WARNING : BEFORE making any changes to the Windows registry, it is highly recommended to make a backup in case anything goes wrong. To backup your Windows registry, tap your Windows key on the keyboard and "R". When the Run box comes up, type regedit . When the Registry box comes up, go to 'File' then 'Export'. Save the resulting file to your hard dr
We're not quite done. We still need to configure Firefox to send DNS requests to the SOCKS proxy as well. To do this, enter about:config in the navigation bar in Firefox. You may get a prompt asking you if you know what you're doing. Assure Firefox that you know what you're doing and proc
The majority of the time you end up relying on on another product to get the annoyingware off of your machine. So now you've got a $60 bloated product eating up resources on your machine and doing absolutely nothing to protect
Step 3: Change the following values to whatever you like: TITLE HERE - Add the text that you want to be shows, ex. John's PC ICON HERE - The image that is used as a brand logo. It must be a .ico and 24x24. ( E.g. C:\mylogo.ico. The has to be replaced by two \'s. ) FUNCTION HERE - This should be replaced with the function that will be used when clicked. ( E.g. A website, a windows executable, etc. http://google.com will redirect to Google when clicked. )Step 4: Save the file as brand.reg and double-click it. Now, simply log off and back on and you should have your own branded version of Wind
Important note: EICAR cannot be held responsible when these files or your AV scanner in combination with these files cause any damage to your computer. YOU DOWNLOAD THESE FILES AT YOUR OWN RISK. Download these files only if you are sufficiently secure in the usage of your AV scanner. EICAR cannot and will not provide any help to remove these files from your computer. Please contact the manufacturer/vendor of your AV scanner to seek such h
Internet Explorer 7 - Click Tools and then Delete Browsing History >Delete All
Internet Explorer (Older versions) - Click Tools and then Internet Options. On the General tab, under Temporary Internet files, click Delete Files, and then click Delete Cookies. Under History, click Clear History. Delete all the files in the temporary folder of your user account which you can find by browsing to C:\Documents and Settings\username\Local Settings\T
Comodo Backup [No Longer Available] is an excellent backup utility from the creators of Comodo Firewall. It's free, easy to use and have everything you might need. You can easily backup your local files and folders to anywhere on your computer, network, DVD / CD or even FTP server. Plus it can be set to run automatically on specified time interv
An IT security group based in Europe called Eicar has come with a few different tools to test the effectiveness of your preferred AntiVirus application. There a few individual files to download and run, along with a ZIPPED file that will test your AV software and their ability to scan for viruses deeply embedded into other files. I should point out that Eicar does have a disclai
In the screenshot below you can see the problems with having an old index. Here are fragments of old files which have been deleted but are still included in the search. If you want to rebuild it quickly leave your computer running all night. Background indexing slows down or pauses with user activity so if you only have your computer on when you are using it then it will take a significantly longer period of time to complete a full in
1. Go to "Start," "Run," and type regedit .2. Navigate to the following: HKEY_CURRENT_USERControl PanelDesktop 3. Find the key labeled "MenuShowDelay" and right-click, then click Modify .4. Change the value to whatever you like. (The range is 0-999 in millisecon
There are several different tests to run through. All attempting to try and take advantage of all the various activity that normal malware would. These tools are fantastic. Especially for a brand new system you may be setting up in a business or enterprise environm
I hope this guide can help you to do just that as I will be covering how you can use utilize Windows Search. Part one involves setting Search up to function optimally, Part two involves how best to use the many capabilities of Search itself in your organisat
Something like a computer in the corner will be just fine. This not only helps you to concentrate but more info importantly from a security point of view it keeps shoulder surfers away from you. Needless to say don't enter passwords when some one is standing next to you, how uninterested he or she may pret
[NO LONGER WORKS] Spycar attempts to hijack your system, similar to typical malware activity and gives your protection a test. Spycar does not include any "exploits", so you do have to click OK during the process for the test to take affect. If your preventative software is successful during the process, a built-in TowTruck application responds with a rating on your prevention and then returns your system to it's original st