A new version of the Microsoft Windows Malicious Software Removal Tool has been released as well yesterday. The new version is able to remove infections by specific prevalent malicious software. ItÂ´s able to detect 64 infections, thatÂ´s three more than the previous version. The three new infections that are detected are Locksky, Reatlle and Valla according to the german newsmag pcwelt.de.
Linux has a bad image when it comes to gaming. Most games are developed for windows, sometimes a linux version will be released as well but most of the time this is not the case. The site games for linux lists many games that are available for free for a linux operating system. Every game has a screenshot and some basic information like size and website of the maker included. Every game is rated by its users which should give you a first impression of the quality of the game. Unfortunatly no hint is given on how many users have voted for the game. Nevertheless itÂ´s great as a first indicator for the game.
Until now IÂ´ve heard a lot about the music service pandora offers but I never happened to test the service myself. Well, I tried it today and have to say that the concept itself is fantastic. You tell them a song or artist that you like and the service tries to find similar artists using characteristics of the artist or song. So, if you enter The Beatles for instance you will be connected to a radio that plays music that offers the same characteristics as the Beatles.
Lots of people are demanding more proxy sites because many have already been banned by their school or workplace. ItÂ´s not easy to find new ones but maybe the list from econsulting might help you. They have a list of 250 web proxies that might not be banned. I think itÂ´s worth a try if you are that desperate.
Angry Ip Scanner is a small open source application that lets you scan IP addresses and ports, you can even specifiy the range of the scan by yourself. After pinging the target IP it is able to resolve other data like hostname, MAC address and open ports.
So, you are sick of World of Warcraft, of Battlefield 2 and Counterstrike Source ? You want to experience something new ? YouÂ´ve come to the right place my friend. I found a site that contains an extensive, and I mean extensive, list of many, and I mean many (hrhr) games that are free to play and concentrate on multiplayer experience. I donÂ´t think itÂ´s possible to test them all but you might just test all games that look interesting and fit the category of games that you like most.
Wikibooks is a great service that collects books that are freely available. The bookshelf (aka the listing of all available categories) provides links to categories like computing (and its subcategories like Programming languages) and Humanities and in those categories descriptions and links to those books. Some categories contain subcategories that contain the links, for example the programming language main category contains lots of subcategories that contain all the various programming languages.
Coolmon is a great little freeware application that monitors and displays various windows settings. Among the information that can be displayed are Processor usage (up to four CPU's) , Number of Processes , Number of Threads, Process using the most CPU time , Processor type , Used/Free/Total page file , Used/Free/Total RAM , Free/Total/Grand Total Disk space (up to sixteen disks, also mapped network drives) , Computer Uptime , Date & Time , Computer name , User name , All IP addresses , Network read and write speed (up to four NICs) , Total Bytes sent and received and Battery status.
Notify is a small freeware application for windows that monitors files and directories that you specify and notifies you when those are changed. The small size of 15 Kb makes it an ideal background task, it uses almost no cpu time and little memory.
Tweakguides have a large article about firefox tweaking which not only explains the basic settings of firefox but also advanced settings which can be edited by entering about:config in the firefox address bar. The guide is divided into 12 chapters and starts with an introduction which helps you get in the right mood for the article. After that the optimization chapters begin with chapter 2 essential optimization and an explanation of many basic firefox settings. You learn a lot about firefox and those early chapters are clearly aimed at novice users who did not put much thought into the configuration up to now.
Most people think it takes lots of work to encrypt files. The freeware click crypt 2.6 allows to encrypt and decrypt files with just one click. ItÂ´s unfortunatly only available in german but that does not matter a lot because the interface is simple and easy. Click on Download Sofort ausfÃ¼hrbares Setup which starts the download. After that install the software on your system and start it. This opens a configuration window which is named VerschlÃ¼sslungsmethoden. You select the encryption algorithm that you want to use, you have three options, those are: MD2 (128bit), MD5 (128bit) and SHA (160 bit).
Todays world is becoming a wireless one. If you signup for a new internet provider you have most of the time the choice of a modem that uses cables and one that is wireless. Now, most people tend to chose the wireless one because their homes donÂ´t look that messy after all, cables everywhere seems to turn certain people off quite a bit.
LotÂ´s of people complain that webproxys are not working at their works / schools computer because they have been banned by administrators. A way around this would be to setup your very own proxy server that is being hosted a) by a free webhosting service that supports either php or cgi or b) your own website that is being hosted by a webhosting company.
I know that I have not been updating the proxy list for a while and I promise to do it in the near future. For now, I post a list of new […]
I donÂ´t think a lot of my visitors are still using the Microsoft Internet Explorer but there are some that do. My first advice would be to change the browser immediatly to firefox or opera, for those who are to lazy or have other reason to keep the insecure browser the IE Proxy Changer is a nice little addition to the internet explorer.
Igowerf from the anandtech forum posted a rather large list of freeware that can replace commercial products from the same category. For example a replacement for Microsoft Office would be of course Open Office which is free to download and use. It is a great list with lots of different categories that include Office, Internet / Networking, Graphics, IDE's and editors, Audio/Mp3/CD, System tools, Video encoding/decoding/etc, 3D Modeling/Animation/etc and Misc suggestions.
This is a great help. The Advanced Dork Firefox Extension allows you to highlight a word or phrase, right click and choose one of six provided Advanced Google Operators intitle: inurl: intext: site: ext: and filetype:
Now this is an interesting analysis of password recovery speeds. It compares password length and chars used to the time different computers need to bruteforce the password, ranging from Class A (speed of a pentium 100) to Class F (supercomputers, large scale distribution) computers.
Dylan Tweney compiled a list of 101 fabulous freebies for the pcworld website. The link above leads to the category view of all freebies that dylan collected. Categories include Tune Up: Utilities and system tools, Lock It Up: Security/antispam tools, system-stabilizing utilities and Share It: File sharing and storage services. All categories include program links and a short description of the program itself. Lots of known tools but also some lesser known ones and also some services are included.
JDiskReportenables you to understand how much space the files and directories consume on your disk drives, and it helps you find obsolete files and folders. The tool analyses your disk drives and collects several statistics which you can view as overview charts and details tables. This is a great tool if you are looking for a program that analyses your hard drives content. Shows lots of useful information like which filetypes use the most space on your hard drives, file modification and folder size.
Maybe you are like me, thinking why there are so many linux distributions out there and what the differences between them are. ItÂ´s hard to make a selection, there are hundreds of distributions out there and all seem to serve a purpose. This could have been the intention of the guys who wrote the overview of the ten major linux distributions.
Well I came upon this analysis of .com domain names in this article by Dennis Forbes called Interesting Facts About Domain Names. He takes a look at .com domains only because this is the most thought after domain extension worldwide. Some interesting conclusions that he draws are that the chances of catching a two or three letter domain name are exactly zero, unless you pay a brooker for it of course and that the chances to register a short domain name start with four-letter domain names.
IÂ´ve written about virtual computers before and found a nice way program to make the same method available for virtual software installations. Altiris Software Virtualization Solution lets you install every kind of software in a protected environment that prevents access from this software to your core system. This is great if you want to try out some new alpha / beta software or software that you are suspicious about.
It has been a long time since I wrote the first article about Disposable Email Address Services and I think it is time to update the old article with new services and get rid of dead ones. Before I start listing several websites and services that allow you to use "one-use" email addresses I will shortly explain why everyone should have at least one service at hand all the time.
IÂ´am back. I finished moving to my new apartment and can again write article and entertain you. Autohotkey is a nice little freeware application that has many purposes. Take a look at its features:
IÂ´am in a hurry because IÂ´am moving to my new appartment today and donÂ´t have the time to write much, because my pc of course goes with me to the new destination. I thought I post some interesting articles with a short description to keep you entertained while IÂ´am moving.
Are you planning to purchase a new computer in the near future ? You are also someone who builds the computer on his own, someone who does not rely on retail computers that might have parts that are not the quality you demand ? The gotfrag price guide might be a good starting point if you answered both questions with yes.
UltraShredder deletes sensitive files by overwriting them with random characters, saving it to disk each time, and then bypasses the recycle bin, thus acting as your personal, portable file shredder. If the file were to be recovered by a data recovery program, they would only be able to see unintelligible characters on disk where the file used to be. The program is a great tool to destroy sensitive data, and is very small with a minute memory footprint, and makes no changes to your system whatsoever.
I know I have some freaks among my readers that like to use an usb stick to have some of their beloved applications at hand or start them from their for security reason. Wikipedia.org has a nice list of portable applications that can be run from a portable device. Every application is sorted into one of nine categories like Networking and Internet, Password management and Document editing .
XSite will load and parse any webpage into a simple structured view for displaying images, email addresses, and all links. Generate a result report that section out all the links, images, and email addresses. Easily grab all images in a web page by downloading them to a local folder. Export lists out to CSV format which makes it easy to push the information into any database.
The question that many people ask is why would someone want to surf anonymously in the first place. Why would someone who does not do something illegal want to surf anonymously at all ? I can think of lots of reasons, here are a few:
We all know there are hundreds of firefox extensions and more are released with every passing day. ItÂ´s a time consuming task to stay up to date, thatÂ´s when pre compiled lists of useful firefox extensions come into play. This one at cerias (The Center for Education and Research in Information Assurance and Security) lists firefox security extensions that are security related.
DonÂ´t you hate those sites that open a new page whenever you click on a thumbnail to open the large version of an image ? It gets really annoying and is time consuming. Firefox can now install the greased lightbox extension with requires greasemonkey for windows or creammonkey for macintosh and of course firefox.
The guys of darknet.org.uk have posted a new article that lists the 10 best security live cd distros. Each distribution is introduced in a small paragraph and features links to the distributions homepage.
I found a new list of proxy sites, 300 in total. Should be something for everyone and I suppose you find some that work in your environment. Head over to proxylist.wordpress.com to check them out.
The little freeware application Windows Worms Door Cleaner has a very strange name if you ask me. ItÂ´s purpose is to disable certain services that worms rely on to attack your system.
A new version of the popular Ubuntu linux distribution has been released to the community. You can download it from the official homepage using http connections or bittorrent. Let us hear what the developers have to say about this new release.
I bought a Geforce 6600 graphic adapter last year from Asus and had the initial problem that the fan was to noisy. Even when I was surfing the internet or writing a text in Open Office. I was sure that this could not be correct and decided to search for a way to reduce the fan speed and thus the noise level when it was not needed.
Cuttermaran is a cut program for MPEG1 or MPEG2 video streams. The streams can be cut without recalculation. The asynchronous between audio and video will be minimized. If you are looking for a freeware tool that lets you cut your mpeg1 and mpeg2 video files cuttermaran might be the program you are looking for. It requires Microsoft Net Framework to work, the download link is provided at the programs homepage as well.
Bulk Rename Utility is a utility which allows you to easily rename files and directories, based upon extremely flexible criteria. Add date-stamps, replace numbers, insert strings, convert case, add auto-numbers, process folders and subfolders.