Friday, November 28, 2008

You Have a Security Problem - Remove Antivirus 2009 Quickly and Easily

If you've seen a message popup on your computer claiming that "You have a security problem", then you absolutely do have a problem - it is called Antivirus 2009 and it is a rogue antispyware program.

What you are experiencing is the slick attempts of Antivirus 2009, which are designed to get you to purchase their bogus software. And while there are a large number of manual fixes and claims that completely free tools like Ad-Aware or Search and Destroy can clean this nasty little spyware from your computer, the reality is that you are going to need a lot more than that to rid your computer of this spyware nuisance.

This is the reality of spyware threats today. They are becoming smarter and smarter and more difficult to remove. What makes Antivirus 2009 so difficult to remove is the fact that the software has the ability to recreate itself after a reboot. This means that you can manually delete the files, folders, registry entries, etc. all day long and every time you reboot it will be right back there again, hammering you with popups and continually downloading additional spyware by the minute.

Having said that - there is a way that you can remove it rather quickly and rather easily, without the need to post any logs to forums and without having to do any manual intervention that quite frankly, most people don't feel comfortable doing. While it might not be the answer you want to hear it is the answer you need to hear - invest a small amount of money in a proven, top of the line antispyware software.

Most spyware removers out there will allow you to scan your computer for free to determine how infected your computer really is, however this is where the freebies end. Yes, there is software that will allow you to clean your computer for free, but the reality is that these programs are nowhere near as effective as software that you might have to pay a few bucks for. I mean, if the totally free software were so effective then antispyware vendors that require you to pay for the full version and clean your computer would go out of business right?

What computer users are starting to realize more and more however, is that the freebies simply don't work. What usually happens is that users think they can get away with using a totally free software, but after they have spent countless frustrating hours trying to clean their computer, they come to the realization that they need something better and that in order to get it, they are going to have to invest a few dollars and this is exactly what happens with Antivirus 2009 as well.

Because Antivirus 2009 has the ability to recreate itself and due to the fact that totally free antispyware software does not have the ability to stop this recreation which is the root of the infection, users find themselves in a vicious loop and can never completely remove it unless they get their hands on a proven spyware removal tool. I am sure you might already know how frustrating it is to see "You have a security problem" over and over again.

But what users also fail to realize is that this isn't going to be the only time they get infected with spyware if they don't have antispyware software running on their computer that is actively monitoring for threats in real time.

So spending money now on antispyware software with highly effective real time protection will not only clean your computer from current infections, but it will block future attempts at infection before they actually make it onto your computer - saving you from the frustrations of having to deal with spyware infections every other week or more.

So if Antivirus 2009 has gotten hold of your computer and you are seeing unending popups claiming that "You have a security problem," the best thing you can do is invest in proven and effective antispyware software and if not, be prepared to spend countless hours now and in the future fighting a new breed of highly efficient spyware infections.

Microsoft Project Server Vs Microsoft Project

There are a number of project managers today that use Microsoft Project to create and track project plans to keep tasks on schedule. Project is a fine application for small endeavors with one person in charge. However as a project grows and more decision makers are involved, managers need an application that can provide enterprise-wide project management.

On-line Management with Project Server

When coordinating a large venture, basic management tools like Microsoft Project may not serve the manager's needs. It is a standalone application that can be used only on one computer. All project information is in one place and all decisions can be made only at that computer.

Once there is a large endeavor with a management team, this lack of access becomes a problem. What is needed is a project management tool that can be shared company-wide and allow all managers to track their respective tasks without needing to wait for printed reports.

Project Server was designed with exactly that capability in mind. All team members can access the application from anywhere on the company network or over the web. Coordination and communication is easier when everyone is on the same page.

Each Team Member Has a Role

Just because everyone can access the software, that doesn't mean everyone has the same capabilities. Individuals are given permissions appropriate to their role in the plan and in the company.

Project managers use the basic Project Professional application just like they have in the past. However their updates and changes are transmitted to the server where they can be viewed by other managers and incorporated in their plans.

Team members who don't use Project directly can still access the server to see what their tasks are, what the status of the overall plan is, and can send status reports to be used by managers.

Even interested parties not directly involved in completion of the tasks, such as executives or investors, can be given access over the company network or the web so they can monitor the progress. Comprehensive security settings ensure that each person is given needed access without any excess privileges.

Project Server Training

Even experienced users of Microsoft Project will benefit from training on the unique capabilities of Project Server. The enterprise-level features of the software greatly increase the size of the projects that can be handled but may not be obvious to new users. Tasks such as team building, resource substitution, and information pooling can be used more effectively after taking instructor-led courses.

The transition from Project to Project Server is a major step for any business but with guidance and proper planning, it is a move that can be made with a minimum of complication. The added capabilities will be invaluable to any mid-size to large business.

Exploring the PC Future - Lenovo Ditches Hard Drives

One of the things that an economic collapse promises is change. We may love to anticipate it, but when it comes to changing the way we do things, we loathe it. This is one of the reasons PCs really haven't changed all that much even though viruses and botnets are running wild, and every month one or two companies have to make embarrassing announcements about lost customer information.

Look at your keyboard. Its basic design was to prevent typewriter arms from becoming tangled. This stopped being a problem when IBM came out with the Selectric electric typewriter in the early 1960s and was never a problem with computers, yet we not only still use the antiquated keyboard (granted some are amazing), we teach children to use it as well.

But, take the entire world and pull the economic security rug out from under it, and folks suddenly are motivated to change. You have three jobs and 20 people who want them. One can type 30 percent faster because he or she doesn't have a conventional keyboard, and so gets the job and probably will get promoted. Others will make the change as well.

The same thing is true with PCs. Lenovo just launched an interesting alternative to the traditional PC desktop. It is calling this new platform the "Secured Managed Client." It has a number of advantages shared by blade PCs, thin clients and traditional PCs. But if it weren't for the economic collapse, I doubt it would get much traction because it is different. But with folks fighting to preserve their jobs by saving every nickel they can, this solution may have suddenly become a player.

Secure Managed Client

Simply said, these are diskless PCs connected by a high-speed but otherwise standard Ethernet connection to a specialized storage array designed by Intel specifically for just such a task. Since the entire image for each connected PC resides on the array, software updates, patches and software maintenance can be performed with the PCs off and only the storage array powered on.

From a security standpoint, the repository is centralized and can be secured. If a PC is stolen, the PC itself is the only thing lost. In an economic downturn, site thefts are likely to go up sharply. While insurance will cover the cost of the lost hardware, the lost information can become not only a reporting nightmare, but one that can, if the loss is significant, damage the firm's profitability. Some types of information are difficult to replace, and with firms operating with reduced staff, they're limited in their ability to recreate lost information in a timely way.

Risk of hard drive failures and losses due to catastrophic events are virtually eliminated if proper backup procedures for the repository are implemented, since users can't turn these protections off or defer them.

Mobile Future

While the initial solution is desktop-only, there is a very real possibility that a netbook -like low-cost mobile product could be implemented with limited syncing and constant WiMax or WAN connectivity to limit the data on the notebook and to provide many of the same benefits that the secure managed client supplies to desktops.

This is likely the bigger step. I'm expecting it to emerge sometime in the next 24 months, but, overall, the concept of local storage is reaching the end of its useful life. It isn't hard to imagine a future where storage is provided even in the consumer space as a service, given the recent forming of EMC venture Decho specifically designed to address this future need for those looking for a blended and more mobile solution.

Wrapping Up

This is one of the more interesting trends that likely will accelerate over the next 24 months as companies struggle to contain costs and focus increasingly on solutions that provide strong near-term monetary and security benefits. The Lenovo Secure Managed Client does just that, and we will review others as they roll to market.

Whats an Eee PC?

Have your kids been hassling you to buy them a laptop this christmas, or are they students that are telling you they need this big expensive laptop to do all their university or college work.

Well have you heard of the Eee PC?
Eee PC is marketed as 'Easy to learn, easy to work, and easy to play'. It is relatively a low price depending on what model you get. The newer models have the added option of Windows XP, but obviously that increases the price.

It is currently one of the most sought after laptops around, you may have seen it advertised on the Underground or on TV. It is 225 mm wide , 170 mm deep and weighs only 1.12 kg. It is aimed at being easy to use and is perfect for e-mails, and making documents and spreadsheets.

The only let down is that as it is small it can be a little tricky to use with a small keyboard and the resolution on the screen is not the same as you may see on more expensive laptops.

But it is perfect for children, as their is no need to buy a big overbearing laptop that is ging to cost an arm and a leg. If you buy wholesale you can get a really good cheap price for an Eee PC, so it is a perfect present this christmas. The kids can use it for all their schoolwork aswell as surfing the internet.

SEO Best Software

The best search engine optimization software out there in my experience is the SEO Elite. This software will make your site rank in the top 3 in any keyword search for your niche. Every time someone makes a search on any of the major search engines your website is going to rank in the first page making it the first and last store they're going to visit. You see the way to make your business successful on the Internet is positioning.

The positioning of your brand and/or business will make the difference just as it makes the difference out there on the regular stores in your city. Just as you would position your store in the place where you'd think you'll make more money because of the location and targeted consumers, you need to do the same on the Internet. Make your website the first choice, it will be the first one they'll see once they use any of the major search engines, and make it the last by targeting the right consumers.

I must add that SEO Elite by itself will not make your website rank on the top of the majors search engines, including first page. Something as important as solid knowledge of the fundamentals of SEO helps greatly as good content on your website will too.

Building your site's link popularity involves increasing the number and quality of websites that will link back to yours. SEO Elite will help immensely in this respect. It analyzes backlinks in all the major search engines.

SEO Elite also offers a incredible tool, you can check out your competition's linking strategy. In a matter of minutes, you can find out a website's complete linking strategy as well as any kind of SEO optimization tricks they may be implementing.

Choosing a NTP Server - Selecting the Best Timing Source For You

The NTP server is an integral part of the modern computer network. Without Network Time Protocol and NTP time servers many of the modern functionality of computers that we take for granted such as online reservation, Internet trading and satellite communication would be impossible.

Synchronisation in computers is dealt with by NTP. NTP and NTP servers use a single time reference to synchronise all machines on a network to that time. This time reference could in fact be anything such as the time on a wrist watch perhaps. However, synchronisation is pointless unless a UTC (coordinated universal time) time source is used as UTC has been developed to allow the whole world to synchronise to the same time, allowing truly global synchronisation.

UTC is based on the time told by atomic clocks although compensation measures such as Leap Seconds are added to UTC to keep it inline with Greenwich Meantime (GMT).

Atomic clocks are very expensive and extremely delicate pieces of equipment and not the sort of thing that can be housed in the office server room. Fortunately a NTP server can receive a UTC time source from several different locations.

The Internet is perhaps the most widely used source of time references. Unfortunately however, there are draw backs in using the Internet for a timing source. Firstly the Internet timing sources can't be authenticated. Authentication is a security measure used by NTP to check that timing source is genuine. Secondly, to use an Internet timing reference means a hole has to be left open in the network's firewall, again compromising security. Thirdly, Internet timing sources are notoriously inaccurate and those that aren't can often be too far away from a client to provide any useful precision.

However, if security and high level of accuracy to UTC time is not required then the Internet can provide a simple and affordable solution.

A far more secure method of receiving a UTC timing reference is to use the specialist national time and frequency transmission broadcast by several countries. The UK (MSF), USA (WWVB), Germany (DCF) and Japan (JJY) all boast a long wave timing signal. While these signals are limited in range and strength, where available they make an ideal timing source as the radio receiver can pick these signals up from inside a building. These transmissions can also be authenticated providing a high level of security.

The third and perhaps simplest solution is to use a GPS NTP server. These use the signals sent from the Global Positioning System which contains timing information. This is ideal as the GPS signal can be received literally anywhere in the world so if there is no radio transmission your area then the GPS network will provide a secure and authenticated solution.

The only downside to GPS is that an antenna has to have a good view of the sky and therefore need to be positioned on the roof. This obviously has logistical drawbacks if the server room is in the basement of a sky-scraper.

In selecting a timing source, the most important thing to remember is where the NTP server is going to be situated. If it is indoors and there is no opportunity to run and antenna to the roof then the radio transmissions would be the best alternative. If there are no radio transmission in your country/area or the signals are blocked by local topography then the GPS is an ideal solution.

Thursday, November 27, 2008

Backing Up Data, An Essential Data Recovery Practice

The majority of people today utilise and therefore by default rely upon computers to go about their daily business with greater ease. Stored computer data will occasionally become corrupted, its an unfortunate fact of life. When this happens unprepared people often spend huge amounts of time getting the problem solved by paying specialists in data recovery or buying software that recovers data. Additionally, in the worst case scenario, not all data may be recovered! If you are prepared these frequently serious problems can be heavily reduced making your life easier.

"Prevention is better than a cure" with regards to computer data problems. By just backing up your data often in a sensible, logical, easy to find location you are able to massively increase your efficiently at resolving a data loss crisis. Time and stress with locating and re-loading your saved data will be far less than if you hadn't taken the short time and effort to produce the back-ups and/ or programe files from the originals.

Files can be backed up onto any of the wide variety of media available today, e.g. CDs, external or internal hard drives, DVDs, tape drives or specifically designed removable media such as the Iomega REV drive. Usage of optical media (e.g. DVD?s, CD?s) is believed to be much less reliable in terms of a back-up. This media is far more prone to surface errors. The advantages and disadvantages (regards capacity/ ease of use, etc) of each particular media type should be chosen with regards to your situation. Importantly each media type will tend to perform efficiently, its best to try and stick to the media type that you find works best.

Many very reliable back-up programmes are in existance, one of the most well known is included with Microsoft Windows back-up software. Microsoft Windows XP users know this programme as NTBackup. If your computer doesn?t already have this installed all you have to do is simply place your Windows CD in your computer disc drive and locate the file called "ValueAdd\MSFT\ntbackup". This is a file can that can then be run in the folder with which it was originally found, i.e. ntbackup.msi. Rapidly this file will produce the back-up software you so require, wizards ever present to help lead you through the file backup and resoration protocol.

With all the important backup software installed and fully functional it is vital that you make use of it frequently. Saving of your work should be done at least once per day ideally. If at all possible a separate back-up drive or disc should be used for every day of the week. This will provide that extra added security and peace of mind, allowing you to concentrate on more pressing issues. The large majority of businesses, from the large to tiny, adopt this basic and also fundamental data loss prevention method, and for a very good reason, it really works and can save a massive amount of stress, time and often vitally, money.

Why Web 2.0 is a Big Deal ?

From the time the internet started it has been touted as the one of the greatest inventions of all times. What started off as a network of machines has grown into a phenomenon and continues to do so at the "speed of thought".

The web which started off serving customers with purely static pages has been continuously moving to a more dynamic and interactive environment. The recent transition has been in moving from a website owner driven web to a user driven one. More and more power is being given to the user to drive things the way he/she wants on the web.

The current wave which we are witnessing, although not intentional has been aptly called Web 2.0.

Web 2.0 is the name given to the array of new age websites which are popping up that are more focussed on bringing people together to one place and allowing them to them to share, discuss, post, vote, form communities etc. ? basically be able to express themselves on the web like they have never been able to do so before.

If you have to go by definitions, Wikipedia : one of the leading new age Web 2.0 site defines the term Web 2.0 as:

Web 2.0, a phrase coined by O'Reilly Media in 2004, refers to a supposed second-generation of Internet-based services : such as social networking sites, wikis, communication tools
, and folksonomies , that let people collaborate and share information online in previously unavailable ways. O'Reilly Media, in collaboration with MediaLive International, used the phrase as a title for a series of conferences and since then it has become a popular (though ill-defined and often criticized) buzzword amongst certain technical and marketing communities.?

Well, then again Web 2.0 might mean different things to different people. Most of the dedicated techies can be heard saying ? a plain social networking site alone is not good enough, it has to support AJAX as well for it to qualify to be a Web 2.0 site. Although AJAX was a starting point of the newer web sites, I think the "social networking and collaboration" bit is the key differentiator.

Although O'Reilly coined the term "Web 2.0", the intention was not to suggest a newer version of the web instead this term was formed to be a part of the core attractive punch-line to be used in of one of the conferences they were going to organize about the web.

Let's talk about some of the Web 2.0 sites that's changing the way we use the web right now. This would ideally give a better understanding of what?s being done on the web in the Web2.0 paradigm.

Web 2.0 top sites

Wikipedia.com : Wikipedia is a web based encyclopedia which is free. Well the surprising part is not that it is free. It can be edited by anyone not necessarily a registered user, which means absolutely anyone. Please try it.

This really epitomizes the beauty of the web. With multiple users editing this site all the time, it only makes us wonder how on earth does this site provide accurate information. Its just like life, the good over evil theory. Works on the web too. There are the good people working tirelessly towards making sure content on Wikipedia is latest and accurate. So even if you enter the wrong data, in some time or worst case in a couple of days you will see the information corrected. The magic of user driven content.

The concept of wikipedia has become so popular that the term "wiki" is now used to refer to any website the visitors can edit the content of the site.

digg.com : This is one of my personal favourites. Just a site which allows you to pull news from anywhere on the web and the digg community can vote for the news posted. The greater the number of posts the higher the chances of it getting listed on the front page of digg.com. Simple, concise to-the-point and well thought out site. But I still can?t relate the site design to the traffic digg has managed to generate. Digg.com has millions of viewers.

youtube.com : Iam quite sure by now everyone has heard about this one. Basically a video sharing website where users can upload videos, view other videos and share videos with other users. Just started in Feb 2005 has managed to create such a huge user base that Google has decided to buy them out for $1.6 billion

flickr.com : What youtube is to videos, flickr is to photos. By the way this is now a Yahoo company.

myspace.com : This is a social networking site where you can create your own space, add friends, share music, videos, photos etc. You can post personal profiles and also blog using myspace. They claim to have 106 million accounts. In July 2005 Rupert Murdoch?s News Corporation bought out myspace.com for $580 million.

del.icio.us : A social bookmarking site which organizes content based on user defined tags. Once registered a user can bookmark any site and tag and share bookmarks with the del.icio.us user community.

New Web 2.0 terms

Wiki : A term given to any website which allows users to directly edit the content of the website and in some cases sometimes without even being a registered user.

Voting : digg.com gave a new meaning to this word in the Web2.0 world. These days users can vote to show their like or dislike for a specific content on a website. It is an important way for a user to exercise his views on the web.

Tagging : Users can now submit a posting and associate tags or keywords with them. Users can define their own tags. Other users who search for a tag and find all relevant postings with that specific tag. Again a user driven way of labelling and searching. This is basically metadata. If the author wants to reclassify the page at a later time, this can easily be done by changing the list of tags.

This process is also referred to as Folksonomy. This concept has been popularised by sites like del.icio.us and technorati.com.

With so many new websites coming up and more and more users flocking to them basking in the new found freedom and power to throw their views, this looks like only the beginning of the very many innovative ways in which users are going to play a bigger role in developing the future of the web.

The arena is open for anyone to network, share views or even start a social networking website and who knows maybe get bought out someday.

Installing a NTP Server

NTP or Network Time Protocol servers are network devices that are designed to distribute accurate time to network time clients and other network infrastructure. This article describes how to configure and install NTP server systems on a network and discusses the advantages and disadvantages of various reference clock options.

NTP servers are generally supplied as 1U high rack mountable network devices. They obtain an accurate time from an external time reference, such as GPS or radio, and provide an accurate timing resource for a computer network. NTP or Network Time Protocol is a protocol designed for distributing time to client computers over an IP network. The protocol is UDP based and as such requires the TCP/IP network infrastructure to be installed.

Hardware Installation

Stratum 1 NTP time servers rely on an external timing reference to obtain accurate time. Various external timing references are available. Options may vary with the installations regional location.

GPS (Global Positioning System) is a popular timing reference. The advantages of a GPS reference are that it is highly accurate and can be utilised anywhere in the world. A typical GPS NTP server installation can synchronise to within a few microseconds of UTC time. The disadvantage of GPS is that ideally a roof-mounted external antenna is required with a good view of the sky. The maximum cabling distance between an NTP server and GPS antenna is governed by the quality of coax utilised. Relatively low-quality coax, such as RG58 can be used to around 50m. Higher quality coax, such as LMR200 can be utilised to around 80m. Very high quality coax, such as LMR400 can be utilised to around 200m. Additionally, GPS amplifiers can be used to amplify the GPS signal and extend cable runs. It is also good practise to install a surge suppressor to externally mounted GPS antennas, to protect against the possibility of damage caused by lightning strikes.

Local radio time references are available in many countries. Radio time references tend to be local to the country of origin and maybe neighbouring countries. The advantage of radio is that generally a good signal can be obtained indoors, close to the NTP server installation. However, radio time services are less accurate than GPS and reception areas are regional. A typical radio NTP server installation can synchronise to within a few milliseconds of UTC time. A number of factors can affect radio reception, including: locating the radio antenna underground or in a basement; locating the antenna inside a metal cage (including metal cladding) and locating the antenna close to electrically noisy equipment.

A number of regional radio time references are available including: WWVB, Colorado, US; DCF-77, Frankfurt, Germany and MSF-60, Rugby, UK. The DCF-77 time transmission is available throughout Central and Western Europe. The MSF-60 time signal is available throughout the British Isles and much of North-West Europe.

NTP Server Configuration

For a minimal installation, NTP servers are extremely easy to install. They ideally need to be provided with a static IP address. DHCP is not a good option since the IP address is leased and can change periodically. The device then needs to synchronise its internal reference time with the selected external timing reference. Synchronisation can take as long as 30 minutes depending on the drift of the local battery-backed clock when the device was powered down. Once synchronised, the NTP server can provide precise time to network time clients and other network devices and infrastructure.

Many other configuration options are available on an NTP server: authentication options are available for secure installations; IP address restrictions can be specified; status reporting functions such as 'syslog' as well as precision and status information.

NTP Client Configuration

Many operating systems such as Microsoft Windows 2000/XP/2003 and Vista have built in SNTP client functionality. The standard NTP distribution is available for LINUX, Free BSD and UNIX operating systems; Novell also has a NTP compliant NLM available. Many network infrastructure devices, such as Cisco routers and switches can also be synchronised using NTP. Essentially, a network time client only needs to be pointed to the IP address or DNS name of a NTP server in order to synchronise time.

NTP and SNTP

SNTP or Simple Network Time Protocol is a simplified version of NTP that is generally used by small computers and micro-controllers. SNTP provides a subset of NTP functionality for computers that do not require the precise synchronisation ability of NTP. SNTP and NTP are however completely interchangeable. SNTP clients can synchronise to NTP servers and vice-versa. The client software supplied by Microsoft with Windows 2000 and XP is a SNTP rather than an NTP implementation.

Summary

NTP servers are extremely easy to install and configure. However, a little thought needs to be given to selecting the correct external timing reference for your region and to antenna installation.

Seven Common DoS Attack Methods

Hackers have an armory of methods to pass Denial of Service (DoS) attacks. The following seven sections emphasize the degree of the quandary faced by organizations trying to battle the DoS threat. TippingPoint provides solutions to battle these common methods of DDoS attacks:

<> Vulnerabilities
<> Zombie Staffing
<> Attack Tools
<> Bandwidth Attacks
<> SYN Floods
<> Established Connection Floods
<> Connections-Per-Second Floods

Method 1 : Vulnerabilities

Attackers can effort to collide a service or fundamental operating system in a straight line through a network. These attacks immobilize services by exploiting shock absorber spread out and other accomplishment dodge that exist in defenseless servers. Vulnerability attacks do not want widespread resources or bandwidth to commit; attackers only need to know of the survival of a susceptibility to be able to develop it and cause widespread injure. Once an attacker has control of a vulnerable service, request, or operating system, they abuse the opening to immobilize systems and in the end crash an whole network from within.

Method 2 : Zombie Conscription

The same vulnerabilities used to collide a server allow hackers to change vulnerable PCs into Distributed Denial of Service zombies. Once the hacker develop the susceptibility to increase manage of the system, they plant a backdoor into the system for later use in commiting DDoS attacks. The Trojan or similar disease provides a trail into the system. Once the attacker has the path, they tenuously control the network, making the server a "Zombie" that waits for the given attack authority. Using these zombies, attackers can send a huge number of DoS and DDoS attacks with secrecy. Viruses can also be used for Zombie conscription. For instance, the MyDoom bug was designed to convert PCs into Zombies that attacked SCO and Microsoft at a prearranged time programmed into the virus. Other viruses fit backdoors that let hackers to open coordinated attacks, rising the sharing of the attacks across networks around the sphere. The following figures detail how attackers make and begin these attacks against a network.

Method 3 : Attack Tools

Through zombie recruitment, hackers use secret communication channels to contact and manage their zombie military. They can choose from hundreds of off-the-shelf backdoor programs and tradition tools from websites. These tools and programs begin these attacks to penetrate and control networks as zombie armies to pass additional attacks from within. Once they have the zombie systems, they can use other tools to send a solitary command to all zombies concurrently. In some cases, commands are carried in ICMP or UDP packets that can go around firewalls. In other cases, the zombie "phones home" by making a TCP link to the master. Once the relation is created, the master can manage the Zombie.

The tools used to attack and control systems comprise:

<> Tribe Flood Network (TFN) : Spotlight on Smurf, UDP, SYN, and ICMP reverberation apply for floods.
<> Tribe Flood Network 2000 (TFN2K) : The updated version of TFN.
<> Trinoo : Focuses on UDP floods. Sends UDP packets to chance purpose ports.
The size is configurable.
<> Stacheldraht : Software tool that focuses on TCP, ACK, TCP NULL, HAVOC, DNS floods, and TCP packet floods with random headers.

DDoS Protection tools are growing both in terms of covert channel completion and in DDoS flooding methods. New tools exploit random port numbers or work across IRC. Further, smarter tools cleverly mask flooding packets as lawful service requests and/or bring in a high degree of chance. These improvements make it more and more hard for a port-filtering device to divide attack packets from lawful traffic.

Method 4 : Bandwidth Attacks

When a DDoS attack is opened, it can often be detected as a important change in the arithmetical work of art of the network transfer. For example, a typical system might consist of 80 percent TCP and a 20 percent mix of UDP and ICMP. A change in the arithmetical mix can be a signal of a new attack. For example, the Slammer maggot resulted in a rush of UDP packets, whereas the Welchi worm shaped a flood of ICMP packets. Such surges can be DDoS attacks or so-called zero-day attacks ==> attacks that develop secret vulnerabilities.

Method 5 : SYN Flood

One of the majority common types of DoS attacks is the SYN Flood. This assault can be launched from one or more attacker equipment to put out of action access to a target server. The attack use the device used to found a TCP connection. Every TCP link requires the conclusion of a three-way handclasp before it can pass data:

<> Connection Request : First packet (SYN) sent from the supplicant to the server, preliminary the three-way handclasp
<> Request Acknowledgement : Second packet (SYN+ACK) sent from the server to the requester
<> Connection Complete : Third packet (ACK) sent from the supplicant back to the server, implementation the three-way handshake

The attack consists of a flood of unacceptable SYN packets with spoofed source IP addresses. The spoofed source address causes the target server to react to the SYN with a SYN-ACK to an unwary or absent source machine. The aim then waits for an ACK packet from the source to total the link. The ACK never comes and ties up the connection table with a awaiting connection ask for that by no means completes. The bench will rapidly fill up and devour all obtainable capital with invalid requests. While the number of link entries may differ from one server to another, tables may fill up with only hundreds or thousands of requests. The result is a denial of service since, once a table is full, the target server is unable to service lawful requests. The difficulty with SYN attacks is that each request in separation looks benign. An unacceptable ask for is very difficult to differentiate from a lawful one.

The complexity with SYN assault is that each request in separation looks caring. An invalid request is very hard to differentiate from a lawful one.


Method 6 : Established Connection Flood

An Recognized Connection Flood is an development of the SYN Flood attack that employs a array of zombies to commit a DDoS attack on a aim. Zombies found apparently lawful connections to the end server. By using a large number of zombies, each creating a large number of connections to the target, an attacker can make so many connections that the aim is no longer able to believe to lawful link requests. For example, if a thousand zombies make a thousand connections to a end server, the server have got to run a million open connections. The result is similar to a SYN Flood attack in that it devour server funds, but is even more difficult to sense.

Method 7 : Connections Per Second Floods

Connections Per Second (CPS) Flood attacks flood servers with a high rate of connections from a apparently valid source. In these attacks, an attacker or army of zombies attempts to drain server resources by rapidly setting up and ripping down TCP connections, perhaps begining a request on each link. For example, an attacker strength use his zombie army to frequently obtain the home page from a target web server. The resulting load makes the server tremendously lethargic. visit DDoS Protection

Fix Computer Freezing

Computer keeps freezing? You may be getting the windows blue screen also known as the blue screen of death (BSOD). Or perhaps your computer freezes up as the most unexpected time and you have to manually restart. Whatever the cause, computer freezing can be quite a pain in the neck. Especially when you are working on something important and it gets lost forever. But in order to fix computer freezing we must get to the root of the problem first.

If you are wondering why does my computer freeze up the answer is simple. The first and perhaps easiest reason to deal with is:

• Running too many programs at once

Often times if we are running too many programs or using programs that eat up a lot of RAM and overload our system's resources. The way to solve this is to either run fewer programs or increase your computer's RAM capability.

The other major cause to stop computer screen freezing is a little more complex. This is:

• Errors in your windows registry

As we install new programs or delete older ones our registry gets stuck with a lot of redundant and corrupted information. The registry is the most vital area of our computers yet our system lacks the ability to fix corrupt registry files internally.

The best way to fix computer freezing is to download a registry repair program. The best registry cleaner will fix corrupt registry files and clean out redundant information that counteracts with computer settings. Registry cleaner software can also take a snapshot of your system and highlight trouble areas while offering solutions to speed up your computer tremendously. I personally use a registry cleaner that can fix computer freezing and performs these other features with just a few clicks of the mouse. Scan your computer for free below.

Sick of your computer freezing up? Want to repair computer errors the easy way? Scan your computer for free and fix corrupt registry problems with the #1 registry cleaner on the internet. After scanning your computer, I promise you will be quite surprised by all the errors on your system.

Live Streaming With the Best Software the World has to Offer

Gigstreams.com is an all new site that provides streaming enthusiast information on the latest and best software the planet has to offer when it comes to live internet streaming. Software for streaming audio and visual content over the Internet is varied. That is why reading reviews in websites such as Gigstream can provide the information you need before installing the software into your computer.

With the advent of the Internet, it has brought a huge amount of traffic that evolved from static text message based web content to a more full flash, rich multimedia content. With this, the multimedia and Internet streaming technology have become an increasingly important building block to many Internet applications, ranging from remote education, digital radio, Internet Protocol TV (IPTV), etc.

www.gigstreams.com , internet users can read reviews and information on the types of streaming software available to users that have been tried and tested by the folks at Gigstreams.com. Each review on the site comes with a screen shot of the software, as well as other added features and benefits that the software has that puts them as among the best.

Users can download each of the software to view movies, TV shows, music, radio channels and even sports such as live football and experience for themselves which software works better for them. The site makes it easier for visitors in finding out the best streaming capabilities by categorizing it into 'Cool Streaming', 'Free Internet TV', 'Music on Demand', 'PPLive', 'Sopcast', and 'Streaming TV'.

Some well known internet streaming softwares that can be found on the website are ZiggyTV, Dish TV, PCTV4ME, PPMate, SopCast, 3WebTotal, and CoolStreaming. Each streaming software has a download link provided to stay users who are interested in that particular software can immediately download by clicking on the link. Each link that is clicked will bring the users to the software's website where they can read in full the capabilities of each software as well as the technical requirements needed for the software to be installed into their computer.

With internet streaming installed in your laptop or PC, you can now enjoy free TV online, get to watch your streaming films on your PC , live football coverage almost anywhere in the world, provided you have a stable internet connection. Getting your scope on the latest is now not confined in front of the TV and at home. Live internet streaming enables users to connect and watch their favorite sitcoms and even live sports coverage even if time zones are not the same. If you are in Africa and would want to watch a live showing of the football in the US, then by using any one of these soft wares can help you get to watch what you want.

About Gigstreams.com: The newly launched Gigstreams.com provides website owners with descriptions of some of the best professional audio and visual streaming software currently available. Professional software is a more desirable path to take over free options as one will be provided with ongoing support and updates, which are an integral part of any web based business.

DVD Ripper Software

If you are the DVD fans and want to enjoy your favourite movies any where and any time, and the software will help you a lot.

DVDto iPod Ripper & Converter

<> Cucusoft DVD to iPod Converter
Cucusoft DVD to iPod Converter is the DVD to iPod converter which is multifunctional but easy-to-use for both Apple iPod Movie and iPod Video. It can convert almost all kinds of DVD to iPod Movie / iPod Video format. Besides, it supports DVD to MP3 audio conversion, Apple TV, and latest iPod touch and iPod nano.

<> iSofter DVD to iPod Converter
iSofter DVD to iPod Converter is designed to rip and convert DVD to iPod video MP4 format and iPod audio formats including MP3, AAC, and M4A.

<> Avex DVD to iPod Converter
Avex DVD to iPod Converter can converter DVD to iPod MP4 video and adjust video size for playback on iPod and on TV screen as well.

<> PQ DVD to iPod Converter
PQ DVD to iPod Video Converter can convert DVD to iPod movies, Tivo/ DivX/ Xvid / MPEG/ WMV/ AVI/ RealMedia to iPod, etc.

<> Aimersoft DVD to iPod Converter
Aimersoft DVD to iPod Converter can rip and convert DVD to iPod MP4 and iPod MP3 for iPod Touch/Nano/iPod/Classic.

DVD to iPhone Ripper & Converter

<> Avex DVD to iPhone Converter
Avex DVD to iPhone Converter is a professional and easy-to-use software, which can convert DVDs to iPhone movie just in one-click. It can converter DVD to iPhone MP4 video, support H.264 (High quality) and MPEG4 video in MP4, and can adjust video size for playback on iPhone and on TV screen as well.

<> Cucusoft DVD to iPhone Converter
Cucusoft DVD to iPhone Converter can rip DVD to iPhone Video MP4, convert DVD to iPhone MP3 audio, and support DVD to iPhone,DVD to iPod transfer.

<> PQ DVD to iPhone Converter
PQ DVD to iPhone Converter can converter DVD, Tivo, Xvid/DivX, WMV, MPEG, AVI, RealMedia videos to iPhone.

<> Accelerate DVD to iPhone Converter
Accelerate DVD to iPhone Converter can convert almost all kinds of DVD to iPhone video (mp4) format.

<> Aimersoft DVD to iPhone Converter
Aimersoft DVD to iPhone Converter has the features for converting DVD to iPhone MP4, M4V video, ripping DVD audio to iPhone MP3 and M4A audio.

DVD to Zune Ripper & Converter

<> Cucusoft DVD to Zune Converter
The Cucusoft DVD to Zune Converter is the powerful and professional DVD to Zune converter software. It is suitable almost of all type of DVD for Microsoft Zune Video player to play. It supports for Audio Track Selection, various Zune video formats, such .wmv, .cbr and .vbr.

<> Avex DVD to Zune Converter
Avex DVD to Zune Converter uses the Built-in X!-Speed transcode technology, which can make your converter process much faster and easier.

<> dvdXsoft DVD to Zune Converter
dvdXsoft DVD to Zune Converter is suitable for Zune, iPod or PSP devices. It owns the high converter speed, excellent output video quality.

<> 99bytes DVD to Zune / PSP Video Converter
99bytes DVD to Zune / PSP Video Converter can can converter almost of all the DVD to .wmv or .mp4, no matter commercial or not, original or copy.

<> Aplus DVD to Zune Ripper
Aplus DVD to Zune Ripper can convert DVD to Zune/ iPod / iPhone MP4 file, it supports dvd to Zune convert, even copyright protected dvds.

DVD to PSP Ripper & Converter

<> Cucusoft DVD to PSP Converter
Cucusoft DVD to PSP Converter is the superb and professional DVD or video to PSP converter solution. It can convert almost of all kinds of DVD to PSP in just a few steps, and supports various PSP video size, Subtitle Selection, Audio Track Selection, and etc.

<> Avex DVD to PSP Converter
Avex DVD to PSP Converter can converter DVD to PSP in just a few clicks, and support H.264 and MPEG4 video in MP4, include PSP video manager and etc.

<> Daniusoft DVD to PSP Converter
Daniusoft DVD to PSP Converter can transfer DVD to PSP mp4 format, and rip DVD audio to PSP mp3 or wma formats.

<> 99bytes DVD to PSP / iPod Video Converter
99bytes DVD to PSP / iPod Video Convertersupports the converter based on title or chapters, and what you have to do is just a few steps.

<> Xilisoft DVD to PSP Converter
Xilisoft DVD to PSP Converter is designed to convert DVD to PSP MP4, MPEG-4, H.264/PSP AVC Video. It supports DVD to PSP MP3, DVD to PS3 Video MPEG-4.

DVD to 3GP Ripper & Converter

<> Xilisoft DVD to 3GP Converter
Xilisoft DVD to 3GP Converter is a easy-to-use and superb DVD to 3GP converter solution. It can convert DVD to 3GP, 3GPP2, MPEG1/2, MPEG4, WAV, Xvid, RM, and to audio MP3, M4A, RA, AAC with excellent quality, and just a few clicks. It supports high-speed convertion, auto-splits output file, and allows you to select target subtitle and audio track.

<> iSofter DVD to 3GP Converter
iSofter DVD to 3GP Converter is designed for ripping DVD to 3GPP (3G2) and audio formats MP3 with excellent output.

<> Plato DVD to 3GP Converter
Plato DVD to 3GP Converter can help you convert DVD to 3GP/3G2 format easily and quickly. It supports selectable DVD subtitle and Audio Track.

<> Aimersoft DVD to 3GP Converter
Aimersoft DVD to 3GP Converter used to rip DVD to 3GP. It supports all portal player, movie trimming, cropping and effect adjustment.

<> OJOsoft DVD to 3GP Converter
OJOsoft DVD to 3GP Converter can rip or convert DVD to 3GP, 3G2 and MP3 format. It allows you to select DVD titles or chapters to rip.

DVD Ripper & Converter

<> iSofter DVD Ripper Platinum
iSofter DVD Ripper contains the DVD backup feature, and it can converter DVD to AVI, DivX, XviD, VCD, WMV, MPEG4 format video files, and it supports custom watermark, DVD split by chapters, Size or Custom Time, and etc.

<> Wondershare DVD Ripper Platinum
Wondershare DVD Ripper can rip DVD to almost all video and audio formats such as MP4, M4V, AVI, WMV, MOV, 3GP, 3G2, MPG, MPEG, FLV, WMA, etc.

<> Aimersoft DVD Ripper
Aimersoft DVD Ripper allows you to converter DVD to AVI, MP4, WMV, MOV, MPG, MPEG, 3GP, 3GPP, MPG, ASF, FLV, VOB, WMA, M4A, MP3, etc.

<> Xilisoft DVD Ripper Platinum
Xilisoft DVD Ripper Platinum can rip DVD to AVI, MPEG4, WMV, DivX, RM, MOV, XviD, 3GP, FLV, SWF, MP3, WMA, WAV, M4A, AAC, AC3, etc.

<> Plato DVD Ripper Professional
Plato DVD Ripper Professional is designed to rip dvd to avi , divx, mpeg, Apple iPod, iPhone, Apple TV MP4 file, Youtube FLV file, Sony PSP MP4 and etc.

DVD to Audio Ripper & Converter

<> Aimersoft DVD Audio Ripper
Aimersoft DVD Audio Ripper is the superb and easy-to-use DVD audio ripper program which can rip DVD audio to MP3, WAV, AAC, AC3, WMA and M4A formats.

<> iSofter DVD-Audio Ripper Deluxe
iSofter DVD Audio Ripper Deluxe can rip DVD audio to MP3 or WAV, WMA format simply and easily. It supplies you the external codec, vob Scan, and etc.

<> ImTOO DVD Audio Ripper
DVD Audio Ripper can extract and rip DVD to MP3, WMA, WAV, AAC, AC3, OGG, RA and AU formats.

<> Magicbit DVD to Audio Ripper
Magicbit DVD to Audio Ripper is designed for extracting and ripping DVD to MP3, WAV, WMA, AAC, AC3, OGG, RA.

<> Wondershare DVD Audio Ripper
Wondershare DVD Audio Ripper can rip audio from DVD to MP3, WAV, AAC, AC3, WMA and M4A, etc.

Neurolinguistic Programming (NLP)

What is neurlinguistic programming? It's the science of how the brain processes experiences and learning. NLP works by using language to send messages to the brain. By using this properly, you can create some very persuasive copy.

There are several NLP devices, including embedded commands, presuppositions, linguistic binds, and framing.

Embedding Commands

When we write web copy, we're looking for a direct response, such as getting your reader to subscribe to a newsletter , or pick up the phone, or use your service. How can you use an embedded command? You write the action you want your reader to take and then use a sentence to pad it. For example:

I wonder when you are going to buy this book?

The embedded command here is you are going to buy this book When we speak, we use tone of voice to alter our commands and add emphasis. Since we cannot do this with writing, we use bold face, quotes, italics, or multiple colors to separate a command from the rest of the copy. By separating the command effectively: I wonder when you are going to buy this book?

The reader will respond to the command in the sentence and follow the command without knowing it. How about the Lays potato chip campaign…Bet you can't eat just one. Oh sure, it's more like: bet you can't east just one hundred! Who can look at a bag of Lays and reach in only once, especially with that tagline ringing in your ears? Embedded commands motivate individuals to take action and make snap decisions. Presuppositions

Since we can only focus on one thing at one time, if we're showered with thoguhts, we presuppose (or assume) the suggestions are facts. Take an Herbal Essences ad: We can't keep something this juicy a secret.

This assumes that there is something that is "this juicy", and then makes an assertion about that thing. One important function of the presupposition here is to promote a kind of ideology within advertising, in this case, the idea that "juiciness" is somehow related to shampoo and hair.

Similarly, we often see presuppositions in the courtroom. The questions imply that something exists when it has not been proven. For example: Why did you steal the car?

Another way to use presuppositions is in the form of phrases such as "As you know" and "Everyone knows" and "Clearly, obviously, naturally."

For example: "Clearly, investing in Tom Martins seminar Successful Marketing Campaigns is the quickest way to start making money today." This suggestion of a fact implies that the statement is true and you reader will more readily accept the statement.

Linguistic Binds

A linguistic bind forms a sentence that makes your reader say "Of course what you say is true."

How does it work? Take this example:

"As you read this book, you understand you can't waste any more time on a job that's not offering you everything a job has t offer."

The sentence is in two parts. The first part states something obvious, you are reading this book, and the second part indicates what you want the reader to think or do. It creates the impression to the reader that what you say is logical.

The linguistic bind is also created in the form of a cause and effect statement. For example: "The more you read about this water purifier the more you won't want to be without it." Reframing Reframing is when you alter the perception of something by changing the way it is viewed. The key to reframing is to shift your readers focus to a desirable or hidden aspect of a disadvantage and turn it into something positive. For example:

What price can you put on the online safety of your children? $10,000? $5000? $1000? If you paid $25 per month for online monitoring, you'd pay $300 per year in fees. This cyber safety software will not cost you $300, or even $200. You can monitor you children anytime from anywhere for only $150 with no ongoing monthly fees.

By reframing, the cost of the product seems reasonable, a real bargain!

And there you have it. Four methods of neurolinguistic programming to help you create persuasive copy!

Wednesday, November 26, 2008

DirectX 11 to Windows 7 !!

New versions of Windows have featured new versions of DirectX, the 3D audio and graphics family of APIs, and it now appears that Windows 7 will be no exception. According to PC Games Hardware, Microsoft's Ben Basaric, Product Marketing Manager Windows, says that Redmond will be bundling DirectX 11 with Windows 7, after all. Earlier this week, PCGH had reported that the pairing of DirectX 11 and Windows 7 was "unlikely."

So, what's new in DirectX 11? As we reported this summer, DX 11 will include compute shader technology, enabling the GPU to perform operations other than 3D graphics; better multi-core resource handling; more efficient utilization of the processing pipeline; hardware tesselation support for more detailed 3D models.

When can you expect to buy DirectX 11-compliant GPUs? AMD says its first DirectX 11 parts will be available in late 2009 - right about the time Windows 7 is expected to arrive. New operating system and new graphics hardware? Hopefully, that's a recipe for more realistic 3D graphics than ever before. If Microsoft and OEMs continue to work as closely as the Engineering Windows 7 blog suggests, that's much more likely than a repeat of the poorly handled rollout of Vista-ready hardware at Vista's introduction.

Although Gamefest is entirely developer-centric, there's still plenty to interest those aforementioned groups, and thus our plan with this article is to sift through the mass of information now available regarding DirectX 11, pick out the big-hitting changes worthy of discussion, and bring them to you at a relatively high level to give you all an early understanding of what the API is setting out to do, and the kind of features and functionality you can expect in the next couple of years from both your games and graphics boards. Sound interesting? You bet it does, so let's dive straight in.

Internet Security - How To Avoid Being Infected With Spyware

Spyware is more than just annoying - it can cause other programs to not work properly and can cause your computer to become quite unstable. Not to mention the privacy issues it brings up.

Spyware is often installed without your knowledge or consent and in many cases can't be removed from your computer without specialized software tools. When the people that distribute it need to resort to tricking you into installing it, there's obviously very little there to warrant your trust.

The first line of defense against spyware is to be careful installing software. Know what's being downloaded. A large percentage of freeware or shareware programs have spyware embedded in them. Sometimes that's disclosed in the user agreement, but often not.

Check for "spyware free" guarantees on software you download. Obviously, anyone can say something is spyware free even when it isn't, but if a website has gone to the trouble to say so, it is more likely to be safe than if they hadn't.

How can you tell if you have spyware on your system? You may see pop-up advertisements even when you aren't browsing the web. Your homepage may have been changed without your consent. New toolbars are installed on your web browser which you didn't request. Your computer may be sluggish or mysteriously reboot on its own. Though, the last effect is usually a virus.

If you do get infected with spyware, there are ways to get rid of it. A number of companies make software designed to get rid of it. These programs will scan your computer and check through their database of known spyware for any matches. These databases get updated frequently as new forms of spyware are found.

Some of these programs are free while others will cost. The paid versions sometimes have additional features, such as automatic scheduled scans. None of them are 100% foolproof however, so it's a good idea to run more than one of them.

Some kinds of spyware are notoriously difficult to get rid of. They may make changes to your Windows files that help them hide from the scanners. On occasion, you may need to delete them manually to be sure they're gone.

Obviously, this is something that you should only attempt if you are quite knowledgeable. You wouldn't want to remove something that is critical for your computer to operate.

Once the spyware has been removed from your system, you should run scans on a regular basis to keep it clean. Whether you do this manually or use a program that does it automatically on a schedule is up to you (and your pocketbook).

And, of course, beware those tempting looking free offers. You may get more than you bargained for.

Folder Guard

Folder Guard® is a powerful computer security software that you can use to control access to files, folders, and other Windows resources, such as Control Panel, Start Menu, and so on. You can use Folder Guard to lock your personal files and folders with passwords, to stop other users from peeking into your records. You can even completely hide your private folders from virtually all applications, and such folders would remain invisible until you enter a valid password. You can also protect sensitive system files from modification or destruction, disable access to the removable drives, restrict access to Control Panel, and more.



Why should you choose Folder Guard:

Folder Guard lets you password protect your files and folders.

You can protect with password virtually any folder or file, allowing only the authorized users to open the protected files or folders. You can protect an unlimited number of files and folders, each with its own password, or you can use the Master Password of Folder Guard to unprotect them all at once.

Folder Guard can hide your personal folders from other users.

You can set up Folder Guard to hide your private folders (or make them appear empty). The folder would be hidden from virtually any program, including Windows Explorer, Office, MS-DOS programs, etc.

Folder Guard can restrict access to Control Panel, Start Menu, Desktop, etc.

You can set up Folder Guard to allow only certain users to change the computer settings with Control Panel, while denying that to other users. You can control access to various settings of Start Menu, Desktop, Taskbar, and other Windows resources. You can remove the Run and Search commands on the Start menu, hide specific drives, lock the Internet settings, and more.

Folder Guard can protect access to the floppy, CD-ROM and other removable drives

You can configure Folder Guard to allow or deny access to the removable drives, restricting the user's ability to run or install unauthorized programs on your computer.

Folder Guard is suitable for a wide range of the computer security tasks.

You can stop other users of your computer from peeking into your personal files. You can protect the system files and folders from destruction by cyber-vandals. You can allow specific users to run a program while deny it to others. You can allow users to use the removable drives to store their documents while prevent them from running unauthorized programs from the removable disks. The possibilities are endless:

How to:

* Hide folders from prying eyes
* Hide files without encrypting them
* Lock files and folders with passwords
* Use Quick Start Wizard of Folder Guard
* Restrict access to Control Panel and other resources
* Set up user-specific restrictions
* Prevent users from installing unauthorized programs
* Prevent users from running programs from the removable disks
* Prevent users from reformatting local drives
* Disable the CANCEL button on the Windows Me/9x login window
* Restrict downloading programs from the Internet with Internet Explorer
* Restrict downloading programs from the Internet with Opera browser

Folder Guard protects your files without encrypting them.

There is no risk of losing your documents if you lose your encryption key: with Folder Guard all your files remain intact, without modification of any kind.

Folder Guard lets you quickly enable or disable the protection via a "hot key".

You can choose a specific keyboard combination as the hot key of Folder Guard, to be able to quickly enable or disable the protection of your computer. Of course, the "hot key" is protected with your password, too, only you can use it!

Folder Guard can operate in the "stealth mode".

You can set up Folder Guard to operate in the stealth mode, to hide its own files and shortcuts from being seen by other users. You would still be able to control Folder Guard via the "hot key".

Folder Guard supports easy recovery in case of emergency.

If you forget your password, or experience other problems, simply use the Emergency Recovery Utility (free download) to quickly restore access to your protected folder.

Folder Guard works with drives of any format.

If your computer can handle it, Folder Guard can protect it. You don't have to format your hard drive with the NTFS file system: Folder Guard can protect files and folders on both NTFS and FAT/FAT32 disks.

Folder Guard runs on a wide range of Windows platforms.

From Windows 2000 to Windows XP to Windows Vista and later, with all service packs and hotfixes, all are supported by at least one of the available editions of Folder Guard.

Folder Guard is easy to use.

Folder Guard sports one of the most intuitive user interfaces, that makes it easy to use for both novice users and computer professionals.

Folder Guard "speaks" plain English.

You don't have to be a computer professional to understand how to use Folder Guard. The Quick Start Wizard can guide you through the steps necessary to set up the password protection of your personal folders. Folder Guard Advisor warns you about situations that may require your attention and offers possible workarounds. Folder Guard User's Guide describes its commands and operation in plain English, without "pseudo-techno" or "geeky" talk. (And it does not baby-sit you either).

Folder Guard is not a toy.

Folder Guard is used by large corporations and small businesses, schools and police departments, universities and correctional facilities, libraries and hospitals (to name a few).

Folder Guard is widely used.

Hundreds of thousands of copies of Folder Guard have been downloaded by computer users from virtually all countries of the world.

Folder Guard offers the best value for the money.

None of our competitors offers a product that would come close to Folder Guard.

Folder Guard is flexible.

Although Windows lets you restrict access to folders located on a NTFS drives, it cannot hide them. With Folder Guard, you can not only restrict access to, but also hide folders, or make them look empty. Unlike Windows, Folder Guard lets you protect only some files within a folder, and keep the rest of the files visible and accessible, if you wish. Or, you can protect files and folders each with its own individual password, and then unlock them separately from each other (Windows cannot do that).

Folder Guard can be used with other disk tools.

You can designate your anti-virus and other disk maintenance tools to be the "trusted" programs, to make them able to work with your protected disks without restrictions.

Folder Guard is extensible.

You can fine-tune the access rules to the files and folders of your computer by creating appropriate filters.

Folder Guard will save you hours of learning time.

You don't have to learn how to use the Group Policies, user groups, Access Control Lists, privileges, and other built-in security features of Windows, because Folder Guard does the hard work for you: its visual and intuitive user interface lets you manage the restrictions with ease.

Folder Guard is actively maintained.

Since its first release back in 1997, we've been continuously extending, enhancing, and improving Folder Guard. Now in version 7.92, Folder Guard gives you more power than ever.

Will DirectX 10 Graphics Deliver Better Gaming?

Right now all the talk in PC gaming is DirectX 10 Graphics. New hardware and new DX10 games have everyone buzzing about a new era in PC gaming. But is all the celebration a little bit premature?

Yes and no!

As with any new technology there is a lag time before everything catches up, before the new technology is truly integrated into the old, in this case gaming systems. The big question on everyone's mind (especially gamers), how long will we have to wait before DX10 graphics delivers the goods?

In other words, how long is the lag time before performance (what you see in your games) catches up with the technology DX10 Graphics will ultimately deliver?

For the ordinary consumer who is not a techie or even a dedicated gamer, all this fuss about X10 Graphics can be downright confusing to say the least. Getting a handle on even the simplest terminology can be a challenge.

First, you have to understand DirectX is a Microsoft Windows technology that lets you have higher performance in sound and graphics when playing games and/or watching videos on your computer. In the past we have had different versions of DirectX... DirectX 8, DirectX 9, and with the introduction of Windows Vista we have DirectX 10.

DX10 Graphics gives us better performance and better looking PC graphics with clearer, higher resolution images with more shading and details. It simply means better overall picture quality and performance, a forward step to true realism in gaming.

At the heart of DirectX are APIs (Application Programming Interfaces), which can be oversimplified as a bridge or way for the hardware and the software to "talk" to each other. These give you multimedia applications such as (3-D) graphics acceleration, sound mixing and sound output and other functions.

We are now seeing higher performing DirectX 10 Graphics GPUs from top makers such as NVIDIA with their 8800 series, including the NVIDIA GeForce 8800 GTX and GeForce 8800 GTS. These GPUs (Graphics Processing Units) will give you better gaming with greater image quality and performance. HD DVD and Blu-ray video playback is even possible.

Top gaming manufacturers like Rockdirect in the UK are now all carrying DX 10 Graphics in their gaming machines. You will also find many of the major gaming specialists such as Alienware, Vigor, and Sager sporting DX 10 graphics.

Present or upcoming games that will have DirectX 10 support include Crysis, Shadowrun, World in Conflict, and Company of Heroes.

Nor should you think DirectX 10 is solely for gamers; the general PC user will also benefit from better graphics and higher performance. For instance, the ability to play and enjoy HD DVD and Blu-ray video playback on their PCs.

Perhaps one of the greatest benefits of DirectX 10 Graphics is that it makes it much more easier for game designers and developers to create games. For a more detailed discussion of the technical side of this topic, you can try Microsoft Game Developer Presentations here: http://msdn2.microsoft.com/en-us/xna/aa937787.aspx

Or you can read this very good, detailed article on "The Future of PC Gaming" by Tim Smalley presented here: http://www.bit-tech.net/hardware/2006/11/30/directx10_future_of_p c_gaming/1

The question still remains - is DirectX 10 Graphics deserving of all the hoopala or fuss?

Yes, but it will be awhile before the true benefits are fully enjoyed by gaming enthusiasts and the general public. As more DX10 games are developed and as more powerful gaming hardware become available, the full potential of better gaming will hopefully be reached.

But there may be some catching up to do before we see the real benefits. Many gamers complain that presently most hardware is more suited to DX9 Graphics. Here's a very interesting and detailed discussion of this issue done by X-bit Labs entitled: "DirectX 10 Games vs. Contemporary Graphics Accelerators" http://www.xbitlabs.com/articles/video/display/directx10-games.ht ml

Implementing any new technology takes time, as old technology is gradually replaced by the new. Just compare it to say switching from VHS to DVD and now to Blu-Ray; keeping ahead of the latest technology takes some catching up time. DX9 Graphics will eventually lose ground to DX10 Graphics.

So it may be awhile before DirectX 10 Graphics delivers the full potential of the ultimate gaming experience, but there is little doubt this technology is the future of gaming. It may just take a little while before game developers and hardware makers get all their guns locked and loaded to give you that ultimate gaming experience.

Acquaint Yourself With Computer Printers

A computer printer is a device used for printing text or images on hard copy stored in electronic form, generally on physical print media like paper. Printers are designed to support both local and network connected users simultaneously.

Nowadays, modern printers can directly interface to electronic devices like digital cameras. Some printers that come with non printing features are commonly known as Multi-Functional Printers (MFP) or Multi-Function Devices (MFD). It integrates various functions of multiple devices into one. Such types of printers are extremely useful for small businesses and home offices.

As opposed to a traditional printer, a multi-functional printer is a combination of devices like Printer, Scanner, Photocopier, and Fax Machine. Likewise, there are numerous other types of printers widely available in the market. Let’s take a look at them:

Laser Printer: A laser printer works in a similar fashion as a photocopier does. It has a roller which is charged with electricity. A laser beam is passed to remove the charge from portions of the roller. The parts hit by the laser are powdered by the toner which is then transferred from the roller to the paper. Finally, the ink is baked into the paper with the help of a heater incorporated in the printer. People generally prefer laser printer because of its ability to give high quality output and high speed.

Dot Matrix: It has a print head that moves across the page. A dot matrix printer produces characters using a cluster of pins which press an inked ribbon to the paper, thereby creating a dot. Each character is made in the same way. Dot Matrix printers are relatively cheaper and durable. These qualities still attract businesses which use them as invoice printers.

Ink Jet and Bubble Jet: It works in a manner similar to a Dot Matrix Printer. However, its print head sprays liquid ink onto the page instead of pressing a dry ink against the page. Ink jet and bubble jet printers are better known as predecessors of laser printers. They produce better image quality and run faster.

From inkjets to monochrome and color lasers, different printers are designed to accomplish different tasks. Companies like DELL, CANON, LEXMARK, BROTHER, EPSON, and HP HEWLETT PACKARD are most preferred when it comes to buying a printer. Nowadays, computer printer support is widely available on the Internet which saves you from taking it to any expensive technician for troubleshooting.

How To Troubleshoot Your Computer Hardware

There could be many reasons why you’d want to troubleshoot your computer, well, one actually and that’s because something is not working right. The process of troubleshooting is something you learn after working for a long time with computers. Often enough when there’s a problem, nothing is going to explicitly tell you what is causing the problem and how you can fix it. By taking logical steps and walking through the process of troubleshooting you should be able to solve almost any computer problem, software or hardware related. It involves identifying the problem(s), finding the cause of that problem, determining the solution, executing that solution, and testing and checking that solution to see if it solves your problem.

As an example let’s say one day while using your computer the screen suddenly turns all black and you can’t see anything. We found a problem now what would be the first step to take to fix it? First check to see if the monitor is on and is receiving power, most monitors when they have power, but no connection or connection problems with the computer will display a message that says this monitor is working, but make sure you check your cables. So the next logical step to take would be to check the cable to make sure it is properly connected and secured to the VGA slot behind your computer case and to make sure the monitor cable is plugged into the monitor. Now, here’s where you have to decide what would be the next best course of action to take. you could either swap out your monitor with another monitor that you know is working to see if the problem is the monitor itself and nothing else or you can try to see if the problem is your graphics card. If your replacement monitor works, good, then you know your culprit is a bad monitor and you’ll most likely have to get a new one, because monitors are dangerous and too costly service. If the replacement monitor you used shows up a black screen as well, the next thing you’d do is check to make sure the graphics card is properly seated in the motherboard, if it is and the display is still not showing up, then swap out the graphics card to see if your problem is fixed.

Generally there are only so many steps you can take before you solve the problem and everything is back in order. Make sure that before you start testing and swapping out parts that the problem wasn’t caused by you changing a software setting in Windows or some ambiguous option in the motherboard’s BIOS that causes your problem.

Motherboard

The motherboard is the heart of the computer, every part of the computer relies on the motherboard to function correctly. It maintains connection between every PC component and ensures that things are operating smoothly between them. Many signs of motherboard failure is that the computer won't boot up, not reaching the POST test, erratic system behavior, different combinations of components not working. Because everything is connected to the motherboard certain parts may or may not work correctly if the motherboard is faulty so be sure to test those parts before thinking they're dead and getting new ones.

Be sure to do a visual inspection of the motherboard to make sure all cables are seated properly, the fans are spinning, and that the CMOS battery is in it's proper place.

Also check for any broken or leaking capacitors, those can immediately render a motherboard dead.

Make sure that all of the jumpers are set correctly as well, you should be able to find jumper information in your motherboard's manual, and if you don't have the manual you should be able to find the manual on the Internet at the motherboard manufacturer's website.

Many of the problems caused by a bad motherboard is also similar to problems caused by a faulty or dying power supply, so be sure to check if the power supply is faulty or swap it out for another to see if your problem is fixed. If you have a spare motherboard you can try swapping out the motherboard to see if that solves your problem, if that's the case then the motherboard is most likely faulty. If you think the motherboard is faulty and it is still in warranty you should be able to send it back to the manufacturer for a new one with no hassle, sometimes they might even pay for the shipping & handling if it is a big problem that is happening with a certain line of motherboards. Make sure that when you open a motherboard you keep all of the packaging and the box, and if there are any stickers that will void the warranty if removed make sure you do NOT remove them, so that way it is easier to send back.

Power Supply

If you suspect your power supply is giving you trouble, make sure you check it out fast, because power supplies can make trouble with the rest of your system as well. Irregular voltages sent from the power supply can short circuit and overheat your components thus frying them and making them unusable. Some faulty power supplies have even caught on fire, but if you’re lucky it might just smoke a little and start to smell. A few signals that your power supply is bad or is going bad would be erratic and seemingly random system behavior like system hangs and crashes, and burning smells along with smoke.

If you recently upgraded your system or added new hard drives, disk drives, a graphics card or anything for that matter, be sure to check if your power supply is being overloaded with hardware. A good way to check is to use a power supply calculator. One time when I upgraded my system with a new fancy PCI Express 16x Graphics card, well it was fancy back then, I had problems with the graphics card performing while in 3d games, it was all due to my power supply being unable give it enough juice on the 12v rails so it performed poorly and didn’t act as it should have, I even swapped out the graphics card for another one believing it was bad, after checking the manufacturer’s forums it seemed like a lot of people were having problems with faulty cards, so I figured mine must have been faulty too. After getting the new card it seemed like it performed better for a little bit longer, which could’ve just been some optimizations they did to circuit board. Seeing how they sent me an upgraded version of the same card, but it wasn’t until I checked my power supply wattages that I found the real culprit.

The first thing to do to diagnose your power supply is check the power supply connectors, make sure everything is plugged into the motherboard and the power cable is plugged into the power supply, you wouldn’t believe how many people forget to plug in their computer. Many power supplies also have a power switch on them so check to make sure that no one accidentally or purposefully switched it off maybe for a prank. Check the fan to see if it is spinning at the correct speed and if it’s dusty vacuum it out. Determine if the power supply cables are giving out the right amount of voltage, if you computer will let you boot you should be able to check them in the BIOS menu to see if the correct voltages are being given. Normal power supplies give +3.3 volts DC, +5 volts DC, -5 volts DC, +12 volts DC, and -12 volts DC.

Memory

Faulty RAM can have many adverse effects on your system. Constant lockups, computer rebooting, memory error message (duh), system crashes, and sometimes refusing to boot up are all signs of memory errors. Though, these are also signs for motherboard, hard drive, and power supply problems too. Luckily for you if you think your memory is subject to causing a disruption in your system there are programs that can check the memory for it's performance and to see if it is generating any errors.

Memtest86+ is an amazing memory diagnostic program. It is based off of the original Memtest86 that has been around since 1994 and is used by system-builders, average joes, and professionals in the IT world. It's a standalone memory check test which means it can be easily run without a bootable operating system, that's good if you can't just seem to get your PC started and want to rule out your memory as quickly as possible.

How To Use Memtest86 With Your Floppy Drive To Test Your Memory

First go their website at www.memtest.org and select the most appropriate version to download. You can download the bootable iso or the Pre-compiled floppy drive depending on whether you want burn a CD or use your floppy drive. We're going to go into details on floppy method.

Open up the .zip and extract the files to a folder, then click on install.bat, you will be asked to “Enter target diskette drive:”. Type A and hit enter then it will ask you to insert a formatted diskette into drive A: and press -Enter-: after you hit enter it will write some files to your floppy so you can boot your computer with the floppy to test for errors.

After the floppy has been formatted with Memtest86+, leave the floppy in your floppy drive and reboot your computer. Remember to set your floppy drive as the first boot device in your BIOS menu.

The program will automatically load and perform the memory diagnostic tests on your computer. During the testing if there any errors they will show up and at the end of the test it will tell you how many errors you've had.

After testing your memory if you receive any errors you should make sure that your memory is okay either by swapping it out and seeing the problems still occur or try your memory in another system. If the memory passes the tests then you proceed to troubleshoot something else with good faith that your memory is fine.

Hard Drive

The hard drive is that ultimate safe to everything important on your computer. It keeps all of your information, files and folders, music, videos, favorite websites, and programs. With a bad hard drive there's no reason to have a computer. In terms of fixing a computer if the hard drive isn't salvageable then most people don't even want to bother with the rest, because their computer is probably a piece of junk that has been handed down from time to time. Generally when a hard drive is about to fail it's usually years down the road from first acquiring the computer. So the next best option rather than replacing the drive is to just buy a new computer, or build a new one, because your old one sure is probably not running as fast as it used to.

Luckily before your hard drive kicks the bucket there is usually a few warning signs:

Abnormally slow file transfers

Problems with booting, especially when Windows is being loaded

Corrupted files

Disappearing files or folders

Loud hard drive noise is a good sign that there is a mechanical problem going on inside

If your hard drive exhibits any of these signs be sure to transfer all of your files to another source immediately, and do not continue to do day-to-day activities with that hard drive. If it doesn't show any of these tell-tale signs, however you have a gut feeling that your hard drive is on the brink of destruction you can try using many different drive testing utilities available on the internet. The hard drive manufacturer usually has at least one qualified tool that you can download from their website and run. Other ways to check the health of your hard drive involves running the Windows Error Checking tool by right clicking on your hard drive in 'My Computer' then selecting 'Properties' and going to the 'Tool' and clicking on “Check Now”, or checking the SMART status located in your motherboard's BIOS. SMART stands for Self-Monitoring, Analysis and Reporting Technology. Most motherboards nowadays has this technology. It should be automatically enabled in your BIOS, if it's not then your hard drive won't get checked. What it does is on boot up it will perform quick tests on your hard drive to ensure it is running correctly and it will continue to monitor it for any errors or abnormal problems that may occur as long as the computer is turned on.

Monitor

Watching movies, videos, playing games, and looking at NSFW material are all amazing things we can do on our computers. Yet there may come a day where you just want to get on your computer and relax in your computer room looking at all that NSFW material you have bookmarked under the “Special Sites” category, but you can’t because your monitor won’t turn on. No, you don’t frump and punch holes in the walls to look for an outlet for your rage. You troubleshoot it, and hope to god that your monitor isn’t broken!

When diagnosing a screen problem, half the time it’s usually something very easy, like a cable coming loose, or the monitor getting unplugged accidentally; unfortunately the other half the time it’s probably a problem that’s related to your monitor being old, or a problem that’s related to your graphics card instead. So you may have to diagnose both items at the same time to see which solves your problem.

First, check all your cables, I know this is probably getting a little old with the checking connections and everything, but so many computer problems can be avoided if people just remember that their computer isn’t always going to stay the same way they left it. A foot could kick out a cable, a dog or a cat that got to curious, or almost anything can render half your hardware useless.

After checking all your cables, make sure your screen has power, if it has power and shows a message such as “This monitor is working correctly please check your cable” and shows bars of color on the screen, that means that your monitor is not getting a signal from your computer. Try swapping out the monitor for another one to see if it still says that message. If it does then that means the problem is most likely something to do with your graphics card not seated in the motherboard, or just isn’t working properly, you may want to try swapping out another graphics card to see if that solves your problem.

Generally monitors don’t have that many diagnosable problems. Either they work and they work well, or they don’t work and you have to replace them. When working on a monitor you should never open them, they aren’t meant to be serviced and contain high charged capacitors that hold lethal doses of electricity. We wouldn’t want to read about a computer guy in the obituaries now would we?

Graphics Card

The glorious graphics card, it’s an amazing thing really. It makes all those pretty HDR (High Dynamic Range) pictures look just that good, it keeps your games running smoothly, and your videos in HD. Yet these things can be pains when they’re just not working right, because if something is wrong there’s not a strict hardware or software solution, you have to analyze the current situation to see what’s up.

First and foremost if you’re having any problems with your graphics card, probably the best thing to try to do first is see if there an updated driver for it at the manufacturer’s website that may solve the problem, or if there isn’t an update try uninstalling your graphics drivers and reinstalling them this little action can solve so many problems.

If there’s little jaggies or weird colorful mishaps known as artifacts appearing on your screen you may want to check the temperature of your graphics and make sure is getting enough cooling, and that the fan is working properly. If the cooling checks out okay you may also want to check your power supply ratings to see if it is giving enough juice to your graphics card. Nowadays most graphics cards need a lot of power on the 12v rails, make sure your power supply can give you that power that the graphics card needs.

Sound Card

Some of the typical problems people have with sound cards is either A) no sound or B) no sound. Sounds card typically aren't very expensive so having to replace one if the current one isn't working is no big deal. However, if you're one of those audiophile types who expect 100% original recording quality with your $300 sound card replacing one of those is as expected a lot more harder to do.

Sound Card Troubleshooting

Check speaker cables make sure they're all connected and plugged into the right spot on your sound card. Also check the speaker's power cables.

Make sure windows volume is turned up and the volume is not muted, also make sure that you have all the wave and playback volume turned up and not muted. If you have 'Digital Output Only' checked in your Advanced Controls for Playback Controls, try unchecking it to see if that solves your non-sound problem. I found that if I have that checked my sound card won't give me any sound.

Try reinstalling your sound card drivers, also try checking on the internet at the manufacturer's website for any updated drivers that may be available. They increase your sound card's compatibility with your system.

If the previous tips didn't help, then you may just have to replace your sound card, or atleast swap it out for another one to see if it might be a problem related to your sound card's connection to the motherboard instead.

Processor

The processor is the actual thinking part of the brain of the computer. It does all the calculations needed to make a computer run, and does them all in split second timing. It determines how fast your computer generally runs, and most of the time is a bottle neck for systems that have had everything upgraded except the CPU.

If your processor’s not working, it’s not the end of the world, generally most processors that work correctly for a few weeks, should work correctly for the rest of it’s lifespan, which varies from 5-10 years or so. As long as you’re not overclocking the processor or letting it overheat too badly your processor should be fine, and it could just be a BIOS setting that’s messed up, or a jumper setting, but for kicks just check to make the processor is seated properly and the heat sink is attached to the processor and the motherboard. The heat sink should be attached tightly to the motherboard and not have room to move about, you should be able to pick up your motherboard by grabbing onto the heat sink without any problems. Check in your motherboard manual to make sure all the jumpers are set correctly for your type of processor. Any jumpers set incorrectly can cause the processor to not work, or function correctly or at it’s optimal speed. Also check the heat sink to see if it is cooling off the processor, if it’s not doing a very good job you may want to look into investing in a better one that gets the job done.

Internet Download Manager v5.15

Internet Download Manager (IDM) is a tool to increase download speeds by up to 5 times, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use.Internet Download Manager has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download managers and accelerators Internet Download Manager segments downloaded files dynamically during download process and reuses available connections without additional connect and login stages to achieve best acceleration performance.

Internet Download Manager supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all other popular browsers to automatically handle your downloads. You can also drag and drop files, or use Internet Download Manager from command line. Internet Download Manager can dial your modem at the set time, download the files you want, then hang up or even shut down your computer when it's done.

Other features include multilingual support, zip preview, download categories, scheduler pro, sounds on different events, HTTPS support, queue processor, html help and tutorial, enhanced virus protection on download completion, progressive downloading with quotas (useful for connections that use some kind of fair access policy or FAP like Direcway, Direct PC, Hughes, etc.), built-in download accelerator, and many others.

Version 5.15 adds IDM download panel for web-players that can be used to download flash videos from sites like YouTube, MySpaceTV, and Google Videos. It also features complete Vista support, YouTube grabber, redeveloped scheduler, and MMS protocol support. The new version also adds improved integration for IE and IE based browsers, redesigned and enhanced download engine, the unique advanced integration into all latest browsers, improved toolbar, and a wealth of other improvements and new features.