Windows 7 is Microsoft's Best Windows Yet

Microsoft’s loyal customers are finally getting the operating system they deserve with Windows 7, and it was well worth the wait.

Avid Studio 1.1.0.2887 Multilingual

Avid company represents a unique combination of highly professional audio and video technology to work with video files in your home.

Windows 7 OEM 48 in 1 For Laptop 2011 - DVD - ISO

In the disk has all 48 versions of Microsoft Windows 7. Perfect copies of the OEM - or any activation, cracks and amendments. All versions of English (ENG), updates are available. You get a virgin system, each of which can recreate in their what specifically needed.

Sunday, October 30

License Crawler


When reinstalling an operating system you have to search around for all the product keys for your software; a neat way to get it all in once place is with the License Crawler tool. Instead of manually searching through CD cases, emails, and instruction manuals for those keys, License Crawler searches the registry looking for anything that could be a product key. Any keys that are registered in there should be found, including the Windows key and keys for programs like Office, Nero, and VMWare.

License Crawler finds keys pretty quickly, my computer has a lot of programs installed and it finished searching in 1-2 minutes. All Windows versions from 95 to 7 are supported. License Crawler is totally free, small and very portable. It doesn’t require an installation and it can scan a remote hard drive.

This can be especially handy in the computer repair shop because asking clients for product keys can be frustrating and time-consuming which slows down the repair process.

credits to Rebecca

Download Link:

http://klinzmann.name/licensecrawler.htm#DOWNLOAD

SafeMSI.exe


SafeMSI.exe is a tiny, portable, freeware application designed to let you uninstall programs in safe mode. When the computer is in safe mode, the Windows Installer service isn’t started so most programs can’t be uninstalled. Since technicians do a lot of work in safe mode and being unable to uninstall is a huge bother. It is also not possible to start the service manually, an error message will come up saying “Could not start the Windows Installer service on Local Computer. Error 1084: This service cannot be started in Safe Mode”. This tool will do a registry tweak so that Windows Installer is made a safe service and it will launch the Windows Installer service. The tool is meant to be used after you are already in safe mode, it is a tiny .exe that just needs to be double-clicked or run and it runs very quickly.

The website mentions that the tool is compatible with Windows NT, 2000, XP and Server 2000. Although it doesn’t mention it, it is also compatible with newer versions including Windows 7.

credits to Rebecca


Download Link:

http://www.windowsitpro.com/article/tips/jsi-tip-9233-safemsi-exe-freeware-starts-windows-installer-in-safe-mode-.aspx

Saturday, October 29

How to Remove a Rootkit from a Windows System

How to Remove a Rootkit from a Windows System

What is a Rootkit?
A rootkit is a software program that enables attackers to gain administrator access to a system. On Unix/Linux system, this is called “root” access. Rootkits contain tools and code that help attackers hide their presence as well as give the attacker full control of the server or client machine continuously without being noticed. Sometimes they even cause typical malware type problems. I had a case where a browser hijack was being caused by a particular rootkit installed on the system. In this article, I will show you one way to remove a Rootkit from a Windows system.
“Rootkits are usually installed on systems when they have been successfully compromised and the highest level of access has been given (usually root) Some rootkits refuse to be installed until the attacker has root access, due to read and write permission to certain files. Once the system has been successfully compromised and the attacker has root, he\she may then install the rootkit, allowing them to cover their tracks and wipe the log files.”
A typical rootkit consists of the following utilities:
  • Backdoor Programs – login backdoors, telnetd etc
  • Packet Sniffers – Sniff network traffic such as FTP, TELNET,POP3
  • Log-Wiping Utilities – Bash the logs to cover tracks
  • DDoS Programs – Turn the box into a DDoS client (Remember trinoo?)
  • IRC\Bots – Bots used to take over IRC channels (Lame and annoying)
  • Miscellaneous programs – May contain exploit, log editor
Types of Rootkit
  • Persistent Rootkits
  • A persistent rootkit activates each time the system boots. Normally these types of Rootkits are stored in the system registry.
  • Memory-Based or non-Persistent Rootkits
  • Memory-based rootkits will not automatically run after a reboot; they are stored in memory and lost when the computer reboots.
  • User-mode Rootkits
  • User-mode rootkits operate at the application layer and filter calls going from the system API (Application programming interface) to the kernel. These rootkits normally change the system binary files to malicious code that redirects control of the computer to the creator of the rootkit.
  • Kernel-mode Rootkits
  • Kernel-mode rootkits hook to the system’s kernel API’s and modify data structure within the kernel itself. These are the most effective and dangerous types of rootkits. Kernal-mode rootkits are very difficult to detect and can hide on a system without any indication of being active.
  • Bootkits
  • Bootkits are variations of kernel-mode rootkits that infect the Master Boot Record (MBR). The malicious code can be executed before the computer actually boots.
  • FirmWare
  • A firmware rootkit infects a device or piece of hardware where code resides, such as a network card or the system BIOS. Mebromi firmware rootkit http://blog.webroot.com/2011/09/13/mebromi-the-first-bios-rootkit-in-the-wild/
  • Hypervisor
  • These are newer types of rootkits that are infecting the hypervisor layer of a virtual machine setup. The hypervisor is basically the layer between physical hardware (host systems) and the virtual system (guest), although a type II hypervisor can be installed on top of an OS in order to present a virtual layer to the virtual system. These rootkits can intercept hardware “calls” going to the original operating systems.

How to remove the Rootkit

This is where it gets fun! There are different approaches and really no single full-proof method, neither is it guaranteed that the rootkit will be fully removed. As a matter of fact, there are some computer security experts who simply recommend formatting the drive and completely re-installing the operating system.
The Manual Method
This may or may not be more time consuming than trying to search using an automatic tool. If you are familiar with legitimate Windows services and programs and can pick out suspicious files, then this could be the way to go. Many times, rootkit scanners will not detect rootkit infections, especially if they are new, so this may be the way to go if you don’t want to go straight to the nuke-and-pave solution.
Tools:
Here is a process for locating a rootkit via msconfig:
    1. Open msconfig and enable bootlog. In XP, goto Start then Run. Type in “msconfig” (without quotes). Goto the “boot.ini” tab and tick “Boot log” In Vista and Windows 7, goto Start, type in “msconfig” (without quotes). Goto the “Boot” tab and tick “Boot log”2. Restart the Computer 3. Open C:WINDOWS or C:WINNT and open ntbtlog and search for malicious files. You can start by searching this short list from Computersight.com for the files starting with the following names. It may contain some random characters after it.
  • rot
  • gas
  • gaopdx
  • seneka
  • win32k.sys
  • uacd
  • tdss
  • kungsf
  • gxvxc
  • ovsfth
  • msqp
  • ndisp
  • msivx
  • skynet
  • Get the path of the file name: \SystemRoot\system32\drivers\BadRootkit.sys For an exhaustive list of rootkits that you can search for, check out this Rootkit List from Bleeping Computer. 4) Open up a command prompt and disable file permission using either the CACLS or ICACLS command. For e.g., type cmd in the Run box (XP) or search box (Vista/7) with Admin privileges (in Vista and Windows 7 Hit Ctrl-Shift-Enter to enter the command prompt as an Admin) and type cacls C:WINDOWS\system32\drivers\BadRootkit.SYS /d everyone or Icacls C:WINDOWS\system32\drivers\BadRootkit.SYS /deny S-1-1-0:FMRXRW (cacls /d everyone denies permission to the files for all users, Icacls /deny Sid:permission can deny Simple or Specific rights) 5) Restart the computer 6) Search for the file in the following location and remove it C:\WINDOWS or C:WINNT C:\WINDOWS\system32 C:\WINDOWS\system32\drivers Registry Clear the temp, %temp% and prefetch folders The Automatic/ Semi-Automatic method
You can check out a list of rootkit removal tools here.
I would first fire up TDSSKiller from Kaspersky. It runs a fairly quick scan and TDSS variants are popular, so it may catch something on the first attempt.
If the TDSSKiller comes up empty then try out GMER, which is a powerful and exhaustive rootkit scanner.
From there I like to use AVG’s Rootkit Scanner. This tool has actually found quite a bit of rootkits for me. It’s also good to run it after you have removed the rootkit to be thorough, although you could do that with any of these tools. Another program worth mentioning at this point is the new Microsoft Standalone System Sweeper Beta. There has been some buzz that this tool has been fairly successful at finding hidden rootkits.
If these rootkit scanners are not finding anything, or they do find something but can’t delete it, then you may have to move to the manual method. You can also keep trying other tools but there does come a point when you have to evaluate if the time and effort is worth it or you should either try a manual method, or perform a full re-installation of the operating system. 

credits to Chuck Romano

Thursday, October 27

Offline NT Password & Registry Editor


Offline NT Password & Registry Editor is a freeware utility that allows you to change or blank the password of any user that has a valid account on a local NT/2000/XP/2003/Server 2008/Vista 32 & 64bit system. You do not need to know the old password to set a new one which makes this ideal for use with clients who have forgotten their password or were locked out by someone else. Unlocking locked or disabled accounts is also supported.

This tool comes in the form as a bootable CD ISO or Floppy disk ISO but can also be made to boot from a USB drive. The application is Linux based and it asks you questions about which drive and Windows install you would like to work with. Most questions can be answered just by pressing Enter since the best option is already chosen.

Warning: If used on user accounts that make use of EFS encrypted files, all encrypted files will become unreadable unless you remember the old password again. This is a serious technician tool and shouldn’t be used by people who don’t know what they are doing.

Download Links:

http://home.eunet.no/pnordahl/ntpasswd/cd080802.zip
http://home.eunet.no/pnordahl/ntpasswd/bd080526.zip

RKILL


The malware world is changing. It’s getting smarter.
In fact, some infections will detect that you have launched an anti-malware tool such as MalwareBytes and close it down as soon as you open it, which makes your job much harder. This is the exact situation Rkill is designed for.

RKill is a program developed at BleepingComputer.com that was originally designed for the use in our malware removal guides. It was created so that we could have an easy to use tool that kills known processes that stop the use of our normal anti-malware applications. Simple as that. Nothing fancy. Just kill known malware processes so that anti-malware programs can do their job.
So in summary, RKill just kills processes, imports a Registry file that removes incorrect file associations and fixes policies that stop us from using certain tools. Then it kills Explorer.exe so it will restart and enable some of the Registry changes. When done, RKill will then create a log listing all processes that were terminated while the program was running. Please note that this will include processes that were terminated manually by the user as well as RKill. Other than what is listed above, it does nothing else.

Download Link:

http://download.bleepingcomputer.com/grinler/rkill.exe

Wednesday, October 26

TeamViewer 6.0.11052 Full Version-P2P


TeamViewer 6.0.11052 Full Version | By P2P | 16MB

Release Group: P2P
Release Name: TeamViewer.6.0.11052-P2P
Release Date: 16 Oct, 2011
Filename: TeamViewer.6.0.11052.Rar
Size: 16 MB
Type: Screen-Sharing and File-Transfer Utility

Description :
TeamViewer is a simple and fast solution for remote control, desktop sharing and file transfer that works behind any firewall and NAT proxy.

To connect to another computer just run TeamViewer on both machines without the need of an installation procedure.
With the first start automatic partner IDs are generated on both computers. Enter your partner’s ID into TeamViewer and the connection is established immediately.

With over 100 million users TeamViewer is a standard tool to give support and assistance to people in remote locations.
The software can also be used for presentations, where you can show your own desktop to a partner.

*Install Notes*

1. Install
2. Make sure teamviewer is closed from system tray and end task/kill the
teamviewer service
2. Replace the .exe files with the ones supplied in the crack folder.
3. Enjoy!!!

IMPORTANT :
Install as non-commercial/personal use first then replace the files.. if you have a trial version expired try to replace the files to see what happends.. i didn’t test it like that..

If still have it as trial. uninstall and remove any left over traces of teamviewer from your HD and registry and install as free user…if you’re a newbie and need help for this task use google and s earch.. the answer is out there.

This information is not owned by COMPUTER VAULT. For more details, just visit the website.

Download Link:

http://www.mediafire.com/?6x5av884mg7uedr