Must have software for my new computer

I'm still not finished with the installation of all applications that I want to use on my new computer but the essential ones are there. Essential are those that are needed to […]

Protect Files in Windows by locking them

We all have files on our system that are valuable to us and that we do not want to lose. This can be anything imaginable,  from Word documents to images or mp3 […]

Put Anything you want into the Control Panel

Sometimes applications add icons to the Windows control panel. Ever wondered how they do it ? Wonder no more because you can now do the same with Your CPL, a small utility compatible with Windows XP, 2000, ME and Windows 98. The package contains two files that have to be moved into the system directory of the Windows installation. In the case of Windows XP it would mean that both files, YourCPL.cpl and YourCPLconfig.txt need to be moved into the system32 directory.

Use a Magnet to protect your PC

A wonderful tip about a hack was send to me yesterday by Joe. It describes how to change the way a PC, or most other devices that use a power source, can be protected by by a simple magnet and some stuff that does not cost more than $5. All you need is a reed switch, a magnet and some duct tape. It does secure your pc as well from someone that wants to turn it on without your permission.

What you should do before bringing the PC in for repair

Have you ever brought in a computer for repair to the friendly computer store next door or send your notebook to that big company that sold you it so that they could check what's wrong with it ? Did it ever occur to you that the technicians that would check the computer could do more than just checking ?

PC Upgrade Ideas for Christmas

advantage of adding RAM is the fact that you it is relatively easy to add to your system. Takes less than a minute to replace.

The second choice really depends on what you do with your computer. If you are a gamer you might consider getting one of those new Geforce 8800 GT which start at $270 and make it possible to play Crysis and other high end games in high details. Again, check your computer to see if it supports AGP or PCI Express Video Cards before going out and buying one that does not fit.

Zoogmo Secure Peer To Peer Backups

Zoogmo offers a way to securely backup personal data and store that data on so called partner computers. Partner computers can be anything from USB devices, network computers or even the computer of your friend that you can access over the Internet. The advantage of this approach is that you backup will be stored in an encrypted form on an external computer so that it remains accessible in the case of a computer crash.

Protect your data from physical access

Experts are able to gather sensitive data from your computer if they gain physical access to it. This can be achieved by various means like Live CDs, accessing unprotected accounts or administrators that take a look in your profile folders. They can search the files on your hard drives, read documents, look at your Internet cache, the mailboxes which contain all of your mails - even the deleted ones - and histories of downloaded files.

auto login windows vista

Automatically log in during Vista startup

One of the most annoying features of Windows Vista is the login screen that displays all user accounts on the system. You have to click on one of the accounts and enter the password from that user to be able to login and use Windows Vista.

I don't think it makes that much sense to display this information if you login with the same user most of the time. Security should also be no concern because it is not that complicated to access the data even though you do not know the password of that specific user.

What is your Security Concept?

Many novice users use the software that comes preinstalled with their purchased computer and rely on these to be safe from the dangers that lurk on every corner in the Internet. Trojans, Malware, Spyware, Phishing and worse are threats that every user should know about and be able to deal with. It is pretty easy to detail my security concept, it is not the most secure on earth but even those are not secure at all. If you want security do not connect to the Internet at all, that is my advise.

About Weak Passwords

I came upon the article "How I would hack your weak passwords" yesterday and pondered if I should write an article about it. I decided that it would be worth it. The author of the article details how he would try and find out your passwords and get access to all of your accounts in the end. His first approach would be to use the most common used passwords by users on the net. He needs information about your personal life for some passwords but those information can be obtained pretty fast through social engineering. Trying those "top 10" passwords would already cover a large percentage of online users, statistically speaking that is.

Lock Folders in Windows

Windows has no obvious method to lock folders, even administrators have no obvious way of locking folders. Locking folders could be important if you want to hide certain files or folders to prevent someone else from seeing them or altering the contents. You never know what your children could do until they do, so better lock the important folders.

firefox profile

Protect your Firefox Profile

A Firefox profile stores all personal information such as bookmarks and passwords in it. Everyone who is starting up Firefox with that profile is able to use your saved passwords and cookies as well which is a security risk if you ask me. One way to overcome this would be to protect the Firefox profile folder by moving it to a location that is not accessible to anyone except you.

Autostart programs when a usb drive is connected

USB Virus Scan is a nice little command line utility that performs predefined operations if a usb drive is connected to your computer. It is able to distinguish between various drives which means that you can add custom operations for the drives that you own and a general option for drives that are not recognized. The tool uses the volume serial number of the drives to identify them and perform the operation.

Preparing myself for Linux and Vista

Today I'm going to write about my master plan to install Ubuntu Linux and Windows Vista on my system to have them at my disposal next to my current Windows XP installation. I personally try to make the switch to Linux because I'm fed up with all the restrictions that Microsoft build (on pressure I assume) into Windows Vista. Nevertheless more than 99% of all my readers use Windows XP and I will continue writing articles for XP and Vista.

Top XP Freeware that every user needs

Using Windows XP without those nifty little freeware programs is not a good idea. When you run it out of the box it is slow, offers many features no one needs, lacks many that everyone needs and raises privacy concerns that can only be fixed using third party tools. This is basically a listing of programs that I install everytime I setup Windows XP on a computer, the must have freeware utilities in my opinion.

Autorun from USB

It is not possible to autorun applications from an USB stick in windows unless you already have a program started that watches the usb ports. APO usb autorun suite makes it pretty easy to use autorun informations on usb drives. The tool checks wether a connected usb drive contains autorun information, if it does those are executed.

true crypt traveller disk setup

Create a secure USB Data Safe

I'm going to show you how to create a secure usb data safe that can be used to store sensitive data. Secure means it is encrypted and will only be encrypted if you need the data that is saved on the stick. This method is also working with other removable media such as zip drives and hard disks.

usb dumper

How to dump all USB files without the user knowing

USBdumper runs silently as a background process once started and copies the complete content of every connected usb device to the system without the knowledge of the user. It creates a directory with the current date and begins the background copying process. The user has no indication that his files are copied from his USB drive unless he does know that USBdumper is running on the system. (or accidentally find the directory with the copied files).

How to create a data safe

Would you prefer that important data like information about yourself, account numbers, personal documents and the like are accessible all the time from everyone who has access to your computer or that this data is only available to someone with special access ? I would like to give details on an easy way to store your data safely on your computer without wasting lots of time. It may be safer keeping the data in a safe in your appartement but this is not really practicable.

Microsoft Private Folder 1.0

Microsoft apparently released a new piece of software called private folder today. The software creates a folder called my private folder which can be password protected to keep the prying eyes of your loved ones from finding files they should not see. Windows Genuine Advantage will check twice if your computer is running a legit copy of windows xp.

Howto make sure that your files are safe

It is a good idea to make sure that no one is able to find and use private files on your computer against you. I can think of several reasons why it is wise to secure private files. If you are sharing a computer you have multiple users working with it, would not it be embarrassing if your mother (wife, sister, girlfriend..) found your hidden adult picture stash ? A thief would be more than happy to use all the personal information (login details to sites like paypal or ebay for example) to make some extra bucks.

portable apps

Portable Apps Suite

The portable apps suite contains a collection of portable freeware applications including a web browser, email client, web editor, office suite, word processor, calendar/scheduler, instant messaging client and FTP client. The suite itself comes in two flavours, standard (117 MB) and light edition (44 MB). The difference between the standard and light suite is that the standard suite includes open office while the light suite does not.

Essential Freeware Utilities for Notebooks

The article essential utilities at laptoplogic.com lists several freeware utilities that should be useful to everyone who owns a notebook (with an intel cpu that is, a guide for amd will follow). All tools mentioned can be desribed as system tools that either show system information, test hardware or tweak it. For example tools to test the notebooks memory (Memtest86) are included as well as dead pixel tester for the lcd screen.

Five freeware tools everyone should try out

I´d like to present five freeware tools that everyone should at least take a look at and try out. They are not the "normal" freeware applications that you find in every top ten list like firefox and open office. I write about tools that many users don´t know but would be grateful if they knew they existed. Please be aware that this is my top ten list and that your´s most likely would have different applications in it.

Apple releases iOS 17.2 RC update

Apple releases iOS 17.2 RC update

Apple has begun seeding the iOS 17.2 RC update to testers in the beta channel. The update brings the Journal app, and several fixes for issues that were reported by users. Journal […]

facebook Messenger Lite for Android

Time to bid farewell to Facebook Messenger Lite for Android

Meta has confirmed that it's shutting down Messenger Lite, a simplified version of its Messenger app. Users of the Lite version are receiving messages encouraging them to switch to the regular Messenger […]

PayPal Stablecoin PayPal USD

PayPal launches its USD-backed stablecoin, PYUSD

Paypal has introduced PYUSD, a stablecoin that is backed by the US dollar. Stablecoins represent a unique category of cryptocurrencies that strive to maintain a stable value, often pegged to a specific […]

New Messaging Layer Security standard improves group chat security and privacy

Our private conversations are increasingly moving online through messaging apps, chat services, and social platforms. From one-on-one communications to communications with small and large groups. With communication moving online, malicious groups, governments, […]

Google unlocks passkeys support for Workspace

After having enabled passkeys support for personal Google accounts last month, Google has now unlocked support for passkeys for Workspace customers and environments. Passkeys is an upcoming authentication standard that replaces traditional […]

WhatsApp Security Center

WhatsApp Security Center aims to raise awareness

WhatsApp is continuously adding more and more features to the app. Recently, the company launched the new WhatsApp Security Center to enhance the security measures and raise awareness. The company has rolled […]

How to make public Wi-Fi more secure

How to make public Wi-Fi more secure: VPNs, more

Public Wi-Fi networks are accessible and practical, but they also put users' security at serious risk. Anyone who uses a public Wi-Fi network runs the risk of giving hackers and other cybercriminals […]

How to access every website while traveling: Guide

Even while it can be a lovely experience, traveling might make it difficult to access the websites you want. Depending on where you are and the device you are using, you can […]

QBot malware

QBot malware exploits Windows WordPad EXE to take over

The QBot malware has recently been observed using a sophisticated technique to infect computers by taking advantage of a DLL hijacking vulnerability in the widely used Windows 10 WordPad program. By leveraging […]

VPN vs Proxy vs TOR

VPN vs Proxy vs Tor: What are the differences?

In the world of online security and privacy, virtual private networks (VPNs), proxies, and Tor stand out as three top-notch tools. But what sets them apart? Join us as we explore the […]

Xiaomi q1 result

Xiaomi announces Q1 2023 report: Promising results

Xiaomi has announced its first financial report for Q1 2023 and showed promising results. The company has sold 30 million phones and reached over 600 million active users. The Chinese technology giant […]

iRecorder Screen Recorder

iRecorder Screen Recorder turns villian

An Android app that initially appeared harmless was recently exposed for engaging in covert activities by secretly recording users without their knowledge or consent. The app in question, known as iRecorder Screen […]

How do VPNs work

How do VPNs work: Explained

VPNs can help you get rid of geographical restrictions and  surf the internet securely by allowing you to make it look like you are connecting from a different country and place. They […]

how to choose a VPN

How to choose the perfect VPN service for yourself

In this comprehensive guide, we will delve into the essential factors to consider when selecting a Virtual Private Network (VPN) service. Whether you're a frequent traveler, a remote worker, a privacy-conscious individual, […]

VPN

Everything you need to know about VPN services

In today's interconnected world, where online privacy is increasingly at risk, the adoption of a Virtual Private Network (VPN) has become paramount. Beyond shielding your digital activities from prying eyes, VPNs offer […]