Saturday, May 23, 2009

Remove hidden infections with HijackThis

Malware has gotten more sophisticated at hiding its tracks compared with a few years ago. Adware, it seems, with its pop-ups and unwanted browser toolbars, has taken a backseat to the sly, ever-dangerous, and much more lucrative realm of the botnet, also known as that class of malware that conscripts your computer into an army of spam-spewing zombies, or worse.

HijackThis_iconIf you suspect your Windows computer may be compromised, you should always try running standard adware-removal programs first. Ad-Aware and Avira AntiVir Personal Free are two good starts. If they can't seem to keep the nasties at bay, Trend Micro HijackThis digs deep. For most, HijackThis will be diagnostic software for Windows XP (with high compatibility for Vista) that creates a log of your Windows Registry and file settings. It is not a spyware removal tool. However, its capability to identify commonly abused methods of altering your computer can help you (and the Internet community) determine your next course of action.

Step 1: Install it

Version 2.0.2 of HijackThis contains an installer, unlike the previous version that launched from a ZIP file or EXE. If you're using that legacy version, be sure to update. You'll find that this build also downloads a desktop icon for quick-launching.
Step 2: Scan your system

Trend Micro HijackThis opens with a simple interface that offers limited instruction. Running the program and interpreting its results can be confusing. Click either of the two "system scan" buttons to bring up a list of registry and file entries. Expect to see a mess of entries--even a Firefox plug-in on a completely healthy computer can produce multiple listings. If you choose to scan the system only, you can still save a record after the scan by selecting the "Save log" button on the bottom left. This will save the log as a plain text document that you'll be able to open in Notepad.

Step 3: Identify problems
Add to Ignore List button

Add safe entries to the Ignore List to speed up future scans.




Here's the rub--now that you've got a long list of your computer's contents, how do you determine which results are critical, and which benign?

There are a few determining factors. Some entries may be obviously tied to a legitimate program you installed. A browser helper object like Adobe PDF Reader Link Helper is clearly harmless and installs with the Adobe Reader application. Listings like these you can ignore or can add to the Ignore List to bypass in future scans. To excuse any entry from showing up in the results list in the future, click the adjacent box to add a check mark and choose the button reading "Add checked to ignorelist." See it in action in this video (Note: The video accurately demonstrates using the ignore list on a previous version of HijackThis.)


Fix Checked button

Click Fix Checked only if you are certain the entry is unsafe.




What if you're less certain about a cryptic Registry entry, DLL, or EXE? You can select an individual item by highlighting it or clicking the check box and hitting the "Info on Selected Item" button. This brings up a short definition of the entry, examples of infected items, and the location of the file should you want to find it on your computer and look at its properties. There's also a description of the action HijackThis takes were you to "fix" the entry with the Fix Checked button. It's a bit of a misnomer in truth, as "fixing" means deleting the entry in one or more locations.

Before obliterating any file from your registry or systems settings, a word to the wise: this is risky business, and one false move could permanently foul up your computer. We recommend that only advanced computer users who are very comfortable with the registry use this feature. Otherwise, searching the Internet for the item's name or number will help you identify the entry and help determine if you can safely ignore the it or if you need to seek out assistance.

Step 4: Getting help
AnalyzeThis button

TrendMicro will compare your system contents with other users'. Chances are, if 90 percent of users have it, you should too.




There are a few ways to report your findings. The first is to choose the "Analyze This" button in HijackThis' results window. So long as a corporate firewall isn't blocking it, this will open a browser tab to Trend Micro's Web site, where you can compare your entries side by side with those of other computer users. The more common the instance, the logic goes, the more likely it's safe. To get detailed help with your system stats, however, the best thing to do is save the log, preferably in a Trend Micro HijackThis folder, and look to the Internet for answers.

Many antimalware and technical-support online forums feature dedicated support technicians who will examine your Trend Micros HijackThis log file free of charge and tell you which entries to delete. Other times, experienced and helpful power users will fill that role. In either case, it may be a good idea to double check their suggestions with online research of your own. SpywareInfo Forum is one starting place, as are Tech Support Forum and Tweaks.com, which has a dedicated folder for HijackThis logs. Registration is required to participate in the forums. It's a standard prerequisite, but free and relatively quick. Read the forum rules before posting, and be patient.

The person who's helping you will tell you which files to remove by "fixing" them, then probably ask you to restart, rescan, and post a new HijackThis log. If there's a suspect EXE in your kit, you may also have luck with an uninstaller like Revo Uninstaller, which also scans the registry for leftover files after a program uninstalls. After that, restart your computer and rerun HijackThis or possibly an adware-removal program, depending on your issue, to see if that took care of the problem. Carry on until your computer is once again deemed pristine.

Miscellaneous tools
Miscellaneous tools

Get at extra tools and configurations here.




Scanning may be the heart of HijackThis, but its miscellaneous tools section, accessible from the main menu, also contains a handful of useful system tools and settings. It's from there that you'll be able to generate a text log in Notepad of the processes and Windows Registry entries that run as your computer boots up. While you won't be able to manage these through HijackThis, it will point to other outlets for unwanted codes to run. You'll be able to further disable some of these through Windows system settings or with additional Windows optimizing software like Glary Utilities.

In addition, you'll find a process manager and other basics tools to flag a file for deletion on the next reboot. HijackThis includes a simple uninstaller as well, though we'd recommend going with a standalone uninstaller instead. There's also the option to open something called ADS Spy, where "ADS" stands for "alternate data streams." Most of you won't use this, but here's a video that helps explain the feature.

Much more indispensable is the Backups menu that's right next to the Miscellaneous Tools list on the configuration menu. HijackThis keeps a record of every item you've "fixed." It's here that you're able to reinstate the item if you realize the error of your overenthusiastic ways after the fact. Here's the video demonstration. From this configuration menu, you'll also be able to manage the ignore list and tweak program preferences.

Again, HijackThis is not a panacea of protection, but for many it is a very effective way to root out offending processes and settings files--a crucial first step to curing the infection.

Tuesday, May 19, 2009

Saturday, May 16, 2009

find webcams using google

|| Find live webcam from google ||


And still they dont realize they are being watched......

type in google ...

-----------------------------------------------------------------------------------------------------
inurl:"view/index.shtml"
inurl:/view.shtml
intitle:”Live View / - AXIS” | inurl:view/view.shtml^
inurl:ViewerFrame?Mode=
inurl:ViewerFrame?Mode=Refresh
inurl:axis-cgi/jpg
inurl:axis-cgi/mjpg (motion-JPEG)
inurl:view/indexFrame.shtml
inurl:view/index.shtml
inurl:view/view.shtml
liveapplet
intitle:”live view” intitle:axis
intitle:liveapplet
allintitle:”Network Camera NetworkCamera”
intitle:axis intitle:”video server”
intitle:liveapplet inurl:LvAppl
intitle:”EvoCam” inurl:”webcam.html”
intitle:”Live NetSnap Cam-Server feed”
intitle:”Live View / - AXIS”
intitle:”Live View / - AXIS 206M”
intitle:”Live View / - AXIS 206W”
intitle:”Live View / - AXIS 210?
inurl:indexFrame.shtml Axis
inurl:”MultiCameraFrame?Mode=Motion”
intitle:start inurl:cgistart
intitle:”WJ-NT104 Main Page”
intext:”MOBOTIX M1? intext:”Open Menu”
intext:”MOBOTIX M10? intext:”Open Menu”
intext:”MOBOTIX D10? intext:”Open Menu”
intitle:snc-z20 inurl:home/
intitle:snc-cs3 inurl:home/
intitle:snc-rz30 inurl:home/
intitle:”sony network camera snc-p1?
intitle:”sony network camera snc-m1?
site:.viewnetcam.com -www.viewnetcam.com
intitle:”Toshiba Network Camera” user login
intitle:”netcam live image”
intitle:”i-Catcher Console - Web Monitor”


------------------------------------------------------------------------------------------------------

Wednesday, May 6, 2009

Free calls PC to Mobile

Free Calls computer to phones


Yes, its possible to make free calls from computer to phones all over world.

EVAPHONE  provides you facility to make free calls from PC to Phone with out any cost...!!

but also some ristriction some time limits are there to make calls all over world...

I make free calls so i can say that this is trusted site also you can......!!!

not need to make accont...just dial number & get benifits....!!

eva-phone-free-call





LINK :: www.evaphone.com




When it comes to calling you don’t have to download or install anything, simply dial the country code and the number where you want to call.

Features:

  • Make free short calls to any landline or mobile worldwide.

  • Duration of free call depends on location and the line provider.

  • See free call destination list and the amount of free minutes here.

  • No sign up or registration needed.

Monday, May 4, 2009

Hotelicopter | The Flying 5 Star Hotel Pictures and Video

hotelicopter-flying-hotel-helicopte

Wow, the flying hotel and largest helicopter in the world, Cool! The Hotelicopter is modeled on the Soviet-made Mil V-12, of which there were only two prototypes ever made. The Hotelicopter Company purchased one of these prototypes from the Mikhail Leontyevich Mil helicopter plant in Panki-Tomilino, Russia in 2004 and have been engineering the world's first flying hotel ever since."The Hotelicopter features 18 luxuriously-appointed rooms for adrenaline junkies seeking a truly unique and memorable travel experience.

Each soundproofed room is equipped with a queen-sized bed, fine linens, a mini-bar, coffee machine, wireless internet access, and all the luxurious appointments you'd expect from a flying five star hotel. Room service is available one hour after liftoff and prior to landing."

The Hotelicopter is due to fly maiden journey this summer(June 26th) with an undisclosed price...If you have interesting? There is three fly tour. Inaugural Summer Tour - 14 days (Friday, June 26th, 2009 - Friday, July 10th, 2009)California Tour - 14 days (Friday, July 17th, 2009 to Friday, July 24rd, 2009) Bay/Jamaica, European Tour - 16 days (Friday, July 31st, 2009 to Sunday, August 16th, 2009)

hotelicopter-flying-hotel-helico-5
hotelicopter-flying-hotel-helico-4
hotelicopter-flying-hotel-helico-3

The Specifications

Dimensions Length: 42 m (137 ft)
Height: 28m (91 ft)
Maximum Takeoff Weight: 105850 kg (232,870 lb)
Maximum speed: 255 km/h (137 kt) (158 miles/h)
Cruising speed: 237 km/h (127 kt) (147 miles/h)
Original Mi Range: 515 km (320 mi)
Our augmented Mi Range - 1,296 km (700 mi)







hotelicopter-flying-hotel-helico-2

hotelicopter-flying-hotel-helico-11

BSNL 3G Card | Buy BSNL 3G Card Features Bharat Sanchar Nigam Limited 3G Data Card Specification and Latest Information

[caption id="attachment_118" align="aligncenter" width="356" caption="BSNL 3G Card | Buy BSNL 3G Card Features Bharat Sanchar Nigam Limited 3G Data Card Specification and Latest Information"]BSNL 3G Card | Buy BSNL 3G Card Features Bharat Sanchar Nigam Limited 3G Data Card Specification and Latest Information[/caption]

BSNL (Bharat Sanchar Nigam Limited) and Micromax has entered an agreement on 18th March for the sale and distribution of 3G data cards. Micromax has launched data cards in the USB form factor. The product weighs less than 50 gm and can be used with both laptop and desktop.


The 3G card is compatible with some versions of Windows and Mac 0s. 3G services in BSNL are currently available in 11 cities, and the company plans to increase this to 700 cities in the next 2 to 3 months.


Data Card is currently available in Jalandhar, Ambala, Jaipur, Agra, Lucknow, Patna, Haldia, Durgapur, Shimla and Dehradun added. BSNL and another PSU MTNL was got the 3G spectrum last year prior to the auction for private parties.
BSNL Data Card Specifications :

  • Protocol - CDMA2000 1X RTT

  • Power consumption - =3W

  • Weight - Approx. 38g

  • Power supply - 3.3V/1000mA, from PCMCIA slot

  • working frequency - 824MHz~849MHz/869MHz~894MHz(Uplink/Downlink) Dimensions - 88.4 mm (D) x 54 mm (W) x 5 mm (H)


BSNL Data Card Features :

  • Air interface: CDMA2000 1X RTT, compatible with IS-95 A/B

  • Data Rate : Up to 153.6kbps

  • Retractable antenna

  • Perfect statistics of a current connection flow and the accumulative total flow (with statistic reset);

  • Voice and SMS

  • Supporting ROMSIM/R-UIM card

  • Interface : (PCMCIA) type

  • Large-capacity Phone Book

  • Operating System supported : Windows2000/XP

  • Support Incoming Calling Display, Ring Prompt, call Receiving while Data Service Online (for this function Call Waiting service must be activated)

vodafone zoozoo wallpapers

NEW ZOOZOO WALLPAPERS ADDED

During DLF IPL seasonVodafone has done it, they found perfect replacement for their little doggie (pug) advertisement with ZooZOo characters.These are cute, white and slim characters having all the fun and showcasing different features of Vodafone service. Vodafone being official DLF IPL sponsor, you can see these ads during IPL match breaks.

Click On Image To Download Wallpaper...........

zoozoo10zoozoo11


zoozoo11 zoozoo21

zoozoo3 zoozoo4

zoozoo5 zoozoo6

zoozoo7zoozoo8

zoozoo9




How Zoozoo characters are made?


No, they aren’t animated characters. They are human beings who were made to wear body suits. “The design of the characters is such that one gets fooled into thinking it is animation,” shrugs Rao, which was indeed the very illusion that had to be created. “In a sense, it is ‘live’ animation!” he quips, referring to the fact that it was all shot live.

Prakash Varma, ad filmmaker, Nirvana Films, has directed the commercials, and reveals that the Zoozoos were a big challenge to create. The practical aspects of how they will move, talk, gesticulate and emote were very important. Essentially, costume design and artwork were crucial elements.

This Is my ZOOZOO

myzoozoo