Author: raymond

  • Scan Your System for Windows Security Vulnerabilities

    From the days of Windows 98, we all know that the Windows operating system is always vulnerable to malicious attacks and security bugs and this situation is just as relevant today as it’s ever been, perhaps even more so. That’s why you need to constantly check for updates in Windows Updates to patch any security holes that have been discovered. Microsoft comes out with new updates every month known as ‘patch Tuesday’ because they are usually released on the second Tuesday of every month.  There are a few ways to obtain Windows Security Update patches and make sure your system is protected, thus closing the security holes and any attempt to exploit them.

    The easiest and most simple way is using the Windows built in Automatic Updates function which will automatically check and download any updates at a specified day and time. Although the patches usually get released once a month, if high security risks are found or patches to prevent major web based attacks are needed, they will be released immediately.

    Windows Automatic Updates

    If you don’t like Windows to constantly connect to Windows Update and you have XP, then you can manually visit the Windows Update website and either select Express or Custom checking method. Windows Vista and 7 users have an easier time doing this as the option to manually update is done through the Windows Update function in the Control Panel.

    Manually Update Windows

    There is another way to check if you are missing any important security updates, and that is to use Protector Plus – Windows Vulnerability Scanner.

    Protector Plus – Windows Vulnerability Scanner checks your system for Windows Vulnerabilities. It guides you to update with the right patch to make your system secure. It’s less than 1MB and a portable standalone executable so all you need to do is download and run it. Click on the Yes button to start scanning your Windows right away or clicking No will show a window with your system’s information such hard drive space, memory usage a few stats about the current Windows install.

    Protect Windows from Vulnerability

    Once the Scan is completed which takes no more than a couple of seconds, Protector Plus – Windows Vulnerability Scanner lists the vulnerabilities detected, their risk level and the Microsoft security bulletin number with a link to the download location of the patch. It also creates the log file named Protector_Plus_Windows_Vulnerability_Scan.htm at the same location where Protector Plus – Windows Vulnerability Scanner was executed. This is basically an html version of what is displayed in the window.

    Protect Windows from Vulnerability

    Protector Plus – Windows Vulnerability Scanner is free to use. This software is compatible with Windows XP , Windows 2000, Windows 2003, Windows Vista and Windows 7.

    It’s a tool which is pretty useful for people like me. I don’t use Automatic Updates and for some unknown reason Windows Update doesn’t work properly for me. When I visit Windows Update and click on Custom, I will only see the bar moving and that’s it. It never display what hotfix my Windows is needed to install. The drawback of this free tool is that it doesn’t have LiveUpdate feature. The program is updated by Proland Software every month to detect new vulnerabilities, so you need to download a new version and manually run the Windows Vulnerability Scanner every month. Might not be the best way to check for hotfixes, but it’s my preferred method.

    Download Protector Plus – Windows Vulnerability Scanner


  • 5 Free Automatic Kill Switches for Unexpected VPN Disconnection

    If you think that you’re the only user on your computer and nobody is watching what you’re doing on the PC or what kind of websites you visit, you may be wrong because there is a possibility that your Internet Service Provider or the government is monitoring your online activities. More and more users are aware of the privacy risk and are willing to spend a little bit of money in subscribing to a VPN service to protect their privacy by encrypting the Internet connection.

    Once you’re on a VPN connection, all your incoming and outgoing data is encrypted and routed to the VPN server. This effectively prevents your ISP or the government from monitoring your online activities. Unfortunately nothing is perfect because there is always the possibility of a leak that will reveal your real IP address. Let’s say you’re downloading sensitive material through BitTorrent and you think that you’re safe because you’re connected to a VPN. When your VPN connection suddenly disconnects, you are instantly routed back to your normal connection and your BitTorrent client will automatically resume downloading through your direct Internet connection.

    liquid lock

    This is why some people still receive DMCA infringement notices from their ISP even though they are connected to a VPN. There are some VPN service providers like LiquidVPN that solve the problem by implementing a kill switch feature known as Liquid Lock whereby all connections are automatically blocked when it detects a disconnection. Another well known method is by terminating the selected application when the VPN disconnects. If you’ve already subscribed to a VPN service that doesn’t come with a kill switch feature, here are 5 ways to implement one yourself to prevent the potential IP leak without messing with confusing firewall configurations.
    (more…)

  • 5 System Rescue Boot Discs based on Windows PE

    A boot disc is very useful because it can be used to perform troubleshooting tasks on an unbootable computer. Most of the time software that belongs in the category of data recovery, antivirus and hard drive backup/restore provides the option to create a boot disc which is sometimes known as rescue disc. Although these software can run from Windows, they are actually most efficient when run offline from a bootable disc.

    An example scenario is you’ve accidentally deleted an important file. You can of course install a free data recovery software such as Recuva and attempt to recover the deleted file. However installing it on the computer will face a potential risk of the installed program overwriting the deleted file. To increase the chance of recovering the file, immediately shut down the computer, boot it up with a bootable WinPE disc and run Recuva from the Windows PE environment.

    A boot disc is normally based on either Linux or Windows PE. Linux is commonly being used because the operating system and most third party tools are free, the generated boot disc is more compact in size and can run on slower computers. As for Windows PE, it has the best hardware support and most users would be familiar with it such as the hard drive naming convention (C:\) in Windows compared to Linux (/dev/sda). However, Windows PE may have a higher system requirement because the latest Windows PE 5.1 already need at least 512MB just for the base and adding more drivers, packages, or apps will obviously require more memory.

    Here we have a list of free boot discs based on Windows PE that come with a collection of useful tools which we think that every computer technician or even a normal user should have to hand.
    (more…)

  • Manually Update AVP Tool Kaspersky Virus Removal Tool Signature Databases

    Kaspersky is well known for their antivirus and internet security software which effectively protects the computer from cyber threats such as malware in real time. It is not unusual for Kaspersky to be rated as one of the best if not the best by independent antivirus testing groups such as AV-TEST, Dennis Technology Labs and Virus Bulletin’s VB100. As good as it is, unfortunately Kaspersky does not offer a free version of their antivirus software unlike AVG, Avast and Avira for personal and non-commercial use.

    They do however offer a free on-demand scanner called Kaspersky Virus Removal Tool, also known as AVPTool that can scan system memory, hidden startup objects, disk boot sectors, email, and hard drives for malware. Since it is an on-demand scanner, it does not automatically protect your computer in real time but you can use it to run a full scan whenever you want without fearing that it will conflict with a different antivirus software that is installed in Windows.

    kaspersky virus removal tool

    The only annoyance that we find in Kaspersky Virus Removal Tool is it does not come with an auto updater to download the latest virus definitions which means you are advised to download the new installer at 137MB in size whenever you want to run a scan with the latest signature database. An updated installer with the latest virus definitions is created every 2 hours.

    In this article we’ll show you how to manually perform an incremental update for the Kaspersky Virus Removal Tool virus definitions to prevent redownloading the huge installer, saving both time and bandwidth.
    (more…)

  • 5 Ways to Remount Ejected or Safely Removed USB Device Without Unplug and Reinsert

    In a Windows operating system, it is a safe practice to always use the “Safely Remove Hardware and Eject Media” to eject a plugged in USB flash drive instead of directly pulling it out to prevent any opened files from being corrupted. Doing this will also trigger Windows to enable the dirty bit on the flash drive where Windows will automatically prompt to scan the drive for error the next time you plug it in. If Windows found corrupted files during check disk, it will simple convert them into .CHK files that can only be recovered via third party tools.

    Although Windows provides a safe and convenient way to safely eject your USB flash drive, there are no options to easily remount or reconnect the ejected drive. It seems like the only way is to unplug the drive and reinsert it into the USB port for Windows to re-detect and re-mount the USB flash drive. This can be very troublesome if the device is connected to the USB port located at the rear of the computer.

    Fortunately there are a few workarounds to remount an ejected USB device without unplugging and reinserting into the USB port, and here are 5 ways to do it.
    (more…)

  • Top 10 Free Macro Automation Software for Computers to Perform Repetitive Tasks

    There are times when you need to do something over and over again on the computer which is very time consuming and tedious. One simple example is the need to transfer a lot of data from an Excel spreadsheet into a database management system (DMBS) and it cannot import the data from the XLS file. Instead of hiring a team of people to do the data input or a programmer to write a custom importer, you can actually rely on a piece of “Macro” software to automatically do it for you.

    Macro software can be used to create a series of actions to help in automating tasks. It can be as simple as clicking a button to record your keyboard and mouse actions but it can also be very advanced where you get to write your own sophisticated macro script for play back. You can find both free and paid macro software, the free macro software is easier to use with less features while the paid versions support more commands and activations.

    Here we have a list of our top 10 free macro software which can make your computer perform repetitive tasks.
    (more…)

  • 3 Ways to Use One UPS on Multiple Computers

    Most computer users would know that properly shutting down a desktop PC is very important to prevent your files from getting corrupted and it also minimizes the risk of damaging the hard drive. However, there are times when things are just out of your control such as an unexpected power failure or your kid pulling the plug out of the socket which causes a forced shut down. One way to keep your computer running when there is no electricity, giving you enough time to properly shut down your computer, is by using a battery backup known as Uninterruptible Power Supply (UPS).

    A more affordable lower range home based UPS normally has a few battery protected and surge-only outlets but with only 1 USB connection. The USB is for the UPS to tell the computer how much power is left on the battery so you can then either use the UPS manufacturer’s software or from the Windows power options perform a graceful shutdown before the battery is depleted. This would mean only 1 computer can know when the battery level is low and auto shutdown the computer but the rest of the computers connected to the other remaining battery protected outlets won’t know and cannot be configured to automatically shutdown.

    UPS with multiple battery protected outlets

    In this article we’ll show you a couple of ways on how you can use one UPS on multiple computers and automatically shut down all the computers that are connected to that one single UPS.
    (more…)

  • 12 Software to Turn your Computer into Video Surveillance System

    Webcams are very common nowadays and most, if not all modern laptops come with one built-in at the top center above the screen. It can be used for a lot of different purposes such as making a video call (chatting, demonstration, conference, webinar), taking pictures of yourself and even logging in to a computer using face recognition.

    A webcam can also be used as a surveillance camera by installing the correct software and configuring it to automatically record videos, notify you via email and perform custom actions when a motion is detected. This allows you to setup a powerful home based CCTV to monitor a section of your home which is most likely a source of break-ins without spending unnecessary money to install an expensive complete home surveillance system.

    There’s a number of software applications that can turn your computer and webcam into a surveillance system, each has its own pros and cons with different features. There are some that are difficult to configure which are meant for more advanced users while there are also user friendly ones that are lightweight. Below you can find our recommended list of 12 free webcam monitoring software based on your needs.
    (more…)

  • What is the BEST Anti Keylogger and Anti Screen Capture Software?

    Security experts consider keylogging as the most dangerous threat because it allows cyber criminals to capture everything you type on your keyboard. This includes passwords so that they can gain access to your online accounts such as your email, banking, forums, websites and etc to steal valuable information. If keystroke logging is not damaging enough, your webcam, screen, clipboard and microphone can also be secretly captured and logged without your knowledge.

    There are a couple of different methods to protect yourself against keyloggers. First you can use an on-screen virtual keyboard where your mouse will be used to select the keys when entering your password instead of typing it from the physical keyboard that is logged. A good antivirus can also recognize some of the known and unknown keyloggers through virus definition or heuristic analysis. Finally, a dedicated anti keylogging tool that constantly monitors the behavior of running applications and notifies you if it detects any potential keylogging activity.

    In this article we’ll be putting 3 anti keylogging programs named Zemana AntiLogger, SpyShelter Premium and DataGuard AntiKeylogger to the test with real keylogging tools that are popular and widely being used to determine the effectiveness of each program.
    (more…)

  • Memory Usage Test to See Which is the Lightest Antivirus Software

    One of the most common things users do to try and keep their computer running as smooth as possible, is keep control over which programs start with Windows. Having just a few memory or processor hungry programs loading into the system tray on boot can have an adverse affect on the performance of your computer. One of the most common applications that will load with Windows and stay resident in the background while the system is on, will be your chosen antivirus software. Have you ever wondered which are the lightest antivirus packages available and which ones don’t do so well on memory usage?

    It’s maybe not such a major issue for newer computers these days having an antivirus which isn’t especially memory efficient because they often come equipped with 4GB or more of RAM. But if your computer isn’t the latest and greatest, using a package which might possibly be eating hundreds of Megabytes of system memory could slow your computer down considerably at inopportune moments. To find out just how much memory gets used by running antivirus software, we’ve decided to gather together a mixture of 25 popular commercial and free antivirus packages to see how they perform.

    How We Tested

    As you might expect, testing an antivirus product for its memory usage is certainly not an exact science because the program is never standing still and nearly always doing something in the background. A problem with taking memory readings is there are several different numbers you can look at.
    (more…)

  • Top 8 Remote Access Software for Providing Online Support

    It is possible to control computers in another remote location even if it is located at the opposite side of the world by using a PC that is equipped with the software and an Internet connection. Fortunately the software to access a remote computer has been greatly simplified over the years solving many common problems such setting up dynamic DNS service to automatically point to your changing IP address, port forwarding, firewall configuration and etc.

    Remote access software can be installed for long term usage which administrators do to access their servers from home or another location to perform maintenance or troubleshooting. However, if you need to temporarily and quickly access your friend or relative’s computer to help configure a software or fix a minor problem, it doesn’t make sense to go through all the trouble in installing and configuring a full blown remote access software. A much easier way around this is to use the dedicated remote access software applications that are made to quickly and easily provide short term online support. Here are our top 8 picks that are free to use.
    (more…)

  • 15 AntiRootkits to Detect and Remove Malware that Uses Rootkit Technology

    There are many different types of computer malware and the ones that use rootkit technologies are the worst because they are hardest to detect and remove. Rootkit technology is able to hide its presence from the most basic tools built into Windows such as Task Manager, to your most trusted firewall or antivirus software and you won’t even know that it’s there. This is achieved through installing and loading kernel-mode drivers which can allow the malware to run with higher privileges.

    Although 64-bit Windows operating systems are generally safe from rootkit infection because by default the operating system only accepts signed driver files, there were previous cases where legitimate digital certificates were stolen by hackers and used to sign rootkit drivers to bypass security software and Windows defenses. Antivirus software was not much of a help either because the Stuxnet worm successfully stayed infected on the computers for years before it was discovered by VirusBlokAda, the developer of VBA32 antivirus software.

    Since antivirus software are far from being perfect in catching rootkits, we’ve put 15 dedicated anti-rootkit tools to the test and see if they are able to detect the 3 different keyloggers (All In One Keylogger, Invisible KeyLogger Stealth, Elite Keylogger) that uses rootkit technology which we have installed on our test system.
    (more…)

  • List of Free Antivirus for Commercial use in Corporate and Business

    Antivirus companies require a lot of manpower, time and resources for their software to keep up with the latest malware created by the bad guys who are always trying to be a step ahead. This is why a large proportion of antivirus software packages are subscription based that require an annual renewal payment in order to continue downloading the latest definition and engine updates. Fortunately there are quite a number of reputable and popular antivirus companies such as AVG, Avast, Avira, Ad-Aware, ZoneAlarm etc, that offers a freeware version of their antivirus software for computer users to install and protect their computer from malware.

    Although the free antivirus products are absolutely free to use, most of the time there is a catch where you will most likely find some features that provide additional protection being disabled. Other than that, the word “free” does not necessarily mean without limitations or restrictions. If you read the long and boring End User License Agreement (EULA) that is displayed during installation which most of us ignore and blindly click on the Agree button to continue the installation, it contains very important information to where you can install and use their free antivirus software. Most of the time a free antivirus is intended only for non-commercial, personal home use while academic institutions, business, commercial, corporate or government use is prohibited. You or your company can be heavily fined if it’s discovered you’re breaking the license agreement.

    For your convenience, we’ve reviewed all of the free antivirus license agreements and compiled a list of those that can be used without restrictions. The URL to the official agreement and screenshot is also included as a proof to this research.
    (more…)

  • 13 Free Tools to Optimize and Compress PNG to Reduce Image Size

    There are many types of different image formats and some of those most commonly found on the Internet are JPEG, GIF, BMP, TIFF and PNG. Each image format has its own purpose such as GIF is used for animated images, JPEG for high quality photos which automatically gets degraded after each save or even a resize, while our favorite PNG is best used on small and transparent pictures. Another huge advantage in PNG files is they’re lossless meaning you can compress PNG’s without losing quality.

    You can easily find many tools on the Internet to compress PNG files but most, if not all of them produce different file sizes due to the algorithm unless they are using the same library/technology. Reducing the image file size to the maximum helps to save bandwidth cost, time to download and even achieving a higher Google PageSpeed score because “optimize images” is one of the priorities.

    In this article we’ve put 13 free PNG compressor tools (online, command line, desktop) to the test to find the one that produces the smallest file size.
    (more…)

  • Comprehensive List of 26 Bootable Antivirus Rescue CDs for Offline Scanning

    A rescue CD is an additional tool provided by most antivirus companies to assist in removing difficult-to-remove malware without booting in to Windows. This is especially useful when the computer is so badly infected that Windows couldn’t be booted up, or is crawling really slowly and you can hardly run any diagnostic tools inside Windows to investigate and clean the virus.

    A huge advantage in using a rescue CD compared to the antivirus installed on your computer is the chances of a successful removal is much higher because the malware is inactive since Windows is not even loaded in the first place. Unlike when a virus is active on the system, it can be very resilient and block any security tools from being run, making it really difficult even for experienced users to delete it from the system.

    Rescue CD’s mostly come as an ISO image file that can be written to a compact disc (CD) or installed to USB flash drive which is then used to boot up the computer to run the live operating system in memory. Most of the rescue CD’s provided by the antivirus companies are free while there are a few that are exclusively available only to their paid customers. Here is an extensive list of 26 available rescue CD’s that can be downloaded and used for free.
    (more…)