Free password protection for your files

If you are looking to protect your files from anyone else who might use your computer, there are different possibilities you can choose from. An easy option is to use the embedded function present in many software applications. Every Office application for example, from Word to Access, includes the possibility to password protect a document by simply writing a password in the Tools > Options > Security menu item.

If the application you are using doesn’t have this feature, you can always put it in a password-protected archive file (.ZIP or .RAR, for example) using your favourite compression program. However, if you use that file frequently it surely is not the most convenient solution. If this is the case you can consider using a specific program.

My Lockbox – is a security software enabling you to password protect any folder on your computer.

Free Hide Folder – is a powerful free tool to protect and hide sensitive folders on your computer. The invisible files can only be opened through the application’s file manager.

AxCrypt – is an excellent free encryption utility that enables users to encrypt all files within a folder and not allow those files to be viewed without a passphrase.

If what you are looking for is a secure place to write your secrets, have a look at myDiary, where you can write down your daily thoughts and lock them up, just like one of those old-fashioned secret diaries.

Posted in Uncategorized. Comments Off on Free password protection for your files

Remove CiD Popups

Step 1
CiD Removal
  • Go to Start > Control Panel > Add/Remove Programs
  • Uninstall any of the following:
    • Bitdownload
    • Bitroll
    • Bitgrabber
    • Browser Enhancer
    • CiD Help
    • CiD Manager
    • Download Plugin for Internet Explorer
    • Messenger Plus! and Sponsor or CiD Help
    • Netpumper
    • Search Plugin
    • Torrent101
    • Ultimate Browser Enhancer
    • W3player
    • Window Search
    • Window Searching
    • WinZix
    • Zone Media
  • Restart your PC when complete.

Note: if you’re asked for a Verification code enter the numbers that appear in the window.

If you do not remember which bundled software product you installed or do not see the above programs that included the sponsor software you can download and run the universal uninstaller > Uninstall.exe

Step 2

Download NoLop.exe to your desktop.

Alternate Download Link

  • First close any other programs you have running as this will require a reboot.
  • Double click NoLop.exe to run it.
  • Then click the button labelled “Search and Destroy“.
  • When scanning is finished you will be prompted to reboot only if infected,click ‘OK‘.
  • Now click the “REBOOT” Button.
  • A Message should popup from NoLop, if not, double click the program again and it will finish.

A log is created in C:\NoLop.log

If you receive an error “mscomctl.ocx or one of its dependencies are not correctly registered,” please download mscomctl.ocx to your system32 folder then rerun the program.

Step 3

Download Malwarebytes’ Anti-Malware from here or here

Double Click mbam-setup.exe to install the application.

  • Make sure a checkmark is placed next to Update Malwarebytes’ Anti-Malware and Launch Malwarebytes’ Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select “Perform Quick Scan“, then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.

Extra Note: If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediately.

Step 4

Download and install CCleaner

  • Double click on the ccsetup.exe file to start the installation of the program.
  • Select your language and click OK, then Next.
  • Read the license agreement and click I Agree.
  • Click Next to use the default install location.
  • Under Install Options, choose all the default settings
  • Click Install then finish to complete installation.
  • Double click the CCleaner shortcut on the desktop to start the program.
  • On the Windows tab, under Internet Explorer, uncheck Cookies if you do not want them deleted. (If deleted, you will likely need to re-enter your passwords at all sites where a cookie is used to recognize you when you visit).
  • If you use either the Firefox or Mozilla browsers, the box to uncheck for Cookies is on the Applications tab, under Firefox/Mozilla.
  • Click on the Options icon at the left side of the window, then click on Advanced.
    uncheck Only delete files in Windows Temp folders older than 48 hours.
  • Click on the Cleaner icon on the left side of the window, then click Run Cleaner to run the program.
  • Caution: Only use the Registry feature if you are very familiar with the registry.
  • Always back up your registry before making any changes.
  • Exit CCleaner after it has completed it’s process.

You should now be rid CiD and the annoying popups. If you are still any computer problems visit Computer Juice and ask for help in the Virus, Spyware & Security. Registration and help is always free!

Note: When installing software it is always best to read the EULA and never install Sponsor Programs unless you know exactly what they are.

More information on this can be found at the parent site:

Posted in Uncategorized. Comments Off on Remove CiD Popups

Slow Computer? It May Not Be Malware

Cleaning, regular maintenance, and updating are essential to a computers continued speedy performance

Remove unnecessary programs
  1. Click Start > Control Panel
  2. Click Add or Remove Programs
  3. Scroll through the list and examine each program.
  4. Click each program you no longer need, click the Change/Remove button, and then follow the prompts to uninstall it.

You may have to restart your computer after removing a program. After your computer restarts, repeat the steps above to remove more programs.

You may find a few Toolbars or a number of programs you have forgotten about or didn’t know were there.

If there are problems removing any programs from add/remove programs try the Windows Installer CleanUp Utility

Remove unused files from your system
Run CCleaner on each user account

Download CCleaner

It is suggested to download the CCleaner – SlimNo Toolbar which is the version without the Yahoo! Toolbar.

  • Double click on the ccsetup.exe file to start the installation of the program.
  • Select your language and click OK, then next.
  • Read the license agreement and click I Agree.
  • Click next to use the default install location.
  • Under Install Options, choose all the default settings
  • Click Install then finish to complete installation.
  • Double click the CCleaner shortcut on the desktop to start the program.
  • On the “Windows” tab, under “Internet Explorer,” uncheck “Cookies” if you do not want them deleted. (If deleted, you will likely need to reenter your passwords at all sites where a cookie is used to recognize you when you visit).
  • If you use either the Firefox or Mozilla browsers, the box to uncheck for “Cookies” is on the Applications tab, under Firefox/Mozilla.
  • Click on the “Options” icon at the left side of the window, then click on “Advanced.”
    deselect “Only delete files in Windows Temp folders older than 48 hours.”
  • Caution: It is not recommended that you use the “Registry” feature unless you are very familiar with the registry as it has been known to find legitimate items.
  • Click on the “Cleaner” icon on the left side of the window, then click Run Cleaner to run the program.
  • After CCleaner has completed its process, click Exit.
CCleaner Tour: After Installation

A common myth that will not improve performance is cleaning the Prefetch folder. Please see: Don’t clean out the Prefetch folder.

Defragment the Hard Drive

Over the course of regular PC use, your files get fragmented and spread out all over the hard drive.
Reading and writing data on a heavily fragmented hard drive is slowed down because the time for the heads to move between fragments on the disk surface can be substantial.
See: The Importance of Disk Defragmentation for detailed instructions.

In addition to running the Disk Defragmenter at regular intervals, monthly is optimal, there are other times you should run it too, such as when:

  • You add a large number of files.
  • Your free disk space totals 15 percent or less.
  • You install new programs or a new version of Windows

Microsofts built in Disk Defragment utility, does as good a job as any, but is known to be slow.

Here are free alternatives that do the same job in a much quicker time.

For defragmenting your pagefile and registry hives use PageDefrag

Note: It is recommended to shut down all applications including your antivirus before running a disk defrag to avoid the process from continually starting over.
For the best results it should be run from safe mode

Defragment the Registry

As a speed tweak defragmenting the Registry is probably not ever going to show an improvement in performance. But over time it can become very large and should occasionally be defragmented.

You can compact and defrag the registry with Auslogics Registry Defrag

Vista and Internet Explorer 7

The Phishing Filter could be causing your computer to respond very slowly as it evaluates Web page contents.
See The Phishing Filter may slow down the PC and Phishing Filter FAQs

Detect and repair disk errors

CHKDSK is best to be ran in SAFE MODE.


  1. Click Start, and then click Computer.
  2. Right-click the volume you want to check, and then click Properties.
  3. Click the Tools tab, and then click Check Now.
  4. Do one of the following:
  • To run CHKDSK in read-only mode, clear all check boxes, and then click Start.
    • To repair errors without scanning the volume for bad sectors, select the Automatically Fix File System Errors check box, and then click Start.
      • To repair errors, locate bad sectors, and recover readable information, select both the
      • Automatically Fix File System Errors
      • and Scan For And Attempt Recovery Of Bad Sectors check boxes.
      • Then click Start.

Windows XP and 2000 – Click Start > Run > type CHKDSK and click OK.

Windows 98 or Me – Click Start > Programs > Accessories > System Tools > ScanDisk.

Check for damaged, altered or missing critical system files

The System File Checker (SFC) searches for protected files that have been damaged, altered or are missing. It restores the correct version of the file from the cache folder.

  • You must be logged on as an administrator or as a member of the Administrators group to run sfc.
  • You may be asked to insert your XP Installation CD so have it available.

Win 98 Using System File Checker
XP Using the System File Checker Tool
How to automatically repair Windows Vista using Startup Repair

Manage autostart items

A huge culprit of computers loading and running slow is what is running in the background

CCleaner also has a startup manager.
Open CCleaner click Tools then Startup
You can delete any unneeded items from there.
Be careful, there is no backup.
Because the startup loads drivers and some programs you may need, be careful removing items you are unsure of.

You can either look up the program on Google or ask in our Support Forums what an item is for.

For quick reference use these online databases.

Some things to look for.

You will still be able to use these programs, you just have to launch them manually.

QuickTime Task
Musicmatch Jukebox
TkBellExe – RealPlayer Update
ISUSScheduler or ISUSPM Startup – InstallShield Updater Service
DVDLauncher – CyberLink PowerDVD
Adobe Reader Speed Launcher
Google Updater

StartUp Tool is an easy to use start-up items editor, which allows you to identify, add, edit, remove or disable start-up items using an intuitive graphical user interface.

MalwareBytes StartUpLite is a lightweight program that can disable or remove all known unnecessary startup entries from your computer and thus quicken the startup procedure of your system.

Startup Delayer allows you to setup how many seconds after Windows has started, to load each program.

Note: MSconfig should not be used as a startup manager. It is meant to be used for trouble shooting only. For more information see: How to deal with startup processes – Do not use MSconfig

Disable unnecessary Services to free System Resources
Services are programs that run when the computer starts up and continue to run as they aid the operating system in functionality.
There are many services that load and are not needed which take up memory space and CPU time.
Disabling these services will free up system resources which will speed up your overall computer experience.
It is recommend that you sort through the list and read the descriptions to decide if you need that service depending on what you want to do with your computer.

  • Remember, you can always turn the service back on if you find that you need it in the future.

Below is the procedure to turn off a service.

  1. Click the Start button.
  2. Select Run from the bottom of the right column.
  3. Type services.msc in the box and click OK.
  4. Once the services window has loaded you are ready to turn off unneeded services.
  5. Find this service you wish to disable in the list and select it with the mouse.
  6. Right click and select Properties.
  7. Once the properties windows has loaded locate the Start up type drop down box and select Disable.
  8. Then click OK and the next time the computer starts the service will not be loaded.

Disable some visual effects

While visual enhancements may be attractive, they can slow a computer down. Disabling some of them will free up system resources and makes the operating system perform better.

  • Right click My Computer, choose > Properties > Advanced, click on Settings
  • In the Visual Effects tab, select Adjust for best performance or uncheck all the visual effects, except for the last three.
  • Click Apply, then OK, then OK again.
  • Then right click your Desktop and choose > Properties > Appearance > “Effects.
  • Uncheck the first two boxes and click OK.

Update! Update! Update!

Many people do not like automatic updates. If this is the case get in the habit of frequently checking the Microsoft website for critical security updates.

Go to and install ALL critical security updates.

Protect Your Computer – Microsoft Update – Microsoft Security

Secuna Software Inspector is an extremely useful tool which is strongly recommend to use at least once a month.

Clean the dust out

Always turn your computer off before you begin and unplug all power cords

Heat is the biggest cause of component failure in computers.
Dust clogs the vents behind your computer, which causes your CPU to overheat and cause faulty processor fans which can result in unexpected shutdowns, random restarts, booting problems, etc.

Regular cleaning could save you costly maintenance fees down the road.

  • Remove the cover touching as little as possible inside the computer and take a moist towel and wipe any dust from the interior of the cover.
  • Blow compressed air around all of the components and along the bottom of the case, keeping the nozzle four inches away from the machine.
  • Blow air into the power supply box and into the fan (from the back of the case).
  • Blow air into the floppy disk and CD drives.

Last, check that your connections are secure.

Cleaning the Interior of your PC
Curing Laptop Overheating

Create a Restore Point

When you are all done be sure to Create a new Restore Point to ensure you keep all the changes you just made

You must be logged on to an administrator account.

  • Go to Start
  • All Programs
  • Accessories
  • System Tools
  • System Restore

Choose the radio button marked Create a Restore Point on the first screen then click Next.

Give the new Restore Point a name, then click Create. The new Restore Point will be stamped with the current date and time.

  • You may want to keep a log of this so you can find it easily should you need to use System Restore.
Then use Disk Cleanup to remove all but newly created Restore Point.

  • Go to Start > Run and type: Cleanmgr
  • Click OK.
  • Click the More Options tab.
  • Click Clean Up in the System Restore section to remove all previous restore points except the newly created one.

More suggestions and performance tips

Restore Your Computer’s Performance with Windows XP
XP Performance Tweaks
Performance Boost for XP
How to fix the top 10 Internet Explorer issues Rust Never Sleeps: How To Deal With Moisture And Corrosion In Your PC

Add more RAM

This is a quick solution that can have a dramatic affect on your system’s speed and responsiveness.

You can check how much RAM you have.
Right click My Computer
Choose Properties > General tab.

If you have 512MB
Pay attention to what software you install.
Every computer needs Security software installed (Antivirus+Firewall) and they should start up with Windows and run in the background.
If you have 512MB or less choose an Antivirus and Firewall that doesn’t require that much memory and processing time.
Don’t install “heavy” Security Suites like Norton, Panda, McAfee, TrendMicro…

Understanding, Identifying and Upgrading the RAM in your PC

PC Pitstop

  • Is your PC acting sluggish?
  • Do you have to reboot your computer because of errors and lockups?
  • Stop by PC Pitstop for a free computer checkup and diagnostics that can help you detect and fix many common computer problems.

Defragment Your System Files (Pagefile and Registry) in Windows XP

In the pursuit for performance, making sure your drive isn’t fragmented is a regular task. The problem is that Windows XP doesn’t allow certain system files to be defragmented without commercial software. What about free solutions?

There’s a utility called PageDefrag from Sysinternals (Microsoft) that lets you do one single task, and it does it well. It runs as a boot-time process that defragments the system files before they are locked by XP.

Defragment Your System Files

When you open up the application, you’ll see a list of the system files and the number of fragments each file is in. Select the “Defragment at next boot” option, or you could even choose to defragment at every boot, although I wouldn’t necessarily recommend that.

Image Hosted by

When you reboot, you’ll be prompted by PageDefrag to hit a key if you don’t want to defragment now.

Image Hosted by

If you didn’t abort the defrag, you’ll now see the defragment in process. As you can see, mine didn’t need to be defragmented anyway…

Image Hosted by

If you selected the option to defragment on every boot but would like to remove it, you can open up the application and select “Don’t defragment (uninstall)”, and then click the OK button.

Image Hosted by

This should be an essential utility in any geek’s toolkit. Note that this isn’t a substitute for defragmenting your other files on a regular basis.

Download PageDefrag from Microsoft

Source: How-To Geek

Posted in Uncategorized. Comments Off on Defragment Your System Files (Pagefile and Registry) in Windows XP

Keeping Yourself Safe On The Web

Keep normal computer functionality while combating malware

Keep Windows Updated!

  • Always keep current with the latest Microsoft security updates by applying Service Packs and all critical updates issued on the second Tuesday of each month. Also known as Patch Tuesday.
    • These can patch many of the security holes through which attackers can infect your computer.
  • Do not turn off Automatic Updates!
  • Go to Start > Control Panel > Automatic Updates to ensure they are on.

Tighten Internet Explorer’s Security Setting

  • Since Internet Explorer is the leading browser it will always be the lead in attacks from the bad guys.
    • Make your Internet Explorer more secure
      1. From within Internet Explorer click the Tools menu and then on Internet Options.
      2. Click once on the Security tab
      3. Click once on the Internet icon so it becomes highlighted.
      4. Click once on the Custom Level button.
        • Change the Download signed ActiveX controls to Prompt
        • Change the Download unsigned ActiveX controls to Disable
        • Change the Initialize and script ActiveX controls not marked as safe to Disable
        • Change the Installation of desktop items to Prompt
        • Change the Launching programs and files in an IFRAME to Prompt
        • Change the Navigate sub-frames across different domains to Prompt
        • When all these settings have been made, click on the OK button.
        • If it prompts you as to whether or not you want to save the settings, press the Yes button.
      5. Next press the Apply button and then the OK to exit the Internet Properties page.

Tighten Internet Explorer’s Security Setting (continued)
  1. Start up IE then go to Tools > Internet Options > Security
  2. Set the Security level for the Internet Zone to High. (If no slider is visible, click Default Level.)
  3. Click the Trusted Sites icon.
  4. Set the Security level for the this Zone to Medium. (If no slider is visible, click Default Level.)
  5. Click OK.

Use a Personal Firewall

Using more than one at a time can cause system crashes and/or program conflicts
  • It is critical that you use a firewall to protect your computer and your personal information from hackers.
  • Use a third party firewall

Use anti virus software

Only use one antivirus to avoid system conflicts
  • Always make sure your antivirus is up to date!
  • Set the updates to automatic. Or get in the habit of manually checking for updates weekly.
  • Below are some reliable free and paid antivirus.

Online Virus Scans

Occasionally run an online scan. These all remove what they find for free

Anti-malware Programs

Only one antispyware with real time protection is required but the use of multiple on-demand scanners is suggested
Be sure to check for updates before each scan
  • Antispyware test:
    • Spycar – A suite of tools designed to simulate spyware-like behavior.

Realtime Malware Blockers

Both of these can be used along with real time spyware protection, but only use one

Dialup users

Avoid Dialer rip offs


Real time Infiltration Detection

System Restore and Backups

Do a complete virus scan before creating any backups

  • Backup refers to making copies of data so that these additional copies may be used to restore the original after a data loss event.

Backup software

Backups can be a invaluable resource

  • ERUNT & NTREGOPT A useful freeware utility for users of Windows 2000/XP.
  • It’s made up of two parts, ERUNT & NTREGOPT.
    • ERUNT will create daily complete backups of your computer’s Registry. Whilst System Restore does the same thing, a corrupt registry file may prevent Windows from booting & this effectively disables System Restore. With ERUNT, you’re able to restore the damaged Registry.
    • NTREGOPT works by recreating each registry hive “from scratch”, thus removing any slack space that may be left from previously modified or deleted keys. In other words, it compacts the Registry to a small size which allows Windows to load & perform faster.
  • Acronis True Image is a very attractive and reasonably priced hard drive imaging program, that can save you in the event your hard drive fails unexpectedly. Acronis supports Microsoft Windows Vista and offers a 15 day trial version.

Alternate Web Browsers

More secure and customizable

  • Alternative browsers like Mozilla Firefox are somewhat more secure because they are have fewer security holes. This is because fewer malware writers target the non Microsoft browsers.
  • Opera is a full-featured Internet power tool with many useful tools and features.
  • Avant Browser is a fast, stable, user-friendly, versatile web browser with many features.

You must remember that no browser will offer complete protection. If you access questionable sites, download illegal, pirated or keygens/cracked software or visit porn type websites then no browser will be secure enough!

Software Updates

It’s extremely important to keep your software up to date

  • Secuna Software Inspector
    • Detects insecure versions of applications installed
    • Verifies that all Microsoft patches are applied
    • Assists you in updating your system and applications
    • Runs through your browser. No installation or download is required.
  • The Secunia Software Inspector covers
    • Internet browsers
    • Internet browser plugins
    • Instant messaging clients
    • Email clients
    • Media players
    • Operating systems
  • Update Checker
    • The Update Checker will scan your computer for installed software, check the versions and then send this information to to see if there are any newer releases. These are then neatly displayed in your browser for you to download.
Sun Java JRE (Java Runtime Environment)

It is very important not only to keep Sun Java up to date but also to remove older versions which have security holes and can be exploited by malware
  • Install the latest version of the Java Runtime Environment
  • Uninstall any old versions of Sun Java in Add or Remove Programs. (Vista Programs And Features)
  • Download JavaRa and unzip the file to your Desktop.
  • Open JavaRA.exe and choose Remove Older Versions
  • Once complete exit JavaRA and delete the program.
  • The Microsoft Java Virtual Machine, or MS Java VM, should be removed due to it no longer being supported by Microsoft. It has become obsolete which leaves it open to exploit by malware.
Erase your tracks

Download CCleaner – It is suggested to download the CCleaner – Slim – No Toolbar which is the version without the Yahoo! Toolbar.

  • Double click on the ccsetup.exe file to start the installation of the program.
  • Select your language and click OK, then Next.
  • Read the license agreement and click I Agree.
  • Click Next to use the default install location.
  • Under Install Options, choose all the default settings
  • Click Install then Finish to complete installation.
  • Double click the CCleaner shortcut on the desktop to start the program.
  • On the Windows tab, under Internet Explorer, uncheck Cookies if you do not want them deleted. (If deleted, you will likely need to reenter your passwords at all sites where a cookie is used to recognize you when you visit).
  • If you use either the Firefox, Opera or Chrome browsers, the box to uncheck for Cookies is under the Applications tab.
    • Click on the Options icon at the left side of the window, then click on Advanced.
      Uncheck Only delete files in Windows Temp folders older than 48 hours.
  • Click on the Cleaner icon on the left side of the window, then click Run Cleaner to run the program.
  • Caution: It is recommended that you use the Registry cleaning feature with care.
  • Always back up the Registry before removing anything with the Registry cleaner.
  • Exit CCleaner.

Watch What You Download!

Screen savers, codecs, audio/video files, chat and e-mail attachments are just a few threats

Malware can be hidden in illicit software or other files and programs you might download from the Internet.

Many “freeware” programs come with an enormous amount of bundled spyware that will slow down your system, include pop-up advertisements, steal your personal information or just plain crash your browser and even the Operating System itself.

  • P2P programs come with an enormous amount of bundled malware. There are also multiple sites that offer rouge antimalware products.
  • Javacools EULAlyzer can analyze End User License Agreements in seconds. Discover if the software you’re about to install displays pop-up ads, transmits personally identifiable information, uses unique identifiers to track you, and much much more.
Malware Free All-In-1 Codec Packs

The K-Lite Codec Pack should be all you ever need

If there is a video or audio file that says it needs anything besides what the below codec packs include, it likely contains malware.

Website Analysis

Always know the sites you download from or visiting are safe
  • Dr. Web Link Scan – Scan a link or file before you download it by copy and then paste the download or url link into the white box then click Scan
  • LinkScanner Lite – Integrates with major search engines to check search results for a variety of online threats before you click.
  • WOT – Web of Trust – WOT is a free Internet security addon for your browser. It will keep you safe from online scams, identity theft, spyware, spam, viruses and unreliable shopping sites. WOT warns you before you interact with a risky website. It’s easy and it’s free. WOT works with Internet Explorer and Firefox.
  • vURL Online – This service is completely free and allows you to view the source code within a webpage without your having to visit the site itself.
  • Phishing is prevalent and on the rise. Make sure the site you go to is real. Your ISP or Web Browser may offer a toolbar to warn you of fake sites or you can choose one of the following
  • Spoofstick Toolbar
  • Netcraft Toolbar

Cookie Management

Generally harmless, cookies are pieces of information generated by a Web server and stored on the user’s computer

  • Cookie Viewer – This Power Tool automatically scans your computer, looking for “cookies”. It can then display the data stored in each one and can delete them.
  • Cookie Cruncher – Protects your hard drive from unwanted cookies.
  • Cookie Culler – Extended Cookie Manager. Protect/unprotect selected cookies. (Firefox only)
  • Add N Edit Cookies – Gives you the ability to easily alter, edit or delete cookies. (Firefox only)

Scan your security event log

Check for high security events happening on your machine


Videos & quizzes

Stand Up and Be Counted >>> <<< You can make difference!

May Patch Tuesday Release

May Patch Tuesday Release | TrendLabs | Malware Blog – by Trend Micro

May Patch Tuesday Release

May 15th, 2008 by JM Hipolito (Technical Communications)

May’s Patch Tuesday came earlier this week, addressing six vulnerabilities. The latest batch of Microsoft Security Bulletin consisted of four security updates, with three rated as critical and one as moderate.
This batch includes a security update on the vulnerability found in Microsoft Jet Database Engine that was initially reported late March.
Here is the set of security advisories for May:
Risk Rating: Critical

Risk Rating: Moderate

All users are strongly encouraged to download the mentioned patches from Microsoft immediately.

Posted in Uncategorized. Comments Off on May Patch Tuesday Release

SysExporter: extract infromation from any program or window, even when copying and pasting is not an option

Description: SysExporter utility allows you to grab the data stored in standard list-views, tree-views, list boxes, combo boxes, text-boxes, and WebBrowser/HTML controls from almost any application running on your system, and export it to text, HTML or XML file.
Here’s some examples for data that you can export with SysExporter:

  • The files list inside archive file (.zip, .rar, and so on) as displayed by WinZip or 7-Zip File Manager.
  • The files list inside a folder.
  • The event log of Windows.
  • The list of emails and contacts in Outlook Express.
  • The Registry values displayed in the right pane of the Registry Editor.
  • The data displayed by SysInternals utilities (Registry Monitor, File Monitor, Process Explorer, and others.)
  • The text inside a standard message-box of Windows.
  • The HTML inside any instance of Internet Explorer.

Image Hosted by

Information you can extract: everything, from a list of checkboxes used by a program or dialog to the list of files in a folder to the HTML of a web page.
The user interface: simple and straightforward. Scroll throught the different controls/elements in the top pane, and preview the available data in the bottom pane. Note that you could filter across the different controls (e.g. Listview, Listbox, Combobox, Treeview, etc), as the program allows you to activate/deactivate these at will. If you don’t quite know what this means forget about it: simply scroll through all the available dialogs of the program you seek and you will find your info.
Portable: installer setup as well as zip-only versions available.
Another fantastic freeware release from NirSoft.

Compatibility: WinAll – 64-bit version also available.
SysExporter Homepage
NirSoft Homepage

Posted in Uncategorized. Comments Off on SysExporter: extract infromation from any program or window, even when copying and pasting is not an option