Windows 7 is Microsoft's Best Windows Yet

Microsoft’s loyal customers are finally getting the operating system they deserve with Windows 7, and it was well worth the wait.

Avid Studio 1.1.0.2887 Multilingual

Avid company represents a unique combination of highly professional audio and video technology to work with video files in your home.

Windows 7 OEM 48 in 1 For Laptop 2011 - DVD - ISO

In the disk has all 48 versions of Microsoft Windows 7. Perfect copies of the OEM - or any activation, cracks and amendments. All versions of English (ENG), updates are available. You get a virgin system, each of which can recreate in their what specifically needed.

Friday, November 25

Latest 2011 Necessary Software for Each Computer

The Latest 2011 Necessary Software for Each Computer | 728 MB

credits to schmidth

Download Links:

http://www.fileserve.com/file/muQ8RCG 
http://www.fileserve.com/file/EYYQj3a 
http://www.fileserve.com/file/Q8XUadB

Fastest Google Chrome Version + Free Up Memory


With all the Chrome OS and Chrome Web Store hoopla today, a post over at the Chromium blog went mostly unnoticed -- and it's definitely noteworthy. Freshly baked in the Chromium snapshot builds and Google Chrome Canary is Crankshaft, an enhancement to Chrome's V8 JavaScript engine that has yielded some impressive gains.

Crankshaft is made up of four components:
a runtime profiler for identifying code that uses a significant number of CPU cycles
a base compiler for generating code more quickly
an optimizing compiler which re-compiles code pinpointed by the profiler
deoptimization mechanism that allows Crankshaft to recover from overly-optimistic code optimizations
Crankshaft offers improvements in both startup time and maximum performance, with Google noting gains of up to 12% on JavaScript-heavy pages. On Google's own V8 benchmark, Crankshaft helps Chrome post scores which are almost 50% higher than previous versions with V8 alone.

Free Up Memory in Google Chrome Canary


   
HOW INSTALL

1. ) Install The Google Chrome Canary.
2. ) After you install it. Go to Start Menu.
3. ) Find the folder of Google Chrome Canary and creat a shortcut icon on the Desktop.
5. ) Right Click then Add in the target this code

-purge-memory-button
or
--purge-memory-button


6. ) Click Apply or OK.
7. ) Your Done.
8. ) Press Shitf + Esc and Purge memory is now in your Google Chrome Canary Task Manager

NOTE : UPDATABLE DIN PU XA.. PARA MA-UPDATE NYU UN GOOGLE CHROME CANARY GO TO WRENCH ICON > CLICK " ABOUT " > THEN CLICK " RELUNCH " PAG MY RELUNCH NA NAKALGY OR ANO PA NMN SA TABI NG OK ICLICK NYU LNG.. AFTER NUN MAG RERESTART ANG CANARY THEN CHECK NYU UNG VERSION MERON NA BAGO..

NOTE : PARA SA LAHAT NG MGA NAKAGAMIT.. PAG MY NARANASAN KAUNG PROB ABOUT SA GOOGLE CHROME NA TO.. HINTAYIN NYU LAGI UN UPDATE NITO SA ABOUT.. PAG NA UPDATE NA KZ ITO NAWAWALA UN MGA PROB NA NARARANASAN NYU ABOUT SA BROWSER.. SO IT MEANS ITO AY MAS LALONG MAG IIMPROVE KADA BAGONG VERSION

Download Link:

http://tools.google.com/dlpage/chromesxs

credits to Hood

Tuesday, November 22

Hide important data from other users

Normally when you need to secure your important data from other users, then your first choice is to burn it on CD or put it to removable drive instead of hard drive. But imagine if your data size is more than 100 GB then it is not easy to burn it on CD. No worry, you can save your full drive from other users access using this trick.
Perform the given steps to hide your system data partition:
To enable this feature, you will need to be logged into your computer with administrative rights.
First click on Start button to open “Run” and type “CMD” (without the quotes) then press Ok button to open Command Prompt.
Now type diskpart on the blinking cursor and wait for 5 seconds to appear diskpart> utility.
To show the list of volume, type list volume command after the diskpart> prompt, this command will show you all system drives detail.

Now first select the volume that you want to hide, for example,

if you need to hide F drive then first type select volume 2 (in this case) and press enter button.
After loading volume, type remove letter F (in this case) to hide F drive.






But next time, when you want to unhide the D drive, just run assign drive F command after loading volume 2.

Monday, November 21

Keep Computer Virus Free


Why pay for expensive Anti-Virus software (with a yearly renewal fee to boot) when you can get the same results for free.

By utilizing a minimal combination of free software downloads, exercising practical safeguards and keeping your computer clean (with a regular software cleaning) you can easily maintain a virus free system.

All software recommendations are freeware and can be found at the links below. They do not contain adware or spyware. I recommend them because I use them and they work.

Things You’ll Need:
-Spybot – Search & Destroy
-Malwarebytes’ Anti-Malware
-CCleaner
-Active Firewall
-Active Pop-Up Blocker

Instructions
Step 1
Check with your ISP (Internet Service Provider) to see if they provide free virus protection software. Most large ISP’s, whether affiliated with your cable or phone company provide the service at no charge.

Note: Register online by logging onto your ISP website. After providing your account info, you will be able to download and run the Anti-Virus installation file. The programs set up menu will guide you from there. Once activated it will monitor your internet connection at no charge.

Step 2
Turn ON the Firewall. Windows systems have built in firewall protection which is really the first line of defense against unauthorized use of your computer. On most Windows systems, simply go to Control Panel and click on Firewall under the Security icon. Verify that it is active.

Step 3

Enable your Pop-Up Blocker. The two most popular web browsers, Internet Explorer and Mozilla Firefox both come with automatic Pop Up Blockers which block ads that Pop-up on screen when you visit a web page. Simply go to your active web browsers menu at the top of the screen and access the Pop-Up settings under Tools/Options.

WARNING: If a stray pop-up does show up on your screen while browsing, most can be removed by clicking on the Red X in the upper right corner of the pop up (don’t hit the OK button.) Some pop-ups – created with bad intentions – will not close directly, will be replaced immediately by another, will redirect you to another web page or may lock your web browser page (possibly downloading spyware.) If you suspect this, immediately disengage your internet connection, close your web browser and run anti-spyware software as a precaution.

Step 4
Run Spybot – Search & Destroy and Malwarebytes’ Anti-Malware once a week. These are two of the most effective free anti-spyware programs available. Both remove all types of spyware and tracking cookies from your system. In addition, Spybot features a real-time monitor called Tea Timer which instantly warns of suspicious behavior (like registry changes.)

Note: Using both programs, I run the update feature and scan operation once a week or after a particular heavy computer use period.

Step 5
Run CCleaner once a day to keep your system uncluttered. CCleaner is an easy to use quick scanning cleaning tool which removes unused files from your computer system. Eliminating these files – which are automatically downloaded to your hard drive after each web page visited – optimizes your system allowing it to run faster and frees up your disk space. Its like emptying the daily trash that accumulates on your computer.

Note: I run the cleaner scan once a day and check for updates once a week. I also make use of the onboard registry cleaner which I run once a week to clean the system registry.

Step 6
Beware of File Attachments. NEVER click on an attachment file for an email or instant message from an unknown sender. This is the most common way to download a virus. You should delete the email immediately. Also verify that your communication software is not set up to automatically open attachments when you open emails or messages.

Step 7
Turn Off Your Modem when not actively using the connection for a prolonged period. Most external modems supplied by your ISP have a button which will disengage the internet connection. If not, call your ISP to see if they can provide you with one that does. If they cannot or won’t, unplug the power supply to the modem.

WARNING:
“Do you leave your front door unlocked when you leave your house?” Well that’s exactly what your doing when you leave your computer unattended while connected to the internet. The modem is a doorway into your computer and can be an open invitation to the uninvited.

Improve iPhone Battery Life

Do you love your iPhone? Certainly you do, and so you might be interested in knowing how to take good care of your iPhone so that it could live longer. Since it’s your all in one device, so you just stick to it, the decreased battery life is very obvious. This article will guide you how you can enhance the battery life of your iPhone. Here it goes:

1. Turn off 3G, Wi-Fi and Bluetooth, location services, equalizer etc when they’re not required. You must know that all these eat up lot of battery, so turning them off when not required saves lot of battery and hence increases the battery life too.

2. Turn off Auto-Brightness: It’s basically to change iPhone’s screen brightness on the basis of surrounding light and so consumes battery. Also lowering the brightness can save lot of battery. Any brightness level between 25% and 30% is ideal for all times, i.e. day and night. Not a bad idea to keep a constant brightness level, as it’ll be good for iPhone battery as well as your eyes.

3. Turn of sound effects. It really saves lot of your battery. Many times you can have fun without sound effects too!

4. Don’t forget to have a monthly battery calibration. As strictly advised by Apple is to 100% charge the iPhone’s battery when it has completely drained. It means, get the battery completely finished, then charge it fully. An easy option!

5. iPhone case is though a good protective measure, but charging your iPhone within case can harm and may reduce the battery life of your iPhone. This is mainly because iPhone generates heat during charging and when it’s covered with the case, that heat doesn’t get released and so it may damage battery cells or iPhone circuit.

The above list of battery saving tips may not be complete, and you can always add up your points to it, but it covers almost all areas where you can protect your iPhone battery. Use your iPhone with proper care, and it’ll live longer and perform best, exactly how and till when you want it!

credits to Martina James

Sunday, November 20

How to repair a dead hard drive

When a hard drive goes bad, the first thing you'll probably do is have a good old curse at the platter gods for picking on you. You then might decide to have a bit of a panic when you realize that you didn't back up your files.

Shortly after sweating out a few pounds, you'll probably have a go at fixing it. Well, it's worth a shot after all. But chances are, unless you know exactly what the problem is and have the skills necessary to fix it, you're pretty much up poop alley.

If you're lucky and the disk head or motor hasn't been damaged, the problem could lie in the controller board or printed circuit board (PCB). Often, when there's a power surge or the drive overheats, it can damage the board. If this happens, then you can quite easily replace the PCB with one that is working and bring your hard drive back to life.

A common sign that a PCB has been in the wars is a scorch mark, but sometimes there are no visual cues to give the game away.

First things first

The PCB might not be the problem after all, then, but it's the one area of the drive that you should tackle first when something goes wrong. After all, a replacement PCB from a specialist like www.hdd-parts.com will set you back around £25 delivered to your door, so it's a relatively inexpensive way of fixing your drive.

If you were feeling plucky, you could just go to a data specialist and get a man in a white coat in a lab to carefully take your entire hard drive apart and put it all back together, in the hope of rescuing your drive, but you'll be looking at a bill for at least £1,000. Unless you really, really need the files on that drive, you'll avoid this route and go down the PCB road first.

Back to life

Does it really work? Well, we tried it on a drive that had suddenly stopped working one day. There were no horrible clicking sounds, it simply wouldn't power on – the thing was lifeless. So, we replaced the PCB with an identical working one and managed to get it working again.

This wasn't after trying it on many different drives – this was the first one we'd worked on, so it wasn't a fluke.

It's worth mentioning that if this works for you, and there's a pretty good chance that it will, once it's up and running again, don't get lazy and put it back in your PC. If it failed once, there's a probability that it will fail again. Our advice is to transfer all your sacred files to another drive and then bin it… or pop it in the trophy cabinet.

Step-by-step: Fix your hard drive

1. Take drive details down 
Get a replacement PCB identical to your current one, otherwise it won't work. Note down the model number (below the S/N), the P/N, the Firmware code, Date code and Site code, as well as the Main Controller IC number, which is located on the main square black chip in the middle of the actual PCB. In our case it was the six-digit code near the top, above the word 'SEAGATE'.


2. Search for it online
Go to hdd-parts.com and enter the model of the dead drive (in our case, it's the 11-digit code two lines down from the top of the drive) into the search box at the top of the page. This won't give you the exact model, but look through the list of results and find the drive that matches all the numbers you noted down in the first step. Now, buy it!

3. Check your parts
The new PCB should take about six to 10 working days to arrive through the post. When the mail man comes round, you should receive a box with a replacement working PCB inside, as well as a torx screwdriver and installation instructions – not that you'll need this last bit. If something is amiss, email the company and they will get back to you within a couple of days.

4. Remove the old PCB
On top of the PCB you'll see five screws connecting it to the hard drive. Undo them using the torx screwdriver included in the kit, making sure that you don't lose any of them. They're pretty tiny, so once you've managed to remove them all, place them into a zip-lock bag so they don't go astray if you decide to have a break between now and the next step.

5. Attach new PCB
Make sure you ground yourself – an easy way of doing this is to put on an anti-static wrist band – and then carefully take the replacement PCB out of its anti-static bag. Pop it onto your old hard drive, making sure you line it up with the original screw holes. Take the screws from your zip-lock bag and screw the PCB down, ensuring each screw is reasonably tight.

6. Try out your drive
Turn on your PC. Then connect your hard drive to your dock, plug it into the PC and power it up. If the problem with your old drive was due to a faulty PCB, replacing it should now allow your drive to be recognised properly. Access the fi les you need, then copy them to your PC. Don't attempt to use the drive once this is done: chances are it might turn faulty in the future.

credits to Nick Odantzis

Maximize your Laptop Battery


Battery of our laptop/Tablet Pc is a source of power beside the power outlet. Full or perfect charged battery is always our companion when we are out of town. Or attending meetings, seminars we always check our bullets before we go to war. Or charge our battery to full capacity as it can.

Lithium-Ion batteries have a finite life. they slowly degrade from the day they are first made. The life of the battery will depend upon how you charge and discharge the battery and the temperature at which the battery is kept. The truth about Li-ion batteries is that high temperatures are their worst enemy. Therefore, the following tips will help prevent laptop batteries from getting too warm.
  •  Always use a laptop on a hard surface. Don’t put it on your lap (despite its name) or on thermal insulating materials such as cushions. If you like to work in bed with your laptop, I recommend using a laptop table.
  • Try to avoid charging the battery while you are working with the laptop. Charging the batteries increases your laptop’s temperature. The problem is that the CPU, the graphics card and the hard disk also heat up your laptop, which adds to the temperature increase experienced when charging the battery. Many vendors deliver their laptops with software that allows you to disable charging. You also can remove the battery while you are working on AC current.
  • Make sure the laptop’s ventilation can always work properly. Don’t place objects before the ventilation systems opening. Don’t run or charge the laptop while it is in its case.
  • Don’t leave the laptop in the car or under the sun in summer. Use a bike. It keeps your laptop battery cool and your own battery healthy. And too much sun exposure causes only skin cancer anyway.
  • Do Not - Charge your Notebook/Tablet PC inside a carry case - the battery may overheat.
  • Condition a new battery by using it until it is fully discharged,  and then re-charge it fully.  Doing this once a month will help to accurately calibrate your battery.
  • When you receive a new NoteBook or Tablet PC, leave the battery to fully charge overnight.

Note:
A manufacturer will rate a Notebook battery to the point where it holds 50% of its original capacity. At this point you should consider replacing the battery.

credits to rikki_ mortel

Saturday, November 19

How to Recover Deleted Partitions


If the partition is deleted, your vital and important data stored on those partitions may become inaccessible which may create many hardships to the persons who are depending on those data. Is there a way to recover deleted partition or recover data in the deleted partition?

The answer is Yes. If you accidentally deleted a partition, partition recovery software EASEUS Partition Recovery can recover deleted or lost partitions. If a partition is deleted, the program will analyze the disk and recover the deleted partitions.

EASEUS Partition Recovery is a free partition recovery software to recover deleted or lost partitions.

1. Download this software from here, install it.
2. After -installing Run EASEUS Partition Recovery, and then you will see the following window. Click "Next" to continue.

3. Please choose a disk where you want to recover lost partitions and click "Next" to continue.
4. Choose a specified area to search for the lost partitions and click "Next" to continue.
5. Please choose a search method to start partition recovery. (There are two search methods: Fast and Complete.)
6. EASEUS Partition Recovery starts searching the deleted or lost partitions.

7. After the search is completed, choose the deleted or lost partitions to recover.
8. Click "Proceed" to execute the operations. 

credits to Surbhi

Thursday, November 17

Think Before Using USB Flash Drives To Run Applications or OS: Advisory

I am writing this post on an advisory note. With the extensive use of USB flash driven in our day to day activities, now we have been aiming to make even our Operating System(OS) portable by installing it in a USB Flash Drive and carrying around in our pocket. Moreover we can run applications such as Mozilla, Anti Viruses etc. from a USB pen drives. Here I am going to explain, why you need to think twice before using your USB Flash Drive to run an Operating System from it.

Why you should think twice before using a USB Flash Drive to run an OS or applications for prolonged period?

All flash memory devices can sustain only a limited number of write and erase cycles before failure. While running a normal OS or an Application from a Flash drive, the system will write and erase a huge number of files and data in the flash drive. With prolonged use, the write/erase cycles of your flash drive may come to an end and may eventually fail.

The write/erase cycle performed while running an Operating System(OS) such as Windows XP or 7 will be very much more than what we can perform manually, by copying and deleting data. So this should be a consideration as it may make your flash drive run out of Write/erase cycles much faster than expected.

Another usage of USB is Windows ReadyBoost. Windows 7 and Vista can make use of a USB flash drive as a cache memory to improve the performance.  In this case also the cycles are be used a high rate.

Points to be Noted:
  • Flash memory devices have a limited number of write and erase cycles before failure
  •  Running an OS or an Application from a Flash drive will write and erase a huge number of files or data in the flash drive per second.
  • Running an Operating System(OS) will perform these cycles much more than what we can perform manually
  • Prolonged use will make your flash drive run out of write/erase cycles and may eventually fail much before expected
How to address this issue?

To address this, as well as space limitations, some developers have produced special versions of operating systems such as Linux in Live USB or portable applications such as Mozilla Firefox designed to run from flash drives. These are typically optimized for size and configured to place temporary or intermediate files in the computer RAM rather than store them temporarily on the flash drive.

Compared to other portable storage devices such as external hard drives, USB flash drives still have a high price per unit of storage. But Hard drives have a higher minimum price.

Alternatives:
  • Run applications or OS which are configured  for Flash Drive use only
  • For Prolonged usage, try buying an external Hard Drive
  •  If you are using your USB Drive as a Cache device to improve performance, why not upgrade your RAM size?
Notes:

1. Manual usage of your USB Drive will take years to use up the Write/erase cycles available, so no need to worry.
2. Most Failures in USB Memory Devices are due to wear and tear

credits to dennis

Saturday, November 12

Computer Technicians Guide To The Apple Mac Boot Shortcuts



In this article you will learn all the most important boot shortcuts on a Mac. We’ve all been there. The client is there, you boot their computer and the screen just hangs there. No OS. You sometimes see the grey apple logo, sometimes it’s all white and sometimes you see nothing at all. You absolutely need to know which key to press in order to repair the Mac. Enter the Apple Mac boot shortcuts.

First of all, you don’t have to use an Apple Keyboard to do these. Any regular USB PC keyboard will work as long as you keep in mind the following:
Option = ALT Key
Command = Windows Key

To make these boot shortcuts work, the computer needs to be shutdown and you need to press/hold these keys while booting the computer.

C

Sometimes, the Mac is not programmed to automatically boot from a CD. This allows you to boot directly from the CD.

Option

By far, the most useful shortcut that will tell if the computer has a hard drive failure or a motherboard corruption. When you hold option at start, it will detect all the bootable devices in the Mac such as the CD, Hard Drive, External USB and External FireWire. You can then choose which devices you want to boot from. This is perfect if you want to boot from an external USB/FireWire.



D

All Apple Computers come with an Hardware Test CD. When you hold D, the cd needs to be already inserted. It will boot Apple Hardware Test which is an incredible powerful tool that will make a precise diagnostic on your client’s computer about any form of hardware failure: RAM, hard drive, motherboard etc.


Option – Command – P – R

This combination will reset the NVRAM and PRAM of your client’s computer. What does it mean? It will reset all the default settings on the motherboard or built in features including: Serial Port Configuration, Clock, Volume, Double-Click time, Virtual Memory, RAM disk, Mouse Speed, Application Font, Alarm Clock, Monitor Color Depth, Startup Disk and Serial Printer location. This is often done if your client’s machine boots into a weird pink color. To do this NVRAM/PRAM reset, your need to hold the keys when you boot your client’s Mac. Hold down the keys until the computer restarts with the startup sound the second time.
Hold the mouse or trackpad button

This will eject all the removable media plugged to your Mac. (Cd, USB, Firewire etc.) This is perfect if the CD is stuck inside and the keyboard is not working or if the Mac tries to boot from an unknown external device.

Command-S

This will boot the machine in Single-User mode. It is a UNIX-like interface where you can enter many simple commands to troubleshoot the machine. This is mainly popular with the use of “fsck ” to check the computer disk permission.

Command-V

This starts the Mac in Verbose Mode. You will see all the descriptive text of all the boot steps, similar to Windows’s Safe Mode. If the computer freezes on startup, you can see where it will freeze.

T

This puts the Mac in Target Mode. It will transform the Mac into a giant Firewire external drive. You can access the files from another computer. Perfect if you need to repair a corrupted hard drive or backup files.


Shift

This will start the Mac on a safe boot. It will disable all the login items, all the non-default fonts, disable all the cache and it will force a directory check.

If you are still unable to enter the system or at least see the grey Apple logo at the beginning after using these shortcuts, the problem is most likely going to be a motherboard corruption.

Guest Post by Marco Rodi: Marco Rodi owns an IT Engineering university degree. He has his own computer repair business that mainly does Apple Support (OrdiRodi – http://www.ordirodi.com) located in Montreal. He works for Transat as an application support Engineer where he has to maintain all the software that makes the airplanes fly. He’s also an active bassist. (http://www.marcorodi.com)

Friday, November 11

Autoruns


There are few things more frustrating that an unwanted program that launches every time you start your computer, especially when the normal means of preventing this from happening--like checking for it in the Startup folder--don't work. What's worse is when numerous unneeded and invisible processes launch, slowing down both start-up and your computer's performance as a whole. AutoRuns is a simple program that lets users view--and disable--everything that runs on startup, saving both time and irritation.

The program's interface is a little cluttered, with 17 tabs that display the various programs and processes that run on startup. These are separated into categories, such as Print Monitors, Codecs, Windows Explorer, and so on, and there's also a tab that shows everything. Disabling an unwanted process is as simple as unchecking the box next to it. AutoRuns lets users optionally hide Windows entries or Windows and Microsoft entries, helping to prevent users from disabling critical processes. For the most part the program was quite easy to use, but novices may feel a little nervous about messing around with unfamiliar processes. We had hoped that the program's Help file would provide some guidance on this front, but we were disappointed to find that although there is a built-in Help file, none of its contents would load. This is the only significant drawback to AutoRuns, and users who are already comfortable in this arena should find that AutoRuns meets their needs just fine. Beginners will likely want to do some research before they start making too many changes.

AutoRuns comes as a ZIP file and is accessible after extraction with no need for installation. We recommend this program to all users.

Download Link:

http://download.sysinternals.com/Files/Autoruns.zip

Thursday, November 10

WebBrowserPassView – Recover Passwords from Web Browsers


WebBrowserPassView is a small, portable and freeware utility designed to recover passwords from:
  •  Internet Explorer (Version 4.0 – 9.0)
  • Mozilla Firefox (All Versions)
  • Google Chrome
  • Opera
Once WebBrowserPassView has gathered all the passwords from the various browsers, it displays them in a single table with the URL the password was saved for, what browser it was saved in and of course the username and password.

From there, you can save it as a TXT file, export the table as HTML and more. This product was created by Nirsoft and in true Nirsoft fashion, the application is very easy to incorporate into scripts due to its excellent command line support.

This utility works on any version of Windows, starting from Windows 2000, and up to Windows 7, including 64-bit systems.

Note: Due to the hacking/password revealing nature of this application. Some antivirus products will detect it as malware or a hacking tool. You can view the VirusTotal.com report here.

credits to Bryce Whitty

Download Link:

http://www.nirsoft.net/utils/web_browser_password.html

Wednesday, November 9

Nero Burning ROM 10.5.10300 with Keygen

Award-Winning Nero Burning ROM is the Only Burning Software You’ll Need! Nero Burning ROM offers you the most advanced disc burning solution. Nero Burning ROM - Leading CD, DVD and Blu-ray Disc burning and copying technology. When it comes to burning, accept nothing less than the industry’s best. Award-winning Nero Burning ROM is known for reliable, high-quality CD, DVD and Blu-ray Disc burning and copying. Loaded with advanced features that go beyond just burning, it also features SecurDisc technology for the ultimate in data readability and protection.
 It’s the only program you’ll need to save and share your files. Nero Burning ROM gives you full, customized control of your burning projects. You can - among other things - define the file system, the length of the file name and the character set; you can also change the disc label. And of course, you can also customize the Nero Burning ROM toolbar and change the keyboard shortcuts.

 Highlights:
- High quality disc burning and copying for superior quality playback
- Easy drag-and-drop burning to CDs, DVDs and Blu-ray Discs
- Split oversized files to burn onto multiple discs at one time
- Ensure data readability regardless of scratches, age or deterioration
- Enhance security levels with personal passwords and encryption

 Despite its wide range of features, Nero Burning ROM has remained an easy-to-use burning program that creates discs in just a few steps. You select the disc type to be burned (CD/DVD/Blu-ray), define the project type, add the required data and then start burning.

Using Nero Burning ROM you can save audio files from an Audio CD to the hard drive. In the process, the files are encoded, i.e. converted into a format that the computer can read. The Audio CD can be automatically identified with Gracenote. So called metadata such as title, genre, and track title are accessed by the Gracenote Media Database and associated to the tracks. That way you have audio files that are accurately and fully named after the encoding process.

Nero Burning ROM – Leading disc burning technology Features:
 - Customized Burning and Copying Options Burn and copy to CDs, DVDs and Blu-ray Discs or save disc images to hard drives, networks, and USB devices or span oversized files to multiple discs and different disc types.
 - Advanced Disc Data Protection Add state-of-the-art SecurDisc protection to your burned discs with personal passwords, encryption options and digital signatures. Get alerts before disc data deteriorates, allowing for time to back up.
 - Long-Lasting Disc Data Readability and Content Quality Ensure that burned data is readable regardless of scratches, age, or deterioration with cutting-edge SecurDisc technology.
 - Convenient Features That Do More Than Just Burning Go beyond just burning and erase rewritable discs with the option to effectively retrieve data, convert audio files into other formats or rip Audio CDs directly with album cover, song titles and artists names.

 Nero Burning ROM – Applications Included:

- Nero Burning ROM - Leading, reliable CD, DVD, Blu-ray Disc burning and copying software featuring SecurDisc technology for long-lasting burns and advanced security features.
- Nero ControlCenter - Manage and update your Nero products and serial numbers.
- Nero BurnRights - Allow users without administrative rights to burn discs by allowing system administrators to set up user accounts with exclusive burn rights for Nero.

 Supported media for burning:

- CD-R
- CD-RW
- DVD±R
- DVD±RW
- DVD-RAM
- DVD±R DL
- BD-R
- BD-RE
- BD-R DL
- BD-RE DL

 Supported disc formats:

- Data CD (ISO, UDF, ISO/UDF)
- Data DVD (ISO, UDF, ISO/UDF)
- Blu-ray data disc (ISO)
- SecurDisc CD/DVD/Blu-ray Disc
- Audio CD
- Mixed Mode CD
- CD EXTRA
- DVD-Video
- Nero Image (NRG)
- CUE-Image [Import only]
- ISO Image
- AVCHD video
- BDMV video
- Nero DiscSpan (UDF)

 Supported audio formats and codecs:

- AAC elementary stream (AAC) - not ripping
- Audio Interchange File Format (AIFF, AIF)
- Compact Disc Digital Audio (CDA) - not encoding
- Dolby Digital (AC3) - only source format in compilations
- MP3 / mp3PRO (MP3)
- Nero AAC Codec, Nero Digital (MP4)
- Ogg Vorbis (OGG, OGM)
- PCM WAV file, ADPCM Wav file (WAV, WAVE)
- Windows Media Audio (WMA) - not ripping
- Free Lossless Audio Codec (FLAC)

 Supported video formats and codecs:

- Advanced Streaming Format (ASF)
- Audio Video Interleave (AVI)
- Digital Video (DV)
- Moving Picture Experts Group-2 (MPG, MPEG, DAT, M2T)
- Nero AAC Codec, Nero Digital (MP4)
- QuickTime Movie (MOV)
- Video Object (VOB)

 Supported image formats:

- Bitmap (BMP)
- Device Independent Bitmaps (DIB)
- Graphics Interchange Format (GIF)
- Icon Image File (ICO)
- JPEG File Interchange Format (JFIF)
- Joint Photographic Expert Group (JPEG, JPG, JPE)
- Picture Exchange (PCX)
- Portable Network Graphics (PNG)
- Portable Pixel Map (PPM)
- Targa Image File (TGA)
- Tagged Image File Format (TIFF, TIF)
- Windows Media File (WMF)

 Supported formats for playlists:

- Moving Picture Experts Group Audio Layer 3 Uniform Resource Locator/MP3 URL (M3U)
- Moving Picture Experts Group Audio Layer 3 Uniform Resource Locator/MP3 URL + UTF-8 (M3U8)
- Playlists File Format (PLS)

 Nero Burning ROM – System Requirements

 Minimum system requirements for Nero Burning ROM:
- Windows XP SP3 (32-bit), Windows Vista SP1 (32 and 64-bit), Windows 7 Home Premium, Professional, Enterprise or Ultimate (32 and 64-bit) - 2 GHz AMD or Intel processor - 512 MB RAM (1 GB RAM for Windows Vista or Windows 7) - 500 MB hard drive space for a typical installation of all components (including temporary disk space) - CD disc drive for installation - CD, DVD, or Blu-ray Disc recordable or rewritable drive for burning and video authoring - Third party components such as Microsoft Windows Installer 4.5 and Microsoft Silverlight 3 are shipped with the product or automated download if not included in the package - For some services an Internet connection is required (DSL-1000 and higher recommended). Internet connection charges are the user's responsibility

 Note:

- On 64-bit operating systems, applications run in 32-bit emulation mode.
- The devices must be correctly installed and recognized by the operating system for the product to work properly.
- Installation of the latest WHQL certified device drivers is strongly recommended.

 Special/Minimum requirements for LightScribe and Labelflash:

- LightScribe compatible recorder and medium.
- LightScribe host software must be installed.
- Labelflash compatible recorder and medium.

Installation notes:

 1. Disconnect internet during installation, and/or make sure to BLOCK the program from accessing internet (block unwanted traffic by using e.g. a firewall).
2. Register with serial: 9X0C-004C-AXCP-797C-7ET6-C723-1ALK-2UTP
3 . Installing the Nero Update feature might as well be disabled by choosing Custom Installation (to avoid updating).
 4. After installation, when at the 'Register at Nero' window, uncheck all boxes and close the window. Done!

Important notes:

* Block internet access for the program by using e.g. a firewall:
> Block internet access through 'Program Control' from your firewall.
> Or set 'Program Control' from your firewall to 'Ask what to do/Decide yourself'.

 * Make sure to block internet access for e.g.: C:\Program Files\Nero\Nero 10\Nero Burning ROM\nero.exe (Permanently block any attempt of Nero to connect to internet.)
 * Do NOT update the program (do NOT check for program updates)!
 * If available, uncheck/disable the option 'Check for updates automatically'.

credits to hcier16 of PINOYDEN

Download Link:

http://www.wupload.com/file/128459056/Nero.Burning.ROM.10.5.10300+serial&tut.rar

Monday, November 7

WinAmp Pro 5.621.3173



Winamp is more than just a player. It’s your window to the multimedia world. From MP3s to streaming video, Winamp is the one place you go to feed your audio/video habit. Winamp was born as a very basic media player and has slowly but consistently improving for many years. Its main purpose was to be completely customizable and through the years, many people have contributed to a library that now consists of 20,000 skins and 461 plug-ins.

The player supports a wide range of file formats, and because the program is small and simple, it works quickly on almost all computers. Have a look through the available plug-ins and you will also find that you can hook up your iPod and manage its music library.

System Requirement:

Minimum
  • 500MHz Pentium III or comparable
  • 128MB RAM
  • 15MB Hard Disk Space
  • 16bit Sound Card
  • Windows 2000 or later
  •  Internet Explorer 5.01 or higher (for Online Services)
  • 1x speed or greater CD Burner (Required for Burning)
  • 2x speed or greater CDROM (Required for Ripping)

Recommended
  • 1.5 GHz Pentium IV or comparable    512MB RAM or greater
  • 30MB Hard Disk Space
  • 24bit Sound Card
  • Windows 2000 sp4, Windows XP sp3, or later
  • Internet Explorer 6.0 or higher (for all Online Services features)
  • 8x speed or greater CD Burner (Required for Burning)
  • 16x speed or greater CDROM (Required for Ripping)
Download Link:

http://www.free-codecs.com/Winamp_download.htm

Serial Key
Name : Symbianize
Serial Key : NL4B86FYM5SDWRJZC776

WinAmp Skins Download Here

credits to abgel_maui of SYMBIANIZE

Driver Reviver


Driver Reviver is the most comprehensive and complete driver update utility available for Windows. Having up-to-date drivers is essential for maximum PC performance. Driver Reviver uses industry-leading technology with the largest driver database to quickly identify out of date drivers and easily updates them with a few mouse clicks! Why are out of date drivers a concern? Out of date and faulty drivers cause a variety of problems: * Computer errors, slow PC performance and even Computer crashes * Peripherals not working at all, or performing with limited intended features and functionality * Lost productivity while you try and get peripherals working How Will Driver Reviver Help? * Stop wasting hours of your valuable time trying to tweak your Computer with drivers you find at random sites on the Internet, which could be the wrong drivers or worse yet may be infected with spyware and viruses * Fix driver bugs and keep your peripherals running at maximum performance with full features and functionality * Driver Reviver automatically downloads the latest driver and software updates straight from the manufacturers website * Never worry again about installing an incorrect or out-of-date driver * Update all of your Computers drivers in minutes, with a few simple mouse clicks Restore maximum performance to your PC today with the multi award-winning Driver Reviver now. Free Scan!

Sunday, November 6

Microsoft Hacked!!!


Its now 3 days, an official sum domain of Microsoft,Microsoft FUSE Labs(fuse.microsoft.com), has been hacked, till last hour i could see the hacked page, but now if you open that hacked page then it will redirect you to another subdomain of microsoft.

On the defused page it was written that its hacked by someone called Hmei7, with a taunt, which you can see by urself, here is the screenshot.


Although its not the first time when 'Hmei7' hacked any site, previously he has hacked some more well known sites like IBM, TPD media etc. Some sources says "Hmei7 doesn't qualify as a professional hacker, because he doesn't seek to do permanent damage to a site, but rather cause a nuisance." while other sources says 'He hacks website not to harm but only to warn about their vulnerabilities  '.

'Hmei7' is a user of Zone-H, where he posts mirror of websites defaced by him. According to zone-h, he has notified about  41,865 defacements. check all defacemnets mirror by him here.

Hmei7 got into microsoft through the SQL injection, which is pronounced "sequel
injection". As now microsoft has changed its login page of Fuse labs, so probably now they have removed this loop hole.

Here is the screenshot of their previous page:




Hacked page link: fuse.microsoft.com

credits to Surbhi

Saturday, November 5

Microsoft Student with Encarta Premium 2009



Microsoft Student with Encarta Premium 2009
 
Product Microsoft Student with Encarta Premium 2009 - version of the popular set of tools aimed at schoolchildren and
students and includes everything needed for self-examination of
complex topics and the preparation of homework.
The composition of the package consisted of the following products:

* The latest version of the popular encyclopedia Encarta Premium 2009
contains even more relevant and accurate background information and
multimedia materials that could be useful to students in their studies.
 
* Package Microsoft Math - an extensive set of tools, guidelines and
manuals designed to address various mathematical, algebraic and
trigonometric tasks.
 
* The universal means of mathematical data visualization Graphing
Calculator offers all you need to build a two-and three-dimensional
graphs.

Encarta Premium 2009 - version of popular encyclopedias, contains even
more relevant and accurate background information and multimedia materials
that could be useful to students in their studies.
Encarta Premium contains a wealth of information available for the whole family: thousands of informational articles and photographic images, hundreds of videos and animated films and other multimedia material needed to gain knowledge. This is a great starting point when searching. Suitable for home users, research projects. To this encyclopedia, you will receive great pleasure of learning. Built on the basis of the popular Microsoft Encarta Encyclopedia Standard, Encyclopedia includes information that you will not find on the Internet.

credits to namelezz of PINOYDEN

Download Link:

 
Password: kurdsportal.com

Friday, November 4

Windows 7 is Microsoft's Best Windows Yet


Microsoft’s loyal customers are finally getting the operating system they deserve with Windows 7, and it was well worth the wait.

First, to provide full disclosure (as critics have requested in our previous Windows 7 write-ups) yes, I am indeed a Mac user. But until heading to college, I grew up on a steady diet of Windows. (I made the switch after a system crash that resulted in the loss of an enormous school project.) With that said, Windows 7 thoroughly wowed me, dissolving the grudge I’ve held against Microsoft for many years.

The latest OS from Microsoft delivers a truly next-generation interface that will transform the way we use our computers, while addressing a number of nagging issues that have turned off Windows users in the past. The Windows team deserves a round of applause.

The best decision Microsoft made this time around was listening to its customers. The company crowdsourced feedback and distributed a free Windows 7 beta to Microsoft enthusiasts back in January. The result is an OS designed to beautify PCs both old and new, while retaining many of the features Microsoft fans have adored about Windows and removing many major annoyances.

Cleaner Design, Smoother Operation

Microsoft’s trademark “Start” taskbar gains a cleaner, more modern aesthetic along with a convenient systemwide search tool at the very bottom. Gone are the nagging screens that popped up in Vista, giving warning that the most basic programs could pose potential security risks. (Alerts are instead displayed in an Action Center so you won’t be bothered.) And once you get the hang of Windows 7, say goodbye to endless Alt-Tab keystrokes to navigate your windows with a new feature set called Aero.

Brand new to Win 7, Aero introduces a major change to the user interface, which should accommodate an ever-growing generation of digital multitaskers. Aero Peek, Aero Snap and Aero Shake are three window-management tools, similar to Apple’s Exposé in Mac OS X.

Aero Peek will be most frequently used. When activated, the feature displays outlines of all your open windows behind your active window; each outlined box contains a thumbnail previewing its corresponding window to help you choose. Aero Peek can be executed with a hotkey or hovering the mouse cursor over a button in the bottom right of the screen.

Aero Snap automatically re-sizes and positions a window into a rectangle that takes up the entire right side of the screen. (The same happens if you drag to the left.) And then there’s Aero Shake, a feature where you click and hold onto a window and give it a shake, and any visible windows behind it disappears (minimizes, not closes).

Another great change in design is the way the taskbar is arranged, somewhat borrowing from the functionality of Apple’s Mac OS X Dock. Each open application is represented by a small square to save space, as opposed to the rectangular slabs that cluttered the screen in XP. With AeroPeek activated, you can also preview thumbnails of the activity of apps by hovering over their corresponding taskbar icons.
Also improved is the overall media experience, including a revamped Windows Media Center, streamlined networking to share files and gadgets between computers in your home, and a slew of extremely creative, gorgeous wallpapers to choose from for your desktop.

A Snappier Experience

Whenever enhancements and more detailed graphics are integrated into an operating system, one must wonder whether performance will be affected. Microsoft promises “faster, more responsive performance” in Windows 7. That’s true in some ways.

Running light benchmarks, there are very insignificant performance benefits when it comes to processor-heavy tasks, such as copying files or converting video files. The factor making a dramatic difference is how Windows manages memory. In older versions of Windows, every application you have open sucks up video memory, even if the windows are minimized. This isn’t the case in Windows 7: The only windows and apps using video memory are those visible on your screen. Indeed, that big tweak amounts to a faster, snappier computing experience. It’s one of those improvements that can’t be articulated by numbers; you have to put Windows 7 on your machine to believe it.

Another subtle-yet-significant change you’ll notice when upgrading to Windows 7 is it’s far less of a headache to get it up and running with your third-party hardware. Being a brand-new operating system, Windows 7 includes up-to-date drivers, which should automatically recognize your third-party hard drive, accessory or printer, and in most cases it’ll “just work.” In the cases where the OS doesn’t recognize hardware, Windows 7 will search a database to find the proper driver. You can even check if you’ll have any compatibility problems before upgrading to Windows 7 by running the Windows 7 Upgrade Advisor, which will point out any compatibility issues and how to resolve them.)

It’s Still Windows

Yes, you’ll need to buy third-party antivirus software again, because your new OS is a big, juicy target for new and exciting pieces of malware and trojans, Also, Windows 7’s software-compatibility checker is lame. Don’t have the right piece of software, such as Adobe Air, to run a certain type of file? You might have to find it yourself on the web and install it. That was our experience with several different formats, at least. Hardware compatibility is nice with Windows 7, but for software, it needs some work. Of course, once you have all your software up and running, you’ll rarely ever run into this problem again, so consider this a minor issue.

The biggest knock against Microsoft is making the installation of Windows 7 seem more complicated than it really is. There are five editions of Windows 7: Starter, Home Premium, Professional, Enterprise and Ultimate. To tell you which version of Windows 7 you should choose, Microsoft lays out an atrocious mess of a chart to illustrate upgrade paths.

Let us simplify the decision for you: If you’re a consumer reading this review today, 99 percent of you are likely to want Home Premium. If you’re an entrepreneur, you’ll want Professional. (Starter will only run three programs at a time; Enterprise has been available for big businesses for months and CTOs are unlikely to be reading consumer-oriented reviews at Wired; and Ultimate is aimed at a very niche audience of geeks who want to do anything they could possibly imagine with their machine.) Home Premium or Professional are going to be your two choices.

WIRED Aero whips up a more efficient and (dare we say it) fun UI experience. Smart memory management equates to snappier performance. Excellent hardware compatibility. Multimedia-savvy with good looks.

TIRED Stupidly complicated array of upgrade choices are confusing. It’s still Windows (beware viruses and clunky behavior with unrecognized third-party software). Upgrade process is time-consuming for XP users.

reviewed by  Brian X. Chen

Thursday, November 3

Combofix



Combofix is a freeware, portable application designed to scan a computer for known malware and, if found, attempt to remove it. I personally use this application very frequently in conjunction with SmitFraudFix to remove Win Antivirus 2008 and its variants. In addition to removing many different rogueware products, it also shows you a log of files that were created or modified in the last month to help you locate potential malware it didnt detect. For example, if there is a randomly named .dll file in the system32 folder that was created on the day of the infection but all other files are dated years ago when Windows was installed, its probably something to do with the virus.

This one is essential for any computer technician who does malware removal work.

credits to Bryce Whitty

Download Link:

http://download.bleepingcomputer.com/sUBs/ComboFix.exe

XP_Fileassoc.bat & XP_EXE_Fix.reg

I have been seeing the Facebook Password Reset Virus on a lot of computers lately and one of the things that this virus does is disables the EXE association with the computer. Basically what this means is that you cannot open .EXE files and since most of your software repair tools are going to be executable files, it makes the virus difficult to remove

To get around this, I have been using two scripts that restore all of the file associations in Windows XP back to default. Once it has been run, I can then use my other virus removal applications like Process Explorer.

The .EXE association can be damaged in a few ways. One way is when the extension association “.exe” doesn’t point to “exefile”. Another way is when the registry for opening .exe files has an incorrect value.

One of the tools is a BAT file and the other one is a .REG file. The problem is sometimes the .REG file association is damaged too so I have to use the BAT file first to fix the .REG association, and then the .REG file to fix the registry.

In any case, the two work well together.

I haven’t tried these two scripts on any other operating system other than Windows XP, so you do so at your own risk.

credits to Bryce Whitty of TECHNIBLE

Download Links:

XP_Fileassoc.bat
XP_EXE_Fix.reg

Sunday, October 30

License Crawler


When reinstalling an operating system you have to search around for all the product keys for your software; a neat way to get it all in once place is with the License Crawler tool. Instead of manually searching through CD cases, emails, and instruction manuals for those keys, License Crawler searches the registry looking for anything that could be a product key. Any keys that are registered in there should be found, including the Windows key and keys for programs like Office, Nero, and VMWare.

License Crawler finds keys pretty quickly, my computer has a lot of programs installed and it finished searching in 1-2 minutes. All Windows versions from 95 to 7 are supported. License Crawler is totally free, small and very portable. It doesn’t require an installation and it can scan a remote hard drive.

This can be especially handy in the computer repair shop because asking clients for product keys can be frustrating and time-consuming which slows down the repair process.

credits to Rebecca

Download Link:

http://klinzmann.name/licensecrawler.htm#DOWNLOAD

SafeMSI.exe


SafeMSI.exe is a tiny, portable, freeware application designed to let you uninstall programs in safe mode. When the computer is in safe mode, the Windows Installer service isn’t started so most programs can’t be uninstalled. Since technicians do a lot of work in safe mode and being unable to uninstall is a huge bother. It is also not possible to start the service manually, an error message will come up saying “Could not start the Windows Installer service on Local Computer. Error 1084: This service cannot be started in Safe Mode”. This tool will do a registry tweak so that Windows Installer is made a safe service and it will launch the Windows Installer service. The tool is meant to be used after you are already in safe mode, it is a tiny .exe that just needs to be double-clicked or run and it runs very quickly.

The website mentions that the tool is compatible with Windows NT, 2000, XP and Server 2000. Although it doesn’t mention it, it is also compatible with newer versions including Windows 7.

credits to Rebecca


Download Link:

http://www.windowsitpro.com/article/tips/jsi-tip-9233-safemsi-exe-freeware-starts-windows-installer-in-safe-mode-.aspx

Saturday, October 29

How to Remove a Rootkit from a Windows System

How to Remove a Rootkit from a Windows System

What is a Rootkit?
A rootkit is a software program that enables attackers to gain administrator access to a system. On Unix/Linux system, this is called “root” access. Rootkits contain tools and code that help attackers hide their presence as well as give the attacker full control of the server or client machine continuously without being noticed. Sometimes they even cause typical malware type problems. I had a case where a browser hijack was being caused by a particular rootkit installed on the system. In this article, I will show you one way to remove a Rootkit from a Windows system.
“Rootkits are usually installed on systems when they have been successfully compromised and the highest level of access has been given (usually root) Some rootkits refuse to be installed until the attacker has root access, due to read and write permission to certain files. Once the system has been successfully compromised and the attacker has root, he\she may then install the rootkit, allowing them to cover their tracks and wipe the log files.”
A typical rootkit consists of the following utilities:
  • Backdoor Programs – login backdoors, telnetd etc
  • Packet Sniffers – Sniff network traffic such as FTP, TELNET,POP3
  • Log-Wiping Utilities – Bash the logs to cover tracks
  • DDoS Programs – Turn the box into a DDoS client (Remember trinoo?)
  • IRC\Bots – Bots used to take over IRC channels (Lame and annoying)
  • Miscellaneous programs – May contain exploit, log editor
Types of Rootkit
  • Persistent Rootkits
  • A persistent rootkit activates each time the system boots. Normally these types of Rootkits are stored in the system registry.
  • Memory-Based or non-Persistent Rootkits
  • Memory-based rootkits will not automatically run after a reboot; they are stored in memory and lost when the computer reboots.
  • User-mode Rootkits
  • User-mode rootkits operate at the application layer and filter calls going from the system API (Application programming interface) to the kernel. These rootkits normally change the system binary files to malicious code that redirects control of the computer to the creator of the rootkit.
  • Kernel-mode Rootkits
  • Kernel-mode rootkits hook to the system’s kernel API’s and modify data structure within the kernel itself. These are the most effective and dangerous types of rootkits. Kernal-mode rootkits are very difficult to detect and can hide on a system without any indication of being active.
  • Bootkits
  • Bootkits are variations of kernel-mode rootkits that infect the Master Boot Record (MBR). The malicious code can be executed before the computer actually boots.
  • FirmWare
  • A firmware rootkit infects a device or piece of hardware where code resides, such as a network card or the system BIOS. Mebromi firmware rootkit http://blog.webroot.com/2011/09/13/mebromi-the-first-bios-rootkit-in-the-wild/
  • Hypervisor
  • These are newer types of rootkits that are infecting the hypervisor layer of a virtual machine setup. The hypervisor is basically the layer between physical hardware (host systems) and the virtual system (guest), although a type II hypervisor can be installed on top of an OS in order to present a virtual layer to the virtual system. These rootkits can intercept hardware “calls” going to the original operating systems.

How to remove the Rootkit

This is where it gets fun! There are different approaches and really no single full-proof method, neither is it guaranteed that the rootkit will be fully removed. As a matter of fact, there are some computer security experts who simply recommend formatting the drive and completely re-installing the operating system.
The Manual Method
This may or may not be more time consuming than trying to search using an automatic tool. If you are familiar with legitimate Windows services and programs and can pick out suspicious files, then this could be the way to go. Many times, rootkit scanners will not detect rootkit infections, especially if they are new, so this may be the way to go if you don’t want to go straight to the nuke-and-pave solution.
Tools:
Here is a process for locating a rootkit via msconfig:
    1. Open msconfig and enable bootlog. In XP, goto Start then Run. Type in “msconfig” (without quotes). Goto the “boot.ini” tab and tick “Boot log” In Vista and Windows 7, goto Start, type in “msconfig” (without quotes). Goto the “Boot” tab and tick “Boot log”2. Restart the Computer 3. Open C:WINDOWS or C:WINNT and open ntbtlog and search for malicious files. You can start by searching this short list from Computersight.com for the files starting with the following names. It may contain some random characters after it.
  • rot
  • gas
  • gaopdx
  • seneka
  • win32k.sys
  • uacd
  • tdss
  • kungsf
  • gxvxc
  • ovsfth
  • msqp
  • ndisp
  • msivx
  • skynet
  • Get the path of the file name: \SystemRoot\system32\drivers\BadRootkit.sys For an exhaustive list of rootkits that you can search for, check out this Rootkit List from Bleeping Computer. 4) Open up a command prompt and disable file permission using either the CACLS or ICACLS command. For e.g., type cmd in the Run box (XP) or search box (Vista/7) with Admin privileges (in Vista and Windows 7 Hit Ctrl-Shift-Enter to enter the command prompt as an Admin) and type cacls C:WINDOWS\system32\drivers\BadRootkit.SYS /d everyone or Icacls C:WINDOWS\system32\drivers\BadRootkit.SYS /deny S-1-1-0:FMRXRW (cacls /d everyone denies permission to the files for all users, Icacls /deny Sid:permission can deny Simple or Specific rights) 5) Restart the computer 6) Search for the file in the following location and remove it C:\WINDOWS or C:WINNT C:\WINDOWS\system32 C:\WINDOWS\system32\drivers Registry Clear the temp, %temp% and prefetch folders The Automatic/ Semi-Automatic method
You can check out a list of rootkit removal tools here.
I would first fire up TDSSKiller from Kaspersky. It runs a fairly quick scan and TDSS variants are popular, so it may catch something on the first attempt.
If the TDSSKiller comes up empty then try out GMER, which is a powerful and exhaustive rootkit scanner.
From there I like to use AVG’s Rootkit Scanner. This tool has actually found quite a bit of rootkits for me. It’s also good to run it after you have removed the rootkit to be thorough, although you could do that with any of these tools. Another program worth mentioning at this point is the new Microsoft Standalone System Sweeper Beta. There has been some buzz that this tool has been fairly successful at finding hidden rootkits.
If these rootkit scanners are not finding anything, or they do find something but can’t delete it, then you may have to move to the manual method. You can also keep trying other tools but there does come a point when you have to evaluate if the time and effort is worth it or you should either try a manual method, or perform a full re-installation of the operating system. 

credits to Chuck Romano