03 April, 2009

ESET Smart Security 4.0.417

0 komentar

ESET Smart Security is a tightly integrated solution designed to protect computers from a range of threats. Built on the award-winning ESET NOD32® Antivirus and its powerful ThreatSense® engine, ESET Smart Security provides antispyware, antispam and customized firewall features. Utilizing ThreatSense — the industry's most advanced heuristics — the window of vulnerability between virus outbreak and signature update is reduced.

The key advantage of this approach is that individual protection modules are able to communicate together seamlessly, to create unparalleled synergy to improve the efficiency and effectiveness of protection. Moreover, the integrated architecture guarantees optimal utilization of system resources, so ESET Smart Security continues ESET's well know reputation for providing rock solid security in a small footprint that will not slow down an individual's computer.

Download : ESET Smart Security 4.0.417 (x86)
Download : ESET Smart Security 4.0.417 (x64)

NOD32 Antivirus 4.0.417

0 komentar

ESET NOD32 Antivirus System - Integrated, Real-Time Protection against viruses, worms, trojans, spyware, adware, phishing, and hackers. Best detection, fastest performance & smallest footprint.

NOD32 Antivirus System provides well balanced, state-of-the-art protection against threats endangering your PC and enterprise systems running various platforms from Microsoft Windows, through a number of UNIX/Linux, Novell, MS DOS operating systems to Microsoft Exchange Server, Lotus Domino and other mail servers.

ESET solutions are built on ESET’s one-of-a-kind ThreatSense technology. This advanced heuristics engine enables proactive detection of malware not covered by even the most frequently updated signature-based products by decoding and analyzing executable code in real time, using an emulated environment. By allowing malware to execute in a secure virtual world, ESET is able to clearly differentiate between benign files and even the most sophisticated and cleverly-disguised malware.

Users of Microsoft® Windows® can experience the power and elegance of NOD32's ThreatSense Technology with ease and comfort. Our single optimized engine offers the best protection from viruses, spyware, adware, phishing attacks, and more. Keep tomorrow's threats at bay with our proactive detection technology.

If you are interested in computer security and would like to get a chance to influence the development of ESET's security systems, we invite you to join our Early Access program. Gain early access to the latest technology in beta and release candidate stages.

Download : NOD32 Antivirus 4.0.417 (x86)
Download : NOD32 Antivirus 4.0.417 (x64)

Trojan Remover 6.7.7

0 komentar

Trojan Remover was written to aid in the removal of Trojan Horses and Internet Worms when standard anti-virus software has either failed to detect the problem or is unable to effectively eliminate it. It was written specifically to carry out such a removal without the user having to manually edit system files, including the Registry. The program also removes the additional system modifications some Trojans carry out which are ignored by other Virus and Trojan Scanners.

Download : Trojan Remover 6.7.7

CentOS 5.3

0 komentar

CentOS is an Enterprise-class Linux Distribution derived from sources freely provided to the public by a prominent North American Enterprise Linux vendor. CentOS conforms fully with the upstream vendors redistribution policy and aims to be 100% binary compatible. (CentOS mainly changes packages to remove upstream vendor branding and artwork.) CentOS is free. CentOS is now accepting donations via PayPal, please click the button for more information.

CentOS is developed by a small but growing team of core developers. In turn the core developers are supported by an active user community including system administrators, network administrators, enterprise users, managers, core Linux contributors and Linux enthusiasts from around the world.

Download : CentOS 5.3 x86
Download : CentOS 5.3 x86-64

Realtek High Definition Audio Codecs 2.21

0 komentar

The ALC882 series 7.1+2 Channel High Definition Audio codecs with UAA (Universal Audio Architecture), featuring five 24-bit stereo DACs and three 20-bit stereo ADCs, are designed for high performance multimedia PC systems.
The ALC882 series incorporates proprietary converter technology to achieve over 100dB Signal-to-Noise ratio playback quality; easily meeting PC2001 requirements and also bringing PC sound quality closer to consumer electronic devices.

The ALC882 series provide 10 channels of DAC that simultaneously support 7.1 sound playback, plus 2 channels of independent stereo sound output (multiple streaming) through the Front-Out-Left and Front-Out-Right channels. Flexible mixing, mute, and fine gain control functions provide a complete integrated audio solution for next generation multimedia PCs.

Download : Realtek High Definition Audio Codecs 2.21

Sysinternals Suite 2009.03.30

0 komentar

Sysinternals Suite By Mark Russinovich (Updated: March 30, 2009)

The Sysinternals Troubleshooting Utilities have been rolled up into a single Suite of tools. This file contains the individual troubleshooting tools and help files. It does not contain non-troubleshooting tools like the BSOD Screen Saver or NotMyFault.

The Suite is a bundling of the following selected Sysinternals Utilities:

(AccessChk,AccessEnum,AdExplorer,AdRestore,Autologon,Autoruns,BgInfo,CacheSet,
ClockRes,Contig,Coreinfo,Ctrl2Cap,DebugView,Desktops,DiskExt,DiskMon,DiskView,
Disk Usage (DU),EFSDump,FileMon,Handle,Hex2dec,Junction,LDMDump,ListDLLs,LiveKd,
LoadOrder,LogonSessions,NewSid,NTFSInfo,PageDefrag,PendMoves,PipeList,PortMon,
ProcessExplorer,Process Monitor, ProcFeatures, PsExec, PsFile, PsGetSid, PsInfo, PsKill, PsList, PsLoggedOn, PsLogList, PsPasswd, PsService, PsShutdown, PsSuspend, RegDelNull, RegJump, RegMon, RootkitRevealer, SDelete, ShareEnum, ShellRunas, SigCheck, Streams, Strings, Sync, TCPView, VMMap, VolumeID,WhoIs,WinObj,ZoomIt)

Download : Download Sysinternals Suite (9.8 MB)

Speed up your browsing of Windows 2000 & XP machines

0 komentar

Here's a great tip to speed up your browsing of Windows XP machines. Its actually a fix to a bug installed as default in Windows 2000 that scans shared files for Scheduled Tasks. And it turns out that you can experience a delay as long as 30 seconds when you try to view shared files across a network because Windows 2000 is using the extra time to search the remote computer for any Scheduled Tasks. Note that though the fix is originally intended for only those affected, Windows 2000 users will experience that the actual browsing speed of both the Internet & Windows Explorers improve significantly after applying it since it doesn't search for Scheduled Tasks anymore. Here's how :

Open up the Registry and go to :

HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/Current Version/Explorer/RemoteComputer/NameSpace

Under that branch, select the key :

{D6277990-4C6A-11CF-8D87-00AA0060F5BF}

and delete it.

This is key that instructs Windows to search for Scheduled Tasks. If you like you may want to export the exact branch so that you can restore the key if necessary.

This fix is so effective that it doesn't require a reboot and you can almost immediately determine yourself how much it speeds up your browsing processes.

Set up and Use Internet Connection Sharing

0 komentar

With Internet Connection Sharing (ICS) in Windows XP, you can connect one computer to the Internet, then share the Internet service with several computers on your home or small office network. The Network Setup Wizard in Windows XP Professional will automatically provide all of the network settings you need to share one Internet connection with all the computers in your network. Each computer can use programs such as Internet Explorer and Outlook Express as if they were directly connected to the Internet.
You should not use this feature in an existing network with Windows 2000 Server domain controllers, DNS servers, gateways, DHCP servers, or systems configured for static IP addresses.
Enabling ICS

The ICS host computer needs two network connections. The local area network connection, automatically created by installing a network adapter, connects to the computers on your home or small office network. The other connection, using a 56k modem, ISDN, DSL, or cable modem, connects the home or small office network to the Internet. You need to ensure that ICS is enabled on the connection that has the Internet connection. By doing this, the shared connection can connect your home or small office network to the Internet, and users outside your network are not at risk of receiving inappropriate addresses from your network.
When you enable ICS, the local area network connection to the home or small office network is given a new static IP address and configuration. Consequently, TCP/IP connections established between any home or small office computer and the ICS host computer at the time of enabling ICS are lost and need to be reestablished. For example, if Internet Explorer is connecting to a Web site when Internet Connection Sharing is enabled, refresh the browser to reestablish the connection. You must configure client machines on your home or small office network so TCP/IP on the local area connection obtains an IP address automatically. Home or small office network users must also configure Internet options for Internet Connection Sharing. To enable Internet Connection Sharing (ICS) Discovery and Control on Windows 98, Windows 98 Second Edition, and Windows Millennium Edition computers, run the Network Setup Wizard from the CD or floppy disk on these computers. For ICS Discovery and Control to work on Windows 98, Windows 98 Second Edition, and Windows Millennium Edition computers, Internet Explorer version 5.0 or later must be installed.

To enable Internet Connection Sharing on a network connection

You must be logged on to your computer with an owner account in order to complete this procedure.
Open Network Connections. (Click Start, click Control Panel, and then double–click Network Connections.)

Click the dial–up, local area network, PPPoE, or VPN connection you want to share, and then, under Network Tasks, click Change settings of this connection.

On the Advanced tab, select the Allow other network users to connect through this computer's Internet connection check box.
If you want this connection to dial automatically when another computer on your home or small office network attempts to access external resources, select the Establish a dial–up connection whenever a computer on my network attempts to access the Internet check box.

If you want other network users to enable or disable the shared Internet connection, select the Allow other network users to control or disable the shared Internet connection check box.

Under Internet Connection Sharing, in Home networking connection, select any adapter that connects the computer sharing its Internet connection to the other computers on your network. The Home networking connection is only present when two or more network adapters are installed on the computer.


To configure Internet options on your client computers for Internet Connection Sharing

Open Internet Explorer. Click Start, point to All Programs, and then click Internet Explorer.)

On the Tools menu, click Internet Options.

On the Connections tab, click Never dial a connection, and then click LAN Settings.

In Automatic configuration, clear the Automatically detect settings and Use automatic configuration script check boxes.

In Proxy Server, clear the Use a proxy server check box.

Use PEN Drive as Ram in Vista

0 komentar



Adding system memory (typically referred to as RAM) is often the best way to improve a PC's performance, since more memory means more applications are ready to run without accessing the hard drive. However, upgrading memory can be difficult and costly, and some machines have limited memory expansion capabilities, making it impossible to add RAM.

Windows Vista introduces Windows ReadyBoost, a new concept in adding memory to a system. You can use non-volatile flash memory, such as that on a universal serial bus (USB) flash drive, to improve performance without having to add additional memory "under the hood."

The flash memory device serves as an additional memory cache—that is, memory that the computer can access much more quickly than it can access data on the hard drive. Windows ReadyBoost relies on the intelligent memory management of Windows SuperFetch and can significantly improve system responsiveness.

It's easy to use Windows ReadyBoost. When a removable memory device such as a USB flash drive or a secure digital (SD) memory card is first inserted into a port, Windows Vista checks to see if its performance is fast enough to work with Windows ReadyBoost. If so, you are asked if you want to use this device to speed up system performance. You can choose to allocate part of a USB drive's memory to speed up performance and use the remainder to store files.