FileServe

Thursday, September 30, 2010

Customize the Shut down button

Customize the Shut down button


The default action of the Start Menu's Shut down button is to turn off your PC. If you want to use the button for another action, such as restarting your PC, you click the arrow to the right of the Shut down button and select an action from the drop-down menu.

What if you rarely shut your PC down completely but frequently restart it? You can change the Shut down button's default action to be Restart -- or Switch user, Log off, Lock, Sleep or Hibernate.
To change your default, right-click the Start button and select Properties. On the Start Menu tab, click the "Power button action" drop-down menu and select which action you want to be the default. Then click OK, and OK again.


Add a Videos link to the Start Menu

The Windows 7 Start Menu includes links to your Pictures and Music folders, but not to your Videos folder. If you watch a lot of videos and want a link to them on your Start Menu, here's what you can do.



1. Right-click the Start button and select Properties.
2. On the screen that appears, go to the Start Menu tab and click Customize.
3. In the dialog box that appears, scroll to the bottom, look for the Videos section, select "Display as a link," and click OK and then OK again.

If you'd prefer that Videos display as a menu, with links to files and submenus, instead select Display as a menu.



By:Anjo

Hiding the Windows Live Messenger Icon in Win 7

Hiding the Windows Live Messenger Icon: Hopefully your first act after Windows 7 setup completed was to download and install the Windows Live Essentials suite of applications (if not, then you’re missing out on a significant part of the Windows experience). If you’re a heavy user of IM, you may love the way that Windows Live Messenger is front and central on the taskbar, where you can easily change status and quickly send an IM to someone.

Windows Live Messenger appears by default on the taskbar.

On the other hand, you may prefer to keep Windows Live Messenger in the system tray where it’s been for previous releases. If so, you can fool the application into the old style of behavior. To do this, close Windows Live Messenger, edit the shortcut properties and set the application to run in Windows Vista compatibility mode. Bingo!



When All Else Fails…: There are always those times when you’re in a really bad spot – you can’t boot up properly, and what you really want is something you can quickly use to get at a command prompt so you can properly troubleshoot. Windows 7 now includes the ability to create a system repair disc, which is essentially a CD-bootable version of Windows that just includes the command prompt and a suite of system tools. Just type “system repair disc” in the Start Menu search box, and you’ll be led to the utility.


By:Anjo

Windows Movie Maker in Win 7

Windows Movie Maker: Windows 7 doesn’t include a movie editing tool – it’s been moved to the Windows Live Essentials package, along with Photo Gallery, Mail and Messenger. Unfortunately, Windows Live Movie Maker is currently still in an early beta that is missing most of the old feature set (we’re reworking the application), and so you might be feeling a little bereft of options. It goes without saying that we intend to have a better solution by the time we ship Windows 7, but in the meantime the best solution for us early adopters is to use Windows Movie Maker 2.6 (which is essentially the same as the most recent update to the Windows XP version). It’s missing the full set of effects and transitions from the Windows Vista version, and doesn’t support HD editing, but it’s pretty functional for the typical usage scenario of home movie editing. 



Windows Movie Maker 2.6 is compatible with Windows 7.


   Download Windows Movie Maker 2.6 from here:
http://microsoft.com/downloads/details.aspx?FamilyID=d6ba5972-328e-4df7-8f9d-068fc0f80cfc  


By:Anjo

ClearType Text Tuning and Display Color Calibration

ClearType Text Tuning and Display Color Calibration: If you want to tune up your display for image or text display, we have the tools included out of the box. It’s amazing what a difference this makes: by slightly darkening the color of the text and adjusting the gamma back a little, my laptop display looks much crisper than it did before. You’d adjust the brightness and contrast settings on that fancy 42” HDTV you’ve just bought: why wouldn’t you do the same for the computer displays that you stare at every day? 



image image
Check out cttune.exe and dccw.exe respectively, or run the applets from Control Panel. 


By:Anjo

Peeking at the Desktop

Peeking at the Desktop: While we’re on the taskbar, it’s worth noting a few subtleties. You’ve probably seen the small rectangle in the bottom right hand corner: this is the feature we call “Aero Peek”, which enables you to see any gadgets or icons you’ve got on your desktop. I wanted to note that there’s a keyboard shortcut that does the same thing – just press Win+Space.  


Running with Elevated Rights: Want to quickly launch a taskbar-docked application as an administrator? It’s easy – hold down Ctrl+Shift while you click on the icon, and you’ll immediately launch it with full administrative rights (assuming your account has the necessary permissions, of course!) 


One More of the Same, Please: I’ve seen a few folk caught out by this one. If you’ve already got an application open on your desktop (for example, a command prompt window), and you want to open a second instance of the same application, you don’t have to go back to the start menu. You can simply hold down the Shift key while clicking on the taskbar icon, and it will open a new instance of the application rather than switching to the existing application. For a keyboard-free shortcut, you can middle-click with the third mouse button to do the same thing. (This trick assumes that your application supports multiple running instances, naturally.) 


Specialized Windows Switching: Another feature that power users will love is the ability to do a kind of “Alt+Tab” switching across windows that belong to just one application. For example, if you’ve got five Outlook message windows open along with ten other windows, you can quickly tab through just the Outlook windows by holding down the Ctrl key while you repeatedly click on the single Outlook icon. This will toggle through each of the five Outlook windows in order, and is way faster than opening Alt+Tab and trying to figure out which of the tiny thumbnail images relates to the specific message you’re trying to find. 


Walking Through the Taskbar: Another “secret” Windows shortcut: press Win+T to move the focus to the taskbar. Once you’re there, you can use the arrow keys to select a particular window or group and then hit Enter to launch or activate it. As ever, you can cancel out of this mode by hitting the Esc key. I don’t know for sure, but I presume this shortcut was introduced for those with accessibility needs. However, it’s equally valuable to power users – another good reason for all developers to care about ensuring their code is accessible.  



By:Anjo

Rearranging the Furniture in win 7

Rearranging the Furniture. Unless you’ve seen it demonstrated, you may not know that the icons in the new taskbar aren’t fixed in-place. You can reorder them to suit your needs, whether they’re pinned shortcuts or running applications. What’s particularly nice is that once they’re reordered, you can start a new instance of any of the first five icons by pressing Win+1, Win+2, Win+3 etc. 

 I Want My Quick Launch Toolbar Back: You might have noticed that the old faithful Quick Launch toolbar is not only disabled by default in Windows 7, it’s actually missing from the list of toolbars. As is probably obvious, the concept of having a set of pinned shortcut icons is now integrated directly into the new taskbar. Based on early user interface testing, we think that the vast majority of users out there will be quite happy with the new model, but if you’re after the retro behavior, you’ll be pleased to know that the old shortcuts are all still there. To re-enable it, do the following:


    • Right-click the taskbar, choose Toolbars / New Toolbar
    • In the folder selection dialog, enter the following string and hit OK
    • %userprofile%\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch
    • Turn off the “lock the taskbar” setting, and right-click on the divider. Make sure that “Show text” and “Show title” are disabled and the view is set to “small icons”.
    • Use the dividers to rearrange the toolbar ordering to choice, and then lock the taskbar again.



    Windows Vista-Style Taskbar: I wasn’t initially a fan of the Windows 7 taskbar when it was first introduced in early Windows 7 builds, but as the design was refined in the run up to the beta, I was converted and now actively prefer the new look, particularly when I’ve got lots of windows open simultaneously. For those who really would prefer a look more reminiscent of Windows Vista, the good news is that it’s easy to customize the look of the taskbar to more closely mirror the old version:




    The Windows 7 Taskbar can be configured for a Windows Vista compatibility view. 

    To achieve this look, right-click on the taskbar and choose the properties dialog. Select the “small icons” checkbox and under the “taskbar buttons” setting, choose “combine when taskbar is full”. It’s not pixel-perfect in accuracy, but it’s close from a functionality point of view. 



    By:Anjo




Wednesday, September 29, 2010

Cool tips about Win7

Command Junkies Only: One of the most popular power toys in Windows XP was “Open Command Prompt Here”, which enabled you to use the graphical shell to browse around the file system and then use the context menu to open a command prompt at the current working directory. In Windows 7 (and in Windows Vista, incidentally – although not many folk knew about it), you can simply hold the Shift key down while selecting the context menu to get exactly the same effect. If the current working directory is a network location, it will automatically map a drive letter for you. 


The Black Box Recorder: Every developer wishes there was a way that an end-users could quickly and simply record a repro for the problem that they’re running into that is unique to their machine. Windows 7 comes to the rescue! Part of the in-built diagnostic tools that we use internally to send feedback on the product, the Problem Steps Recorder provides a simple screen capture tool that enables you to record a series of actions. Once you hit “record”, it tracks your mouse and keyboard and captures screenshots with any comments you choose to associate alongside them. Once you stop recording, it saves the whole thing to a ZIP file, containing an HTML-based “slide show” of the steps. It’s a really neat little tool and I can’t wait for it to become ubiquitous on every desktop! The program is called psr.exe; you can also search for it from Control Panel under “Record steps to reproduce a problem”. 

          The Problem Steps Recorder provides an easy way for users to record a problem repro for later diagnosis. 



Who Stole My Browser:If you feel like Internet Explorer is taking a long time to load your page, it’s worth taking a look at the add-ons you have installed. One of the more helpful little additions in Internet Explorer 8 is instrumentation for add-on initialization, allowing you to quickly see whether you’re sitting around waiting for plug-ins to load. Just click Tools / Manage Add-ons, and then scroll right in the list view to see the load time. On my machine, I noticed that the Research add-on that Office 2007 installs was a particular culprit, and since I never use it, it was simple to disable it from the same dialog box. 



By:Anjo

Tuesday, September 28, 2010

Windows Management

By now, you’ve probably seen that Windows 7 does a lot to make window management easier: you can “dock” a window to the left or right half of the screen by simply dragging it to the edge; similarly, you can drag the window to the top of the screen to maximize it, and double-click the window top / bottom border to maximize it vertically with the same horizontal width. What you might not know is that all these actions are also available with keyboard shortcuts.


  • Win+Left Arrow and Win+Right Arrow dock;

  • Win+Up Arrow and Win+Down Arrow maximizes and restores / minimizes;

  • Win+Shift+Up Arrow and Win+Shift+Down Arrow maximizes and restores the vertical size.



  • This side-by-side docking feature is particularly invaluable on widescreen monitors – it makes the old Windows way of shift-clicking on two items in the taskbar and then using the context menu to arrange them feel really painful.


    Display Projection. Had enough of messing around with weird and wonderful OEM display driver utilities to get your notebook display onto an external projector? In that case, you’ll be pleased to know that projection is really quick and simple with Windows 7. Just hit Win+P, and you’ll be rewarded by the following pop-up window.




     
    Use the arrow keys (or keep hitting Win+P) to switch to “clone”, “extend” or “external only” display settings. You can also access the application as displayswitch.exe.

    If you want broader control over presentation settings, you can also press Win+X to open the Windows Mobility Center, which allows you to turn on a presentation “mode” that switches IM clients to do not disturb, disables screensavers, sets a neutral wallpaper etc. (Note that this feature is also available in Windows Vista.)



    By:Anjo

    Monday, September 27, 2010

    Search the Internet from the Start Menu

    This tip relies on the Group Policy Editor, which isn't available in some versions of Windows 7. Thus, this tip will not work if you have the Home Premium, Starter, or Home Basic editions of Windows 7.

    The Start Menu's search box is a convenient way to search through your PC -- but you can also have it do double-duty and perform Internet searches as well. To enable this feature.

    1. In the Start Menu search box, type GPEDIT.MSC and press Enter to run the Group Policy Editor.

    2. Go to User Configuration --> Administrative Templates --> Start Menu and Taskbar.
     
    3. Double-click "Add Search Internet link to Start Menu," and from the screen that appears, select Enabled. Then click OK and close the Group Policy Editor.




    4. From now on, when you type a search term in the Search box on the Start Menu, a "Search the Internet" link will appear. Click the link to launch the search in your default browser with your default search engine.


    By:Anjo

    Sunday, September 26, 2010

    Get a power efficiency report

    Have a laptop and want to get more battery life out of it? Windows 7 includes a hidden built-in tool that will examine your laptop's energy use and make recommendations on how to improve it. To use it:




    1. Run a command prompt as an administrator. To do this, type cmd in the search box, and when the cmd icon appears, right-click it and choose "Run as administrator."

    2. At the command line, type in the following:
    powercfg -energy -output \Folder\Energy_Report.html

    where \Folder represents the folder where you want the report to be placed.

    3. For about a minute, Windows 7 will examine the behavior of your laptop. It will then analyze it and create a report in HTML format in the folder you specified. Double-click the file, and you'll get a report -- follow its recommendations for ways to improve power performance.


    By:Anjo

    Shake your desktop free of clutter

    If you frequently run multiple programs simultaneously, your desktop can get extremely cluttered. This can get annoying if you're working on one program and want to minimize all the other windows -- in previous versions of Windows you had to minimize them individually.


    With Windows 7's "shake" feature, though, you can minimize every window except the one in which you're currently working -- in a single step. Click and hold the title bar of the window you want to keep on the desktop; while still holding the title bar, shake it quickly back and forth until all of the other windows minimize to the taskbar. Then let go. To make them return, shake the title bar again.
    You can accomplish the same thing by pressing the Window key-Home key combination -- although doing that is not nearly as much fun.


    By:Anjo

    Use hidden international wallpapers



    When you first install Windows 7, it asks for your language, time and currency. Based on your responses, it installs a set of wallpapers and themes. If you choose English (United States) for your time and currency format, for example, the available desktop backgrounds and themes will include a United States section with scenery from locations such as Maine, the Southwest and so on.

    Hidden, though, are background scenery and themes from other English-speaking countries -- Australia, Canada, Great Britain and South Africa. Normally, you can't access those backgrounds or themes, but there is a simple way you can install and use them:


    1. In the search box in the Start menu, type C:\Windows\Globalization\MCT and press Enter. (Note: If Windows 7 is installed in a drive other than C:, use that letter instead.)


    2. Windows Explorer will launch and show you a list of subfolders under C:\Windows\Globalization\MCT: MCT-AU, MCT-CA, MCT-GB, MCT-US, and MCT-ZA. Each subfolder has wallpapers for a specific country: AU for Australia, CA for Canada, GB for Great Britain, US for the United States, and ZA for South Africa.


    For any of the countries whose wallpaper and themes you want to use, go into its Theme folder, for example, C:\Windows\Globalization\MCT\MCT-ZA\Theme. Double-click the theme you see there (for example ZA).



    3. That will install a shortcut to the theme and wallpapers in the Personalization section of Control Panel.




    You can now use them as you would any other theme or background, by right-clicking the desktop, choosing Personalize, and choosing a background or theme. They will be listed in their own section.




    By:Anjo




     

    Thursday, September 23, 2010

    5 Free Ashamboo softwares 2010.9.23

    Ashampoo Burning Studio 2010 Advanced





    Ashampoo Home Designer 




    Ashampoo Snap 3


     

    Ashampoo WinOptimizer 6




    Ashampoo Photo Commander 7 


     

     To download above 5 softwares click this link


    The code is ASH-444LW1

    By:Anjo 

    Monday, September 20, 2010

    MCSE training kits full by Anoj_Anjo




    OR
    http://www.4shared.com/document/_8WMlfRn/MCSA-MCSE_2003_70-270_TRAINING.html


    http://www.4shared.com/document/EFsMDf5r/MCSA-MCSE_2003_70-290_TRAINING.html

    http://www.4shared.com/document/tJhP6ikj/70-291_Training_Kit_by_anjo.html

    http://www.4shared.com/document/aNq8EEoI/Ebook_70-293.html


    http://www.4shared.com/document/79qdqvHo/70-294_Training_Kit_by_anjo.html



    http://www.4shared.com/document/X3PJA44a/70-350_Training_kit_by_anjo.html


    http://www.4shared.com/document/jX08nmV9/70-298_Training_Kit_by_anjo.html


    http://www.4shared.com/file/vIz1WcXM/70-297_training_kit.html
    http://www.4shared.com/document/6HMwtgdF/70-299_Training_Kit_by_anjo.html

    By:Anjo

    Sunday, September 19, 2010

    VirtualBox – An open source tool for virtualization

    VirtualBox is an open source software developed and maintained by Sun Microsystems. The main aim behind this kind of softwares is to provide a virtual environment for running guest operating systems. Which means you can run a different operating system inside your current operating system.
    It is meant for those people who just love to experiment new things on their PC but are afraid of making any accidental damages to their system. You can also use the .vmdk image files which are created using the VMWare software.






    The important part to note here is the settings of this software. You can limit the amount of RAM to be used by this software. Set it to the 3/4th of what you have in your PC. So that you can run other softwares simultaneously without much trouble.  By default when you click on the VirtualBox windows the mouse control is transferred to the guest OS. To use the mouse for the actual OS use the right ctrl key. You will learn more as you start using this software.
    VirtualBox is an Open source software and is available for Windows, Linux and Mac systems. You can download the latest version of VirtualBox from the link given below.

    Download VirtualBox (Open-Source)

    Download the user manual for latest version

     

    By:Anjo

    [HOW TO]Install windows 7 from USB drive/Pen drive.

    REQUIREMENTS:

    • 1GB RAM and 16GB Hard disk space
    • 1GHZ processor.
    • Windows 7 iso file.
    • Pen drive/ usb drive with 4GB space.
    You can download windows 7 iso file from the direct download links given below.

    Windows 7 beta (32 bit version)


    Windows 7 beta (64 bit version)



    Or just get a windows 7 DVD from somewhere if you can.
    I assume that you have managed to get the Windows 7 DVD somehow by now. If you have the Windows 7 DVD in your hand then read on.

    Follow the steps given below to install Windows 7 from USB drive.

    1. Insert your USB thumb drive.
    2. Open command prompt. If you are using vista open it with admin rights.
    3. Type diskpart and press enter.
    4. Type list disk.
    5. You will see all the disks connected to your system. If you don’t have any other disk than your Hard disk and pen drive then your pen drive will be Disk . You can guess your pen drive by it’s size also.
    6. If it’s disk 1 then type Select disk 1.
    7. Now before moving ahead take backup of your important data from pen drive as we will have to format the pen drive.
    8. Now go back to CMD and type CLEAN.This will remove partition or volume formatting from the current in-focus disk by zeroing sectors
    9. Type CREATE PARTITION PRIMARY and press Enter. This will create a primary partition of length size and a starting address offset on the current drive.
    10. Type SELECT PARTITION 1 and press Enter.
    11. Type ACTIVE. this will mark the currently selected device as active.
    12. Now type FORMAT FS=NTFS and press Enter.This process may take some time. Wait for this process to end.This will format your USB drive.
    13. Type ASSIGN and press Enter. Then type EXIT .
    14. Now insert your Windows 7 DVD in the DVD drive. I will assume that your DVD drive is at D and USB drive is G. Look in your MY computer to know the drive letters for your PC.
    15. If you have iso file of Windows 7 then you can use this trick to use iso file without burning.
    16. Now open new windows of CMD and navigate to your dvd drive using cmd. If your drive name is d then type D:
    17. Now type CD boot and press enter. Then type bootsect /nt60 H: (H is your usb drive letter).
    18. Now copy all files to your pen drive.
    19. Now the most important step: Reboot your PC and press F2 when the system restarts. This will take you in to BIOS Menu. Under the advanced bios options set the Primary boot device to your Pen drive. Now you are all set to install Windows 7 from USB drive.
    By:Anjo

    [How to] Use Windows 7 to create a Wi-Fi network without using router

    If you have got Wi-Fi in your laptop and have Windows 7 installed in it then you can easily turn it into a Wi-Fi hotspot and share your net connection with other people in the range and Virtual Router is the easiest way to do so.
    Virtual Router is an open source software which leverages the Wireless Hosted Network API which is a part of the new Windows Operating Systems (Windows 7 and Windows server 2008).

    The program is really simple to use. After downloading and installing the software all you have to do is specify the network name and password to access this network. It uses the WPA-2 encryption to protect the wireless network from unwanted users.




    The program requires only 20mb of RAM and is pretty simple to understand and use. Requires Windows 7 or Windows server 2008 to run.

    Download Virtual Router | Virtual Router homepage

     

    By:Anjo


    Download Google chrome 6 stable version offline installer

    Google chrome is been eating the share of all other major browsers from the day one and after almost two years being in the market the new stable version of the Google Chrome is out again.
    Some new features in Google Chrome 6 are :


    • Polished User Interface.
    • Better sync technique.
    • Autofill feature added.
    • The fastest browser has become even more faster.
    • Few more bug fixes.

    Download Google Chrome 6 Offline / Standalone installer

     By:Anjo

    Saturday, September 18, 2010

    Anti-Trojan Elite 5.1.4

    Anti-Trojan Elite 5.1.4 | 6.04 MB


    Anti Trojan Elite(ATE) is a malware remover, it can detect and clean malware in disk or memory.Anti Trojan Elite provide a real-time malware firewall for user, once a trojan or keylogger would been loaded, the ATE can detect, block and then clean it in time before it starts. The ATE can detect more than 22000 trojans, worms and keyloggers currently, and the number of malware ATE could clean is growing up very quickly, we collect world-wide malwares, user can using our auto live update feature to get the power to clean these new malwares in time.
    Anti Trojan Elite has some useful utilities especially. The network utility can been used to disconnect suspicious TCP connections; The process utility can been used to kill suspicious processes even the process has the system priviage, even it has the ability to unload suspicious modules in all processes; The registry repair utility can been used to repair registry altered by malware; The registry monitor utility can been used to repair any change of important registry keys and values with real time.
    THE REASONS CHOOSE ANTI TROJAN ELITE
    - Real-time malware firewall, protecting user s computer in real-time.
    - Detecting and cleaning binded malware, doesn t hurt normal file and clean the malware.
    - Detecting and cleaning no process malware, some malware don t have a EXE file, they are only some DLL files and running as some threads in other process, ATE can detect and clean this type of malware even it s running.
    - Free tools. View the information of Tcp/Ip states and processes informations.
    FEATURES
    - Disk and memory scan supported.
    - Real-time malware firewall.
    - Compressed files (RAR ZIP CAB) scan supported.
    - Backup module: Backup trojan files before killing.
    - Network Manager. View the tcp/udp states and the processes they belonged to. User can disconnect any tcp connection and stop the opposite process.
    - Process manager. View the processes and its DLL modules information. User can terminate any process and unload any DLL module.
    - Internet Explorer and registry repair utility.
    - Updating online supported, and auto check updates when ATE starts.
    - Real-time registry monitor utility.
    Download Links


    By:Anjo

    Norton Internet Security 2011 18.1.0.37

    Norton Internet Security 2011 18.1.0.37 | 94 MB

    Norton Internet Security delivers the fastest and lightest online threat protection available. It guards your PC, network, online activities and your identity with innovative detection technologies optimised to combat today s aggressive, rapid-fire attacks. The improved Norton Protection System features multi-layered security technologies that work together to provide comprehensive protection that helps detect and remove identified threats before they can harm your PC.
    It stops online identity theft, identified viruses, hackers, bots, spyware, Trojans, and more while minimising performance impact and without getting in your way. Improved Norton Safe Web technology blocks online attacks before they can infect your PC, so you can browse, buy and bank online with confidence.
    It helps prevent threats from sneaking in through vulnerabilities in your operating system, applications and browsers. It analyses downloads before you install and run them. It even warns you of unsafe web sites right in your search results. New Norton System Insight ensures strong protection that s light on CPU and memory resources. It offers the fastest install time, the fastest boot time, the fastest scan speeds and the lowest memory requirements of any Internet security suite.
    It provides easy-to-understand threat and performance information to help you prevent future infections and keep your PC running fast. With Norton Internet Security you get more than just software. You get Symantec s global network of security response, support and service resources and expertise working together to help keep you safe from today s complex threats.
    Norton Internet Security guards your PC, network, and your identity with innovative detection technologies optimised to combat today s aggressive, rapid-fire attacks. All in all, Norton Internet Security will provide the fastest and the lightest protection level against all known online threats.
    Here are some key features of Norton Internet Security :
    Engineered for Speed:
    * Proven fastest and lightest security suite available
    * Intelligence-driven Norton Insight technology targets only those files at risk for faster, fewer, shorter scans
    * Installs in under one minute on average requires less than 7 MB of memory
    * Up-to-the-minute Protection
    * Delivers up-to-the-minute protection with rapid pulse updates every 5 to 15 minutes.
    * The Norton Protection System provides multilayered protection technologies that work in concert to stop threats before they impact you.
    * Real-time SONAR (Symantec Online Network for Advanced Response) helps prevent bots from taking control of your PC.
    * Prevents threats from entering through your firewall.
    * Detects and automatically removes online threats.
    * Defends against Web-based attacks with patent-pending technology.
    * Recovery Tool boots and repairs badly infected PCs
    * Delivers our most complete deep-cleaning scan possible.
    * Prevents bots from taking control of your PC.
    * Norton Ongoing Protection provides continuous protection updates and new product features as they become available throughout your product subscription period, helping to keep your computer protected against the latest Internet threats and risks.
    * Norton Automatic Renewal Service helps to ensure that you re protected by automatically renewing your product subscription before it expires.
    Norton Identity Safe:
    * Keeps your online identity safer than ever when you buy, bank, browse, and game online.
    * Advanced phishing protection keeps your personal identification out of the hands of fraudulent Web sites.
    * Stores and encrypts your passwords and other confidential data.
    * Fills in online forms at your request to save time and protect you from keystroke loggers.
    Control without disruptions:
    * Puts every element of your security at your fingertips
    * NEW! Schedules resource intensive tasks for when you re not using your PC.
    * Review the security status of every process on your PC.
    * Silent mode suspends alerts and updates to avoid interrupting or slowing games and movies.
    * Smart two-way firewall automatically makes security decisions for you.
    Secure Networking:
    * Helps you secure your home network.
    * Conceals and secures your PC on public Wi-Fi networks.
    Parental Controls:
    * Create individual user profiles with enhanced parental controls.
    Spam Blocking:
    * Filters spam better than ever.
    Download Links

    By:Anjo

    Kaspersky Internet Security 2011 11.0.1.400 Final

    Kaspersky Internet Security 2011 11.0.1.400 Final | 136 MB

    Kaspersky Internet Security 2011 is a comprehensive data protection tool, which provides not only anti-virus protection but also protection against spam and network attacks. The application s components also enable users to protect their computers against currently unknown threats and phishing, and to restrict users access to the Internet.
    The multifaceted protection covers all channels for data transfer and exchange. All components can be flexibly configured, allowing users to tailor Kaspersky Internet Security to their specific needs.
    New in protection:
    * Improved HIPS (Host-based Intrusion Prevention System) technology assigns a danger rating to unknown programs. The Application Control component uses HIPS to define rules for new and already known applications, which may restrict their access to the file and operating systems.
    * Innovative Sandbox technology has been implemented, which uses virtualization to create a secure environment for program execution. New software can be tested in this environment, which isolates the host operating system from all changes. There is no limit to the number of Internet browsers and other applications which can run simultaneously in a sandbox.
    * Increased use of Kaspersky Security Network considerably decreases the threat response time, due to information received from other users. The service aims to minimize the time necessary to detect and neutralize new types of threats. When a user starts a program, the service checks it against white lists and Urgent Detection System lists on Kaspersky Lab s servers.
    * The protection of personal user data has been extended and enhanced. For instance, Kaspersky Internet Security automatically prevents inadvertent users from accessing known phishing web sites, and blocks keylogger programs, which are designed to steal passwords and access codes.
    * The new Script Emulator analyzes the behavior of scripts, to assess their potential harmfulness. It simulates the operation of the Java Script and Visual Basic Script engines, which are supported by default in Microsoft Internet Explorer and are built in to Microsoft Windows.
    * The new IM Anti-Virus component ensures the safe operation of most instant messaging applications. The component scans messages for the presence of malicious objects.
    * Improvements to the Virtual keyboard component provide safer entry of personal information, by protecting data from being intercepted by spyware and preventing screenshot capture.
    * Significant improvements to the Anti-Spam component now provide two methods for detecting spam: exact and expert. Exact methods apply strict filtering criteria to a message, which determine unambiguously whether or not a message is spam. Expert methods investigate email messages that have passed strict filtering criteria. As such messages cannot be unambiguously considered spam, the component calculates the probability that they are spam.
    * Components of Kaspersky Internet Security can be temporarily disabled, to improve computer performance. This can be useful during the use of resource-hungry applications such as network games.
    * Monitoring access to phishing websites and protection against phishing attacks are performed by scanning links in messages and on web pages, and also by using the database of phishing addresses when an attempt to access websites is detected. You can check whether a web address is included in the phishing database, using the Web Anti-Virus, IM Anti-Virus or Anti-Spam component.
    * Improvements have been e to all the application s existing components, including the Firewall, Parental Control, and Anti-Spam components, and particularly the Heuristic analyzer.
    * The anti-virus kernel of Kaspersky Internet Security 2011 has been significantly improved, to provide more efficient malware detection. The application shows higher performance on Windows Vista operating systems, as compared to previous versions of Kaspersky Internet Security.
    * Kaspersky Internet Security includes the URL scanning module managed by Web Anti-Virus. This module scans links on the web page, comparing the website addresses against its database of suspicious and phishing websites. This module is provided for Microsoft Internet Explorer and Mozilla Firefox browsers as a plug-in.
    * The update procedure has been improved. Kaspersky Internet Security s databases are now updated not only according to their schedule, but also when new security threats appear.
    * The creation of Rescue Disks has been improved. The service should be used when the infection reaches a level at which the computer cannot be disinfected using either anti-virus applications, or malware removal utilities such as Kaspersky AVPTool. The improved Rescue Disks provide more efficient disinfection because malware programs do not gain control when the operating system is being loaded.
    Download Links

    By:Anjo

    Trojan Killer v2.0.7.7

    Trojan Killer v2.0.7.7 | 18 MB


    Trojan Killer is designed specifically to disable/remove Malware without the user having to manually edit system files or the Registry. The program also removes the additional system modifications some Malware carries out which are ignored by some standard antivirus scanners. Trojan Killer scans ALL the files loaded at boot time for Adware, Spyware, Remote Access Trojans, Internet Worms and other malware. Trojan Killer works in the field of system security to ensure safety for computer systems. We propose products to help you get rid of annoying adware, malware and other rough tools. It is very important to restore control over your computer as soon as possible without letting anyone use your data.
    Installation:

    1. Unpack
    2. Install
    3. Run Patch
    4. Enjoy it !!!!!!!
    Download Links

    By;Anjo

    VIPRE Antivirus Premium 4.0.3904

    VIPRE Antivirus Premium 4.0.3904 | 17 Mb
     
    Looking for TOTAL security? VIPRE Antivirus Premium is lean and mean security that delivers antivirus and antispyware protection, personal firewall, and malicious website filtering technologies that protect you from today’s malware threats.
    VIPRE Antivirus Premium is high-performance antivirus + antispyware software with an integrated firewall. It doesn’t slow down your PC like other security products. VIPRE (Virus Intrusion Protection Remediation Engine) is uniquely designed to reduce computer frustration with its low system resource usage, faster boot times, few popups, and a broad-range of detection and remediation of viruses, trojans, worms, and spyware. Tired of that old (free) antivirus program that makes your PC slow down to a crawl? Interrupting what you are doing with slow scan times, causing problems and nagging you? Time for a change to next-generation antivirus with a firewall that IS NOT a resource hog. Kiss your antivirus bloatware goodbye!
    The VIPRE Antivirus Premium application will coMb[/b][/center]ine antivirus, antispyware, and firewall into a seamless, tightly-integrated security product. Utilizing next-generation technology, VIPRE provides high-performance software that doesn’t slow down your PC and is low on system resources, without the performance and resource headaches of traditional antivirus products.
    The VIPRE Firewall provides bi-directional protection, protecting you from both incoming and outgoing traffic. It can be run in either “Simple” or “Learning” modes. Simple for the basic user running mostly behind the scenes; and Learning for a more experienced user with frequent user interaction. From either mode, you can further customize your Firewall settings.
    • Does not slow down your PC
    • New antivirus + antispyware engine with firewall
    • Advanced anti-rootkit technology
    • Cutting-edge Proactive Protection
    • Full email protection: Outlook and Windows Mail
    • Ideal for Netbooks that need malware protection
    • Free U.S.-based Tech Support
    • No automatic credit card charge each year!
    We have kept all the strong points of VIPRE antivirus + antispyware and we added a leading edge, super low-overhead 2-way firewall that supports all Windows flavors and works both on 32- and 64-bit Windows XP, Vista and Windows 7. It’s so small you won’t notice it is running. To make sure your PC is fully protected, we also added Intrusion Prevention, malicious link filtering and much more. This is all you need for your PC Internet Security, and with that you deserve better tech support.
    Antivirus products have ‘VB100′ Certification, awarded by the world’s premier virus certification lab: Virus Bulletin. Only products that catch all the viruses they test for are getting the prestigious VB100 award. VIPRE is VB100 certified and confirmed to give you world-class quality in detecting and removing malware. VIPRE is also West Coast Labs Checkmark Anti-Virus Desktop certified, and continues to get additional certifications through other certifying bodies.

    Features:
    High performance threat protection with low impact on system resources
    All-new technology delivers a unique antivirus and antispyware engine
    Advanced, anti-rootkit technology
    Real-time monitoring with Active Protection™
    Full protection against email-borne threats

    Download Links Hotfile
    http://hotfile.com/dl/66078723/5da031b/vipm4.rar.html

    Fileserve
    http://www.fileserve.com/file/VAJMfZ8/vipm4.rar

    By:Anjo

    McAfee Content Security Blade Server Sostware v5.5 PATCH 2

    McAfee Content Security Blade Server Sostware v5.5 PATCH 2
    727MB
    McAfee® Content Security Blade Server delivers the functionality large enterprises and service providers need to give employees safe access to Web 2.0 applications and email, while blocking spam and controlling security. The addition of McAfee Web Gateway software, the #1 anti-malware solution, brings a new level of protection, performance, and manageability to this highly scalable platform.
    Benefits:
    * Secure your network
    Take advantage of the industry’s best anti-malware protection to proactively filter out objectionable content from web traffic in real-time
    o Enhanced real-time behavioral detection of Web 2.0 malicious mobile code
    o Advanced zero-day and targeted attack exploit detection without a signature, regardless of media or content type
    o True context-based threat detection
    * Regain control
    Consistently block 99 percent of spam, thanks to a powerful combination of detection technologies and streaming updates.
    * Gain instant insight
    Monitor overall system status easily with convenient, at-a-glance system dashboard and status indicators
    * Gain complete security and extensibility on demand
    Turn on different features when you need them:
    o Email: Anti-spam; virus removal, anti-phishing, and content filtering
    o Web: URL filtering; anti-malware, anti-virus, anti-spyware, ssl scanning, and content inspection
    * Go green and reduce costs
    Use up to 40 percent less power and 40 percent less space when compared to equivalent 1U rack-mounted servers
    Features:
    * Unmatched security
    Take protection to a new level with advanced zero-day and targeted attack exploit detection , detect Web 2.0 malicious mobile code in real-time; stop spyware, inappropriate web content, phishing, viruses, worms, trojans, spam and other malware threats, both known and unknown, from entering the network
    * Scalability and performance
    Need more performance? Just add blades. McAfee Content Security Blade Server instantly recognizes and configures new blades and adds them to the pool of shared resources. There’s no need to rearchitect your network or worry about balancing the load, the system does it all for you
    * Flexibility
    Protect either your e-mail or web infrastructure separately or take full advantage of the system’s flexibility and cover both with a single system. Features and capacity can be easily added with no need for planned downtime
    * Operational efficiency
    Simplify complex, multi-appliance or server deployments and ongoing maintenance with a single enclosure

    By:Anjo

    AVZ Antiviral Toolkit 4.35 Portable


    AVZ Antiviral Toolkit 4.35 Portable | 6MB


    AVZ AntiViral Toolkit is a Portable AntiMalware and Portable AntiSpyware Solution that was created by a Russian named Oleg Zaytsev to remove adware and spyware, network worms, trojan horses (Trojan, TrojanDownloader, TrojanSpy) and Dialers. The utility implements specialized algorithms for detecting keyloggers, finding and blocking rootkits etc. AVZ was developed as a stand alone antiviral toolkit but Oleg recently went to work for Kaspersky. As a result, the product is said to now be a part of the Kaspersky 2009.
    Strong features
    * every sub-tool in AVZ makes use of main engine, so sees more and better than generic managers;
    * AVZPM – optional driver for extensive process checks;
    * AVZGuard – tool that restricts process and registry activity, except from trusted executables to guard them against aggressive malware;
    * saves the day.
    System Requirements: WinNT / Win2K / WinXP / Vista / Win7

    By:Anjo

    Super AntiSpyware Professional 4.42.1000 Final (+Rus)

    SUPERAntiSpyware Professional 4.42.1000 Final (+Rus) | 8.92 Mb

     
    SUPERAntiSpyware is the most thorough scanner on the market. Our Multi-Dimensional Scanning and Process Interrogation Technology will detect spyware other products miss. Easily remove pests such as WinFixer, SpyAxe, SpyFalcon, and thousands more. SUPERAntiSpyware will detect and remove thousands of Spyware, Adware, Malware, Trojans, KeyLoggers, Dialers, Hi-Jackers, and Worms. SUPERAntiSpyware features many unique and powerful technologies and removes spyware threats that other applications fail to remove.
    SUPERAntiSpyware Professional includes Real-Time Blocking of threats, Scheduled Scanning, and Free Unlimited Customer Service via e-mail. Also includes a Repair feature that allows you to restore various settings which are often changed by malware programs, but usually not corrected by simply removing the parasite. Repair broken Internet Connections, Desktops, Registry Editing and more with our unique Repair System. Dedicated Threat Research Team scours the web for new threats and provides daily definition updates.
    Easily remove over 1 million pests and threat components such as VirusRay, AntiVirGear, VirusProtectPro, DriveCleaner, SmitFraud, Vundo, WinFixer, SpyAxe, SpyFalcon, WinAntiVirus, AntiVermins, AntiSpyGolden and thousands more!
    SUPERAntiSpyware features many unique technologies including:
    • Quick, Complete and Custom Scanning of Hard Drives, Removable Drives, Memory, Registry, Individual Folders and More! Includes Trusting Items and Excluding Folders for complete customization of scanning!
    • Detect and Remove Spyware, Adware, Malware, Trojans, Dialers, Worms, KeyLoggers, HiJackers and many other types of threats.
    • Light on System Resources and won’t slow down your computer like many other anti-spyware products. Won’t conflict with your existing anti-spyware or anti-virus solution!
    • Repair broken Internet Connections, Desktops, Registry Editing and more with our unique Repair System!
    • Real-Time Blocking of threats! Prevent potentially harmful software from installing or re-installing!
    • Multi-Dimensional Scanning detects existing threats as well as threats of the future by analyzing threat characteristics in addition to code patterns.
    • First Chance Prevention examines over 50 critical points of your system each time your system starts up and shuts down to eliminate threats before they have a chance to infect and infiltrate your system.
    • Process Interrogation Technology allows threats to be detected no matter where they are hiding on your system.
    • Schedule either Quick, Complete or Custom Scans Daily or Weekly to ensure your computer is free from harmful software.
    • Dedicated Threat Research Team scours the web for new threats and provides daily definition updates.

    By:Anjo