Written By Admin on Friday, May 24, 2013 | 11:24 AM
A couple weeks ago I posted antivirus Full Version Bit Defender Total Security 2013 Free now here is the CCleaner is a freeware system optimization, privacy and cleaning tool. It removes unused files from your system - allowing Windows to run faster and freeing up valuable hard disk space. It also cleans traces of your online activities such as your Internet history. Additionally it contains a fully featured registry cleaner. But the best part is that it's fast (normally taking less than a second to run) and contains NO Spyware or Adware! :)
CCleaner v4.01.4093
Cleans the following:
Internet Explorer
Firefox
Google Chrome
Opera
Safari
Windows - Recycle Bin, Recent Documents, Temporary files and Log files.
Written By Admin on Tuesday, April 30, 2013 | 5:29 PM
Bitdefender Total Security 2013
Ultimate Silent Security
Bitdefender Total Security 2013 builds on #1 ranked anti-malware technology to secure online transactions, protect mobile devices from loss/theft, automatically back up files, and Tune-Up PCs.
Total anti-malware defense
Anti-theft guardian for laptops
Watches over your kids online
Protects Internet connection (Firewall)
Optimizes PC speed & performance
HOW TO USE THE PATCHER?
1. Install BitDefender Total Security 2013
2. Select I want to evaluate this product and enter your email and click install
3. Complete the installation, and then click Finish
4. Before restarting the computer first disable auto scan antivirus and firewall, then to the setting, to the antivirus tab, in the shield tab disable all items on the tab (the bottom line is temporarily disabling antivirus pal)
5. Restart the computer and switch to safe mode by pressing F8 while booting the computer and then select safe mode
6. Then Open "Box_BD2011, 2012.2013. Exe" (to be sure that no antivirus is active first, if there is off for a while)
7. Click the Year in 2045 and then click Exit, and restart the computer normally again
Written By Admin on Sunday, April 28, 2013 | 1:34 PM
For Advance Config:
#Config Tweaks (Advance level) Definitely NOT for beginners.
Config Tweaking Advantage
To avoid blank WAN cause by other users.
Prevents your MAC from being stolen.
Ease of use, say bye bye to Password generators.
Theoretically blocks the FWD (Firmware Destroyer)
Tweaking your modem's config is dangerous and risky, it might render your modem useless or brick it so proceed with caution.
Continuing through this process means that you're willing to take the risk and possibly suffer the consequence of bricking your modem. Try at your own risk!
Lets start..
Login to your modem's GUI 192.168.1.1 as USER:USER
Look for your current MAC Address and Generate Admin Password DOWNLOAD WIMAX TOOL to generate Admin Password.
Steps 1.
login as USER: ADMIN PASSWORD: (Password Generated)
Why we rename it ?
To edit and see color coded script if you don't want to change file extension format just open with WORDPAD
Step 5
Edit each downloaded config downloadconfigfile and downloadcarconfigfile. Edit the default user:user login and make it a admin user so you don't need to genearte password from MAC address . Just change userlevel 2 the default is 1
You can also edit telnet user and password here. look for "TelnetUserName" and "TelnetPassword"
If you want to edit PACKAGE DATE just look "PackageDate" and edit it
Written By Admin on Saturday, April 27, 2013 | 4:55 PM
In this tutorial i will show you interesting and useful trick to password protect folder without using any software using batch file programming. This trick will work on all windows platform (Win XP, Win 7). Follow below tutorial to learn this trick.
How To Lock Folder ?
Open Notepad and Copy code given below into it.
cls
@ECHO OFF
title pinoyxpert.blogspot.com
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST MyFolder goto MDMyFolder
:CONFIRM
echo Are you sure to lock this folder? (Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren MyFolder "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock Your Secure Folder
set/p "pass=>"
if NOT %pass%== pinoyxpert goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" MyFolder
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDMyFolder
md MyFolder
echo MyFolder created successfully
goto End
:End
2. Save the notepad file as lock.bat (.bat is must)
3. Now double click on lock.bat and a new folder will be created with name MyFolder
4. Copy all your data you want to protect in that New folder
5. Now double click on lock.bat and when command promp appears Type Y and press enter.
6. Now MyFolder will be hidden from you view, to access that folde double click on lock.bat
7. It will ask for password enter your password and done. (Default password is pinoyxpert)
Download the offline installer (.msi) below (click here to determine
which installation package to download). When prompted, click Save and
save the file to your Desktop.
Once the download has completed, click Run and begin the installation
process, or navigate to the download file and double-click it to begin
installation.
Written By Admin on Friday, April 26, 2013 | 10:10 PM
Shadow Defender is an easy-to-use security solution (for Windows operating systems) that protects your PC/laptop real environment against malicious activities and unwanted changes.
Shadow Defender can run your system in a virtual environment called 'Shadow Mode'. 'Shadow Mode' redirects each system change to a virtual environment with no change to your real environment. If you experience malicious activities and/or unwanted changes, perform a reboot to restore your system back to its original state, as if nothing happened.
With Shadow Defender, you have the flexibility to specify which files and folders are permanently saved to the real environment. This ensures important files and folders are kept after a reboot.
If you want to make a maintenance-free computer, Shadow Defender will be your best choice.
Shadow Defender Features
1. Prevent all viruses and malwares. 2. Surf the internet safely and eliminate unwanted traces. 3. Protect your privacy. 4. Eliminate system downtime and maintenance costs. 5. Reboot to restore your system back to its original state.
Shadow Defender Users
1. Maintain a system free from malicious activities and unwanted changes. 2. Test software and game installations in a safe environment. 3. Protect against unwanted changes by shared users (suitable for workplaces and educational institutions).
Instructions:
1. download rar files 2. extract the file 3. run setup 4. disconnect your internet..and insert the serial provided.
How to Bypass or Remove a BIOS Password using Software:
!BIOS is a freeware utility which is designed to be a
whole BIOS and security suite. It has the ability to decrypt the
passwords used in some of the most common BIOS makes such as Award,
Phoenix, American Megatrends, IMB etc..
It also has the ability to brute force the password (known as
“blasters”). However, this method is dangerous and can result in some
unexpected and unwanted results.
Note: Because of this applications password cracking abilities, some
antivirus software may report it as a virus/trojan. This is a false
positive.
To start using !BIOS, reboot your computer and take note of the BIOS
type and version you are running. For example, If your motherboard uses
Award BIOS you should look for the text “Award Medallion BIOS 6.0″ or
something similar.
Download !BIOS from here and save it to your desktop. Then, open a DOS command windows by going to Start > Run and type: cmd
Once you see a black screen in front of you, type: cd desktop
You should now see something like: C:\Documents and Settings\YourUserName\Desktop>
Now type the name of the file you just downloaded, if you haven’t changed the name just type in: bios320.exe
A BIOS password is a protection measure that can be used to stop
someone powering up a computer system or making changes in some of the
computers most sensitive areas. Many big name computer manufacturers
such as Dell and HP lock the customers out of this area because they
don’t want the customer changing anything and potentially damaging the
machine (which the manufacturer may have to warranty). However, when
someone like a computer technician or hardware enthusiast needs to make
some hardware changes to the computer, they will need to access the
BIOS. Here are some methods to be a bios password cracker, removing a
BIOS password.
NOTE: Do not try to guess the password on a passworded Hard Drive. 3
wrong guesses will often result in the information on the hard drive
being lost forever.
How to Bypass or Remove a BIOS Password by Removing the CMOS Battery:
The simplest way to remove a BIOS password is to simply remove the CMOS
battery. A computer will remember its settings and keep the time even
when it is turned off and unplugged because these parts are powered by
small battery inside the computer called a CMOS battery. If we pull out
this battery, the computer will forget alot of its hardware settings,
including its BIOS password. This should not be performed on Laptops if
you are not experienced working with laptop hardware. Anyway,
open up the computer case using a screw driver and locate the flat,
circular and metallic CMOS battery. It should look something like the
picture to the right. Some computers have this part standing upright.
Once you have located it, observe how the latches are holding it.
There are many different ways to remove a CMOS battery but the most
common way on newer computers can be seen in the picture below.
Written By Admin on Friday, April 19, 2013 | 6:29 PM
Anonymous Web Surfing
Knowing your online privacy is maintained is priceless. Internet connection records containing personal information are collected and stored of from billions of Internet users around the world every day. Even with information is collected legally, it could inadvertently fall into the wrong hands and be used for tracking your online behavior, stealing your payment information, identity, or malicious purposes. SafeIP can be used for free to protect your Internet connection from such threats by concealing your location securing your Internet connection.
VPN for PC/Mac/Linux/Phone/Router
The SafeIP software application is for Windows, yet you can use the same IP protection service with any of our available locations to protect your other devices such as Mac, Linux, mobile phone, routher, or other device that supports the OpenVPN protocol. Purchase the Pro edition of SafeIP to protect up to 5 devices.
Unblocking Websites
Sites like Facebook, YouTube, Gmail, Twitter, and thousands of others are blocked by many schools, universities, offices, ISPs, or even countries. Even most of Google's services were blocked by China. SafeIP can be used to unblock any website, bypassing filters and firewalls, allowing for a free Internet. SafeIP uses anti-blocking measures to prevent the software itself from being blocked by any Internet Service Provider.
Written By Admin on Saturday, April 28, 2012 | 9:48 PM
i-Catcher Console 3 provides a complete scalable CCTV system, with motion detection, alerting, remote web interface, simultaneous record & playback, scheduled activity, and flexible display options, exceeding the standards you'd expect from a modern digital CCTV system.
i-Catcher Console uses a wide range of camera devices, including USB webcams, capture cards (for connection to conventional analogue CCTV cameras), and the latest network/IP video servers and cameras. Because of its modular design, you are not limited to one type of device for the whole system - you can mix devices as required.
The above image shows i-Catcher Console 3.0 running 18 cameras on a single PC with 3 monitors attached. i-Catcher 3.0's ability to display information on multiple monitors is unrivalled, making best use of digital CCTV's rarest commodity: screen space. i-Catcher Console also works with PTZ (Pan, Tilt & Zoom) cameras to not only provide a remotely moveable CCTV camera, but also provides auto-tracking - the camera can move to follow movement through a monitored area.
Written By Admin on Sunday, April 15, 2012 | 1:33 PM
First up, note down your phones SW/firmware version (find by pressing *#0000# at standby screen, not applicable if the phone is dead), product code (on the sticker under battery in the form of 0XXXXXX) and type (look at the sticker under the battery, it is in the form of RM-xxx).
WARNING: Phone flashing is a double-edged sword; it may be useful and dangerous at the same time. It may brick/damage your phone for good (if not done carefully), so please DO NOT flash your device if you don’t know what the hell flashing a phone means
Written By Admin on Monday, April 2, 2012 | 4:24 PM
Product Highlights
100% protection against any malicious programs via USB drive
USB Disk Security uses innovative technology to block known and unknown threats via USB drive. It supports USB drive, flash disk, secure digital card, thumb drive, pen drive, removable storage, ipod, and more.
Written By Admin on Thursday, March 29, 2012 | 9:08 PM
CafeSuite is powerful Cyber Cafe management software that helps with managing customers and employees, controlling computers and printers, securing systems, accounting and billing. It simplifies and automates running your Internet Cafe business. Unlike many other competitive programs, CafeSuite is robust, quick, secure and very intuitive and easy to use. It doesn't matter how big your Internet cafe is - CafeSuite is capable of controlling any number of workstations. CafeSuite is designed to be a complete solution for Internet cafes and to make life easier for Internet cafe owners, operators and customers.
Uncompromising performance, maximum battery life, a clutter-free PC experience and smart energy efficiency – that‘s exactly what you get with an all-new TuneUp Utilities 2012. Packed full with more than 30 tools, we guaranteed that your PC is in top shape!
Discover All New Features
It’s Windows® like you’ve never seen it before, all thanks to two truly unique technologies built into TuneUp Utilities 2012.