Category: Computer

  • Effectively Remove Trojan, Virus, Spyware from Windows Startup

    I’ve been helping people to remove trojan, virus, spyware and unnecessary programs from Windows startup for many years now. It’s very interesting because you will learn the Windows startup methods from finding out where will the program be hidden. The old method by running System Configuration Utility(msconfig) doesn’t work so well now because there are many other ways to start the programs when Windows is being booted up without being displayed in System Configuration Utility(msconfig). Even some smart trojans are hidden from Task Manager, Processes tab.

    Spywares, it is by nature to create random filenames and file sizes so avoid detection. That is why you always need 2-3 antispywares to completely remove spywares. Using anti-spyware software such as Ad-Aware, SpyBot and XoftSpy is good to identify spyware files but I can assure you that it’s not smart enough to 100% completely remove trojan, virus or spyware from startup. For example, one of my friend’s computer has been infected by spyware because everything is so slow. I find it hard to even download, update or copy the anti-spyware scanners to the computer. However, I manage to copy the updated anti-spyware software to the computer, scanned it, and removed the potential infections. I restarted the computer and it is still slow. That shows that spyware is still being ran during startup.

    I am going to show you one of the best way to remove trojan, virus or spyware from startup but it requires you have at least some knowledge in computers, otherwise you’ll be removing the wrong startup programs which may cause the Windows to be unbootable.


    HijackThis is a general homepage hijackers detector and remover. Hijackers are spywares, trojans and viruses. They infect your computer without your knowledge.
    HijackThis Trojan Spyware removal
    Initially based on the article Hijacked!, but expanded with a lot of other checks against hijacker tricks. It is continually updated to detect and remove new hijacks. It does not target specific programs/URLs, just the methods used by hijackers to force you onto their sites.
    As a result, false positives are imminent, and unless you are sure what you’re doing, you should always consult with knowledgeable folks from forums before deleting anything or you can go a Google search on the filename to know if that file is a virus.

    There are 2 types of scan methods.
    1. Do a system scan and save a logfile.
    – This is for newbie who doesn’t want to mess around with their computers. It will scan your computer and create a hijackthis.log file which you can paste it to forums and request for help.
    2. Do a system scan only.
    – Same as first method but it doesn’t create log files. Mostly for advance user who would like to troubleshoot themselves.

    Again I would like to stress out that IF you’re unsure what to fix after running the scan, please request for help in forums. Simply removing any startup programs would result in an unbootable Windows.

    [ Download HijackThis ]

  • Download and Activate Kaspersky Security Suite CBE 11

    The popular Kaspersky Security Suite CBE has recently been updated to version 11 based on 2011 Kaspersky engine and released by ComputerBild on issue 11/2011. If you haven’t heard of Kaspersky Security Suite CBE 11, it is actually equivalent to the current Kaspersky Internet Security 2011, except renamed specially for ComputerBild’s release. Kaspersky Security Suite CBE 11 has everything that you need to stay safe and secure while you’re surfing the web. It provides constant protection for you and your family – whether you work, bank, shop or play online.

    Other than the name change, the program’s interface is in German but fortunately that can be easily changed by editing the registry and using the Shift+F12 hotkey to temporarily switch the interface to English. Another thing is you have to re-activate the software by requesting the new license key from ComputerBild every 3 months. It’s troublesome for some users but definitely worth it for others because it is free (normally cost $59.95 for 1PC 1Year) and your computer is protected by the latest Kaspersky 2011 engine.
    Kaspersky Security Suite CBE 11
    Anyone is able to register an account in ComputerBild’s website to request for the license key but the Kaspersky Security Suite CBE 11 installer can only be obtained from the promo disc. Thanks to Philipp from ccpowered, now we all get to use one of the best security software because he uploaded the installer to his website and left a comment on my previous Kaspersky CBE article.


    Here is how you can get your free Kaspersky Security Suite CBE 11 activation license code first.

    1. Go to this page http://www.computerbild.de/Kaspersky-Security-Suite-CBE-4280623.html

    2. If you have previously registered a ComputerBild account, then go ahead and login. If not click the Zur Registrierung link to sign up for one.

    3. Once you’re logged in, check the first option and click the button.
    Request Kaspersky Security Suite CBE 11 license key

    4. Check the email address that you’ve used to register the ComputerBild’s account. You should receive an email from COMPUTER BILD-Siche?rheits-Cent?er with the subject “Ihr Lizenzschlüssel für Kaspersky Security Suite CBE?”. Note down the license key that is on the body of the email.

    5. Download Kaspersky Security Suite CBE 11 installer from the links below. For your convenience, I have uploaded the Kaspersky Security Suite CBE 11 to HotFile, MediaFire, FileSonic, FileServe, RapidShare and FileFactory WITH premium direct downloads. Meaning you can immediately start downloading like a premium user except you don’t need to be one because I am sharing my available premium traffic with you. If it runs out of premium traffic, please try another host or simply use the regular download.

  • HotFile
  • MediaFire
  • FileSonic
  • FileServe
  • RapidShare
  • FileFactory
  • 6. Run the downloaded installer. First click Weiter button, followed by Akzeptieren and Installieren. Now you will come to a part where you have to activate the software. Type in the code that you got from step 4 and click the Weiter button. Once activated, click Weiter and finally Beenden. Now the latest Kaspersky Security Suite CBE 11 is installed and activated. Here is how you can change the interface language temporarily to English.

    7. Run Kaspersky Security Suite CBE 11 and on the top right corner, click on Einstellungen.

    8. Follow the numbered steps from the image below to deactivate self-defense.
    selbstschutz aktivieren

    9. Now hit WIN+R key and type regedit followed by hitting the ENTER key. Navigate to the following path:

    HKEY_LOCAL_MACHINE\SOFTWARE\KasperskyLab\protected\AVP11\environment\

    10. Look for SkinSwitchDisabled name and double click on it. Change the value date from 1 to 0 (number zero).

    Change Kaspersky CBE 11 German to English

    Open Kaspersky Security Suite CBE 11, simultaneously press SHIFT+F12 and you will notice that the interface will switch to English. Do note that this change is only temporarily. Once you restart your computer or the software, the interface will be reverted back to German but you can of course change it back to English again by using the hotkey.

  • Extract ZIP Archives Online with Free PHP File Manager

    One of my client’s website that regularly requires updating is quite troublesome because it involves uploading at least 10,000 small files. What I normally do is compress all the files into one single ZIP file, upload and then use DirectAdmin’s built-in File Manager to extract it. I had to do that because when I try uploading a lot of small files, the FTP connection will timeout (TM Net, our Malaysian ISP is to be blamed) but weirdly when I upload a single big file, I can get a constant 40+KBps upload speed and never gets timeout.

    Recently I’ve been very busy and can hardly spend any time to update my client’s website. So I intend to hand over everything to my client so that I can have more free time to myself. Before that, I will have to make sure that everything is in order and the steps to update the website are all written properly in step-by-step order.

    One of the problem that I am facing is I cannot allow my client to use the DirectAdmin’s built-in File Manager because my webhosting subscription account is not a reseller type and I cannot create an account for him nor I can give him my existing username and password. A normal FTP client can do mostly what a PHP File Manager does except that it cannot command the server to extract an archive file that is already uploaded on the remote server. Fortunately I am able to install other third party PHP File Manager to replace the DirectAdmin’s File Manager.


    If you do a search on PHP File Manager, there are actually quite a lot that you will find. What I am currently using now and I can say that it works is eXtplorer. It is a free PHP and JavaScript based File Manager that is able to:

  • Copy & Move Files and Directories by Drag&Drop
  • Dynamic Directory Tree with on-demand loading of subdirectories
  • Edit Files (with Syntax-Highlighting thanks to EditArea)
  • Rename, Delete or Create new Files and Directories
  • Access Files through FTP or directly (using PHP) to totally overcome permission and file ownership issues
  • Upload or Download files just as you like
  • Create and Extract Archives (ZIP, Tar, Tar/GZ, Tar/BZ)
  • User Management with different permission levels like “View only” or “Edit” and “Admin”
  • free php file manager extplorer
    Installation is pretty simple. Just download, extract and then upload to your webserver. You will need to allow write access (chmod 777) to /extplorer/ftp_tmp/ folder and /extplorer/config/.htusers.php file. Then just login, right click on the ZIP file and select “Extract Archive”. eXtplorer needs at least PHP 4.3 on the server and an up-to-date browser with Javascript enabled to run. Do take note that eXtplorer can only extract ZIP, Tar, Tar/GZ and Tar/BZ archives only.

    [ Download eXtplorer ]

  • Loading Unsigned Drivers in Windows 7 and Vista 64-bit (x64)

    Thanks for all the comments, now I know that there are hacks that can make Windows 32-bit “address/recognize” more than 4GB of memory but you still wouldn’t be able to use it. To be able to fully utilize more than 4GB, you will still need a 64-bit of Windows. Most common problem that people face when using a 64-bit Windows is loading unsigned drivers. It seems that Microsoft has forgotten end users when it introduced a very restricted module of driver signature enforcement in Windows Vista and Windows 7. All drivers and system files must be digitally verified or they cannot run when using both 32-bit and 64-bit versions of Windows Vista and Windows 7. This is an example of unable to load PeerGuardian with the error message “Windows cannot verify the digital signature for this file” because of an unsigned driver.
    Windows cannot verify the digital signature for this file
    From what I heard, the certificate to perform this signing costs from $300-$500 USD per year. Not every software developer can afford that especially when their software is free. Fortunately there are ways to force the unsigned drivers to load in x64 versions of Windows 7 and Vista.


    There are some tutorial suggesting that typing this command "bcdedit /set loadoptions DDISABLE_INTEGRITY_CHECKS" in command prompt will do the job but it didn’t work on my Windows 7 x64 Ultimate. Probably Microsoft has rolled out some updates which disables DDISABLE_INTEGRITY_CHECKS option.

    There are still a few working ways to load unsigned drivers though. The first method is to continuously press F8 when Windows is booted up until you get the Advanced Boot Options, then select “Disable Driver Signature Enforcement“.
    Disable Driver Signature Enforcement
    The problem about this method is you have to do that EACH Time when you boot up Windows and if you forgot to select this option, you won’t get to load the unsigned drivers and the software won’t work.

    Second method is to use ReadyDriver Plus by Mr. Orange Sunshine, an enhanced version of the original ReadyDriver by Uhlik. It does the same thing as the first method by automatically selecting disable driver signature enforcement. It modifies the Vista Bootloader to load ReadyDriver, and then makes the appropriate selection to disable Driver Enforcement, based on what you choose to install. This tool worked perfectly on my Windows 7 x64.

    If you don’t like your boot loader to be modified, then you should use Driver Signature Enforcement Overrider. This is how you can use DSEO to sign and load the unverified drivers. Run DSEO, click Next, click Yes, select “Enable Test Mode” and click Next.
    DSEO Enable Test Mode
    You should get a confirmation window telling you that Test Mode has been ENABLED. Click the OK button to go back to the DSEO window. Now select “Sign a System File” and click Next. You will now have to type in the specific filename including full path and click OK. For PeerGuardian, it is “C:\Program Files\PeerGuardian2\pgfilter.sys”. Restart your computer and the driver is now loaded.

    You will notice that there is a watermark at the bottom right of the screen saying Test Mode.
    remove test mode windows 7
    That is normal after you’ve used Driver Signature Enforcement Overrider to enable the Test Mode. If you disable Test Mode using DSEO, you won’t be able to load the unsigned drivers. In short, you will need to be in Test Mode in order to load the unsigned drivers. If you can’t stand seeing the Test Mode watermark, you can use Remove Watermark to take away the watermark. Just download, run RemoveWatermarkX64.exe and then type the letter Y. Restart your computer to take effect. If the watermark is still there after patching, run the tool again and this time hit the R key to rebuilt MUI cache. Restart and the watermark should be gone by now.

  • Revo Uninstaller Pro Review + Giveaway

    One may ask why do we even need a third party tool to uninstall software when software that we install normally comes with a built-in uninstaller anyway? The uninstaller that comes with the installer is able to remove the files that it installed to your computer but a more sophisticated software such as antivirus may create or download new files and registry entries to your computer. Those new files and registry entries created after installation are not logged during installation, hence it is not recognized and removed by the uninstaller. If you normally download stuff and play around with third party software, within a few months you will notice that your computer is filled with junk files that was left around even after uninstalling the software.

    One way to keep your computer clean so that it last longer without having to reformat and reinstall Windows is to use a reliable uninstaller tool. The most downloaded uninstaller in CNET Download.com with over 4 million downloads to date is Revo Uninstaller. It is probably the most popular brand when it comes to an uninstaller software. I have never done a review on such software before because I never needed one as I always use imaging or snapshot to restore the changes but I was curious to see what is so good about Revo Uninstaller Pro that is making it so popular.


    There are two versions of Revo Uninstaller, the professional and freeware version. I will be reviewing the Professional version because the freeware version doesn’t have advanced scanning algorithms and real-Time monitoring of system changes during install of programs. Plus the freeware version doesn’t have full compatibility with 64-bit Windows. The professional version cost $39.25 which includes free lifetime technical support and free updates, till the next major version. Current version is at 2.5.5 and it means that if Revo Uninstaller Pro has been upgraded to version 3.0, then you will have to pay for a minor upgrade free. The Pro version offers a free 30 day trial.

    The Professional version comes with the following features:

  • Scanning for leftovers after the standard uninstall
  • 8 Additional cleaning tools included
  • Free Professional Technical Support
  • Extended scanning for leftovers – more advanced scanning algorithms
  • Real-Time monitoring of system changes – during install of programs
  • Forced Uninstall – remove remnants of already uninstalled programs
  • Multi-level Backup system – including full Registry backup
  • Print and Print Preview of installed programs
  • Export of installed programs – in TXT, HTML and MS Excel
  • Customizable and flexible User Interface
  • Visual themes support
  • Command line program uninstall support
  • Full 64-bit compatibility – Windows XP, Windows Vista and Windows 7
  • First, let us take a look at the Uninstaller feature. Clicking on the Uninstaller icon at the left hand sidebar will open two tabs, All Programs and Traced Programs. The difference between the two tabs are All Programs displays the list of installed software that can also be found in Control Panel > Programs and Features but providing more options when you right click on the items.

    Revo Uninstaller Pro

    The Traced Programs tab displays the list of software that you’ve installed on your computer using Revo Uninstaller’s installation monitor. By using Revo Uninstaller to monitor the installation of a software, it is able to detect every single changes being made to your computer and provides a more complete uninstall. To monitor an installation, all you need to do is right click on the setup file and select “Install with Revo Uninstaller Pro”. A bar will displayed at the top of your screen telling you that Revo Uninstaller Pro is monitoring system changes…

    Revo Uninstaller Monitor Bar

    When you are done installing, it is IMPORTANT to run the installed program first, configure and close it, then only press the red square button to stop monitoring. The reason for doing this is some software creates new files or perform registry changes when the software is being launched the first time. After monitoring the installation, you will notice that the software appears on the Traced Programs tab. To uninstall a monitored software, simply right click on the program and select Uninstall and the uninstall process will be performed by Revo Uninstall, not the program’s uninstaller. Sometimes Revo Uninstaller will find some data that may be related to the uninstalled program, but was not deleted because it was not logged during the installation of the program. You can manually review the data and delete it from Advanced Uninstall.

    Advanced Uninstall

    The Backup Manager allows you to restore deleted registry items only. As for files, they are moved to Recycle Bin. So if you want to undo an uninstallation, the best option would be to reinstall the software and second option is to use Windows System Restore.

    Other than then Uninstaller module in Revo Uninstaller Pro, it also comes with extra bonus modules such as Windows Cleaner, Microsoft Office Cleaner, Browsers Cleaner, Junk Files Cleaner, Autorun Manager, Evidence Remover and Unrecoverable Delete which helps to clean up junk/temporary files.

    Actually having the best Uninstaller is not just about being able to remove all leftover files so that your computer is as clean as before installing the software. A snapshot software would be most suitable for this case. It is important that an uninstaller be smart enough to detect if the files are still required by a similar software (common files, program data, sharing) and not blindly deleting them causing other software to stop functioning just because they are logged during installation. Further tests will be done to compare the uninstallers and hopefully to have the report out in December.

    VS Revo Group has generously sponsored 5 licenses to be given away at this website. To join the Revo Uninstaller Pro giveaway, head on to the Giveaway page at our forum. All you need to do is be a registered and verified member to join the giveaway. Winners will be automatically and randomly chosen by our giveaway system in 48 hours and announced at the forum.

    [ Download Revo Uninstaller ]

  • Advanced Usage of Avira AntiVir Rescue System BootCD

    Few days ago I had to deal with a virus that is very very hard to remove. So the best and easiest way to remove it is using an antivirus rescue CD. When you boot up the computer with a rescue cd which is usually a linux live CD, Windows is not loaded and the virus is inactive. This makes it easier for the antivirus to detect and clean the virus. I have encountered viruses that corrupts Windows so badly until you can’t even boot in to Safe Mode, you cannot install any antivirus because it auto terminates it and you can’t pin point where the virus is added to Windows auto startup location as it replaces one of your legitimate Windows system file.
    free avira system rescue
    Normally my first choice is to use Kaspersky Rescue CD but I had problems downloading it as I am getting very slow download speed. It managed to download until half way and then time out. Moreover it has been 2 months since Kaspersky Rescue CD last updated and I didn’t want to spend more time downloading the virus definition. I like Quick Heal Native Boot Scan as well but I didn’t want it to auto fix suspicious files that it finds. There is no way to configure it. Finally came Avira which is one of my favorite too. The Rescue CD ISO image file which is only 53MB in size and took only 7 minutes to download. The bootcd was last updated few days ago and I know I didn’t have to spend a lot of time updating the virus definition. When I boot up my Acer laptop with Avira AntiVir Rescue System, everything seems fine and was presented with a simple looking graphical user interface. When I click on any options such as “Remove infected files”, “Try to repair infected files” or “Rename Files, if they cannot be removed”, the whole system hung, and there is no respond at all.

    Sadly this is a bug that happens to most laptops such as Acer, Dell and HP. If you encounter such problem, here is how you can continue using Avira AntiVir Rescue System without relying on the GUI.


    Just boot up the Avira AntiVir Rescue System as normal. Then press the number 1, hit enter and it should start loading vmlinuz and initrd.gz.

    Avira Antivir Rescue System Boot Options

    When the graphical user interface is fully loaded, simultaneously press Ctrl+Alt+Backspace.

    Avira AntiVir Console

    That will bring you in to a black colored console screen that looks like DOS. Before you start typing anything, please be informed that the antivirus is programmed to type in German keyboard layout. For example, when you press the – key on your keyboard, you’ll notice that it chances to ß. Refer to the image below on what to type to get what character.

    German Keyboard Layout

    First we need to update the virus definition to the latest version. To do that, type the following command. There are TWO dashes.

    antivir --update

    To start a full scan, type the following command below. In Linux, everything is case sensitive. The Devices must have a capital D. What the command below does is scan everything on your hda1, tries to repair the infected files and rename the non-repairable files by adding a .xxx extension. You can also substitute the -ren command with -del to auto delete the non repairable files.

    antivir -s -e -ren /media/Devices/hda1

    When Avira AntiVir Rescue System has finished scanning, you should be able to boot in Windows. You can search in Windows for *.xxx files. These are the files that are non-repairable by Avira. You can get a list of command lines by typing antivir --help but you won’t be able to scroll up to see all the commands. So here are all the commands for your convenience.

    Usage is: antivir [options] [path[\*.ext]] [*.ext]
    where options are:
    --help .......... display this help text (abbreviation: -h or -?)
    --scan-mode= applies "extlist", "smart" or "all" scan methods:
    extlist scans files according to their filename extension,
    smart detects which files to scan from their name/content,
    all scans all files regardless of their name or content
    --allfiles ...... synonymous for --scan-mode=all
    --version ....... show version information
    --info .......... show list of recognized forms
    --update ........ update antivir
    --check ......... used with --update to check for updates
    --temp=(dir) .... specify the directory for temporary files
    --pid-dir=(dir) . specify the directory for PID files
    --home-dir=(dir) location of executable, VDF and key files
    -C (filename) ... name of configuration file
    -s .............. scan subdirectories
    --scan-in-archive files in archives will be extracted and scanned
    -z .............. synonymous for --scan-in-archive (scan in archives, too)
    --archive-max-size=N, --archive-max-recursion=N, --archive-max-ratio=N
    anti DoS feature: do not scan archive content which would
    exceed the given file size, nesting level or compression
    factor limits on extraction (0 means unlimited)
    --archive-max-count=N anti DoS feature: do not scan archive content which
    has more than N files in a recursion level
    --scan-in-mbox .. scan mailbox folders, too (might be time consuming!)
    --heur-macro .... enable macro heuristics
    --heur-nomacro .. disable macro heuristics
    --heur-level=N .. setup heuristics level: 0=off, 1-3=low-high
    -nolnk .......... do not follow symbolic links
    -onefs .......... do not cross file systems while following links
    -noboot ......... do not check any boot records
    -nombr .......... do not check any master boot records
    -nobreak ........ disable Ctl-C and Ctrl-Break
    -nodef ......... do only check the given file types (eg. *.DOC)
    -cf(filename) ... activate CRC check and name the database
    -cv ............. calculate CRC over the whole file length (default 16k)
    -cn ............. insert new files into the database
    -cu ............. recalculate CRC values and update the database
    -v .............. scan files completely (slower with possible false alerts)
    -nopack ......... do not scan inside packed files
    -e [-del | -ren] repair concerning files if possible
    [-del] non-repairable files will be deleted
    [-ren] non-repairable files will be renamed
    -ren ............ rename concerning files (*.COM->*.XXX,...)
    -del ............ delete concerning files
    --moveto=(dir) .. quarantine concerning files
    -dmdel .......... delete documents containing suspicious macros
    -dmdas .......... delete all macros if one appears to be suspicious
    -dmse ........... set exit code to 101 if any macro was found
    -r1 ............. just log infections and warnings
    -r2 ............. log all scanned paths in addition
    -r3 ............. log all scanned files
    -r4 ............. select verbose log mode
    -rs ............. select single-line alert messages
    -rf(filename) ... name of log file
    %d = day, %m = month, %y = year (two digits each)
    -ra ............. append new log data to existing file
    -ro ............. overwrite existing log file
    -q .............. quiet mode
    -lang[:|=]DE .... use German texts
    -lang[:|=]EN .... use English texts
    -once ........... run only once a day
    -if(dateiname) .. antivir uses the given ini file
    --with-(type) ... detect other (non-virus but unwanted) software, too;
    type may be e.g. "dial", "joke", "game", etc,
    there is a --with-alltypes shortcut
    --without-(type) like --with-(type), but disables this type
    --alltypes ...... synonymous for --with-alltypes (obsolete)
    --alert-urls=(yes|no) print URL for more detailed information on alerts
    --warnings-as-alerts exit with a return code as if a concerning file
    had been found when warnings have been issued
    --exclude=(file) exclude files or directories from scan
    --log-email=(addr) send out scan report by email, too
    @(rspfile) ...... read parameters from the file (rspfile)
    with each option in a separate line

    list of return codes:
    0: Normal program termination, nothing found, no error
    1: Found concerning file or boot sector
    2: An alert was found in memory
    3: Suspicious file found
    100: antivir only has displayed this help text
    101: A macro was found in a document file
    102: The option -once was given and antivir already ran today
    200: Program aborted, not enough memory available
    201: The given response file could not be found
    202: Within a response file another @(rsp) directive was found
    203: Invalid option
    204: Invalid (non-existent) directory given at command line
    205: The log file could not be created
    210: antivir could not find a necessary dll file
    211: Programm aborted, because the self check failed
    212: The file antivir.vdf could not be read
    213: An error occured during initialization
    214: License key not found

    [ Download Avira AntiVir Rescue System ]

  • Windows Vista Retail Direct Link from Microsoft Leaked

    2 days ago, there is Windows Vista retail download links posted on some forums. That seems pretty normal as there are people kept on uploading whenever Rapidshare removes them. The special thing about this Windows Vista leak is that it is DIRECTLY from Microsoft! It is original and untouched. It’s the 32bit-Vista version (Ultimate/Business/Home depending on what serial number you use, of course). Full-Version (not an upgrade).
    Windows Vista Leaked
    There are 3 parts to download.
    1. boot.wim
    2. install.wim
    3. X13-49120.exe


    If you look at the filenames of the 3 files, it doesn’t tells you that it’s Windows Vista. My first question is, how did it got leaked out and know that it’s Windows Vista? The total file size for this 3 files is 2.52GB.
    Download Windows Vista Directly from Microsoft
    The domain that hosting the 3 files is msft-dnl.digitalrivercontent.net. I did a whois and this domain belong to a company called Digital River. Digital River is a leading provider of global e-commerce solutions for software and consumer technology. One example is that Norton store is powered by Digital River. After you’ve purchased any software from Norton and you chose to download the product after paying, Digital River will give you a link to download the FULL version.

    Another question in my mind is, why is Windows Vista being hosted on Digital River? We all know Windows Vista don’t ship the product digitally. It comes in original DVD.

    I am shocked and can’t explain. Downloading Windows Vista from the direct leaked link will be a lot faster and easier compared to files on RapidShare. But remember, if these files are hosted on a site chosen by Microsoft as “Content Delivery Network” for its products, it is possible that it logs every IP address that’s been downloading from them. I believe when Digital River notices a high traffic on those 3 files, it will be removed.

    Edit: OK, I was wrong. You CAN buy Windows Vista online and download it after paying. That answered all my questions above on why is it being hosted on Digital River, and how does people know that those 3 files are Windows Vista.

  • Microsoft Windows Vista Product Identification Checker

    Windows Vista Product Identification Checker
    Microsoft Windows Vista PID Checker is a tool to get detailed information on the PID, ID1, ID2, Type, Subtype, Class and Crypto ID from any Windows Vista Product Key. For example, if you found a Windows Vista product key but unsure whether it’s a Ultimate, Business, Home Premium or Home Basic key, simply enter the product key in the Microsoft PIDX check tool, click on the Check button and within seconds it’ll reveal detailed information about the key.


    Check Windows Vista Product Key
    I’m not sure this tool is developed by who because it has no credits, name, links or whatsoever. I searched in Google and also Microsoft website about this tool but with not much result. The only reason I can trust this tool is because it’s from a reliable warez site. The only info I got from warez site about this tool is it is intended for those who have some knowledge and understanding of the mechanism of activation Windows Vista.

    It is possible that this tool is created to harm innocent people by infecting it with trojan or virus and distributing to the internet for people to download. I remembered once I found a free ICQ tool that is able to do check user invisibility and after using it, my ICQ UIN has been hacked. So now I am very cautious on these type of tools. I’ve ran a thorough check on this tool for virus/trojan and it’s CLEAN.

    I can’t provide the download link to this tool because I think it is violating Microsoft policies. Logically, Microsoft wouldn’t create such tool for every people in the world to use other than “maybe” their activation center.

  • Windows Vista Business Edition CD With Permanent Activation Kit

    After gamerman released Windows Vista Home Premium CD Version With Aero Glass & Sidebar, he went on to create an even better Windows Vista on CD. It’s called Windows Vista Business Edition CD With Permanent Activation Kit. Same as the home Premium, except it will be activated permanently with the kit. No 30 timer stop, full activation.
    Download Windows Vista Business Edition CD


    The sidebar has to be first time launched in the start menu, then go into sidebar options and check load with windows.
    Has full array of gadgets and works great. Removed crap like mail, games, screensaver, wallpaper, mind you there is wallpaper in the pictures folder.

    Gamerman made this because a lot of people especially teenagers and students in third world countries and for other reasons, only have a CD burner.

    There’s a good amount of seeders in this torrent as well. Get it quick before it’s gone. In my opinion, this is worth downloading compared to the Windows Vista Home Premium CD Version With Aero Glass & Sidebar.

    [ Download Windows Vista Business Edition CD With Permanent Activation Kit Torrent ]

  • Windows Vista Activators All-In-One

    Found an All-In-One (AIO) Windows Vista Activators. It has a collection of ALL cracks for Windows Vista available on the Internet. This pack saves your time searching for Windows Vista Activator cracks.
    Activate Windows Vista


    This Windows Vista Activators All-In-One contains:

    1. X64 X32 Fix By Anarchy
    2. Vista Activator exe
    3. Key U
    4. Vista Final Crack
    5. RTM Crack by ReebSaw
    6. RTM Crack Nov 18th
    7. WaterMark Patch
    8. Act patch + Serial Key
    9. Vista Final by raven
    10. Act Crack Proof

    I personally have not tested any of the cracks because I did not download the RTM version of Windows Vista. So use the Windows Vista Activation cracks at your own risk.

    [ Download Windows Vista Activators AIO ]

  • Reset WordPress Admin User Password from phpMyAdmin

    Gosh, after being away for a month, I forgot to update one of my client’s website that is running WordPress to the latest version. The site was running WordPress 2.8.3 and is vulnerable to the admin reset exploit. Any one can reset the administrator password by typing a special URL (http://www.domain.com/wp-login.php?action=rp&key[]=) on a web browser causing the administrator password to change and cannot be recovered from the Lost Password page. True enough, some script kiddie found out and used the exploit to reset the admin password. He can’t get in the WordPress admin site but just caused some inconvenience to the owner of the site.
    Wordpress Admin Incorrect Password
    Fortunately resetting the WordPress administrator password is very easy through phpMyAdmin. phpMyAdmin is a free software tool written in PHP intended to handle the administration of MySQL using your web browser. If you don’t have one, I’d suggest you to ask your server administrator to install one.


    Once you’re logged in to phpMyAdmin, you need to make sure you’re editing the WordPress database that you’re supposed to. The list of database should appear on the left pane. Click on it to select the database.

    Once you’ve done that, click on wp_users on the left pane which should list all users for the WordPress site. Look for admin on the user_login column and click the Edit button which has an icon of a pencil.
    edit wordpress admin password
    At the user_pass row, change the value to 5f4dcc3b5aa765d61d8327deb882cf99 and click the Go button.

    Now go to your wp-admin page and log in with the following details:

    Username: admin
    Password: password

    Once you’re logged in, go to Users > Your Profile > scroll down to the bottom of the page and set a new password. Finally, don’t forget to update your WordPress to the latest version so your site will no longer be vulnerable to the wordpress admin reset expoit.

  • Dev Eject Detects File Locking the USB Drive

    3 days ago Christy posted a new thread at the forum sharing some interesting apps. Out of the 6 applications, I was more interested in taking a look at Dev Eject which is used to eject locked USB drives. One of the most common problem that we face with a USB flash drive connected to the computer is unable to safely remove it because the device is currently in use and asking you to close any programs or window that might be using the device and then try again. There are times when you can be very sure that there are no visible files that are running from the USB flash drive but you still cannot eject it. Little did you know that there might be some other process such as Explorer.exe that is locking up the drive. Dev Eject is a small and simple application which you can use to list the files that are open from the drive and which process has them open.


    Dev Eject doesn’t have all those fancy feature and eye-candy interface. It is able to detect when you have inserted a USB flash drive to your computer, ejecting, unplugging and replugging the drive. There is also a lock button where you can use it to see what files are being locked and used by the drive that causes you unable to safely eject the drive. The only risk in using this is there’s an option to Kill the process rather than releasing it. If you have an unsaved document, you will lose all the changes by killing the process.

    Dev Eject

    One of the interesting feature is the ability to automatically “replug” the drive back by simply clicking a button when it has been ejected without you manually unplugging the drive and replugging it back. By default Dev Eject integrates into Windows when it is running and hides the “Safely Remove Hardware and Eject Media” icon from the system tray. This feature can be disabled from the Settings by unchecking “Tray integration”.

    Dev Eject is free and runs on Windows XP/Vista/7 32-bit & 64-bit. Although Dev Eject comes in a setup installer, you can actually copy the program folder to another computer and use it without reinstallation.

    [ Download Dev Eject ]

  • How To Recover, Track and Locate Stolen Notebook

    In Kuala Lumpur, leaving your notebook inside your car is a huge mistake. You think leaving them in your trunk or hidden somewhere in your car is safe but in fact it’s not. You see, every notebook/computer has a battery to keep the CMOS settings. That’s why even if your notebook battery is totally flat, the time is still current. It seems that these laptop thieves possess some kind of device which is used to scan for live battery. When they got a signal of a live battery, they’d take the chance of breaking in your car and look for the laptop or mobile phone. Everyone knows it’s either under the seat or at the back of the trunk.

    Recover Laptop Theft

    Here are some of laptop theft facts:

  • A laptop is stolen every 53 seconds – Safeware Insurance
  • 97% of stolen computers are never recovered – FBI
  • The chances of your laptop being stolen this year are 1 in 10 – Gartner Group
  • The typical loss for a stolen notebook is $6,285 when the cost of lost productivity and replacement of data, software, and hardware are considered – Gartner Group
  • The average loss rises to $61,881 when the value of the information on the laptop is included – CSI/FBI Computer Crime and Security Survey
  • Laptop theft has been attributed to 59% of computer attacks in government agencies, corporations, and universities during 2003 – Baseline
  • Here are some ideas which you try to use to recover, track and locate your stolen notebook.


    There are popular software such as LoJack for Laptops and Stealth Shield Computrace which claims to be the leading theft protection service that tracks, locates and recovers stolen laptop and desktop computers.
    FREE Lojack and computrace
    From what I see, it’s not as high tech as car recovery system using GPS. Here’s how Lojack and Computrace track and locate stolen laptop. Software installed on your computer works behind the scenes to silently and securely contact the software provider Monitoring Center, and if stolen, reports its location using any Internet connection.

    The Recovery Team then tracks the stolen laptop’s location and partners with local law enforcement to get your computer back. They even guarantee that if your stolen computer is not recovered in 30 days, you’ll receive a full refund for the purchase price of the software. The most important factor here is the local law enforcement and Internet Service Provider. To track a person’s location, all they need is the exact time and IP address. They report it to local police, and the police will hand over the IP address and time to Internet service provider to track the phone line that’s being used.

    In my opinion, the software works pretty much like Trojan with reverse-connection except it is a legitimate software and used for non-malicious purposes. I will explain a little on how reverse connection trojan works. The hacker will run the client and build a server first. The hacker enters his own IP address and port that the server will connect to. There might be other features such as plugins and etc. The server is sent to the victim. Once the victim run the server, it will start connecting to the hacker’s IP address. All the hacker need to do is run the client program and listen to the specified incoming port. When it’s connected, file manager, webcam capture, screen capture, keylogger and many other feature can be used on the victim.

    Let’s say my laptop has got a built-in webcam and I infected myself with a remote administration trojan. If my laptop gets stolen, I immediately run the client on other computer and wait for my stolen laptop to go online. Once it’s online, it will automatically connect to my computer. I launch webcam capture, and I can get a snapshot of the thief’s face. With the IP address, time and picture, there’s no running away! Seems like a pretty good idea to me! However, please be advised not to simply use any trojan because some might be backdoored.

    Here are my suggestion on what you can do.
    1. Subscribe to LoJack or Computrace service.

    2. Use LocatePC
    Track Stolen Computer Laptop
    – LocatePC is a free software, and runs unobtrusively on your computer, with no icons, popups or saved emails. If your computer is stolen then the thief will not even know that LocatePC is running, and as soon as they connect to the internet a secret email is sent to you containing the details that you need to track your hardware. It is totally hidden and the only way to bring up LocatePC window after installation is by pressing the default key ALT+SHIFT+HOME. This key combination can be changed.

    [ Download LocatePC ]

    3. Use Reverse Connect Trojan
    Capture Picture of Laptop Thieves
    – If you’re experienced in these kind of tools, then you can infect yourself with trojan and set it to connect to a host. If not, please don’t try it as you might accidentally get backdoored. When your laptop is stolen, just update your IP in dynamic DNS service, run the client and wait for your laptop to get connected to you. When it’s connected to you, immediately log down the time and IP address. If your laptop has a built-in webcam, quickly capture the thieves face.

    NOTE: To track down laptop thieves using the above method, the laptop thief must be logged in to the PC, and the PC connected to the Internet. Logically, if a thief stolen a laptop, they would surely turn it on and check what’s in the PC. Most probably they’ll even connect to Internet. Problem is if you’ve set a password for your user account, they wouldn’t be able to log in, and the tools above won’t work. Would you remove your user account password for a chance to locate your laptop if it is stolen?

  • Permanently Change Kaspersky Security Suite CBE 11 from German to English Without License Error Problem

    Two years ago Kaspersky China gave out 50,000 6 months Kaspersky Antivirus license for free and there is a limitation that the license key can only be used to activate the chinese version of KAV. No problem on that because I managed to figure out how to bypass that limitation by first disabling the self-protection and modify both the language folder and also the registry. It works but when Kaspersky found out, they implemented stronger protection against changing of language for the GUI and even the Shift+F12 on later versions. They did not remove the feature but instead they made a stronger protection for it.

    In Kaspersky Security Suite CBE 11, the default language is in German and if you change the SkinSwitchDisabled registry key to enable the Shift+F12 which I’ve advised on my previous post, you will definitely get the License: error! problem.
    Kaspersky License Error
    Clicking on that will open up License management window telling you that “The application should be reinstalled“.
    The application should be reinstalled
    Trying to reactivate with the same key will only tell you that “This license is already in use“. At first I didn’t want to waste any more time on researching whether it is still possible to change the language from German to English but after reading a comment by whatthe that some Koreans managed to do it, I’ve decided to give it another try and am glad that I managed to do it again.


    I noticed that changing any of the language files or registry value will instantly cause the license error problem. The first thought that came to my mind was Kaspersky probably maintains a list of MD5 hashes to make sure that the files are not modified and once they are changed it will ask to reinstall the application. Having the same MD5 hashes on two different files is possible but it’s not easy and there are limitations so that is out of the question. I failed to find the list of MD5 hashes so I had to think of another way.

    Looking at file name Kaspersky_CBE11.msi suddenly struck me that I should try editing the MSI file to see what is in there. As far as I know, there is a free tool by Microsoft called ORCA which can be used to edit the MSI file but I prefer to use InstEd instead. After spending an hour playing around Kaspersky_CBE11.msi’s database table with InstEd, I finally discovered how to permanently switch the language for Kaspersky Security Suite CBE 11 from German to English without getting the license error or asking you to reinstall the application. Instead of just uploading the modified Kaspersky_CBE11.msi, I personally think that teaching you all how to do it would be more beneficial.

    1. Download and install InstEd.

    2. Right click on Kaspersky_CBE11.msi and select InstEd It! which will open Kaspersky_CBE11.msi with InstEd. If you don’t have Kaspersky_CBE11.msi file, you can get it from any of the links below.

  • HotFile
  • MediaFire
  • FileSonic
  • FileServe
  • RapidShare
  • FileFactory
  • 3. At the Tables tab, click on Registry.

    4. You will need to change from de-DE-xcbild to en at Value column for Localization, LocalizationList and Ins_Localization names. One easy way to do it is to sort according to Value by clicking at the Value once. Then press CTRL+F to bring up the Find box and type de-DE-xcbild followed by clicking on the Find Next button. You should see all 3 names (Localization, LocalizationList, Ins_Localization) together.

    Localization Kaspersky Security Suite CBE 11

    5. When you have finished changing from de-DE-xcbild to en for Localization, LocalizationList and Ins_Localization, click on the File at menubar and select Save.

    6. Now run the Kaspersky_CBE11.msi to install Kaspersky Security Suite CBE 11 and activate it with the key that you got from ComputerBild. If you haven’t done so, you get refer to this article on how to get it. The installation will still be in German but once it reaches the activation part, everything is in English from there on.

    Kaspersky Security Suite CBE 11 English

    If Kaspersky Security Suite CBE 11 is already installed, all you have to do is uninstall it and then reinstall using the modified Kaspersky_CBE11.msi. Do note that the Sidebar Kaspersky Gadget won’t be showing correctly after changing to English interface but I don’t think it is important because they are only shortcuts and eats up unnecessary memory.

    To bloggers/webmasters/forum posters: Hours are spent on researching and I would appreciate if you at least link back to this article if you’re going to post this tip on your website.

    Related posts:

  • FREE Kaspersky Security Suite CBE Win7 (Internet Security 2010) for ALL Windows 7 Users
  • Download Latest Kaspersky Security Suite CBE 2009
  • Download and Activate Kaspersky Security Suite CBE 11
  • Fix AVG Incompatible Software Problem During Kaspersky Internet Security 2009 Installation
  • Free 1 Year Kaspersky Internet Security 2011 License for EVERYONE
  • Touchpad Blocker Auto Disable Mouse Clicks During Typing

    You can probably skip reading this article if you are using a very old laptop with a trackpoint in the middle of the keyboard. All modern laptop comes with a touchpad replacing the old trackpoint which is meant to move the mouse cursor much easier and more accurately. The designers of touchpad did a great job inventing it but the programmers still need to improve on the software because for some weird reason they’ve either never though of fast typing on a laptop’s keyboard can be a problem when you accidentally placed your hand on the touchpad causing the cursor to jump to another paragraph or they simply ignored it.

    Most of the time I type on my external keyboard which is connected to the laptop so that I wouldn’t stress my shoulder but if I had to bring out my laptop, my palm always ended up touching the touchpad when I type on the laptop’s keyboard. I guess this is normal since I am not used to the normal keyboard and my external keyboard is the split type. I have been using TouchFreeze that is able to automatically disable the touchpad when typing but I found a newer one called Touchpad Blocker.


    Basically both TouchFreeze and Touchpad Blocker are created to solve the problem of preventing the mouse cursor from jumping when typing on notebook but they work differently. TouchFreeze totally disables the touchpad during typing but Touchpad Blocker only blocks the clicks during typing which is enough to prevent cursor from involuntary jumping.

    If you have been using TouchFreeze, I would suggest you to switch to Touchpad Blocker because of a few reasons:

    1. Touchpad Blocker is up to date while TouchFreeze has not been updated for 4 years already. Seems to be a dead project…

    2. Touchpad Blocker has options to set the threshold in blocking accidental taps and clicks, and also to set your own favorite hotkey to enable or disable the blocking. TouchFreeze settings are fixed as there are no options.

    Block Touchpad while typing

    3. Touchpad Blocker only block the taps (even tells you how many clicks it has blocked) and clicks which is enough to solve the annoyance of accidental jumping to another paragraph. Don’t really need to disable the entire touchpad. Do note that the mouse clicks that comes from the physical mouse are also blocked during typing.

    4. Touchpad Blocker works perfectly on Windows 7 while TouchFreeze sometimes just fail to work and require to restart the program.

    Touchpad Blocker is free and works with any 32 or 64 bit version Windows. I find that such software is a must to install on a laptop or notebook. What do you think?

    [ Download Touchpad Blocker ]

    Related posts:

  • TouchFreeze Disables Laptop Touchpad When Typing
  • How To Navigate and Use Computer Without Mouse or Touchpad
  • Restrict or Disable Mouse Right Click at Desktop and Explorer
  • How To Restrict or Disable Keyboard, Mouse and Even Power Button!
  • Install Multiple Mouse and Keyboard on One Computer