Sunday, December 21, 2008

Norton Recovery Tool ISO to Create a Norton Rescue CD


Norton Recovery Tool provides on-demand scanning and removal or repair of viruses, spyware and other security risks. This tool is not intended to be a replacement for continuous, real-time protection from the latest security risks. Do take note that Norton Recovery Tool does not detect rootkits. The minimum system requirements to run Norton Recovery Tool is a computer with 1.4 GHZ CPU and 1GB of physical RAM.

Download Norton Recovery Tool

Yo use the Norton Recovery Tool CD download the iso file and burn it. Then follow the few simple steps below.

1. Insert the Norton Recovery Tool CD in the CD-ROM drive.
2. Exit all programs and restart your computer.
3. When you see the message “Press any key to boot the computer from CD or DVD”, press Enter.
4. In the Norton Recovery Tool window, select your language and click OK.
5. Enter your Norton 2009 Product Key, and click I Agree to accept the License Agreement.
6. Click Start Scan.
7. Follow the prompts.
8. After the scan is completed, remove the CD from the CD-ROM drive and restart your computer.

Norton Recovery Tool uses Symantec virus definitions to scan your computer for the latest security risks. Virus definitions are automatically updated when your computer is connected to the Internet with a connection that is “always on”. Wireless connection won’t work and DHCP server must be active to provide IP address. Most of the routers nowadays are configured to automatically provide internal IP address to a computer connected to it.

Note: Norton Recovery Tool is ONLY free for those who has a product key for Norton Antivirus 2008/2009, Norton Internet Security 2008/2009 and Norton SystemWorks 12. Notice that I didn’t use the word “GENUINE” because a 25 digit product key generated by “Norton Antivirus 2008 Keygen” (Norton.Antivirus.2008-EDGE) also works.

Norton Recovery Tool for Norton Antivirus 2009
Filename: recovery_nav_x86.iso
Filesize: 241MB
Direct Download Link

Norton Recovery Tool for Norton SystemWorks 12.0
Filename: NSWRECOVERY.iso
Filesize: 241MB
Direct Download Link

Norton Recovery Tool for Norton Internet Security 2009
Filename: recovery_nis_x86.iso
Filesize: 241MB
Direct Download Link

Free 1 Year Panda Internet Security 2009 genuine license key worth US $79.95!

Specifications:

  • Windows XP and Vista (32 and 64-bit).
  • Pentium 300 MHz or faster CPU.
  • 1GB RAM with TruPrevent enabled.

Follow the few simple steps below to get your free Panda Internet Security 2009 serial number:

1. Go to this page http://www.softonic.de/anmelden

2. Enter your email, password, username, firstname, lastname, date of birth, select your gender and click “Mein Konto erstellen” button.
Free Panda Internet Security 2009

3. You will now need to activate your Softonic account. Check your email and you should receive an email from Softonic (push@softonic.com) with the subject Anmeldung bei Softonic.de bestätigen‏. Click the link that you see in that email to activate your account.

4. Now go to this page http://www.softonic.de/weihnachten/spiel. Wait until the game finished loading then proceed to the next step. The flash game is 600KB in size and might take a while to load because the server is a little slow. It is up to you to play the game or not…

5. Go to http://www.softonic.de/preis-gewinnspiel/weihnachten and note down the Seriennummer displayed at the webpage.
Panda Internet Security 2009 Serial Key

6. Go to http://www.pandasecurity.com/homeusers/support/register/. Fill up the form and enter the Seriennummer that you got from step 5 into Activation code box. Click Next. If you filled up the form correctly, you should get a thank you page with client number. Note down the client number.

7. Check your email that you entered in step 6. You should receive an email from yourdetails@pandasecurity.com with the subject Welcome to Panda Security. Note down the username & password, Activation Code and Customer Number.

8. Go to this page http://www.pandasecurity.com/homeusers/downloads/tree/?sitepanda=particulares and login with the username & password that you got from step 7.

9. Download Panda Internet Security 2009. You MUST login in order to download or else you will get the error Access Denied.

10. Open Panda Internet Security 2009 from the system tray, go to Help > Activate the product. Click Next, enter your Activation code, email address and click Next. Make sure Yes is selected when asked are you a Panda Security client. Enter your client number which is actually your “Customer Number” and select your country from the drop down list. Click Next. You will now see that the license expires information stated in the program is one year ahead.

Saturday, December 20, 2008

Trick to lock your private folder

Suppose you want to lock the folder games in d: which has the path D:\GamesIn the same drive create a text file and type
ren games games.{21EC2020-3AEA-1069-A2DD-08002B30309D}
Now save this text file as loc.bat

create another text file and type in it
ren games.{21EC2020-3AEA-1069-A2DD-08002B30309D} games
Now save this text file as key.bat

Now you can see 2 batch files loc and key.Press loc and the folder games will change to control panel and you cannot view its contents.Press key and you will get back your original folder.

Win XP Run Commands

Run line commands can be very useful some times, its better to know them

here are all the commands that i know u might find them usefull too

Commands are same for Windows xp pro and home

Run Line Commands
These are GUI applications that can be opened from the run line.
These applications are not located in the C:\windows\system32\ directory, the
keys for these applications are located in the registry under:
HKLM\software\microsoft\windows\currentversion\app paths
BCKGZM.EXE - Backgammon
CHKRZM.EXE - Checkers
CONF.EXE - NetMeeting
DIALER.EXE - Phone Dialer
HELPCTR.EXE - Help and Support
HRTZZM.EXE - Internet Hearts
HYPERTRM.EXE - HyperTerminal
ICWCONN1.EXE - Internet Connection Wizard
IEXPLORE.EXE - Internet Explorer
INETWIZ.EXE - Setup Your Internet Connection
INSTALL.EXE - User's Folder
MIGWIZ.EXE - File and Settings Transfer Wizard
MOVIEMK.EXE - Windows Movie Maker
MPLAYER2.EXE - Windows Media Player Version 6.4.09.1120
MSCONFIG.EXE - System Configuration Utility
MSIMN.EXE - Outlook Express
MSINFO32.EXE - System Information
MSMSGS.EXE - Windows Messenger
MSN6.EXE - MSN Explorer
PBRUSH.EXE - Paint
PINBALL.EXE - Pinball
RVSEZM.EXE - Reversi
SHVLZM.EXE - Spades
TABLE30.EXE - User's Folder
WAB.EXE - Windows Address Book
WABMIG.EXE - Address Book Import Tool
WINNT32.EXE - User's Folder
WMPLAYER.EXE - Windows Media Player
ACCWIZ.EXE - Accessibility Wizard
CALC.EXE - Calculator
CHARMAP.EXE - Character Map
CLEANMGR.EXE - Disk Space Cleanup Manager
CLICONFG.EXE - SQL Client Configuration Utility
CLIPBRD.EXE - Clipbook Viewer
CLSPACK.EXE - Class Package Export Tool
CMD.EXE - Command Line
CMSTP.EXE - Connection Manager Profile Installer
CONTROL.EXE - Control Panel
DCOMCNFG.EXE - Component Services
DDESHARE.EXE - DDE Share
DRWATSON.EXE - Doctor Watson v1.00b
DRWTSN32.EXE - Doctor Watson Settings
DVDPLAY.EXE - DVD Player
DXDIAG.EXE - DirectX Diagnostics
EUDCEDIT.EXE - Private Character Editor
EVENTVWR.EXE - Event Viewer
EXPLORER.EXE - Windows Explorer
FREECELL.EXE - Free Cell
FXSCLNT.EXE - Fax Console
FXSCOVER.EXE - Fax Cover Page Editor
FXSEND.EXE - MS Fax Send Note Utility
IEXPRESS.EXE - IExpress 2.0
LOGOFF.EXE - System Logoff
MAGNIFY.EXE - Microsoft Magnifier
MMC.EXE - Microsoft Management Console
MOBSYNC.EXE - Microsoft Synchronization Manager
MPLAY32.EXE - Windows Media Player version 5.1
MSHEARTS.EXE - Hearts
MSPAINT.EXE - Paint
MSTSC.EXE - Remote Desktop Connection
NARRATOR.EXE - Microsoft Narrator
NETSETUP.EXE - Network Setup Wizard
NOTEPAD.EXE - Notepad
NSLOOKUP.EXE - NSLookup Application
NTSD.EXE - Symbolic Debugger for Windows 2000
ODBCAD32.EXE - ODBC Data Source Administrator
OSK.EXE - On Screen Keyboard
OSUNINST.EXE - Windows Uninstall Utility
PACKAGER.EXE - Object Packager
PERFMON.EXE - Performance Monitor
PROGMAN.EXE - Program Manager
RASPHONE.EXE - Remote Access Phonebook
REGEDIT.EXE - Registry Editor
REGEDT32.EXE - Registry Editor
RESET.EXE - Resets Session
RSTRUI.EXE - System Restore
RTCSHARE.EXE - RTC Application Sharing
SFC.EXE - System File Checker
SHRPUBW.EXE - Create Shared Folder
SHUTDOWN.EXE - System Shutdown
SIGVERIF.EXE - File Signature Verification
SNDREC32.EXE - Sound Recorder
SNDVOL32.EXE - Sound Volume
SPIDER.EXE - Spider Solitaire
SYNCAPP.EXE - Create A Briefcase
SYSEDIT.EXE - System Configuration Editor
SYSKEY.EXE - SAM Lock Tool
TASKMGR.EXE - Task Manager
TELNET.EXE - MS Telnet Client
TSSHUTDN.EXE - System Shutdown
TOURSTART.EXE - Windows Tour Launcher
UTILMAN.EXE - System Utility Manager
USERINIT.EXE - My Documents
VERIFIER.EXE - Driver Verifier Manager
WIAACMGR.EXE - Scanner and Camera Wizard
WINCHAT.EXE - Windows for Workgroups Chat
WINHELP.EXE - Windows Help Engine
WINHLP32.EXE - Help
WINMINE.EXE - Minesweeper
WINVER.EXE - Windows Version Information
WRITE.EXE - WordPad
WSCRIPT.EXE - Windows Script Host Settings
WUPDMGR.EXE - Windows Update

The following are Control Panel applets that can be run from the run line.
They are located in the c:\windows\system32 directory, and have the file type
extension ".CPL".
ACCESS.CPL - Accessibility Options
APPWIZ.CPL - Add or Remove Programs
DESK.CPL - Display Properties
HDWWIZ.CPL - Add Hardware Wizard
INETCPL.CPL - Internet Explorer Properties
INTL.CPL - Regional and Language Options
JOY.CPL - Game Controllers


MAIN.CPL - Mouse Properties
MMSYS.CPL - Sounds and Audio Device Properties
NCPA.CPL - Network Connections
NUSRMGR.CPL - User Accounts
ODBCCP32.CPL - ODBC Data Source Administrator
POWERCFG.CPL - Power Options Properties
SYSDM.CPL - System Properties
TELEPHON.CPL - Phone and Modem Options
TIMEDATE.CPL - Date and Time Properties
The following are Microsoft Management Console Snap-ins that can be opened from
the run line. These applications have the file type extension ".MSC".
CERTMGR.MSC - Certificates
CIADV.MSC - Indexing Service
COMPMGMT.MSC - Computer Management
DEVMGMT.MSC - Device Manager
DFRG.MSC - Disk Defragmenter
DISKMGMT.MSC - Disk Management
EVENTVWR.MSC - Event Viewer
FSMGMT.MSC - Shared Folders
LUSRMGR.MSC - Local Users and Groups
NTMSMGR.MSC - Removable Storage
NTMSOPRQ.MSC - Removable Storage Operator Requests
PERFMON.MSC - Performance Monitor
SERVICES.MSC - Services
WMIMGMT.MSC - Windows Management Infrastructure
Other Run Line Commands
CONTROL USERPASSWORDS2 - Conventional User Account Interface

Friday, December 19, 2008

Ten Tips to Keep your Computer Running Smoothly

1. Never, never, turn your computer off with the power switch until Windows has shut down.

The one exception to this rule is when your computer locks up and your hard drive is not running (hard drive light is not blinking). In this situation, you can turn the power off without harmful effects to the hard drive. As cutting the power can also result in lost data or Windows files, you should only do this when you have to.

Following this rule will prevent permanent hard drive defects caused by the hard drive heads contacting the surface of the drive disc, and it will prevent a host of Windows problems.
Whenever possible, recover from crashes by pressing the Ctrl + Alt + Delete keys at the same time.

2. I highly recommend that you purchase an UPS (uninteruptable power supply) for your computer. This will keep your computer from crashing during power outages, and will protect your computer from low and high voltage occurrences. A UPS is far superior to a surge protector and will save your computer from almost any type of power disaster. (See #1 above for what happens when your computer crashes.)

3. Backup, backup, backup, any data you cannot afford to lose to at least two separate physical drives. So backup data to external hard drives, Zip disks, CD-RWs etc.
The time to backup is when you create something you can't afford to lose. Don't wait until tomorrow.

4. Run Scandisk and Defragment at least once a month. This will keep your hard drive healthy and prevent crashes. Alternatively, purchase Norton Utilities and use it to keep your hard drive healthy.

5. Never unplug peripherals from the computer when it is powered up. Unplugging with the power on can short out the connector socket or the motherboard.

The only exception to this rule is if you know a peripheral is "hot pluggable". If you do not know what "hot pluggable" means then ignore this exception.

6. Do keep at least 300 MBs of your C: drive free for Windows to use. If you use Windows XP or Vista then you should have 400-600 MBs of free space on your C: drive.
If you do not have enough free space you will choke Windows and it will start dumping data to your hard drive, or it will just get really, really, slow.
Use the ADD/Delete tool in the Windows Control Panel to delete unneeded programs from your drive.
You can also use Cleansweep included in Norton Utilities to clean up your drive. If you do use Cleansweep or another hard drive cleaner, do not delete shared files unless you back them up. The cleaners do a rotten job of knowing if another program uses shared files.

7. Do not let a lot of programs load up when you start your computer. They use valuable memory and Windows Resources (Windows internal workspace).
All programs in your Windows System Tray (in the lower left of your screen) are running on your computer. Close them if you don't need them or run them and configure them not to load when you boot up.
Other programs running in the background can be found by pressing Ctrl + Alt + Delete at the same time.

8. Do use a virus checker regularly. Everyone should use a virus checker. The best type of protection is continuous monitoring from a dedicated anti-virus program like Norton Antivirus.
The second best thing is to use is the free online virus checkers such as Housecall provided by Trend Micro.

9. If you have a high speed Internet connection you need a firewall program. A firewall program keeps those who want to hijack your computer from gaining access to your system. You really do not want someone else running your computer.
I suggest you purchase and run Zone Alarm Firewall program. Your firewall should boot up with your computer to protect it from invasion.

Case in point: When I am online 10 hours or more with my DSL connection, my computer is usually attacked by a hacker at least once.
Do not think you are safe from hackers!! Hackers use search programs to seek out computers at random. Get a firewall program and use it.

10. Keep track of the software disks you receive with your computer and new peripherals. These disks contain valuable software drivers and programs for Windows and are needed when Windows must be reloaded. Keep these disks and your Windows software disks in a safe, dry, place -- you never know when you will need them.
Google