Protect your note book with Microsoft Security Essential

About Microsoft Security Essentials

Use Microsoft Security Essentials to guard against viruses, spyware, and other evil software. It provides real-time protection for your home or small business PCs.

Microsoft Security Essentials is free* and we designed it to be simple to install and easy to use. It runs quietly and efficiently in the background so you don't have to worry about interruptions or making updates.

  • Easy to use
  • Faster installation
  • Can protect your PC from Virus
  • Free
  • Never expired

  • Digg
  • StumbleUpon
  • Reddit
  • RSS

How to open Megaupload using DNS

What is Megaupload?

Megaupload is a leading provider of online storage and web hosting services. We offer ad-financed free and affordable premium online storage/remote backup capacity, plus sophisticated uploading and downloading tools.

What is DNS?

The Domain Name System (DNS) is a hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities. Most importantly, it translates domain names meaningful to humans into the numerical identifiers associated with networking equipment for the purpose of locating and addressing these devices worldwide.

An often-used analogy to explain the Domain Name System is that it serves as the phone book for the Internet by translating human-friendly computer hostnames into IP addresses. For example, the domain name translates to the addresses (IPv4) and 2620:0:2d0:200::10 (IPv6).

The Domain Name System makes it possible to assign domain names to groups of Internet resources and users in a meaningful way, independent of each entity's physical location. Because of this, World Wide Web (WWW) hyperlinks and Internet contact information can remain consistent and constant even if the current Internet routing arrangements change or the participant uses a mobile device. Internet domain names are easier to remember than IP addresses such as (IPv4) or 2001:db8:1f70::999:de8:7648:6e8(IPv6). Users take advantage of this when they recite meaningful Uniform Resource Locators (URLs) and e-mail addresses without having to know how the computer actually locates them.

The Domain Name System distributes the responsibility of assigning domain names and mapping those names to IP addresses by designating authoritative name servers for each domain. Authoritative name servers are assigned to be responsible for their particular domains, and in turn can assign other authoritative name servers for their sub-domains. This mechanism has made the DNS distributed and fault tolerant and has helped avoid the need for a single central register to be continually consulted and updated.

In general, the Domain Name System also stores other types of information, such as the list of mail servers that accept email for a given Internet domain. By providing a worldwide, distributed keyword-based redirection service, the Domain Name System is an essential component of the functionality of the Internet.

Other identifiers such as RFID tags, UPCs, International characters in email addresses and host names, and a variety of other identifiers could all potentially use DNS.

The Domain Name System also specifies the technical functionality of this database service. It defines the DNS protocol, a detailed specification of the data structures and communication exchanges used in DNS, as part of the Internet Protocol Suite.


Download Free Tutorial

Download from 4share

  • Digg
  • StumbleUpon
  • Reddit
  • RSS

Safe your notebook with Trojan Remover 6.8.2

Target Platforms
Trojan Remover is designed for Windows 2000/XP/Vista/Windows 7.
(A version still compatible with Windows 98/ME can be downloaded from here).

Trojan Remover aids in the removal of Malware - Trojan Horses, Worms, Adware, Spyware - when standard anti-virus software either fails to detect them or fails to effectively eliminate them. Standard antivirus programs are good at detecting this Malware, but not always so good at effectively removing it.

Trojan Remover is designed specifically to disable/remove Malware without the user having to manually edit system files or the Registry. The program also removes the additional system modifications some Malware carries out which are ignored by standard antivirus and trojan scanners.

What Trojan Remover Does
Trojan Remover examines all the system files, the Windows Registry and the programs and files loaded at boot time. The majority of malicious programs (once triggered) load this way.

Trojan Remover scans ALL the files loaded at boot time for Adware, Spyware, Remote Access Trojans, Internet Worms and other malware. Trojan Remover also checks to see if Windows loads Services which are hidden by Rootkit techniques and warns you if it finds any.

For each identified Trojan Horse, Worm, or other malware, Trojan Remover pops up an alert screen which shows the file location and name; it offers to remove the program's reference from the system files and allows you to rename the file to stop its activation.

Most modern Malware programs are memory-resident, which makes their de-activation more difficult. How many times have you been told to start your computer in 'Safe' mode, or even worse, in DOS? Trojan Remover does all this for you. When it finds Malware that is memory-resident, Trojan Remover automatically re-starts (on request) your system and completely DISABLES the Malware before Windows restarts.

Trojan Remover writes a detailed logfile every time it performs a scan. This logfile contains information on which programs load at boot-time, and what (if any) actions Trojan Remover carried out. The logfile can be viewed and printed using Notepad.

The FastScan component of Trojan Remover is set to automatically scan for Malware every time you start your PC (you can disable this if you wish). You can also run the FastScan manually any time you wish (START |Programs | Trojan Remover | FastScan). This FastScan checks all program-loading points - it is a quick and effective check for actively-loading malicious programs.

You can scan the whole drive, or any directories on the drive, by selecting Scan a Drive/Directory from the main Trojan Remover menu.

You can scan individual files and directories from within Windows Explorer.

Trojan Remover incorporates an integral Updater allowing for quick and easy Database updates. You can use the Windows Task Scheduler to schedule automatic updates.

The program comes with a comprehensive help file (this can be viewed online, here).

Context-sensitive help is also available for most screens by tapping the F1 key.

This essential security utility is available for you to try out FREE


  • Digg
  • StumbleUpon
  • Reddit
  • RSS

Uninstall Anything Program or Software using Your-Uninstaller 2010 Pro


You've probably encountered some stubborn programs that just won't uninstall at all or uninstall completely, right? And, more often than not, when you use the Windows Add/Remove Program utility, there are remnants or "artifacts" of the program left behind in the system registry and on your hard drive that are no longer needed. These useless items will bog your PC down and, over time, it will get slower and slower lugging around this useless baggage - unexpected errors and frequent crashes may also occur because of this!

What's the problem?

Let's say you frequently install trial versions of programs to check them out. And let's also say that, after giving them a shot, you don't like them and decide to uninstall them. Unfortunately, you find it impossible to uninstall some of them - they remain on the Windows installed programs list even they are "supposedly" gone. These improperly uninstalled programs can also be the cause of errors because many junk files and registry keys/values were left behind on your PC. These 'junk artifacts' can - and do - cause system problems and slow down Windows substantially.

Here's the solution!

Your Uninstaller! will solve these problems. It removes any installed program and clears all the left-behind traces - no more 'junk artifacts' remaining. Whenever you uninstall a program, Your Uninstaller! removes it completely! There's absolutely nothing left behind.

"PCs inevitably accrue a mass of unwanted and unused files that eat up system resources and reduce system stability. Uninstalling these items can be an arduous task, but Your Uninstaller Pro simplifies the process considerably..." - CNET Review

Key benefits

  • Uninstall any installed program completely, even corrupted ones.
    The most exciting part of Your Uninstaller! is: removing every part of a program completely. With Your Uninstaller!, it's easy to uninstall any installed program - no trace left.
  • Fix invalid uninstalls in one click.
    If you often install/uninstall software, you will most inevitably experience corrupted programs. Let Your Uninstaller! fix them.
  • Full system scan after a program is uninstalled for complete removal.
    Your Uninstaller! scans the whole system for related traces and completely removes any 'junk artifacts' after normal uninstallation. You'd never even know the program was once installed on your PC.
  • Force removal of a program.
    Some programs are really hard to remove, especially old-fashioned non-conforming programs. Even they aren't a problem for Your Uninstaller!
  • Keep your system stable and clean with various system tools.
    Your Uninstaller! has built-in system tools like Uninstaller, Startup Manager, Internet Traces Eraser, StartMenu Manager, andDisk Cleaner to keep Windows clean and in proper operating order.
  • Easy to Use. No expert knowledge required.
    Usability is always foremost on our minds when we develop products. Your Uninstaller! is simple and straightforward to use. No hassles, no confusion.
  • Windows Vista and Windows 7 Compatible.
    Your Uninstaller! is Vista and Windows 7 Compatible for both 32-bit and 64-bit versions. Of course, it also works for Windows XP perfectly.

  • Digg
  • StumbleUpon
  • Reddit
  • RSS

How to convert or compress file to ISO

About Folder2Iso

Folder2Iso just creates an iso from any kind of folder (with the subfolders).
Its a GUI of mkisofs.

No need of installation , really small exe.
Some of you can say : "What is the point of this tool? Seems useless."
Well DVDDecrypter/ImgBurn can burn cd/dvd for free so if you make an iso easily you can burn your movies on cds/dvd for free. It is also usefull for the dvd2avi guide ...
So : dvddecrypter/imgburn + Folder2Iso combine an totaly freeware burning kit for all kinds of avi/ogm/mkv !

How to usage :
1- Just press Select Folder and add your folder that you want to make iso. ex : f:\movies\Matrix
2- Select the output path and add a name like test.iso. Please note that you can not save it at the same path of the step 1 . (choose something like : f:\movies\Matrix.iso ) you can free download Folder2Iso 1.5 now.

  • Digg
  • StumbleUpon
  • Reddit
  • RSS

Protect Your Computer with Advanced System Care

Advanced SystemCare PRO provides an always-on, automated, all-in-one PC Healthcare Service with anti-spyware, privacy protection, performance tune-ups, and system cleaning capabilities. This powerful and award-winning precision tool fixes stubborn errors, cleans out clutter, optimizes Internet and download speeds, ensures personal security, and maintains maximum computer performance automatically.

This easy-to-use and informative application cleans, configures, and optimizes your PC. Advanced WindowsCare Pro's interface dispenses with the bells and whistles to display commands and data without embellishment.

The install Wizard zips through the set up, querying the user on the PC's primary use and Internet connection type. Answer those two simple questions, choose from a short list of options, and you're ready to virus check and scan for spyware, registry errors, and start-up problems, or clean your PC of history and surfing traces. The app's strength is the detailed information the scan provides, which lists each item with a description of its value based on trustworthiness. Unknown items can be identified online or ignored. The Tools menu checks five primary areas of your PC for rogue processes, services, and incorrectly installed options.

Since registry entries are involved, we wish the fixes recommended were more detailed. The program includes a quick restore point option for system safety, but repairs can't be made in the trial edition, drastically circumscribing the app's effectiveness unless you buy it sight unseen. The app's uncomplicated and straightforward usage is appreciated, but the since the main selling point has been cut off at the knees, we're hesitant to give this a more glowing recommendation.

  • Digg
  • StumbleUpon
  • Reddit
  • RSS

Play All Your Movie, Video and Music In MpcStar

MpcStar All In One.

MPCSTAR is an all-in-one package of video player, audio player and many codecs.
It contains a user-friendly player and carefully selected codecs to support various media formats.
With MPCSTAR, you would be able to
play all your movies and music
downloaded from the internet.

MPCSTAR has following advantages:
  • Completely free, no spyware or adware
  • Support all popular media file formats
  • Extremely straight forward and easy to use
  • Blocks pop-ups and ads in video files
  • Display lyrics automatically for audio files
  • Up-to-date with the latest/best components
  • Uninstallation removes all files and registry entries
ref :

  • Digg
  • StumbleUpon
  • Reddit
  • RSS

How to Install Themes for Windowas Xp, Vista and 7

You need this to install some special themes for Windows. Supports Windows XP SP2 SP3/ 2003/ 2008/ Vista SP1 SP2/ Windows 7 – 32 and 64-Bit
1. Can operate in normal mode. Do not need to enter safe mode.

2. Choose the corresponding patcher based on you Windows:
For 32bit (x86): UniversalThemePatcher-x86.exe
For 64bit (x64): UniversalThemePatcher-x64.exe

3. Require administrator rights, UAC turn off. Right-click the exe file, select Run as Administrator.

4. XP/ 2003 only need to patch one file: uxtheme.dll

2008/ Vista/ Windows 7 6519 need to patch 3 files: uxtheme.dll, themeui.dll, shsvcs.dll

Windows 7 6801 need to patch 3 files: uxtheme.dll, themeui.dll, themeservice.dll

Sometimes, in x64 Windows, you need to patch 2 copies of files:
using UniversalThemePatcher-x64.exe to patch the 64bit files in \windows\system32;
and using UniversalThemePatcher-x86.exe to patch the 32bit files in \windows\syswow64.

5. After patch, Restart computer to take effect.

6. You can run program with argument “-silent” to patch in silent mode.

  • Digg
  • StumbleUpon
  • Reddit
  • RSS

Easy shortcut key for use in desktop

  1. Windows key + E = Explorer
  2. Windows key + Break = System properties
  3. Windows key + F = Search
  4. Windows key + D = Hide/Display all windows
  5. Windows key + P = Changes display mode
  6. Windows key + L = for lock display
  7. ALT + Tab = Switch between windows
  8. ALT, Space, X = Maximize window
  9. Alt + Left Arrow = Back
  10. Alt + Right = Forward
  11. CTRL + Shift + Esc = Task Manager
  12. CTRL + C = Copy
  13. CTRL + X = Cut
  14. CTRL + V = Paste
  15. CTRL + Z = Undo an action
  16. CTRL + Y = Redo an action
  17. CTRL + A =Select all items in a document or window
  18. F1 = Display Help
  19. F2 = Rename the selected item
  20. F3 = Search for a file or folder
  21. F4 = Display the Address bar list in Windows Explorer
  22. F5 = Refresh the active window
  23. F6 = Cycle through screen elements in a window or on the desktop
  24. F10 = Activate the menu bar in the active program

  • Digg
  • StumbleUpon
  • Reddit
  • RSS

How to Remove Virus Shortcut (1Kb file saiz)

How to remove Virus Shortcut?

Download the tutorial for solve problem Virus Shortcut

  • Digg
  • StumbleUpon
  • Reddit
  • RSS

Full Download WinRAR 3.93 Pro 32 and 64 Bit

WinRAR is a 32-bit / 64-bit Windows version of RAR Archiver, the powerful archiver and archive manager. WinRAR's main features are very strong general and multimedia compression, solid compression, archive protection from damage, processing of ZIP and other non-RAR archives, scanning archives for viruses, programmable self-extracting archives(SFX), authenticity verification, NTFS and Unicode support, strong AES encryption, support of multivolume archives, command line and graphical interface, drag-and-drop facility, wizard interface, theme support, folder tree panel, multithread support and Windows x64 shell integration. WinRAR provides complete support for RAR and ZIP archives and is able to unpack and convert CAB, ARJ, LZH, TAR, GZ, ACE, UUE, BZ2, JAR, ISO, Z, 7-Zip archives.

  • Digg
  • StumbleUpon
  • Reddit
  • RSS

How to increase speed download for uTorrent (µTorrent)

Most of the features present in other BitTorrent clients are present in µTorrent, including bandwidth prioritization, scheduling, RSS auto-downloading and Mainline DHT (compatible with BitComet). Additionally, µTorrent supports the Protocol Encryption joint specification (compatible with Azureus and BitComet) and peer exchange. µTorrent was written with efficiency in mind. Unlike many torrent clients, it does not hog valuable system resources - typically using less than 6MB of memory, allowing you to use the computer as if it weren't there at all.

1. Firstly,open the
uTorrent and go to Options -> Preferences

2. Go to connection and write the " Port used for incoming connection " to 443.

3. Open the " Bandwidth " and set the value to : -

  • " Maximum upload rate (kB/s) : 65 "
  • " Global maximum number of connection : 1890 "
  • " Maximum number of connected peers peer torrent : 2329"
  • " Number of upload slots per torrent : 14 "

4. Fourth, go to " BitTorrent setup " and Unmark the " Limit local peer bandwidth "
in the " Protocol Encryption " part select " Outgoing : Enabled "

5. Go to " Queueing " setup the value for :-
  • " Maximum number of active torrents (upload or download) : 60 "
  • " Maximum number of active downloads : 63 "
  • " Ratio is : <= 200% or seeding time is : <= (min) : 0 "

6. Finally, go to " Advanced " and change setting : -
  • " bt.allow_same_ip = true "
  • " bt.enable_tracker = true "
  • " bt.graceful_shutdown = false "
  • " bt.send_have_to_seed = false "
  • " gui.bypass_search_redirect = true "
  • " ipfilter.enable = false "
  • " net.max_halfopen = 500 "
  • " net.outgoing_port = 50 "
  • " net.wsaevents = 150 "
  • " peer.disconnect_inactive_interval = 900 "
  • " queue.dont_count_slow_dl = false "
  • " queue.dont_count_slow_ul = false "

Download µTorrent

  • Digg
  • StumbleUpon
  • Reddit
  • RSS

Internet Download Manager 6.03 Full

Internet Download Manager has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download accelerators and managers that segment files before downloading starts, Internet Download Manager segments downloaded files dynamically during download process.
Internet Download Manager reuses available connections without additional connect and login stages to achieve better acceleration performance. Internet Download Manager supports proxy servers, ftp and http pro
tocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all other popular browsers to automatically handle your downloads. You can also drag and drop files, or use Internet Download Manager from command line. Internet Download Manager can dial your modem at the set time, download the files you want, then hang up or even shut down your computer when it's done.

Main Features:-

• All popular browsers and applications are supported! Internet Download Manager has been tested with the following browsers: Internet Explorer, MSN Explorer, AOL, Netscape Communicator, Netscape 6, Netscape 7, Mozilla, Mozilla Firefox, Mozilla Firebird, Opera, NetCaptor, UltraBrowser, Slim Browser, Avant Browser, MyIE2, Optimal Desktop, Ace Explorer, Advanced Browser, 27 Tools-in-1 Wichio Browser, WindowSurfer, 550 Access Browser, FineBrowser Freeware, Kopassa Browser, Fast Browser Pro, Enigma Browser, GoSuRF, K-Meleon, Smart Explorer, The Off By One Web Browser, Smartalec Voyager, CrystalPort AppCapture, The Family Browser, XANA Web Browser, Bluto, AutoSurf, 32bit Web Browser, BrowseMan, WrestlingBrowser, Eminem Browser, UltraBrowser, Cygsoft LDAP Browser, and Net M@nager. Internet Download Manager supports all versions of popular browsers, and can be integrated into any 3rd party Internet applications.

• Easy downloading with one click. When you click on a download link in a browser, IDM will take over the download and accelerate it. IDM supports HTTP, FTP, HTTPS and MMS protocols.

• Download Speed Acceleration. Internet Download Manager can accelerate downloads by up to 5 times due to its intelligent dynamic file segmentation technology. Unlike other download managers and accelerators Internet Download Manager segments downloaded files dynamically during download process and reuses available connections without additional connect and login stages to achieve best acceleration performance.

• Download Resume. Internet Download Manager will resume unfinished download from the place where they left off.

• YouTube grabber. Internet Download Manager can grab FLV videos from popular sites like YouTube, MySpaceTV, and Google Video.

• Simple installation wizard. Quick and easy installation program will make necessary settings for you, and check your connection at the end to ensure trouble free installation of Internet Download Manager

• Drag and Drop. You may simply drag and drop links to IDM, and drag and drop downloaded files out of Internet Download Manager.

• Automatic Antivirus checking. Antivirus checking makes your downloads free from viruses and trojans.

• Advanced Browser Integration. When enabled, the feature can be used to catch any download from any application. None of download managers have this feature.

• Built-in Scheduler. Internet Download Manager can connect to the Internet at a set time, download the files you want, disconnect, or shut down your computer when it's done.

• IDM includes web site spider and grabber. IDM downloads all required files that are specified with filters from web sites, for example all pictures from a web site, or subsets of web sites, or complete web sites for offline browsing. It's possible to schedule multiple grabber projects to run them once at a specified time, stop them at a specified time, or run periodically to synchronize changes.

• IDM supports many types of proxy servers. For example, IDM works with Microsoft ISA, and FTP proxy servers.

• IDM supports main authentication protocols:
Basic, Negotiate, NTLM, and Keberos. Thus IDM can access many Internet and proxy servers using login name and password.

• Download All feature. IDM can add all downloads linked to the current page. It's easy to download multiple files with this feature.

• Customizable Interface. You may choose the order, and what buttons and columns appear on the main IDM window.

• Download Categories. Internet Download Manager can be used to organize downloads automatically using defined download categories.

• Quick Update Feature. Quick update may check for new versions of IDM and update IDM once per week.

• Download limits. Progressive downloading wit
h quotas feature. The feature is useful for connections that use some kind of fair access policy (or FAP) like Direcway, Direct PC, Hughes, etc.

• IDM is multilingual. IDM is translated to Albanian, Arabic, Azerbaijan, Bosnian, Bulgarian, Chinese, Croatian, Czech, Danish, Dutch, Farsi, French, German, Greek, Hebrew, Hungarian, Italian, Japanese, Korean, Lithuanian, Macedonian, Norwegian, Polish, Portuguese, Romanian, Russian, Serbian, Slovak, Slovenian, Spanish, Thai, Turkish, and Uzbek languages. Changes in Internet Download Manager 6.03 Beta Build 2

- Fixed BSOD related bugs

- Improved advanced integration compatibility with AVG and Avast Internet Security

  • Digg
  • StumbleUpon
  • Reddit
  • RSS

How to clean a your PC or notebook from virus worm Net-Worm.Win32.Kido

Brief description of the Net-Worm.Win32.Kido family

  • It creates files autorun.inf and RECYCLED\{SID<....>}\RANDOM_NAME.vmx on removable drives (sometimes on public network shares)
  • It stores itself in the system as a DLL file with a random name, for example, c:\windows\system32\zorizr.dll
  • It registers itself in system services with a random name, for example, knqdgsm
  • It tries to attack network computers via 445 or 139 TCP port, using MS Windows vulnerability MS08-067.
  • It tries to access the following websites in order to learn the external IP address of the infected computer (we recommend configuring a network firewall rule to monitor connection attempts to these websites):

Symptoms of a network infection

  • Anti-Virus product with enabled Intrusion Detection System informs of the attack Intrusion.Win.NETAPI.buffer-overflow.exploit


    Multiple repeating attack alerts proof that the r
    emote computer (its address is reported in the alert) is infected. It is necessary to disnifect it, if possible.
  • It is impossible to access websites of the majority of antivirus companies, e.g. avira, avast, esafe, drweb, eset, nod32, f-secure, panda, kaspersky, etc.
  • An attempt to activate Kaspersky Anti-Virus or Kaspersky Internet Security with an activation code at a computer infected with the Net-Worm.Win32.Kido network worm may result in abnormal termination and output one of the following errors:

· Activation procedure completed with system error 2

· Activation error: Server name cannot be resolved.

· Activation error. Unable to connect to server.

If Kaspersky Anti-Virus/ Kaspersky Internet Security keeps reporting activation errors during activation on a computer not infected with Net-Worm.Win32.Kido, please refer to the Useful Links. It contains descriptions of possible activation errors.

Protection measures

MS Windows 95/MS Windows 98/MS Windows M
E operating systems cannot be infected with this network worm.

You are recommended to do the following on a
ll hosts to prevent workstations and file servers from getting infected with the worm:

1. Install Microsoft patches MS08-067, MS08-068, MS09-001 (on these pages you will have to select which operating system is installed on the infected PC,

2. Disable autorun of executable files on removable drives:

- download the utility KidoKiller ( and extract it, for example, to disk C:
- open command line prompt:

1. Wndws Vista: Start > All programs > Standard > Run > type in cmd > Enter.
2. Windows XP/Server: Start > Run > type in cm
d > Enter.

- run the file kk.exe with switch -a:
specify path to the file kk.exe.
For example, if it is located on disk C:\, you should use th
e following the command:
C:\kk.exe -a
press Enter.

Methods of disinfection

1. Download the archive and extract the contents into a folder on the infected PC

2. Disable the component File Anti-Virus of the Kaspersky Anti-Virus for run time of the utility if you have one of the following Kaspersky Lab applications installed on the infected PC:

- Kaspersky Internet Security 2011;
- Kaspersky Anti-Virus 2011;
- Kaspersky Internet Security 2010;

- Kaspersky Anti-Virus 2010;
- Kaspersky Internet Security 2009;
- Kaspersky Anti-Virus 2009;
- Kaspersky Internet Security 7.0;
- Kaspersky Anti-Virus 7.0;
- Kaspersky Internet Security 6.0;
- Kaspersky Anti-Virus 6.0.

3. Run the file kk.exe

If you run the kk.exe file without any switches, the util
ity will put a stop to active infection (kill threads and remove hooks), perform a memory scan and a scan of critical areas vulnerable to infection, clean up the registry, and scan flash drives.

4. Wait till the scanning is complete.

If Agnitum Outpost Firewall is installed on the computer where the utility KidoKiller has been launched, it is necessary to reboot the PC after the utility finishes its work.

5. Perform a full scan of your computer with Kaspers
ky Anti-Virus.

Switches to run the file kk.exe from the command prompt

r example, in order to scan a flash drive and write a detailed log into the file report.txt (which will be created in the setup folder of the file kk.exe), use the following command:

KK.exe -r -y -l report.txt -v

in order to scan another disk or partition, D for example:

KK.exe -p D:\


  • Digg
  • StumbleUpon
  • Reddit
  • RSS
Related Posts Plugin for WordPress, Blogger...