Wednesday, 30 June 2010
Proxifier 2.91 Incl. Serial
Proxifier is a software that will allow network programs that do not support working through proxy servers operate through a SOCKS or HTTP proxy server or a chain of proxy servers.
There are many network applications that do not support working through proxy servers and thus cannot be used from LAN or with firewalls. These can compromise corporate privacy and lead you to many other restrictions.
Proxifier solves all of these problems and gives you the opportunity to work with your favorite software without any restrictions. Besides, it lets you gain extra control over network security and add more power to network functionality.
With Proxifier you can work with any Internet clients (browsers, ftp, ICQ, IRC, Kazaa, telnet, ssh, video/audio, games...) from network that is separated from Internet by a firewall (only one open port is required).
Proxifier will help secure your privacy. Send and receive email through a proxy server or a chain of proxy servers, all email clients are supported (Outlook, Eudora, Netscape and others).
Here are some key features of "Proxifier":
· Run any network applications through proxy server; no special configuration is required for the software.
· Access the Internet from restricted local area network through a proxy server gateway.
· Bypass firewall restrictions (connect to restricted ports).
· Use three types of proxy servers: SOCKS v4, SOCKS v5, and HTTP.
· "Tunnel" the entire system (force all network connections in the system work through a proxy server).
· Resolve DNS names through a proxy server.
· Use flexible Proxification Rules.
· Secure privacy by hiding your IP address.
· Work through a chain of proxy servers using different protocols.
· Use NTLM authentication on HTTP proxy
· View information on current connections (addresses, rate, data transfer, connection time, etc.) in real-time.
· View information on bandwidth usage as a colored diagram in real-time.
· Maintain log files.
· Log incoming and outgoing traffic.
· Get detailed reports on network errors.
Proxifier 2.91 Incl. Serial
Proxifier 2.91 | 907 KB
Proxifier is a software that will allow network programs that do not support working through proxy servers operate through a SOCKS or HTTP proxy server or a chain of proxy servers.
There are many network applications that do not support working through proxy servers and thus cannot be used from LAN or with firewalls. These can compromise corporate privacy and lead you to many other restrictions.
Proxifier solves all of these problems and gives you the opportunity to work with your favorite software without any restrictions. Besides, it lets you gain extra control over network security and add more power to network functionality.
With Proxifier you can work with any Internet clients (browsers, ftp, ICQ, IRC, Kazaa, telnet, ssh, video/audio, games...) from network that is separated from Internet by a firewall (only one open port is required).
Proxifier will help secure your privacy. Send and receive email through a proxy server or a chain of proxy servers, all email clients are supported (Outlook, Eudora, Netscape and others).
Here are some key features of "Proxifier":
· Run any network applications through proxy server; no special configuration is required for the software.
· Access the Internet from restricted local area network through a proxy server gateway.
· Bypass firewall restrictions (connect to restricted ports).
· Use three types of proxy servers: SOCKS v4, SOCKS v5, and HTTP.
· "Tunnel" the entire system (force all network connections in the system work through a proxy server).
· Resolve DNS names through a proxy server.
· Use flexible Proxification Rules.
· Secure privacy by hiding your IP address.
· Work through a chain of proxy servers using different protocols.
· Use NTLM authentication on HTTP proxy
· View information on current connections (addresses, rate, data transfer, connection time, etc.) in real-time.
· View information on bandwidth usage as a colored diagram in real-time.
· Maintain log files.
· Log incoming and outgoing traffic.
· Get detailed reports on network errors.
Tuesday, 29 June 2010
Real Hide IP v3.6.0.6 Incl. Crack
Real Hide IP v3.6.0.6 | 2.32 MB
Real Hide IP - allows you to surf anonymously, change your IP address, and guard against hacker intrusions. Your IP address - your idevindualnost and can be used by hackers to break into your computer, steal personal information or damage your data. Real Hide IP enables you to prevent identity theft, take action against hacker intrusions, surf anonymously, change your IP address with just one click of a button.
Ardamax Keylogger 2.85 Incl. Serial
Ardamax Keylogger 2.85 Incl. Serial | 425.05 KB
Ardamax Keylogger is a keystroke recorder that captures user's activity and saves it to an encrypted log file. The log file can be viewed with the powerful Log Viewer. Use this tool to find out what is happening on your computer while you are away, maintain a backup of your typed data automatically or use it to monitor your kids. Also you can use it as a monitoring device for detecting unauthorised access. Logs can be automatically sent to your e-mail address, access to the keylogger is password protected. Besides, Ardamax Keylogger logs information about the Internet addresses the user has visited.
This invisible spy application is designed for Windows 98, ME, NT4, 2000, XP and 2003.
Keylogger Features:
* Remote Installer - creates a customized Ardamax Keylogger engine file. You can email this file to your target for remote monitoring.
* Invisible mode makes it absolutely invisible to anyone. Ardamax Keylogger is not visible in the task bar, system tray, Windows 98/2000/XP/2003/Vista Task Manager, process viewers (Process Explorer, WinTasks etc.), Start Menu and Windows Startup list.
* Email log delivery - keylogger can send you recorded logs through e-mail delivery at set times - perfect for remote monitoring!
* FTP delivery - Ardamax Keylogger can upload recorded logs through FTP delivery.
* Network delivery - sends recorded logs through via LAN.
* Clipboard logging - capture all text copied to the Windows Clipboard.
* Visual surveillance - periodically makes screenshots and stores the compressed images to log.
* Chat monitoring - Ardamax Keylogger is designed to record and monitor both sides of a conversation in following chats:
o MSN Messenger, Windows Live Messenger
o ICQ Pro, ICQ Lite
o Skype
o Windows Messenger
o Google Talk
o Yahoo Messenger
o Miranda
o QiP
* Security - allows you to protect program settings, Hidden Mode and Log file.
* Web Update - Ardamax Keylogger can check the availability of updates, download and install them automatically. Thus, the latest version of Ardamax Keylogger will always be installed on your computer.
* Application monitoring - keylogger will record the application that was in use that received the keystroke!
* Time/Date tracking - it allows you to pinpoint the exact time a window received a keystroke!
* Powerful Log Viewer - you can view and save the log as a HTML page or plain text with keylogger Log Viewer.
* Small size – Ardamax Keylogger is several times smaller than other programs with the same features. It has no additional modules and libraries, so its size is smaller and the performance is higher.
* Ardamax Keylogger fully supports Unicode characters which makes it possible to record keystrokes that include characters from Japanese, Chinese, Arabic and many other character sets.
* It records every keystroke. Captures passwords and all other invisible text.
Other Features:
* Windows 2000/XP/Vista support
* Monitors multi-user machines
* Automatic startup
* Friendly interface
* Easy to install
Monday, 28 June 2010
WebcamMax 7.1.5.2 Incl. Crack
WebcamMax 7.1.5.2 | 24.93 MB
WebCamMax advanced utility to work with a webcam. The program, which adds amazing video effects to all webcams, even without a real camera. The program can be used by default in applications such as ICQ, AIM, MSN, Camfrog, Skype, Paltalk, Yahoo, ANYwebcam, Stickam. You can configure WebcamMax Full so that she would begin to operate and maintain broadcast from the camera only when the lens will lock the movement.
Features:
* For all webcam programs, ICQ, AIM, MSN, CamFrog, Skype, Paltalk, Yahoo Messenger etc.
* More than 1,000 effects at www.webcammax.com, including Mosaic, TV wall, Movie scene, Water, Smog, Emboss, Emotions and etc
* Floating text over video.
* Switching dynamically between multiple live and stored sources (videos, movies, pictures, or real time desktop).
* Effects DIY.
* Sharing single webcam by multiple programs at the same time.
* Becoming fashionable, sexy, cute, romantic or bewitched, or even horrible.
* Taking photos with whatever background you like and whenever you want.
Sunday, 27 June 2010
Speeding up TOR
Some of us might use TOR so I'd like to share some code to speed up TOR slightly.
If you use TOR, you probably have experienced slow connections sometimes. Below, I'll attempt to give instructions to speed up TOR.
First thing is you will need to have Vidalia bundle installed. (obviously)
Next, double-click the icon for Vidalia Control Panel in your task bar. This should bring up the Vidalia Control Panel
Click on "settings" to bring up the settings screen.
Click on the "Advanced" button to bring up that tab.
Take not of the path to the "Tor Configuration File".
Go to that location and open up the "torrc".
***Alternative to the above instructions***
Go to START - PROGRAMS - VIDALIA BUNDLE - TOR - TORRC
This will open up the Torrc in notepad.
******
Make a backup of torrc before editing.
After you get the torrc open, at the end of it, paste the following code:
-------------------------------------------------------------------------
# Try for at most NUM seconds when building circuits. If the circuit isn't
# open in that time, give up on it. (Default: 1 minute.)
CircuitBuildTimeout 5
# Send a padding cell every N seconds to keep firewalls from closing our
# connections while Tor is not in use.
KeepalivePeriod 60
# Force Tor to consider whether to build a new circuit every NUM seconds.
NewCircuitPeriod 15
# How many entry guards should we keep at a time?
NumEntryGuards 8
-------------------------------------------------------------------------
Go back to the Vidalia Control Panel from the task bar and click Stop Tor, then Start Tor. This will restart Tor.
Hope this helps and if anyone else knows of any other settings that can optimize TOR for maximum performance.
If you use TOR, you probably have experienced slow connections sometimes. Below, I'll attempt to give instructions to speed up TOR.
First thing is you will need to have Vidalia bundle installed. (obviously)
Next, double-click the icon for Vidalia Control Panel in your task bar. This should bring up the Vidalia Control Panel
Click on "settings" to bring up the settings screen.
Click on the "Advanced" button to bring up that tab.
Take not of the path to the "Tor Configuration File".
Go to that location and open up the "torrc".
***Alternative to the above instructions***
Go to START - PROGRAMS - VIDALIA BUNDLE - TOR - TORRC
This will open up the Torrc in notepad.
******
Make a backup of torrc before editing.
After you get the torrc open, at the end of it, paste the following code:
-------------------------------------------------------------------------
# Try for at most NUM seconds when building circuits. If the circuit isn't
# open in that time, give up on it. (Default: 1 minute.)
CircuitBuildTimeout 5
# Send a padding cell every N seconds to keep firewalls from closing our
# connections while Tor is not in use.
KeepalivePeriod 60
# Force Tor to consider whether to build a new circuit every NUM seconds.
NewCircuitPeriod 15
# How many entry guards should we keep at a time?
NumEntryGuards 8
-------------------------------------------------------------------------
Go back to the Vidalia Control Panel from the task bar and click Stop Tor, then Start Tor. This will restart Tor.
Hope this helps and if anyone else knows of any other settings that can optimize TOR for maximum performance.
CCleaner 2.30
CCleaner 2.30 | 3.19 MB
CCleaner is our system optimization, privacy and cleaning tool. It removes unused files from your system - allowing Windows to run faster and freeing up valuable hard disk space. It also cleans traces of your online activities such as your Internet history. Additionally it contains a fully featured registry cleaner. But the best part is that it's fast (normally taking less than a second to run) and contains NO Spyware or Adware!
Cleans the following:
Internet Explorer
Temporary files, history, cookies, Autocomplete form history, index.dat.
Firefox
Temporary files, history, cookies, download history, form history.
Google Chrome
Temporary files, history, cookies, download history, form history.
Opera
Temporary files, history, cookies.
Safari
Temporary files, history, cookies, form history.
Windows
Recycle Bin, Recent Documents, Temporary files and Log files.
Registry Cleaner
Advanced features to remove unused and old entries, including File Extensions, ActiveX Controls, ClassIDs, ProgIDs, Uninstallers, Shared DLLs, Fonts, Help Files, Application Paths, Icons, Invalid Shortcuts and more... also comes with a comprehensive backup feature.
Third-party applications
Removes temp files and recent file lists (MRUs) from many apps including Media Player, eMule, Google Toolbar, Netscape, Microsoft Office, Nero, Adobe Acrobat, WinRAR, WinAce, WinZip and many more...
100% Spyware FREE
This software does NOT contain any Spyware, Adware or Viruses.
Saturday, 26 June 2010
Connection Keeper
Connection Keeper | 4.25 MB
Connection Keeper is an invaluable time-saving tool for dial-up users. This free program simulates Internet browsing (at a random interval) to prevent your connection from appearing idle, thus preventing your ISP from dropping the connection due to inactivity. Connection Keeper can also automatically close many types of popup windows, such as those asking if you wish to stay connected. And if the connection is lost, Connection Keeper can automatically dial back in, restoring the connection as fast as possible.
Features:
1. Works with all versions of Windows® 95, 98, NT4, 2000, ME, XP, 2003, Vista, 2008, and 7.
2. Can be set to automatically redial if the connection is lost.
3. Can automatically close popup windows that ask the user if they want to stay online. Several methods are available: simulated button click, simulated keystrokes, or by sending a window message.
4. Can be minimized to the system tray so that it does not take up space on the taskbar.
5. Can run when not connected to the Internet. It waits patiently until a connection is made.
6. Uses very little computer resources.
7. The simulated activity takes up almost no bandwidth.
8. The interval at which Connection Keeper simulates activity is adjustable, or it can be set to a random interval.
9. Connection Keeper can download a real or bogus URL. The list of real URL's can be edited.
10. Connection Keeper can be used to monitor web sites and even DNS records. Errors can be reported by a popup window or by email.
11. Command line parameters can be used to close a specific popup window.
12. Command line parameters can be used to check for the existence of a file. An error will only appear if there is a problem. This is useful for checking the status of the network when the computer boots up.
Command line parameters can be used to download a web page and report any errors that occur. This is useful for checking the status of a web site when the computer boots up.
13. Connection Keeper installs no malware and displays no advertisements.
Magic DVD Ripper 5.2.1 Incl. Crack
Magic DVD Ripper 5.2.1 |2.74 MB
Magic DVD Ripper is a very easy and powerful DVD ripping software, which can convert DVD to VCD, SVCD, AVI(DivX), WMV, MP3, iPod and PSP formats or backup DVD to hard drive without any loss of quality. You can then enjoy them anytime without DVD discs or burn them to blank DVD or CD discs using burning software. It can copy protected DVD to hard drive with 4 optional mode (disc fully, main movie, split DVD-9 into DVD-5, files). With optimized for Intel CPU, Magic DVD Ripper provides fast ripping speed and wonderful output quality.
Key Features of Magic DVD Ripper:- Convert DVD to DivX or other AVI formats
- Convert DVD to WMV
- Convert DVD to mp4 (iPod and PSP formats)
- Convert DVD to VCD or SVCD
- Copy DVD movie to hard drive without any loss of quality
- Remove all the restrictions of DVD (CSS, Region, RCE, Sony ARccOS, PuppetLock)
- Copy main movie only or split DVD-9 into 2 DVD-5
- Compress DVD to fit on a 4.7 GB disc
- Very easy to use, just by one click
- High ripping speed and wonderful output quality
File Scavenger 3.2 Incl. Crack - Data Recovery Utility
File Scavenger 3.2 | 222.89 KB
File Scavenger is a file "undelete" and data recovery utility for Windows XP, Windows 7, Vista, Windows Server 2003, Windows 2000, Windows NT and Windows ME/98/95. File Scavenger can recover files that have been accidentally deleted (including files removed from the Recycle Bin, in a DOS window, from a network drive, from Windows Explorer with the SHIFT key held down) provided that recovery is attempted before the files are permanently overwritten by new data. File Scavenger® supports both basic and dynamic disks, NTFS compression, alternate data streams, sparse files, Unicode filenames, etc. Except in severe cases, both the file and the folder path leading to the file can be recovered.
File Scavenger can also recover files from a reformatted or corrupted volume even when the volume has been deleted and its original position and size are unknown. File Scavenger can scan an entire physical hard drive to look for traces of defunct volumes.
File Scavenger uses advanced algorithms to handle disks with bad sectors and badly corrupted partitions. It can be installed on a hard drive or run from a portable storage device such as a memory stick, removable drive, CD or floppy disk. To run File Scavenger, you must log on as a system administrator to the computer where data recovery is intended.
Files can only be restored if the disk areas allocated to the files have not been overwritten by new data. All recovered files should be validated for the integrity of the recovered data.
Game Booster 1.4
Game Booster 1.4 | 1.11 MB
Game Booster is an easy-to-use program that shuts down unnecessary system processes in order to improve the performance of resource-thirsty games. With an intuitive interface that makes it easy to switch between gaming mode and normal mode, Game Booster is a simple but powerful program.
Game Booster's interface is basic, with a list of 24 noncritical processes that can be shut down during gaming. Check boxes allow users to select specific processes. It is true that you have to take a leap of faith with some of these; if you're not extremely computer savvy, you may have no idea what it is that you're shutting down. We can say that our system suffered no ill effects from temporarily disabling all of the listed processes, and the program quickly started them again when we switched back to normal mode. We do wish that the program came with a Help file that went into detail about this issue, though. In addition to disabling unnecessary system processes, Game Booster offers a game defragmenter that specifically defragments the game directories, allowing a given game to start and run more quickly. Overall, we found Game Booster to be both easy to use and effective. We noticed a significant difference in game performance when using gaming mode, and we think this is a great choice for users who need to optimize their systems for gameplay.
TV Player Classic 6.7.14
TV Player Classic 6.7.14 | 2 MB
TV Player Classic is a program for viewing online internet TV channels and recording it into AVI (Xvid, DivX, etc.) , viewing and recording streams from TV tuner and camera. Network streaming.. This software allows you to watch 400 paid online internet TV channels TOTALLY FREE (including SPORT, NEWS, ENTERTAIMENT, MOVIES, REALITY, LIFESTYLE, SHOPPING, MUSIC, KIDS, GAMES ... ) and 1200+ free live television channels from 100+ countries.
Main Features:
- viewing and recording of more than 1200 totally free TV streaming from Internet channels;
- viewing and recording of the TV programs from the TV channels received through the TV tuner or from the videocamera;
- broadcasting of your own channel from the TV tuner, from the videocamera or from some other Internet channel to the Internet;
- recording of all the videostreams in the AVI (Xvid, DivX etc.) format at the realtime or after the recording;
- free viewing of more than 400 international paid channels TOTALLY FREE;
- the availability of the TV Dual mode which is used to output the copy of picture to the television set or to the other monitor;
- the availability of the Embedded/Separate mode which is used to view the picture at the selected place of the monitor, provided with the possibility to adjust the size;
- viewing of the TV channels on the monitor and/or on television in the fullscreen mode;
- filtration of the Internet connection speed to choose the channels for high-grade viewing;
- total saving of all the current settings when you exit the program and restoring of them at the next start of the program;
- updating of the list of the TV channels;
- the proxy server support;
- there is NO NEED TO INSTALL ADDITIONAL SOFTWARE (such as Windows media player, Real player etc.) to view the free channels.
The channels of the following content are broadcast: feature films, sports, educational, musical, news, weather forecasts, webcams, entertaining etc. The channels are broadcast in English, French, Spanish, German, Portuguese, Russian and Arabic. These channels are streamed over the Internet for free and do not require any subscription. All the channels are classified as for the countries and categories. You can add selected channels to a Favorite list for faster access in the future.
Internet Download Manager 5.18.7 Incl. Crack
Internet Download Manager 5.18.7 | 3.06 MB
Internet Download Manager (IDM) is a tool to increase download speeds by up to 5 times, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use.Internet Download Manager has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download managers and accelerators Internet Download Manager segments downloaded files dynamically during download process and reuses available connections without additional connect and login stages to achieve best acceleration performance.
Internet Download Manager supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all other popular browsers to automatically handle your downloads. You can also drag and drop files, or use Internet Download Manager from command line. Internet Download Manager can dial your modem at the set time, download the files you want, then hang up or even shut down your computer when it's done.
Other features include multilingual support, zip preview, download categories, scheduler pro, sounds on different events, HTTPS support, queue processor, html help and tutorial, enhanced virus protection on download completion, progressive downloading with quotas (useful for connections that use some kind of fair access policy or FAP like Direcway, Direct PC, Hughes, etc.), built-in download accelerator, and many others.
Monday, 7 June 2010
THE ANTI-VIRUS OR ANTI-MALWARE TEST FILE
The EICAR test file (official name: EICAR Standard Anti-Virus Test File) is a file, developed by the European Institute for Computer Antivirus Research, to test the response of computer antivirus (AV) programs. The rationale behind it is to allow people, companies, and AV programmers to test their software without having to use a real computer virus that could cause actual damage should the AV not respond correctly. EICAR likens the use of a live virus to test AV software to setting a fire in a trashcan to test a fire alarm, and promotes the EICAR test file as a safe alternative.
AV programmers set the EICAR string as a verified virus like any other signatures. A compliant virus scanner, when detecting the file, will respond in exactly the same manner as if it found genuinely harmful code. Its use can be more versatile than straightforward detection: a file containing the EICAR test string can be compressed or archived, and then the antivirus software can be run to see whether it can detect the test string in the compressed file.
The file is simply a text file of either 68 or 70 bytes that is a legitimate executable file called a COM file that can be run by Microsoft operating systems and some work-alikes (except for 64-bit due to 16-bit limitations), including OS/2. When executed, it will print "EICAR-STANDARD-ANTIVIRUS-TEST-FILE!" and then stop. The test string was specifically engineered to consist of ASCII human-readable characters, easily created using a standard computer keyboard. It makes use of self-modifying code to work around technical issues that this constraint makes on the execution of the test string.
An EICAR test file can be easily created using any text editor, i.e. Notepad. To create an EICAR test file, copy and paste the following line into a blank Notepad file:
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
Save the file as any file name you want. It is now ready for testing. In fact, if your active protection was working properly, the simple act of saving the file should have triggered an alert.
AV programmers set the EICAR string as a verified virus like any other signatures. A compliant virus scanner, when detecting the file, will respond in exactly the same manner as if it found genuinely harmful code. Its use can be more versatile than straightforward detection: a file containing the EICAR test string can be compressed or archived, and then the antivirus software can be run to see whether it can detect the test string in the compressed file.
The file is simply a text file of either 68 or 70 bytes that is a legitimate executable file called a COM file that can be run by Microsoft operating systems and some work-alikes (except for 64-bit due to 16-bit limitations), including OS/2. When executed, it will print "EICAR-STANDARD-ANTIVIRUS-TEST-FILE!" and then stop. The test string was specifically engineered to consist of ASCII human-readable characters, easily created using a standard computer keyboard. It makes use of self-modifying code to work around technical issues that this constraint makes on the execution of the test string.
An EICAR test file can be easily created using any text editor, i.e. Notepad. To create an EICAR test file, copy and paste the following line into a blank Notepad file:
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
Save the file as any file name you want. It is now ready for testing. In fact, if your active protection was working properly, the simple act of saving the file should have triggered an alert.
Wednesday, 5 May 2010
MOJOPAC -Carry your Windows XP in USB / make favorite applications portable
It has been time when we used Mozilla portable edition , and even portable games through pen drives and i-pods.
But this is some thing different.
This software can make an windows OS portable.
No no its not XP portable edition. Rather its making your xp running on another XP with your favorite software installed in it.
This way you can make your application portable to use it anywhere.
This software is called as ” MOJOPAC”.
Now-a-days many portable softwares are available in market out of which mojopac is one.
But what I like about mojopac is that it maps your pen drive as default c: drive and the other drives get shown in partitions.
Which ever software you install , it gets installed in your pen drive or i-pod.
When you start mojopac portable environment, it asks for username and password.
After entering username and password it log you on to your OS.
And there you get your free environment ready made with your favourite software apps.
It supports majority of softwares.
visit http://www.mojopac.com/ for more information on supported apps and features.
Advantages:
1] You can make majority of softwares protable including games also at $0 .
2] No web cache , no passwords etc are left on host windows.
3] Works great on USB, external and portable hard drives, i-pods.
4] You have your own favorites , wallpaper , desktop as if you are at your own pc.
5] mapped c: drive.
6] Username and password required to start virtual environment.
7] If a virus tries to infect in mojopac environment , it gets infected on USB and it can harm USB files . And the files on Host computer becomes safe.
8] Auto-update.
Disadvantages:
1] No encryuption of data on USB drive.
2] User can modify files on virutal pc. Which is sign of weak vitualization. Where as Vmware is seen with strong virtualization. (this will get fixed in future versions)
3] You have to use third party software like truecryupt to encrypt your data.
4] Not supported for some apps.
How to use??
1] just download mojopac from http://www.mojopac.com/.
2] install it in your USB drive.
3] let the setup finish.
4] after loading mojopac environment , start installing all your apps and games. customize your desktop.
5] plug your USB stick into any windows XP . Click on start and start using your desktop on the go.
So when next time you go , go with your desktop in your pocket !!!
But this is some thing different.
This software can make an windows OS portable.
No no its not XP portable edition. Rather its making your xp running on another XP with your favorite software installed in it.
This way you can make your application portable to use it anywhere.
This software is called as ” MOJOPAC”.
Now-a-days many portable softwares are available in market out of which mojopac is one.
But what I like about mojopac is that it maps your pen drive as default c: drive and the other drives get shown in partitions.
Which ever software you install , it gets installed in your pen drive or i-pod.
When you start mojopac portable environment, it asks for username and password.
After entering username and password it log you on to your OS.
And there you get your free environment ready made with your favourite software apps.
It supports majority of softwares.
visit http://www.mojopac.com/ for more information on supported apps and features.
Advantages:
1] You can make majority of softwares protable including games also at $0 .
2] No web cache , no passwords etc are left on host windows.
3] Works great on USB, external and portable hard drives, i-pods.
4] You have your own favorites , wallpaper , desktop as if you are at your own pc.
5] mapped c: drive.
6] Username and password required to start virtual environment.
7] If a virus tries to infect in mojopac environment , it gets infected on USB and it can harm USB files . And the files on Host computer becomes safe.
8] Auto-update.
Disadvantages:
1] No encryuption of data on USB drive.
2] User can modify files on virutal pc. Which is sign of weak vitualization. Where as Vmware is seen with strong virtualization. (this will get fixed in future versions)
3] You have to use third party software like truecryupt to encrypt your data.
4] Not supported for some apps.
How to use??
1] just download mojopac from http://www.mojopac.com/.
2] install it in your USB drive.
3] let the setup finish.
4] after loading mojopac environment , start installing all your apps and games. customize your desktop.
5] plug your USB stick into any windows XP . Click on start and start using your desktop on the go.
So when next time you go , go with your desktop in your pocket !!!
Go To Windows Updates Anonymously
Would you like to use the Windows Update feature without being forced to register with Microsoft? OK then, this is what you can do:
Launch Regedit.
Go down to HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion.
Look for a value named RegDone. If it isn’t there create a new value with that name.
Right click the new value and choose Modify. Make the value 1.
Close Regedit and Enjoy!
Launch Regedit.
Go down to HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion.
Look for a value named RegDone. If it isn’t there create a new value with that name.
Right click the new value and choose Modify. Make the value 1.
Close Regedit and Enjoy!
Noob Killer
Noob Killer 3.6.334 | 338.43 KB
Noob Killer is a small tool designed to easily rid common worms and viruses, it has many useful tools that would help users and administrators get back control and clean their PC´s/Workstations.
The most recent version is able to pick up and remove the Following || possible new and Old versions.
* VBS Worm\Solow
* Baguio Strawberry Worm
* Yahoo! Worm (Sohanad) || Some Variants
* Krag.exe (I´m Not The Only One)
* Destrukto | explorar.vbs
* jay.exe | jaymykawen9
* w32dranyam | marcmaynard.exe
* Funny UST Scandal(Avi).exe
* SilentSoftech.exe | anti-taga lipa are
* Disk Knight
* Thank You!! Password WinZip123 | password_viewer.exe bar311.exe
* iloveher.exe | say no to drugs!!!
* display monitor.exe | new folder variant
* ImgKulot and variants, jamesgo, bungoton and the like [*.bat, *.reg, *.vbs collection]
* kxvx | kavo, amvo, kevo
* transmit.exe setup.exe | black pegasus
* .. and still counting!
Written in Visual Basic, Initially it was only for cleaning and removing VBS\Worm.Solow variants, popularly known as “Hacked by Godzilla” and “Taga Lipa Are” which that spreads through removable mass storage devices(flashdrives and thumbdrives) via Visual Basic(VBS) and autorun.inf scripts.
The Noob Killer now caters a hefty amount of worms and viruses listed for cleaning, with the current active development, the list is still counting everyday.
Armed and packed with tools to help remove other Viruses and worms, aiding users to gain back control of their computers and workstations.
The latest build currently has the following tools:
* Run replacement | similar to MS Windows run
* Run Items | shows run items on startup | with delete and backup functions.
* Simple Process Explorer, able to close down Processes hidden on the standard Task manager.
* Delete File on Restart | similar to Unlocker, Hijackthis, MoveOnBoot programs.
* Create Copies of Windows Native TroubleShooting Tools such as
* Msconfig, CMD, regedit, taskmanager
List of registry hotfixes that restores settings on the registry that has been modified by viruses causing severe errors and usability impairment.
* Folder Options
* Task Manager
* Regedit
* Control panel
* Task Bar Right Click
* IE Title Bar Caption
* and Turning on\off of autorun on CD Drives, and Flashdrives respectively.
The Handy Live update feature allows users to update their Noob Killer with just a few mouse clicks within the Program itself.
Currently, the production is trying to make the Noob Killer Compatible with new and old systems, keeping the Program, small, portable and non bloated for effiency and importantly Speed.
The Noob Killer is under testing on Windows Vista, working for support to get things running properly, it has been tested under WINE on Linux and is able to run smoothly without too much quirks.
Disable The Send Error Report To Microsoft
To disable the stupid feature in WinXP which tries to send a report to microsoft every time a program crashes you will have to do this:
1. Open Control Panel.
2. Click on Preformance and Maintenance.
3. Click on System.
4. Then click on the Advanced tab
5. Click on the error reporting button on the bottom of the windows.
6. Select Disable error reporting.
7. Click OK
8. Click OK
1. Open Control Panel.
2. Click on Preformance and Maintenance.
3. Click on System.
4. Then click on the Advanced tab
5. Click on the error reporting button on the bottom of the windows.
6. Select Disable error reporting.
7. Click OK
8. Click OK
Subscribe to:
Posts (Atom)