Wednesday, July 27, 2011

CCleaner 3.09

After installing and removing software, then browsing the Internet for a few months, all sorts of temporary information is left strewn across your hard drive. Worse, the Registry, which is a database of information about your computer, is left with erroneous entries that point to long-deleted directories, link file types to applications that don’t exist and even attempt to launch start up applications that were removed from your machine.

The answer is a system cleanser and there are few better tools than the free CCleaner. This tool will remove unwanted information, temporary files, your browsing history, huge log files and even the settings left behind by previously installed software. It also includes a Registry cleaner and optimiser, which will find and remove entries and streamline the database.

CCleaner doesn’t stop there. It includes some security tools such as a data eraser so you can make sure files and information is completely removed from your PC.

New features include a 64-bit native exe, brand new UI graphics and icons, much-improved internal scanning architecture, a Drive Wiper tool and a Intelligent cookie-keeping functionality.

CCleaner 3.09 ships with these new/improved features.

- Added Firefox 6.0 beta support.
Firefox: Temporary files, history, cookies, download history, form history.
- Added Google Chrome: Temporary files, history, cookies, download history, form history.
- Added Opera: Temporary files, history, cookies.
- Added Safari: Temporary files, history, cookies, form history.
- Added HTML5 Offline cache cleaning and management for Firefox.
- Added wildcard support to folders. (i.e. "Include1=PATH|%AppData%\*\|*.txt|RECURSE" or FileKey1=%AppData%\?*e|*.txt|RECURSE)
- Added convertion of custom file entry to folder when using wildcard.
- Added cleaning for Zune, BreezeBrowser Pro, FastStone Image Viewer, Notepad++ and NoteXpad.
- Improved cleaning for Real Player.
- Improved Chrome Saved Form Information and Saved Passwords cleaning.http://www.blogger.com/img/blank.gif
- Improved Enabling/Disabling Start Up items.
- Improved icons detection for Uninstall screen.
- Improved drag-and-drop functionality for Include/Exclude screen.
- Improved localization support.
- Improved Start Up items discovery.
- Improved memory handling and garbage collection.
- Minor UI tweaks.
Verdict:

You can't get much better than this free optimization tool, that will give your system a boost

Download from here: http://www.scanwith.com/download/CCleaner.htm

Wednesday, July 20, 2011

Facebook Scam Promises Google+ Invitation

Facebook Scam Promises Google+ InvitationTrying to get a Google+ invitation has been a hot conversation of the Internet, while people try their best to obtain an invite to the newest social network. Even though Google has loosened the reins and invites have started to flow, some Facebook users have received bogus invitations. These bogus invitations are scams deliberately designed to attack your Facebook account and steal your identifying information.

So how do the scammers know that Facebook users will fall for the bait? The scammers use an age old ploy and that is people’s weakness for greed. The announcement promises a user an invitation for themselves, plus additional invitations for 50 of your friends. However, once the user with the Facebook account takes the bait, the scammers can control their Facebook account.

The scammers’ next job is to attack the accounts of the Facebook user’s friends and family. So the attacks are not just limited to the greedy user, but can also have an effect on others who know the person whose account has been hacked. The scammers can then send more spam to other Facebook users making it look like you are the bad guy, when in fact you have no knowledge of what is being sent out by those using your Facebook account.

Last week someone on my friends and family list took the bait for a porn scam video. The video was an advertisement for a porn site and unfortunately, my achttp://www.blogger.com/img/blank.gifcount was used to make it look like I had sent out the message. After being notified by a friend of the receipt of the porn, I was able to find the offending post, remove it, and it now sits in my list of blocked junk Web sites and applications.

For what it’s worth, I received a Google+ invitation and I am currently testing the new social networking Web site. My circle of friends, acquaintances, and family is currently very small while I test out Google+ and I have only sent out one invitation thus far.

Posted by Ron Schenone on Jul 14, 2011
See post here

Thursday, July 7, 2011

10 Rules of Public WiFi Etiquette


by admin on July 6, 2011

Public WiFi hotspots are becoming more and more prevalent and are being used as a value-added feature by many businesses. While the offer of free internet access is sure to attract customers, there are some limits to its cost-effectiveness. This has caused some retailers and coffee shops to institute policies or charges for the service. For customers who want to to continue frequenting that bistro with laptop in tow – and still be welcome to so – the following are 10 rules of public WiFi etiquette you may want to keep in mind.

Pay Your Way – Remember that the goal for retail venues is sales, and that WiFi is a perk they are providing toward achieving end. Make sure you order something from the menu. For longer stays, make a purchase about once every hour.

Sit at a smaller table and use one chair. Leave the larger tables for parties of more than one. Use one chair and make the rest available to other tables and patrons, or consider sharing one if no smaller tables are available.

Charge up before taking your portable device to a public hotspot, thereby minimizing your need for external power. This is a hefty overhead cost for the WiFi host. An extra battery is also a good idea.

Be a good tipper. Remember, if you’ve got a server, he or she is likely to be subsisting on tips, which are normally based on a percentage of the check. So if you’ve been nursing a latte for over an hour, guess who pays for your visit, Mr. Skinflint?

Keep it Clean #1 – Be mindful of the websites you visit, and files you may open while in a public place. Avoid any potentially offensive material.

Keep it Clean #2 – Police your area and minimize the work required to prepare your table for the next visitor. Bus your own table between orders.

Don’t Hog Bandwidth – Keep the downloads to a minimum. Large file downloads when there’s a large group of users sharing bandwidth is a no-no.

Keep it Down – Not everyone wants to hear your music or your videos or whatever other kind of audio you’re listening to. Use earphones or a discreetly low volume setting and give those around you a break.

Mind the Traffic – If it’s none too crowded, then an extended stay to worhttp://www.blogger.com/img/blank.gifk from your laptop is probably OK. Once things start getting more crowded, though, it may be time to pack it up for the day.

Obey House Rules – Some establishments have policies regarding internet access, like restricting use during peak business hours, or maximum usage durations. If the AC outlets are covered up, take the hint.

If you have any interest in WiFi then you will want to read further articles at Wireless Internet Reviews, I found this to be a site to list in my bookmarks. Jeff.
http://wirelessinternetreviews.com/

Tuesday, July 5, 2011

Mozilla Thunderbird


Thunderbird is an email client from Mozilla, the organization better known for the Firefox web browser which has a great deal to offer. In addition to handling multiple email accounts, the program can also be used to subscribe to RSS feeds and access online newsgroups and a new tabbed interface makes it easy to jump between individual emails or different aspects of the program.

There are new tools available to make it easier to manage a burgeoning inbox Email archival makes it possible to remove messages from your main inbox while retaining them for future reference, and the advanced search facility takes the hard works out of tracking down messages using a keyword filtering and timeline system.

As is the case with Firefox, Thunderbird supports add-ons can be used to customize and extend the features of the program. Getting started with the email client has been greatly simplified thanks to automatic account setting detection and nice touches such as the appearance of a warning if an email is written which includes the word 'attached' but no attachment is added make Thunderbird a joy to use.

With advanced security, phishing protection and automatic updating, coupled with countless other features which are simply not found in other email clients, Thunderbird is the ideal program to handle your email correspondence and much more.

Verdict:
Thunderbird is a highly adaptable email client, feed reader and newsgroup tool and support for add-ons means it is endlessly extendable

http://downloads.pcauthority.com.au/article/2273-mozilla-thunderbird-3111

Friday, July 1, 2011

Is your WiFi secure.

Someone may be using your WiFi connection, they may well not be doing so
maliciously or even knowingly. Sometimes people can't tell which is
their own connection and they may honestly believe that they are using
their Wi-Fi router rather than yours. The best way to deal with this is
to set up your own security.

The optimal solution is to set up a strong password using WPA and change
it regularly. Once your network is functioning, you can switch off the
SSID broadcast [which prevents it from advertising the name of your
network] so it would effectively disappear as far as your neighbours are
concerned.

Firstly you need to determine the ip address of your
modem/router/gateway by finding the Gateway address [try the bookwork
that came with your modem] and putting that ip in the Address line of
your favorite Internet browser [You may not be able to do this via the
wireless (a security feature) so you may need to connect via an ethernet
cable] The address will be something like 192.168.1.1 or 192.168.2.1 or
10.1.1.1 or 192.138.1.254 etc.

At this point you will need to know the default username and password to
login to your device. Login is usually something like administrator or
admin, with a blank or admin password or just a blank username field
with the word password for the login credentials [try the bookwork that
came with your modem for this too].

After you login to the device look for a tab or link that simply says
"Wireless" or "Wireless Security" where you can select the type of
security [use WPA-PSK as it is the strongest of the encryption methods,
or WPA2 if your computer will support it, it is the optimal security
method] that you would like to use for wireless access by computers
connecting to your network. You will need to add a shared-key, to
protect against an attack, a random passphrase of 8 to 63 printable
ASCII [Letters/numbers/symbols]characters is sufficient.

This key will basically be the PASSWORD to your Network [other
computers on your network will also need to use this same key], so only
people who know it will be able to log on to your network. The name of
your network will still appear for people in range, but they will have
to know your shared-key key.

Anyone now trying to access your network will be asked to log in with
your shared-key key. With them not knowing it your network is secure.