Forget Your Windows 7 Password? Create Windows 7 Password Reset Disk


Suppose if you forgot Windows 7 password, you would try to find solutions to recover or reset it through the internet. Soon you would find one solution—using Windows 7 password reset USB disk, which is most mentioned by people. So here in this article, I will show you the exact ways to create a Windows 7 password reset disk.

Theoretically, a password reset disk Windows 7 can be made with a CD/DVD or USB flash drive. Since USB flash drive is more convenient to carry and safer to preserve, here I highly recommend creating a Windows 7 reset password with USB to prevent your computer from being locked. Below are guides on how to create a Win 7 password recovery USB.

Situation 1 :)

If you haven’t forgotten your Windows 7 password yet. At this situation, you can easily make such a password reset USB disc for free to prevent your computer from being locked.

Now follow the below steps:
  1. Insert the prepared USB flash drive into your computer.
  2. Type “reset” in the Windows search box and select “Create a password reset disk”. 
  3. When the “Forgotten Password Wizard” appears, click “Next”.
  4. Select your USB flash drive and click “Next”.
  5. Once the wizard finishes creating the reset disk, click “Next” then “Finish”.
  6. That's it. Job Done!



Situation 2 :(

If you have already forgotten your Windows 7 password. Many computer users actually didn’t take any precautions against Windows 7 password forgotten problem before they find they’ve lost or forgotten the password. So if you don’t have such a password reset disk when you forget or lose your Windows 7 password, you need to seek for other ways to make one and then use that to reset Windows 7 password.

Here’s how to create a reset password Windows 7 USB with Windows Password Recovery Enhance:

You need to do the below steps in another system in order to recover your system.
  1. Download and install PC Login Now's iso file.
  2. Burn the ISO file to CD (Use Magic ISO).
  3. After you have created a bootable disk, Insert that disk into the DVD Drive and Restart your computer.
  4. Set the BIOS to boot from CD. (Mostly not required if your system automatically detects the disk on your DVD Drive).
  5. The software then automatically runs.
  6. Use PCLoginNow to finish the job.

Note:
Download-file is an ISO file named “PCLoginNow_Free.ISO” which should be burned to a CD before using it.

How To Create Bootable Windows 8 Usb Drive



It’s been quite some time since we have seen technology revolving around portability. A USB drive acts as a portable medium for storing noticeable memory and as such a portable and a bootable windows  8 USB drive gives you a flexible availability of an operating system on your reach. Well most of the systems coming through in today’s age lack optical drives so it would be quite a wise decision to go on and use a bootable USB drive to install Windows 8 onto your system.

To create a bootable windows 8 USB drive we need to incur some requirements which happen to be:
  1. A flash (USB) drive bearing a capacity of 4 GB or more than that.
  2. A Windows 8 DVD or Windows ISO file which acts as the source which has to be transferred.
  3. If you consider having windows 8 DVD then you need an optical DVD drive in your computer but if you go onto have an ISO file then a USB port will work well.
Note: If you have a windows 8 DVD then you may proceed doing this procedure from the very first step, but if you have an ISO file then you need to go on from the second step.

Procedure: 
  • First we have to create a windows ISO file from the windows 8 DVD. This ISO file contains all the data which needs to be transfer into the usb drive to create a bootable one. There are many tools to create an ISO file from a DVD; you can use any of them. My suggestion is, you can use Magic ISO.
  • After you have created the required ISO file, you need to download the Windows 7 USB/DVD download tool from the Microsoft Website and install it onto your computer. Windows xp users need image mastering api v2 to use this software.


  • After installing it start the download tool by looking for it either in the start menu or the shortcut icon on the desktop.
  • When the tool utility will open up it will ask you for the path of your ISO file. By clicking onto browse you will have to locate the ISO file in the computer. This location has to be the path associated with your ISO files destination.


  • After selecting the ISO file you can click onto next which takes this utility onto a next step.
  • The next step is to select the media we wish to use, as we are going to make a bootable USB drive so the type of media has to be USB. There is an option to keep DVD as the media too which implies that you can make a bootable DVD too through this application but for now we have to go through the USB process.


  • After selecting the media you need to erase all the contents present in the flash drive by pressing erase USB drive. This will format the USB drive and make it free to be used particularly from this process.


  • When you will click next the utility will show you a tagline “creating bootable drive, just wait for the Windows 7 USB DVD Download Tool to prepare the drive and copy the Windows 8 installation files to it”.


  • The download tool will start formatting the drive, after that it will start copying the contents and as soon as this will be completed you will come across a labeled line that Bootable USB drive created successfully. If t\all the steps would have been incurred properly a Bootable USB drive would be ready to be operated.
This completes the process and your bootable windows 8 Usb Drive is made and prepared to be used as an installation media. Now you simply have to boot your computer through the USB drive and you would be easily able to install new windows on your computer. The maximum time period to install Windows 8 is almost 20-30 minutes with great ease.



Author Bio:
Khalid: http://www.siliconelake.com/
With the Divine Assistance i do succeed and with that Assistance i fail.

Now You Can Watch TV, Anytime...Anywhere!


Entertainment has changed considerably over the years, with technology taking on many different forms. The Internet is being used to earn an income, play games and research anything your heart desires. You can easily download programs and applications that promise to improve your lifestyle and of course stores offer their products, at any hour of the day or night. Television still commands a huge chunk of our time, so it is not surprising that we can either stream or watch recorded programs on our personal computer. You can consider Virgin Media TV packages for a better TV experience before considering the below online methods.

Reruns:

           Because our busy lifestyles may not always allow us the time to sit in front of the television, not to mention the different shows that come on at the same time, colliding with each other, most of the major networks have made it possible for viewers to watch TV shows on their websites. This opportunity to watch TV on your PC requires nothing but an Internet connection.

Scanning the globe:

           We all enjoy having choices when sitting down to watch TV and that is probably why there are so many cable channels available to us. Part of the problem with many channels is that we have to settle down and make a choice as to which one to watch. WWITV.com is one of those television opportunities where the choices are extensive, covering many countries, not just stations and requires nothing more than an Internet connection.

More opportunities:

            Another option that requires nothing but a computer and an Internet connection (preferably wide band) is Hulu.com. Since 2007, this television alternative has taken Internet TV one step further and also offers full length movies. The basic FREE service provides viewers with many television shows, however, some of the most popular television shows, require that you pay a nominal monthly fee.

Streaming it:

           Television fanatics will probably appreciate the option provided by WatchTVonPC.tv, if nothing else, the choices are endless. With upwards of 12,000 channels to choose from, all for a one time fee of less than $100.00, viewers can get rid of their expensive cable bill and watch streaming television from all over the world. There will be some software to install and the moment your membership is accepted (when payment is received) you will be well on your way to watching TV on your PC.

Free and clear:

          The final option we will consider today is an external TV tuner. This little invention starts from around $30.00 and can easily get up to $200.00. The basic equipment comes with a USB connector on one side and the ability to attach an antenna on the other. The initial cost may seem a little high, but when you realize that you will no longer have to pay for cable, it will all make sense.




Author Bio:
This has been a guest post from Jayvee at Australia's TV on PC website. if you'd like to know more about how to watch telvision shows on your computer, check it out!

Beaware Of Viruses On Social Networking Sites!

Facebook and other social networking sites can be great tools to help you stay connected with friends and family but beware! Just because the url says Facebook does not necessarily make it safe to do all it has to offer. Increasingly people are getting infected from viruses and malware installing games, quizzes, and other rogue apps from social networking sites. The viruses or malware spread by posting to your friends wall and soliciting them to install it as well.

The best plan of action is to use these social networking sites without installing any 3rd party games, apps, or quizzes. This ensures that you will be protected from most threats. However if you have a computer that is used by everyone in the family and you have teenagers that might not follow these simple rules then it is important to have security software to block these threats from entering your computer.

More and more people are using Facebook and other social networking sites at the workplace which increases the risk of spreading viruses at the workplace. Many businesses have had to block Social networking sites altogether to stop the infections and lost productivity to these services.

Security programs such as Microsoft Security Essentials can help stop the viruses and malware before you get infected instead of having to remove them after the damage has already been done. Malicious Software Removal costs are higher after you have been infected.

Behavioral steps you can take to avoid getting a Virus or Malware. Avoid Facebook quizzes and games that can give you a Virus or Malware. Stay away from sites that look shady or want you to install something to run if you are not sure of how legitimate they are.

Do not open attachments even from friends unless you are expecting a particular file from them. Many times the virus will attach itself to your contact list and send emails out to everyone appearing as if they came from you. The best rule of thumb is to never open emails that look like they are from unfamiliar people.

Stop using and downloading anything from peer to peer networks these services are loaded with viruses and malware. Use the latest Firefox or Google Chrome browsers they help to keep viruses and malware out of your computer much better than Internet Explorer.

If the virus or malware you have does not let you install or download anything then boot up your computer in safe mode to allow you to download and install the proper virus removal and malware software. Instructions for booting your computer into safe mode are listed below.

Keeping Personal Data Safe: Mistakes You Should Avoid

Theft of personal data is a rising phenomenon and seems to be growing as technology further progresses. What’s more, businesses and organizations are equally affected by this menace. Despite having in place data security measures, individuals and organizations can still fall victim to data thieves. So why is your data so important to these e-criminals? The answer is simple; your data can be used clear-out your bank account, or worse, steal your identity to commit fraud and other criminal activities.

There are many mistakes organizations and individuals can make which can lead to theft of their data. Taking simple measures can certainly safeguard your data from potential theft. The following is a list of things you need to be aware of in-order to protect yourself.

Shred your paper work:

            If you decide to discard any documents, such as credit statements, bank statements, utility bills and other related information, then you need to make it a habit to shred such documents every time you decide to throw them out.  More than often, Dumpster-divers will often go through your pile of garbage seeking out un-shredded statements containing bits of your personal information. Once these so called “Dumpster-divers” get a hold of your information, it’s only a matter of time before they use your information to max out your credit card, or perhaps transfer your life savings from your savings account, to an offshore account.

To effectively shred such documents, make sure you make use a cross-shredder instead of a traditional shredder. Cross-shredders can shred such documents much more effectively than traditional shredders.

Smash your old hard-drive into pieces:

           This step may seem a bit on the extreme side, but that’s what you have to do in order to keep your personal data safe. Even if you had previously stored personal data on your hard-drive and then happened to delete that data -- thinking it was permanently wiped-out of your hard-drive; chances are your deleted data could still be retrieved. Data recovery software can easily recover most permanently deleted data.

           When you empty your recycle bin, it may appear that the data stored in your recycle bin is gone forever. However, bits of data are always present on your hard-drive, and basic data recovery software can easily retrieve such deleted data. Thus, when you send in your old desktop or laptop for recycling, chances are that someone may try to retrieve your personal data on your laptop or desktop.  Therefore, this is the reason why you need to smash your hard-drive, before you recycle your machine.

Use anti-data theft software and antivirus software:

           If you, for some reason, need to store confidential data on your personal computer, you can do so securely with the help software that can lock folders. Moreover, investing in good anti-virus software will help you keep your identity safe on the internet.

Stay away from Phishing email:

           Phishing is the practice of recording your personal user-names and passwords so that some kind of fraud can be conducted using your log-in credentials. The scam works something like this: you receive an email from Facebook, or perhaps your bank, prompting you to log-in, so that your identity can be confirmed. Most people don’t think twice about such emails, and will log-in to confirm their accounts and to prove their identities. Little do you know, in the background, your credentials are being recorded by key-logging software!

Follow my blog with Bloglovin

Protecting Yourself Against Online Identity Thieves

Identity thieves, send out thousands of fake emails daily, claiming that they are representing certain official entities. So take care if you receive emails saying they are from some government agency or department, as it may be that these emails are part of phishing schemes.

Phishing typically is when someone sends you emails with "bad" links in them. When you click on these links you get redirected to a "fake" site which is an exact mirror of the official site. Here you are then prompted to submit some confidential information. This information that you provide is then used to log into your real account leaving you totally clueless as to what happened. You should be aware that companies rarely communicate via email if it is in relation with sensitive account information. If they do, it is typically in response to an email that you have sent them.


OK, so what exactly can I do to protect myself against identity thieves on the web?
  1. Simple, just do not be gullible. These guys strike when you least expect it, so always be on the lookout for suspicious looking emails.
  2. If you receive a suspicious mail, don't fill out any forms requesting sensitive personal information. In fact, do not do anything. Verify whether the email is legitimate or not. Nowadays, most agencies or companies are listed on the web. Their contact information readily is available. With this information at hand you can verify whether or not any communications you received are legitimate.
  3. Don't click on or save attachments that come with suspicious emails. Delete these files immediately. Alternatively, if you have a good anti-virus, scan the attachments first before opening.
  4. Update regularly. Windows posts updates almost daily, especially security patches. Make sure you have your settings set that you can download these automatically. I know it's a pain and eats away at your bandwidth and RAM. But I like to think that it's better to be safe than sorry!
  5. Even though you should never take action on suspicious sites or emails, be sure to watch out that the address bar starts with "HTTPS". This means that the page is encrypted and should be secure. If there is no "HTTPS" then leave at once.
Unfortunately no Anti-virus software can protect you against phishing schemes.

In conclusion, if you keep these tips in mind when receiving strange suspicious emails you should be fine. And remember to always be awary of phishing schemes.

What Is Buffering And It's Facts


So what does buffering mean?

          There you are, happily watching the latest 'Vampire Slayer', or whatever the latest viral video is, when it screeches to a halt and the word 'buffering' appears. A buffer is supposed to reduce impact between two things, but 'buffering' is the most annoying aspect of streaming media.

So why is it called that?

The main reason for the confusion is that buffering isn't really what's going on when the message is displayed...

The internet is a messy environment and does not guarantee that data will always arrive in a timely fashion or even in order. To counter this programs that play streaming media queue up a few seconds or more worth of data before starting playback.

That way it there is a problem and something doesn't turn up as expected those few seconds of stored data will provide a breathing space while things get sorted out.

As data comes over the network it goes on the end of the queue and data at the front is decoded and played back to the user. This is the method that provides the buffer - between the distant source and the local playback software.

Buffering is a common technique in computer programming and telecommunications. It comes up anywhere when data is passed from one place to another.

But you can't plan for everything and sometimes the queue of buffered data empties out, there's nothing left to play so the programme has to pause and wait for more data to arrive to refill the queue.

In a way these programs get it backwards. The program is constantly buffering during normal operation and that's what keeps everything running smoothly, it's only when things go wrong that the message pops up. It's waiting for more data to arrive so playback can resume.

But from the user's point of view it is confusing: they can't make any sense of it because it doesn't seem to correspond to any kind of buffering that they know about.

Yet the technical sense of buffering is a lot closer to the everyday sense than most computer jargon.

The buffering of streaming media really lessens the impact of unreliable or slow networks.

We have come to despise it but without buffering there would be a lot more starts and stops whenever we watched the latest movie online - and there are already enough jerks on the internet without that.



Author Bio:
Thank you for taking the time to read my first article. Please visit my blog to see this post at: View Rob's blog here.

Different Types of Malware

An alarming majority of internet users are either ignorant or careless about the prevalence of threats in the worldwide web. Whenever something goes wrong in their computer, they immediately dismiss it as an episodic malfunction that will not cause serious damage.

Those who are aware of malware infiltration only wait for their entire system to crash before they seek repairs and avail the aid of antivirus protection software.

Cyber criminal activities are not performed by bored high school students during summer breaks - they are attacks by underground organizations, hackers, and hacktivists who intend to cause mayhem in large corporations and governments. Those who target individuals are no less malicious, as they can now install a virus into your computer that will open a backdoor for them to gain administrative control over your entire system.

Accounts will be hacked, confidential documents will be stolen, and worse, webcams will be turned on to spy on you and your family.

Gaining a thorough awareness of these grave threats and the damages they can cause will help a lot in preserving your privacy and your security.

Introducing Malware:

Malware, for starters, is short for malicious software. It is a collective term for every kind of harmful software created and launched with the intention of vitiating people through the internet.

The most infamous categories under it are viruses, worms, Trojan Horses, spyware, and rootkits.

We will discuss their mode of penetration and the variety of ways they can endanger you.

Worms:

Its name can give you a very clear summation of its behavior. This internet pest is an extremely common, self-replicating malware. Because it can be acquired nearly everywhere in the web, it may give you the impression that is something you can easily pluck off your skin and thrown outdoors. We are warning you to alter that mindset.

Worms can enter your computer and remain undetected for months long. After some time, it will begin to delete your files, slow down your programs, instigate avenues for other malwares to pass through, and even create backdoors for hackers.

Prevention is better than cure, especially in this case, because it forces your infected gadget to suffer a slow dead with an impact you will certainly be in agony from.

Worms attach themselves to files and are efficiently spread through mass mailing. Be careful what you open in the internet.

Viruses:

You must have heard about the ILOVEYOU bug, the Chernobyl, the Melissa and many more that have caused companies millions of dollars during their debut and their succeeding hype.

The most notorious of its kind steal the contact information of an infected computer's address book, whether through MS Outlook or email accounts, and sends themselves as attachments with a luring prompt that have fooled many people.

It is a difficult malware to get rid of, as it clings stubbornly to every removable hardware plugged into an infected gadget.

Viruses behave in a slightly similar manner to worms; they will infect files and slow down your computer beyond usage. Reprogramming will require that all your files be deleted, because they are probably contaminated with the virus you acquired.

Trojan Horses:

This malware initiated the most serious cases of infiltration through trickery. Once it gets inside, like it did in Troy as told by Homer, defeat will be a difficult ending to avoid. Plenty of victims have felt the melancholy that had befallen the Trojans upon realizing that they have been fooled into letting the enemy in.

On the outside, it will appear as an inoffensive photo, document, or application, mimicking authentic ones in its presentation. Your war starts the moment you make the mistake of clicking its ploy. Although it does not self replicate, which is fortunate for us, it does deploy an army of worms and viruses that ensure little chance of survival on your part.

These malware will almost always cost you your files, and eventually your gadget.

Rootkits:

The previously mentioned malwares can enhance the destructive forces of Rootkits, as it is created by cyber criminals to gain complete control over its target's computer.

The complexity of its design makes its creators difficult to locate. With control over numerous infected computers, hackers will have an easier time tormenting others as much as they wish to do so.

Spyware:

This is the least malevolent malware of the bunch. Spywares usually cause annoyance with the way it can reprogram your applications and encourage the appearances of pop-ups. When this happens, antispyware software is a suitable solution.

Safety Measures:
  • Antiviruses do a great job at keeping malware at bay and your gadgets from crashing.
  • Be extra cautious with the files you download, and get applications only from trusted websites. If you do simply as you will in the internet, even the best antimalware software cannot save you from corruption.



Author Bio:
Author is a computer professional and blog writer who basically writes on various computer security topics. He brings many interesting reviews about the latest antivirus protection software and inform readers about the best free antivirus software for their computer protection.

How Firewall Work's


Firewalls are the first line of defense for computers connected to other computers or to the Internet.

They help to protect against viruses, malicious software and hackers. At the same time, they can allow communication with other computers or Internet sites that are known to be safe. There are two types of firewalls: Hardware-based and software-based.

Hardware Firewall:

             A hardware firewall can be a stand-alone product, or it may be part of a broadband router. A firewall in a broadband router generally needs no configuration by the user, and it protects all computers on a local network. Hardware firewalls work by using a technique called packet filtering to intercept information before it enters the private network. Any data coming from unknown, unsecured or suspicious locations is rejected and not allowed through.

Software Firewall

           A software firewall is a program that must be installed on a computer. It can be customized by the user. The program runs in the background and protects the computer from suspicious data. It can be configured to always allow information from certain sites or to always block certain sites. It can also be temporarily turned off if it is interfering with attempts to access websites or other computers that are known to be safe.

Which is better?

           Hardware and software firewalls each have advantages and disadvantages. A hardware firewall will protect all computers on a network, but software firewalls must be installed on each computer. This does allow each computer user to choose and customize their firewall software. Since hardware firewalls protect all computers on a private network, individual customization per computer is not possible. Software firewalls must be updated regularly by downloading recommended updates from the manufacture. A software firewall is particularly important for laptop or notebook computers that are taken from place to place. Some functions of hardware and software firewalls overlap, but in general it is best to have both types.

What Firewalls Don’t Do

           A Firewall operates by barring unsecured data from reaching a computer or the computers on a network. It determines what is unsecured or potentially unsecured by following a set of rules that are programmed into it. While a firewall may prevent computer viruses by blocking them, viruses, malware, and other types of malicious data can still get past a firewall if it does not recognize them as a threat. Therefore, it is important to have anti-virus and anti-malware software installed in addition to a firewall.





Author Bio:

Peter Wendt is a writer & researcher interested in computer security. Wendt recommends visiting Ottawa IT support specialists for computer services.

What Is The Most Secure Web Browser For 2013



What Is The Most Secure Web Browser For 2013

Web browsers are the gateways to the Internet. Once exploited, they become the primary vectors for breaking into computer systems and infecting them with malicious programs. One of the most popular means of breaching security barriers and compromising sensitive data over the Internet is via phishing attacks. Malicious URLs linking to phishing sites has been on the rise over the years. For instance more than 50,000 phishing sites were discovered per month in the last year alone. Another major threat is malware, including viruses, worms, Trojans etc that makes your system a prey of a remote predator. As the gateways to the Internet the browsers are bound to protect your systems from these types of online threats. Therefore they implement numerous security work-outs behind the curtains without relying on security barriers of the OS and antivirus software. Following is a comprehensive discussion about the security features on major web browsers seen today.

Internet Explorer 10 Security:

             Over the past couple of years Internet Explorer continued to tarnish its reputation over numerous bugs and vulnerabilities amidst a fierce competition lead by Google Chrome and Mozilla Firebox. However with the new IE 10 launched exclusively for Windows 8 (It supports Windows 7 as well) the software giant strives hard to regain the top notch spot it once enjoyed. Microsoft has introduced several security upgrades to the IE9 in creating the browser destined to serve Windows 8. Enhanced Protected Mode for example restricts browser’s access rights to the other applications to provide an additional layer of protection.

            Address Space Layout Randomization (ASLR) introduced with Windows Vista has been tweaked and renamed ForceASLR, and addresses memory related vulnerabilities often exploited by socially engineered malware. Windows 8 kernel includes ForceASLR protection out of the box, and Windows 7 users can enable the feature via an update. InPrivate Browsing enables the users to browse in private, as the browser does not store browsing history, cookies, temporary internet files, user names and passwords etc during a browsing session. Recently NSS Labs on their review on browser security published that Internet Explorer 10 has a malware blocking rate of 99.1% and Phishing URL blocking rate of 92%.
Recommended For You: Attributes Of A Great Web Browser For Students!

Google Chrome Security:

            Behind the curtains web browsers implement numerous strategies for keeping away malicious code snippets breaking into your system and compromising your data. The Sandbox feature is one such precautionary methodology found in Chrome. This lets a particular application run in an isolated environment without impacting other processes. Based on multi-processor architecture adapted by Chrome, processes such as HTML rendering and handling JavaScript are done in secure, isolated environments protecting your System. However this doesn’t mean Chrome is invincible. Last year a group of French hackers of VUPEN managed to crack this sandbox feature successfully.

            According to a research conducted by NSS Labs reviewing security features of popular web browsers, Chrome had a malware blocking rate of 70.4% backed by Google’s Malicious Download Protection although this lagged behind the 99.1% of Internet Explorer 10. Chrome has also excelled above the rivals in blocking phishing URLs. Just In Time Hardening (JIT) and Plug-In Security too add plus ones to the chromium camp as these features prevent malicious code snippets taking control over your system behind your back.

Mozilla Firefox Security:

             Firefox too is blessed with numerous security features to keep the users safe from exploits and attacks. Site Identity Button provides an overview of the reputation of the website, owners of the website, whether it’s a verified site etc. enabling you to stay away from suspicious sites that could potentially harm your PC. Private Browsing makes browser forget the web history, user names, passwords, cookies etc while Do-not-track feature enables users to inform web sites not to track their behaviors on the sites. However it should be noted that you are only requesting from the websites not to keep tabs on you, adhering to that is entirely up to the website. Firefox is able to mitigate cross site scripting(XCC) attacks using the content secure policy it has adapted to communicate with the website to filter legitimate content.

            Firefox enjoys automatic updates, therefore users always get to enjoy the latest and most stable version of the software without having to manually update. Blocking of phishing attacks, detecting outdated plug-ins and blocking malware integrating with the anti-virus software installed on your PC are some of the key security features of the browser. However blocking rate of malware attacks by the browser itself is very poor, recording around 4.2% compared to the 99.1% of Internet Explorer 10 and 70.4% of chrome. That being said you are at the mercy of your anti-virus software when malware downloaded into the computer is concerned.


Opera Security:


             Considering the leading rivals Opera is a tiny competitor in the browser arena, with a market share of around 4% or less. However that doesn’t necessarily mean it doesn’t have what it takes to go head to head with the bigger players like Chrome and Internet Explorer. Security-wise Opera too offers a decent set of features to protect its users against attacks. Blocking of malware and phishing URLs is one of the foremost tasks of any browser today, and Opera too protects the users from malicious web pages by automatically scanning the web pages against its huge database of known malware and phishing sites. Opera also allows users to enable do-not-track options and control the right to access geographical location details. Another novel feature is the option to control access rights to the web camera when surfing on social media web sites. Private browsing mode or private tabs feature erases web history, cookies, temporary internet files etc during a private session. Opera scores few points offering 256 bit encryption and extended validation certificates for a safer browsing experience. However 3rd party plug-ins and JavaScript still can pose security threats to the browser.

Conclusion:

               Like there isn't anything called a perfect security system there isn’t anything called a perfect browser, and there never will be. Each of the browser discussed above have their own set of pros and cons, and beats the rivals in some aspects. Internet Explorer 10 is a huge transition from the not so pleasant history of its predecessors, and offers rich set of features to maximize your security online. Its malware detection system is able to detect and block 99.1% of the known malware as revealed by NSS Labs. No other browser comes even closer to that margin, with chrome following from a distant scoring 70.4%. However when blocking phishing URLs is concerned, chrome excels ahead of the rivals. Firefox too offers decent set of security features along with its automatic updates in order to keep the users safe. Whatever the browser you’d be using, understanding that security flaws do exist with any kind of system and sticking to the latest versions of the applications and installing security updates and patches recommended by the manufacturer are important for a secure online experience.




Author Bio:
Maria Tomic is a media software testing expert from IQmango free software provider. Maria is primarily focusing on DVD tools and looking for the best free DVD burning software for Windows 8 computer.

Top 5 Mobile Security Concerns for 2013

The market share for traditional PC's is falling apart as smartphones and tablets are replacing the desktops. As millions of users shift from PC's to mobile devices, hackers and malware authors who once targeted PC ecosystems are focusing on attacking mobile devices, which are miniature PC's storing huge chunks of sensitive data. Therefore users need to be aware of potential security vulnerabilities and various methods to safeguard their valuable information on mobile devices more than ever. Although many users are familiar about PC security it seems that only few users are actually aware of ways to protect the smartphones and tablets from attacks. The following is a concise review on top 5 mobile security concerns for 2013.

Outdated Operating Systems:

                Outdated operating systems pose serious security threats to the smartphones and tablets. With the current pace at which hardware components are stacked together to produce new and powerful devices each day, predecessors are losing the limelight at a rapid rate. The upgrades to the operating systems are not always compatible with the older phones; therefore a vast majority of users tend to stick with older versions of the OS. Also security patches to the identified threats and updates to existing versions are usually not installed properly by the average users due to their lack of concern over mobile security or lack of knowledge on installation processes. Another major issue especially relevant to Android OS which powers about 75% of the smartphones and tablets out there is its huge fragmentation, which causes upgrade processes dreadfully slow. In fact around 50% of the devices still run Gingerbread, while two major upgrades, Ice Cream Sandwich and Jelly Bean have already been rolled out.

Outdated Applications and Malicious Applications:

                People are shifting from Desktop PC's to smartphones and tablet PC's and so are the hackers and malware authors. Malicious application codes are often bundled with popular free applications found on apps stores, or with pirated copies of paid versions, and average users hardly notice the spying bots disguised within a popular service. Most trusted services like Google Play and Apple iTunes Apps Store too have been injected with malicious apps despite various security barricades, therefore chances of various third party app stores and web sites being infected with malware are quiet high. User modified versions of operating systems often known as Custom ROMs are usually vulnerable to attacks more than official stock ROMs, since users often root the smartphones to gain the super-user access for installing custom ROMs, and rely on pirated versions of popular apps. These third party markets usually are not monitored closely for potential threats by a professional body therefore malware authors can easily distribute their apps coated with malicious codes without getting caught.

Exploited Wireless Networks:

              Public wireless hotspots attract many savvy smartphone users looking for cheap data bundles and many prying eyes of malicious hackers looking for vulnerable targets. Network requests can be manipulated to redirect users to fake websites infected with malware or spyware exploiting the vulnerabilities of the network. User names, user passwords and even stored messages have been retrieved through public Wi-Fi networks without users consent in various occasions. Mobile phones are not typically equipped with firewalls to block insecure connections while surfing on a public Wi-Fi network, therefore potential intruders can steal sensitive data like credit card numbers and bank account numbers and hack into users’ email accounts as well. Using encrypted network connections at home and office, and avoiding accessing public Wi-Fi hotspots at airports and cafeterias are some basic precautions users can take to minimize security threats, until manufacturers and developers start bundling up security firewalls.

Rooting and Jailbreaking of Propriety Operating Systems:

              Gaining super-user access to the operating systems by rooting or jailbreaking exposes the system to plethora of security threats. This process allows users to gain full administrative privileges, and install any application including the ones not recommended by the manufactures over security concerns. Rooted devices are easily manipulated by malware including worms, Trojans and various viruses to steal user names and passwords, contact lists, messages and hijack email accounts behind users back. Rooting devices void manufacturers’ warranty, therefore users are not notified of security patches and security updates once devices are rooted and users typically have to manually address such concerns.

Vulnerabilities in Device to Device Connections:

              Device to device infections are quiet rare yet however that doesn’t mean they are impossible to be carried out. For instance malware authors can exploit the USB host feature introduced with Android Honeycomb for spreading malware. If the connected device’s USB debugging mode is turned on, chances of the device being infected with malware embedded in the host devices are quite high. This could either be accomplished by a bot running in the background of the host without the users’ consent, or by the owner of the infected host himself, by plugging the device into a target device and installing the malware on it. However it should be noted that device to device infections are quiet rare in earlier versions of Android which still powers up to 90% percent of the Android smartphones. It is also speculated that malware authors will utilize desktop PC's to spread smartphone malware in near future.




Author Bio:
This guest post was contributed by Dmitri Blackthorn, the online security expert, mobile technology specialist and a part of Stop-DDoS.net team - DDoS Mitigation Service provider.

The 10 Most Effective Ways To Extend Your Laptop’s Battery Life

A laptop without a long lasting battery life can be a real nuisance. When you need to look for sockets to constantly charge your laptop it loses all of its charm. Fortunately, there are ways to keep your battery going.
Let's have a look at them.

  1. Don't leave a charged battery unused for extended periods. When the battery is charged, you should use it more than once every two weeks. Also try to make sure that you don't discharge the battery completely.
  2. Don't leave your laptop on standby mode but turn it off completely. Of course placing your laptop in standby mode instead of leaving it on completely will save some battery power, but turning the laptop off will save you a lot more power.
  3. Defragmentation of your laptop should be done on a regular basis. When you do this often, your hard drive will work a lot faster, which will be less demanding on your battery and the hard drive itself. It will make your hard drive a lot more efficient. 
  4. Optimise your power options. Your laptop will give you a few options on how you want to use it. You can go to the power options in the control panel and choose the option max battery for the most efficient power usage effect.
  5. Do not multitask when you use the battery as it will drain more quickly. Instead, stick to using one program at a time. If you want to make sure you get the most of the battery do not let programs run in the background.
  6. Don't demand too much from your PC and chose the programs you use wisely. Activities like playing a DVD or gaming consume less power than programs such as word or email. If you want to use your battery for a long time, stick to the passive activities.
  7. When you lower the graphics you use, your battery will conserve energy. This can be done when you shut off graphic drivers and adjust the screen resolution.
  8. Devices like WiFi and USB drain your laptop battery. Also charging other devices is not advisable.            
  9. Buy a more efficient laptop. New laptops are very energy efficient and some of them even can be used all day long. If you replace an old device with a new one it will give you a quick fix. 
  10. Turn automatic saving options off. Programs like Excel and Word have these options but drain your battery.

Sticking to these simple rules is a sure way to make the most out of your battery. Good luck!



Author Bio:
Rens works for Intralinks, a leading virtual data room provider.

Computer Sound Problem And Steps To Troubleshoot It

We normally spend lots of time on computer, it becomes a part and partial of our life, we get attached with it, and some day when it doesn’t work properly we easily understand something wrong has taken place. When computer faces sound problems or comes to a mum, it creates a panic in our mind; we  get disturb and try to fix it. This article is to troubleshoot and fix the sound problems of computer.

Every computer problem has a reason behind it, which may be hardware, software or both so proper steps should be taken to troubleshoot it, which are as follows,


Muted audio output unknowingly:

           Some times some mistakes are done unknowingly and we came to know about it when all our attempts are used to resolve it. Sometimes we accidently mute the sound of our system and in a hurry tries every other attempts to resolve it.

Solution:
Click on the speaker icon of your tool bar, and check the status of it, if it is muted then unmute it.

Speaker connection problem:

           Sometimes it happens that your speaker gets loose connected or the cord of it gets damaged, which causes no sound in the system.

Solution:
The best way to troubleshoot this is to disconnect your speaker and then connect it, if its cord gets damaged then replace it.

Sound card driver problem:

            It may be possible that your sound card driver have some problem. Check the sound devices and their drivers installed through 'Control Panel'.

Solution:
Re-install your audio driver through appropriate installation CD.

Failure of your sound card hardware:

            If you have reinstall your sound card, and the sound problem still exists, then it is possible your sound card hardware has been damaged.

Solution:
Change your computer sound card hardware, which should be compatible with your motherboard.

On Windows, run an automatic troubleshooter to find and fix the sound problems with your computer, the steps to run the troubleshooter are as follows,
  1. Click the start button.
  2. Click control panel, then system and maintenance and then device manager.
  3. Expand the sound, video and game controllers category.
  4. If your installed sound card is listed then proceed further, if not, then install a sound card first.
  5. If there is a yellow question mark next to your installed sound card, there might a problem.
  6. Right click the sound card, then properties.
  7. Click the general tab, and look in the device status box to identify problems with the sound card.



Author Bio:
             Matthew Ferrall received the Master degree in software engineering in 2006 and currently serving as a software engineer at Impcsupport. He provides informative articles on Online PC Support, windows maintenance tools, windows support, computer maintenance tools and software’s.

Tips to Prevent Data Loss!

How do you protect yourself from losing important data? Do you save your work as often as possible? Do you do backups? Here are a few effective tips on how to prevent data loss:

Backup your work:

             Backing up your work is simple thing to do: you can use USB’s, CD’s, or external drive, among others, to have a duplicate or backup of your work. Just in case your file was corrupted by whatever reason, you’re sure that you have a secured file stored. You can also try partitioning your hard drive into two: one for the operating system and some programs, while the second partition would be for backup. This way you won’t need to have a separate storage device while preventing data loss.

Use Antivirus and Antispyware Programs:

             Viruses, worms and spywares can delete, modify and corrupt your files. Right after installing programs on your computer, it is a must to install an antivirus and antispyware. Keep your antivirus updated so that it could be effective in preventing viruses. Always scan your computer using antispyware program because spywares could attack your files and give attackers access to it.

Use UPS (Uninterrupted Power Supply):

            Brownouts are unavoidable, so it is advantageous to use UPS. A sudden surge in current could corrupt your files as well as some programs on your computer. While in a middle of encoding your project, you could prevent data loss by using UPS. UPS, could allow you to properly save your work and shutdown your computer, which otherwise would cause files and programs to malfunction.


Don’t try to repair your computer if you’re not qualified to do it:

           If you think that you need to open up your computer because it needs repair, don’t attempt to do it unless you really know what you’re doing. Trying to solve the problem without assistance from a qualified professional could do more damage than good. You could lose not just data, but you could rupture the hardware inside. Or you could harm yourself from electric shock.

Don’t share your file with strangers:

          To protect yourself from data loss, never allow anybody you don’t know to access your important file. You’re never sure what they could do to it. They could steal your work, modify or delete it.

Don’t modify the registry of your Operating System:

          Unless you’re sure what you’re doing, never do changes to the registry. It could harm your operating system that could result in malfunction and loss of some important files.

Useful KeyBoard Shortcuts


Useful KeyBoard Shortcuts

Hi friends! below are the list of keyboard shortcuts which may be helpful for you, if u are good at using keyboard rather than mouse. These keyboard shortcuts may be helpful for you in one or another day when your mouse suddenly stopped working.

Consider you are working on an important info. on a word, suddenly your mouse has stopped working and your mouse pointer is still on your monitor, What would u do to save ur file? Below are the shortcuts for all such worse situations, You don't need to Keep all those in memory, Just remember the shortcuts which you think will help you in such situations from the list of below shortcuts :)

Keyboard Shorcuts (Microsoft Windows)

  1. CTRL+C (Copy)
  2. CTRL+X (Cut)
  3. CTRL+V (Paste)
  4. CTRL+Z (Undo)
  5. DELETE (Delete)
  6. SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)
  7. CTRL while dragging an item (Copy the selected item)
  8. CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
  9. F2 key (Rename the selected item)
  10. CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
  11. CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
  12. CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
  13. CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
  14. CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
  15. SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
  16. CTRL+A (Select all)
  17. F3 key (Search for a file or a folder)
  18. ALT+ENTER (View the properties for the selected item)
  19. ALT+F4 (Close the active item, or quit the active program)
  20. ALT+ENTER (Display the properties of the selected object)
  21. ALT+SPACEBAR (Open the shortcut menu for the active window)
  22. CTRL+F4 (Close the active document in programs that enable you to have multiple documents opensimultaneou sly)
  23. ALT+TAB (Switch between the open items)
  24. ALT+ESC (Cycle through items in the order that they had been opened)
  25. F6 key (Cycle through the screen elements in a window or on the desktop)
  26. F4 key (Display the Address bar list in My Computer or Windows Explorer)
  27. SHIFT+F10 (Display the shortcut menu for the selected item)
  28. ALT+SPACEBAR (Display the System menu for the active window)
  29. CTRL+ESC (Display the Start menu)
  30. ALT+Underlined letter in a menu name (Display the corresponding menu) Underlined letter in a command name on an open menu (Perform the corresponding command)
  31. F10 key (Activate the menu bar in the active program)
  32. RIGHT ARROW (Open the next menu to the right, or open a submenu)
  33. LEFT ARROW (Open the next menu to the left, or close a submenu)
  34. F5 key (Update the active window)
  35. BACKSPACE (View the folder onelevel up in My Computer or Windows Explorer)
  36. ESC (Cancel the current task)
  37. SHIFT when you insert a CD-ROMinto the CD-ROM drive (Prevent the CD-ROM from automatically playing)

Dialog Box - Keyboard Shortcuts:

  1. CTRL+TAB (Move forward through the tabs)
  2. CTRL+SHIFT+TAB (Move backward through the tabs)
  3. TAB (Move forward through the options)
  4. SHIFT+TAB (Move backward through the options)
  5. ALT+Underlined letter (Perform the corresponding command or select the corresponding option)
  6. ENTER (Perform the command for the active option or button)
  7. SPACEBAR (Select or clear the check box if the active option is a check box)
  8. Arrow keys (Select a button if the active option is a group of option buttons)
  9. F1 key (Display Help)
  10. F4 key (Display the items in the active list)
  11. BACKSPACE (Open a folder one level up if a folder is selected in the Save As or Open dialog box)

Microsoft Natural Keyboard Shortcuts:

  1. Windows Logo (Display or hide the Start menu)
  2. Windows Logo+BREAK (Display the System Properties dialog box)
  3. Windows Logo+D (Display the desktop)
  4. Windows Logo+M (Minimize all of the windows)
  5. Windows Logo+SHIFT+M (Restorethe minimized windows)
  6. Windows Logo+E (Open My Computer)
  7. Windows Logo+F (Search for a file or a folder)
  8. CTRL+Windows Logo+F (Search for computers)
  9. Windows Logo+F1 (Display Windows Help)
  10. Windows Logo+ L (Lock the keyboard)
  11. Windows Logo+R (Open the Run dialog box)
  12. Windows Logo+U (Open Utility Manager)
  13. Accessibility Keyboard Shortcuts
  14. Right SHIFT for eight seconds (Switch FilterKeys either on or off)
  15. Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
  16. Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off)
  17. SHIFT five times (Switch the StickyKeys either on or off)
  18. NUM LOCK for five seconds (Switch the ToggleKeys either on or off)
  19. Windows Logo +U (Open Utility Manager)
  20. Windows Explorer Keyboard Shortcuts
  21. END (Display the bottom of the active window)
  22. HOME (Display the top of the active window)
  23. NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the selected folder)
  24. NUM LOCK+Plus sign (+) (Display the contents of the selected folder)
  25. NUM LOCK+Minus sign (-) (Collapse the selected folder)
  26. LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder)
  27. RIGHT ARROW (Display the current selection if it is collapsed, or select the first subfolder)

Shortcut Keys for Character Map:

After you double-click a character on the grid of characters, you can move through the grid by using the below keyboard shortcuts:

  1. RIGHT ARROW (Move to the rightor to the beginning of the next line)
  2. LEFT ARROW (Move to the left orto the end of the previous line)
  3. UP ARROW (Move up one row)
  4. DOWN ARROW (Move down one row)
  5. PAGE UP (Move up one screen at a time)
  6. PAGE DOWN (Move down one screen at a time)
  7. HOME (Move to the beginning of the line)
  8. END (Move to the end of the line)
  9. CTRL+HOME (Move to the first character)
  10. CTRL+END (Move to the last character)
  11. SPACEBAR (Switch between Enlarged and Normal mode when a character is selected)

Microsoft Management Console (MMC)
Main Window Keyboard Shortcuts

  1. CTRL+O (Open a saved console)
  2. CTRL+N (Open a new console)
  3. CTRL+S (Save the open console)
  4. CTRL+M (Add or remove a console item)
  5. CTRL+W (Open a new window)
  6. F5 key (Update the content of all console windows)
  7. ALT+SPACEBAR (Display the MMC window menu)
  8. ALT+F4 (Close the console)
  9. ALT+A (Display the Action menu)
  10. ALT+V (Display the View menu)
  11. ALT+F (Display the File menu)
  12. ALT+O (Display the Favorites menu)

MMC Console Window Keyboard Shortcuts:

  1. CTRL+P (Print the current page or active pane)
  2. ALT+Minus sign (-) (Display the window menu for the active console window)
  3. SHIFT+F10 (Display the Action shortcut menu for the selected item)
  4. F1 key (Open the Help topic, if any, for the selected item)
  5. F5 key (Update the content of all console windows)
  6. CTRL+F10 (Maximize the active console window)
  7. CTRL+F5 (Restore the active console window)
  8. ALT+ENTER (Display the Properties dialog box, if any, for theselected item)
  9. F2 key (Rename the selected item)
  10. CTRL+F4 (Close the active console window. When a console has only one console window, this shortcut closes the console)

Remote Desktop Connection Navigation:

  1. CTRL+ALT+END (Open the Microsoft Windows NT Security dialog box)
  2. ALT+PAGE UP (Switch between programs from left to right)
  3. ALT+PAGE DOWN (Switch between programs from right to left)
  4. ALT+INSERT (Cycle through the programs in most recently used order)
  5. ALT+HOME (Display the Start menu)
  6. CTRL+ALT+BREAK (Switch the client computer between a window and a full screen)
  7. ALT+DELETE (Display the Windows menu)
  8. CTRL+ALT+Minus sign (-) (Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PRINT SCREEN on a local computer.)
  9. CTRL+ALT+Plus sign (+) (Place asnapshot of the entire client window area on the Terminal server clipboardand provide the same functionality aspressing ALT+PRINT SCREEN on a local computer.)

Microsoft Internet Explorer Keyboard Shortcuts:

  1. CTRL+B (Open the Organize Favorites dialog box)
  2. CTRL+E (Open the Search bar)
  3. CTRL+F (Start the Find utility)
  4. CTRL+H (Open the History bar)
  5. CTRL+I (Open the Favorites bar)
  6. CTRL+L (Open the Open dialog box)
  7. CTRL+N (Start another instance of the browser with the same Web address)
  8. CTRL+O (Open the Open dialog box,the same as CTRL+L)
  9. CTRL+P (Open the Print dialog box)
  10. CTRL+R (Update the current Web )

Is Your PC Infected With A Virus - Top 5 Anti Virus Programs

What to Do if Your PC is Infected From lethal infections to simply frustrating ones, virus infections are the curse of computer users. Once you’ve recognized the symptoms, what can you do about it?

Don’t Panic - Almost every computer is infected with a virus at one point or another. Quick action and caution are necessary. There are two types of computers - those that have been infected with a virus, and those that will be infected with a virus soon.

Top 4 Reasons to have a strong virus protection software:

  • Protect your computer system from breakdown.
  • Guard Data on your computer from identity theft.
  • Prevent spam email inundation.
  • Peace of Mind.
Definitions for Detection:

             Viruses work by placing bits of code onto separate files, infecting that file before moving on to the next one. This is why, unlike humans, computers are healed of viruses by cutting off the infected part. The code that viruses place on the file has a unique signature that antivirus programs can spot. This method of finding viruses is very common but has one drawback - the antivirus program is only as effective as it is current. Every time a new virus comes out, the program has to be updated.

Top 5 Features to look for in an anti virus software program are,
  • Easy to Install.
  • Simple to Use.
  • Should update itself regularly.
  • Effective at removing viruses and backed by certified testing.
  • Technical Support available.
            To solve this problem, some antivirus programs use a “heuristic” algorithm. Viruses have behaviors in common with each other, such as working without changing the recorded “last modified” date, or avoiding changing the size of the file. The antivirus program will recognize this behavior and find the virus by tracing back to the source. Other antivirus systems use a “baiting” system, where several files are made to look and coded to be like regular files, but are in fact closely watched by the antivirus software. If a virus tries to modify these files, the software catches and contains it. Of course, the cat and mouse game between the virus creators and virus destroyers is endless. Viruses are constantly evolving to dodge tricks put forth by antivirus programs.

Top 5 Virus Protection Software Programs:

  1. Bitdefender Antivirus Plus
  2. Kaspersky Anti-Virus
  3. Norton AntiVirus
  4. F-Secure Anti-Virus
  5. G Data AntiVirus
Then comes the AVG, Avast, etc...

Types Of Rootkit Viruses - Preventive Measures

Rootkit is malicious software which is designed to protect/hide the malware, spyware, and bots and prevent them to be detected by normal detection methods. Once it get’s installed in the host computer it has lethal potential to turn your important credentials into garbage.

It is designed to accomplish the following purposes:
  • To get unauthorized access to the owner computer and steal his/her credentials for doing criminal activities, for stealing money via online banking, to steal important documents etc.
  • To hide malicious software like key loggers, viruses to harm the owner of computer.
  • To utilize the computer as a Zombie Computer for performing any unethical activities like sending spam mails, for attacking others computer attached through the Home group etc.

Types of Rootkit Virus:

Persistent Rootkit Virus:
               This Rootkit virus triggers every time the computer startup/reboots. It hides as a valid registry files and replicate action of valid windows registry files. It can’t be recognized easily and gets uploaded every time whenever the computers restart/reboot without any help from external factor. It remains in your computer registry even if the computer is rebooted.

Memory based Rootkit Virus:
               This type of Rootkit virus lies in your computer memory. They occupy an unallotted portion of your computer RAM and remain until computer is shut down by the owner.

User Mode Rootkits:
               In this case rootkits virus digs deep inside the operating system and stores itself in the system drive location and can’t be detected by the antivirus program. It escapes antivirus program detection by integrating itself with the antivirus program. When Antivirus program is initiated to scan the system, rootkit obstruct it and imitate the action of antivirus program and in result does not show any malware in result.

Kernel Mode Rootkits:
               Kernel mode rootkits are more dangerous as compared to the other rootkits. This type of rootkits modifies the Kernel data structures by adding or replacing the existing code. This is one of the most lethal rootkits which can’t be detected by antivirus program as they operate at the same security level as the operating systems.

Firmware Rootkits:
               Firmware rootkits affects the device attached by getting access to the device code and cease operation. You may have listen Mebromi rootkit which affects the graphic card of computer. This rootkit will reinstall itself when you restart your computer.

Boot kits:
              Bootkits is the rootkit which is designed to contaminate the MBR (Master Boot Record) of the computer. It mainly affects the booting process and POST (Power on Self Test) of computer.

Hypervisor Rootkits:
             This kind of rootkits is designed to affect the virtual machine setup. Hypervisor is a layer which is present between the physical layer and the virtual layer; it does not load itself when the computer restarts and become active when operating system is being prompted to initiate virtual machine. Its task is to exploit hardware virtualization and thus exploit system by intercepting hardware operation triggered by genuine operating system.

How to prevent Rootkits:
  • One of the easiest ways to prevent your computer from rootkit is to create system restore points at regular interval.
  • In most of the cases rootkit enters in computer through spam mails, it is always advised to avoid spam mails.
  • It is always recommended to scan every external device before using it as they may contain harmful malwares.
  • You must regularly update computer antivirus program from the genuine website of manufacturer. Apart from the genuine website of manufacturer don’t use antivirus which promises to provide full security these are traps created by the bad people to fulfill their evil intentions.
  • Use Microsoft security essential security tools available on the Microsoft support website.
Symptoms Of a Rootkit:
  • The anti-virus program that you currently have installed no longer runs.
  • PC reboot itself
  • Error messages
  • Your anti-virus stop working
  • Your PC date and time keep changing to a wrong date even after you change CMOS battery
  • PC slow down or run out of memory when you are only running one application
  • Internet become slower
  • Your computer locks up or fails to respond to common inputs
  • Settings in Windows change without your permission
  • You experience excessive network traffic or your network connect becomes slow or disconnected
What to do if you think u are infected:

             If you think you are infected with rootkit virus, you can use one of many Rootkit virus removers available online. A simple search on google for "Anti RootKit" will yield you with various softwares available for this purpose.



Author Bio:
             Bella Martin received the Master degree in software engineering in 2006 and currently serving as a software engineer at Impcsupport. She provides informative articles on Online PC Support, PC technical support, windows support, computer maintenance tools and software’s. 

How To Manage Lock Screen In Windows 8

             “Windows 8” the latest operating system launched few months ago. It is loaded with attractive features like UEFI interface, Hybrid boot, Windows to go etc. Microsoft has introduced lot of changes in the Lock Screen. The concept of Lock screen is devised show a state when computer is not used. Lock screen was also used in the previous version of windows operating system but in Windows 8 OS Lock screen is revived to extent beyond expectation. The concept of Lock screen introduced in Windows 8 looks to be inspired from Smartphone’s. Lock screen is generated in a computer when a user locks his/her computer, restart it or wake up from sleep state.

Basic Lock screen contains the following information:
  • Lock Screen Background Image.
  • Today’s Date with time.
  • Current status of available network and Battery status.
Apart from this information Windows 8 allows to place apps on your lock screen. A user can place maximum of seven apps on the screen. For instance you can place or you can active your webmail service app on your Lock screen which shows unread message or update you when new mail is received. So, you can place all such Apps which you use on regular basis.

How to make changes in Windows 8 lock Screen?

You have two ways though which you can make changes in the lock screen,

Method 1: By accessing Group policy Editor.
  1. Press Window + R key, this key combination will initiate/opens a new window on your monitor screen. This is known as RUN window.
  2. Then type “gpedit.msc” in the text box and press Enter key, this command will open “Group Policy editor” window.
  3. On the left panel of Window click on computer configuration, click on Administrative templates, and then click on Control panel. Now lists of option appears on left panel of screen, out of them click on Personalization.
  4. Then in the right pane of window you will get option to change configure the lock screen and Start menu.
  5. You can enable/disable lock screen through these option, change Lock screen image and Start menu background.
Method 2: By using Registry Editor.
  • Press Window + R key, this key combination will initiate/opens a new window on your monitor screen. This is known as RUN window.        
  • Then type “regedit” in the text box and press Enter key, this command will opens Registry Editor.
  • A new window appears on your screen which contains list of registries files. You have  to find the following registry:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Personalization
  • If you are not able to find create a new registry file DWORD NoLockScreen and set its value to 1 to disable it or set its value to 0 if you want to disable it.
  • Then Restart your computer to make changes to take affect.
  • That's It!



Author Bio:
             Bella Martin received the Master degree in software engineering in 2006 and currently serving as a software engineer at Impcsupport. She provides informative articles on Online PC Support, PC technical support, windows support, computer maintenance tools and software’s.