Advertisement

Most Popular Freewares for Windows of 2010



Hi, Punjabi Hacker readers. These are the most popular free windows softwares of 2010. Enjoy!!!


Soluto Is an Awesome Tool to Speed Up Your System Boot, Fix System Slowdowns



Soluto tracks your boot time and gives you the break down on what applications are causing hang ups-including grouping them into "No-Brainger" and "Potentially Removable" groups for easy weeding.



LookInMyPC Is a Must-Have Tool for Computer Troubleshooting



LookInMyPC is an at-a-glance tool that puts all your system information-in detail-right in front of you. You can find all this information by digging through your computer with various Windows tools, of course, but it's extremely convenient to have everything in one place.



Snow Transformation Pack Makes Your Windows Desktop Look Like Mac OS X


You like the look of Mac OS X but you want to stick with windows-for work, for gaming, for a deep seated sense that Steve Jobs is out to get you. Snow Transformation Pack overhauls the Windows interface to look like OS X. This isn't just a lame icon pack, this is a total transformation.



FlashHacker Keeps Flash Videos in Full Screen on Your Dual Monitors
 

You wouldn't think it would be so hard to enjoy flash video in full screen on your secondary monitor, but without tools like FlashHacker it's quite a headache. Enjoy South Park in full screen on your extra monitor while working in your primary. 



CCleaner Enhancer Makes CCleaner Even Better, Now Cleans 270 New Apps


What could make the popular computer cleaning and tweaking application CCleaner even better? CCleaner Enhancer extends the reach of CCleaner by expanding its database of programs and the digital debris they leave behind.



ZeuApp Downloads 82 Awesome Open Source Apps



If you love open source apps and you want an easy way to download them in bulk (or introduce a friend to the gift of open source), ZeuApp makes it dead simple to batch download 82 great open-source applications.



Google Map Buddy Generates High Resolution, Full Size Area Maps


Google Map Buddy is a free and portable application with a singular focus: leaching high-res captures from Google Maps. If you've ever wanted to wallpaper your office with a map of the downtown, now's your chance. 




Steam Mover Relocates Applications to Free Up Space on Your Primary Drive

Steam Mover is a handy application, originally designed for gamers, that makes it dead simple to move infrequently used applications from your primary drive to a secondary drive. It's not 100% foolproof but it works really well for most applications. 



Ei.cfg Removal Utility Lets You Use Any Product Key With Your Windows 7 Disc


Windows 7 install discs are edition specific-unless you use Ei.cfg. If you've got a valid disc but the wrong edition key you can still use the disc to install the right edition for the key you have. It's an invaluable tool when you've got valid discs, valid keys, but not in matching editions.


ToneCheck Stops You from Sending Passive Aggressive (or Plain Aggressive) Emails


ToneCheck is an Outlook plug-in that checks the tone and word selection of your email and warns you before you fire off an email you might regret. Although the idea is promising our testing yielded mixed results-human emotion and intention are, after all, quite difficult for a computer to analyze. 




uTorrent 2.0 Brings Performance Updates, Bandwidth Control, UDP Support, and More


uTorrent is a wildly popular BitTorrent client, earlier this year it updated to version 2.0 and brought a host of new features including bandwidth management, UDP support, and other improvements.



Pale Moon Is a Faster Firefox Clone for Windows


If you love Firefox but you'd like it to be a little snappier, Pale Moon is a Firefox clone optimized for speed. It's a Windows-specific build and it clocks in at 25% faster than a stock Firefox install.



Disk Space Fan Analyzes Hard Drive Space with a Dash of Eye Candy


Your hard drive is full again and you're not sure why. Out of control temp files? Overly complete Hello Kitty collection? Disk Space Fan gives you a quick and dirty visual analysis of your hard drive usage. Once you scan a drive you can drill down quickly to see what folders and sub-folders are sucking up what disk space. 


Freemake Is a Remarkably Simple, Yet Feature-Filled Video Converter and Editor


There are a lot of video conversion apps floating around. Freemake stands out thanks to a dead simple interface that guides even the greenest video converting newbie through the process without a hiccup. Whether you're converting for your iPod, your cell phone, or burning to a DVD, Freemake has a simple workflow you can follow. 



MultiBootISOs Boots Multiple Operating Systems from a USB Drive

If you're up in the air on which OS you want to run off your thumb drive MultiBootISOs enables multi-boot support on your USB devices. You can load as many operating systems as your thumb drive can hold and select between them at boot.

How to Encrypt and Hide Your Entire Operating System from Prying Eyes



Iif you're really serious about protecting your data, you can actually hide your entire operating system. Here's exactly how to do it. To accomplish this task, we'll be using True Crypt, our favorite free and open-source disk encryption software that runs on all platforms, supports hidden volumes, and can even encrypt your entire hard drive.

 Once we've completed the setup, you'll have two Windows installations and two passwords. One password will activate a hidden Windows installation as your real operating system, and the other, a decoy install to throw intruders off the trail.

Setting Up Your Hidden Operating System

In order to actually activate the hidden operating system features, you'll need to make sure that your hard drive is partitioned in a very particular way: You'll need two partitions on your drive, and the first partition has to have your Windows install on it. The second partition needs to be bigger than the first, and if you're using NTFS as your file system, it will need to be at least 2.1 times as big as the first partition. You can re-partition your current drive, but your best bet will be a clean installation. (As with skinning a cat, there are many ways to partition a hard drive. Windows 7 and Vista have built in partitioning tools [open Computer Management, then go to Storage -> Disk Management in the sidebar], or you could check out our guide to dual booting windows 7 as a solid resource to get started with a partitioned system.)


Once you've got your Windows installation up and running, make sure you've downloaded and installed TrueCrypt on your machine. Then fire it up and use the System –> Create Hidden Operating System menu item.

This will pop up a wizard that will help create the new TrueCrypt volume to house the hidden operating system, which will live inside of a hidden volume on the secondary partition. Your best bet the first time around is to just choose Single-boot—leave the multi-boot for the advanced class.
The Volume Encryption options page is important for one primary reason, namely that you need to choose the same encryption method across the board while you're running through this process. You'll be prompted a number of times to choose the encryption, and you need to always choose the same one or else you can't boot or access your data—also, the default setting of AES encryption is much, much faster than any other option.
You'll be prompted to choose the outer volume password, which will house a set of decoy files to make people believe that your TrueCrypt volume on the second partition contains nothing more than a bunch of files you don't want people to see—except the files you put on the outer volume aren't actually meant to be a secret. Make sure you don't lose this password.

How to Break into a Windows PC And Prevent It from Happening to You



Whether you've forgotten your password or you have a more malicious intent, it's actually extremely easy to break into a Windows computer without knowing the password. Here's how to do it, and how to prevent others from doing the same to you.
There are a few methods to breaking into a computer, each with their own strengths and weaknesses. We'll go through three of the best and most common methods, and nail down their shortcomings so you know which one to use—and how to exploit their weaknesses to keep your own computer secure.

 

The Lazy Method: Use a Linux Live CD to Get at the Files

If you don't need access to the OS itself, just a few files, you don't need to go through much trouble at all. You can grab any Linux live CD and just drag-and drop files onto a USB hard drive, as you would in any other OS.


Just download the live .iso file for any Linux distribution (like the Ubuntu) and burn it to CD. Stick it in the computer you want to access and boot up from that CD. Pick "Try Ubuntu" when it comes up with the first menu, and it should take you right into a desktop environment. From here, you can access most of the hard drive just by going to the Places menu in the menu bar and choosing the Windows drive. It should see any NTFS drives just fine.
Note that depending on the permissions of some files, you might need root access. If you're having trouble viewing or copying some files, open up a terminal window (by going to Applications > Accessories > Terminal) and type in gksudo nautilus, leaving the password blank when prompted. You should now have access to everything.

How to Beat It

This method can give you access to the file system, but its main weakness is that the malicious user still can't access any encrypted files, even when using gksudo. So, if the owner of the computer (or you) has encrypted their files, you won't get very far.

 

Sneaky Command-Line Fu: Reset the Password with the System Rescue CD

If you need access to the operating system itself, the Linux-based System Rescue CD is a good option for breaking in. You'll need to do a bit of command line work, but as long as you follow the instructions closely you should be fine.

ZeuApp Downloads 82 Awesome Open Source Apps



If you're setting up a new system or helping a friend to see how much great free and open source software exists, ZeuAPP is a portable installation tool for nearly a hundred applications.


ZeuAPP is essentially an installation dashboard for 82 applications. You can navigate to application types like CD Burners, P2P apps, Office apps, and more. Under each tab are applications for that

Nine Common Myths and Misconceptions About Viruses, Examined and Debunked



There are so many myths, misconceptions, and just plain old lies about viruses that it's often hard for anybody to know what to think. Let's examine a few of the biggest myths about viruses, and debunk each of them.
 A few weeks ago, we explained how to understand the difference between viruses, trojans, worms and other malware, and today we'll walk through some of the common myths about malware and debunk them.

Myth 1: Firewalls Protect You From Viruses

 

It's surprising how many people don't realize this, but your firewall is not going to protect you from a virus, trojan, or spyware—in fact, the only type of malware that you'll definitely be helping prevent is a worm, because they travel over the network. And sure, theoretically an outbound firewall will alert you when a malware application is sending data back, but that's a false sense of security, since once you are infected, a clever virus can simply disable the firewall. Don't misunderstand, we aren't recommending that you go and disable your firewall—in fact you should keep it enabled at all times, especially when you're on an insecure network like a coffee shop. If you aren't sure what firewall to choose, we recommend you don;t pay for windows security and use the built-in one, but you can also check out our list of the best windows firewalls.

 

Myth 2: Viruses Can Physically Damage Your Hardware

Sure, a virus like CIH can infect your firmware or BIOS, but the hardware itself is unaffected. Rumors of viruses causing your PC to go crazy and explode are unfounded and a little ridiculous. If your computer ends up infected by one of these more dangerous BIOS-level viruses, you'll probably have to take the computer to somebody that can wipe the BIOS manually, or replace it, but software viruses aren't going to murder your hardware.

 

Myth 3: My Computer Is Throwing a Lot of Errors, So It Must Have a Virus

 Files can get corrupted on their own, without the involvement of any viruses—whether it's through a bug in the software, a bad sector on your hard drive, faulty memory, or ironically, a conflict with your antivirus software. So the next time you get a warning about being unable to open a file, scan it with your antivirus software before you accuse your computer of having a virus.

 

Myth 4: I Can Just Reinstall Windows and Copy Everything Back

 I can't count the number of times I've seen somebody reinstall Windows on their PC after a virus infection, only to copy their files from a backup drive and then re-infect themselves all over again. You need to make sure that your documents and data have been scanned for and are free from viruses, especially after an infection.
To help prevent these problems in the first place, make sure that you've got an antivirus package installed and real-time protection enabled. If you aren't sure which one to choose, we recommend the free Microsoft Security Essentials, but if you want to shop around, take a look at one of the Popular antivirus applications


Myth 5: I Can Always Trust My Antivirus Application to Steer Me in the Right Direction

Print Files on Your Printer from Any Phone or Remote Computer via Dropbox




Punjabi Hacker details how to combine a Dropbox account and a simple script with any device that supports Dropbox (which includes almost all popular smartphones and Windows/Mac/Linux operating systems) to remotely or wirelessly print documents on your home printer.
The video above demonstrates the script in action, but the four-step setup is pretty simple. The short version: 1) Install Dropbox on the computer connected to your printer, 2) make sure Dropbox is also installed on the device you want to print from (or set up an email-to-Dropbox service) 3) run the VBS script on the printer-connected computer (available at Digital Inspiration) to create and monitor a PrintQueue folder in your Dropbox folder, and 4) send any file you want printed to the PrintQueue folder.

What’s the Difference Between Viruses, Trojans, Worms, and Other Malware?



Punjabi Hacker's tech-savvy readers are the first people on speed-dial when it's time to heal an infected PC, but how much do you really know about viruses, spyware, scareware, trojans, and worms? Here's a helpful guide to understanding all the different types of malware.
The point of today's lesson, of course, is to help you teach your friends and family more about the different types of malware, and debunk a few of the common myths about viruses. Who knows, maybe you'll learn a thing or two as well.

What is Malware?

The word Malware is short for malicious software, and is a general term used to describe all of the viruses, worms, spyware, and pretty much anything that is specifically designed to cause harm to your PC or steal your information.


The term computer virus is often used interchangeably with malware, though the two don't actually have the same meaning. In the strictest sense, a virus is a program that copies itself and infects a PC, spreading from one file to another, and then from one PC to another when the files are copied or shared. Image by Joffley
Most viruses attach themselves to executable files, but some can target a master boot record, autorun scripts, MS Office macros, or even in some cases, arbitrary files. Many of these viruses, like CIH, are designed to render your PC completely inoperable, while others simply delete or corrupt your files—the general point is that a virus is designed to cause havoc and break stuff.
You can protect yourself from viruses by making certain your antivirus application is always updated with the latest definitions and avoiding suspicious looking files coming through email or otherwise. Pay special attention to the filename—if the file is supposed to be an mp3, and the name ends in .mp3.exe, you're dealing with a virus.
 
 Spyware is any software installed on your PC that collects your information without your knowledge, and sends that information back to the creator so they can use your personal information in some nefarious way. This could include keylogging to learn your passwords, watching your searching habits, changing out your browser home and search pages, adding obnoxious browser toolbars, or just stealing your passwords and credit card numbers.
Since spyware is primarily meant to make money at your expense, it doesn't usually kill your PC—in fact, many people have spyware running without even realizing it, but generally those that have one spyware application installed also have a dozen more. Once you've got that many pieces of software spying on you, your PC is going to become slow.
What many people don't realize about spyware is that not every antivirus software is designed to catch spyware. You should check with the vendor to make sure the application you are using to protect you from malware is actually checking for spyware as well. If you come across a PC that is already heavily infected, run a combination of MalwareBytes and SuperAntiSpyware to clean it thoroughly.


Scareware is a relatively new type of attack, where a user is tricked into downloading what appears to be an antivirus application, which then proceeds to tell you that your PC is infected with hundreds of viruses, and can only be cleaned if you pay for a full license. Of course, these scareware applications are nothing more than malware that hold your PC hostage until you pay the ransom—in most cases, you can't uninstall them or even use the PC.
If you manage to come across a PC infected with one of these, your best bet is to Google the name of the virus and find specific instructions on how to remove it, but the steps are usually the same—run a combination of MalwareBytes, SuperAntiSpyware, and maybe ComboFix if you need to.

Trojan Horses Install a Backdoor


 

Once your PC has been infected with the trojan, it can be used for any number of nefarious purposes, like a denial of service (DoS) attack against a web site, a proxy server for concealing attacks, or even worse—for sending out buckets of spam. Protection against trojans works the same way as viruses—make sure that your antivirus application is up to date, don't open suspicious attachments, and think long and hard before you try and use a downloaded crack for Photoshop—that's one of malware authors' favorite spots to hide a trojan.

Worms Infect Through the Network

 

Computer worms use the network to send copies of themselves to other PCs, usually utilizing a security hole to travel from one host to the next, often automatically without user intervention. Because they can spread so rapidly across a network, infecting every PC in their path, they tend to be the most well-known type of malware, although many users still mistakenly refer to them as viruses. Image by me and the sysop

Some of the most famous worms include the ILOVEYOU worm, transmitted as an email attachment, which cost businesses upwards of 5.5 billion dollars in damage. The Code Red worm defaced 359,000 web sites, SQL Slammer slowed down the entire internet for a brief period of time, and the Blaster worm would force your PC to reboot repeatedly.
Because worms often exploit a network vulnerability, they are the one type of malware that can be partially prevented by making sure your firewall is enabled and locked down—you'll still need an updated antivirus software, of course.




Related Posts with Thumbnails