Kamis, 08 Desember 2011

7 ways to Protect ur Windows XP

1. Turn on Automatic Updates in Windows XP
Automatic Updates is a Windows XP utility that allows your computer to download security updates from Microsoft automatically. Turning on Automatic Updates helps to secure your computer since you'll always have the latest critical security updates.

2. Turn on the Free Firewall in Windows XP
If you have Service Pack 2 installed, you have a free firewall that you can use to protect your computer from attacks. However, you must turn the free firewall on.

3. Use Internet Explorer Wisely
Internet Explorer 6 provides four zones for which you can establish seperate security settings. By using the four zones, you'll reduce your chances of being the victim of an attack when you inadvertently visit a malicious Web site.

4. Use Anti-Virus Software
Viruses can reak havoc on your computer. Protect yourself by using antivirus software.

5. Use Spyware and Adware Software
Spyware is software that allows companies to monitor what websites you visit or even access your computer. Adware is software that displays advertisements. Protect your computer by using spyware and adware software.

6. Be Careful What You Click On
Often, attackers must entice you to open an email attachment or visit their Web site in order to attack your computer. If you open the attachment or visit their site, malicious code is executed on your computer. To protect your computer, be careful what you click on.

7. Use Limited Accounts to Better Secure Your Windows XP Computer
It's harder for someone to attack your computer through the Internet if you're using a limited account. Learn why it's best to use limited accounts for daily use and how to create a limited account.

Will Using a Limited Account Help Prevent Attacks?
Windows XP provides two different types of user accounts: limited and administrator. Administrator accounts have unlimited access to the computer, while limited accounts have some restrictions. One significant difference between limited and administrator accounts is the ease with which both types of users can download and install programs.

Since it's easy for you to download and install programs while using an administrator account, it's also easier for attackers to download and install programs to your computer without your knowledge. If an attacker entices you to visit their Web site and you're using an administrator account, the attacker may be able to put programs on your computer that could delete your files, spy on your activity, use your computer to attack others, and more.

In contrast, if you're using a limited account when you visit an attacker's Web site, it's less likely the attacker will be able to download and install the program or file that's necessary to infect your computer.

As a result, using limited accounts in Windows XP for daily use can reduce your risk of being the victim of a computer attack

Root kit

Many of the basic to intermediate computer users today are very familiar with the terms trojan, virus, adware, spyware, and worm. While many may not understand exactly how these work, most users today are aware of the threat that they pose, and the necessity of having the proper software to detect, delete, and protect against them.

In the last few years, however, another threat has emerged : rootkits. While many may have heard the term, most are still somewhat ignorant to what rootkits are and how they go about detecting and removing them.

---What is a rootkit ?---

The term rootkit has been around for more than 10 years. A rootkit is a "kit" consisting of small and useful programs that allow an attacker to maintain access to "root," the most powerful user on a computer. In other words, a rootkit is a set of programs and code that allows a permanent or consistent, undetectable presence on a computer.

In our definition of "rootkit," the key word is "undetectable." Most of the technology and tricks employed by a rootkit are designed to hide code and data on a system. For example, many rootkits can hide files and directories. Other features in a rootkit are usually for remote access and eavesdropping—for instance, for sniffing packets from the network. When combined, these features deliver a knockout punch to security. Unfortunately, they are extremely effective which means that some of you reading this will be infected even though you believe your PC to be totally clean.

---How do rootkits work ?---

Rootkits work using a simple concept called modification. In general, software is designed to make specific decisions based on very specific data. A rootkit locates and modifies the software so it makes incorrect decisions.

There are many places where modifications can be made in software. Here are some of them:.


Patching

Executable code (sometimes called a binary) consists of a series of statements encoded as data bytes. These bytes come in a very specific order, and each means something to the computer. Software logic can be modified if these bytes are modified. This technique is sometimes called patching—like placing a patch of a different color on a quilt. Software is not smart; it does only and exactly what it is told to do and nothing else. That is why modification works so well. In fact, under the hood, it's not all that complicated. Byte patching is one of the major techniques used by "crackers" to remove software protections. Other types of byte patches have been used to cheat on video games (for example, to give unlimited gold, health, or other advantages).


Easter Eggs

Software logic modifications may be "built in." A programmer may place a back door in a program she wrote. This back door is not in the documented design, so the software has a hidden feature. This is sometimes called an Easter Egg, and can be used like a signature: The programmer leaves something behind to show that she wrote the program. Earlier versions of the widely used program Microsoft Excel contained an easter-egg that allowed a user who found it to play a 3D first-person shooter game similar to Doom embedded inside a spreadsheet cell.


Spyware Modifications

Sometimes a program will modify another program to infect it with "spyware." Some types of spyware track which Web sites are visited by users of the infected computer. Like rootkits, spyware may be difficult to detect. Some types of spyware hook into Web browsers or program shells, making them difficult to remove. They then make the user's life hell by placing links for new mortgages and Viagra on their desktops, and generally reminding them that their browsers are totally insecure.


Source-Code Modification

Sometimes software is modified at the source—literally. A programmer can insert malicious lines of source code into a program she authors. This threat has caused some military applications to avoid open-source packages such as Linux. These open-source projects allow almost anyone ("anyone" being "someone you don't know") to add code to the sources. Granted, there is some amount of peer review on important code like BIND, Apache, and Sendmail. But, on the other hand, does anyone really go through the code line by line? (If they do, they don't seem to do it very well when trying to find security holes!) Imagine a back door that is implemented as a bug in the software. For example, a malicious programmer may expose a program to a buffer overflow on purpose. This type of back door can be placed on purpose. Since it's disguised as a bug, it becomes difficult to detect. Furthermore, it offers plausible deniability on the part of the programmer! Even the very tools used by security professionals have been hacked in this way.



---Okay, so what do I do ?---

Thankfully there is a new class of security product now available called rootkit detectors that use specialized techniques to detect these dangerous intruders.

Most of these detectors require quite a bit of technical skill to interpret the results but one of the simplest to use are also amongst the most effective. The first is called Panda Anti-Rootkit. It's my top recommendation for any..but if u have any sprogram that u try go....

23 ways..to speed WIN XP..not only in defrag

Since defragging the disk won't do much to improve Windows XP performance, here are 23 suggestions that will. Each can enhance the performance and reliability of your customers' PCs. Best of all, most of them will cost you nothing.
1.) To decrease a system's boot time and increase system performance, use the money you save by not buying defragmentation software -- the built-in Windows defragmenter works just fine -- and instead equip the computer with an Ultra-133 or Serial ATA hard drive with 8-MB cache buffer.

2.) If a PC has less than 512 MB of RAM, add more memory. This is a relatively inexpensive and easy upgrade that can dramatically improve system performance.

3.) Ensure that Windows XP is utilizing the NTFS file system. If you're not sure, here's how to check: First, double-click the My Computer icon, right-click on the C: Drive, then select Properties. Next, examine the File System type; if it says FAT32, then back-up any important data. Next, click Start, click Run, type CMD, and then click OK. At the prompt, type CONVERT C: /FS:NTFS and press the Enter key. This process may take a while; it's important that the computer be uninterrupted and virus-free. The file system used by the bootable drive will be either FAT32 or NTFS. I highly recommend NTFS for its superior security, reliability, and efficiency with larger disk drives.

4.) Disable file indexing. The indexing service extracts information from documents and other files on the hard drive and creates a "searchable keyword index." As you can imagine, this process can be quite taxing on any system.

The idea is that the user can search for a word, phrase, or property inside a document, should they have hundreds or thousands of documents and not know the file name of the document they want. Windows XP's built-in search functionality can still perform these kinds of searches without the Indexing service. It just takes longer. The OS has to open each file at the time of the request to help find what the user is looking for.

Most people never need this feature of search. Those who do are typically in a large corporate environment where thousands of documents are located on at least one server. But if you're a typical system builder, most of your clients are small and medium businesses. And if your clients have no need for this search feature, I recommend disabling it.

Here's how: First, double-click the My Computer icon. Next, right-click on the C: Drive, then select Properties. Uncheck "Allow Indexing Service to index this disk for fast file searching." Next, apply changes to "C: subfolders and files," and click OK. If a warning or error message appears (such as "Access is denied"), click the Ignore All button.

5.) Update the PC's video and motherboard chipset drivers. Also, update and configure the BIOS. For more information on how to configure your BIOS properly, see this article on my site.

6.) Empty the Windows Prefetch folder every three months or so. Windows XP can "prefetch" portions of data and applications that are used frequently. This makes processes appear to load faster when called upon by the user. That's fine. But over time, the prefetch folder may become overloaded with references to files and applications no longer in use. When that happens, Windows XP is wasting time, and slowing system performance, by pre-loading them. Nothing critical is in this folder, and the entire contents are safe to delete.

7.) Once a month, run a disk cleanup. Here's how: Double-click the My Computer icon. Then right-click on the C: drive and select Properties. Click the Disk Cleanup button -- it's just to the right of the Capacity pie graph -- and delete all temporary files.

8.) In your Device Manager, double-click on the IDE ATA/ATAPI Controllers device, and ensure that DMA is enabled for each drive you have connected to the Primary and Secondary controller. Do this by double-clicking on Primary IDE Channel. Then click the Advanced Settings tab. Ensure the Transfer Mode is set to "DMA if available" for both Device 0 and Device 1. Then repeat this process with the Secondary IDE Channel.

9.) Upgrade the cabling. As hard-drive technology improves, the cabling requirements to achieve these performance boosts have become more stringent. Be sure to use 80-wire Ultra-133 cables on all of your IDE devices with the connectors properly assigned to the matching Master/Slave/Motherboard sockets. A single device must be at the end of the cable; connecting a single drive to the middle connector on a ribbon cable will cause signaling problems. With Ultra DMA hard drives, these signaling problems will prevent the drive from performing at its maximum potential. Also, because these cables inherently support "cable select," the location of each drive on the cable is important. For these reasons, the cable is designed so drive positioning is explicitly clear.

10.) Remove all spyware from the computer. Use free programs such as AdAware by Lavasoft or SpyBot Search & Destroy. Once these programs are installed, be sure to check for and download any updates before starting your search. Anything either program finds can be safely removed. Any free software that requires spyware to run will no longer function once the spyware portion has been removed; if your customer really wants the program even though it contains spyware, simply reinstall it. For more information on removing Spyware visit this Web Pro News page.

11.) Remove any unnecessary programs and/or items from Windows Startup routine using the MSCONFIG utility. Here's how: First, click Start, click Run, type MSCONFIG, and click OK. Click the StartUp tab, then uncheck any items you don't want to start when Windows starts. Unsure what some items are? Visit the WinTasks Process Library. It contains known system processes, applications, as well as spyware references and explanations. Or quickly identify them by searching for the filenames using Google or another Web search engine.

12.) Remove any unnecessary or unused programs from the Add/Remove Programs section of the Control Panel.

13.) Turn off any and all unnecessary animations, and disable active desktop. In fact, for optimal performance, turn off all animations. Windows XP offers many different settings in this area. Here's how to do it: First click on the System icon in the Control Panel. Next, click on the Advanced tab. Select the Settings button located under Performance. Feel free to play around with the options offered here, as nothing you can change will alter the reliability of the computer -- only its responsiveness.

14.) If your customer is an advanced user who is comfortable editing their registry, try some of the performance registry tweaks offered at Tweak XP.

15.) Visit Microsoft's Windows update site regularly, and download all updates labeled Critical. Download any optional updates at your discretion.

16.) Update the customer's anti-virus software on a weekly, even daily, basis. Make sure they have only one anti-virus software package installed. Mixing anti-virus software is a sure way to spell disaster for performance and reliability.

17.) Make sure the customer has fewer than 500 type fonts installed on their computer. The more fonts they have, the slower the system will become. While Windows XP handles fonts much more efficiently than did the previous versions of Windows, too many fonts -- that is, anything over 500 -- will noticeably tax the system.

18.) Do not partition the hard drive. Windows XP's NTFS file system runs more efficiently on one large partition. The data is no safer on a separate partition, and a reformat is never necessary to reinstall an operating system. The same excuses people offer for using partitions apply to using a folder instead. For example, instead of putting all your data on the D: drive, put it in a folder called "D drive." You'll achieve the same organizational benefits that a separate partition offers, but without the degradation in system performance. Also, your free space won't be limited by the size of the partition; instead, it will be limited by the size of the entire hard drive. This means you won't need to resize any partitions, ever. That task can be time-consuming and also can result in lost data.

19.) Check the system's RAM to ensure it is operating properly. I recommend using a free program called MemTest86. The download will make a bootable CD or diskette (your choice), which will run 10 extensive tests on the PC's memory automatically after you boot to the disk you created. Allow all tests to run until at least three passes of the 10 tests are completed. If the program encounters any errors, turn off and unplug the computer, remove a stick of memory (assuming you have more than one), and run the test again. Remember, bad memory cannot be repaired, but only replaced.

20.) If the PC has a CD or DVD recorder, check the drive manufacturer's Web site for updated firmware. In some cases you'll be able to upgrade the recorder to a faster speed. Best of all, it's free.

21.) Disable unnecessary services. Windows XP loads a lot of services that your customer most likely does not need. To determine which services you can disable for your client, visit the Black Viper site for Windows XP configurations.

22.) If you're sick of a single Windows Explorer window crashing and then taking the rest of your OS down with it, then follow this tip: open My Computer, click on Tools, then Folder Options. Now click on the View tab. Scroll down to "Launch folder windows in a separate process," and enable this option. You'll have to reboot your machine for this option to take effect.

23.) At least once a year, open the computer's cases and blow out all the dust and debris. While you're in there, check that all the fans are turning properly. Also inspect the motherboard capacitors for bulging or leaks. For more information on this leaking-capacitor phenomena, you can read numerous articles on my site.


Following any of these suggestions should result in noticeable improvements to the performance and reliability of your customers' computers. If you still want to defrag a disk, remember that the main benefit will be to make your data more retrievable in the event of a crashed drive
:)

Change Your Yahoo Sex.

Alright,I fount this on my own so don't go around telling everyone you fount it and take credit for it,if I find out yall have been taking credit for it I wont release anything else.

Okay,lets begin.

First:Goto http://manage.members.yahoo.com/index_listprofiles.html

Second:Click edit on the profile you want to change the sex on

Third:Click edit profile information

Fourth:Right click the page after it loads and view the source

Fifth:Find <option value="male">Male</option>

Six:Change it to <option value="Whatever">Whatever</option>

Seven:Then find /index_ep.html and change it to http://manage.members.yahoo.com/index_ep.html

Eight:Save that page as edit.html

Last:Load that page,put the sex drop down on whatever you put and click save

And your done.

Example: http://profiles.yahoo.com/frisky.owns

Enabling right click on sites that disable it!

Enabling right click on sites that disable it!
=============================================

Lots of web sites have disabled the right click function of the mouse button... it's really, really annoying. This is done so that you don't steal (via right-click->save picture) their photos or images or any other goodies. Unfortunately, it disables ALL right-click functionality: copy, paste, open in new window.

It's easy to change, assuming your using IE 6:


QUOTE
Click "Tools"->"Internet Options"
Click the "Security" tab
Click "Custom Level"
Scroll down to the "Scripting" section
Set "Active Scripting" to "disable"
Click "Ok" a couple of times.



You'll probably want to turn this back to "enable" when your done... 'cause generally the javascript enhances a website.

Enjoy!

Yahoo Security Key

A Yahoo Security Key will add an extra layer of protection to keep your Yahoo E-Mail Account and Screen Name safe from hackers and crackers.
What is a Yahoo! Security Key?
A Yahoo! Security Key is a personal access code (like
the PIN you use at the ATM) designed to protect your
most sensitive information displayed on Yahoo!.
First..go to this link:

Code:
http://help.yahoo.com/help/us/skey/skey-01.html

At the upper left hand corner of this page please note the area.."forgot security key".....click here
Now you are presented with a log in page...log in with your Yahoo ID you want to obtain a security key for.
Now..you will be ask once again to verify your password...do so.

You are now presented with a page noting the header:
Yahoo Security Key Sign Up
Choose A Security Key
Now..enter the security key you have chosen and verify it....[ hint..do not use your regular password as your security key ]

Now you are ask to select a secret question....then to supply an answer to the secret question
Please..use this example for security questions and answers:
Security Question..Favorite City
Security Question Answer:I like cheeto's..[ no one is going to guess this type of security question answer ]
Note your default e-mail address...[use a real e-mail address other than Yahoo]
Note your zip code and country..[it does not need to be your real zip code and may be differant than the one you have noted on your Yahoo account ].
Now..print out this page for future reference.
Now simply click the submit button.
Hint:if you get a "page cannot be displayed " message do not worry..simply use the "go back" feature of your browser.
You are now presented with a page asking you to verify your security key to continue..enter your security key and log in.
Here is the trick...You will receive a "page cannot be displayed message".. at this point....Do not worry..simply hit the go back feature of your browser.You will then receive a page asking you to enter your security key to continue.
Do not enter your security key at this time...simply go to the top of the page and click the Yahoo icon.You will now be directed to Yahoo's main page..and as you can see you are still logged in.
Click on the Yahoo Mail icon at the top of the Yahoo page.
Once in your mail account..click the account icon at the top of this page...enter your regular Yahoo password and you are now into your Yahoo account.
Please note at this time the area of this page that says"change password".
Look under this area.
Now you will also have a "Change your Security Key" notation here.
You now have a security key...and your Yahoo Account is for all practical purposes uncrackable and unhackable.
I know this must seem like a lot of work..but after you do it one time..you will see that is is really simple to do..and well worth doing to protect your Yahoo Account.
I do hope this is helpful to those of you who are concerned about the security of your Yahoo Account.Yes..we have played a little trick on Yahoo...but your account is now secure..and you did not need to use a credit card.