Showing posts with label PC Security Tips. Show all posts
Showing posts with label PC Security Tips. Show all posts

Friday, 10 April 2020

Folder Options Missing?? - Do you Need help!


Folder Options Missing??
              Many of us sometimes find the folder options missing in windows explorer due to some virus or trojan effect.
Here's the solution-->

Open Run and then type "gpedit.msc".
Now goto User Configuration > Administrative templates > Windows Component > Windows Explorer.
Click on Windows Explorer you will find the 3rd option on the right side of screen "Removes the Folder Option menu item from the Tools menu"
Just check it, if it is not configured then change it to enable by double clicking on it and after applying again set it to not configured.

I hopes that you will find the option after restarting windows..

By Tricks101.blogspot.com with 3 comments Read More...

Sunday, 10 April 2011

Browse anonymously using Torpark Browser – For downloading multiple files Rapidshare Hacking


Hacking Rapidshare for downloading multiple=

In this post I have a new Rapidshare hacking tip for you. Well, you might be aware of Browsers like Firefox, or Internet Explorer. I would like to introduce you to a browser known as Torpark Browser, which works as a anonymous web browser. It is like a proxy browser where you can change your permanent IP Address  to dynamic IP Address. So, when ever you run this browser you get a new IP address.  Now download mutliple files at the same time. Yes you read it right, you can download multiple rapidshare files or megaupload, hotfile files at the same time. You can even skip or bypass the time limit on downloading files. The most amazing thing is IDM works with this browser.
Note: You need to close the browser window after each download coz it will reset the ip address.
Description of Torpark Browser:
Torpark Browser for surfing anonymously
As a way of avoiding spyware and pop-ups, Torpark successfully allows you to surf the Web anonymously, although the publisher warns of possible connection slowdowns.
The self-extracting file installs quickly, and you can run it from your hard drive, or as the publisher suggests, from a jump drive. Torpark adds to your browser’s toolbar a few unobtrusive buttons, which allow you to activate/deactivate the tool and configure its privacy settings according to your specifications. The tool effectively restricts pop-ups; blocks surreptitious installations of adware, spyware, and cookies; and hides any traces of your surfing. You can check the Torpark Tools menu while visiting a site and build a list of blocked items for the current page; from the same list box, you may add to a white list any or all of the displayed items.
The publisher cautions that using Torpark may slow your Internet connection speed, particularly if you’re using a dial-up, but we noticed no slowdown during our tests. Torpark is free, easy to use, and suitable for all users interested in protecting their privacy while visiting Web sites.

By Tricks101.blogspot.com with No comments Read More...

Delete Autorun.inf Virus Manually using just Winrar


Once it happened to a friend of mine, when his newly bought laptop was infected with this autorun.inf virus. This virus corrupted almost all the  drives on the Hard disk, and when ever he tried to double click on the drive or opening  any drive it opened in a new window. In some cases, when your drive is infected with this Autorun.inf virus, you won’t be able to access the drive completely. You have to browse the drive by Exploring it i.e; Ctrl+E keys from the keyboard.
Remove autorun.inf virus from windows
Sometimes ever you will not be able to see hidden files even if you have Show hidden files Enabled under Folder Options. well, this are all the wonders of this Autorun.inf virus.
I am going to show you this rare method of removing Autorun.inf manually using just winrar application, not any antivirus or malware programs.
Solution to Remove Autorun.inf Virus
Step 2: Open Winrar.exe  (Start–>All Programs–>WinRar–>WinRar.exe)
Step 3: Now Browse to any drive that is infected with Autorun.inf virus using winrar explorer.
Step4: Here you will see all the hidden files under winrar for that particular drive.
Step 5: Look for the file Autorun.inf and open it using notepad.
Step 6: In that Autorun file, some .EXE file will be mentioned that will be executed along with the autorun file. This exe file is the main culprit.
Delete Autorun.exe virus file
Step 7: Note the exe file mentioned in the Autorun.inf file. Close this Autorun.inf file.
Step 8: Now look for that .Exe file in the drive (Ex: c:/), Delete that .exe file along with Autorun.inf
Step 9: Restart your Operating System. Now your system is free with Autorun.inf Virus.
Note: Repeat the same process if your Usb or Pendrives are infected with Autorun.inf virus.
If you know anyother method to remove autorun virus from windows operating system, them kindly let me know by posting your method using the Comments on this post.

By Tricks101.blogspot.com with No comments Read More...

Secure Yourself from Hackers & Hijackers


Hackers and Browser Hijacking is one area of the Net that affects everyone at some stage.

In addition to having third party utilities such as SpyBot, Anti Virus scanners and firewalls installed there are some changes that can be made to Windows 2000/XP. Below are some details to make your system safer from hackers and hijackers.

Some of these tips require editing of the Registry so it is wise to either backup the registry and/or create a Restore Point.

1. Clearing the Page File at Shutdown
Windows 2000/XP paging file (Sometimes called the Swap File) can contain sensitive information such as plaintext passwords. Someone capable of accessing your system could scan that file and find its information. You can force windows to clear out this file.

In the registry navigate to HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory Management and add or edit the DWORD ClearPageFileAtShutdown. Set it to 1.

Note that when you do this, the system will take much longer to shut down: a system with a really big Page File (! Gig or more) may take a minute or two longer.

2. Disable the POSIX and OS/2 Subsystem.
Windows 2000 and XP come with little-documented subsystems it at allow compatibility with UNIX and OS/2 systems These rues systems are enabled by default but so rarely used that they are best off bring disabled completely to prevent possible service hijackings.

To disable these subsystems, open the registry and navigate to HKEY LOCAL MACHINESYSTEMCurrentControlSetControlSession ManagerSubSystems. Delete the subkeys Os2 and Posix. then reboot.
 
3. Never leave default passwords blank.
On installation, Windows 2000 sets up an Administrator account with total system access and prompts for a password. Guess what: by default, it allows that password to be blank. If a user doesn't want to type a password, he can simply click Next and the system will be an open door for anyone who wants to log on. Always opt for a password of some kind when setting up the default account on a machine.

4. Disable the Guest account
Windows XP comes with a Guest account that's used for limited access, but it's still possible to do some damage with it. Disable it completely if you are not using it. Under Control Panel, select User Accounts, click on Guest Account and then select Turn Off the Guest Account.

5. Install Windows In a different directory.
Windows usually installs itself in the WINDOWS directory. Windows NT 4 0 and 2000 Will opt for WINNT. Many worms and other rogue programs assume this to be the case and attempt to exploit those folders files. To defeat this install Windows to another directory when you're setting it up - you can specify the name of the directory during setup. WINDIR is okay; so some people use WNDWS - A few (not that many) programs may not install properly if you install Windows to another folder but t hey are very few and they are far between

6. Fake out hackers with a dummy Administrator account
Since the default account in Windows 2000 is always named Administrator, an enterprising hacker can try to break into your system by attempting to guess the password on that account. It you never bothered to put a password on that account, say your prayers.

Rather than be a sucker to a hacker, put a password on the Administrator account it you haven't done so already. Then change the name of the Administrator account. You'll still be able to use the account under its new name, since Windows identifies user accounts by a back-end ID number rather than the name. Finally, create a new account named Administrator and disable it. This should frustrate any would -be break-ins.

You can add new accounts and change the names of existing accounts in Windows 2000 through the Local Users and Groups snap in. Right-click on My Computer, select Manager, open the Local Users and Groups subtree, look in the Users folder and right-click on any name to rename it. To add a new user, right-click on the containing folder and select New User. Finally, to disable an account, double-click it, check the Account is disabled box and click OK.

Don't ever delete the original Administrator account. Some programs refuse to install without it and you might have to log in under that account at some point to setup such software. The original Administrator account is configured with a security ID that must continue to be present in the system.

7. Set the Hosts file to read-only to prevent name hijacking.
This one's from (and to a degree, for) the experts. The HOSTS file is a text file that all flavors of Windows use to hold certain network addresses that never change. When a network name and address is placed in HOSTS, the computer uses the address listed there for that network name rather than performing a lookup (which can take time). Experts edit this file to place their most commonly-visited sites into it, speeding things up considerably.

Unfortunately hijackers and hackers also love to put their own information into it - redirecting people from their favorite sites to places they don't want to go. One of the most common entries in HOSTS is local host which is set 1770.0.1. This refers to the local machine and if this entry is damaged the computer can behave very unpredictably.

To prevent HOSTS from being hijacked, set it to read-only. Go to the folder %Systemroot%system32driversetc, right-click on HOSTS, select Properties check the Read-Only box and click OK. If you want to add your own entries to HOSTS, you can unprotect it before doing so, but always remember to set it to read-only after you're done.

8. Turn off unneeded Services
Windows 2000 and XP both come with many background services that don't need to he running most of the time: Alerter, Messenger, Server (If you're running a standalone machine with no file or printer shares), NetMeeting Remote Desktop Sharing, Remote Desktop Help Session Manager (the last two if you're not using Remote Desktop or NetMeeting), Remote Registry, Routing and Remote Access (if you're not using Remote Access), SSDP Discovery Service, Telnet, and Universal Plug and Play Device Host.
A good resource and instruction on which of these services can be disabled go to /http://www.blkviper.com/WinXP/

9. Disallow changes to IE settings through IE
This is another anti hijacker tip. IE can be set so that any changes to its settings must be performed through the Internet icon in the Control Panel, rather than through IE's own interface. Some particularly unscrupulous programs or sites try to tamper with setting by accessing the Tools, Options menu in IE. You can disable this and still make changes to IE's settings through the Control Panel.

Open the Registry and browse to HKEY_CURRENT_USER SoftwarePoliciesMicrosoftInternet ExplorerRestrictions. Create or edit a new DWORD value named NoBrowserUptions and set it to 1 (this is a per-user setting). Some third-party programs such as Spybot Search And Destroy allow you to toggle this setting.

You can also keep IE from having other programs rename its default startup page, another particularly annoying form of hijacking. Browse to HKEY.CURRENT USERSoftwarePolicies MicrosoftInternet ExploreControl Panel and add or edit a DWORD, Homepage and set it to 1.

10. Disable simple File Shares.
In Windows XP Professional, the Simple File Sharing mode is easily exploited, since it? a little too easy to share out a file across your LAN (or the NET at large). To turn it off, go m My Computer, click Tools, Folder Option and the View tab, and uncheck Use Simple file sharing (Recommended). Click OK. When you do this you can access the Security tab in the Properties window for all folders; set permissions for folders; and take ownership of objects (but not in XP Home)

By Tricks101.blogspot.com with No comments Read More...

Maintain your System healthy and error free


 Maintaining your computer is the key to keeping it healthy and fully working and of course, fast. Windows 95 has most of the tools for maintaining your PC, but Windows 98 extends the possibilities and makes it even less of a hassle.  If you follow the list below and run the programs listed frequently, you will be guaranteed to have a maintained computer at no extra cost. There are, however, other programs in the market with stronger engines, but then again, they're not free (stop smiling...)
Most of these programs can be found under the Start, Programs, Accessories, System Tools folder. 

1. Disk Defrag: It is advisable to run Defrag under Windows 95 once a month or when you add/remove programs. However, under Windows 98, you can run it every week if you want because it has a new engine, which means that the more you run it, the faster your computer will get. What happens is that your programs are placed on your hard disk in a way so that the ones you use most often are easier for the hard disk to find and run.  Make sure that the 'make my programs run faster' is ticked in the 'Settings' window in Defrag.

2. Scandisk: Running a thorough check is good once a month in both Windows 95 and 98. Run this once a month if you feel that your hard disk takes a long time to load programs.  A standard check is very fast and checks for basic disk problems concerning files and folders and lost fragments.  It takes an average 2 minutes to complete so try running it often.

3. Disk cleanup: This one is good for seeing how much disk space is being used up by unnecessary files that are in the recycle bin, temp folder, or in temporary internet folders.  You can then remove them!

4. RegClean: A simple but effective piece of software this is. You can download it for free from Microsoft's web site. It is also available on many magazine cover disks. Reg Clean takes about a minute to check the registry. Then it asks whether you want to clean out redundant or orphan file. This usually helps the computer to get rid of files that have been left behind by uninstalled programs.

5. Windows update: It's a good idea to use Windows Update to make sure your computer has all the latest fixes, patches and updates.  You can do so by clicking on its icon in the Start Menu under Windows 98.

6. Tweak ALL: A very handy program that allows to change settings, which cannot be changed using Windows alone!

By Tricks101.blogspot.com with No comments Read More...

Free SMS Alerts:
Get daily updates of latest computer tips and tricks by SMS.
Subscribe Now