Monday, July 26, 2010

NTFS Data Recovery Software

NTFS Data Recovery
Use Disk Doctors NTFS Data Recovery software to recover data from NTFS, NTFS5, drives as well as it supports recovery from dynamic drives created on NT/2000/XP/2003 platforms.


Recovering data using the wizard based interface is so easy that, even a user with or without any technical know-how can use this data recovery software effectively to recover data.
This data recovery software you can recover data from:
  • IDE / AT
  • SATA
  • SCSI
  • USB Flash Drives
Also the type of data loss scenarios where software would be useful is:
  • Missing or Lost Partition Recovery
  • Deleted Partition Recovery
  • Deleted File Recovery
  • Re-formatted drive recovery
  • Formatted partition recovery
It is recommend that you download the evaluation versions first which will give you first hand experience to try and test before purchasing. Evaluation version gives you a fair idea on chances of the results that the full version might deliver. It's suggest that you test, evaluate and get a complete understanding of the product capability using the evaluation / demo version.


Never install Disk Doctors Windows Data Recovery on the drive from which you want to recover data, also never save any data on the same drive from which you are recovering data. 
Install this windows data recovery software to any another computer, which is healthy system and has the best of hardware components, then attach the drive you want to recover as a slave to this machine and then proceed ahead recovering the data.


Try NTFS Data Recovery now

Saturday, July 24, 2010

Outlook Mail Recovery

Outlook Mail Recovery Disk Doctors Outlook Mail Recovery (.pst) can recover .pst files even after the following events:
  • Corruption caused due to exceeding the 2 GB .pst file size limit.
  • Corruption of .pst files when used over a network.
  • Accidentally deleted messages, contacts and notes.
  • Corruption inside the .pst file header.
  • Corruption that occurred during compacting of a .pst file.
  • Incomplete recovery of a .pst file by data recovery software due to fragmentation.
Disk Doctors Outlook Mail Recovery (.pst) is a powerful and efficient Microsoft Outlook recovery tool. The primary function is recovery of (.pst) files for Microsoft Outlook 97, 98, 2000, 2002, 2003 and 2007. It's also compatible with Windows 7. 


This PST recovery tool does much more than what the Microsoft Inbox repair tool (i.e. “Scanpst.exe”) can do. This Outlook recovery software has the most advanced algorithms ever designed to recover data from Microsoft Outlook email archive files (.pst). This PST recovery software efficiently recovers messages, folders, appointments, meeting requests, contacts, tasks, task requests, journals and notes from .pst files. Outlook mail is recovered in plain text, HTML and RTF format. This Outlook recovery software has advanced support to recover large attachments and embedded HTML messages. It also supports recovery of password protected .pst files, plus both compressed encryption and high encryption .pst files.

Try out Outlook Mail Recovery.

Tuesday, July 20, 2010

Apple plugs critical iTunes security hole

Apple has shipped a critical iTunes update to fix a security vulnerability that exposes Windows users to malicious hacker attacks.

The latest iTunes 9.2.1 is available for Windows XP, Windows Vista and Windows 7.
From Apple’s advisory:

A buffer overflow exists in the handling of “itpc:”URLs. Accessing a maliciously crafted “itpc:” URL may lead to anunexpected application termination or arbitrary code execution. This issue is addressed through improved bounds checking.
The patched iTunes 9.2.1 is available from Apple’s download website.

Original post on ZDnet.com

Monday, July 19, 2010

SA YouTube offers users cash

Cape Town - Following the launch of YouTube in SA, users have been invited to join its partner programme which promises revenue from the video sharing site.

"Original content creators in South Africa will now have the chance to reap rewards from their work and share revenue from ads which can be placed within or alongside their videos," YouTube told News24 in a statement.

South Africans who join the programme would commit themselves to regularly uploading videos and express permission to "use and monetise all audio and video content" that they upload.

There has been some positive feedback from users who produce online videos.

"We've seen and read about some of the benefits of the programme, and are pleased that South African video content creators such as us now have the opportunity to earn revenue from videos, which now reach an international audience," said Thierry Cassuto, co-creator of satire ZANews.

Difficult issue

"Sixpack Factory, which provides workout tips and routines, has subscribers from all around the world, even countries I have never heard of before," said Petrus Cilliers (moricestreet909) who developed a fitness channel.

Revenue generation on the internet is still a difficult issue for several businesses, but recent announcements by several ISPs that they are providing uncapped internet access has been welcomed as a sign that new business models may emerge online.

YouTube also certainly hopes to use the user content to generate income, while building a base of local users who produce content.

"By enabling our users to earn revenue from their content we hope to inspire South Africans to continue to create compelling, engaging and viral content for the YouTube community," said Ben Novick, Communication Manager for YouTube.

Advertisers can also now aim ads specifically to target audiences, based on the user generated content.

Originally posted on news24.com

VeriSign adds malware scanning to SSL services

VeriSign is adding malware scanning to its authentication services for Web site operators, the company announced on Monday.
The "VeriSign Trusted" check mark seal indicates to Web surfers that VeriSign has verified that the site represents the organization or company that it purports to be and that it is using encryption to protect communications between the site and its visitors. Now, existing and new VeriSign SSL customers will have their sites scanned daily to check for malware as well, at no extra cost, said Tim Callan, vice president of product marketing at VeriSign.

The company also is adding its seals to Web search results on shopping search engines Pricegrabber and TheFind, as well as on Google and Bing for people using AVG's LinkScanner software. "We are aggressively pursuing deals with other search engines," Callan said.
If VeriSign discovers malware on a customer Web site, it will remove the seal and notify the site administrator via e-mail. Site administrators can see a report detailing what code was found and where via a VeriSign management console. When the malware is removed VeriSign will scan the site to verify that and then replace the seal.

The increase in drive-by-downloads in which Web surfers are infected with malware just by visiting a site prompted VeriSign to add this additional level of security for its customers, he said.
"Our seal and our service is widely understood to be the most recognized, most prominent indicator of a safe Web experience," Callan said. "In order for our seal to still mean what people think it means we needed to offer this service moving forward."
The service enhancement is also a way for VeriSign to differentiate its SSL certificate services from the dozens of other companies offering similar services. "We view ourselves as the Mercedes Benz of this category," Callan said. "We are making sure we are best of breed."
The malware scanning will be rolled out in stages to all VeriSign branded SSL certificate customers worldwide between now and the end of the year, he said.

Originally posted at InSecurity Complex

CCProxy

CCProxy
Proxy Server CCProxy was initially designed to modem sharing within a LAN. Proxy Server CCProxy has now been expanded to support Internet connections of many other types, such as DSL sharing, cable modem sharing, wireless sharing, satellite sharing, parent proxy server connection sharing, and more. If there is a computer within a LAN that can access the Internet, all the other computers within the LAN can access the Internet via this proxy server software. This could make great savings for your business in terms of hardware and Internet connection fees.

CCProxy can act as web proxy software, which enables you to browse web pages, download files and send and receive e-mails via web browsers such as IE, Firefox, Netscape and etc. The web caching function can increase the Internet surfing speed.

CCProxy provides powerful management functions including several ways to control the Internet access on the LAN. They are IP address, IP range, MAC address, User Name/Password and group. It can also merge with Active Directory.

The web filtering and content filtering function can restrict clients' access to particular sites. It will help you to ensure that employees concentrate on their work or that children are unable to visit unsuitable sites. The time schedule function is used to control the users' online time.

Different proxy services can be allocated to different users. For example, some of them could be restricted to browsing web pages and others to sending and receiving e-mails.

CCProxy can allocate proxy client bandwidth as appropriate. That is to say, it can be used to control the users' Internet surfing speed and balance the bandwidth to avoid the network traffic jams that can be caused by users who download big files or watch online media.

Access logging and online access monitoring will help you record the clients' Internet access activities.

Proxy Server CCProxy is easy-to-use and powerful Internet connection sharing software. CCProxy can support broadband, DSL, dial-up, optical fiber, satellite, ISDN and DDN connections, it helps you build your own proxy server and share Internet access within the LAN efficiently and easily. CC Proxy Server can act as an HTTP, mail, FTP, SOCKS, news and telnet proxy server. It features powerful account management functions, including Internet access control, bandwidth control, Internet web filtering, content filtering and time control. It also provides web caching, online access monitoring, access logging and bandwidth usage statistics functions. CC Proxy is compatible with Win98, WinME, WinNT, Win2000, WinXP, Win2003 and Vista.

Download CCProxy

Monday, July 12, 2010

Webroot Window Washer

Webroot Window Washer Webroot Window Washer is an internet tracks eraser and privacy cleaner software. As you work on your computer and browse the Internet, you leave behind traces of your activity. The Windows built-in functions will not protect you, most of the tracks can not be erased with them. Therefore, anyone else can see what you have been doing on your computer. Furthermore, much of your activity information takes up valuable disk space, and recovering this space can be very beneficial.

With a simple click Webroot Window Washer securely erase your internet tracks, computer activities and programs history information stored in many hidden files on your computer. It also provides you option to clean the data from your PC more securely so that they could not be recovered.

Webroot Window Washer allows you to erase Window's temp folders, run history, search history, open/save history, recent documents, your browser's cache, cookies, history, visited URLs, typed URLs, auto complete memory, index.dat files, and much more. You can also easily erase the tracks of up to 100 popular applications.

Key Features:

  • Erase Internet Explorer Cache Files
  • Erase Internet Explorer Browser History
  • Erase Internet Explorer Cookies
  • Erase Internet Explorer Typed URLs History
  • Erase Internet Explorer Index.dat Files
  • Erase Internet Explorer AutoComplete Memory
  • Erase Windows Recent Documents History
  • Erase Windows Start Menu Run/Find History
  • Erase Windows Recycle Bin
  • Erase Windows Temporary Files Directory
  • Erase Windows open/save history
  • Erase Windows MediaPlayer / RealOne Player history
  • Erase Microsoft Office history
  • Clear Google search history, Google toolbar history
  • Clear Yahoo search history, Yahoo toolbar history
  • Clear MSN search and toolbar history
  • Cookies manager to select which cookies to keep
  • Test mode before washing supports
  • Support Mozilla Firefox, Netscape, Opera
  • Support up to 100 popular applications
  • Customize what files and registry entries you want to erase
  • Schedule erasing to wash your system at any time
  • Boss key to hide all browser windows in one quick keystroke
  • Free space on your Hard Drive
  • Speed up your computer
  • 100% Spyware FREE, NOT contain any Spyware, Adware or Viruses.
  • Windows XP / Vista
Download Internet Window Washer 2.8 (Windows 9x/Me/NT/2000/XP/2003/Vista/7)
    Buy Webroot Window Washer $49.99

    Fix Windows Registry Errors

    The most important reason you should fix Windows Registry errors as they occur is that this the one single preventative measure can greatly increase the life-expectancy of your Windows system by stabilizing the growth of its Registry.


    It is a fact of Windows that trying to fix Registry problems after they occur is much more difficult than preventing their occurrence in the first place. So when it comes to the Windows Registry, the motto should always be "prevention is key!" This is because it is often the most common and abundant types of errors that wind up killing Registries, especially those caused by a system's registered applications, users, and even Windows itself. As new applications are installed and old applications are removed, and as registered applications continue accessing and changing Registry data, they often leave small bits of themselves behind as orphaned registry entries.

    By themselves, these errors will probably not reveal themselves in any degradation of speed or normal Windows functions, especially if your system is new. But if these errors are allowed to accumulate for a very long time, they can greatly increase a Registry's size and wreak havoc on the overall structure and stability of its database. And for a fast-growing Registry, even small error accumulations can quickly send your Registry's database structure out of control. If you don't fix these Windows Registry errors often, your system can very easily fall victim to sudden crashes, system stalls, or a severe decrease in operating speed. It is particularly at risk if you frequently install or uninstall applications and hardware, since these actions increase the Registry's rate of growth further by adding more registered components, orphaned Registry entries, and undeleted drivers to your system.

    Registry Repair Utilities Once you have made the decision to fix Windows Registry errors on your system, you will need to know something about how to go about it. Although some versions of Windows provide built-in background system utilities designed to maintain Registry structure and stability, these utilities only address the most basic Registry problems in the most primitive ways, making them insufficient when a Registry becomes very large and complicated. However, there are many third-party Windows Registry repair utilities available on the Internet that are inexpensive and easy to use. For general maintenance and prevention purposes, Combination Repair/Cleaning utilities are perfect. They are effective in finding and removing errors caused by invalid references, viruses, and spyware/tracking programs, and usually have other features, like Registry defragmenting and backup/restore utilities and scanning schedules, that make it very easy to maintain your computer's health and optimize its performance.

    Sunday, July 11, 2010

    How To Remove Keylogger

    Keylogger is a program that monitors your keystrokes on a personal computer. It will generally be controlled by an outside host and will log the user's private secure information to be used later, sometimes in a criminal manner. 

    One can find legal keylogger systems that are often installed by companies for productivity purposes. The malicious ones are often installed as a hidden part of software and attachable files may contain them too. The first step on how to remove a keylogger is to make use of security software. You should make sure that you have security software installed. This type of software is also freely available on the internet. The first thing is to do a security scan and if the software detects a problem, it will generally quarantine it. There are other ways you can try. If you do not feel confident about trying this yourself, get assistance from someone you trust.

    You have to turn off the system restore option on your computer. Go to start/control panel/system/system restore and put a checkmark against 'turn off system restore on all drives.' Then 'apply.' This removes all restore points, but if there is a threat, the chances of being infected again are minimized. Now restart in safe mode. Press F8 while the computer is restarting and this will eventually offer you a safe mode option. Do a system scan again. Once you are satisfied that you have rid your computer of the spyware, re-activate 'system restore' again. 


    Another option on removing keylogger is to do a 'system restore' to a time before the infection. This, however, can of course only be done if you know more or less when your system became infected. I personally managed to clean up my PC with a powerful spyware and keylogger cleaning software which you can find at Webroot Antivirus

    Friday, July 9, 2010

    WinZip 14.5

    With WinZip version 14 WinZip aims specifically at Windows 7 compliance and enhancements, and adds a few other new features, too. WinZip in Windows 7 gets extensive support for libraries, tools, and recent archives in the jumplist, previews in Windows Explorer for certain file types, and basic touch-screen support. Multitouch support is limited to rotating pictures previewed from WinZip archives.
    WinZip 14 also includes minor security enhancements. New automatic wiping keeps confidential data secret by "shredding" the temporary file that WinZip creates by default whenever it opens an archive. The shredding uses U.S. Department of Defense standard DoD 5220.22-M. WinZip 14 now also supports the built-in AES encryption in Intel-based computers, speeding up the time it takes to encrypt an archive. This builds on the encryption overhaul from last year's version, which included customizable password requirements and enhancements for determining how, if at all, encryption would be enforced.
    WinZip 14 retains its large feature set, including drag-and-drop support, content-sensitive previews. It has better JPEG compression that can see JPEG-only archives up to 20 percent smaller, Zip from Camera, and deep context menu support enables you to perform most of WinZip's functions on the fly. However, while installing you should keep an eye out for the Google Toolbar and the "WinZip Computing" that collects anonymous usage data; both are opt-out. Still, WinZip is among the best compression programs available, providing all the features necessary to create easy backups, compress e-mail files, and manage downloaded files from the Internet.

    Price: Free to try (45-day trial); $29.95 to buy (Buy Now)