Windows 7 is Microsoft's Best Windows Yet

Microsoft’s loyal customers are finally getting the operating system they deserve with Windows 7, and it was well worth the wait.

Avid Studio 1.1.0.2887 Multilingual

Avid company represents a unique combination of highly professional audio and video technology to work with video files in your home.

Windows 7 OEM 48 in 1 For Laptop 2011 - DVD - ISO

In the disk has all 48 versions of Microsoft Windows 7. Perfect copies of the OEM - or any activation, cracks and amendments. All versions of English (ENG), updates are available. You get a virgin system, each of which can recreate in their what specifically needed.

Saturday, October 29

How to Remove a Rootkit from a Windows System

How to Remove a Rootkit from a Windows System

What is a Rootkit?
A rootkit is a software program that enables attackers to gain administrator access to a system. On Unix/Linux system, this is called “root” access. Rootkits contain tools and code that help attackers hide their presence as well as give the attacker full control of the server or client machine continuously without being noticed. Sometimes they even cause typical malware type problems. I had a case where a browser hijack was being caused by a particular rootkit installed on the system. In this article, I will show you one way to remove a Rootkit from a Windows system.
“Rootkits are usually installed on systems when they have been successfully compromised and the highest level of access has been given (usually root) Some rootkits refuse to be installed until the attacker has root access, due to read and write permission to certain files. Once the system has been successfully compromised and the attacker has root, he\she may then install the rootkit, allowing them to cover their tracks and wipe the log files.”
A typical rootkit consists of the following utilities:
  • Backdoor Programs – login backdoors, telnetd etc
  • Packet Sniffers – Sniff network traffic such as FTP, TELNET,POP3
  • Log-Wiping Utilities – Bash the logs to cover tracks
  • DDoS Programs – Turn the box into a DDoS client (Remember trinoo?)
  • IRC\Bots – Bots used to take over IRC channels (Lame and annoying)
  • Miscellaneous programs – May contain exploit, log editor
Types of Rootkit
  • Persistent Rootkits
  • A persistent rootkit activates each time the system boots. Normally these types of Rootkits are stored in the system registry.
  • Memory-Based or non-Persistent Rootkits
  • Memory-based rootkits will not automatically run after a reboot; they are stored in memory and lost when the computer reboots.
  • User-mode Rootkits
  • User-mode rootkits operate at the application layer and filter calls going from the system API (Application programming interface) to the kernel. These rootkits normally change the system binary files to malicious code that redirects control of the computer to the creator of the rootkit.
  • Kernel-mode Rootkits
  • Kernel-mode rootkits hook to the system’s kernel API’s and modify data structure within the kernel itself. These are the most effective and dangerous types of rootkits. Kernal-mode rootkits are very difficult to detect and can hide on a system without any indication of being active.
  • Bootkits
  • Bootkits are variations of kernel-mode rootkits that infect the Master Boot Record (MBR). The malicious code can be executed before the computer actually boots.
  • FirmWare
  • A firmware rootkit infects a device or piece of hardware where code resides, such as a network card or the system BIOS. Mebromi firmware rootkit http://blog.webroot.com/2011/09/13/mebromi-the-first-bios-rootkit-in-the-wild/
  • Hypervisor
  • These are newer types of rootkits that are infecting the hypervisor layer of a virtual machine setup. The hypervisor is basically the layer between physical hardware (host systems) and the virtual system (guest), although a type II hypervisor can be installed on top of an OS in order to present a virtual layer to the virtual system. These rootkits can intercept hardware “calls” going to the original operating systems.

How to remove the Rootkit

This is where it gets fun! There are different approaches and really no single full-proof method, neither is it guaranteed that the rootkit will be fully removed. As a matter of fact, there are some computer security experts who simply recommend formatting the drive and completely re-installing the operating system.
The Manual Method
This may or may not be more time consuming than trying to search using an automatic tool. If you are familiar with legitimate Windows services and programs and can pick out suspicious files, then this could be the way to go. Many times, rootkit scanners will not detect rootkit infections, especially if they are new, so this may be the way to go if you don’t want to go straight to the nuke-and-pave solution.
Tools:
Here is a process for locating a rootkit via msconfig:
    1. Open msconfig and enable bootlog. In XP, goto Start then Run. Type in “msconfig” (without quotes). Goto the “boot.ini” tab and tick “Boot log” In Vista and Windows 7, goto Start, type in “msconfig” (without quotes). Goto the “Boot” tab and tick “Boot log”2. Restart the Computer 3. Open C:WINDOWS or C:WINNT and open ntbtlog and search for malicious files. You can start by searching this short list from Computersight.com for the files starting with the following names. It may contain some random characters after it.
  • rot
  • gas
  • gaopdx
  • seneka
  • win32k.sys
  • uacd
  • tdss
  • kungsf
  • gxvxc
  • ovsfth
  • msqp
  • ndisp
  • msivx
  • skynet
  • Get the path of the file name: \SystemRoot\system32\drivers\BadRootkit.sys For an exhaustive list of rootkits that you can search for, check out this Rootkit List from Bleeping Computer. 4) Open up a command prompt and disable file permission using either the CACLS or ICACLS command. For e.g., type cmd in the Run box (XP) or search box (Vista/7) with Admin privileges (in Vista and Windows 7 Hit Ctrl-Shift-Enter to enter the command prompt as an Admin) and type cacls C:WINDOWS\system32\drivers\BadRootkit.SYS /d everyone or Icacls C:WINDOWS\system32\drivers\BadRootkit.SYS /deny S-1-1-0:FMRXRW (cacls /d everyone denies permission to the files for all users, Icacls /deny Sid:permission can deny Simple or Specific rights) 5) Restart the computer 6) Search for the file in the following location and remove it C:\WINDOWS or C:WINNT C:\WINDOWS\system32 C:\WINDOWS\system32\drivers Registry Clear the temp, %temp% and prefetch folders The Automatic/ Semi-Automatic method
You can check out a list of rootkit removal tools here.
I would first fire up TDSSKiller from Kaspersky. It runs a fairly quick scan and TDSS variants are popular, so it may catch something on the first attempt.
If the TDSSKiller comes up empty then try out GMER, which is a powerful and exhaustive rootkit scanner.
From there I like to use AVG’s Rootkit Scanner. This tool has actually found quite a bit of rootkits for me. It’s also good to run it after you have removed the rootkit to be thorough, although you could do that with any of these tools. Another program worth mentioning at this point is the new Microsoft Standalone System Sweeper Beta. There has been some buzz that this tool has been fairly successful at finding hidden rootkits.
If these rootkit scanners are not finding anything, or they do find something but can’t delete it, then you may have to move to the manual method. You can also keep trying other tools but there does come a point when you have to evaluate if the time and effort is worth it or you should either try a manual method, or perform a full re-installation of the operating system. 

credits to Chuck Romano

Thursday, October 27

Offline NT Password & Registry Editor


Offline NT Password & Registry Editor is a freeware utility that allows you to change or blank the password of any user that has a valid account on a local NT/2000/XP/2003/Server 2008/Vista 32 & 64bit system. You do not need to know the old password to set a new one which makes this ideal for use with clients who have forgotten their password or were locked out by someone else. Unlocking locked or disabled accounts is also supported.

This tool comes in the form as a bootable CD ISO or Floppy disk ISO but can also be made to boot from a USB drive. The application is Linux based and it asks you questions about which drive and Windows install you would like to work with. Most questions can be answered just by pressing Enter since the best option is already chosen.

Warning: If used on user accounts that make use of EFS encrypted files, all encrypted files will become unreadable unless you remember the old password again. This is a serious technician tool and shouldn’t be used by people who don’t know what they are doing.

Download Links:

http://home.eunet.no/pnordahl/ntpasswd/cd080802.zip
http://home.eunet.no/pnordahl/ntpasswd/bd080526.zip

RKILL


The malware world is changing. It’s getting smarter.
In fact, some infections will detect that you have launched an anti-malware tool such as MalwareBytes and close it down as soon as you open it, which makes your job much harder. This is the exact situation Rkill is designed for.

RKill is a program developed at BleepingComputer.com that was originally designed for the use in our malware removal guides. It was created so that we could have an easy to use tool that kills known processes that stop the use of our normal anti-malware applications. Simple as that. Nothing fancy. Just kill known malware processes so that anti-malware programs can do their job.
So in summary, RKill just kills processes, imports a Registry file that removes incorrect file associations and fixes policies that stop us from using certain tools. Then it kills Explorer.exe so it will restart and enable some of the Registry changes. When done, RKill will then create a log listing all processes that were terminated while the program was running. Please note that this will include processes that were terminated manually by the user as well as RKill. Other than what is listed above, it does nothing else.

Download Link:

http://download.bleepingcomputer.com/grinler/rkill.exe

Wednesday, October 26

TeamViewer 6.0.11052 Full Version-P2P


TeamViewer 6.0.11052 Full Version | By P2P | 16MB

Release Group: P2P
Release Name: TeamViewer.6.0.11052-P2P
Release Date: 16 Oct, 2011
Filename: TeamViewer.6.0.11052.Rar
Size: 16 MB
Type: Screen-Sharing and File-Transfer Utility

Description :
TeamViewer is a simple and fast solution for remote control, desktop sharing and file transfer that works behind any firewall and NAT proxy.

To connect to another computer just run TeamViewer on both machines without the need of an installation procedure.
With the first start automatic partner IDs are generated on both computers. Enter your partner’s ID into TeamViewer and the connection is established immediately.

With over 100 million users TeamViewer is a standard tool to give support and assistance to people in remote locations.
The software can also be used for presentations, where you can show your own desktop to a partner.

*Install Notes*

1. Install
2. Make sure teamviewer is closed from system tray and end task/kill the
teamviewer service
2. Replace the .exe files with the ones supplied in the crack folder.
3. Enjoy!!!

IMPORTANT :
Install as non-commercial/personal use first then replace the files.. if you have a trial version expired try to replace the files to see what happends.. i didn’t test it like that..

If still have it as trial. uninstall and remove any left over traces of teamviewer from your HD and registry and install as free user…if you’re a newbie and need help for this task use google and s earch.. the answer is out there.

This information is not owned by COMPUTER VAULT. For more details, just visit the website.

Download Link:

http://www.mediafire.com/?6x5av884mg7uedr

Tuesday, October 25

DriverPack Solution 11 New 2011 version


DriverPack Solution is the most popular program that makes the job of finding and automatically installing drivers a pleasure.

DriverPack Solution simplifies the process of reinstalling Windows on any computer.
No more problems with searching and installing drivers.
Everything will be done in a couple of mouse clicks!

Automated driver installation
The program installs all required drivers to any computer in just about 5 minutes.

Saves Time and money
No more wasting time on looking for drivers; all required drivers will be installed with only a few clicks.

Any driver for any computer
All drivers on a single DVD!
Simplifies downloading new drivers from the Internet.

Drivers update capability
Updates previously installed drivers to their latest versions.

Windows XP / Vista / 7 (x86-x64)
Supports all modern operating systems!
Both 64-bit and 32-bit versions!

Easy to use
Simple and foolproof interface.



Credits to glennblair21

Download Link:

http://www.mediafire.com/?hpl75gdppwus9

Sunday, October 23

AVG 2012 Beta + serials



AVG Internet Security provides multiple layers of protection for everythingyou do online, which means you dont have to worry about identitytheft, viruses, or visiting harmful sites. AVG Protective CloudTechnology and AVG Community Protection Network are included, meaning wecollect the latest threat information and share it with our communityto make sure you receive the best protection.

Here are some key features of AVG Internet Security:

AVG Firewall and AVG Identity Protection
AVG Online Shield
AVG Social Networking Protection
AVG Smart Scanning works while you play
AVG Protective Cloud Technology, AVG Community Protection Network and AVG Anti-Spyware

This information is not owned by COMPUTER VAULT. For more details, just visit the website.

Download Link:

http://www.mediafire.com/?pxkek9q9xovd3ds
Mediafire Password is : namelezz

INVALID BOOT.INI


When you start your computer after you upgrade to Microsoft Windows XP, you may receive one or both of the following error messages:

Invalid Boot.ini 


or


Windows could not start because the following file is missing or corrupt: 

Windows\System32\Hal.dll 

Follow the procedure below to repair original boot.ini file

1. Insert the Windows XP CD-ROM into your CD-ROM or DVD-ROM drive, and then restart your computer.
2. When you receive the "Press any key to boot from CD" message, press a key to start your computer from the Windows XP CD-ROM.
3. When you receive the "Welcome to Setup" message, press R to start the Recovery Console.
4. Now enter your administrative username and password, when you get the command prompt type the following command bootcfg /rebuild and press Enter. This command scans the hard disks of the computer for Windows XP, Microsoft Windows 2000, or Microsoft Windows NT installations, and then displays the results. Follow the instructions that appear on the screen to add the Windows installations to the Boot.ini file. For example, follow these steps to add a Windows XP installation to the Boot.ini file:

a. When you receive a message that is similar to the following message, press Y:
               
           Total Identified Windows Installs: 1

            [1] C:\Windows 
            Add installation to boot list? (Yes/No/All)
         
b. You receive a message that is similar to the following message:       

             Enter Load Identifier                             

             Type the name of your operating system  and then press ENTER. This is either Microsoft  
              Windows XP Professional or Microsoft Windows XP Home Edition.

c. You receive a message that is similar to the following:

              Enter OS Load options

              When you receive this message, type /fastdetect, and then press ENTER.

5. Type exit, and then press ENTER to quit Recovery Console. Your computer restarts, and the updated boot list appears when you receive the "Please select the operating system to start" message.               

    

Windows XP TrueFaster Pro SP3 (2011) (32/64 Bits)



Windows Sofware | Windows XP TrueFaster Pro SP3 (2011) (32/64 Bits) | 700 MB
Including S-ATA Drivers – All updates from Microsoft – 100% Genuine XP -including S-ATA Drivers For n-Force ,Intel ,ATI Chip-sets [32/64 Bits] Both Desktop and Notebook drivers
-Including Needed Plugins and Direct X Updates
-including All updates from Microsoft
-100% Genuine XP
-Included Latest Versions Of Internet Explorer ,Windows Media Player 11 and more at the time of release
-Disc can Boot with any Motherboard
Pre Activated, No WGA problems and Product is already activated

What is new in this XP Service Pack 3

[Net Framework 2 [Service Pack 2]
Microsoft Management Console (MMC) 3.0
Microsoft Core XML Services 6.0 (MSXML6)
Microsoft Windows Installer 3.1 v2
Remote Desktop Protocol 6.1
Windows Card Space
All In One Driver
- DriverPack Chipset
- DriverPack CPU
- DriverPack Graphics
- DriverPack LAN
- DriverPack MassStorage
- DriverPack Sound
- DriverPack WLAN
- Shell Pack Icon NotVista By DTU (Mod By Catalogk)
- Sound Vista
- Theme Pristine OS 1.2 by ~MohsinNaqi on deviantART
- CDShell Boot Menu
- CDIMAGE
- CDBootMenu EasyBoot Brief
- Download the Files
- Extract The ISO
- Burn It With any Burning Software in a slow speed
- Boot With the Burned CD
- Install
- Validate WGA
- Enjoy Forever

Download Links:


http://www.fileserve.com/file/GSDMTuT
http://www.fileserve.com/file/s3TNjjd