My new site will launch in

13 February 2014

11 January 2010

Pen drive data recovery software



Quick, safe and fully automated Pen Drive Data Recovery Software undeletes crucial lost deleted files and folders from inaccessible, damaged or corrupted flash disk Pen drives storage media. USB data retrieval tool is developed by experienced professionals to provide best USB files recovery at lowest cost and in shortest time. All the data including images, audios, videos, songs, movie, text documents etc of all major formats like aac, midi, mp3, mpa, avi, mov, mp4, wmv, pct, pdf, ps, tif, gif and many more can be easily retrieved and rescued from partitioned, formatted, corrupted USB disk drives. Flash memory data retrieval utility support all major pen drives like USB drive, Memory stick, Data traveler, Thumb drives, Zip drives etc and provide easiest and best USB data recovery.




06 January 2010

Adobe Photoshop CS4 Extented


With Photoshop CS4 and Photoshop CS4 Extended, you get: Unrivaled editing power. New Adjustments and Masks panels slash the time it takes you to make nondestructive color and tone adjustments, and to create and re-edit feathered, density-controlled pixel and vector masks. With on-image controls and presets, there's less time mousing between settings. Fine modifications are faster and easier with additions like the new Vibrance adjustment layer and enhanced Color Range mask creation. And Content-Aware Scaling is the revolutionary new feature that automatically recomposes an image as you resize it, smartly preserving vital areas as it adapts to the new dimensions. Work more efficiently and naturally with fluid, natural canvas rotation, enhanced pan and zoom tools, and effortless large-image navigation. Vastly improved Dodge, Burn, and Sponge tools let you intelligently and accurately adjust the exposure and color of image areas using simple brush strokes. Photoshop CS4 tools combine increased power and finer control with easier, more naturally controlled effects to boost productivity, no matter how you work with digital images. Breakthrough 3D, motion graphics, and image analysis capabilities. In Photoshop CS4 Extended, you can now work with 3D objects and video frames as easily as with any traditional image. Paint directly on 3D objects. Combine 2D layers and video files into 3D layers. Easily convert any image into a 3D object or volume. And do it all with a brand new 3D engine that provides dramatic performance and capability improvements. In motion graphics, single key shortcuts let you move through and edit video layers faster and more precisely than before, and new controls enable you to preview and export audio tracks as well. Image analysis improvements include multiple counts with the Count tool and volume rendering of DICOM files. See what's possible, with Adobe Photoshop CS4 and Photoshop CS4 Extended.

Download

29 December 2009

ThreatFire AntiVirus 4.7 Free


Traditional antivirus solutions cannot protect you until after they have discovered a new threat and produced a signature to counter it. ThreatFire does not rely on signatures, but instead provides behavior-based protection. It is designed to be used alongside your existing antivirus software and it fills the gap in protection between your antivirus signature updates. ThreatFire protects you against major security threats including viruses, worms, trojans, rootkits and even some spyware. Its advanced ActiveDefense technology intelligently analyzes the behavior of processes and programs on a system and immediately halts any malicious action. It continuously monitors all activities on your PC at a very low system level and uses a proprietary combination of analytics, risk algorithms, program histories and tolerance thresholds to identify and shut down threats so you are always protected, no matter how new the threat. ThreatFire is easy to use, instantly effective, and very light on system resources.

What's new in this version:

ThreatFire 4.7 reduces confusion over threat response by significantly minimizing both the number and the type of alerts that require you to make a decision. This is made possible using the new behavior profiling and in-the-cloud techniques. It also incorporates patent-pending technology to provide greater accuracy in detecting real threats and a greater ability to avoid classifying legitimate programs as potentially malicious (false positives). ThreatFire 4.7 contains tracker technology to more accurately trace the original source of the threat and ensure that only the malicious program is quarantined and legitimate programs are unaffected. It also has added new rules for detecting both known and unknown threat outbreaks to provide better protection.

The Smart Update feature now includes several options to give you greater control over how and when updates are applied. The new update options include "download and install automatically", or "notify before installing updates".


28 December 2009

How To Display the Shutdown Menu when your PC’s Power Button is pressed

By default, your Windows XP will shut down when the Power button is pressed. It’s a good idea to change it so that the shutdown menu is opened instead, especially if you have little kids running around the house, They may switch the Power button and important works maybe not saved and shut down.

It’s quite easy to change it, just follow these steps:

Step 1:

Go to your Win XP’s desktop, right-click & Select "Properties" and the Display Properties

Open the "Screen Saver" tab and look for the "Power" button near the bottom of the window. Click it.

step1

Step 2:

In the "Power Options Properties" window that opens, go to the "Advanced" tab.

There is a dialog box in the "Power Buttons" section. Choose what you want Windows to do when the power button is pressed.

"Ask me what to do" will make it open up the shutdown menu.

step2

Step 3:

Click "OK" and restart your computer. From now on, pressing the power button will open the shutdown menu, letting you decide what you want to do

26 December 2009

Facebook Problems and Solutions



Problems: Malware, account hijacking, phishing, and social engineering

The biggest malware risk is Koobface, (an anagram of Facebook), which is a worm that targets social networking sites and affects Windows-based computers. Once a computer is infected, it hijacks the Facebook account and sends messages to other friends of the victim, enticing them to click on a link. The link redirects to a Web site where they are prompted to download software ostensibly to watch a video. However, there is no video; only malware that infects the system, blocks access to security sites, and can be used to steal sensitive information from the computer, such as credit card numbers. Infected machines can then be used to spread the worm to others on Facebook, send spam and distribute fake antivirus alerts, said Rik Ferguson, a security researcher at Trend Micro. Koobface now can automatically create new profiles using infected machines, he said.

Facebook accounts can be hijacked in several ways. A brute-force attack can be used to guess passwords. Users can fall for phishing attacks by clicking on links in messages or e-mails purportedly coming from friends that redirect to a fake Facebook log-in page. Or malware such as Koobface can steal passwords.

Social engineering is a huge problem for social networks because the trust that users have for messages and posts from friends can be easily exploited by scammers. Hijacked accounts are used to send everything from spam touting weight loss plans to links that install malware and steal passwords to fake emergency messages saying a friend is stranded in another country and needs someone to send money. Scammers are also sending e-mails that look like they come from Facebook and include an attachment that contains a Trojan.

Solutions: Use antivirus and anti-malware software and keep it up-to-date. Install security updates for operating system and other software. Use software like AVG Linkscanner or McAfee Site Adviser to protect against phishing and malware attacks. Become a fan of the Facebook Security page, which has posts related to all sorts of security issues, tips, resources and other information. If you think you've been infected with Koobface or other malware you should reset your password and notify friends who may have been affected.

Use an up-to-date browser that features an antiphishing black list, such as Firefox 3.0.10 or Internet Explorer 8. Be aware of where you enter your password. Check to see that you are logging in from a legitimate Facebook page with the Facebook.com domain. Be wary of unusual stories or offers that are too good to be true. Verify information with sources directly. Be cautious of any message, post or link that looks suspicious, requires an additional log-in or asks you to download or upgrade software. If a link seems odd or lacks context, don't click on it. Don't click on links or open attachments in suspicious e-mails. You can add a security question from the "Account Settings" page if you would like an additional layer of protection.

Problem: Rogue applications

Facebook doesn't vet every app that appears on the site, which means there is a risk that some apps will have bugs in them or will violate Facebook's privacy policies. Facebook has proven diligent in removing rogue and problem apps quickly when it is notified, but unlike iPhone apps, pretty much anyone can write a Facebook app. "Because the code is not always of professional standard or hosted or audited by Facebook, we've seen innocent apps compromised externally and used to deliver malware, such as fake antivirus," Ferguson said. One rogue app that appeared early in the year sent notifications to Facebook users reporting them in violation of terms of service and offering a link that lead to an application called "facebook -- closing down!" which then spammed all the friends of affected users, according to Trend Micro.

Solution: See solutions above, and be cautious about adding applications. Research the developers and perform Web searches to see if anyone has complained about the app. And ask yourself, what value does the app provide? Do I really need to play zombie?

Problem: Privacy leaks due to user error

Because people control who they are friends with on Facebook it is easy for users to have a false sense of security about the privacy of their data and activities on the site. Social engineering attacks, lax security practices by users like using weak passwords and design or implementation problems with the site itself can undermine the privacy protections users rely on. Users who fall for phishing scams and get their accounts hijacked have everything in their account exposed to strangers who can then use the different types of data for identity fraud or to target the victim's friends with social engineering attacks.

Solution: See solutions above. Also, use unique logins and passwords for each Web site you access. Use strong passwords, change them often and don't share them with anyone.

How to keep most people from viewing your friends list on facebook:

1. Click on Profile on the facebook top bar:



2. Scroll down to the friends list & click on the pencil to the right of friends:


3. Uncheck the box "Show friend list to everyone"



Note: All these information were taken from CNET

24 December 2009

Some Google Secrets

In this post I am going to show you some hidden secrets of Google. This is really cool..Try these yourself and enjoy!

Follow these simple steps to get out somethings behind google logo..;)

1. Go to Google.com or Google.mv
2. Then write these words shown below and hit button

• "google gothic"



• "make google logo black and white"



• "google gangster"



• "google l33t"





• "google loco"


• "google rainbow"



This is not all of the words that change the google background.. These all are actually sites.. when you write these words and hit the I'm feeling lucky button it redirects to that sites.. Hope you likes this post!




IB Rasheed

Softwares | How to's | Web design | Tips | Tech

About Me

Powered by Blogger.

Blog Archive