Wednesday, February 27, 2013

Useful Apps for Your Android Tablets

With the advent of technology today, a lot of people are very much hooked in opting for the best and new gadgets, tools and applications too. Below are the list of most useful apps for ur Android Tablets.

Apps for your Android Tablets:

1.) The productivity tool for Android tablets:

          With this type of app you will be able to toggle settings from your profile options easily. You can easily change your profile screen, GPS off and on button using touch and volume control. This will be the best short cut key you can use especially during emergency situations.

2.) The barcode scanner:

         When you go shopping, you can use this bar code scanner to know the price of the product, you don’t have to look for a bar code scanner inside the supermarket because you have your own that will determine the price and the quality of the product brand you chose. There are also times when the camera of your phone will serve as the scanning machine if you don’t have the special key for the bar code apps.

3.) Task killer free advance for cheap tablets:

         This is best for people who are always on the go, it will close all apps that are not in use so that you will be able to preserve your battery life that will result in battery saving so you don’t have to always suffer from low battery.

4.) The AP apps:

         This type of apps is usually about news. You can get local and foreign news from this apps and it will also get stories that are meant for offline reading.

5.) The Astrid:

         This falls under the to-do list apps which will make you come up with a note pad that will make you level your priorities for the day, for the week and for monthly basis. You can set your things to do so that you will be reminded by an alarm every time it falls on the date of the note.

6.) The astro file manager:

         This app will screen the files you will be saving on your device and some files will be automatically redirected to the SD card when the device’s memory is already full.

7.) The Bonsai blast:

          This is a classic game that will entertain you because of its colorful bubbles you need to shoot and make it explode whenever the color matches in 3 consecutive rows. The graphics are great and it can also be very addicting.

8.) The apps uninstaller for cheap tablets:

          This app is about uninstalling files in batches when you don’t need them anymore. It will be helpful to you when you want to delete files that are in batches.

Tuesday, February 26, 2013

FreeRAM XP Pro To Increase Your System's Speed [Freeware]

FreeRAM XP Pro To Increase Your System's Speed [Freeware]

Have you ever noticed that the longer you use Windows in a given session, your PC slows down as you have less memory available? Here's an outstanding, easy-to-use freeware memory "scrubber" utility that frees up and optimizes your PC's memory.

Freeware application to free and optimize your computer's RAM (Random Access Memory), resulting in an increase in system performance and productivity. Automatically configures itself for ease of use and also features advanced options and customizability. FreeRAM XP Pro has been designed to be easy to use yet highly customizable by computer novices and experts alike.

  • Fast, threaded memory freeing with stop option.
  • FreeRAM XP Pro automatically configures itself to optimize your RAM in the background.
  • AutoFree option intelligently optimizes RAM without sacrificing performance.
  • system metric and performance monitors.
  • Advanced tray support.
  • Memory reporting and diagnostic logging.
  • Simple, attractive interface.
  • RAM-cuts (RAM-freeing Windows shortcuts).
  • Customizable Windows hotkey support.
  • Access to Windows memory-related tweaks that could enhance system performance.
  • Process memory usage reporting.
  • Unique memory compression technology directly reduces applications' "working set" memory requirements instantly and without swap file usage.
  • More options and customizability.

Version: 1.52
Size: 606 KB
Supports: Windows 95, 98, ME, 2000, 2003 Server, XP
License: Freeware [?]

Please leave a comment if you found problem with the download link :)

Monday, February 25, 2013

Web Monitoring Tools - Make Internet Surfing Safe For Your Child

Internet services are used by almost everyone across the globe. While some people use it to seek information, others might merely want it for entertainment. Users have complete freedom to use the internet according to their requirements.

Although internet has so many uses, it also has some drawbacks as well. It poses certain risks to children as well as grown-ups. We know that there are many violent content and pornographic websites, which are inept for children. According to some studies, many young people are addicted to social networking sites, which could impact their normal upbringing.

Parents always try to advice their children about using internet the right way. However, some children tend to ignore such warnings, and they end up accessing the websites that they are not supposed to.

How to deal with such a situation?

           Luckily, there are many software tools in the market, which can help you protect your child. Some of the well known ones are internet monitoring software and internet filtering software. These tools come with some great features that can help you take full control of your child’s online activities.

          You could block websites by listing out the URLs, or even filter the contents that are potentially inappropriate or harmful. You could also password protect the applications, so that your child will not be able to access them when you are not around.

           Internet monitoring applications are very efficient and flexible. You can even set filters to instant messages, chat boxes, and emails. You can customize them according to your kid’s age and suitability. Although these tools are user friendly, they come with many advanced features. The best thing is that you access your home computer remotely, from any other destination.

Log Files:

           Web tracking software creates a separate log file, which lists out all the activities taking place on a system. The usage history will still be available to you, even if your child or employee deletes the usage history from his end.

Internet monitoring at workplaces:

            Web monitoring tools are important for businesses as well. With the help of these tools, employers can check if their employees are seriously working, or just enjoying the internet facility. It also helps the management in allotting bandwidth to individual employees. You can easily block downloading and uploading on all the workstations. The tool gives detailed reports to the administrator on the usage of internet.

Make sure that you choose the right internet monitoring tools for your needs. Any good software will include most of the above stated features.

You could now create a safer online environment, be it at home or in your workplace.

Author Bio:
This article was written by Alex. I usually write on helpful tools like the internet monitoring software which can help businesses operate more efficiently. Feel free to leave your comments.

Sunday, February 24, 2013

Download Windows 8 Transformation Pack [Freeware]

Download Windows 8 Transformation Pack [Freeware]

Hi friends! Are you worried about not experiencing Windows 8 as it does not support your system, Don't worry here is an Windows 8 Transformation Pack to convert other versions of Windows into Windows 8.

Windows 8 Transformation Pack will give you Windows 8 UI improvements such as theme and logon screen without touching system files at all so it won't have such risk to harm your system at all. In this package, you'll have Windows 8 inspired themes and applications to make your system resembles Windows 8 as much as possible without modifying system files.

  • M3 user interface for installation/configuration.
  • One-click installation/configuration.
  • UxStyle memory patching.
  • Windows 8 Aero Glass or Lite theme.
  • Instant M2 and M3 wallpaper/logon screen customization.
  • UserTile with current user/wallpaper auto configured on login.
Please share this page with your friend if you found this useful :)

File Size: 47.7 Mb
Version: 6.5
Supports: Windows XP | Server 2003 | Vista | Server 2008 | Win 7
License: Freeware [?]

Please leave a comment if you find problems in the download link :)

Saturday, February 23, 2013

What Is The Most Secure Web Browser For 2013

What Is The Most Secure Web Browser For 2013

Web browsers are the gateways to the Internet. Once exploited, they become the primary vectors for breaking into computer systems and infecting them with malicious programs. One of the most popular means of breaching security barriers and compromising sensitive data over the Internet is via phishing attacks. Malicious URLs linking to phishing sites has been on the rise over the years. For instance more than 50,000 phishing sites were discovered per month in the last year alone. Another major threat is malware, including viruses, worms, Trojans etc that makes your system a prey of a remote predator. As the gateways to the Internet the browsers are bound to protect your systems from these types of online threats. Therefore they implement numerous security work-outs behind the curtains without relying on security barriers of the OS and antivirus software. Following is a comprehensive discussion about the security features on major web browsers seen today.

Internet Explorer 10 Security:

             Over the past couple of years Internet Explorer continued to tarnish its reputation over numerous bugs and vulnerabilities amidst a fierce competition lead by Google Chrome and Mozilla Firebox. However with the new IE 10 launched exclusively for Windows 8 (It supports Windows 7 as well) the software giant strives hard to regain the top notch spot it once enjoyed. Microsoft has introduced several security upgrades to the IE9 in creating the browser destined to serve Windows 8. Enhanced Protected Mode for example restricts browser’s access rights to the other applications to provide an additional layer of protection.

            Address Space Layout Randomization (ASLR) introduced with Windows Vista has been tweaked and renamed ForceASLR, and addresses memory related vulnerabilities often exploited by socially engineered malware. Windows 8 kernel includes ForceASLR protection out of the box, and Windows 7 users can enable the feature via an update. InPrivate Browsing enables the users to browse in private, as the browser does not store browsing history, cookies, temporary internet files, user names and passwords etc during a browsing session. Recently NSS Labs on their review on browser security published that Internet Explorer 10 has a malware blocking rate of 99.1% and Phishing URL blocking rate of 92%.
Recommended For You: Attributes Of A Great Web Browser For Students!

Google Chrome Security:

            Behind the curtains web browsers implement numerous strategies for keeping away malicious code snippets breaking into your system and compromising your data. The Sandbox feature is one such precautionary methodology found in Chrome. This lets a particular application run in an isolated environment without impacting other processes. Based on multi-processor architecture adapted by Chrome, processes such as HTML rendering and handling JavaScript are done in secure, isolated environments protecting your System. However this doesn’t mean Chrome is invincible. Last year a group of French hackers of VUPEN managed to crack this sandbox feature successfully.

            According to a research conducted by NSS Labs reviewing security features of popular web browsers, Chrome had a malware blocking rate of 70.4% backed by Google’s Malicious Download Protection although this lagged behind the 99.1% of Internet Explorer 10. Chrome has also excelled above the rivals in blocking phishing URLs. Just In Time Hardening (JIT) and Plug-In Security too add plus ones to the chromium camp as these features prevent malicious code snippets taking control over your system behind your back.

Mozilla Firefox Security:

             Firefox too is blessed with numerous security features to keep the users safe from exploits and attacks. Site Identity Button provides an overview of the reputation of the website, owners of the website, whether it’s a verified site etc. enabling you to stay away from suspicious sites that could potentially harm your PC. Private Browsing makes browser forget the web history, user names, passwords, cookies etc while Do-not-track feature enables users to inform web sites not to track their behaviors on the sites. However it should be noted that you are only requesting from the websites not to keep tabs on you, adhering to that is entirely up to the website. Firefox is able to mitigate cross site scripting(XCC) attacks using the content secure policy it has adapted to communicate with the website to filter legitimate content.

            Firefox enjoys automatic updates, therefore users always get to enjoy the latest and most stable version of the software without having to manually update. Blocking of phishing attacks, detecting outdated plug-ins and blocking malware integrating with the anti-virus software installed on your PC are some of the key security features of the browser. However blocking rate of malware attacks by the browser itself is very poor, recording around 4.2% compared to the 99.1% of Internet Explorer 10 and 70.4% of chrome. That being said you are at the mercy of your anti-virus software when malware downloaded into the computer is concerned.

Opera Security:

             Considering the leading rivals Opera is a tiny competitor in the browser arena, with a market share of around 4% or less. However that doesn’t necessarily mean it doesn’t have what it takes to go head to head with the bigger players like Chrome and Internet Explorer. Security-wise Opera too offers a decent set of features to protect its users against attacks. Blocking of malware and phishing URLs is one of the foremost tasks of any browser today, and Opera too protects the users from malicious web pages by automatically scanning the web pages against its huge database of known malware and phishing sites. Opera also allows users to enable do-not-track options and control the right to access geographical location details. Another novel feature is the option to control access rights to the web camera when surfing on social media web sites. Private browsing mode or private tabs feature erases web history, cookies, temporary internet files etc during a private session. Opera scores few points offering 256 bit encryption and extended validation certificates for a safer browsing experience. However 3rd party plug-ins and JavaScript still can pose security threats to the browser.


               Like there isn't anything called a perfect security system there isn’t anything called a perfect browser, and there never will be. Each of the browser discussed above have their own set of pros and cons, and beats the rivals in some aspects. Internet Explorer 10 is a huge transition from the not so pleasant history of its predecessors, and offers rich set of features to maximize your security online. Its malware detection system is able to detect and block 99.1% of the known malware as revealed by NSS Labs. No other browser comes even closer to that margin, with chrome following from a distant scoring 70.4%. However when blocking phishing URLs is concerned, chrome excels ahead of the rivals. Firefox too offers decent set of security features along with its automatic updates in order to keep the users safe. Whatever the browser you’d be using, understanding that security flaws do exist with any kind of system and sticking to the latest versions of the applications and installing security updates and patches recommended by the manufacturer are important for a secure online experience.

Author Bio:
Maria Tomic is a media software testing expert from IQmango free software provider. Maria is primarily focusing on DVD tools and looking for the best free DVD burning software for Windows 8 computer.

Increase Your Traffic With The Help Of Social Networks

One of the best ways to increase website’s traffic is via social networking. Before even the Google Penguin exists, social networks have made their mark in the marketing industry, as it is known to be one of the best and the most effective method to direct traffic from one’s social network to his website.

One of the best things about the traffic that is generated from social networks is that, about 30% of the traffic that comes from social networks turns out to be a fruitful one, as a person is able to make sales for his products and services. However one also has to encounter irrelevant traffic too!

Besides just traffic, it also helps in increasing the bounce rate of your website, and search engines specifically Google loves the websites that have a higher bounce rate, hence increasing your chances to get good rankings in search engine.

After Google Penguin, it has become a must for every person to do social media marketing for his webpage, as without that it is really very difficult to increase or even retain the current rankings in search engines specifically Google.

Following are some of the tips and tricks that would help you in increasing your website traffic with the help of social networks:

Bring out the brighter side:

             People these days prefer more humor than serious stuff, and this is because, for them internet has become a source of entertainment, and people take their time out from their busy schedule just to get entertained over the internet. So if you bring out the lighter side of your social network, then people would surely love to join and visit your website, and in that process you will be able to make some good sales too!

Brag about your social media page on other social networks:

            Promoting your website on a single social network is really not enough. In order to get maximum traffic and followers over your social network all you have to do is to brag about your social media page or even about your website over other social networks too, this would allow you to increase your web traffic dynamically and in minimum time frame. In order to post your desired content to over 50+ social sites for free, than all you have to do is to go with vKonnect, as it just takes few seconds to share your post over all these high PR social networks.

Ask your friends to refer their friends:

            In order to get good traffic on your main page, you need to have a good number of following / members along your side. In order to get more members and followers, ask your friends and family members to promote your social media page as much as they can, so that you can create a good following.


            In this article you will get to know how effectively you will be able to increase the traffic of your website with the help of your social networks, and all the factors that would help you in strengthening following are also mentioned in detail.

Friday, February 22, 2013

Top 5 Mobile Security Concerns for 2013

The market share for traditional PC's is falling apart as smartphones and tablets are replacing the desktops. As millions of users shift from PC's to mobile devices, hackers and malware authors who once targeted PC ecosystems are focusing on attacking mobile devices, which are miniature PC's storing huge chunks of sensitive data. Therefore users need to be aware of potential security vulnerabilities and various methods to safeguard their valuable information on mobile devices more than ever. Although many users are familiar about PC security it seems that only few users are actually aware of ways to protect the smartphones and tablets from attacks. The following is a concise review on top 5 mobile security concerns for 2013.

Outdated Operating Systems:

                Outdated operating systems pose serious security threats to the smartphones and tablets. With the current pace at which hardware components are stacked together to produce new and powerful devices each day, predecessors are losing the limelight at a rapid rate. The upgrades to the operating systems are not always compatible with the older phones; therefore a vast majority of users tend to stick with older versions of the OS. Also security patches to the identified threats and updates to existing versions are usually not installed properly by the average users due to their lack of concern over mobile security or lack of knowledge on installation processes. Another major issue especially relevant to Android OS which powers about 75% of the smartphones and tablets out there is its huge fragmentation, which causes upgrade processes dreadfully slow. In fact around 50% of the devices still run Gingerbread, while two major upgrades, Ice Cream Sandwich and Jelly Bean have already been rolled out.

Outdated Applications and Malicious Applications:

                People are shifting from Desktop PC's to smartphones and tablet PC's and so are the hackers and malware authors. Malicious application codes are often bundled with popular free applications found on apps stores, or with pirated copies of paid versions, and average users hardly notice the spying bots disguised within a popular service. Most trusted services like Google Play and Apple iTunes Apps Store too have been injected with malicious apps despite various security barricades, therefore chances of various third party app stores and web sites being infected with malware are quiet high. User modified versions of operating systems often known as Custom ROMs are usually vulnerable to attacks more than official stock ROMs, since users often root the smartphones to gain the super-user access for installing custom ROMs, and rely on pirated versions of popular apps. These third party markets usually are not monitored closely for potential threats by a professional body therefore malware authors can easily distribute their apps coated with malicious codes without getting caught.

Exploited Wireless Networks:

              Public wireless hotspots attract many savvy smartphone users looking for cheap data bundles and many prying eyes of malicious hackers looking for vulnerable targets. Network requests can be manipulated to redirect users to fake websites infected with malware or spyware exploiting the vulnerabilities of the network. User names, user passwords and even stored messages have been retrieved through public Wi-Fi networks without users consent in various occasions. Mobile phones are not typically equipped with firewalls to block insecure connections while surfing on a public Wi-Fi network, therefore potential intruders can steal sensitive data like credit card numbers and bank account numbers and hack into users’ email accounts as well. Using encrypted network connections at home and office, and avoiding accessing public Wi-Fi hotspots at airports and cafeterias are some basic precautions users can take to minimize security threats, until manufacturers and developers start bundling up security firewalls.

Rooting and Jailbreaking of Propriety Operating Systems:

              Gaining super-user access to the operating systems by rooting or jailbreaking exposes the system to plethora of security threats. This process allows users to gain full administrative privileges, and install any application including the ones not recommended by the manufactures over security concerns. Rooted devices are easily manipulated by malware including worms, Trojans and various viruses to steal user names and passwords, contact lists, messages and hijack email accounts behind users back. Rooting devices void manufacturers’ warranty, therefore users are not notified of security patches and security updates once devices are rooted and users typically have to manually address such concerns.

Vulnerabilities in Device to Device Connections:

              Device to device infections are quiet rare yet however that doesn’t mean they are impossible to be carried out. For instance malware authors can exploit the USB host feature introduced with Android Honeycomb for spreading malware. If the connected device’s USB debugging mode is turned on, chances of the device being infected with malware embedded in the host devices are quite high. This could either be accomplished by a bot running in the background of the host without the users’ consent, or by the owner of the infected host himself, by plugging the device into a target device and installing the malware on it. However it should be noted that device to device infections are quiet rare in earlier versions of Android which still powers up to 90% percent of the Android smartphones. It is also speculated that malware authors will utilize desktop PC's to spread smartphone malware in near future.

Author Bio:
This guest post was contributed by Dmitri Blackthorn, the online security expert, mobile technology specialist and a part of team - DDoS Mitigation Service provider.

10 Tips To Obtain More Likes On Your Facebook Page

Getting good Facebook "likes" in your page is a terrific way to achieve new clients. One of the ways which makes mtss is a more efficient marketing technique is always that once individuals have "loved" your Facebook page you are able to achieve to all of them with posts and standing updates free of charge! How awesome is the fact that? Below are some guidelines to help you get began relocating the best direction together with your Facebook page.

Place a like box in your website:

           Facebook provides you with the opportunity to embed a like box in your website with only a couple of clips of code. This can allow much more of your site site visitors the opportunity to call at your page and click on that "like" button.

Invite your customers, buddies, and email e-newsletter customers:

            Odds are you have some Facebook buddies, clients and clients, or people activated for your email e-newsletter that do not yet learn about your Facebook page. They are perfect prospects to achieve to for simple "likes" because they already know that what you are and can most likely interested in that which you offer. Simply send them and enable from Facebook, send them an easy email, or request them personally and I am sure they will not mind.

Run contests and promotions:

          Offering freebies can often be very worth the investment. Imagine how effective something similar to an easy promotion in your Facebook page for example "like us on Facebook for an opportunity to win a totally free dinner for 2 at our new restaurant" might be... I understand basically saw something of that nature in a place I like eating at I'd without a doubt click that they like button so quick that could help make your mind spin!

Tag your fans along with other pages in status updates:

           For photos with individuals or mention other Facebook pages inside your status updates try marking them. This will cause your tales and photos to exhibit on their pages and be visible for their fans too.

Link your Twitter account:

           You might link your Twitter account together with your Facebook page to ensure that whenever you publish a standing update on Facebook it will likewise venture out like a tweet for your Twitter fans. Don't be concerned whether it's a lengthy publish because Twitter will instantly shorten the smoothness length and supply a reduced link that suggests the initial Facebook publish. This can be a great way of helping people on Twitter discover about and "like" your Facebook page.

Request good or bad questions:

           Besides this being a great way to gather valuable feedback out of your fans but it's engaging and provides them something to complete. People tend to savor voicing their opinions also it does not usually take enough time to reply to an easy good or bad question.

Click "like" if:

           Another effective method of getting much more of your visitors to "like" your page is as simple as letting them know to "click like if... " Posting simple updates for example "Click like if you're glad it's Friday", or "Click like for those who have examined our new items/services" will go a lengthy way.

Complete the blank posts:

           Allows face the facts I am sure you've took part in something similar to this at least one time. Everyone loves to demonstrate their creativeness and it is difficult to resist finishing some complete the blank posts like "Basically could travel anywhere at this time I visits _______", and "Basically had an additional time off now I'd _______."

Share industry related information and news:

           Many people really adore to maintain the occasions and digest fresh details about your industry. Believe to determine yourself as a useful source of information and news than posting updates about this in your Facebook page? Have some hot subjects and trends which are happening inside your industry and find out what your Facebook fans consider them!

Operate a specific Facebook advertisements campaign:

           You may even consider managing a low-cost and specific advertising campaign to advertise and obtain more "likes" for the page with faster results. Try to pay attention to just getting individuals to "like" the page rather than clicking through by posting something or making claims that many people would accept and saying click "like" should you agree. Just be sure to possess a decent page setup just just in case they are doing choose to click on for your page. You wouldn't want these to just call at your wall or info tab for those who have a unique offer or perhaps a web page.

Author Bio:
If you like this article and want to read more on this topic, please visit us here: real free facebook likes

Thursday, February 21, 2013

Free Softwares To Increase Your Internet Speed [Freeware]

             Can your PC do better performance in the further operation? After all that cancelled download tasks caused the Internet speed is so sluggish, but did you realize what makes computer performance so sluggish? Okay, here a simple explanation, first there’s a lot of unneeded program or software, which gets your computer much slower; how about the internet connection? What makes it just getting slower as day goes by, for this one may be the simple thing was the expired saved cache, and even it might be viruses or malware or Trojan and something similar. Yeah, if you ask for the reason why, it could be incomprehensive, given that the reason is infinite, the one that’s been cleared, then growing another one, so it is really complex to clear such thing.

            What can you do then to boost your computer performance? Yeah at least, you’d better to do something to increase your pc performance, including making use of antivirus to against malware and friends; or obtain the full internet speed booster , yes alright, that can be the best way there is, why should you removing unused software or application etc vainly as it’s only impacting for a little bit better performance? We know right, there are many software or application can raise computer and internet speed by their feature, and overall that is good, but yet too bad them program is free to download and scanning, then it’s a fully paid features to fix or against the thing, so nonsense.

Recommended: Factors That Affect Your Broadband Speed!

            But absolutely no worry if you explore the internet thoroughly, you may find for what you're looking for, for example to download the full internet speed booster, which makes your internet connection be more qualified in performing robustly. Apart from that, when you're more likely to tend having more trouble in the memory or registry, you can try the registry cleaner application to refine the things. And yet in here, we are going to dig the more new things on how to increase computer and internet speed using these 2 optimization program as the shortlisted below,

1.) Toolwiz Care:

               It’s basically the multifunctional software, not just specialized to improve internet speed connection; this has implemented features for instance registry cleaner, disk cleaner, and many others. It works by the way to get rid of junk files and entries, also defragmenting disk drivers. But please be aware that it may undone changes applied that’s been settled when installing solid-state drive (SSD), so the best method for the users who boot from a SSD should have to prevent the disk defragmenter tool and some many other tweak tools. Whenever it started, it opens a user friendly interface that presents all-in-one Checkup scan and Repair, with its useful toolbars for example Checkup, Cleanup, Speedup, Security, Tools, and the last of all App Manager that includes a lot extras like Duplicate File Finder, Disk Doctor, Repair Network, File Shredder, and Recovery Tools. It is a fully free applicaion without anything lack and compatible with Windows XP/Vista/7/8.

File Size: 7.2MB
OS: Windows XP/Vista/7/8

2.) Internet Turbo 2012:

             Oh yes, this is on the top downloaded list for dial-up program, and it fits you maybe. This software maximizes your Internet speed until 200%, operates by prevents fragmentation of data transfers. It works with all dial-up, LAN, ISDN, Cable, xDSL. This program is featured a connected-forever to keep you connected to your Internet Service Provider (ISP).

OS: NT/98/Me/2000/XP/2003/Vista

Author Bio:
         Imam Sulaeman is one of the authors at Paseban Portal . Visit the blog to get more information, review, and tips about Computers and Online Games.

Wednesday, February 20, 2013

The 10 Most Effective Ways To Extend Your Laptop’s Battery Life

A laptop without a long lasting battery life can be a real nuisance. When you need to look for sockets to constantly charge your laptop it loses all of its charm. Fortunately, there are ways to keep your battery going.
Let's have a look at them.

  1. Don't leave a charged battery unused for extended periods. When the battery is charged, you should use it more than once every two weeks. Also try to make sure that you don't discharge the battery completely.
  2. Don't leave your laptop on standby mode but turn it off completely. Of course placing your laptop in standby mode instead of leaving it on completely will save some battery power, but turning the laptop off will save you a lot more power.
  3. Defragmentation of your laptop should be done on a regular basis. When you do this often, your hard drive will work a lot faster, which will be less demanding on your battery and the hard drive itself. It will make your hard drive a lot more efficient. 
  4. Optimise your power options. Your laptop will give you a few options on how you want to use it. You can go to the power options in the control panel and choose the option max battery for the most efficient power usage effect.
  5. Do not multitask when you use the battery as it will drain more quickly. Instead, stick to using one program at a time. If you want to make sure you get the most of the battery do not let programs run in the background.
  6. Don't demand too much from your PC and chose the programs you use wisely. Activities like playing a DVD or gaming consume less power than programs such as word or email. If you want to use your battery for a long time, stick to the passive activities.
  7. When you lower the graphics you use, your battery will conserve energy. This can be done when you shut off graphic drivers and adjust the screen resolution.
  8. Devices like WiFi and USB drain your laptop battery. Also charging other devices is not advisable.            
  9. Buy a more efficient laptop. New laptops are very energy efficient and some of them even can be used all day long. If you replace an old device with a new one it will give you a quick fix. 
  10. Turn automatic saving options off. Programs like Excel and Word have these options but drain your battery.

Sticking to these simple rules is a sure way to make the most out of your battery. Good luck!

Author Bio:
Rens works for Intralinks, a leading virtual data room provider.

Computer Sound Problem And Steps To Troubleshoot It

We normally spend lots of time on computer, it becomes a part and partial of our life, we get attached with it, and some day when it doesn’t work properly we easily understand something wrong has taken place. When computer faces sound problems or comes to a mum, it creates a panic in our mind; we  get disturb and try to fix it. This article is to troubleshoot and fix the sound problems of computer.

Every computer problem has a reason behind it, which may be hardware, software or both so proper steps should be taken to troubleshoot it, which are as follows,

Muted audio output unknowingly:

           Some times some mistakes are done unknowingly and we came to know about it when all our attempts are used to resolve it. Sometimes we accidently mute the sound of our system and in a hurry tries every other attempts to resolve it.

Click on the speaker icon of your tool bar, and check the status of it, if it is muted then unmute it.

Speaker connection problem:

           Sometimes it happens that your speaker gets loose connected or the cord of it gets damaged, which causes no sound in the system.

The best way to troubleshoot this is to disconnect your speaker and then connect it, if its cord gets damaged then replace it.

Sound card driver problem:

            It may be possible that your sound card driver have some problem. Check the sound devices and their drivers installed through 'Control Panel'.

Re-install your audio driver through appropriate installation CD.

Failure of your sound card hardware:

            If you have reinstall your sound card, and the sound problem still exists, then it is possible your sound card hardware has been damaged.

Change your computer sound card hardware, which should be compatible with your motherboard.

On Windows, run an automatic troubleshooter to find and fix the sound problems with your computer, the steps to run the troubleshooter are as follows,
  1. Click the start button.
  2. Click control panel, then system and maintenance and then device manager.
  3. Expand the sound, video and game controllers category.
  4. If your installed sound card is listed then proceed further, if not, then install a sound card first.
  5. If there is a yellow question mark next to your installed sound card, there might a problem.
  6. Right click the sound card, then properties.
  7. Click the general tab, and look in the device status box to identify problems with the sound card.

Author Bio:
             Matthew Ferrall received the Master degree in software engineering in 2006 and currently serving as a software engineer at Impcsupport. He provides informative articles on Online PC Support, windows maintenance tools, windows support, computer maintenance tools and software’s.

Monday, February 18, 2013

Tips to Prevent Data Loss!

How do you protect yourself from losing important data? Do you save your work as often as possible? Do you do backups? Here are a few effective tips on how to prevent data loss:

Backup your work:

             Backing up your work is simple thing to do: you can use USB’s, CD’s, or external drive, among others, to have a duplicate or backup of your work. Just in case your file was corrupted by whatever reason, you’re sure that you have a secured file stored. You can also try partitioning your hard drive into two: one for the operating system and some programs, while the second partition would be for backup. This way you won’t need to have a separate storage device while preventing data loss.

Use Antivirus and Antispyware Programs:

             Viruses, worms and spywares can delete, modify and corrupt your files. Right after installing programs on your computer, it is a must to install an antivirus and antispyware. Keep your antivirus updated so that it could be effective in preventing viruses. Always scan your computer using antispyware program because spywares could attack your files and give attackers access to it.

Use UPS (Uninterrupted Power Supply):

            Brownouts are unavoidable, so it is advantageous to use UPS. A sudden surge in current could corrupt your files as well as some programs on your computer. While in a middle of encoding your project, you could prevent data loss by using UPS. UPS, could allow you to properly save your work and shutdown your computer, which otherwise would cause files and programs to malfunction.

Don’t try to repair your computer if you’re not qualified to do it:

           If you think that you need to open up your computer because it needs repair, don’t attempt to do it unless you really know what you’re doing. Trying to solve the problem without assistance from a qualified professional could do more damage than good. You could lose not just data, but you could rupture the hardware inside. Or you could harm yourself from electric shock.

Don’t share your file with strangers:

          To protect yourself from data loss, never allow anybody you don’t know to access your important file. You’re never sure what they could do to it. They could steal your work, modify or delete it.

Don’t modify the registry of your Operating System:

          Unless you’re sure what you’re doing, never do changes to the registry. It could harm your operating system that could result in malfunction and loss of some important files.

Sunday, February 17, 2013

How To Download Very Big Files Within Minutes?

How To Download Very Big Files Within Minutes?

Hi friends, i found an intresting way to reduce the download time and to save data by using Highly Compressed versions of the files that i would like to download.
For example take a game which you like the most & whose installation file is about 6GB, Think How much time will it consume to download 6Gb & Your reaction for it?

Now after reading this post you find an intresting way to stop worrying about the download time.
It's simple Just while searching for something which would be very big, Just add the keyword "Highly Compressed" with your search term, That's it!

For example if you are looking to download the game "Need for speed" search as below:

Need for speed Highly compressed

The above search will yield you with a no. of sites offering the download of the compressed version of that game. You will find that those big games which are about 5 to 6 GB are compressed to about just 10 to 20 MB

You too can do this by using this software KGB Archiever. But be aware that this software will use lot of memory during the compression process and slow down your computer to the atmost level. (Better avoid this work if you think your pc cannot withstand this).

How to use the Highly Compressed Download:

Basically in case of games the compressed folders can be extracted by normal softwares like winrar, 7-Zip, etc.. But, On uncompressing you will note that the file will be in .iso format. So you may need to mount it to a virtual drive to open the .iso format file, and to play the game.

Don't worry there is a software named DAEMON Tools Lite to simplify this work for you.

How to use Daemon tools lite:
  • Just download the daemon tools lite form Here.
  • Install it.
  • On installing it you will find an additional drive on your My Computer.
  • Open Daemon tools lite.
  • Click Mount and select the .iso file to be mounted.
  • You will see the mounted files on that new drive on My Computer.
  • Open the drive and enjoy :)

Don't forget to '+1" or to share if you found this useful :)

Saturday, February 16, 2013

FSS Video Converter (Freeware)

FSS Video Converter (Freeware)

FSS Video Converter is a free and powerful tool that allows convert all popular video formats, including HD video. Converter provides you optimized output profiles, you can easily convert video for PC, digital devices and websites.

Supported output video formats:


Supported devices:
  • Apple(iPod, iPhone, iPad)
  • Amazon Kindle
  • Android phones and tablets
  • BlackBerry
  • Sony(PSP, PS3)
  • Microsoft XBox360
  • Nintendo Wii
  • Archos players
  • Creative ZEN Vision players
  • Microsoft Zune players
  • SanDisk Sansa View players
  • Iriver palyers
  • Palm
Supported websites:

Below are the list of websites where you can upload your converted videos directly from the convertor.
  • YouTube
  • Vimeo
  • Facebook
  • DailyMotion
  • TwitVid
  • Flickr
  • Dropbox
License: Freeware [?]
Size: 11.1 Mb
Supports: Windows XP/Vista/7/8/2000/2003/2008

How To Use:
  • Run FSS Video Converter and select your input video file.
  • To select a video you would like to convert hit the Add file button.
  • After you have selected the video input file, click one of the following buttons on the Formats tab of the Main Toolbar.
  • Click the Browse button and select a location on your HDD for the output video files.
  • After you have set up all the conversion parameters, click the Convert button to start converting. You can visually judge the conversion process for every file.
  • That's it! :)

Friday, February 15, 2013

Useful KeyBoard Shortcuts

Useful KeyBoard Shortcuts

Hi friends! below are the list of keyboard shortcuts which may be helpful for you, if u are good at using keyboard rather than mouse. These keyboard shortcuts may be helpful for you in one or another day when your mouse suddenly stopped working.

Consider you are working on an important info. on a word, suddenly your mouse has stopped working and your mouse pointer is still on your monitor, What would u do to save ur file? Below are the shortcuts for all such worse situations, You don't need to Keep all those in memory, Just remember the shortcuts which you think will help you in such situations from the list of below shortcuts :)

Keyboard Shorcuts (Microsoft Windows)

  1. CTRL+C (Copy)
  2. CTRL+X (Cut)
  3. CTRL+V (Paste)
  4. CTRL+Z (Undo)
  5. DELETE (Delete)
  6. SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)
  7. CTRL while dragging an item (Copy the selected item)
  8. CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
  9. F2 key (Rename the selected item)
  10. CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
  11. CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
  12. CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
  13. CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
  14. CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
  15. SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
  16. CTRL+A (Select all)
  17. F3 key (Search for a file or a folder)
  18. ALT+ENTER (View the properties for the selected item)
  19. ALT+F4 (Close the active item, or quit the active program)
  20. ALT+ENTER (Display the properties of the selected object)
  21. ALT+SPACEBAR (Open the shortcut menu for the active window)
  22. CTRL+F4 (Close the active document in programs that enable you to have multiple documents opensimultaneou sly)
  23. ALT+TAB (Switch between the open items)
  24. ALT+ESC (Cycle through items in the order that they had been opened)
  25. F6 key (Cycle through the screen elements in a window or on the desktop)
  26. F4 key (Display the Address bar list in My Computer or Windows Explorer)
  27. SHIFT+F10 (Display the shortcut menu for the selected item)
  28. ALT+SPACEBAR (Display the System menu for the active window)
  29. CTRL+ESC (Display the Start menu)
  30. ALT+Underlined letter in a menu name (Display the corresponding menu) Underlined letter in a command name on an open menu (Perform the corresponding command)
  31. F10 key (Activate the menu bar in the active program)
  32. RIGHT ARROW (Open the next menu to the right, or open a submenu)
  33. LEFT ARROW (Open the next menu to the left, or close a submenu)
  34. F5 key (Update the active window)
  35. BACKSPACE (View the folder onelevel up in My Computer or Windows Explorer)
  36. ESC (Cancel the current task)
  37. SHIFT when you insert a CD-ROMinto the CD-ROM drive (Prevent the CD-ROM from automatically playing)

Dialog Box - Keyboard Shortcuts:

  1. CTRL+TAB (Move forward through the tabs)
  2. CTRL+SHIFT+TAB (Move backward through the tabs)
  3. TAB (Move forward through the options)
  4. SHIFT+TAB (Move backward through the options)
  5. ALT+Underlined letter (Perform the corresponding command or select the corresponding option)
  6. ENTER (Perform the command for the active option or button)
  7. SPACEBAR (Select or clear the check box if the active option is a check box)
  8. Arrow keys (Select a button if the active option is a group of option buttons)
  9. F1 key (Display Help)
  10. F4 key (Display the items in the active list)
  11. BACKSPACE (Open a folder one level up if a folder is selected in the Save As or Open dialog box)

Microsoft Natural Keyboard Shortcuts:

  1. Windows Logo (Display or hide the Start menu)
  2. Windows Logo+BREAK (Display the System Properties dialog box)
  3. Windows Logo+D (Display the desktop)
  4. Windows Logo+M (Minimize all of the windows)
  5. Windows Logo+SHIFT+M (Restorethe minimized windows)
  6. Windows Logo+E (Open My Computer)
  7. Windows Logo+F (Search for a file or a folder)
  8. CTRL+Windows Logo+F (Search for computers)
  9. Windows Logo+F1 (Display Windows Help)
  10. Windows Logo+ L (Lock the keyboard)
  11. Windows Logo+R (Open the Run dialog box)
  12. Windows Logo+U (Open Utility Manager)
  13. Accessibility Keyboard Shortcuts
  14. Right SHIFT for eight seconds (Switch FilterKeys either on or off)
  15. Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
  16. Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off)
  17. SHIFT five times (Switch the StickyKeys either on or off)
  18. NUM LOCK for five seconds (Switch the ToggleKeys either on or off)
  19. Windows Logo +U (Open Utility Manager)
  20. Windows Explorer Keyboard Shortcuts
  21. END (Display the bottom of the active window)
  22. HOME (Display the top of the active window)
  23. NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the selected folder)
  24. NUM LOCK+Plus sign (+) (Display the contents of the selected folder)
  25. NUM LOCK+Minus sign (-) (Collapse the selected folder)
  26. LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder)
  27. RIGHT ARROW (Display the current selection if it is collapsed, or select the first subfolder)

Shortcut Keys for Character Map:

After you double-click a character on the grid of characters, you can move through the grid by using the below keyboard shortcuts:

  1. RIGHT ARROW (Move to the rightor to the beginning of the next line)
  2. LEFT ARROW (Move to the left orto the end of the previous line)
  3. UP ARROW (Move up one row)
  4. DOWN ARROW (Move down one row)
  5. PAGE UP (Move up one screen at a time)
  6. PAGE DOWN (Move down one screen at a time)
  7. HOME (Move to the beginning of the line)
  8. END (Move to the end of the line)
  9. CTRL+HOME (Move to the first character)
  10. CTRL+END (Move to the last character)
  11. SPACEBAR (Switch between Enlarged and Normal mode when a character is selected)

Microsoft Management Console (MMC)
Main Window Keyboard Shortcuts

  1. CTRL+O (Open a saved console)
  2. CTRL+N (Open a new console)
  3. CTRL+S (Save the open console)
  4. CTRL+M (Add or remove a console item)
  5. CTRL+W (Open a new window)
  6. F5 key (Update the content of all console windows)
  7. ALT+SPACEBAR (Display the MMC window menu)
  8. ALT+F4 (Close the console)
  9. ALT+A (Display the Action menu)
  10. ALT+V (Display the View menu)
  11. ALT+F (Display the File menu)
  12. ALT+O (Display the Favorites menu)

MMC Console Window Keyboard Shortcuts:

  1. CTRL+P (Print the current page or active pane)
  2. ALT+Minus sign (-) (Display the window menu for the active console window)
  3. SHIFT+F10 (Display the Action shortcut menu for the selected item)
  4. F1 key (Open the Help topic, if any, for the selected item)
  5. F5 key (Update the content of all console windows)
  6. CTRL+F10 (Maximize the active console window)
  7. CTRL+F5 (Restore the active console window)
  8. ALT+ENTER (Display the Properties dialog box, if any, for theselected item)
  9. F2 key (Rename the selected item)
  10. CTRL+F4 (Close the active console window. When a console has only one console window, this shortcut closes the console)

Remote Desktop Connection Navigation:

  1. CTRL+ALT+END (Open the Microsoft Windows NT Security dialog box)
  2. ALT+PAGE UP (Switch between programs from left to right)
  3. ALT+PAGE DOWN (Switch between programs from right to left)
  4. ALT+INSERT (Cycle through the programs in most recently used order)
  5. ALT+HOME (Display the Start menu)
  6. CTRL+ALT+BREAK (Switch the client computer between a window and a full screen)
  7. ALT+DELETE (Display the Windows menu)
  8. CTRL+ALT+Minus sign (-) (Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PRINT SCREEN on a local computer.)
  9. CTRL+ALT+Plus sign (+) (Place asnapshot of the entire client window area on the Terminal server clipboardand provide the same functionality aspressing ALT+PRINT SCREEN on a local computer.)

Microsoft Internet Explorer Keyboard Shortcuts:

  1. CTRL+B (Open the Organize Favorites dialog box)
  2. CTRL+E (Open the Search bar)
  3. CTRL+F (Start the Find utility)
  4. CTRL+H (Open the History bar)
  5. CTRL+I (Open the Favorites bar)
  6. CTRL+L (Open the Open dialog box)
  7. CTRL+N (Start another instance of the browser with the same Web address)
  8. CTRL+O (Open the Open dialog box,the same as CTRL+L)
  9. CTRL+P (Open the Print dialog box)
  10. CTRL+R (Update the current Web )

Thursday, February 14, 2013

Step By Step – Adding Video To Wikipedia

Step By Step – Adding Video To Wikipedia

Adding video, audio or images to can have a two fold effect on your marketing.
It can be used for either getting quality backlinks to your own content or to hijack traffic from wikipedia.

The quality of the content has to fit in with the article you want to add your multi media content to though. The admins within wikipedia are very quick to delete content they think is not relevant or does not fit with the article or the section of the article.

So the first thing you need to do is choose between what form of multi media you want to add.

Here are the three options we have:

           This is not new, images have been on for a long time. I found personally the best way to do this was by adding local images of a library, an underground station and adding these images first to my own local seo site and then adding to and then from there adding them into in a relevant page about my locality with the file source leading back to the page on my site that the image came from. I found this particularly useful if linking to a content page and I would subtly add some info about a free video training course or a free consultation.

           This is very new! This gives us a huge opportunity as there are millions of articles on wikipedia and very few of them have video! Its possible to add video you have on sites like youtube and flickr and its also OK to add video from your own site as long as you own the rights to that video. Now we have some options within these options...If using your youtube channel then you can link to your channel, your video URL or you can use your name and link that to anywhere really as long as its to your own stuff on the web. Linking to a google+ profile might be the best way of doing this and it needs to be tested, especially if you are syndicating your youtube channel content to Google+ which can be done by using and in the hootesuite account you link to then make sure you have google+ activated :)

           This is another great opportunity especially if you are doing podcasting or curating articles via audio. What you can do here if not, is use content that is freely available as public domain licensed content...for example martin Luther King speech but also link your name to your own content with your name being the vehicle for anchor text to your chosen web page, I would think that linking to your Google+ profile would be acceptable for the admins!

There are a couple caveats though!
  • Your user account must be more than 4 days old for video and audio.
  • You must have made at least 10 article edits before being allowed to add video and audio.
  • You cannot add How To Videos... (been there...tried it deleted very fast!)
OK so to add multimedia to here are the steps needed.

For video (and I think audio but never used audio myself) follow the steps below...
  1. Take a video of something that is relevant to a article and that you know does not have a video in the section you want to add a video to.
  2. Go to and convert your video file to ogg theora file type (.ovg) and save on your desktop or a folder where you can easily find it.
  3. Go to and click on the left hand side link that says “Uploads
  4. You will be presented with a wizard, close the first screen and click on next and follow the wizard along to upload your ogg theora video file (.OVG)
  5. Next you will be asked for the rights you have to add this content to, this is why its best to use your own videos that you created. I choose the first option that this is my own work.
  6. Next it will ask you to add a description, at this point you can simply add more info. and build out the Title into a description. Stick to what your content is about and do not use anything related to affiliate marketing, keep it factual.
  7. Next you will be given a code that you can use on a wiki page. It will look something like this... [[File:Northern Thailand Cuisine Fried Insects At Market Stall in The Floating Market Pattaya, Thailand.ogv|thumb|Northern Thailand Cuisine Fried Insects At Market Stall in The Floating Market Pattaya, Thailand]]
  8. Next go to the web page and then to the section that you want to edit and click on the edit link directly parallel to the section heading and it will open up the edit section, add your code to the bottom and click preview first to check and if you see your video appear when in preview mode, then you can click save and you are done as far as adding a video to
  9. We are not finished yet though, we want to add a clickable link directly from to your own web page on the web. This can be a Youtube Channel, Google + Profile, Website etc.... So we go back to and we click at the top where it says contributions. From here we scroll down and find the video file we just uploaded and click on the first edit link you see on the right hand side as you scroll under the video (The video will show on the page)
  10. OK now that we have entered the edit area we have two choices. First we can add a hyperlink to where your name is or we can add a hyperlink to a keyword in the description or we can add hyperlink to where it says file source Own...I have done both with where it says file source own and also where my user name/author name is. I recommend you use your author name. This is done via the hyperlink icon in the edit page which becomes a WYSYWYG editor with toolbar at the top of the edit section. Once you have added your link simply save and then go back and refresh you page and check that the hyperlink is there.

That's all there is to it but this can be simplified by using the Wikipedia Video Submitter which is available by registering at my Traffic Academy membership site. It has a free membership level and a premium membership level but the free is more than enough for you to check out some of my other work, video training and software.  Click on this link and you will be taken to the registration page where you can then go into the membership and access the wikipedia video submitter.

Tony Hayes

Wednesday, February 13, 2013

Is Your PC Infected With A Virus - Top 5 Anti Virus Programs

What to Do if Your PC is Infected From lethal infections to simply frustrating ones, virus infections are the curse of computer users. Once you’ve recognized the symptoms, what can you do about it?

Don’t Panic - Almost every computer is infected with a virus at one point or another. Quick action and caution are necessary. There are two types of computers - those that have been infected with a virus, and those that will be infected with a virus soon.

Top 4 Reasons to have a strong virus protection software:

  • Protect your computer system from breakdown.
  • Guard Data on your computer from identity theft.
  • Prevent spam email inundation.
  • Peace of Mind.
Definitions for Detection:

             Viruses work by placing bits of code onto separate files, infecting that file before moving on to the next one. This is why, unlike humans, computers are healed of viruses by cutting off the infected part. The code that viruses place on the file has a unique signature that antivirus programs can spot. This method of finding viruses is very common but has one drawback - the antivirus program is only as effective as it is current. Every time a new virus comes out, the program has to be updated.

Top 5 Features to look for in an anti virus software program are,
  • Easy to Install.
  • Simple to Use.
  • Should update itself regularly.
  • Effective at removing viruses and backed by certified testing.
  • Technical Support available.
            To solve this problem, some antivirus programs use a “heuristic” algorithm. Viruses have behaviors in common with each other, such as working without changing the recorded “last modified” date, or avoiding changing the size of the file. The antivirus program will recognize this behavior and find the virus by tracing back to the source. Other antivirus systems use a “baiting” system, where several files are made to look and coded to be like regular files, but are in fact closely watched by the antivirus software. If a virus tries to modify these files, the software catches and contains it. Of course, the cat and mouse game between the virus creators and virus destroyers is endless. Viruses are constantly evolving to dodge tricks put forth by antivirus programs.

Top 5 Virus Protection Software Programs:

  1. Bitdefender Antivirus Plus
  2. Kaspersky Anti-Virus
  3. Norton AntiVirus
  4. F-Secure Anti-Virus
  5. G Data AntiVirus
Then comes the AVG, Avast, etc...

Tuesday, February 12, 2013

Types Of Rootkit Viruses - Preventive Measures

Rootkit is malicious software which is designed to protect/hide the malware, spyware, and bots and prevent them to be detected by normal detection methods. Once it get’s installed in the host computer it has lethal potential to turn your important credentials into garbage.

It is designed to accomplish the following purposes:
  • To get unauthorized access to the owner computer and steal his/her credentials for doing criminal activities, for stealing money via online banking, to steal important documents etc.
  • To hide malicious software like key loggers, viruses to harm the owner of computer.
  • To utilize the computer as a Zombie Computer for performing any unethical activities like sending spam mails, for attacking others computer attached through the Home group etc.

Types of Rootkit Virus:

Persistent Rootkit Virus:
               This Rootkit virus triggers every time the computer startup/reboots. It hides as a valid registry files and replicate action of valid windows registry files. It can’t be recognized easily and gets uploaded every time whenever the computers restart/reboot without any help from external factor. It remains in your computer registry even if the computer is rebooted.

Memory based Rootkit Virus:
               This type of Rootkit virus lies in your computer memory. They occupy an unallotted portion of your computer RAM and remain until computer is shut down by the owner.

User Mode Rootkits:
               In this case rootkits virus digs deep inside the operating system and stores itself in the system drive location and can’t be detected by the antivirus program. It escapes antivirus program detection by integrating itself with the antivirus program. When Antivirus program is initiated to scan the system, rootkit obstruct it and imitate the action of antivirus program and in result does not show any malware in result.

Kernel Mode Rootkits:
               Kernel mode rootkits are more dangerous as compared to the other rootkits. This type of rootkits modifies the Kernel data structures by adding or replacing the existing code. This is one of the most lethal rootkits which can’t be detected by antivirus program as they operate at the same security level as the operating systems.

Firmware Rootkits:
               Firmware rootkits affects the device attached by getting access to the device code and cease operation. You may have listen Mebromi rootkit which affects the graphic card of computer. This rootkit will reinstall itself when you restart your computer.

Boot kits:
              Bootkits is the rootkit which is designed to contaminate the MBR (Master Boot Record) of the computer. It mainly affects the booting process and POST (Power on Self Test) of computer.

Hypervisor Rootkits:
             This kind of rootkits is designed to affect the virtual machine setup. Hypervisor is a layer which is present between the physical layer and the virtual layer; it does not load itself when the computer restarts and become active when operating system is being prompted to initiate virtual machine. Its task is to exploit hardware virtualization and thus exploit system by intercepting hardware operation triggered by genuine operating system.

How to prevent Rootkits:
  • One of the easiest ways to prevent your computer from rootkit is to create system restore points at regular interval.
  • In most of the cases rootkit enters in computer through spam mails, it is always advised to avoid spam mails.
  • It is always recommended to scan every external device before using it as they may contain harmful malwares.
  • You must regularly update computer antivirus program from the genuine website of manufacturer. Apart from the genuine website of manufacturer don’t use antivirus which promises to provide full security these are traps created by the bad people to fulfill their evil intentions.
  • Use Microsoft security essential security tools available on the Microsoft support website.
Symptoms Of a Rootkit:
  • The anti-virus program that you currently have installed no longer runs.
  • PC reboot itself
  • Error messages
  • Your anti-virus stop working
  • Your PC date and time keep changing to a wrong date even after you change CMOS battery
  • PC slow down or run out of memory when you are only running one application
  • Internet become slower
  • Your computer locks up or fails to respond to common inputs
  • Settings in Windows change without your permission
  • You experience excessive network traffic or your network connect becomes slow or disconnected
What to do if you think u are infected:

             If you think you are infected with rootkit virus, you can use one of many Rootkit virus removers available online. A simple search on google for "Anti RootKit" will yield you with various softwares available for this purpose.

Author Bio:
             Bella Martin received the Master degree in software engineering in 2006 and currently serving as a software engineer at Impcsupport. She provides informative articles on Online PC Support, PC technical support, windows support, computer maintenance tools and software’s. 

Latest Posts:


Blog Archive