Tuesday, June 23, 2009

how a firewall protects your computer on the computer

A firewall for computer networks is much like a real firewall that stops fire from spreading from one part of a building to another part. A firewall will control and limit access from one side to the next.

A computer firewall works in the same way as a physical firewall does. It limits the movement of data and programs to and from a computer system.

Firewalls for hardware are often used between computer networks, such as between the Internet and a company network. The Internet is a complex system of networks that all cooperate together. Internet traffic that is incoming is restricted to access areas that are public or to certain computers on the company network. Company network computers are “behind” the firewall and can access other network computers as well as the Internet.

Some companies also use internal network firewalls so that certain resources are limited to certain computer groups. Internal firewalls are also used to prevent viruses from spreading through the network.

Personal firewalls, which are software firewalls, are often used in PC computers that are connected to the Internet. A software firewall will be slower that a hardware firewall which has been specialized for just that type of function. They also use some of the resources on the PC.

A firewall can prevent or limit access to computer systems by viruses or hackers. It will manage both outbound traffic and inbound traffic when a policy is put into place at the time the firewall is installed. These policies can also be configured later and will determine what programs are allowed access to the Internet as well as which traffic is allowed in and out of the system.

Network access is required by email programs, antivirus software, and Internet browsers. Personal firewalls can be put in place that allow some of this Internet traffic while disallowing others.

A firewall is smart enough to know which programs are allowed access to the Internet and which are not. When a program first tries to get on to the Internet the firewall will signal the user. The user will either deny access or will modifiy the policy for the firewall to allow access. The thing to remember is that if you don’t recognize a certain program you shouldn’t give it access. Most software that you install will let you know what firewall settings you need to set so that the program can run correctly.

Hackers will search through computer networks for ports that are open so that they can get into your computer. A port is an entry point between your computer and the Internet. When a hacker finds an open port they will use this port to send a worm which is carrying a payload to give the hacker complete control over the PC. Firewalls are used to close any ports that aren’t being used.

Accessing the Internet without using a firewall is not advised. Always keep in mind that open ports will be vulnerable to hackers. You need to protect your firewall diligently so that incoming data and files are scanned for viruses. You should also avoid opening up email attachments that you aren’t expecting.

Show Hidden Files

When you cant see the hidden files on your pc even when you enabled to show the hidden files in your folder options.

No need to worry about this issue

Try to edit the following registry.


HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENT VERSION\EXPLORER\ADVANCED\FOLDER\HIDDEN\SHOWALL

modify the value of checkdvalue to 1 ( it may be 0 or empty)

Now you see your hidden files and enjoy!!!

Monday, June 22, 2009

LimeWire Pro v5.1.3 Final *Retail*

LimeWire is a P2P file-sharing application for all types of computer files, including music, video, pictures, games, and text documents. Other features include dynamic querying, file previews during download, advanced techniques for locating rare files, and an easy, clean user interface.

LimeWire's new spam blocker gets rid of junk results, and automatic updates will keep you sharing faster than ever with the latest version. You can search for Creative Commons and Weedshare licensed files, and publish your own creative works with Creative Commons licensing. LimeWire continues its guarantee of no adware or spyware. Includes built-in bittorent support.

link: http://www.mediafire.com/file/mya3nzeztiw/LimeWire_PRO_5.1.3_Final_Retail.rar

Wednesday, June 17, 2009

Windows XP Geniune

Here is the easy way to make you Windows XP Genuine.

1. Start
2. run
3. regedit
4. HKEY_LOCAL_MACHINE
5. SOFTWARE
6. Microsoft
7. Windows NT
8. Current Version
9. WPAEvents
10. Double click OOBETimer
11. Select all and delete
12. FF D5 71 D6 8B 6A 8D 6F D5 33 93 FD
13. Right click on WPAEvents
14. Permissions
15. System
16. Deny Full Control
17. Apply
18. Yes
19. OK
20. Done!

Thursday, June 11, 2009

Lousy Performance, High Hardware Interrupt Usage

My system has been dog too slow since I did a reinstall a couple weeks back. Process Explorer was showing some outrageous hardware interrupt rates, on occasion as high as 50% and regularly at 20%.

I’d let it roll for a couple weeks simply because it was low on my frustration list and I was trying to roll through other things. It finally pissed me off enough tonight that I spent some time nailing it down. Turns out ATA/IDE controllers will often revert back to PIO mode instead of Ultra-DMA.

After the Windows IDE/ATAPI Port driver (Atapi.sys) receives a cumulative total of six time-out or cyclical redundancy check (CRC) errors, the driver reduces the communications speed (the transfer mode) from the highest Direct Memory Access (DMA) mode to lower DMA modes in steps. If the driver continues to receive time-out or CRC errors, the driver eventually reduces the transfer mode to the slowest mode (PIO mode).

Check the problem by examining the controller’s Primary and Secondary IDE settings: Device Manager -> IDE ATA/ATAPI controllers -> Primary or Secondary IDE Channel -> Properties -> Advanced Settings. Look at the Current Transfer Mode field. If it’s “PIO” then it’s a FUBAR PITA and you’ll need to uninstall the driver, reboot and let XP do its magic reinstall.

Tuesday, June 9, 2009

Acronis® Migrate Easy 7.0

Data migration software — migrate safely,
migrate quickly, Migrate Easy!

So finally you got your hard disk drive the way you like it. Unfortunately, it's now full and you have to upgrade to a new hard disk. You think you are facing a large re-installation project which is likely to take several days of tedious work.

link: http://www.mediafire.com/file/jyzzwmekhhn/Acronis.Migrate.Easy.v7.0.619.rar