Category: Computer

  • BitComet quick updates

    After BitComet announced their new version 0.65 two days ago, today they have a new version that is v0.66.
    BitComet v.066
    This usually happen when the author of a software missed a serious bug and had to quickly fix it and re-release a new version as soon as possible. What happened to their Beta testers?

    BitComet v0.66 Release Notes 2006.4.27
    Core Improved: more program run-time error can be detected by the crash report
    Core Bugfix: fix the bug that the sometimes program will crash when display chat message

    Grab the latest version of BitComet at the link below!
    [ Download BitComet v.066 ]

  • Access and Watch Veoh Even if Veoh Is No Longer Available in Your Country

    Veoh is a San Diego, California-based company which runs an Internet Television service allowing users to find and watch major studio content, independent productions and user-generated material for free. However, as of 31st May 2008, many countries such as Malaysia, Cyprus, Romania, Panama, Hungary, Slovenia, Kuwait, Brunei, Indonesia, Chile, Malta, Thailand, Croatia, Turkey, Ukraine, Colombia, Bangladesh has been blocked due to a low concentration of users.

    Try accessing veoh.com and you’ll get a message that says “Veoh is no longer available in COUNTRY. If you are not in COUNTRY or you think you have received this message in error, please report the issue below“. That’s all we that we see if our country is being blocked by Veoh! Nothing else!

    Veoh is no longer available in Malaysia

    I felt that Veoh is very harsh in blocking visitors according to country without providing any warning or notification first. It is very easy for Veoh to block visitor’s geographical location but it is also easy for us to continue accessing and watching Internet TV in Veoh even if we’re blocked.


    I don’t watch much TV but one of my cousin asked me if there’s a way to continue watching a Korean drama from Veoh which she has been following for a long time. In my knowledge, to bypass country blocking restriction is to mask your IP address using proxy or VPN.

    At first I tried web based proxy service such as anonymouse.org, but all I got was a similar screen saying “Veoh is no longer available in Anonymous Proxy”. Looks like not only they’ve blocked countries but also well known proxy web sites. Some other not so well known web proxy service such as privax.us and glype.com is able to let you access Veoh.com without getting the message that says Veoh is no longer available in MALAYSIA.

    Using open public proxy which you enter the IP address and Port into your browser also works but it’s very slow. You have to work hard to find a fast proxy which belongs to a country (preferably US) that is not blocked by Veoh. Here’s a site called CyberSyndrome that updates the list of proxy every hour.

    I found out that there is a way to directly access Veoh.com without using proxy. Normally veoh’s link is http://appserver.veoh.com but if you add two L’s with a hyphen in-front of appserver link, you can access the site without problems. The link will be http://ll-appserver.veoh.com/

    You can access everything in Veoh.com through ll-appserver but the video won’t play. The most it will play up to 2 seconds and stop. To play the videos, you’ll need to use a VPN service such as Hotspot Shield. Perhaps you already know about this software because it has been posted at raymond.cc before. After installing Hotspot Shield, get connected, I can access Veoh.com and also watch the videos. You can see at the image below that I am watching the latest Survivor episode from Veoh.

    Veoh is no longer available in malaysia

    Hotspot Shield currently works but it can also be easily blocked by Veoh if they want to. Another problem with Hotspot Shield is the 5GB bandwidth limit per month. If you go over it, you’ll get the error Bandwidth Limit Exceeded and will have to wait for next month until the bandwidth to reset.

    If you’re willing to fork out a bit of money for VPN service, make sure that the VPN server belongs to country such as US and also it doesn’t being flagged as Anonymous Proxy by Veoh. I have a VPN account at WiTopia and the IP address I get is a US one but it doesn’t work on Veoh as I get the message “Veoh is no longer available in Anonymous Proxy”. So make sure you that you’ve inquired from the company before purchasing their VPN service. You can also find cheaper VPN service at DigitalPoint Buy, Sell or Trade forum but I’d advice you to only sign up for short term as most of them do not even have a proper VPN company website.

    Update: If you are unable to connect using Hotspot Shield and getting Pulling Options page looping, Daemon Start Error or Bandwidth Exceeded, please refer to this article for a fix.

  • Scan Windows Registry for Product Keys, Serial Licenses and Registration Numbers

    If you want to setup your computer system again you need to have the licenses and serial numbers at hand for all the software programs that you have purchased and registered. This does include the Windows product key but also other serial numbers for applications like Nero, Office, VMWare and pretty much every other application.

    Instead of searching for the keys in your emails, manuals and receipts you could use another approach. Last month I’ve discovered SoftKey Revealer which is able to reveal the CD-Key and Serials for installed softwares on computer. It supports a huge list of software that it can recover but there are some that are not supported. Here is another sweet little application that scans the Windows Registry for Windows product keys and other serial numbers and licenses.


    The License Crawler can discover application product keys and other serial numbers or licenses very quickly and supports all versions of Windows operating system from Windows 95 to Windows Vista.

    Crawl registry for license

    It is a portable application that can be run from any location and would be a perfect fit for an USB stick. Asking clients to find serial and license keys is often very frustrating. Instead, tech support can simply run License Crawler without having to interact with the client at all. The portable file LicenseCrawler.exe is 53.5KB in size.

    NOTE: Sometimes the Microsoft serial number discovered by License Crawler doesn’t match the serial number printed on your computer. Most likely, the manufacturer used just one OEM number for all his clients, instead of an unique one for each machine.. That makes the installation of Microsoft programs onto thousands of computers easier. This also means that the serial number printed on your computer hasn’t been activated yet, allowing you some degree of anonymity.

    If you want to recover the serial numbers on a computer that is unable to boot up, just follow the instructions below.

    1. Boot up the computer with Linux Live CD or BartPE and save the following file: Windows\System32\Config\software (no extension)
    2. On another computer, open Regedit: (WIN+R) enter regedit
    3. In the Registry editor, click to select HKEY_USERS, go to File > Load Hive… and browse the “software” file which you’ve saved earlier
    4. Run the LicenseCrawler, select HKEY_USERS from the drop-down menu and click Start Search.
    5. Once finished searching, run Regedit and select “unload hive…” from File menu.

    The latest version of License Crawler which was released yesterday has a new feature where you can find CD keys on remote computers. If you run regedit, you can find “Connect Network Registry” from the File menu. I believe LicenseCrawler uses this method to connect to another computer’s registry and then search for license key. You need admin rights on the other computer for this to work.

    The difference between SoftKey Revealer and License Crawler is SoftKey Revealer depend on decrypting license key structure but as for License Crawler, it has an intelligent search method which doesn’t require maintaining any key structure. That explains why License Crawler (53.5KB) file size is 28 times smaller than SoftKey Revealer (1.51MB).

    [ Download LicenseCrawler ]

  • Easily Search for Correct Subtitle that Sync with AVI Movie

    If you’ve followed my daily articles, you should already know how to include subtitles in downloaded movies. There’s also a tool called Subcrawler which allows you to find and download subtitles from various websites. It seems easy because you only need to make sure that the .SRT subtitle file has the same file name as the AVI movie file name.

    Most common problem that many people face is the subtitle out of sync with the movie. It’s either too fast or too slow. There are many movie capping teams, so are the subtitle files and you must use the correct subtitle file with the movie. For example, you can’t use Blood.Diamond.2006.DVDRip.AC3-GoRDo.SubEng subtitle file Blood.Diamond.DVDRip.XviD-ViTE AVI movie. As you can see, it is the same movie but capped by different people (GoRDo and ViTE). So the time frame is not the same.

    To solve this problem, you either keep searching for the correct version of subtitle or some people even go to the extend of editing the subtitle file to synchronize with the video file. Now there’s no need for you to do that anymore. I discovered 2 free software which is able to detect your video file and then download the correct subtitle SRT file.


    Both 2 software uses fast hashing algorithm to determine what version of movie do you have. Then it will list out all languages and also subtitle that is uploaded by different people for you to select and download. Other than downloading subtitles, you can also upload subtitles.

    1. SubDownloader
    Subdownloader Subtitle download
    – SubDownloader is available for Windows, Linux and MacOS users. It’s very easy to use. Just download, install and run SubDownloader. At the right hand side you’ll see a few icons. The first one is for you to add a video file. Second one is for you to add a folder that contains all movie files. Third icon is to clear the contents and last one is to download subtitles. Once you’ve loaded the movie file, SubDownloader will automatically start searching for available matching subtitle. Once found, it will list the subtitles available for you to download. Check the subtitle and click the last button to download. The SRT subtitle file will automatically being downloaded to the location where you movie file is.

    [ Download Subdownloader ]

    2. Oscar
    Oscar Subtitle download
    – Oscar works the same as SubDownloader. Can’t really notice much difference in terms of functionality. There is no need to install Oscar. Just download, extract and run oscar.exe. To load a video, click on the icons at the right hand side and click the second last icon to search for available matching subtitles. Once found, you can check the subtitle that you want to download and click the last button to download. It will also place the subtitle at the same location as your video file.

    [ Download Oscar ]

  • Easily Convert PDF using Convert Doc

    As a technical guy, I always deal with lots of documentation, especially technical documents in PDF format. Somehow, your boss will never stop asking you for reports and if you just give your boss those technical documents, your boss will not accept it. He/she will ask you to draft something that can benefit the company and something that they can easily understand. However, you only given with little bit of time.

    Well, normally I will not draft the document myself in such a short period. What I will do is to take out some important points from other documents, and then insert it inside my own report. I would say this is normal and the most important is you must know what you are writing and what you trying to present to the readers. If the source documents is in Word format, that will be a lot easier for you to perform the above activity, but if the source document is in PDF format, there will be some difficulty. Also, you may face some hard time to do formatting after you copy the content from PDF source.


    Convert Doc is a program that can easily convert PDF file into Word, Rich Text format, or HTML format. Not only it can allow you to convert the PDF to Word, also, it provides additional features such as provide ‘special processes’ apply on the source file. With this feature, you are able to remove empty lines from the source document, search and replace words inside the document, and the most interesting one will be ‘append (concatenate) files’. Unfortunately, all these features are not available for PDF files. The only thing you can do is to convert the PDF file to Word file one by one and after that make use of all these features to apply on all the converted Word documents.

    It is very easy to convert PDF to word document using Convert Doc. Simply follow the below steps:

      1. Download and install the program on your computer.
      2. Launch Convert Doc.
      3. Select option ‘Convert Files’, and then specify ‘Conversion Method’ to option Convert from PDF to ???
      4. Under ‘Input File(s)’, browse to the PDF you want to convert
      5. Specify your output files, and then just click on ‘Convert’ button at the top.

    After that, you can browse to the output directory to get your ‘converted’ document. Besides that, you can also use command line on Convert Doc to convert documents. If you like it, please grab it from below URL and it is FREE!
    Download Convert Doc

  • How to make ‘Now Playing’ in Windows Live Messenger work with nearly any media player

    Not everyone in the world uses Windows Media Player, for reason of their own choosing. Some refuse to use it for it’s sound quality and lack of custom settings in controlling it, others find it’s lack of codecs a painful reminder of how bad a mass developed music player can be. Personally, my choice of using AIMP2 is due to how Windows Media crashes over the simplest things, and can not handle the entire volume of my music as it is in a multitude of different formats, from FLAC to OGG to MP3 to WAV.

    However, over previous months, I have always wondered how come Windows Live users and MSN users had to use WMP for their ‘Now Playing’ to work, but no other media players could work out of the box. It’s been a feature that has upset me and eluded answer for a while, as I’d like to show off what I’m listening to, too. Shouldn’t we all be allowed to share our favorite tunes? While this isn’t something that a lot of people might want to consider, there is a way to make the mass majority of the players out there work with Now Playing.


    Introducing AMIP, also known as Advanced mIRC Integration Plug-in. While it no longer is an IRC-only plug-in, it is what we are going to use to provide Now Playing compatibility with Windows Live Messenger. Simply download the version that works with your media player (It supports iTunes, WinAmp and players that use WinAmp plugins, FooBar, and QCD/QMP) and direct it to where your media player is installed. It will install a plug-in that provides the functionality without having to trade off to a different media player. If you’re not happy with the preset options, you can always change it by installing the configurator (which requires Java) and modify it from there.

    Windows Live Messenger Now Playing

    As you can see, I have managed to fool Windows Media Player into thinking I’m using Windows Media Player, but in fact, it’s AIMP2, as the screenshots show. You can also add onto other messaging clients or other IRC clients, or if you really so choose, make a dynamic signature for yourself. All of this done by one simple script. The documentation really is dead simple to follow and I’d highly recommend that if you’d like to get into the heavier customization of AMIP Now Playing, that you look it over before modifying it too far. But if you just need the basic functionality of AMIP without tweaking, it’s just a simple download, unzip, install to your plugins folder, and start your Now Playing on Windows Live Messenger. A note for Windows 7 users, you must have Windows Media Player installed and not removed, or this tip will not work for you.

    AMIP Now Playing Download Page
    AMIP Now Playing Documentation

  • How To Beat Keyloggers To Protect Your Identity

    Prevent Computer Theft keyloggersKeyloggers, a short word for Keystroke Logging, is a very scary system that hackers can use to secretly monitor and capture all keystrokes, mouse clicks, passwords, visited web-pages and launched applications; tracks received and sent e-mails and lots more. It can even takes screenshots of the computer activity! Keystroke logging can be achieved by both hardware and software means. Hardware key loggers are commercially available devices which come in three types: inline devices that are attached to the keyboard cable, devices which can be installed inside standard keyboards, and actual replacement keyboards that contain the key logger already built-in. If you search “keyloggers” in Google, you’ll find tons of results. There are free keyloggers and also paid keyloggers which offers much more advanced keylogging system.

    You will not notice the presence of such program. It is invisible in the Task List (when you press Ctrl-Alt-Del). It will not show in Task Bar, let alone your Desktop. It does not make any noise, your system will not slow down as in the case of spyware. But the key logger silently records all the keystrokes and puff — before you know it, your password has been changed and your credit card number has been used to make fradulent purchases.

    Some people use keyloggers for good purposes and some abuse it. That’s why we need to learn how to beat the keyloggers in order to protect our information from being stolen. If you think you don’t have keylogger on your system, then it might have one. You can only be sure that you are safe from keyloggers after you’ve read this article.


    Web Based On Screen Keyboards
    Some website such as Citibank has an on-screen javascript keyboard which you can use your mouse to click the character. This way, you can avoid using your keyboard. There is no need to install anything because everything is loaded from the website. If you’d like to implement an on-screen keyboard on your website, please visit the links below.
    1. JavaScript Virtual Keyboard by Dmitry Khudorozhkov.
    2. Javascript VirtualKeyboard by WingedFox.
    – In my opinion, WingedFox’s Javascript VirtualKeyboard is much better than Dmitry’s JVK.

    Program On Screen Keyboards
    If you want to use an on-screen keyboard on a website but the on-screen keyboard is not available, you can download and use program type of on-screen keyboard. Usually the on screen keyboard program is very small in size and free to use.

    1. Neo’s SafeKeys
    Prevent Keylogger
    – Neo’s SafeKeys is only less than 8KB. You type your password by clicking each button on the keyboard of this application (with your mouse). Your password will appear, letter by letter, in the text box at the bottom of the window (within a “******” password mask). Select the text with your mouse and then drag-drop it onto the password box on your online form. Good thing about Neo’s SafeKeys is the utility changes width and height each time, as well as its placement on the screen (to fool mouse-loggers, buttons will always be in different positions each time you use the program). Nothing is stored in the clipboard (clipboard loggers cannot save the password). You can use upper-case letters and symbols (such as !@#${}) by pressing the CAP button – no matter how complex your password is, the utility can type it.

    2. MiloSoft Virtual On Screen Keyboard
    Milosoft Virtual Keyboard
    – A simple on screen keyboard.

    3. Click-N-Type virtual keyboard
    Click N Type virtual keyboard
    – You can choose a from a few different types of keyboard layouts.

    4. Mouse Only Keyboard v1.4 (MOK)
    Mouse Only Keyboard
    – To avoid key loggers you can enter the password using only the mouse. This method protects you even against hardware keyloggers, or other keyloggers not supported by MyPlanetSoft Anti Keylogger. When the program is started, it deactivates all system-wide clipboard viewers, so you can safely copy passwords around different applications.

    Important note: Please do NOT use Windows’ On-Screen Keyboard. It is pretty useless and keystrokes will be captured by keyloggers.

    Encrypt Keystrokes
    Another way is to encrypt your keystrokes at the keyboard driver level, deep within the operating system. So no matter what you type on your keyboard, the keylogger only records encrypted characters.

    1. QFX KeyScrambler
    KeyScrambler
    – When the encrypted keystrokes reach your browser, KeyScrambler then decrypts them so you see exactly the keys you’ve typed. Keyloggers can only record the encrypted keys, which are completely indecipherable. There are 3 versions of KeyScrambler and one of them is free. The free version of KeyScrambler can only protect your logins on all websites. If you want more advance features, you have to purchase the professional or premium edition.

    2. I Hate Keyloggers
    Detect keyloggers
    – I Hate Keyloggers will disable this hook mechanism so the text will never reach the key logger program. Consequently, it will break some other programs that rely on this hook mechanism, but I Hate Keyloggers provides a hotkey combination to quickly disable or enable typing protection.

    Detect Keyloggers (Anti Keyloggers)
    There are programs that can detect some but not all keyloggers. So I’d recommend you to try all of them. Please take note that hardware keyloggers cannot be detected by software below. Please do not depend on anti keyloggers so much because there will always be new techniques which anti-keyloggers can’t detect.

    1. SnoopFree Privacy Shield 1.0.5
    Snoopfree defeat keyloggers
    – SnoopFree Privacy Shield is not another scanner product. It’s a powerful shield that guards your keyboard, screen and open windows from all spy software. The way it works makes it virtually impossible for any spy program to work on your computer.

    2. MyPlanetSoft Anti-Keylogger v1.5
    FREE Anti Keylogger
    – The world’s smallest fully functional anti keylogger. Deactivates all existing system-wide keyloggers. Absolutely free. Ideal for use in any public environment such as internet cafes. No installation required, just download, unzip and run. Serves also as anti clipboard logger.

    3. KL-Detector v1.3
    Keylogger Detector free
    – Use KL-Detector to find out whether your activity is being recorded without your knowledge. It claims that it is designed to be able to detect all keyloggers. And it’s free.

    4. PSMAntiKeyLogger
    PSM Antikeylogger
    – PSMAntiKeyLogger is a real-time protecting tool which protects you against not only Keyloggers but also Screen/Form capturers. It can be compared to SnoopFree except that it is a bit outdated.

    Anti-Virus, Anti-Trojan and Anti-Spywares will detect keyloggers by signatures. As for firewall, it doesn’t stop keyloggers from logging your keystrokes but it can prevent the keylogger from automatically “sending” the logs to the person who installed the keylogger. Also do take note that hardware keyloggers can’t be detected by any of the software above. So you must be extra careful and always use the on-screen keyboard when you’re using a public computer.

    Phew! Finally I’m done writing about defeating keyloggers… It has taken me whole day to write this!

  • Automatically Disable Wireless Network Connection when Local Area Connection is Enabled

    I normally disable any not frequently used hardware in Device Manager such as the webcam, fingerprint reader, DVD-RAM, Modem, Firewire, PCMCIA adapter, and most importantly the wireless adapter. So far I only noticed that the computer boots up faster since it doesn’t need to load up the devices and most probably it could even prolong the battery life on my laptop. Many times I’ve seen people using their laptop connected to both wifi and LAN that is on the same router. Although this shouldn’t cause any problems because Windows routing table is smart enough to automatically detect and use the better connection, but it is still good to disable the unnecessary connection to avoid any possible dual interface routing issues. Previously I’ve tested the Windows routing table by connecting 3 different types of connection (3G, ethernet and wifi) on my computer and it puts 3G at first priority, followed by ethernet and then wifi.

    If you normally have to switch between wifi and ethernet connection but find it a hassle to manually disable or enable the devices, here is how you can do it automatically.


    Steve Wiseman from IntelliAdmin has written an intelligent vbscript that automatically disable wireless when Ethernet is available and vice versa. First you need to identify the name of the connection used by ethernet and wifi. Go to Control Panel > Network and Sharing Center > Change adapter settings.

    Network Connection Name

    Once you’ve identified both the LAN and wifi connection name, download the correct NetSwitch vbscript file according to your Windows operating system from the link below and save the file from .dat to .vbs extension.

    For Windows 2003, Vista, 7, and 2008: http://www.intelliadmin.com/NetSwitch.dat
    For Windows XP: http://www.intelliadmin.com/NetSwitchXP.dat

    To put the wired NIC as first priority and the wireless NIC as secondary, type the following command at command prompt. This means that whenever the wired network connection is connected, the vbscript will automatically disable the wireless connection. If the wired network connection is unavailable, the vbscript will then enable the wireless connection.

    NetSwitch.vbs “Local Area Connection” “Wireless Network Connection”

    Netswitch Command Line

    This script requires to be ran as administrator. According to Steven, the best place to run the script would be from a group policy computer configuration logon script because it will run as local system and have the proper permission to enable and disable network cards. You can also use the Windows Task Scheduler workaround trick to run the NetSwitch vbscript with highest privileges.

    Other alternative for this NetSwitch vbscript are BridgeChecker and Wireless AutoSwitch which both are shareware. If you have a Dell wireless adapter, it would probably come with a “Disable Upon Wired Connect” feature or for HP laptops, some models comes with auto wireless disable feature called LAN/WLAN switching in BIOS.

  • Un-Ethical Conduct By Security Firm Leads to Facebook Leaks

    I’m normally not one who wants to post his thoughts on Raymond.cc, or anywhere else for that matter. If I am to explain my deepest thoughts, usually I like speaking face to face, which is why this is most likely going to be the first and the last time you see me coming so wildly off topic today, although it is still technology related.

    About two nights ago, a security firm decided to do what most of us would deem as unthinkable and uploaded a 2.8 gig torrent of the personal data that was found on Facebook. At this time, that is about one in five users who had their privacy lost because the ‘security firm’ wanted to bring to attention how large of a hole it was for someone to see your personal information on Facebook without changing the default settings of your Facebook privacy. As of this time, that torrent has had about 1000 downloads and will no doubt be clocking in it’s millionth download by tomorrow, so this isn’t so much about free press but a rant against what they did in terms of ethics.

    I admit, before I continue, I have to say that Facebook is the worst spot on the internet if you’d like to have privacy. Friends requests, applications, ads that are using your name by default, you name it and Facebook’s pre-approved all this for you without you even clicking anything more then the ‘I agree to the Terms of Service’. For those that are counting, the Facebook Privacy Policy has gotten longer with ever revision as well as eroding more and more privacy. It’s gotten so bad that the Electronic Frontier Foundation has post on their policy! So don’t get me wrong, this isn’t just a fail on the head of that security firm, but it is a horrible taste in your mouth because it already sets the wrong example on the internet in terms of privacy.

    And now to top it all off, Facebook has now officially suffered the worst security breech ever: one in five users had their personal details lifted off their account and uploaded by a ‘security company’. Now I use this term very loosely because I feel that if it was a real company, it should have contacted the users that it was able to, rather then risk being sued by Facebook and the 100 million users who have officially lost their privacy permanently due to this ‘firm’. But instead, being completely irresponsible, has uploaded the information to a torrent.

    It’s impossible to reverse this hole in your security now, but there is one major saving grace in how they chose to present this problem. The ‘firm’ leaked only names, and not any other information they could have leaked. This is literally the only saving grace. This is the one time when you should be listening, and you should take this warning right away: change your privacy settings. Right now, and make sure they are set to be as secure as Friends Only or Only Me. This is the tipping point of the iceberg, folks, and this should be the wake up call for those that keep saying “Well, I’m not going to post anything no one will not need to read…”

    In fact, this is the reason why Raymond doesn’t use Facebook, and why my settings are so restricted that I must add you for you to see me. Otherwise, I am completely invisible. Because there are some people out there in the world that are insane enough that will find a way to destroy your life. Consider if this was one of the black hat hackers, the evil ones that destroy computers for fun. Your entire life at this point, as you know it, would be completely and utterly destroyed. We should be thankful it’s just the first and last names only, and of those that didn’t set their privacy settings beyond the default. However, as I said above: this is the tip of the iceburg. And it’s only going to get worse as time goes on if your settings haven’t been changed yet.

  • Reclaim Privacy shows how secure your Facebook Privacy Settings are

    There are many threats in modern day life, from credit card fraud to identity theft that we’ve all known about for a while. After all, we all have that uncle or aunt or relative or whatever that we know has lost money to these scams. But as we also know, social engineering is one of the most cunning ways to make money and easily too… after all, who doesn’t trust a face that strikes us as someone who seems innocent enough?

    But as Sophos found, up to about 45% of all Facebook users aren’t watching who they’re adding to their accounts. Daisy, a ‘duck’, got added about 46 times out of 100 when “she” made the offer, while Dinette, the ‘cat lady’ would get 49 out of 100. And these are people that didn’t even realize who or what Sophos is. [Link to the study]

    So this rises the question: what should we do to prevent this from happening to ourselves? Well, a good first step is to make your Facebook as private as possible. Believe me when I say this has now become extremely easy to do so and an extremely wise idea to boot.

    For the completely unaware, when you hit the Account dropdown in the upper right corner of the screen, you have options to change your privacy there, under the self-explanatory Account tab. The problem is, even now as I said, many people just don’t understand the threats out there and why you should use the privacy setup. There have been people fired over Facebook statuses, SIN numbers guessed at (read the ones covering birth years, and you’ll see a fair number of nations do this, Canada too), as well as general privacy concerns.


    Above is a GIF that has both the default settings and my personal settings on my account. As you can see, there’s a lot more that I’ve set myself to be exclusive to me only. “But Paul”, I can hear you shout, “what’s the harm? I’m not going to add anyone who isn’t a friend I know!” I made the same comment myself a while back, until I found out one of my friends who has a Facebook account has a very common name. And he also never had a photo of himself as the profile picture, so I couldn’t make it out if it was him or someone else. So I had to wait for him to add me because I didn’t want to be burned by a look-alike.

    At the same time, you might not be aware on how much information you are leaking out. Which is where Reclaim Privacy comes in and lets you know. Simply enable your Bookmark Bar on any browser, drag the Bookmarklet to the toolbar, and run it the next time you’re on Facebook. Assuming that you’ve set everything as close as possible to the paranoid/secure side, you should receive a green bar letting you know you’re safe. If it’s Red or Yellow, you still have a bit of tweaking to do if you wish for more privacy. If it freezes, chances are good you’ve got the new interface, like I showed above, and can visually and easily see and adjust your Facebook settings without this Bookmarklet. I wish you all the best and safe browsing!

    Reclaim Privacy

  • Get 26 Ashampoo Software Full License Key Code worth $500 for FREE

    Ashampoo is another popular software company that has been around for nearly 10 years. The brand is not really that popular but for software freaks like me, I’ve heard about it long time ago. They currently have an extensive 43 software in their product list which is categorized into office products, security software, burning software, system utilities, multimedia software and tools & utilities.
    FREE Ashampoo license key code
    Today will be the last day that I’ll be sharing with you on how to get commercial license for free. So I thought let’s end it with a big one! 😈 Out of their 43 software titles, I manage to find out how to get free genuine full license key code worth $500 for their 26 software. I spent 3 full days, including 1st of May working on this (searching for the links, downloading the software, testing whether the code works or not and finally writing it down in this blog).


    Since there are 26 software, I will try to make this as simple as possible. I’ve included the link for you to get the free license and also the direct link to download the software. A short description of the software is also included. For more information regarding the software, you can visit the official Ashampoo website.

    The first time you’ll only need to enter the email address and it’ll send you an e-mail containing a personal activation link with which you can complete the free registration process. When you receive the mail just click on the activation link it contains and follow the instructions displayed. Your free registration key will then be sent to you immediately. The next time you request a free license, you’ll only need to enter your email and also the password that has been sent to you.
    Request ashampoo key
    1. Ashampoo Office 2006

    Process your office documents and spreadsheets.

    License | Download


    2. Ashampoo AntiSpyWare 2

    Protect yourself against the full spectrum of Internet malware threats including rootkits.

    License | Download


    3. Ashampoo AntiVirus

    Protect your system against viruses, worms, Trojan horses, and dialers.

    License | Download


    4. Ashampoo FireWall

    Set up an effective firewall and prevent unauthorized online activity.

    License | Download


    5. Ashampoo Magical Security 2

    Encrypt your sensitive data to a self-decrypting archive on your hard disk, CD, or DVD.

    License | Download


    6. Ashampoo Magical Security

    Encrypt your private data on hard disc, CD or DVD!

    License | Download


    7. Ashampoo Burning Studio 2008 v7

    Create, copy, and rip your own audio, video, data CDs, and DVDs.

    License | Download


    8. Ashampoo Burning Studio v6

    Burn the files and images on CD and DVD discs

    License | Download


    9. Ashampoo BurnYa! AudioCD 2

    The easiest way to burn your own audio CDs!

    License | Download


    10. Ashampoo BurnYa! DataDisc 2

    Burning data CDs was never this easy!

    License | Download


    11. Ashampoo WinOptimizer 4

    Speed up searches on your hard drive and optimize overall system performance.

    License | Download


    12. Ashampoo Magical Defrag 2

    Defragment your hard disk automatically to speed up Windows operation processes.

    License | Download


    13. Ashampoo Magical Defrag

    Magically defragments your system with ease!

    License | Download


    14. Ashampoo PowerUp XP Platinum 2

    Tune up your computer like a pro in seconds!

    License | Download


    15. Ashampoo Uninstaller Platinum 2

    Remove Windows programs completely to keep your system clean.

    License | Download


    16. Ashampoo Magical Optimizer

    Clean the whole system: release the brake of your computer with only one mouse click!

    License | Download


    17. Ashampoo ClipFinder

    Find and download videos from YouTube, VideU, and MyVideo.

    License | Download


    18. Ashampoo Photo Optimizer

    Enhance your digital pictures, improve color, contrast, brightness with just one click.

    License | Download


    19. Ashampoo Photo Commander 5

    Manage images, music files, and videos with a number of tools.

    License | Download


    20. Ashampoo Magical Snap 2

    Capture, enhance, and edit, and easily make professional screenshots.

    License | Download


    21. Ashampoo Magical Snap

    Perfect screenshots – anywhere, any time

    License | Download


    22. Ashampoo SeeYa!

    Compress images and voice into a compact, one-file talking slide show.

    License | Download


    23. Ashampoo Media Player+

    Play audio, video, and streaming media, and burn audio files to CD.

    License | Download


    24. Ashampoo Magical Uninstall

    Monitor and manage your software installations.

    License | Download


    25. Ashampoo Internet Accelerator 2

    Speed up your surfing on the Web.

    License | Download


    26. Ashampoo Startup Tuner 2

    Deactivate services, uninstall software, and delete plug-ins.

    License | Download

    There you go, 26 Ashampoo commercial software worth $500 for free. Enjoy!

  • Weekend Gaming – Week Ten – World’s Hardest Games

    So, it’s Sunday, and I just finished doing an overnight shift. Believe me when I say after them, I have to sit down and relax, or sleep away the weekend. Or would love to, but can’t because I want to share with you some games. But after this post, I can assure you, I’ll be going back to bed until sometime before 10 at night my time. They say rest is a good thing. I would never argue this myself, because I know how it’s like to go without, believe me, that’s hard. And that’s what inspired this week’s games, because there are still a lot of hard games out there and there are many more being developed. In fact, most games for earlier game systems were deliberately made hard to make people get frustrated and get better at the games to make you replay them again and again, and see if you could make it to the end without dying. Kids today are spoiled by easy modes that are so easy, you just need to touch the right button and you’re safe, like Bayonetta‘s easiest modes. If you’re simply that lazy, you’ll hate these games, but if you love a challenge, I can assure you… you’ve found them here.

    I Wanna Be The Guy: The Game (70 mb)


    If you don’t know IWBTG:TG, you’re missing one of the hardest games in the world. I’m not kidding when I say it’s hard. The screen I’m showing above, is the game over screen on the first level. Here’s a hint when trying to outrun spike strips traveling extremely fast: don’t bother learning a pattern, because the third’s going to mess you up royally. After all, that’s why I’ve got splattered blood all over that fourth level there.

    This game has had me cursing and swearing at it for hours, but I’m more relaxed now then I was before, because I’ve officially found a way of killing something and knowing I’m not the only one who has problems with the game either. Oh yeah, and if you go the top route, beware of cherries and anything else that decides to attack you on a whim. That gun of yours? No good against any of this stuff. And finally, one last hint before you give up completely: Shift makes you jump, arrow keys make you move, and Z fires your gun against the bosses… who are even more insane then you can imagine.

    Give Up Robot Flash game


    For those whom have never played Give Up Robot, let me explain the basic premise. You’re trying to get to the end of the level by use of your wheel or your grappling hook. Think Pitfall but advanced to 2010. Now, you have several different ways you can die… actually, that’s untrue. You have three ways you can die: by running into a blade, by falling to your doom, or falling onto the Lava tile. And this is all while the world around you is a trippy technocolour too. I’ve gotten up to level 20 before it really starts getting zany and hard, but it fools you into thinking it’s an easy game. The reality is quite the different I’m afraid. The only major plus side? No enemies. But that doesn’t make it any better then when that enemy AI laughs at you. Best of luck Robot, you’ll need it.

    Syobon Action (3 mb)


    A very early ‘Engrish’ game and often mistranslated to be ‘Cat Mario’, it’s only English is to start the game. If you haven’t played it before, the amount of ways you can die just on the opening screen might amaze you alone. While nowhere near as hard as the above two, Syobon Action has been quoted to inspire madness as people struggle to complete the game with a positive number of lives. I’ve beaten the first level myself with a spare life, but I’ve yet to manage to beat the second level yet. No spoilers for this game other then the obvious: throw everything out that you learned with Mario, because this game doesn’t play by Mario’s rules.

    I know I’m going to kick up my feet and watch some re-runs of the old Doctor Who series and play these addictive, yet hard games this Sunday. Hopefully you readers will be able to do the same. I’m in the process of testing out a few things and hopefully some of which I can share this upcoming week. Have a great Sunday, and enjoy yourselves!

  • How To Easily Analyze and Get Detailed Report of Suspicious Files

    Last year I’ve shown you how to safely run untrusted programs in virtual space using Sandboxie so it won’t affect your computer if it is a virus. Whatever the files does to your computer, it is only doing the damage in the virtual space and your Windows remains safe. Not only it is able to protect your computer, it can also show you if there is any files created and also the registry changes. It is very powerful security program but computer beginners may find that virtualization software tough to understand and use.

    Loading a suspicious file into Sandbox is easy but investigating the file with Sandboxie is no easy task. I’ve previously written a guide on how to investigate files using Sandboxie but there is still a lot of computer knowledge involve. How nice if you’re able to just scan and analyze the suspicious file and then it automatically generates a highly detailed threat report.

    Good news is now you can and there is no need to install any software to analyze what the file can actually do you your computer when you run it. In short, it is like running the suspicious file on a computer that doesn’t even exist and then it tells you what it does to that system! If the report states that it is dangerous, you can simply delete the file from your computer to stay safe.


    Instead of using software to analyze untrusted file, here are some free web based sandbox service analyzes malware. Submit your Windows executable and receive an analysis report telling you what it does. All of them are an advanced automated threat analysis system designed to analyze and report the behavior of computer viruses, worms, trojans, adware, spyware, and other security-related risks in a FULLY AUTOMATED mode. There is a big difference between analyzing file with antivirus and sandbox. When using antivirus, you depend on its signature which sometimes can give you false positive. But with sandbox, you will know for sure if it is a dangerous file or not.

    I’ve used a trojan called “Bandook” and upload to all 5 sandbox websites for test to determine which provides the best report.

    1. ThreatExpert
    Submit suspicious files to threatexpert for test
    – File size limit of 5MB
    – Report will be made available to public after submission.
    – Report sent to your email
    Note: I find that ThreatExpert is the best compared to the rest because it gives the most complete information about the trojan.
    [ Submit File to ThreatExpert ]

    2. CWSandbox
    Submit suspicious files to CWSandbox for test
    – File size limit of 16MB
    – After file submission, you immediately get the report link
    Note: Very accurate report and it is as good as ThreatExpert.
    [ Submit File to CWSandbox ]

    3. Anubis
    Submit suspicious files to Anubis for test
    – File size limit of 2MB
    – Can either opt for web or email for report
    Note: The report about where the trojan connects to is not accurate.
    [ Submit File to Anubis ]

    4. Sunbelt Sandbox
    Submit suspicious files to Sunbelt Sandbox for test
    – File size limit of 12MB
    – Can either opt for web or email for report
    – You can only receive report link from Email so make sure you entered a correct email address
    Note: Sunbelt Sandbox technology is provided by CWSandbox. Although it is the same technology, but the report result is different. Sunbelt Sandbox is unable to give accurate network activity report.
    [ Submit File to Sunbelt Sandbox ]

    5. Norman Sandbox
    Submit suspicious files to Norman Sandbox for test
    – Didn’t specify the maximum file size
    – Report sent to email only
    Note: This is the worst of all. It doesn’t have web report and don’t know what is the maximum file size that is supported. The worst part is it didn’t detect Bandook as a threat!
    [ Submit File to Norman Sandbox ]

    Whenever you have a suspicious file and can’t decide whether to run it or not, submit it to VirusTotal first. If it didn’t detect anything or if it gives you a 50/50 result, then the next thing you should do is upload it to online sandbox websites. Congratulations! You are now a virus/malware analyzer!

  • About Windows HOSTS File and How To Make Use Of It

    There’s a Hosts file on every operating system. Yes, Windows, Mac OS, Linux and Unix, all of them has it. For Windows XP, the hosts file is located at WINDOWS\system32\drivers\etc and it’s called HOSTS without any extension. You can open the HOSTS file with notepad and you should see something like this.
    Windows HOSTS file
    The hosts file is a computer file used to store information on where to find a node on a computer network. This file maps hostnames to IP addresses. The hosts file is used as a supplement to (or instead of) the domain name system on networks of varying sizes. This file is (unlike DNS) under the control of the user who is using the computer.

    Your HOSTS file may now be empty and useless. I’ll show you how you can put it to work and protect your computer from danger.


    You can use HostsMan, the free hosts file manager and editor to manage your HOSTS file.
    Repair HOSTS file
    It has the ability to enable or disable your HOSTS file, edit your HOSTS file and update your host from 4 websites that maintain it. By updating your hosts file, you’re able to filter out advertisements. This can save network bandwidth, as well, by eliminating a request to the DNS server normally used for obtaining address information, as well as by not downloading the advertisements.

    Before doing anything to your HOSTS file using HostsMan, it is advisable to make a backup first in case you want to restore your original HOSTS file. To make your backup, press CTRL+B simultaneously or go to Hosts menu and select “Manage Backups…“. Click on the Create Backup button to backup your current HOSTS file.

    To update your HOSTS file, click on the middle button that says “Update Hosts” when you run HostsMan.
    Edit HOSTS file
    Check MVPS Hosts, hpHosts, Mike’s Ad Blocking Hosts, Peter Lowe’s AdServers List and click the Update button. It will then check for updates and prompt you if you want to continue to update hosts file. Click Yes to continue. Next, it will download all 4 hosts files, delete duplicates and update your HOSTS file. The next thing you’ll notice on HostsMan is the number of Hosts Names that has been increased to tens of thousands.
    Update HOSTS list

    Please take note that your hosts file can be “hijacked“, or used for malicious purposes. For example, adware, computer viruses, trojan horses, or other malware can edit the hosts file (particularly on Windows-based systems) to redirect traffic from a “safe” site (such as Google) to sites hosting content that may be offensive or intrusive to the user or the user’s computer system.

    If you’re afraid of your hosts file being hijacked, you can use limited accounts for normal everyday use. Not only it can protect your HOSTS file, but all system and program files as well.

    [ Download HostsMan v3.1.55 ]

  • What is dumprep.exe? Why is KernelFaultCheck dumprep 0 -k in MSCONFIG Startup?

    You might be a careful person who regularly scan computer for viruses, check for windows updates, clear temporary files, defrag hard drive and also making sure that your startup item is not loaded with programs. Suddenly, you noticed that there is a new startup item KernelFaultCheck with the command dumprep 0 -u or dumprep 0 -k in System Configuration Utility (MSCONFIG).

    How to disable or remove dumprep Kernelfaultcheck

    Is dumprep.exe a virus and how did it get into into my startup programs? Why even after removing dumprep.exe from startup, it comes back automatically? Continue reading to know what is dumprep.exe and how to permanently removing it from startup.


    The explanation below is taken from Microsoft’s website.

    The Dumprep.exe tool is a Windows XP fault logging program. If a serious error occurs, Dumprep.exe writes the error details to a text file. The Dumprep.exe tool then prompts you to send the error information to Microsoft. The Dumprep.exe tool is a non-essential system process that is installed for third-party use.

    There usually 2 switches. -k is a kernel fault check and -u is a user fault check. Since Microsoft mentioned that dumprep.exe is a non-essential system process, we can disable it. To disable dumprep.exe from startup, to Control Panel > System > Advanced tab > click Settings button for Startup and Recovery. At write debugging information, click the drop down menu, select (none) and click OK.

    Remove dumprep.exe

    Next, click the Error Reporting button, and select “Disable error reporting“. You can leave the option “But notify me when critical errors occur” checked. Click OK to close Error Reporting window.

    Remove KernelFaultCheck

    Go to Run and type msconfig. Check if dumprep.exe still exist in the list or not. If it is there, run regedit and navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run. Select KernelFaultCheck name and hit delete. Restart your computer. If you don’t want to mess with registry, you can use HijackThis to remove it. Just do a system scan, check on %systemroot%\system32\dumprep.exe and click Fix checked.

    If dumprep.exe still automatically added into startup after disabling error reporting and writing debugging information, that means your computer has experienced blue screen and memory dump before. You need to Search for MEMORY.DMP file and delete it. Usually the MEMORY.DMP file is located at Windows folder. Once you delete the dump file from Windows, VOILA! dumprep.exe will no longer appear in MSCONFIG.