
- Support for higher power
- Better power management
3: The Low-Speed, Full-Speed, High-Speed and SuperSpeed confusion
There are four distinct data rates - not to be confused with the four USB specifications. Each new major USB specification introduced a new data rate. Table B shows USB data rate types supported by the four USB specifications. Each new USB specification has been backward compatible.
Table B
Table C shows maximum data rates for the four data rate types.
Table C
USB 2.0 does not always mean High-Speed. This is usually, but not always, the case. A device labeled USB 2.0 can operate at Full-Speed instead of High-Speed.
Will this confusing labeling exist for USB 3.0? The USB 3.0 specification supports the three legacy speeds in addition to SuperSpeed. This is accomplished by referencing, not replacing, the USB 2.0 specification. Low-Speed, Full-Speed, and High-Speed devices are USB 2.0 compliant but not USB 3.0 compliant, so a USB High-Speed device should not be labeled as a USB 3.0 device. The USB Implementers Forum (USB-IF) has developed logos for each of the four data rates. Look for these logos when buying a USB device.
You can determine whether your USB 2.0 device is a High-Speed device in the Windows Device Manager (Figure A), although it is not a straightforward exercise. You will probably have to try more than one USB Root Hub before you find the device you are looking for.
Figure A
Open the Device Manager and expand the Universal Serial Bus controllers item. Open the Properties window for a USB Root Hub. Tip: Start at the bottom USB Root Hub.
Next, click the Power tab (Figure B). If the device is attached to this hub it will appear in the Attached Devices section. In this example, I have attached a flash drive and it is displayed as a USB Mass Storage Device. Note that this Root Hub has six ports available — one of them used by the USB Mass Storage Device.
Figure B
Finally, click the Advanced tab to see the USB speed (Figure C). On my system, the top six USB Root Hubs operate at Low-Speed and Full-Speed and the bottom two each operate at High-Speed.
Figure C
4: Actual data throughput
Actual data throughput is usually much less than the maximum advertised USB specification and is a function of many variables, including overhead. Actual throughput in practice is typically up to 35 - 40MB/sec for USB 2.0 and may exceed 400MB/sec for USB 3.0. NEC recently demonstrated its new USB 3.0 controller transferring 500MB in 4.4 seconds or “only” 113.6MB/sec. Symwave and MCCI claim to have demonstrated over 270MB/sec data throughput at the Intel Developer Forum in September 2009.
Bottom line: Don’t expect actual SuperSpeed data rates approaching 400MB/sec anytime soon.
I have a USB flash drive that can read at 26MB/sec and write at 6.6MB/sec and is typical of flash drives available as of late 2009. These data rates are within the actual High-Speed data rate. But Faster USB 3.0 flash drives are on the way that can take advantage of the SuperSpeed data rate.
Most hard disk drives can transfer data faster than 40MB/sec. USB 3.0 will be welcomed by those who like to back up data to an external hard drive or SSD drive or who have any USB device that transfers large amounts of data.
5: Cabling and maximum cable length
During my days at Hughes Aircraft Company, I was always looking for ways to save money. I suggested that my supervisor, who sat in the next cube, share a laser printer with me. But printing over the long parallel cable caused characters to be intermittently printed as the gibberish that is so familiar when data loss or corruption occurs. USB cables have a similar constraint. But unlike my parallel cable problem, there is a solution.
Table D shows the maximum cable and total lengths.
Table D
*The USB 3.0 spec does not detail a maximum cable length, but 3.0 meters or 9.8 feet has been recommended.
A total of six cables can be strung together using five hubs to achieve the maximum total length. In practice, the cable to the USB device counts as one of the six cables, reducing the maximum total length.
If the USB 2.0 five-meter limit is not long enough for your needs, you can purchase one or more USB hubs or special cables. There are two types of hubs: powered and unpowered. Higher power draw devices may require a powered hub.
Longer total lengths can be realized using repeater extension cables and CAT5 extenders for USB 1.0, 1.1, and 2.0. There is also a special class of USB 3.0 cables that contain circuitry to achieve a length of six meters (19.7 ft). The USB-IF Web site recommends a USB bridge to achieve lengths greater than 30 meters.
The USB 2.0 specification for a Full-Speed/High-Speed cable calls for four wires, two for data and two for power, and a braided outer shield.
The USB 3.0 specification calls for a total of 10 wires plus a braided outer shield. Two wires are used for power. A single unshielded twisted pair (UTP) is used for High-Speed and lower data transfer and allows for backward compatibility.
Two shielded differential pairs (SDPs) have been added. Each SDP contains three wires, two for signal transmission and one drain wire. The two SDPs are used for transferring SuperSpeed data allowing for simultaneous bi-directional data flow.
See the Author’s Notes section at the end of the article for a reference to a USB 3.0 cable cross-section diagram.
6: Power
One of the most significant innovations in USB over serial and parallel protocols is the addition of power to the specification. Plug in a USB device and it can be powered from the host computer.
To find the power requirements for USB devices open the Device Manager, expand the Universal Serial Bus controllers item, Right-click on Generic USB Hub as in this example or USB Root Hub (Figure B), select Properties and click the Power tab, as shown in Figure D.
Figure D
More power has been added in the USB 3.0 specification for power hungry devices. Table E shows the maximum amperage per port in milliamps.
Table E
There are four basic power states to accommodate a variety of devices and device states. For information about USB hubs and power, read Greg Shultz’s article Understand and exploit USB topology in Windows XP.
Note: The USB 3.0 specification details more power states, including idle and sleep.
7: Limitations
We’ve already discussed some of the USB limitations:
- Maximum data rates
- Actual data throughput
- Cable length and total length
- Power
There are several other limitations that you should know about.
Though you will likely never find it an issue, there is a 127 device limitation per controller.
Each USB 2.0 Enhanced Host Controller Interface (EHCI) host controller has a 60MB/sec total bandwidth limitation, and the bandwidth is shared by all attached High-Speed USB devices. If, for example, two High-Speed devices like a digital video camera and an external hard drive are in use at the same time, the last High-Speed device attached may operate at a lower data rate or a USB Controller Bandwidth Exceeded error may occur. If you have two EHCI host controllers on your system, you may be able to resolve the bandwidth error by moving one of the High-Speed devices to another USB port. Wikipedia has a list of I/O Controller Hubs with two or more EHCI host controllers.
Want to know how much bandwidth has been allocated for each USB device in Windows? According to this MSDN article, you can check Device Manager, if you use Vista or later:
“Starting with Windows Vista, users can see how much bandwidth a USB controller has allocated by checking the controller’s properties in the Device Manager. Select the controller’s properties then look under the Advanced tab. This reading does not indicate how much bandwidth USB hubs have allocated for transaction translation.
“The Device Manager feature that reports the bandwidth usage of a USB controller does not work properly in Windows XP.”
Figure E shows that three USB devices have been allocated 4% of the bandwidth available for this Universal Host Controller. The Fujifilm FinePix S700 digital camera is a USB Full-Speed device and is therefore listed under one of the Universal Host Controllers and not one of the Enhanced Host Controllers. The USB specification defines four data transfer types: Control, Interrupt, Isochronous, and Bulk. The 10% System reserved value shown here is used for Control and Bulk data transfers and cannot be changed.
Figure E
During system boot-up and when a USB device is plugged in, a process called enumeration occurs. The device is recognized, its speed is identified, and a unique address is assigned. For devices using the Interrupt or Isochronous data transfer types, a specific amount of the remaining available bandwidth is requested, thus guaranteeing that the bandwidth will be available. If the bandwidth is available, it’s allocated, and the device description and reserved bandwidth will be listed on the Advanced tab.
Note: Don’t bother looking for the bandwidth used by a Mass Storage device like a flash drive. This class of USB device typically uses the Bulk data transfer type and is not listed on the Advanced tab.
In addition to any of the System Reserved bandwidth that may be available, devices using the Bulk data transfer mode may use the remaining non-reserved bandwidth. The Bandwidth Used column heading is misleading. The bandwidth is allocated/reserved but may not actually be used.
As you can see in Figure F, ICH9R Southbridge supports six Universal Host Controller Interface (UHCI) host controllers and two Enhanced Host Controller Interface (EHCI) host controllers. The number of UHCI and EHCI host controllers may be different on your system. The ICH9R supports a total of 12 USB ports. The six Universal Host Controllers operate at Low-Speed and Full-Speed and each shares its bandwidth with two USB ports. The two USB2 Enhanced Host Controllers operate at High-Speed and each shares its bandwidth with six USB ports. The Advanced tab shows that 20% of the bandwidth is reserved by each Enhanced Host Controller for Control and Bulk data transfers.
Figure F
Note: There is another host controller type, not shown, called USB Open Host Controller Interface (OHCI) that supports Low-Speed and Full-Speed devices. The name of the new Intel SuperSpeed host controller specification is Extensible Host Controller Interface (xHCI).
8: Connector and receptacle types
There are a number of USB 3.0 connector and receptacle types:
- Standard-A connector and receptacle
- Standard-B connector and receptacle
- Powered-B connector and receptacle (new in USB 3.0)
- Micro-AB receptacle
- Micro-A connector
- Micro-B connector and receptacle
The matrix in Table F shows the types of USB 2.0 and USB 3.0 connectors that will work with USB 2.0 and USB 3.0 receptacles. Note that according to the USB 3.0 specification Table 5.1, the only USB 3.0 connector that will work in a USB 2.0 receptacle is the Standard-A connector.
Table F
A new multi-tiered system has been developed for the extra pins needed for USB 3.0. The Standard-A connector is slightly longer and the receptacle slightly deeper to accommodate the new design. Five pins have been added to the Standard-A connector and receptacle specifically for SuperSpeed transmit and receive data and ground.
The USB 3.0 specification recommends using a blue color scheme for USB 3.0 Standard-A connectors and receptacles to distinguish them from USB 2.0 Standard-A connectors and receptacles.
The USB 3.0 specification includes a new type of connector and receptacle called a USB 3.0 Powered-B Connector and USB 3.0 Powered-B Receptacle. They are identical to the USB 3.0 Standard-B Connector and receptacle, except that two pins have been added for power and ground. It is designed to provide power to a USB device without the need for any other power source. The USB 3.0 Powered-B Receptacle can accept both Standard-B and Powered-B connectors.
The Micro family of connectors and receptacles are defined for handheld devices. Unlike the Standard-A connectors with their elegant design, the Micro connectors and receptacles have a more complex design with two plugs and receptacles sitting side by side — one for USB 2.0 and the other for USB 3.0.
See the Author’s Notes section for references to diagrams for the USB 3.0 Standard-A Connector, the USB 3.0 Standard-B Connector, and the USB 3.0 Micro Connector Family.
9: Hot-swappable devices and data corruption
I can’t write an article about USB without bringing up the issue of data corruption. Removing any USB device capable of writing data can cause data corruption if done improperly. There are three ways to minimize the risk of data corruption:
- Verify write-back caching is off
- Pay attention to device LEDs
- Safely remove/eject device
First, verify that write-back caching is turned off for the USB device. To verify write caching status, open Device Manager and right-click on the USB device. Select Properties from the drop-down list (Figure G). In this example, I am checking a SanDisk Cruzer flash drive.
Figure G
Next, click the Policies tab (Figure H). The Quick Removal (Default) option should be selected. If not, select it to reduce the risk of data corruption.
Figure H
Second, pay attention to device LEDs. Some USB devices will tell you when data is being transferred to or from the device with a flashing LED. Simply put, don’t remove the USB device when the LED is trying to tell you not to.
Third, safely remove/eject device. No doubt you already know how to safely remove a USB device but I am including it to be thorough. To safely remove a USB device in Windows 7, click the Taskbar Notification area Up-arrow and click on the USB icon (Figure I).
Figure I
Click the USB device you want to eject — Cruzer Micro, in this example (Figure J).
Figure J
The Safe To Remove Hardware notification balloon will appear when it is safe to remove your flash drive (Figure K).
Figure K
There is an alternate method for ejecting a USB device that you might not be familiar with. To safely remove a flash drive using Explorer, right-click on the logical drive assigned to the flash drive and select Eject from the drop-down list (Figure L). You can eject attached drives in Explorer, but be aware that more than one drive may need to be ejected.
10: USB downsides
USB can cause problems that can be difficult to debug. For example, on one occasion I was unable to install XP until I disconnected the USB to parallel cable attached to my printer.
USB is so convenient and easy to use, it poses problems in the workplace. Flash drives are the biggest concern to IT managers. Flash drives are so small that they are easy to bring into the workplace in a pocket or purse. The flash drive is a conduit for sensitive or confidential data leaving the office or malware sneaking in.
In addition, people who are conscious of the risks of transferring viruses via a floppy, CD, or DVD don’t think twice about plugging in a flash drive and transferring files to/from home. Perhaps the best solution to this problem is education. Flash drives are banned in some government agencies and companies, though the effectiveness of that policy is questionable. Interestingly, the DOD is partially lifting its flash drive ban.
The final word
USB has been such a huge success that a more than 10 times improvement in speed and an 80% increase in power is almost certainly guaranteed to be just as successful, right? Well, maybe not. Intel’s original conceptual designs for the USB 3.0 cable specified optical fiber cabling to carry the SuperSpeed data. Copper replaced fiber optics in the final USB 3.0 spec, but Intel continues to work on a variation of this design known as Light Peak. It may be available as early as 2010 in Apple products before Intel plans to support USB 3.0 in its chipsets.
Light Peak promises double the data rate of USB 3.0 now, with speeds possibly reaching 20 times the USB 3.0 speeds as the new technology matures. Perhaps more important in the short term, Light Peak cables may reach 100 meters (328 feet) in length and may be smaller in diameter and lighter.
Could Light Peak make its way to the Wintel platform? It certainly could, and its data transfer capability would leapfrog it past USB 3.0. So don’t bet just yet that USB 3.0 will be as successful as its predecessors. Regardless of what happens with Light Peak, USB SuperSpeed should satisfy USB device data rate requirements for many years to come.Windows Log on and Log off immediately
Windows Log on and Log off immediately (The case of missing "userinit.exe")
Free Antivirus Software
Free Software
Avira Antirootkit is free software that recognizes active rootkits. However, there are rootkits, which are used legally in programs. Avira Antirootkit also detects those.
Flash Disinfector – free autorun.inf trojans removal tool
Flash Disinfector is a program designed to clean autorun.inf trojans that are running on your computer and remove infected autorun.inf files from all your drives.
MalwareBytes Anti-malware – free spyware, malware, trojan remover
Malwarebytes’ Anti-Malware is designed to quickly detect, destroy, and prevent malware, spyware, trojans. Can detect and remove malware that even the most well-known Anti-Virus and Anti-Malware applications on the market today cannot.
FixIEDef – free program for removing rogue antispyware
FixIEDef by ShadowPuterDude is a small good program. It help you to remove rogue antispyware apps: AntiSpyPro, Files Secure, IE AntiVirus, IEDefender, Malware Bell and Malware Protector 2008. Also FixIEDef eliminates the “Fake Alerts” generated by Trojan-Downloader.Win32.Delf and Removes Trojan-Downloader.Win32.Delf from the system.
VundoFix – freeware removal tool for Trojan.Vundo
VundoFix is a freeware removal tool for many of the known variants of Trojan.Vundo, Trojan.Conhook and other similar infections.
SnoopFree software protects your privacy by watching for suspicious programs running on your computer. A suspicious program is any program that tries to watch your keyboard, take pictures of your screen or read text from un-owned windows. These three activities are the cornerstone of all modern spy software.
Comodo BOClean – Anti-Malware – 100% Free
BOClean software protects you against a full spectrum of malware, automatically removing these programs from memory, your hard disk and your registry without the need to reboot or drop your internet connection. BOClean safely neutralizes these threats instantly without any risk of damage to your files or computer. Updates are FREE, and the update download and installation process is (or, in the case of network deployment, can be) completely automated.
Dr.Web CureIt! A FREE anti-malware utility
Cure your computer of viruses, Trojans, spyware and other malicious programs with Dr.Web CureIt!, which uses the Dr.Web engine. There is no need for installation and therefore this is an ideal on-demand scanner as there is no conflict with your primary AV. The utility is always armed with the most up-to-date add-ons to the virus databases.
SDFix free trojan remover tool
The fixtool removes big amount Trojan Variants
Free Registry Backup/Restore and Optimization Tools
ERUNT – Free Registry Backup/Restore Tool and NTREGOPT – Free Registry Optimization for Windows
SUPERAntiSpyware Free for home use
Easily remove over 1 million pests and threat components such as VirusRay, AntiVirGear, VirusProtectPro, DriveCleaner, SmitFraud, Vundo, WinFixer, SpyAxe, SpyFalcon, WinAntiVirus, AntiVermins, AntiSpyGolden and thousands more!
Brute Force Uninstaller – uninstaller unwanted software
Brute Force Uninstaller (BFU) is a scripting program that can execute a series of preset commands like a Windows batch file, aimed at uninstalled programs that are hard to remove, uninstall improperly or simply unwanted. Scripts are plaintext and can be written with Notepad, and the command syntax is very transparent.
ComboFix another free anti spyware tool
This tool removes SurfSideKick, QooLogic, Look2Me or any combination of that group.
Also nicely picks out Vundo infections.
One of the better things it does is pick files recently created which can give clues to other infections. You can use it to unhook any dll in the system32 folder.You can use it to delete up to as many as 8 files using its command line functions.
McAfee have made free rootkit remover is a program designed and developed by McAfee Avert Labs to proactively detect and clean rootkits that are running on the system.
With its built-in application database, Comodo Firewall classifies more than 10.000 applications according to their risk level such as SAFE, SPYWARE, ADWARE etc. It is the only firewall which has such a big application database and which uses such a database to analyze the security risks.
Sophos Anti-Rootkit Eliminates hidden applications and processes
Removing rootkits without compromising system integrity is particularly challenging and needs to be done with care. Free Sophos Anti-Rootkit, finds and removes any rootkit that is hidden on your computer.
ZonedOut – free tool for manage Internet Explorer`s zones
ZonedOut is a complete Internet Explorer Security Zone Manager. Manage Zone Sites at the Current User and Local Machine level in style.
Hosts Secure – tool for manage your HOSTS file
HOSTS Secure is a utility that you can use to automatically download, unzip and install the MVPS HOSTS file.
F-Look2Me – automatic removal Look2Me adware
F-Look2Me loads itself as a service to gain system privileges. The service renames infected files and patches the adware in memory. It also restores Debug Privileges for group Administrators. F-Look2Me requires administrator rights to run.
Strider is a tool that reveals these third-party domains, and it includes a Typo-Patrol feature that generates and scans sites that capitalize on inadvertent URL misspellings, a process known as typo-squatting.
BHODemon gives you a quick look at the BHOs ( Browser Helper Objects ) installed on your PC, tells you whether a specific BHO is known to be safe or harmful, and gives you the ability to enable or disable individual BHOs with a single mouse click.
WinSock XP Fix – fix XP internet connectivity
WinSock XP Fix offers a last resort if your Internet connectivity has been corrupted due to invalid or removed registry entries.
The new version shows a ton of new autostart locations in a nice treeview, along with help text for each section. The right-click menu of each item offers options to show the file or Registry key, or copy the information to the clipboard.
Belarc Advisor – Free Personal PC Audit
The Belarc Advisor builds a detailed profile of your installed software and hardware, including Microsoft Hotfixes, and displays the results in your Web browser. All of your PC profile information is kept private on your PC and is not sent to any web server.
Are you tired of Spyware, Malware and Adware programs being installed by ActiveX, but don’t want to lose out on important functionality?
SpywareGuide has created a system that blocks known “dubious” ActiveX controls from running inside Internet Explorer by setting the “Kill Bit”.
When a page tries to install a component from our list, it will fail to run. When a page tries to use a component from our list that was already present on your system, it will fail too!
EULAlyzer – Analyze license agreements for interesting words and phrases
EULAlyzer can analyze license agreements in seconds, and provide a detailed listing of potentially interesting words and phrases. Discover if the software you’re about to install displays pop-up ads, transmits personally identifiable information, uses unique identifiers to track you, or much much more.
Free Jetico Personal Firewall for Windows 98/ME/NT/2000/XP
The software offers detailed, configurable event logs, reports, plus the option to view and edit the firewall configuration. The modular architecture is as open as possible to assist with easier evaluation of the security.
Panda Antivirus for Linux is an antivirus for Linux servers and desktops. It is an antivirus designed to be managed from the command line or console. To do this, an executable called PAVCL will be used. The aim of Panda Antivirus for Linux is to scan and disinfect Windows and DOS workstations connected to a Linux server, as well as the Linux server itself. Panda Antivirus for Linux scans files using both string searches and heuristic methods. The target files of the antivirus are Word documents, Java Applets, ActiveX controls and compressed files (ZIP, RAR, etc.).
CCleaner (Crap Cleaner) is a freeware system optimization and privacy tool
CCleaner (Crap Cleaner) is a freeware system optimization and privacy tool. That removes unused and temporary files from your system – allowing Windows to run faster, more efficiently and giving you more hard disk space. The best part is that it’s fast! (normally taking less that a second to run) and Free.
SmitRem – free tool for remove malware infection
SmitRem removes the Trojan-Spy.HTML.Smitfraud.c malware infection and it’s variants, AntivirusGold, PSGuard Spyware Remover, SpySheriff, Spy Trooper, SpyAxe, and Security Toolbar.
HijackThis – your first tool for remove homepage hijackers
HijackThis examines certain key areas of the Registry and Hard Drive and lists their contents. These are areas which are used by both legitimate programmers and hijackers. It’s up to you to decide what should be removed. Some items are perfectly fine. You should not remove them. Never remove everything. Doing that could leave you with missing items needed to run legitimate programs and add-ins. This Page will help you work with the Experts to clean up your system.
LSP Fix – Repairs Winsock 2 settings
LSP-Fix is a free utility to repair a specific type of problem associated with certain Internet software. This type of software is known as a Layered Service Provider or LSP, a piece of software that can be inserted into the Windows TCP/IP handler like a link in a chain. However, due to bugs in the LSP software or deletion of the software, this chain can get broken, rendering the user unable to access the Internet.
RootkitRevealer – Scan your computer for rootkit now
RootkitRevealer is an advanced patent-pending root kit detection utility. It runs on Windows NT 4 and higher and its output lists Registry and file system API discrepancies that may indicate the presence of a user-mode or kernel-mode rootkit. RootkitRevealer successfully detects all persistent rootkits published at www.rootkit.com, including AFX, Vanquish and HackerDefender.
Autoruns – Hunt down autostart programs wherever they hide
You can use Autoruns not only to identify the applications that have configured themselves to start at logon but to see all the locations where autostart applications might be configured on the system. Autoruns works on all versions of Windows, including Windows Me and Windows 9x.
Zone Alarm Firewall – Excellent protection against hackers and intruders
ZoneAlarm Free Firewall blocks hackers and malicious software from infiltrating your home computer by hiding your computer from unsolicited network traffic.
SpywareGuard – real-time protection solution against spyware
SpywareGuard provides a real-time protection solution against spyware that is a great addition to SpywareBlaster’s protection method.
Prevent the installation of spyware and other potentially unwanted software.
ClamAV – The free Anti Virus solution
ClamAV is a free GPLed anti-virus solution which provides a lot of advantages when installed in Linux. Sticking to the philosophy of linux, it contains a set of command line tools which can be used to check if a file on your system is infected by a virus.
WinPatrol uses a heuristic approach to detecting attacks and violations of your computing environment. Traditional security programs scan your hard drive searching for previously identified threats. WinPatrol takes snapshot of your critical system resources and alerts you to any changes that may occur without your knowledge. You’ll be removing dangerous new programs while others download new reference files.
Ad-Aware Personal provides advanced protection from known data-mining, aggressive advertising, Trojans, dialers, malware, browser hijackers, and tracking components.
Avast! 4 Home Edition is a full-featured antivirus package designed exclusively for home users and non-commercial use.
Great pop-up blocker with spyware protection.
AVG Antivirus/Antispyware Free Edition
AVG Free Edition is the well-known antivirus and antispyware protection tool. AVG Free is available free-of-charge to home users for the life of the product! Rapid virus database updates are available for the lifetime of the product, thereby providing the high-level of detection capability that millions of users around the world trust to protect their computers. AVG Free is easy-to-use and will not slow your system down (low system resource requirements).
Spybot – Search & Destroy can detect and remove spyware of different kinds from your computer.
VistaBootPro v3.3
VistaBootPro v3.3
Description:
Windows Vista and Windows 7 have both made the task of directly editing the BCDedit file complicated as it is no longer text based as the boot.ini file was, and VistaBootPRO is here to help.
Users can make changes to the Windows Boot Configuration Data (BCD) registry quickly and easily, doing the job in a fraction of the time it would take using the alternative DOS based command lines. There is no longer the need to become familiar with the ins and outs of the bcdedit.exe switches and options. BootPRO will guide you through the process to reach your desired results:
Install a second OS or manage your boot configuration
Never have to directly edit the BCDEdit file
Back up all your boot information (BCD store) before editing
Change the order of the boot menu that appears when your PC starts
Set any operating system to be the default
Rename any of your operating system list entries
Improved built-in diagnostics help find and correct errors in the BCD store
Fully compatible with all available versions of Windows 7, Vista and XP
Supports all 64-bit Windows Operating Systems
Works with Windows Server 2003 & Windows Server 2008
Unlimited technical support in our forum
Homepage
1×1.5mb
|RS|
Download.
|MU|
Download.
|Spreadmyfiles|
Download.
|Uploaded|
Download.
|Depositfiles|
Download.
Erd Commander 2005
Erd Commander 2005
Description:
When your server or workstation won’t boot, you need ERD Commander 2005. ERD Commander 2005 boots dead systems directly from CD into a Windows-like repair environment. You’ll have full access to the dead system’s volumes, so you can diagnose and repair problems using tools located on the ERDCommander 2005 Start menu.
And you’ll have built-in network access to safely move data off of, or on to, the dead system. With ERD Commander 2005 you can repair a system quickly and easily, saving you time and rescuing your critical data.
Key features:
· Boots dead systems directly from CD
· Easy, familiar Windows-like interface
· Intuitive Solution Wizard helps you select the right tool to correct your system issue
· Includes Crash Analyzer Wizard to pinpoint the cause of recent system crashes for repair
· Allows complete disk sanitizing/data removal with Disk Wipe utility
· Includes the Locksmith utility to reset lost Administrator passwords
· Includes FileRestore so that you can quickly find and recover deleted files
· Provides access to XP Restore Points on unbootable Windows XP systems
· Detect malware and other applications that may be consuming system resources
· Includes an Internet browser to facilitate downloading needed files and patches
· Compares key info on unbootable systems with that of a working system for diagnosis and troubleshooting
· Automatically identifies and replaces critical system files that have become corrupt
· Allows for formatting and partitioning of disks
· Provides emergency removal capability for faulty hotfixes
· Built-in network access to safely copy data to/from dead systems
· Repair and diagnostic tools located on Start menu
· Repair tools include System Restore tool, System File Repair, Service and Driver Manager, Hotfix Uninstall Wizard, Locksmith, Registry Editor, Explorer, Disk Management, and Command Prompt
· Data recovery tools include Disk Commander and FileRestore
· Diagnostic tools include Crash Analyzer Wizard, System Compare, Autoruns, Event Log Viewer, System Information, TCP/IP Configuration, and Logical volumes utilities
· Compatible with Windows NT, 2000, XP, and Server 2003
2. Remote Recover
To repair an unbootable system via the network, choose Remote Recover. Remote Recover lets you use your network to access the disk drives on a remote machine exactly as if they were installed on your own system. You can boot a damaged system via CD, diskette or PXE-downloaded image, then access its drives remotely from your host Windows 2000, XP, or Server 2003 system. Once the remotesystems volumes have been mounted, you can perform any operations on them as if they were local, including safely removing viruses using the antivirus software on your host machine while the infected machine is offline. Remote Recover does not require that an operating system be installed on the client machine in order to operate, so it can be used for performing installations on new machines in addition to repairing or restoring deadsystems.
3. NTFSDOS Professional
If you need to access NTFS drives from MS-DOS, NTFSDOS Professional is the solution. NTFSDOS Professional allows you to create a boot diskette with which to boot NTsystems . The diskette contains an MS-DOS environment where you can easily mount NTFS drives with drive letters and run DOS programs to read, write, repair, or otherwise modify the drives just as you would on FAT drives. You can run DOS-based antivirus software in the NTFSDOS environment to disinfect a system while the OS is safely offline. NTFSDOS Professional is a powerful tool to repair corrupt files or configuration problems that prevent Windows NT, 2000, XP, and Server 2003systems from booting.
Awards
4. Crash Analyzer Wizard
You can quickly determine the most likely cause of a system crash using Crash Analyzer. This easy-to-use Wizard guides you through the steps of selecting the most recent system crash dump file, then reports on the driver that is most likely to have caused the crash, so that you can apply the appropriate changes to correct the issue or to prevent it from re-occurring.
5. FileRestore
FileRestore allows you to quickly and easily recover files that have been lost or deleted from your computer. FileRestore can bring back files that would otherwise be gone for good, including files emptied from the Recycle Bin, deleted by application programs and remote processes, lost with removed directories, or deleted via acommand prompt.
6. Filemon Enterprise Edition
Troubleshoot issues associated with file system activity on any system on your network remotely with Filemon Enterprise Edition. Filemon provides a continuous, real-time display of all file system accesses occurring on a particular system. For remote troubleshooting of file system issues, there’s not a more useful tool than Filemon.
7. Regmon Enterprise Edition
Diagnose problems associated with Registry activity on any system on your network remotely with Regmon Enterprise Edition. Regmon provides continuous, real-time data on the Registry activity occurring on a particular system. For remote diagnosis of Registry problem, there’s not a more useful tool than Regmon.
8. AD Explorer
Find, modify, add, and delete Active Directory objects and attributes with AD Explorer. AD Explorer displays information in two panes. The Object Pane is the left-hand pane that displaysActive Directory objects. The Attribute Pane is the right-hand pane that displays attributes of the object selected in the Object Pane.
9. Insight for Active Directory
Use Insight for Active Directory to troubleshoot conflicts that are occurring with mission-critical applications such as e-mail and messaging, databases, and CRM, and prevent access to corporate directories, system log-in, and File and Print sharing. Insight for Active Directory provides a real-time view of the internals of Active Directory transactions on the local machine so that you can pinpoint the precise cause of conflicts and resolve them.
10. TCP Tools
TCP Tools, which include TCPView Professional Edition and TCPVStat, are essential tools for network and application diagnosis and troubleshooting. TCP Tools displays all active TCP and UDP endpoints on your system, indicating which process is associated with each local and remote IP address and relaying continuous, detailed real-time data on your system’s TCP/IP activity
Homepage:
1×54mb
|MU|
Download.
|ShareOnAll| Links to |RS|FF|ES|MU|DF|DS|ZS|
Download.
Simple Internet Meter v2.2.2
Simple Internet Meter v2.2.2
Description:
Simple Internet Meter is a new bandwidth monitor. After my program CS Fire Monitor came out years ago I had many requests for added features. Many of those features where not possible to add using the Windows API. Such as seeing what isinternet traffic and what is local network traffic.
The only way to accomplish this is to look at the packet data. So I made this program using WinPcap and PacketX.dll.
As many of the users know from my other work I am a performance nut. I try to have my programs run fast and clean all the while taking as little out of the system as possible. I put extra effort into SimpleInternet Meter to make sure it does its job without affecting the system in anyway. The program will auto clean its used memory any time the memory usage goes above 10 mb. The program is designed to run 24/7.
Key Features:
* Monitor Network Traffic.
* Monitor a range of ports
* Keep logs of Daily & Hourly Usage
* Auto save any report to a file.
* Easily change the colors to fit your style and taste.
* Resize the monitors to make then very small and transparent, keeping them out of the way
* Blend to desktop mode makes the monitors blend to your desktop.
* Ghost mode makes the monitors click through.
* System tray icon can be animated to show network traffic.
Homepage
1×8mb
|RS|
Download.
|MU|
Download.
|Spreadmyfiles|
Download.
|Uploaded|
Download.
Crack finder v1.1 Software
Crack finder v1.1 Software
Description:
Find fresh crack, key, patch for your software….
Without searching for the internet Just Type the software name and Crack finder finds the Cracks,keys and patchs….
1×5.3mb
|RS|
Download.
|MU|
Download.
|Spreadmyfiles|
Download.
|Uploaded|
Download.
|Multiupload|
Download.