Protect your note book with Microsoft Security Essential

About Microsoft Security Essentials

Use Microsoft Security Essentials to guard against viruses, spyware, and other evil software. It provides real-time protection for your home or small business PCs.

Microsoft Security Essentials is free* and we designed it to be simple to install and easy to use. It runs quietly and efficiently in the background so you don't have to worry about interruptions or making updates.

Benefits:-
  • Easy to use
  • Faster installation
  • Can protect your PC from Virus
  • Free
  • Never expired


  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

How to open Megaupload using DNS


What is Megaupload?

Megaupload is a leading provider of online storage and web hosting services. We offer ad-financed free and affordable premium online storage/remote backup capacity, plus sophisticated uploading and downloading tools.

What is DNS?

The Domain Name System (DNS) is a hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities. Most importantly, it translates domain names meaningful to humans into the numerical identifiers associated with networking equipment for the purpose of locating and addressing these devices worldwide.

An often-used analogy to explain the Domain Name System is that it serves as the phone book for the Internet by translating human-friendly computer hostnames into IP addresses. For example, the domain name www.example.com translates to the addresses 192.0.32.10 (IPv4) and 2620:0:2d0:200::10 (IPv6).

The Domain Name System makes it possible to assign domain names to groups of Internet resources and users in a meaningful way, independent of each entity's physical location. Because of this, World Wide Web (WWW) hyperlinks and Internet contact information can remain consistent and constant even if the current Internet routing arrangements change or the participant uses a mobile device. Internet domain names are easier to remember than IP addresses such as 208.77.188.166 (IPv4) or 2001:db8:1f70::999:de8:7648:6e8(IPv6). Users take advantage of this when they recite meaningful Uniform Resource Locators (URLs) and e-mail addresses without having to know how the computer actually locates them.

The Domain Name System distributes the responsibility of assigning domain names and mapping those names to IP addresses by designating authoritative name servers for each domain. Authoritative name servers are assigned to be responsible for their particular domains, and in turn can assign other authoritative name servers for their sub-domains. This mechanism has made the DNS distributed and fault tolerant and has helped avoid the need for a single central register to be continually consulted and updated.

In general, the Domain Name System also stores other types of information, such as the list of mail servers that accept email for a given Internet domain. By providing a worldwide, distributed keyword-based redirection service, the Domain Name System is an essential component of the functionality of the Internet.

Other identifiers such as RFID tags, UPCs, International characters in email addresses and host names, and a variety of other identifiers could all potentially use DNS.

The Domain Name System also specifies the technical functionality of this database service. It defines the DNS protocol, a detailed specification of the data structures and communication exchanges used in DNS, as part of the Internet Protocol Suite.

ref: www.wikipedia.org

Download Free Tutorial

Download from 4share


  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Safe your notebook with Trojan Remover 6.8.2


Target Platforms
Trojan Remover is designed for Windows 2000/XP/Vista/Windows 7.
(A version still compatible with Windows 98/ME can be downloaded from here).

Description
Trojan Remover aids in the removal of Malware - Trojan Horses, Worms, Adware, Spyware - when standard anti-virus software either fails to detect them or fails to effectively eliminate them. Standard antivirus programs are good at detecting this Malware, but not always so good at effectively removing it.

Trojan Remover is designed specifically to disable/remove Malware without the user having to manually edit system files or the Registry. The program also removes the additional system modifications some Malware carries out which are ignored by standard antivirus and trojan scanners.

What Trojan Remover Does
Trojan Remover examines all the system files, the Windows Registry and the programs and files loaded at boot time. The majority of malicious programs (once triggered) load this way.


Trojan Remover scans ALL the files loaded at boot time for Adware, Spyware, Remote Access Trojans, Internet Worms and other malware. Trojan Remover also checks to see if Windows loads Services which are hidden by Rootkit techniques and warns you if it finds any.


For each identified Trojan Horse, Worm, or other malware, Trojan Remover pops up an alert screen which shows the file location and name; it offers to remove the program's reference from the system files and allows you to rename the file to stop its activation.


Most modern Malware programs are memory-resident, which makes their de-activation more difficult. How many times have you been told to start your computer in 'Safe' mode, or even worse, in DOS? Trojan Remover does all this for you. When it finds Malware that is memory-resident, Trojan Remover automatically re-starts (on request) your system and completely DISABLES the Malware before Windows restarts.


Trojan Remover writes a detailed logfile every time it performs a scan. This logfile contains information on which programs load at boot-time, and what (if any) actions Trojan Remover carried out. The logfile can be viewed and printed using Notepad.


The FastScan component of Trojan Remover is set to automatically scan for Malware every time you start your PC (you can disable this if you wish). You can also run the FastScan manually any time you wish (START |Programs | Trojan Remover | FastScan). This FastScan checks all program-loading points - it is a quick and effective check for actively-loading malicious programs.

You can scan the whole drive, or any directories on the drive, by selecting Scan a Drive/Directory from the main Trojan Remover menu.


You can scan individual files and directories from within Windows Explorer.

Trojan Remover incorporates an integral Updater allowing for quick and easy Database updates. You can use the Windows Task Scheduler to schedule automatic updates.

The program comes with a comprehensive help file (this can be viewed online, here).

Context-sensitive help is also available for most screens by tapping the F1 key.


This essential security utility is available for you to try out FREE


ref:http://simplysup.com/tremover/details.html



  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Uninstall Anything Program or Software using Your-Uninstaller 2010 Pro




Overview

You've probably encountered some stubborn programs that just won't uninstall at all or uninstall completely, right? And, more often than not, when you use the Windows Add/Remove Program utility, there are remnants or "artifacts" of the program left behind in the system registry and on your hard drive that are no longer needed. These useless items will bog your PC down and, over time, it will get slower and slower lugging around this useless baggage - unexpected errors and frequent crashes may also occur because of this!

What's the problem?

Let's say you frequently install trial versions of programs to check them out. And let's also say that, after giving them a shot, you don't like them and decide to uninstall them. Unfortunately, you find it impossible to uninstall some of them - they remain on the Windows installed programs list even they are "supposedly" gone. These improperly uninstalled programs can also be the cause of errors because many junk files and registry keys/values were left behind on your PC. These 'junk artifacts' can - and do - cause system problems and slow down Windows substantially.

Here's the solution!

Your Uninstaller! will solve these problems. It removes any installed program and clears all the left-behind traces - no more 'junk artifacts' remaining. Whenever you uninstall a program, Your Uninstaller! removes it completely! There's absolutely nothing left behind.

"PCs inevitably accrue a mass of unwanted and unused files that eat up system resources and reduce system stability. Uninstalling these items can be an arduous task, but Your Uninstaller Pro simplifies the process considerably..." - CNET Review

Key benefits

  • Uninstall any installed program completely, even corrupted ones.
    The most exciting part of Your Uninstaller! is: removing every part of a program completely. With Your Uninstaller!, it's easy to uninstall any installed program - no trace left.
  • Fix invalid uninstalls in one click.
    If you often install/uninstall software, you will most inevitably experience corrupted programs. Let Your Uninstaller! fix them.
  • Full system scan after a program is uninstalled for complete removal.
    Your Uninstaller! scans the whole system for related traces and completely removes any 'junk artifacts' after normal uninstallation. You'd never even know the program was once installed on your PC.
  • Force removal of a program.
    Some programs are really hard to remove, especially old-fashioned non-conforming programs. Even they aren't a problem for Your Uninstaller!
  • Keep your system stable and clean with various system tools.
    Your Uninstaller! has built-in system tools like Uninstaller, Startup Manager, Internet Traces Eraser, StartMenu Manager, andDisk Cleaner to keep Windows clean and in proper operating order.
  • Easy to Use. No expert knowledge required.
    Usability is always foremost on our minds when we develop products. Your Uninstaller! is simple and straightforward to use. No hassles, no confusion.
  • Windows Vista and Windows 7 Compatible.
    Your Uninstaller! is Vista and Windows 7 Compatible for both 32-bit and 64-bit versions. Of course, it also works for Windows XP perfectly.


  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

How to convert or compress file to ISO


About Folder2Iso

Folder2Iso just creates an iso from any kind of folder (with the subfolders).
Its a GUI of mkisofs.

No need of installation , really small exe.
Some of you can say : "What is the point of this tool? Seems useless."
Well DVDDecrypter/ImgBurn can burn cd/dvd for free so if you make an iso easily you can burn your movies on cds/dvd for free. It is also usefull for the dvd2avi guide ...
So : dvddecrypter/imgburn + Folder2Iso combine an totaly freeware burning kit for all kinds of avi/ogm/mkv !

How to usage :
1- Just press Select Folder and add your folder that you want to make iso. ex : f:\movies\Matrix
2- Select the output path and add a name like test.iso. Please note that you can not save it at the same path of the step 1 . (choose something like : f:\movies\Matrix.iso ) you can free download Folder2Iso 1.5 now.




  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS
Related Posts Plugin for WordPress, Blogger...