Keyword suggesstion tool

Google Data Center Check

Check to see which are the most popular and relevant keywords for your website using keyword seo tool.

Find A Schhol Near you  

Posted by Arul Jothy



Spy SMS Software 1.5  

Posted by Arul Jothy in , ,

Spy SMS software is the next generation of smart phone spy software. It allows you to monitor SMS activities of a particular target cell phone. If installed on the target mobile phone, it will automatically copy all text messages (SMS) sent and received by the target mobile phone and silently forward these copied messages to your own mobile phone in real-time, all the time without the target user knowing it.The Spy SMS software also allows you.










HOW TO REMPVE autorun.inf FROM YOUR COMPUTER & USB DRIVE  

Posted by Arul Jothy in , , ,

Worms spreads by creating a copy of itself and starts by autorun.inf files. It is essential to remove the malicious and autorun.inf files not only from computers but also from the source, and that is the USB Drive. PreciseSecurity have created a procedure to delete the malicious files on infected drives.

PROCEDURE:
1. While the computer is still off;
2. Plugin the USB Drive
3. Insert the Windows XP CD-ROM into the CD-ROM drive. It must be the bootable
Windows XP Installer
4. Start the computer from the CD-ROM drive. It will start Windows Setup screen
5. When the “Welcome to Setup” prompt appears.Press “R” to start the Recovery Console
6. If asked “Which Window installation would you like to logon to” select the number. Type “1? then Enter, if only one installation of Windows is present
7. Enter the administrator password, press Enter
8. It will bring you to command prompt, C:\Windows>
9. Proceed with the following command:- Type d: (This is the drive letter of USB. It can be
e: or f: defending on how many hard disk or cd drive is installed)- Type attrib -h -r -s
autorun.inf- Type “edit autorun.inf” it will open DOS Editor and display contents as
follows==========================[autorun]
open=file.exeshell\Open\Command=file.exeshell\open\Default=1shell\Explore\Command=file.exeshell\Autoplay\command=file.exe========================Take
note on the file that it called to open (in above example it is file.exe)
10. Exit DOS Editor and return to command prompt, D:\>
11. Delete the file that was called
to open on DOS Editor- Type del /f /a file.exe
12. Delete autorun.inf file- Type del /f /a autorun.inf
13. Exit Recovery Console by typing exit.

COMPUTER SPYWARE, WHAT IS IT AND WHY SHOULD YOU CARE?  

Posted by Arul Jothy in , ,

ADWARE SPYWARE, WHAT IS IT?

Computer Spyware- The term computer spyware is generally used to refer to any software that is downloaded onto a person's computer without their knowledge. It will then "spy" on you.
Adware Spyware or Adware- The term Adware Spyware generally refers to programs that collect general demographic information for advertisers. It is often lumped with the term Computer Spyware.

WHAT DOES SPYWARE DO?

Spyware may collect information about a computer user's activities and transmit that information to someone else. It may change computer settings, or cause "pop-up" advertisements to appear (in that context, it is called "adware").
Computer spyware may redirect a Web browser to a site different from what the user intended to visit, or change the user's home page.
However, the danger that worries most people more is invasion of privacy. Spyware programs can collect all sorts of data off your computer to send back to its maker. Usually it's information that can be used for advertising/marketing analysis, such as what Web sites you visit frequently.
However, there is the potential for computer spyware programs to gather almost any information stored on your computer, including financial/credit card information and personal ID information (for the purpose of identity theft), e-mail addresses of your contacts (for spamming purposes) and so forth.
A type of computer spyware called "key logging" software records individual keystrokes, even if the author modifies or deletes what was written, or if the characters do not appear on the monitor. Thus, passwords, credit card numbers, and other personally identifiable information may be captured and relayed to unauthorized recipients.
Computer spyware can slow the overall performance of your computer to a crawl. It may steal bandwidth from your high speed broadband connection thus slowing down Internet access as one or many spyware programs repetitively call “home” with their ill gotten information.
The answer to the question, should you care? is now rather obvious, isn’t it? You better believe it!

MOST USERS ARE UNAWARE THATTHEY HAVE COMPUTER SPYWARE

Some of these software programs have legitimate applications the computer user wants. They obtain the moniker "spyware" when they are installed surreptitiously, or perform additional functions of which the user is unaware. Users typically do not realize that spyware is on their computer.


They may have unknowingly downloaded computer spyware from the Internet by clicking within a website, or it might have been included in an attachment to an electronic mail message (e-mail) or embedded in other software.

ALMOST EVERYBODY HAS SPYWARE


According to a survey and tests conducted by America Online and the National Cyber Security Alliance, 80% of computers in the test group were infected by computer spyware or adware, and 89% of the users of those computers were unaware of it.
The Federal Trade Commission (FTC) issued a consumer alert on spyware in October 2004.
Several states have passed computer spyware laws, but there is no specific federal law regarding computer spyware.
A central point of the debate is whether new laws are needed, or if industry self-regulation, coupled with enforcement actions under existing laws such as the Federal Trade Commission Act, is sufficient. The lack of a precise definition for spyware is cited as a fundamental problem in attempting to write new laws.
Consumer concern about control of their computers being taken over by spyware, and resulting impacts on their privacy, leads others to conclude that legislative action is needed.