Tuesday, 31 December 2013

Internet Download Manager 6.18 build 7 Latest Full with Patch

Internet Download Manager (IDM) 6.18 Buid 7 is a tool to increase download speeds by up to 5 times, resume and schedule downloads

Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use.
Internet Download Manager has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads.


https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-H00KMxGBHLfMvdnLLDpTIhrRiL40-1ojckNbaUwEAOIxyxYYWY9vZMiyHb1rR8L1Rs0WEuQAaK-NjXZ9J9DBDsg7pn2EhlhDp4VT-1pLjATLpaixvBAcFaVQNEBoLKBy96O6cZ_sX4Y/s400/internet-download-manager-60514.gif
Internet Download Manager supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all other popular browsers to automatically handle your downloads.

Add Google SMS Channel Link as Gadget in Blogger

Alert your friends and fellows in real time on information that they care about through SMS. It is very useful for everyone if you know how to Add/Start Google SMS Channel Link/Gadget in Blogger. I have said for Bloggers this is very helpful because it might be help you and your readers to get synchronous.


Add Google SMS Channel

Using Google SMS Channel, As a subscriber you can subscribe to channels and you also can create your own channels and invite others to join. You might have seen SMS Channel of Best How To Blogger, you will find that in right sidebar as SMS Symbol.
Before subscribing to or creating an SMS Channel, you need to verify your mobile number.

This article is specially for my online friend Manohar, who want to know how to add Google SMS channel link as a Widget in Blogger. Below here is a exact question asked by manohar :
how can i add my google sms channel link as a gadget to my blog.

Google SMS Channel

Useful Links for Google SMS Channel Creation and FAQ :


Steps to Google SMS Channel Widget in Blogger

#Step 1. Log in to your Blogger Dashboard and Navigate to Design > Page Element.

#Step 2. Add below code in HTML/JavaScript widget:
<a href="http://labs.google.co.in/smschannels/subscribe/BestHowToBlogger"><img border="0" src="http://1.bp.blogspot.com/_1fqu8LzmPN8/S_yGe4oHUII/AAAAAAAAFbc/dONGxdHQ_MQ/s1600/Subscibe+to+SMS.jpg" alt="Subscribe via Google SMS Channel"></a>Change above Red color text with your Google SMS Channel code.

#Step 3. Save Widget and done!.

So benefit of using google sms channel is, you may use the Google SMS service to get news alerts and weather information on your phone.

You don’t really need a mobile phone to send an SMS to your group as there’s an option in Google SMS channels that lets you can compose and send SMS messages via the web itself. It supports English, Hindi, Telugu, Tamil, Malayalam and Kannada.

Start Earning Revenue From Your Website Traffic or Advertising at Very Good Revenue like Google Adsense

Start Earning Revenue From Your Website Traffic or Advertising at Very Good Revenue like Google Adsense
Start Earning Revenue From Your Website Traffic
  • Chitika Publishers

    Publisher Program Overview

     

    Chitika is the only ad-network which knows when not to show an ad, helping to preserve your user experience.
  • Can I use Chitika Ads with Google AdSense?

    Yes. You can use Chitika Ads with AdSense because Chitika Ads are non-contextual and do not look like AdSense units.
  • How do I get paid?

    Chitika charges advertisers to be featured alongside your site's content. At the end of every month you are paid based on the previous month's earnings (Net 30). Payments are sent after your account earns at least $10.00 (USD) for PayPal payouts or $50.00 (USD) for checks.

Advertiser Program Overview

Chitika is an online advertising network that allows advertisers to serve ads directly to user intent, via our high-quality network of publishers and our innovative search targeted, mobile, and local ads. We bring the power and effectiveness of search targeted ads and place them on a huge, diverse network of publishers. Take your search ads to a whole new level by serving them across the Chitika ad network.
  • Local Ads

    Local

  • Mobile

  • Search Targeted Ads

    Search Targeted

Serve Your Ads To Users' Search Intent

  • How is Chitika different?

    Chitika is an ad network that allows advertisers to serve their ads to search traffic on publishers' websites.
  • What kinds of ads does Chitika offer?

    Chitika offers three major ad products: Search Targeted, Mobile, and Local.
  • What are the requirements to advertise?

    Currently, to be an advertiser on the Chitika ad network, you must be willing to commit to a $50,000 monthly advertising spend. This includes Chitika mobile ads.

JCreator 5 latest Full with Patch by Salman and Usman

JCreator is the development tool for every programmer that likes todo what he does best: programming.
It is faster, more efficient and
more reliable than other Java IDE's.
Therefore it is the perfect tool for
programmers of every level,
from learning
programmer to Java- specialist.
 JCreator provides the
user with a wide range of functionality
such as :Project
management,
project templates,code-
completion,
debugger interface,
editor with syntax
highlighting, wizards and a
fully customizable
user interface With JCreator you can
directly compile or run your Java
program without activating the
main document first. JCreator will
automatically find the file
with the main method or the html file holding the java applet, then it will 
start the appropriate tool.
And much more you can do with it(open "jcreator.com" for more info)
Download its Latest Full Version from Here,no need to Buy

Internet Download Manager 6.15 Build 1 Full Download

Internet Download Manager is a powerful file transfer manager that promises to accelerate downloads by up to 5 times. In addition, the application can also restart interrupted downloads and integrate into a large number of browsers, including Internet Explorer, Firefox, Google Chrome and Opera.

Internet Download Manager's interface is clean and well-organized, with large, stylish buttons that facilitate the management of the files in process. It is a great organizer too, as every single download can be moved into a different folder, depending on its type. Plus, it has a rich settings menu where you can change the way the program handles certain file formats or the default download locations.

We tried the quick update function too, which worked like a breeze and basically updated the application with just a single click. It all came down to choosing whether to update or not, and the whole job was done by the integrated updater that automatically downloaded the new files and installed them on the computer.

The application encases all the features specific to a decent download manager, including drag and drop support, a task scheduler, virus protection, queue processor, HTTPS support, progressive downloading with quotas, command line parameters, sounds, ZIP preview and proxy servers.

Microsoft Mathematics 4.0.1108.0 full for x86(32bit),x64(64bit)

Microsoft Mathematics is a software designed to help you learn equations in a user-friendly environment.
The interface of the program isclean and intuitive. In the"Worksheet" area you can typean expression on the lower part of the screen and press the "Enter" button.
Results are instantly displayed above this area.
Screenshots here:
For each equation you can edit the entry or view keyboard equivalents.
Furthermore, you can plot an equation or function in the"Graphing" tab (2D or 3D, Cartesian or Polar), as well as insert a data set, parametric functions and inequalities.
On the left side of the screen, you can use the calculator pad to input shortcuts for complex numbers, calculus (e.g. partial derivatives, indefinite integrals), statistics (e.g. geometric means, permutations), trigonometry, linear algebra (e.g. matrix insertions, transpositions) and standard elements (e.g. expand, slope, pi). Also, you can create a "favorite buttons" group.
In addition, you can use the"Undo" and "Redo" buttons, aswell as initiate a triangle solver, equation solver, unit converter, formulas and equations (e.g. geometry, physics, chemistry, laws of exponents, logarithm properties, constants).
Plus, you can save data in the Microsoft Mathematics format, change the interface skin and color scheme, disable the calculator pad, view stored variables, zoom, and much much more.
Download x86:http://download.microsoft.com/download/F/7/6/F76E0187-07B5-4958-B3FF-2E5ACD53B637/MSetup_x86.exe
Download x64:http://download.microsoft.com/download/F/7/6/F76E0187-07B5-4958-B3FF-2E5ACD53B637/MSetup_x64.exe

BitDefender Total Security 2013 (x32/x64) Lifetime Activator





BitDefender Total Security 2013 + Lifetime Activator | 558.999 MB
BitDefender Total Security provides comprehensive proactive protection against all Internet security threats, along with system maintenance and backup, without
slowing down your PCs. It combines state of the art protection against viruses, spyware, hackers, spam and other Internet security threats. BitDefender Total Security
features Antivirus, Firewall, Antispyware, Privacy Control, Parental Control, TuneUp (registry cleaner, PC cleaner, file shredder, disk defragmenter), BackUp Manager
for corporate and home users. Bitdefender Total Security 2013 offers ultimate silent security for the net-centric lifestyle, fighting every category of e-threats with
best-of-breed technologies. Bitdefender capitalizes on live and virtualized behavior-based detection, in addition to cloud-based services, to stop emerging e-threats
that other products miss. The Autopilot provides a hassle-free experience by making optimal security-related decisions without input from you. This means no pop-ups,
no alerts, nothing to configure.
Key-Features:
• Blocks viruses, spyware & spam
• Halts ID theft attempts
• Filters the links you receive from your Facebook and Twitter friends
• Keeps kids safe with cutting-edge parental controls
• Online backup
• Tunes up your PC for optimal speed & performance
bitdefender-antivirus-plus-2013-free-download-full-version-with-key.jpg
FEATURES:
Unparalleled Security. Bitdefender capitalizes on live and virtualized behavior-based detection, in addition to cloud-based services, to stop emerging e-threats that
other products miss.
• Active Virus Control – Monitors processes behavior while they are running to detect new & unknown viruses
• Rescue mode – Reboots your computer in a trusted environment, which is used for cleanup and restoration
• Virtualized Browser – Isolates the browser from the operating system in a Bitdefender-provided environment to block web-based threats
• Vulnerability Scanner – Checks for missing or outdated security software as well as potentially unsafe system settings
• Antispam – Stops unwanted e-mail from reaching your Inbox
• Two-way Firewall – Monitors your Internet connections and keeps strangers from accessing your Wi-Fi connection
• Parental Control – Blocks inappropriate content, restricts Web access between certain hours, and helps parents remotely monitor their children’s online activity
Absolute Silence. Bitdefender̢۪s Autopilot makes all the security-related decisions for you!
• Autopilot – Provides a hassle-free experience by making optimal security-related decisions without input from you
Worry-free Socializing. Protect yourself, and your friends, from e-threats that attempt to exploit the trust you’ve built with them.
• Search Advisor – Gives advance warning of risky websites right in your Google and Bing search results
Full Speed. Bitdefender 2012 takes “scheduled scanning” to a whole new level, as the scanning only takes place when your system is idle.
• Scan Dispatcher – Triggers system scans when resource usage falls below a certain threshold to avoid any impact on your system’s performance
• Tune-Up – Removes unnecessary files and registry entries, for optimized performance
Total Privacy. Bitdefender protects your privacy and personal data with a range of specialized modules and functions.
• Personal Data Filter – Prevents critical data, such as your social security number, from ever leaving your computer
• Antiphising – Blocks websites supporting various scams or credit card phishing attempts
• Chat Encryption – Keeps your conversations private on Yahoo! and MSN Messenger
• File Encryption – Locks up confidential files in an encrypted vault
Secure Backup. Bitdefender Total Security comes with 2 GB of free, secure online space to backup your critical files.
• Safebox – Automatically backs up files and folders to a secure remote server and allows file sync between your computers
What’s new in this version: Version 2013:
Bitdefender SafePay – for iron-clad security when shopping and banking
Windows 8 Compatible
Device Anti-Theft – Remotely locate, lock or wipe any internet connected device
USB Immunizer – protection for flash drives against e-threats
Security Widget
================
[INSTALL NOTES]
================
Step 1: Please use 7Zip to EXTRACT FILES.
**********************************************************************
My Antivirus reported Activator (FIX) as virus !!!
Its a false positive, as activator will make changes in the core of the application, it will be reported as a virus. Please use activator only if you understand the
risk…
The same Activator (FIX) can be used to activate BitDefender 2012 Products ?
Yes, The same activator can be used to activate any BitDefender 2012 or 2013 products
Can I automatically update BitDefender 2013 after Activating using this LifeTime Activator ?
Yes, you can update… Tested (for Sure / 100%)
Can I undo Activation ?
Yes, you can…
Where is LifeTime Activator
its in the folder FIX and the file name is “LBA_2.0BETA5.rar”
What is the Password to unrar “LBA_2.0BETA5.rar”
Password is : code3h

Click Here To Download


Best Full Quran e Pak with Translation For Java,Symbian,HTC and Windows Phones

It is a free software with the following features:

1. Quran in Arabic

2. Urdu translations of Quran by:
a. Maulana Fateh Muhammad Jalandhry.
b. Ahmed Ali Lahori.

3. English translation of Quran by Yousuf Ali.

4. Inbuilt fonts.


Download Quran With Translation

Download Only Quran Full Arabic

How to Block an Email Address on Yahoo!

Sometimes advertising companies can get your email and send you annoying very frequent messages. Or, sometimes do you just want to block email from someone that got your address? Whatever you reason this article is sure to help you block an email address from sending you messages.
Tips and Warnings
  1. 1
    Sign in to your Yahoo! Account.
    Sign in to your Yahoo! Account. Type in your Yahoo! ID and password.
  2. 2
    Click on Mail.
    Click on Mail. Click on your mailbox which reads Mail.
  3. 3
    Click Yahoo! Options and select Mail Options.
    Click Yahoo! Options and select Mail Options. This is found in the right hand corner.
  4. 4
    Find Blocked Addresses.
    Find Blocked Addresses. Type in the email address of the person(S) you would like to block. You can block up to 500 email addresses on one account.

Launch Multiple Skype Accounts Simultaneously On Your Computer

Skype is preferred Messenger for communication.Ever since its launch it has been adoptedfor both personal and professional use.It was acquired by Microsoft and has nearly 1263 million registered users as of September 2013 and the network is growing larger dayby day.Skype is not limited to just instant messaging but it can be used for making voice calls to landlines and mobiles at nominal charges.
Download Multi Skype launcher from here

or from Below


Multi Skype LauncherRun multiple Skype accounts 
on one computer

It has never been that easy

Download Now

Monday, 30 December 2013

Windows Defender Released!


Including an image of the Magnum XL-200 Roller Coaster from Cedar Point is certainly a departure from the usual "garden" theme of this blog. However, just as the Magnum was the first roller coaster to break the 200 foot height limit and became known as the first hypercoaster, so it seems to me is Windows Defender breaking limits and defining a new category of protection for your computer.
From
Windows® Defender
Specific features of Windows Defender include:
  • Improved detection and removal – Based on a new engine, Windows Defender is able to detect and remove more threats posed by spyware and other potentially unwanted software. Real Time Protection has also been enhanced to better monitor key points in the operating system for changes.

  • Protection for all users – Windows Defender can be run by all users on a computer with or without administrative privileges. This ensures that all users on a computer are protected by Windows Defender.

  • Support for 64-bit platforms, accessibility and localization - Windows Defender supports accessibility and 64-bit platforms. Microsoft will release localized versions including German and Japanese soon after the availability of the English versions. Please be sure to use WindowsDefenderX64.msi for 64-bit platforms.

  • Delta definition updates - Windows Defender now downloads smaller delta definition updates when possible which reduces the time required to download and install definition updates. Customers can expect shorter download times when updating their definition updates.

  • Free Limited Support - As a part of our commitment to the security of our customers, free support for installation, configuration, definition update, detection and removal errors will be available for a limited time after download and installation. Please refer to the Windows Defender support policy for more information.

  • WGA enforcement - There are significant risks to running non-genuine Windows. Only genuine Windows customers can receive product downloads, Windows updates and special offers. Windows Defender will validate that your copy of Windows is genuine before installation. Furthermore, Windows Defender will only remove Severe threats for machines that are not genuine. Low, Medium and High threats will be detected, but not removed unless your copy of Windows is genuine. For more information, please visit http://www.microsoft.com/genuine

A redesigned and simplified user interface – Incorporating feedback from our customers, the Windows Defender UI has been redesigned to make common tasks easier to accomplish with a warning system that adapts alert levels according to the severity of a threat so that it is less intrusive overall, but still ensures the user does not miss the most urgent alerts.

Important Notes
  • Windows Defender no longer supports Windows 2000 as it will be out of mainstream support in October 2006. Please refer to the support lifecycle website for more information.
If you haven't downloaded Windows Defender yet because it was still beta software, I encourage you to do so now that it has finally been released in final. You will be pleased at the frequency of definition file updates.

Microsoft Security Advisory (927709)


Microsoft has issued a Security Advisory with regard to a vulnerability in Visual Studio 2005 which could allow remote code execution. In addition to the standard recommendation to keep anti-virus software up to date, note that this vulnerability is yet another reason to upgrade to IE7. The reason is that, by default, this ActiveX control is not a default setting in the ActiveX controls for IE7. Thus, only those who have approved this control via the ActiveX "Opt-in" feature are at risk.
"Microsoft is investigating public reports of a vulnerability in an ActiveX control in Visual Studio 2005 on Windows. We are aware of proof of concept code published publicly and of the possibility of limited attacks that are attempting to use the reported vulnerability.
Customers who are running Visual Studio 2005 on Windows Server 2003 and Windows Server 2003 Service Pack 1 in their default configurations, with the Enhanced Security Configuration turned on, are not affected. Visual Studio 2005 customers who are running Internet Explorer 7 with default settings, are not at risk until this control has been activated through the ActiveX Opt-in Feature in the Internet Zone. Customers would need to visit an attacker’s Web site to be at risk. We will continue to investigate these public reports.
The ActiveX control is the WMI Object Broker control, which is included in WmiScriptUtils.dll.
Upon completion of this investigation, Microsoft will take the appropriate action to help protect our customers. A security update will be released through our monthly release process or an out-of-cycle security update will be provided, depending on customer needs."

Firefox and Thunderbird 1.5.0.8 Released


Yes, I realize that Mozilla previously released the updated version 2.0 of Firefox. However, many Firefox users are waiting until the "kinks" get worked out or until their favorite extension is compatible. If you have not updated to 2.0, be sure to get this important update to both Firefox and Thunderbird. From the report at ISC.SANS.org:

"The Mozilla Foundation released version 1.5.0.8 of both their popular Firefox web browser and Thunderbird email clients today. These versions address some security issues covered in MFSA2006-65, MFSA2006-66 and MFSA2006-67.

If you have not already upgraded to the new Firefox 2.0 web browser, you should be sure to update to Firefox 1.5.0.8."
By default, Firefox automatically checks for updates. If you have checked the option for Firefox to "Ask me what I want to do", be sure to allow the update.

Note that Firefox 2.0 release is not affected by the flaws corrected in 1.5.0.8. If you use Thunderbird, it is important to get that update as well. Thunderbird shares the browser engine with Firefox and could be vulnerable if JavaScript were to be enabled in mail.

Windows Vista Released to Manufacturing


Applause for the Microsoft Vista Team! Vista has been released to manufacturing (RTM). RTM is the term frequently used for this stage. Microsoft's Nick White explains more about RTM in "Windows Vista releases to manufacturing".

It has been a long haul, but I can almost hear the huge sigh of relief across the country from Redmond. As Jim Allchin said, "Its Time!" Now that I've mentioned Jim Allchin, there is another time coming. You may recall that he will be retiring from Microsoft the end of January, 2007 when Vista is released to the public and the end of the Jim Allchin era. Be sure to take the time to visit Mary Jo Foley's "All About Microsoft" blog "Vista RTM marks the end of an era" where she interviews Mr. Allchin. For another interview of Jim Allchin, see "Robert McLaws: Windows Vista Edition", Blogcast Show #1 - Jim Allchin Interview"

Back to Vista. Although the Vista Team needs to take some time to sit back and reap the praise, the work isn't done for them. As Nick White indicated in the above-referenced posting:
"But before we get there, we’ve got some really, REALLY great things to come, much of which will be disclosed or discussed on this blog -- so keep your eyes peeled!"
Read about some of the recent accomplishments as posted by the Windows Vista Team:
All of the positive information isn't coming just from the Microsoft Team. I checked to see what Ed Bott had to say in "Will Windows Vista be worth the wait?" and found this great list of Vista-only features:
  • A radically revamped Windows Explorer with integrated Desktop Search capabilities
  • A completely rewritten networking stack that supports IPv6
  • A two-way firewall that increases protection for many existing Windows services
  • New audio, display, and power management architectures
  • User Account Control, IE7 Protected Mode, and Bitlocker Drive Encryption
  • Windows Photo Gallery, with industry-standard support for saving metadata in image files
  • Excellent backup tools, including the ability to recover previous versions of a file
  • SuperFetch, ReadyBoost, and other performance-enhancing innovations
  • Tablet PC support
  • A slick and stable upgrade to Windows Media Center
I tend to agree with Ed's prediction that there will be some irresistible upgrade offers. To help you adjust when you do upgrade, see Ed's "10 tips and tweaks for Vista experts".

Advance Notice - Microsoft Update November 14, 2006



As currently scheduled, there will be six updates on November 14, 2006. Five are directed to Microsoft Windows and one to Microsoft XML Core Services. The update to XML Core services has been identified as critical, with the most severe being critical for the Windows updates.

It is important to note that
Microsoft Software Update Services (SUS) is slated for retirement on 6 December 2006. The update next week will be the supported by SUS. For more information on WSUS, please see the link at the bottom of the notice copied below.
The following suggestions on what you can do before “Patch Tuesday” are from Calendar of Updates:
  • Undo any 3rd party work-around or any work-around that you did on affected system or components in Windows that is going to be patched
  • Create a backup of your good system (see also: System Back-up) and/or ensure that System Restore service is enabled, actually running, working and not corrupted or in the good state. Note: System Restore is available in Windows Millennium (Me) and the Windows XP (Home and Professional) Operating Systems.

To check whether System Restore is enabled and actually running:
  • Type services.msc
  • Click OK button
  • Locate System Restore Service in the list of services and verify that the status is “Started”.
Note: You may also access the Services Console by going to Control Panel>Performance and Maintenance>Administrative Tools>Services.
Microsoft Technet has complete details of today's Microsoft Security Bulletin Advance Notification.
that Microsoft is planning to release on 14 November 2006.



=================================================
Security Updates
=================================================

• One Microsoft Security Bulletin affecting Microsoft XML Core Services. The highest Maximum Severity rating for this is Critical. This update will be detectable using the Microsoft Baseline Security Analyzer. This update will require a restart.

• Five Microsoft Security Bulletins affecting Microsoft Windows. The highest Maximum Severity rating for these is Critical. These updates will be detectable using the Microsoft Baseline Security Analyzer and the Enterprise Scan Tool. Some of these updates will require a restart.

=================================================
Microsoft Windows Malicious Software Removal Tool
=================================================

• Microsoft will release an updated version of the Microsoft Windows Malicious Software Removal Tool on Windows Update, Microsoft Update, Windows Server Update Services and the Download Center.

Note that this tool will NOT be distributed using Software Update Services (SUS).

=================================================
Non-security High Priority updates on MU, WU, WSUS and SUS
=================================================

• Microsoft will release No NON-SECURITY High-Priority Updates for Windows on Windows Update (WU) and Software Update Services (SUS).

• Microsoft will release two NON-SECURITY High-Priority Updates on Microsoft Update (MU) and Windows Server Update Services (WSUS).

NOTE: Microsoft Software Update Services (SUS) is slated for retirement on 6 December 2006. The November 2006 Monthly Bulletin release is the last Monthly Bulletin release that will be supported by SUS. SUS customers are urged to complete their upgrades to Windows Server Update Services 2.0 (WSUS) before the December 2006 Monthly Bulletin release on 12 December 2006. For more information on WSUS, please see http://www.microsoft.com/windowsserversystem/updateservices/default.mspx.

Microsoft Security Tools

Whether you are a home computer user or an IT Professional, Microsoft has put together a large set of tools and information to help keep your computer or network secure. The latest for the home computer user is is the newly published "Safety and Security Online" magazine. Download the "Microsoft Consumer Magazine.pdf" and open with Adobe Acrobat. In the first issue you can . . .
• Read the story of a real victim of cybercrime,
• Test your knowledge of computer jargon with our short quiz, and
• Print online safety information cards to keep this important information at your fingertips.
A favorite tool of both IT Professionals and home users has just gotten better. When Mark Russinovich joined Microsoft, there was a mad rush to the Winternals site to download the tools everyone had grown to appreciate. Yesterday, Microsoft introduced Process Monitor v1.01:

"Process Monitor is an advanced monitoring tool for Windows that shows real-time file system, Registry and process/thread activity. It combines the features of two legacy Sysinternals utilities, Filemon and Regmon, and adds an extensive list of enhancements including rich and non-destructive filtering, comprehensive event properties such session IDs and user names, reliable process information, full thread stacks with integrated symbol support for each operation, simultaneous logging to a file, and much more. Its uniquely powerful features will make Process Monitor a core utility in your system troubleshooting and malware hunting toolkit.

Process Monitor runs on Windows 2000 SP4 with Update Rollup 1, Windows XP SP2, Windows Server 2003 SP1, and Windows Vista as well as x64 versions of Windows XP, Windows Server 2003 SP1 and Windows Vista."
Another tool that I hope will not be needed by many is Microsoft's Rootkit Revealer v1.7 which was updated earlier this month.
"RootkitRevealer is an advanced rootkit detection utility. It runs on Windows NT 4 and higher and its output lists Registry and file system API discrepancies that may indicate the presence of a user-mode or kernel-mode rootkit. RootkitRevealer successfully detects all persistent rootkits published at www.rootkit.com, including AFX, Vanquish and HackerDefender (note: RootkitRevealer is not intended to detect rootkits like Fu that don't attempt to hide their files or registry keys). If you use it to identify the presence of a rootkit please let us know!"
In he event you do discover or suspect a rootkit on your computer, keep the infected machine off the internet. If you do online banking, shopping or bill paying, contact your bank and credit companies. Change your passwords (do NOT change your passwords on the infected machine, rather use a neighbor, friend or family member's computer or a computer at the local public library). Seek help at a security forum or from a local computer repair shop.

IT Professionals will find specialized guides created by the Microsoft Solutions for Security and Compliance team as well as security guidance organized by topic, product, and technology at
Security Guidance.

Not to be forgotten, of course, is the
Technet Security Center with links to the following important Security Response information:
Bulletins and Advisories Update Tools
Newly released today for IT Professionals is the Windows Vista Security Guide.
"The Windows Vista Security Guide provides IT Professionals like you with specific recommendations and automated tools to further harden Windows Vista against real-world security threats."

DiggIt! Power to the People


I've written a couple of times about the sleaze who have added Marco Giuliani's name to their dirty Gromozon rootkit. Through "power to the people", help bring this to the public eye and DiggIt!

Background information:

PC al Sicuro
VitalsecurityAntirootkit Blog
SunbeltBLOG

Registration is needed to vote. Go to Digg.com to register and then DiggIt!
Security Vendor Hit by Spite Attack: Gromozon vs. Marco Giuliani.

Flashback - Gromozon vs. Marco Giuliani


Just a few days ago Marco Giuliani reported that the sleaze behind the Gromozon infection inserted code making it appear that this monstrosity was created by Marco. In an effort to educate the public about this farce, the security community banned together, blogging and posting about it. Someone posted the information on DiggIt! and even more people got involved.
I am very excited to see the update posted at PC al Sicuro this evening where Marco stated:
"Finally some good news. We succesfully obtained shutdown of one of the servers which are spreading Gromozon. Server, hosted in the U.S., was taken offline today and it’ll be taken under investigation.
We at Prevx will continue monitoring situation for new Gromozon variants, providing technical stuff. Now, finally, there’s who’ll manage legal stuff too.
Our thanks go to who helped us taking down the website."
This is just the first step in a long road ahead but the first step is often the most difficult. I am sure a tremendous effort was made behind the scenes to accomplish this.

To all those who have been blogging about this situation, a hearty thank you. Sandi Hardmeier, a Microsoft MVP since 1999 specializing in Internet Explorer, said it best in "
You know you're doing a good job when the bad guys bite back..."

"The more people know about Gromozon, and the more people promote and host Prevx's repair tool; the more people blog and say "look at what the idiots behind Gromozon are doing", and the more people spread the word about how to get Gromozon off systems and defeat the tricks Gromozon uses to try and thwart removal, and more the more the anti-malware community join together to fight those behind Gromozon, the harder it is going to be for the Gromozon guys to succeed."

So, we need to keep the pressure on the various governmental agencies to get to the "root" of Gromozon. The home computer user can help too. Make sure your computer has all the Microsoft security updates, firewall, and antivirus software. Explain to your family how important it is not to click on links in emails and, whatever you do, please Beware of Codecs!

Bridging the Gap: Microsoft Vista License


When Scot Finnie selected Ed Bott's Microsoft Report Blog, as "Link of the Month" in the November 2006 (Vol. 6, Issue No. 86) of Scot's Newsletter, he made a perfect choice. Here's part of what Scot wrote
"Ed's coverage of Windows Genuine Advantage, Vista's Software Protection Platform, Vista licensing, DRM in Vista, and many other controversial topics swirling around Windows Vista and Microsoft this year have been nothing short of first rate."
Although I chuckled when I read Scot's words, "The man can blog," that was the first thing I thought of when I saw Ed's "Vista Mythbusters #8: That license isn't so bad, after all". Not only does Ed disprove the Myth:
"The new end user license agreement (EULA) for Windows Vista is loaded with draconian restrictions, and you're not even allowed to troubleshoot bugs!"
he continues on to point out the Reality:
"For the most part, the Vista license agreement is clearer than its predecessors, and many of the so-called restrictions in it are based on misunderstandings."
Ed pointedly puts to rest many controversial issues surrounding the Vista License (End User License Agreement or EULA). For example, in countering Professor Seltzer's comments with regard to work-around relative to technical limitations, Ed wrote, in part:

"Read in this vein, it's clear that Vista's "technical limitations" include Home Basic's inability to use two physical CPUs, Home Premium's limit on three connections to Media Center extenders, and the maximum of 10 network connections for Ultimate edition. Trying to interpret this clause to prohibit problem-solving and troubleshooting stretches credibility to the point of paranoia."
The full series is definitely worth a read. In fact, if Ed's Blog isn't on your subscription list, you are missing out.

Microsoft Security Bulletin Summary for November, 2006


Once again it is "Patch Tuesday". If you do not have automatic updates set on your computer, go to Microsoft Windows Updates to get the updates, of which one is important and the other five are critical.
Additional information is available in the Microsoft Security Bulletin for November and in the Microsoft Security Response Center Blog.
Microsoft is releasing the following security bulletins for newly discovered vulnerabilities:
  • Important MS06-066 Microsoft Windows Remote Code Execution
    http://www.microsoft.com/technet/security/bulletin/MS06-066.mspx
  • Critical MS06-067 Microsoft Windows Remote Code Execution
    http://www.microsoft.com/technet/security/bulletin/MS06-067.mspx
  • Critical MS06-068 Microsoft Windows Remote Code Execution
    http://www.microsoft.com/technet/security/bulletin/MS06-068.mspx
  • Critical MS06-069 Microsoft Windows Remote Code Execution
    http://www.microsoft.com/technet/security/bulletin/MS06-069
  • Critical MS06-070 Microsoft Windows Remote Code Execution
    http://www.microsoft.com/technet/security/bulletin/MS06-070.mspx
  • Critical MS06-071 Microsoft Windows Remote Code Execution
    http://www.microsoft.com/technet/security/bulletin/MS06-071.mspx


Thursday, 26 December 2013

Windows Secrets & LangaList

First, a hearty congratulations on the merging of Brian Livingston's "Windows Secrets Newsletter" with Fred Langa's LangaList. Both have enjoyed a large readership over the years. The combined newsletter is going to 275,755 recipients with countless others reading it online!

Now, regarding the portion of the "Free antivirus, a new firewall, and IP sniffing" by Fred Langa relating to "Ad-Aware's new firewall gets a good buzz", a bit of full disclosure is needed. The firewall offered by Lavasoft was introduced in November, 2005. The Lavasoft Firewall is a "trimmed down", rebranded Outpost firewall.

Having IE7 Problems at Some Websites?


Even though IE7 was available in beta for webmasters to test compatibility with their website, many have either not attempted changes or attempted updates for IE7 compatibility. As a result, there are websites that will not render correctly when accessed with IE7.
In order to solve that problem, Microsoft released the "User Agent String Utility" not long ago and recently updated it to Version 2. With User Agent String Utility, Version 2, an Internet Explorer 7.0 window will be opened that is configured to report its identity to websites as being Internet Explorer 6.0, thus allowing the full security measures afforded by IE7, yet the ability to access sites that have yet to be updated.
User Agent String Utility, Version 2 is available from the Microsoft Download Center. Note that Windows Genuine Advantage validation is required to download the User Agent String Utility.
Supported operating systems include Windows Server 2003; Windows Server 2003 Service Pack 1; Windows Vista; Windows XP; Windows XP 64-bit; Windows XP Service Pack 1; Windows XP Service Pack 2.

Microsoft Security Advisory (928604)


Have YOU installed all of the latest Microsoft Updates? If not, be sure to visit the Microsoft Update sooner rather than later.

Microsoft has issued Security Advisory 928604 which relates to a remote code execution vulnerability existing in the Workstation service on unpatched systems. This vulnerability could allow an attacker to take complete control of the system if they successfully exploited the vulnerability.

If MS06-70 was installed with the updates issued by Microsoft on November 14, 2006, your computer is protected from this vulnerability. In the event that you are having any difficulties with this or any other Microsoft update, please seek assistance from Microsoft Support.

If you are in the U.S. or Canada get technical support from Microsoft Product Support Services at 1-866-PCSAFETY. There is no charge for support calls that are associated with security updates. International customers need to contact local Microsoft subsidiaries. There is no charge for support that is associated with security updates. For more information about how to contact Microsoft for support issues, visit the International Support Web site.

Microsoft | Linux | Patent Infringement


Whew! What a controversey.

Mary Jo Foley is saying in If Linux violates Microsoft's patents, let's see the proof:
"If there is offending code, I think Microsoft should show it and prove it. Why not set up a Web site with a few code snippets that show how Linux violates Windows patents — if such snippets really exist?"
From Adrian Kingsley-Hughes comes, Ballmer: Linux "Infringes our intellectual property" where he is
"Reading between the lines here, Ballmer is saying that all other Linux users out there are stealing from Microsoft and its shareholders."
Of course these articles are certainly resulting in heated reaction from their readers. Let's look at what Steve Ballmer is quoted as saying in "Todd Bishop's Microsoft Blog" article Ballmer on Novell, Linux and patents:
"What we were able to craft, with a lot of hard work with Novell, was an agreement essentially where we would do the technical work in a variety of different areas to improve interoperability between the two environments. And we agreed on a, we call it an IP bridge, essentially an arrangement under which they pay us some money for the right to tell the customer that anybody who uses Suse Linux is appropriately covered. There will be no patent issues. They've appropriately compensated Microsoft for our intellectual property, which is important to us. In a sense you could say anybody who has got Linux in their data center today sort of has an undisclosed balance sheet liability, because it's not just Microsoft patents. Because of the way open-source works, there's nobody who's been able to do patent coverage or patent indemnification behind that.
In reference to Novell, Ballmer's saying that "we agreed on . . . an arrangement under which they pay us some money for the right to tell the customer that anybody who uses Suse Linux is appropriately covered" certainly provides the implication that Microsoft's patent license attorneys negotiated an agreement with Novell wherein Novell agreed to pay a license fee for continued use of Microsoft's patented technology.
This is the way it works in the patent world. When a company believes that another is infringing their valid patent rights, they generally first contact the other company, referencing the patent(s) and claims that they believe are being infringed. The attorneys for the other company then conduct their own analysis of the patents and advise their management of their evaluation.
Sometimes these cases go to litigation before the courts. Other times the companies come to an agreement. Such agreements may be a patent license exchange where they give each other rights to make, use or sell products under each other's patents. The agreement may be that the other company will pay the patent holder an agreed upon amount of money for each item manufactured under the subject patent(s). There are also paid-up licenses, non-exclusive licenses. It is complex, which is why good patent attorneys are highly sought.

Not knowing the facts -- and that is something that would likely be business confidential between Microsoft and Novell -- it certainly appears that in the instant situation, a license has been granted to Novell under certain specified Microsoft patents for the fee paid by Novell to Microsoft.
When Steve Ballmer said that "There will be no patent issues", this further implies that there will be no issues in that case due to the negotiated terms of the license agreement between Microsoft and Novell.
In a quick assignee search in the USPTO from 1976 to date, there are 5802 issued patents assigned to Microsoft. Some are design patents, others are apparatus or method patents. When you consider PCT, EP and other national filings, there is no question that Microsoft has a massive patent portfolio. Having worked with people in the patent field in one way or another for many, many years, I assure you that this is no simple process. It is also, as pointed out by Steve Ballmer, a very costly process, not only to obtain each patent, but to maintain the patents through their life cycle. Microsoft has the right to assert their patent rights.
Something that many people are misunderstanding is that Microsoft is not claiming patent rights of "open source", but rather the patent rights to certain aspects of the technology -- rights under Microsoft patents that Novell has paid Microsoft for the privilege of using.