Thursday, September 03, 2009

Your 56k modem connects at 33.6k or less part : 1


  1. Some ISPs (Internet service Provider) put forth separate phone numbers for 56k. For example BSNL Net One gives one unique no. as the separate phone number through out Bharat. So, see that this type of separate phone number should be checked.
  2. Additional telephony devices (Landlines, Fax , Answering Machines) in a separate room , should be disconnected from the phone line .
  3. Connect phone line from modem to the wall circuit.
  4. Check for yours modem drivers updates. In recent version available  then download and install . Always, make your system back-up before installing yours modem drivers.
  5. Right click your dial up connection > property > Networking tab > “ Type of dial – up server I am calling” >setting > PPP Setting window > go to checkbox labelled  “ Negotiate multilink for single link connection” . If the box is unchecked , check it and then uncheck Click on until the dialogue boxes vanish. If the box is checked remove the check mark and click ok until the dialogue boxes vanish.

Source: Microsoft

Follow me on Twitter

Tuesday, September 01, 2009




Oh Magician!
My heart does like to fly
On your infiltration into
My life and soul
As You made them shine.

My heart does like to fly,
My soul does like to sing,
My mind feels the joy and zoom
As you make me feel strong enough
Giving me solace and making me laugh.

I spend my days with thoughts of you
And lots and lots of you:
Of how you inject the feeling
Of fire and fun
Making my life honey-sweet.

My heart does like to fly.
I'm not sure how to catch it up
And to keep in a container with you together
As my love.
Oh, My love,
My heart does like to fly.

Technorati Tags: ,,,

Follow me on Twitter

Better safe than sorry : 1


Integration is the buzz word when we talk about computer security. Risk  hovering upon you, when you are online. It is a world of Jungle, in the form of adwares, spywares , viruses, malwares Trojans, key-loggers, root kits , hackers, phissers to name of a few. So, we are vulnerable around the online world. So better safe than sorry.

  1. When accessing files from a cd or external device enable show extensions for known file types. For this go to Windows  Explorer > Tools> Folder options > view and uncheck “Hide extensions for known  file types”.
  2. Avoid downloading files from unsecure locations.
  3. Microsoft  regularly  releases security updates and patches  and patches for Microsoft Operating systems and other Microsoft appliances. Turn on Automatic Updates. For this go to Control Panel> System > Automatic Updates> choose Automatic (Recommended) .
  4. For older version of Microsoft office products (office 2003, office XP , office 2000) visit the office website for the latest updates. 
  5. To update and upgrade of yours knowledge on security go to subscribe to yours choice of yours security updates. Hot mail account is a must for this.
  6. Ensure discs are formatted with NTFS. It is more secure than FAT family of file systems . NTFS high performance can be seen on hard discs that are larger than 32GB in size
  7. Turn off simple file sharing . For this go to My Computer > Tools > Options > View > Advance settings > uncheck “ Use simple file sharing ( recommended)”

Follow me on Twitter

Thursday, August 27, 2009

Changing your password in Gmail Password


Untitled1 how to change your password:

  1. Log in to Gmail.
  2. Click Settings at the top of any Gmail page, and open the Accounts tab.
  3. Click Google Account settings.under Google Account settings
  4. In the new window, click Change password under the Personal information option.
  5. Enter your current password and your new password.
  6. Enter the new password twice, under New password: and Confirm new password.
  7. Click Save.
  8. Step by Step Screenshot Walkthrough By Heinz Tschabitscher,

Make sure to browse with Opera 10 beta 2 in Opera Turbo off mode ,in this way you can protect yours privacy do not log in using opera turbo on ,you may also use other browsers such as Internet Explorer8 ,Firefox or Chrome .

Source: Google ,

Follow me on Twitter

Comodo System Cleaner

Untitled1 CSC allows users of all experience levels to thoroughly clean their systems of damaging and/or wasteful files, boost system performance and unlock the full power of any Windows XP or Vista computer.

I will vantage with a judiciousness.Always think before you use and also use judiciously and also back up before using it or make system restore points before you ventured into this and also watch about these software especially their system restore functionality or the functionality of auto back up option as it should be a must for these type of utilities.

As Gizmo suggests :  “ First please make sure you have a recent restore point with Windows. Case in point as I was reviewing one of these programs it disrupted my internet connection. Having a restore point before the changes were made it took no more than five minutes to fix it. Have a recent back up of your critical data.Check the options menu of your selected software. For example I am currently looking through Comodo's System Cleaner and they have an option to create a restore point before you clean the registry which is not selected by default. A good piece of software does a lot of the thinking for us if we allow it to.Load a rescue disk onto a USB flash drive or CD/DVD  ”

I found a link for a really good system cleaner and they give you a lifetime license for free, but the catch is it is inclined more towards the experienced users as it has the comprehensive security protection for cleaning and also in the same way it can clean and make yours system stands to like a new Windows installations.CSC allows users of all experience levels to thoroughly clean their systems of damaging and/or wasteful files, boost system performance and unlock the full power of any Windows XP or Vista computer.

CSC is a complete registry, disk and privacy cleaner

Comodo System Cleaner contains a fully featured Registry Cleaner that removes corrupt and obsolete registry entries - often the cause of system instability and slow down. The Disk Clean utility allows you to free up disk space and improve system performance by thoroughly removing temp, archive, duplicate and other useless files. Comodo Privacy Cleaner keeps your personal details safe and sound by comprehensively clearing all traces of private data from Internet browsers, Instant Messenger and Windows software.

What's more, CSC is the safest Registry and System cleaning utility available today. The unique 'Registry Protection' and 'Safe Delete' features will automatically recover any files deleted in error and restore your system to it's previous state should any problems occur.

Comodo System Cleaner features thousands of individual security and performance enhancements for Windows Vista and XP.
Registry Cleaner - Optimizes and repairs your Windows registry by running an in-depth scan to identify, remove or repair any unnecessary or corrupted entries. After running a scan, Windows will be able to access the information it needs from the registry much more quickly - meaning your computer will get an immediate performance and stability boost.

Other features include Disk Cleaner,Privacy Cleaner,System Settings ,System Information,Autorun Manager,File Checksum Calculator


Take control by customizing virtually every aspect of Windows XP or Vista behavior with just a few mouse clicks
Optimize system performance, disk space and overall stability with built in Registry Cleaner and Disk Cleaner tools
Gain complete visibility and control over your computer's hardware, software, processes and performance with powerful diagnostics tools
Ensure complete on-line and off-line privacy by clearing the history, cache and temp files of Internet browsers, Instant Messengers and Windows applications
100% Safe Cleaning - Unique 'Registry Protection' and 'Safe Delete' features automatically roll back your system if important files were deleted in error


It has scheduling functions of some of its features.Does not have one-click cleaning .It lacks disc defragment.The registry cleaning is very aggressive,process manager and a startup manager is available but if you are using Comodo Internet Security ,process manager is built in it.For start up manager use Microsoft Configuration utility (Go to run type “msconfig”) for best and god and safe result. Actually I want to use this Comodo System Cleaner but after some days I got weird of this because of it very strong and aggressive cleaning .As per registry cleaning it is not a necessity to clean the registry even if the orphaned entries are there after the program uninstalling if the programme itself unable to clean the windows as it only takes a few bytes and not going to hurt the system anymore.64 Bit version available.Here is a comparison chart comparing other cleaners.For screenshots go here. Here is full feature list .

Downloads:Free license for life

Comodo System Cleaner Download 32 bit version ,Comodo System Cleaner Download 64 bit version

Comodo System Cleaner 32 bit portable version , Comodo System Cleaner 64 bit portable version

it's 100% free?

Follow me on Twitter

Snag your screen...from within other applications


Snagit Add-Ins are small, custom toolbars that live inside Microsoft Word, PowerPoint, Excel, Internet Explorer, Windows Explorer, or Adobe Frame Maker.Snagit Add-Ins make it simple to capture anything on your screen

The Snagit Add-ins are installed by default, during the regular Snagit install process. But if you don't have them installed and want to add them, here's how:

  1. From the Windows Start menu, choose Control Panel > Add or Remove Programs.
  2. From the Currently installed programs list, click on Snagit (latest version, if you have more than one version installed).
  3. Click the Change button.
  4. The Snagit Setup dialog box appears. Click the Modify button and then choose Next.
  5. Click the red "X" next to the add-in you wish to enable. From the dropdown menu, choose Will be installed on local hard drive.
  6. Click Next to complete install modification.

Follow me on Twitter

Sunday, August 23, 2009

Windows XP is still supported by Microsoft through April 8, 2014


Follow me on Twitter

A Of late Microsoft terminated  "Mainstream Support" on April 14, 2009 of Windows XP. But continuance of "Extended Support" of Windows XP Home, Media Center and Professional Editions through with April 8, 2014. Microsoft ceased Windows XP's Direct OEM and Retail License availableness on June 30, 2008 . System Builder License Availableness terminated on January 31, 2009.

Microsoft Support Lifecycle :

Mainstream Support provides both consumers and enterprise customers with a full offering of support including complimentary support, design change requests, security updates and other kinds of updates for the product.

Extended Support does alter the range of support a bit, but for the vast majority of customers the essential core remains the same. For example, customers will continue to receive free security updates and can call in for paid support until the second Tuesday in April of 2014.

Having a vast majority of users even so using Windows XP this is boon for them as security updates is must for yours windows operating system as we continually living in a world of wilderness where ours system can be vulnerable always and this must be a life saver and even money saver also. You will receive free security updates until April 8, 2014.


Windows XP Supported until 2014

XP Games - A Windows XP Freeware Game Guide

Until 2014

Windows Life-Cycle Policy

WinX DVD Ripper & WinX Video Converter: 100% Free Software

Follow me on Twitter


c Take this great DVD ripper, experience a fascinating journey from this moment. Rip DVD to popular video formats as AVI, FLV, WMV, MPEG, MP4, MOV, etc. Extract DVD audio into MP3 music file. Support grabbing screenshot from DVD video Easy video splitting, fully control output video image size All video/audio parameters adjustable for users optimizing video quality .Supper fast ripping speed, up to 300%-500% real time. Excellent video/audio quality. Easy to use and 100% stable. 100% Clean, No Spyware, No Malware, No Adware and No Virus.

WinX DVD Ripper is a comprehensive DVD ripping tool. It will help you easy rip DVD videos to popular video formats as AVI, FLV, RMVB, WMV, MOV, MPEG, MP4, etc. Support multiple DVD source as normal DVD, CSS protected DVD, region 1-6, Sony ArccOS, commercial DVD. WinX DVD Ripper, with user-friendly interface, offers great features like excellent video quality, fast converting speed, easy to use, 100% stable.

b It is suitable for computer users with all level of experience. Powerful functions are very easy to control, and all video/audio parameters is adjustable. And now, WinX DVD Ripper is 100% Free. Convert videos between popular video formats such as AVI, FLV, WMV, MOV, etc. Extract audio from video into MP3 music file. Support Batch Conversion. Super fast converting speed, up to 300%-500% real time. Excellent video/audio quality. Easy video splitting, fully control output video image size. All video/audio parameters adjustable for users optimizing video quality. Easy to use and 100% stable. 100% Clean, No Spyware, No Malware, No Adware and No Virus.

WinX Video Converter, offers a perfect video solution on converting popular video formats between each other, such as AVI, FLV, WMV, MPEG, MOV, MP4, etc. It could solve the problems above easily and fast. Furthermore, WinX Video Converter is Totally Free for you now. Take it to share your great video files with your family and friends at once.

This universal software is suitable to use for both novices and pros, simple and friendly interface make it incredible easy to use, and powerful functions support all video/audio parameters adjustable. And it is 100% Free now.

Download WinX DVD Ripper 100% Free now.


premature sad demise of our beloved, learned faculty of human resources


Burnet_Saxifrage Highly Respected, honorable sir,

Every time I get a letter from you sir, I get nostalgic harking back to my school days when I had nothing but to dream of having a glimpse of you, sir without ever dreaming of any outright possibility of becoming a student of my dream professor, sir who will be giving me light and direction. Now, it is a fact and the dream has come true and may be in a near future I shall be privileged to have your keep-sake blessings by touching your feet, sir. Sir, I think what I have achieved are just a few pebbles from the sea-beach of knowledge and ideas of your inspirational jottings and I am confident of getting more and more of such wonderful stuffs from you, sir in the coming days when I shall be personally interacting with you, sir. It appears to me as a fantasy that a rare genius of your caliber, sir has praised a learner like me, sir. I dedicate all my credits, acclaims and accolades, sir to my parents, my brother and to your inspirational imprint left on me, sir. In fact, my parents are very happy at the sight of your great letter, sir and they have prayed for your active and ebullient life, sir. Incidentally, you also happen to be the role model of my parents from their college days and they have successfully framed many marketing strategies based on your books, sir as they have been telling me umpteen number of times.

I am very much shocked at the news of the premature sad demise of our beloved, learned faculty of human resources who had millions of kilometers to cover, but could not as the cruel destiny had its last laugh and the almighty, perhaps, filled up his vacancy by a person of his ability who gained a natural selection in his kingdom standing out in the selection process. May his soul rest in peace and may his thought processes guide us all . Also, I express my sincerest word of condolence for his bereaved family members and friends in this hour deep and devouring tragedy.

20th August 2009

Technorati Tags:

Follow me on Twitter

Saturday, August 22, 2009

USB Safely Remove 4.1 for Free (valid Aug 19th-25th)


Follow me on Twitter

Your Free License for 'USB Safely Remove 4.1'!

During the week of August 19th - 25th, 2009 everyone can get a free license for version 4.1 of the award-winning program USB Safely Remove!64 bit version available.

You can go to this site then Just fill out the form that is yours full name and yours email and then click I want the license! and you'll get email with the license key during a day:Then the page will show you these messages . “Thank you very much for your interest in USB Safely Remove! Your license will be sent to you within 24 hours .There is a great likelihood that you'll get it much earlier, but just in case, be patient please .”1001

Links of yours interest:

Download now! , Latest changes , the forum , USB Safely Remove blog , Full Feature  List

Version: 4.1 final
Size: 3.4 MB
OS: Win 2000\XP\2003\Vista, 32\64 bit

What's the restrictions of the free license key?
There are no restrictions except you can use the program only with the current version 4.1. All other aspects of our license policy will be the same as for paid licenses: you can use it personally on each of your computers. If you wish to upgrade to any future versions (and even to downgrade to a previous one) you have to purchase the lifetime license.

How many licenses may I request?
Only one per email\IP address. If you want to get a license for your father\cousine or just a friend send him an invite to get a free license through  invite form
or with another convenient way for you. Your computer won't be infected by evil spirits as USB Safely Remove is clean like a crystal and doesn't contain any spyware, adware or viruses and any time you can uninstall the program and forget it.

Source:  Raymond.CC Forum

Wednesday, August 19, 2009

Get World Class Mamutu Malware Blocker for Free!


Emsisoft, the makers of the highly regarded a-Squared anti-malware scanner are offering a free 12 month license for their “Mamutu” behavior blocker exclusively to Gizmo Freeware readers.

Mamutu 2.0 is based on the a-squared Anti-Malware Malware-IDS and monitors in real-time all active programs for malicious behavior (Behavior Blocking). It recognizes new and unknown Malware without the need of daily pattern updates.Behavior blockers detect malware not from their signature but by their actions. That is, they look at what programs on your PC are actually doing and will raise an alarm if that behavior is typical of malware activity. An example of another well known behavior blocker is Threatfire.

Zero-day threats are becoming increasingly common. That’s why a behavior blocker is the perfect companion to a signature based anti-virus program.Mamutu is not currently compatible with x64 systems. This feature is planned for the end of 2009.The activation begins from the moment you complete the online offer process. Of course you don't have to install and start using it straight away but your 12 month license period will already be counting down.

This offer is written by MidnightCowboy at Techsupportalert popularly known as Gizmo.Paid a tribute to this great offer by visiting the site Gizmo also go its forum if you have any queries regarding this offer and how to do and what to do.Here is the complete description of the procedure of how to get World Class Mamutu Malware Blocker for Free!

From MidnightCowboy post at Gizmo.

Here’s how the offer works:

The offer is in the form of a $27 discount off selected Emsisoft products including all Mamutu subscriptions and a-squared Anti-Malware from 1 year to 3 years, 3- and 5-packs . When this discount is applied to a Mamutu one year subscription that normally costs $27, the net cost to you is zero.

The $27 is not a cash back offer or refund: it is an immediate discount and comes with full support.

So for example you could use the discount to get:

• The superb $27 Mamutu behavior blocker free for one year or
• A $40 one year license for the complete a2 Anti-Malware Scanner (which includes Mamutu) for $13

How to get your discount

1. Go to

2. Select the Emsisoft product you want by clicking the "Buy now" button. You may buy multiple products but only a single $27 discount will apply.

3. Select the time duration of your subscription. For example select "Single PC - 1 Year" by clicking the "Buy Now" button.

4. Check the checkbox labeled "Check to enter coupon code" and enter the discount code "GIZMOSFREEWARE". Click the "Apply" button.

5. Enter your delivery details and select "Cash" payment option , if you do not plan to continue with the subscription after the initial year. Click "Next".

6. Review your details, check the subscription agreement box and click the "Complete Purchase" button to finish.

7. Download your product Mamutu from: and follow the setup instructions. Use the user account details you've got on the purchase confirmation page to unlock the full version.

This exclusive offer expires on 11.59 PM USA PST, Monday August 24, 2009, so go grab it while you can.

Please note:
The firewall bundle is excluded from this offer (already discounted price-60%).
The discount is available for a-squared Anti-Malware, from 1 year to 3years, 3- and 5-packs and for all Mamutu offers only. The 3-month subscription of Anti-Malware is excluded too, as it would result in a negative purchase value with the discount


Activation notes:

If you have not yet installed the test version, then download Mamutu from Homepage.Please enter your user name and password in the Settings/License area of Mamutu and then click "Refresh licenses". Then select the new full-version license from the license list. Finally, perform an online update to finish the process.

You can also use your user data to login to the customer center. You can see your detailed license information in the customer center. Here, you can also address your questions directly to the support team and subscribe to the newsletter.

 Techsupportalert has been a great site propagating the mists of freeware and also in the process of its educating the users to use good freeware alternatives and also surf its antivirus and and other section to install a complete freeware custom suit , I am still missing his great news letter which was stopped you can browse through newsletters section also by going here.Happy browsing safe browsing.

Monday, August 17, 2009

Locate files and folders by name instantly.

"Everything" is an administrative tool that locates files and folders by filename instantly for Windows.
Unlike Windows search "Everything" initially displays every file and folder on your computer (hence the name "Everything").generally takes a few seconds to build it's database.A fresh install of Windows XP SP2 (about 20,000 files) will take about 1 second to index.1,000,000 files will take about 1 minute."Everything"requires administrator privileges because it needs raw read access to your hard drives.Click accept to allow "Everything" to continue running.

"Everything" search only file and folder names. It uses very little system resources , uses about 3-5mb of ram and less than 1mb of disk space. 1,000,000 files will use about 45mb of ram and 5mb of disk space."Everything"monitors file system changes. "Everything" is Freeware.Portable version of "Everything" is available.While installation disable the auto update and Run at start up option.

system requirements for "Everything"

"Everything" will run on Windows 2000, XP, 2003 and Vista.
"Everything" will only locate files and folders on local NTFS volumes.
"Everything" requires administrative privileges for low level read access to volumes.

Everything search engine

Small installation file
Clean and simple user interface
Quick file indexing
Quick searching
Minimal resource usage
Share files with others easily
Real-time updating

Download Everything for Windows 2000, XP, 2003 and Vista

Everything- (293 KB)

Download Everything Beta for Windows 2000, XP, 2003 and Vista

Everything- (331 KB) (portable) (267 KB)

How to search for a file or folder?

Type the partial file or folder name into the search edit, the results will appear instantly.For example, here is how to search for foo and bar: foo barTo search for either of two search terms, add a | between the terms.For example, here is how to search for .jpg or .bmp: .jpg | .bmp . To search for a file type, type the file extension into the search edit,ie to search for the mp3 file type, type *.mp3 into the search edit.To search for more than one type of file type use a | to separate file types,ie *.bmp|*.jpg will search for files with the extension bmp or jpg.

Change the "Everything" icon?

Requires "Everything" 1.2.0 beta or later.Copy your icon file into" Everything"' s installation folder and rename it to "Everything.ico".Restart "Everything".


Download Everything  ; Home ; Support ; Contact ; How do I convert a volume to NTFS? ; Install the language pack of "Everything"  ; Wants to know more

Sunday, August 16, 2009

XPSP3 - Explorer Window at startup and no MSE tray icon


ScreenShot002 If the icon of MSE doesn't appear on the task bar it could be one of two things.  Either the Microsoft Security Essentials application has failed to start, resulting in the icon being missing, or it could be that the icon is in fact there but is hidden. If the icon is hidden, you can right click on the taskbar and choose Properties.  Here you will see an option to "Hide Inactive Icons" which can be unchecked as a test, then click OK.  This will display all the icons that are hidden or inactive; please check to see if you see the Microsoft Security Essentials icon appear.

The second option is the start the applications manually ,under Start / Programs for the Microsoft Security Essentials icon and try to launch it manually.

The last option is MSE is not added to the auto runs so in order to add it Click Start then Run, and type MSCONFIG and click OK.  Here click on the Startup tab and ensure that Microsoft Security Essentials is listed here and it is checked.

For more go to this thread:

Nero introduces free CD/DVD burner


Nero has introduced a free version that has the basic data burning and disc copying features for CDs and DVDs.It has a restriction of only data burning and copying capabilities.The alternative is Ashampoo Burning Studio 2009 also available for free offers if you are a good and intelligent net-surfer. The advantage of this release is Nero brand.

As Nero websites says “What’s better than free? Free forever! Nero offers you the chance to enjoy Nero’s world-renowned data disc burning and copying features for an unlimited time, absolutely FREE! Enjoy basic data burning and copying capabilities for your CDs and DVDs from the world’s most trusted digital media brand, Nero.This version of Nero 9 contains simply data burning and disc copying features for CDs and DVDs. Additional features and functionality are available with an upgrade to Nero 9 full version.”22


Release Date
July 30, 2009

File Size
55 MB (57.187.288 bytes)


You have to provide an email address to download the software, as Nero websites states”Register now to receive the Nero News and stay up to date with the latest tips, special offers, and technology info from Nero

The free version of Nero 9 is called Nero StartSmart Essentials. The size of the installer for Nero 9 free version is only 55MB. As review by Raymond Download Free Nero 9 StartSmart Essentials suggests”I cannot rip audios to MP3, cannot burn MP3 to audio CD and etc. Honestly I can’t see why is there any reason to use the new free Nero 9 StartSmart Essentials because it really lacks of basic features which can be found in other disc burning software that are free. Unless like I said earlier, you’re a big fan of Nero and that’s the only burning software you’d use. “

This says it all, so if you prefer brand Nero then download it it is a big download for slow connections otherwise Ashampoo Burning Studio 2009 suggests much more and it is in fact a full integration utility for yours burning need.This free version of Nero lets you duplicate discs.Installation takes about 130 MB Hard disc place.

The Techsupportalert suggests “during installation, Nero will ask you to agree to install the search bar and change your default browser search page to You can avoid that by checking the radio button next to "Install Nero without the Ask Toolbar."”

See the system requirements and troubleshooting.

Nero 9 Free Version

Sources: Lifehacker ,Raymond , Techsupportalert





XPSP3 - Explorer Window at startup and no MSE tray icon-2


Resolving the missing MSE icon in the tray as well as ended the Search Enhancement Pack folder opening on boot.

ScreenShot001 I have XP sp 3 and the issue started after installing a portion of Windows Live.The problem with Windows XP Pro/Home sp3 after installation of Microsoft Security Essentials is after first and every reboot getting an additional popup explorer box that shows-

c:/Program Files/Microsoft/Search Enhancement Pack

In the error messages shown in the event viewer is nothing been found in this regard at all ,the icon of MSE is also hidden ,  Also through Windows Task Manager MSMpEng.exe starts to run , while msseces.exe does not start. So, it is assuring that MSE is running in the background then why the icon not showing at the system menu and why this pop up folder at every restart.but when double clicking the desktop icon it now showed at the system menu. Go this link to know about running processes of MSE. Review and Download Free Microsoft Security Essentials for Windows

So one solution provided at   by Stephen Boots MVP, Moderator

The fix from what I've seen is to add quotations around the Run

Start > Run > Regedit

Navigate to HKLM\Software\Microsoft\Windows\CurrentVersion\Run

Look for MSSE and double click it

Add quotation marks before and after the path to look like this:

"c:\Program Files\Microsoft Security Essentials\msseces.exe" -hide

* note the quotations

“This bug is in the hands of the developers and it will be fixed in a refresh or at the latest by release. I suspect it will be in a refresh.The bug is that the installer on XP does not set the registry key correctly. If you were to install any other software that creates a folder \Program Files\Microsoft\ your problem will return with the Explorer window popping up and the tray icon not appearing.The removal of Choice Guard is causing the issue of MSE opens up and tells  that it is not connected, So in order to stop this start up pop ups do not remove the \Program Files\Microsoft\search enhance pack , instead do this registry adjustment and warning do also at yours own risk otherwise read this article for more information.”

The better option:

Windows XP automated fix for this issue available at the link below:NOTE: This fix it will only run on Windows XP

It is a 634kb download known as MicrosoftFixit50060 ,after downloading double click to install and then it will ask you to restart .Now the MSE icon sits in tray on startup and the folder 

c:/Program Files/Microsoft/Search Enhancement Pack also doesn't appear.

According to Stephen Boots MVP, Moderator

“This was released to resolve the issue during this phase of the beta. The next version should not have this issue.”


Sunday, August 09, 2009

Microsoft Security Essentials Screenshots


Free Microsoft Security Essentials for Windows:Part-2


ScreenShot001 Microsoft Security Essentials System Requirements:

Operating System: Windows XP (Service Pack 2 or Service Pack 3); Windows Vista; Windows 7 (Beta or Release Candidate) For Windows XP, a PC with: CPU with clock speed of 500 MHz or higher Memory of 256 MB RAM or higher For Windows Vista and Windows 7, a PC with: CPU with clock speed of 1.0 GHz or higher Memory of 1 GB RAM or higher VGA (display): 800×600 or higher Storage: 140 MB of available hard-disk space.   MSE home page

Key features:

Real-time protection ,Dynamic Signature Service, Idle-time scanning ,Smart caching and active memory swapping Lightweight design ,CPU throttling

When Microsoft Security Essentials is running on your computer, it automatically alerts you if it detects viruses, spyware, or other potentially unwanted software. You can also set Microsoft Security Essentials to alert you if you run software that has not yet been analyzed, and you can choose to be alerted when software makes changes to your computer.


To set up Microsoft Security Essentials alerts :
Click Settings, and then click Real-time protection. Make sure the Use real-time protection (recommended) check box is selected. Select the check boxes next to the real-time protections options you want to run, and then click Save changes. If you're prompted for an administrator password or confirmation, type the password or confirm the action.

To automatically check for new definitions before scheduled scans (recommended)
Click Settings, and then click Scheduled scan. Make sure the Check for the latest virus & spyware definitions before running a scheduled scan check box is selected, and then click Save changes. If you're prompted for an administrator password or confirmation, type the password or confirm the action.

To check for new definitions manually
If you don't use scheduled scans, or if you don't get updates automatically, you should check for new definitions at least once a week. To help protect your computer, Microsoft Security Essentials will notify you if your definitions are out of date for more than seven days. Click the Update tab and then click Update now.

Select the Check for the latest virus & spyware definitions before running a scheduled scan check box and then click Save changes. If you're prompted for an administrator password or confirmation, type the password or confirm the action.


Follow the steps in this online article to reset your computer's date or time setting:

Visit one of the Microsoft Security Portals. If you are using the English version of Windows, visit the Microsoft Security Portal


What's the difference between Microsoft Security Essentials and Windows Defender?

Microsoft Security Essentials is antimalware software, which means that it's designed to detect and help protect your computer against a wide range of malicious software, including viruses, spyware, and other potentially unwanted software. Windows Defender, which is automatically installed with your Windows operating system, is software that detects and stops spyware. To learn more about Windows Defender

Microsoft Security Essentials doesn't detect cookies

As  Microsoft believes Cookies are small text files that Web sites put on your computer to store information about you and your preferences. Web sites use cookies to offer you a personalized experience and to gather information about Web site use. Microsoft Security Essentials doesn't detect cookies because it doesn't consider them a threat to your privacy or to the security of your computer. Most Internet browser programs allow you to block cookies. 

More on MSE on next post ,stay tuned.

Things to watch out for with social networking...


Cyber-criminals are running a plasmas of threats at social-networking environment, so much so that one wrong move from the user ,they will be getting all the informations with sophisticated techniques and modern hacking tools.So,only one antivirus is not going to save yours day , you will have to make multiple layer of protection to survive the impertinent cyber-attack.

Have a look at some examples of the latest cyber criminals’ creations (This is been borrowed from PC Tools newsletter and special promotions  )

  1. Koobface (social networking worm). It gains access to Facebook profile pages and directs you to view a video that then encourages you to update your Flash player. Malicious files such as flash_update.exe and bloivar29.exe are being downloaded and installed which results in a range of visible problems, including modifications to your Facebook profile, with the immediate result being an error message to contact support. There is also the very real potential for your identity and finances to be compromised!
  2. Picture files carrying malware are "planted" on social networking websites and instant messaging programs. Hackers try to convince you that your friend has sent you a message or IM to view pictures. Legitimate looking URL when clicked on sends you to an illegitimate website hosting malicious files and executables, which have been modified to appear to be genuine picture files (jpg, gif or bmp). When you download and open those "pictures"; the malware unknowingly runs on your computer. It allows hacker to take control over your operating system as well as the information in it and exposes you to identity fraud and financial loss!
  3. UPS Delivery Threat, also known as Zbot. It delivers an illegitimate file when you are visiting a counterfeit UPS delivery site. Zbot has been known to distribute via email phishing and instant messenger.  Upon informing you that you have missed a UPS delivery, the message urges you to view the invoice online, which in fact sends you to the counterfeit website which downloads a malicious program designed to bypass the firewall and then steal banking and personal information.


  1. Do not open any unexpected emails or attachments ,the source of email not known also practice safe browsing.
  2. Update windows,antivirus both on access and on demand and use anti malware, Microsoft Security Essentials is recommended and use real-time behavioral blocker of anti Trojan and anti root kit is Threatfire of PC Tools,
  3. Update yours flash player or manually from the vendors' website
  4. Update Adobe reader
  5. If possible use one anti-logger  also.


UltraExplorer - The Ultimate File Manager Tool for Windows


UltraExplorer is a powerful replacement for the file manager in the Microsoft Windows operating system. Windows Explorer is fine for occasional use but those who require more out of file management quickly become frustrated with it. Download from here and go to its wiki from here .


The UltraExplorer user interface is divided up into numerous windows that may be docked to any edge of the main application or may "float" detached from the main application.

My Anti Key Logger(Zemana Antikeylogger) reports this while installation of UltraExplorer : It asks for permission and I have allowed it on a test PC with Returnil virtualization on, so it is installing the Clipboard Logger (Type: 27) as in many cases this may be a normal functions for a application but please verify it before installing.

Permission        = 1
Action            = Allowed
Description       = Windows Explorer Replacement Application
Process Name      = UltraExplorer.exe
Component         = UltraExplorer.exe
Company           = (Unable to verify) Mustangpeak
Activity          = ClipboardLogger (Type: 27)
MD5 Hash          = *****************************
Date              = 9/7/2009 - 6:01:42 PM


UltraExplorer supports the common list view view styles found in Windows Explorer plus an exciting new mode found only in UltraExplorer, Columns View.

The views that UltraExplorer supports are:

Large Icon View
Small Icon View
List View
Details View
Thumbnail View
Tile View
Columns View

Threaded Images: All views in UltraExplorer r images are extracted in a separate thread so you are not waiting for images to appear in order to continue your work.

command line options:

/p "FolderPath"
Example: UltraExplorer.exe /p "c:\MyFolder"
Note for virtual namespaces you may use the GUID path to browse to these namespaces. For instance to browse to:
My Documents: UltraExplorer.exe /p "::{450D8FBA-AD25-11D0-98A8-0800361B1103}"
My Documents and subfolder named MyFolder: UltraExplorer.exe /p "::{450D8FBA-AD25-11D0-98A8-0800361B1103}\MyFolder"


UltraExplorer feature list is aimed at making file management and navigation fast and easier then ever before. Some of the features if UltraExplorer are:

Fully configurable user interface
All windows are reconfigurable with multiple docking options as well as the ability to float or be hidden
ToolWindows have Toolbars that maybe hidden or docked in any location.
User definable shortcut keys
User definable visual themes
Fully configurable layouts
Classic Treeview/Listview layout
Dual Listview layout
New ListMode layout
Any combination of the above can also be designed
Ultra fast display rendering and folder enumeration
Fully integrated Tabbing feature
Tabbing is context sensitive to which listview is currently active
"New Tab" initial location user definable
The Tabs are drag drop aware. You can drop files on the tab to place them in the folder.
"BreadCrumb" bar allow fast access to parent folders in the current path hierarchy
Dropdown menus allow direct access to other folders in the folder hierarchy or to the property sheet for the folder
Supports Total Commander Lister Plug-ins
An UltraExplorer exclusive. The components used the for file listings, unlike other Explorer replacements, are faster then Explorer itself. This means it is practical to have multiple lists of files visible at one time. This will quickly become a favorite view for many applications.

ultra explorer wiki: 

Wallpapers :22


wallpaper 12 wallpaper 9 wallpaper 10 wallpaper 11

Digital Dictation 7.5



Publisher's description

"The Legal Easy line of Digital Dictation/Transcription Software is a state of the art system which provides for computer based recording, storage, transmission, and transcription of all voice dictation. Systems can be configured in a wide variety of ways to suit the individual customers needs and work environment. Legal Easy Dictation products will make your law office more efficient and cost effective. From Single user standalone applications to multi-user intra- and inter-Enterprise Server based Applications let Legal Easy meet your requirements. Features include real-time voice compression with high voice quality sound, variable speed playback, and auto-backspace."

It is  a very easy to install and use program.Voice recording is good but the sound quality is poor but it can be done good through other good softwares.It's small and fast and easy to use.The recording filename appears to be based on the time in 24 hr Works very well in XP.


Operating Systems: supported Windows 95, Windows Me, Windows XP, Windows 2000, Windows NT, Windows 98

Absolutely no limitations. It is free.

Download from here:



Better Wave To Text:


Free Microsoft Security Essentials for Windows:Part-1


ScreenShot002 If you want a FREE AV, this will probably going to be the best option in the future .Free antivirus software called Microsoft Security Essentials created by Microsoft will provide protection from viruses, spyware, root kits, and Trojans for Windows XP, Windows Vista, and Windows 7.The good thing is that I have alongside it with Spyware Terminator and Threatfire, no problems. Simple and smooth installations ,I have installed on 2nd August 2009 in my windows XP OS and first from the The Softpedia link. But the surprising part is that after installations it is not sowing that it is a beta application it has been written at the top of MSE as Microsoft Security essentials. not as beta.I installed and it works great.Currently I have uninstalled my long favorite Avira Free AV for the time being.As you might know, the Microsoft Security Essentials suite is a replacement for Windows Live OneCare.As Microsoft is saying that it is in beta so officially it is not recommended use at it own risk but one thing certain in my installation and the heading of the GUI of MSE nowhere i found the sign beta so what is going on still amused and bit confused.Read this donation coder forum talks to know it more .

The setup is straightforward and fast breeze.Windows Validation is tested before installation , Once finished, it prompted  to start MSE and download updates + run a quick scan. The update on 2nd of august,ironically I first download and install on that day and update is 64 MB so beware slow connections and be prepared for a long stretchy updates at one point of time you feel that is it updating or not as i am using the CIS so I check the status and be safe that it is updating and after update is complete then automatically smooth scan and then it will be sitting in the system trey ,ironically only right click option available of MSE is that of open from system menu no exit option, so I think it is a damn good option though pundits will defer to it. MSE allows you to even completely close the GUI and the scan will continue.

Untitled2 Very basic setting page of MSE and it is more towards the normal users , Microsoft's mandatory SpyNet option available may have worried some,as it is in the Windows Defender so i opt for basic membership.A scheduler and history are also available in the GUI. After restarting the windows I was a bit of awe ,hey where is gone MSE, then I go to task manager and I realize that it is running in the background great and it does not seat in the system trey and for this I love Microsoft because of complete integration of security products just like the Windows Defender though as I have heard from various forums that Windows defender not necessary as the similar service running even though windows defender not installed like the one of MsMpEng.exe service There are 2 processes by MSE which is MsMpEng.exe and msseces.exe , When running a full scan, the CPU usage goes up to around 44% .and also I have seen after its installation the dial up connection of mine now stabilize much more than earlier so it is good sign at least for causal user who always have fear of unstable connection wearied problem. In my system it is taking 56,672 KB Ram so not a problem as in the world  where Ram is being cheap in days to come so Can be affordable if it stables the system may be I am it optimistic.One thing is sure it needs a genuine windows installations and it should be why Microsoft will support the pirated copies!!

Well about false positives from various readings from the internet what i have meant to understand is very low ,Here is the Forum link that may interest you go here to see more about MSE.

To turn Microsoft Security Essentials off in Windows 7
If you're running Microsoft Security Essentials on a Windows 7 operating system, you won’t see the Microsoft Security Essentials icon in the notification area (unless you manually added the icon to the notification area).Click the arrow in the notification area to display additional icons, including the Microsoft Security Essentials icon.

Click the arrow in the notification area to display additional icons, including the Microsoft Security Essentials icon.

Right-click the Microsoft Security Essentials icon, and then click Exit.

When Microsoft Security Essentials asks you if you’re sure you want to exit Microsoft Security Essentials, click Yes to close Microsoft Security Essentials, or click No to leave the program running. If you exit Microsoft Security Essentials, you will not be alerted if malicious software attacks your computer. Its full scan smooth and also it is scanning in every details and also it is scanning the opening of every Microsoft word files so feel secure also as I have to deal with many typography.After MSE installation , if you running WMP 11 and outright close it the songs will run though the GUI of WMP 11 will close so in order to fully stop the song ,you again open WMP 11 from start menu and stop the song and then click at the top RH corner of WMP 11, it is been seen on my system of late means after 5 days of installation of MSE.One thing is sure there is really no 100% Security Software out there as the case same as there is no ideal world.

For full preview and comprehensive outlook on MSE this link is also good one.Review and Download Free Microsoft Security Essentials for Windows 

Here is a link to some more information regarding MSE:

More on MSE on next post ,stay tuned.