Saturday, June 15, 2013

Another +15 Best Pc Repairs Utility tools

Another +15 Best Pc Repairs Utility tools
Another +15 Best Pc Repairs Utility tools

Most of the time our PC has to be repaired for no reason. It may be due to some corrupt files or may be due to virus. It’s really very difficult to predict what could have caused the problem. Sometimes even a simple issue in the registry can also make your PC to reboot automatically. We may think that these errors can’t be solved and almost everyone uses to format the windows hard drive. But if we format we will lose all the important applications and re-installing them will waste your time. So here is a list of cool PC repairing tools which can solve most of the errors which arise in the PC. Some of them are portable applications which you can run from your USB.
Here is the list of some of the best PC tools which are very useful for repairing and fixing the PC errors.

Dial-a-fix

Dial-a-fix is a collection of known fixes gleaned from Microsoft Knowledge base articles, Microsoft MVPs, and other important support forums, that will assist you in repairing problems with your system. Although this tool is ordinarily meant for power users, technicians, and administrators, it is quite safe to use even without technical guidance (although guidance is recommended). Simply choose the solutions you wish to apply via check marks  and click GO. As the downside of the application we found that Dial-a-fix does not work with any Windows OS higher than Windows XP. This includes Windows Vista, Windows 7. Dial-a-fix also has a critical un-patched bug that will delete your C:\Documents folder. It is highly recommended to read the Warnings page before downloading and using this software. You can visit to download: http://download.cnet.com/Dial-a-fix/3000-18512_4-84157.html

LSP-Fix

LSP-Fix is a free tool designed to fix internet connections damaged by malware or buggy software. The Layered Service Provider (aka LSP) is a part of your operating system that your computer uses to connect to the internet. Some legitimate software (such as firewalls) and illegitimate software (such as malware/adware/spyware) place files in this location and if they become buggy or removed incorrectly, you will no longer be able to connect to the internet. LSP-Fix will show you the files placed in this zone and will suggest which ones need to be removed to gain internet access again. You can visit to download: http://cexx.org/lspfix.htm

Auto runs detected

This free tool allows you to view nearly everything on your system that is set to automatically run and goes far beyond the capabilities of MSConfig. This tool can show you files that are in your startup folder, files being launched from the registry, files that are launched by Task Scheduler, files that Windows starts by default such as DLL’s, Microsoft and 3rd party services and much more. You can visit to download: http://technet.microsoft.com/en-au/sysinternals/bb963902.aspx

Process Explorer

Ever wonder which program has a certain file or folder open? Now you can find out. Process Explorer displays a list of currently running processes and DLL’s on a local Windows based system. It is very useful for finding viruses and malware. You can visit to download: http://technet.microsoft.com/en-us/sysinternals/bb896653.aspx
RawCopy
RawCopy is a tool designed to copy the contents of one hard drive to another. This program is ideal for those with faulty drives and wants to transfer the data directly without going through folder by folder. The program also has built in data recovery code which will attempt to recover data in bad sectors. This program is designed to run under NT/XP/2000 or later operating systems. However, It will run under windows 95/98/Me operating systems but only windows logical drives can be copied. You can visit to download: http://www.softpedia.com/get/System/File-Management/RAWCopy.shtml and http://www.roadkil.net/program.php?ProgramID=22

Pc Decaprifier

The PC Decrapifier is a program designed to remove or uninstall a specific list of unwanted software in an unattended fashion. It can be used to clean off most of the annoying software that is typically shipped with new PCs. You can visit to download: http://www.pcdecrapifier.com/

Tweak UI

Tweak UI, an official tool from Microsoft, isn’t so much a repair tool but a tool to make small tweaks to an Windows XP based system. Although it does have the ability to repair your hot keys  repair your font folder, repair registry, repair unread mail count and repair icons its real power is it giving you control over how Windows XP behaves. You can visit to download: http://download.cnet.com/Tweak-UI/3000-2072_4-10002117.html

Un-locker

Un-locker helps delete locked files with error messages like:
Cannot delete file: Access is denied
There has been a sharing violation.
The source or destination file may be in use.
The file is in use by another program or user.
Make sure the disk is not full or write-protected and that the file is not currently in use. You can visit to download: http://www.emptyloop.com/unlocker/

Unstoppable Copier

Unstoppable Copier is a tool that allows you to recover files off a failing hard drive that has problems such as a physical damage, bad sectors, errors reading data etc. The program will attempt to recover every readable piece of a file and put the pieces together. The name Unstoppable Copier comes from its ability to skip files that cannot be read. It will just report which file couldn’t be copied and continue on its way. You can visit to download: http://www.roadkil.net/program.php?ProgramID=29

CPU-Z

CPU-Z is a small stand-alone utility designed to give you advanced information about the main devices on your system such as the CPU, Main board, Memory and System. You can visit to download: http://www.cpuid.com/softwares/cpu-z.html

Pocket Kill-box

Pocket Kill-box is a tool that allows you to delete files that Windows won’t allow you to delete because the file is currently in use. Kill-box allows you to choose the file you would like to remove and will delete it when the computer is rebooting (and therefore outside of windows). You can visit to download: http://download.cnet.com/3028-2094_4-75452212.html?c=SEMYAHOO&s=fivemill&pid=dlcom_sem&aid=KillBox-p&dlc=n&part=fivemill

Network Stumbler

Network Stumbler is a free utility designed for finding wireless access points and logging their signal strength. This tool can be used for finding the best location for a wireless access point, finding a location with a strong signal for the connecting device and to find the existence of wireless access points, even if the device has its SSID beacon turned off. You can visit to download: http://www.netstumbler.com/

SoftPerfect Network Scanner

SoftPerfect Network Scanner is a free multi-threaded IP, NetBIOS and SNMP network scanner. This tool will ping computers, scan for listening TCP ports and displays the resources available on the network (router web logins, printers, computer shares etc..). You can visit to download: http://www.softperfect.com/products/networkscanner/

Double Driver

Double Driver is a tool for collecting the drivers that the computer uses to communicate with its hardware. One of the main reasons why you would want to collect an computers drivers is if you don’t have the Driver CD that came with the computer or they are unavailable online. This is a very common task by computer technicians about to format a computer. You can visit to download: http://boozet.org/dd.htm

Treesize Free

Treesize Free is a free utility to view the space usage on your hard drive folder by folder (and its sub-folders) which is something Windows is seriously lacking. You can visit to download: http://www.jam-software.com/treesize_free/

DriveImage XML

DriveImage XML is a free, stand alone application for making a complete backup image of any logical drive or partition, allowing you to backup/restore an entire operating system. The application also includes an image explorer allowing you to view the files inside the backup file created and extract individual files (I’m sure plenty of us have left a file behind at some point). You can visit to download: http://www.runtime.org/driveimage-xml.htm

But remember; always take a backup copy of your system before you make any service, just in case. You never know when you will need it. Now, what if you give your opinion of this article?

Sunday, June 9, 2013

I got hacked! Now what do I do?

I got hacked! Now what do I do?


















I got hacked! Now what do I do?

This is a real situation: You opened an attachment from an email that you, probably, should not have opened, and now your computer has become too slow, some strange things are happening. Does the world ends or is there something you can do to take back control of your PC?
Then somebody has been calling from your bank to tell you that there have been some strange activity on your account and your ISP does not have information on traffic information from your computer, they claim that in recent days has generated a kind of nebula.

All this means that your computer has been attacked and infected with a virus or other kind of "malware", you need to do something to prevent your files from being destroyed and also to prevent your computer from being used to attack others.
These are the basic steps you must take to return to normal after being hacked.

Isolate your computer.

To disconnect that hacker is using to "pull strings" from your computer, you need to isolate it so that it cannot communicate to others on a network. The isolation will prevent the use of your computer to attack other computers; as well as prevent the hacker continue to obtain records and other information. To do this, you must unplug the network cable from your computer and turn off Wi-Fi. If you have a laptop, surely there is a switch to turn off the Wi-Fi.
Do not rely on doing this by means of some software, as malware hacker could tell that something is off when it is actually connected, so if better to relay in the hardware aspect.

Turn off the computer, remove the hard drive and connect it to another computer as an external drive.

If your computer is at risk, you have to turn it off to avoid further damage to your files. After turning it off, you have to remove the hard drive and connect it to another computer as a secondary external drive.
Make sure the other computer has antivirus and anti-spyware both installed and up to date. In addition, you should also download a scanner Free rootkit detection from a reliable source, such as Sophos.
To make things a little bit easier, consider buying a "drive caddy" USB to connect your hard drive to another PC easier.
If you are not using a USB caddy and, instead, choose to connect the indoor unit in place, make sure that the switches on the back of the unit disk is preset as a secondary or slave drive.
If you set it as main drive, you could try to move the data from other PC to the new OS, also transferring malware and all the problems that entails.
If you do not feel confident enough to remove the hard drive on your own or do not have a spare computer, then consider the option of taking your machine to a good PC repair shop.

Scan your disk for viruses and malware.

Use anti-virus, anti-spyware and anti-rootkit from another computer to ensure detection and removal of any viruses that can damage files on your hard drive.

Back up (always) all important files hacked disk.

You want to remove all your personal data from infected disk. Copy your photos, documents, videos and other personal files on a DVD, CD, or hard drive clean.

Replace your hard drive in the PC.

Once you have ensured that your backup files has been successful, you may move the disk back to the original PC and prepare for the next part of the recovery process.
Replace disk DIP switches back to "main" or master.

Thoroughly clean the old hard drive (format it).

Although antivirus and spyware reveal that the threat is gone, still should not trust that your PC is free of malware. The only way to ensure that the unit is completely clean is to use a blank hard disk to completely clean the unit, and then re-load the operating system from a reliable means.
After you've backed up all your data and having put the hard drive back into the computer, use a disk wiping application hard to make clear the entire disk.
There are many of these applications to get free. The disk wiping applications can take several hours to completely clean a disc, and which formats all sectors of the hard drive, even the empty ones, and tend to make several passes to make sure not to skip anything.
It may seem a waste of time, but this way you will be sure that there will be nothing for review and is the only way to be sure that the threat has been removed.

Reload the operating system from a reliable source and install updates.

Use the original operating system disks that you purchased or that came with the computer, do not use any copy or a disc of unknown origin.
Use reliable means will help ensure that no virus is found in a disk operating system re-infect your PC. Be sure to download all available updates and patches for your operating system before installing anything else.

Re-install the antivirus, anti-spyware and other security software before any other action.

Before loading any application, you must load the patches and all safety-related software.
You need to make sure your antivirus software is up to date before you load other applications, whether those applications contain malware, this might go unnoticed if your antivirus is not updated.

Scan backups of your hard drive for viruses before copying them to your computer.

Even if you're pretty sure everything is clean, always scan the files data before reintroducing them back into the system.

Make a complete backup of your system.

Once everything is in perfect condition, you should make a full backup, so that if this happens again it will not take too long to reload the system.
Use a security tool that creates an image of your hard drive as a backup will help accelerate a possible future recovery immensely.
If you are not to comfortable with all this process, you can contact some trained people to do it, thing that could apply a very low rate. In this moment there is a must do it question: What if you tell me your thoughts about this matter?



Saturday, June 8, 2013

10 free tools to clean and maintain your PC safe

10 free tools to clean and maintain your PC safe


















10 free tools to clean and maintain your PC safe

In this article I will let you know a selection of applications that will help you to keep the equipment in good health and free from threats.
For some time the computer has become an essential tool for our work and has also been inserted in a lot of homes. In this context, the health of our PC has become a critical issue. It is important to note that we use various tools combined provide a better option to have everything under control.
This article explores ten essential applications to make our equipment is clean and safe from threats.

CCleaner

Tool specially designed for deep cleaning on your hard drive. Among its main features include options to clean the Windows registry, temporary files, recycle bin, clipboard, Start Menu, Desktop, Recent Documents and search auto, among many other options.
In addition, CCleaner can act performing cleaning Cookies, History and cache, among other options, the leading browsers (Internet Explorer, Firefox, Chrome, Safari and Opera). This application also provides a section for uninstalling programs installed on our equipment, so to free up space. This software has a Spanish language version, the download is free and can be obtained from the website: http://www.piriform.com/ccleaner .

COMODO

For free you can access an interesting combo that includes Antivirus and Firewall to safeguard our team. This is the basic option without charge, but if you want you can purchase the paid version, Internet Security Pro, with many additional options. Well worth saying that it is possible to test the Pro option with 30 days trial.
If we choose the free version, we can achieve very good results up to go surf the Internet and also to our network with a firewall that offers many options and also with proactive protection. To this you can add the option COMODO antivirus that provides for even greater protection. Find more information on http://personalfirewall.comodo.com/ .

Avast!

With this tool you can have a powerful antivirus that will protect our computer from threats and we will go sheltered surf the Internet.
In the free version will find an antivirus with anti-spyware  If we seek a more complete solution we can choose any of the paid versions, as the case of Internet Security, which offers additional solutions for purchase and secure online banking, identity protection and data and other tools aimed to prevent SPAM .
The link to the site from avast! is http://www.avast.com/es-ww/index .

AVG Anti-Virus Free

Another alternative that we can help our team detect and clean viruses. Real-time protection and the ability to search our system the presence of all types of malware are the key benefits of this product.
Additional advantages for those who use the Internet, highlighting the scanner options for links (LinkScanner) and also the possibility of protection in social networks. We can find the link for the free products or find out more options in AVG payable solutions http://free.avg.com/es-es/antivirus-gratis-avg.

Microsoft Security Essentials

This tool is the free option offered by Microsoft for Windows users legitimate versions. Among the advantages of this software may be mentioned the detection and removal of malicious files and spyware. This product integrates the system with a very clear interface, offers a fuss use, for any user that can handle it without problems.
We can access the download page of the product entering http://www.microsoft.com/security_essentials/default.aspx

SpyBot Search & Destroy

A very important tool to scan your computer for spyware and other malicious agents that could jeopardize the security of our computer is SpyBot Search & Destroy.
This program can be downloaded for free from the website http://www.safer-networking.org/es/index.html  and offers a Spanish version easy to use and configure for analysis.
You can also make an immunization process to protect some features of browsers and strengthen security. We may also find additional tools that will help us keep safe the privacy of our system.

Spyware Terminator

If we want to exterminate the spyware on our network this tool can be very useful to us as an alternative to inspect and clean these dreaded our threats. With computer scanning options and real-time protection, Web Security Guard and the addition of an antivirus, this tool is a very good option to consider. We will get more information by logging on: http://www.spywareterminator.com/es /.

Malwarebytes Anti-Malware

One interesting application for our team reviews for malware. If we believe that our computer may be infected with viruses, trojans, spyware, rootkits or other malware, worth trying with this software to try to detect threats and definitely clean our system.
This tool can be achieved in a free version or a full version (paid) on website 

SpeedFan
Part of the health of our team goes through to know the internal components are well. One of the factors that can harm our hardware associated with the excess heat. SpeedFan is a tool that can measure the temperature of both the main processor and the graphics processor (GPU), hard disk and other system features.
This application can also access the hardware some additional data such as voltage, fan speed (revolutions per minute) and SMART features hard drives installed on your computer.
This program can be obtained by entering http://www.almico.com/speedfan.php .

TuneUp Utilities

This is a set of utilities that allow us to optimize the system. With this product we can perform maintenance, improve performance, free space, system troubleshooting, uninstalling unnecessary programs, disable start-up programs you do not need, edit the registry, change the configuration of Windows and many other options.
You can access the free download and see the options for the full version (paid) by entering: http://www.tuneup.es/products/tuneup-utilities/ .

Let me know what do you think about a such interesting issue.