Saturday, May 11, 2013
Windows 8 Shutdown Button replacment.
Would you like an easier way to close your Win8 computer OS.
[1] Open windows Explorer [ windows key + E key ] .
[2] left click on C: drive.
[3] In the right window double click on Windows.
[4] Search for "Shutdown.exe" and right click it.
[5] Left click on "Create shortcut".
[6] c,Left lick on Yes.
[7] Change the shortcut name to SHUTDOWN.
[8] Right click on the shortcut and double click on Properties.
[9] Left click on "Change Icon, then on OK.
You now have a Shutdown button on the Desktop. Enjoy.
Monday, April 29, 2013
Drive-by Download Attacks
A common way to get infected with malware is by visiting compromised
websites. Cyber criminals use drive-by download attacks to gain access
to your system. Drive-by downloads are malicious programs that are
installed on your computer while visiting an infected website or viewing
an HTML email message. Just like other malware, drive-by downloads are
installed without your consent and can infect your PC, tablet, or
smartphone.
Drive-by downloads are dangerous because you don't have to have to click on a hyperlink within a webpage or email to get infected. The malware installs on your computer just by visiting the compromised website or by opening the infected email. Drive-by downloads are considered to be client-side attacks, which target vulnerabilities within your system. The malware can exploit browser and system vulnerabilities due to low security settings.
Once installed, the malware deployed by a drive-by download is capable of stealing your personal information by logging your keystrokes and can install additional malware. iLivid and Seedabutor are malware examples that are deployed by drive-by downloads. The best prevention method is to ensure that you have the latest Internet browser version installed and that you have the appropriate settings configured. Furthermore, you can view your emails in plain text with no HTML formatting. Disabling HTML features can prevent an infected email from compromising your system.
Drive-by downloads are dangerous because you don't have to have to click on a hyperlink within a webpage or email to get infected. The malware installs on your computer just by visiting the compromised website or by opening the infected email. Drive-by downloads are considered to be client-side attacks, which target vulnerabilities within your system. The malware can exploit browser and system vulnerabilities due to low security settings.
Once installed, the malware deployed by a drive-by download is capable of stealing your personal information by logging your keystrokes and can install additional malware. iLivid and Seedabutor are malware examples that are deployed by drive-by downloads. The best prevention method is to ensure that you have the latest Internet browser version installed and that you have the appropriate settings configured. Furthermore, you can view your emails in plain text with no HTML formatting. Disabling HTML features can prevent an infected email from compromising your system.
Tuesday, April 23, 2013
The Firefox Redirect Virus
The Firefox Redirect Virus can be an annoying, dangerous malware. Similar to the iLivid Virus, it reconfigures your Firefox browser by changing your security settings and home page, and modifying your Domain Name System (DNS) settings. Consequently, the Firefox Redirect Virus manipulates your search engine results and loads malicious websites. It will attempt to infect your system with additional malware, such as logic bombs and Trojan horses.
Please be aware that Mozilla Firefox is not responsible for the Firefox Redirect Virus. Mozilla offers a simple way to restore your Firefox Internet browser to its default settings. The Reset Firefox feature provides a fast and easy way to fix most of your issues, including the Firefox Redirect Virus. This feature also allows you to keep your bookmarks, browsing history, passwords, and Internet cookies. Perform the following steps to reset your Firefox browser to its default state:
Launch your Mozilla Firefox Internet browser. Click on the Firefox button located on the upper-left corner, select Help, and click on Troubleshooting Information.
The Troubleshooting Information support page will be displayed on your Firefox browser. Click on the Reset Firefox button located on the upper-right corner.
When the confirmation window opens, click on Reset Firefox.
The Firefox browser will close and a window will list the information that was imported. Click Finish, and Firefox will open with its default settings.
These steps may help you remove the Firefox Redirect Virus. As always, keep your antivirus and antispyware applications updated to combat the latest malware threats. If you use other browsers, such as Internet Explorer, you will encounter similar security threats. Ensure that your browser is running the latest version.
http://antivirus.about.com/b/2013/03/24/firefox-redirect-virus-removal.htm?nl=1
Please be aware that Mozilla Firefox is not responsible for the Firefox Redirect Virus. Mozilla offers a simple way to restore your Firefox Internet browser to its default settings. The Reset Firefox feature provides a fast and easy way to fix most of your issues, including the Firefox Redirect Virus. This feature also allows you to keep your bookmarks, browsing history, passwords, and Internet cookies. Perform the following steps to reset your Firefox browser to its default state:
Launch your Mozilla Firefox Internet browser. Click on the Firefox button located on the upper-left corner, select Help, and click on Troubleshooting Information.
The Troubleshooting Information support page will be displayed on your Firefox browser. Click on the Reset Firefox button located on the upper-right corner.
When the confirmation window opens, click on Reset Firefox.
The Firefox browser will close and a window will list the information that was imported. Click Finish, and Firefox will open with its default settings.
These steps may help you remove the Firefox Redirect Virus. As always, keep your antivirus and antispyware applications updated to combat the latest malware threats. If you use other browsers, such as Internet Explorer, you will encounter similar security threats. Ensure that your browser is running the latest version.
http://antivirus.about.com/b/2013/03/24/firefox-redirect-virus-removal.htm?nl=1
Saturday, February 9, 2013
Adobe Flash is under attack
Attacks on Java may be subsided for a few days but the other kink in your armor — Flash — is now under attack. Adobe has released a security bulletin notifying Windows and Mac OS X users to update to Flash 11.5.502.149 because of an ongoing attack targeting Windows and Mac OS X users, an attack that exploits a Flash vulnerability in previous versions of Flash.
According to Adobe, in-the-wild attacks aimed at Windows users via Microsoft Word documents that contained infected SWF content; this attack is being conducted via e-mails that are spreading these Word files through attachments. The attack on Mac OS X users is via websites that utilize drive-by-downloads (i.e. something that is automatically downloaded to a user’s computer upon visiting an infected website). Any Mac users running Safari and Firefox is susceptible to this attack.
If infected, the vulnerability in Flash allows scumbags to remotely take over your computer.
Windows and Mac OS X users are encourage to update to the latest version of Flash — 11.5.502.149 — that protects against this particular vulnerability. Chrome and Internet Explorer 10 will issue their own updates to Flash. Adobe has also issued updates to Flash for Linux and Android but those platforms are not currently under attack via this specific vulnerability.
If you are unsure what version of Flash you have, you can go to this link which will tell you what version you have: http://www.adobe.com/software/flash/about/
Monday, January 28, 2013
Mirage Anti-Bot
Mirage Anti-Bot is a compact antivirus tool which aims to prevent you from accessing websites infected by the ZeuS, Palevo and SpyEye bots.
The program is fairly straightforward, in theory at least. The key point to remember is that you must launch it as an administrator (right-click the shortcut, select Run As Administrator). Then just click the Update button, and the program will download the abuse.ch blocklist (a major list of infected domains) and update your Windows HOSTS file accordingly, effectively preventing any browser you might run (or any other internet software) from reaching the malicious sites.
There are also a few small extras. Mirage Anti-Bot can log attempted accesses to blocked sites, for instance, perhaps helping you to see if it's doing anything useful. And if you'd like to prevent your kids from accessing a specific domain or two then you can add those sites to the list, too.
The program has significant limitations, of course. Mirage Anti-Bot isn't trying to detect malware on these websites, for instance, it's just blocking domains on a secondary list: if you try to visit an infected site which hasn't made it to the abuse.ch blocklist yet then the program won't be able to help you. So Mirage Anti-Bot is no substitute for a full antivirus tool with proper real-time browsing protection.
You also have to remember to run the program as an administrator, because if you forget then it doesn't seem to realise there's anything wrong, and still claims it's updated your HOSTS file even when nothing's happened at all. The simplest approach is probably just to tweak its shortcut accordingly (right-click, select Properties > Compatibility, check "Run this program as an administrator").
Still, once we'd sorted this out, the program worked well. Mirage Anti-Bot's simplicity means you'll be able to run it alongside your existing tool without any conflicts. And with the program using barely 7MB of RAM on our test PC, it's a reasonable choice to provide an extra layer of protection for your system.
Verdict:
Mirage Anti-Bot is a simple way to add an extra layer of security to your PC.
http://downloads.pcauthority.com.au/article/27050-mirage_anti-bot
Thursday, January 24, 2013
Windows Media Center 8 for FREE from MS for a limited time.
Unlike Windows 7, Windows 8 will not come with Windows Media Center as part of the operating system.
It's now an add-on that can be purchased through the Add Features option in Windows 8.
For a limited time, however, Microsoft is offering Windows Media Center to Windows 8 Pro customers for free. Here's how to get it.
1 Request your free product key from windows.microsoft.com/en-US/windows-8/feature-packs
2 They will send it by email in about 20 min to 48 hours.
3 Then hit the shortcut, Win+W, then type "add features." Select "Add features to Windows 8."
4 Click on "I already have a product key," then enter your product key. Click Next to continue.
5 Agree to the licensing agreement, then click "Add features."
Once the offer expires on January 31, 2013, the cost to add Windows Media Center will be $9.99.
This offer does not apply to Windows 8 users who aren't running the Pro version.
Don't forget to check your version of Win 8, when your comp starts does it say Windows 8 Pro, if not this freebee will not work.
It's now an add-on that can be purchased through the Add Features option in Windows 8.
For a limited time, however, Microsoft is offering Windows Media Center to Windows 8 Pro customers for free. Here's how to get it.
1 Request your free product key from windows.microsoft.com/en-US/windows-8/feature-packs
2 They will send it by email in about 20 min to 48 hours.
3 Then hit the shortcut, Win+W, then type "add features." Select "Add features to Windows 8."
4 Click on "I already have a product key," then enter your product key. Click Next to continue.
5 Agree to the licensing agreement, then click "Add features."
Once the offer expires on January 31, 2013, the cost to add Windows Media Center will be $9.99.
This offer does not apply to Windows 8 users who aren't running the Pro version.
Don't forget to check your version of Win 8, when your comp starts does it say Windows 8 Pro, if not this freebee will not work.
Monday, January 21, 2013
Take a screenshot of your Active window.
In Windows, If you want to, you can take a screenshot of only the active window or program, not the whole Screen.
Before you learn this trick on how to take a screenshot of the active window, it is a good idea to actually know what ‘active window’ means.
It is actually pretty simple. ‘Active window’ is simply the window or program that you are currently in — the window or program that you are actively using. For example, let’s say you have three windows open — Firefox, Windows Explorer, and My Documents. Then let’s say you are currently using Firefox. The active window, therefore, is Firefox. If you switch to Windows Explorer and start using it, Windows Explorer becomes the active window. Same holds true for My Documents or any other window or program that you have open.
HOW TO TAKE SCREENSHOT OF ACTIVE WINDOW ONLY
As already mentioned, tapping Print Screen (or PRT SC, as some keyboards call it) takes a screenshot of your whole screen. If you want to take a screenshot of your active window only, you need to hold ALT while pressing Print Screen. In other words, pressing ALT + Print Screen takes a screenshot of only the active window.
Once you press ALT + Print Screen, a screenshot of the active window is copied to Windows Clipboard; you need to open up your favorite image editor [e.g. Microsoft Paint, Photo shop], paste the screenshot [Ctrl + V], and save it — just like you would do if you used just Print Screen.
Tuesday, January 1, 2013
Toolwiz TimeFreeze
If you keep uninstalling after trying software you thought you might like, then just go download “Toolwiz TimeFreeze” [ http://www.toolwiz.com/products/toolwiz-time-freeze/ ] It’s free. Just start Timefreeze before any download. If you don’t like the new software just restart your computer when you’re done trying it out and Timefreeze will ask if you want to keep it. If you don’t like it say “NO” and restart, when your computer boots back up it’s back to the exact state it was before the installation.
NOTE:
If you don’t wish to install Timefreeze software, then please create a restore point before installing new software. If you don’t like what it did, the software, etc., just restore your computer using the restore point you created before the install. I believe Windows should create a restore point at the beginning of anything being installed but I’ve noticed this doesn’t always work right and it’s best to create your own instead of depending on the system to think for you!
A Happy New Year to all my friends out there in cyberspace. Jeff.
Subscribe to:
Posts (Atom)