Sunday, March 30, 2008

How to hide Navbar in Blogger?

Most of the bloggers and readers don't like the Navigational bar, called Navbar, at the top of each blog*Spot blog. Though I haven't gone thru the terms of conditions of Blogger by Google, here is a simple change in markup language which will do your work well.

a.     Log in and Go to Blogger dashboard

b.    Choose your blog and go to its 'Layout'

c.     'Edit HTML' is next your mouse should click.

d.    Find #header-wrapper line ( to quickly find use Ctrl+F)

e.    Now copy and paste the following piece of code directly above the #header-wrapper line

#navbar-iframe {
height: 0px;
visibility: hidden;
display: none;

f.     Fine with codes now 'Save Template' and there you're.

It is not possible to delete the Navbar however hiding it could do the job.

Note: if your blog template use template with different codes as above try any of the following to hide the Navbar, use display:none or display:block.

#navbar-iframe { display:block }

Find in your css style #header-wrapper if you're having difficulty with finding the code. Rest at the comments!

Friday, March 28, 2008

Importing to and Exporting items from Microsoft Outlook Express, Windows Mail

Importing items into Outlook Express

You can easily import items from other programs into Outlook Express. These items include:

  • Address books: From Microsoft products and other products, such as Netscape Communicator and Eudora. You can also import address book data that uses the comma separated values (CSV) format.
  • Messages from other e-mail programs: Including Netscape and Eudora. You can also import messages from many Microsoft products, such as Outlook or older versions of Outlook Express.
  • E-mail account settings: From an existing e-mail account. When you import your e-mail account settings, your Outlook Express account will have many, if not all, of the customization and information details from your previous account.
  • Newsgroup account settings: From an existing e-mail account. When you import your newsroup account settings into Outlook Express, your subscription records and other data, such as which messages you've seen, is placed into your Outlook Express newsgroup account. You can immediately pick up reading your newsgroups.

To import address books

You can import address book contacts from other Windows Address Book files (.wab), as well as from Netscape Communicator, Microsoft Exchange Personal Address Book, or any text (.csv) file.

For Windows Address Book

  1. On the File menu, point to Import, and then click Address Book.
  2. Select the address book or file type you want to import, and then click Open.

For all other address book formats

  1. On the File menu, point to Import, and then click Other Address Book.
  2. Click the address book or file type you want to import, and then click Open.

If your address book is not listed, you can export it to either a text (.csv) file or an LDAP Directory Interchange Format (LDIF) file, and then import it using that file type.

To import messages from other e-mail programs

Using the Outlook Express Import Wizard, you can easily import e-mail messages from a variety of popular Internet e-mail programs such as Netscape Communicator and Eudora, as well as from Microsoft Exchange and Microsoft Outlook.

  1. On the File menu, point to Import, and then click Messages.
  2. Select the e-mail program you want to import messages from, and then click Next.
  3. Verify the location of your messages, and then click Next.
  4. Choose All folders to import all the messages, and then click Next. You can also choose Selected Folders to import messages from one or more folders.
  5. Click Finish.
To import e-mail account settings
  1. On the File menu, point to Import, and then click Mail Account Settings.
  2. Select the e-mail client you want to import and click Next.
  3. The settings for the e-mail account will appear. To accept these settings, select Accept Settings, and then click Next. Go to step 5.
  4. To change any of the settings, select Change Settings, and then click Next. Use the Internet Connection Wizard to step through the settings for the e-mail account. Make any changes you want and click Next.
  5. On the Completion page, click Finish.
  6. To see the account information, on the Tools menu, click Accounts.
To import newsgroup account settings
  1. On the File menu, point to Import, and then click News Account Settings.
  2. Select the newsgroup account you want to import and click Next.
  3. The settings for the newsgroup account will appear. To accept these settings, select Accept Settings, and then click Next. Go to step 5.
  4. To change any of the settings, select Change Settings, and then click Next. Use the Internet Connection Wizard to step through the settings for the newsgroup account. Make any changes you want and click Next.
  5. On the Completion page, click Finish.
  6. To see the account information, on the Tools menu, click Accounts.
Exporting items from Outlook Express

You can export items from Outlook Express to use in other programs. These items include:

  • Address Book: You can export the Address Book from Outlook Express so that it can be used in other Microsoft e-mail programs, such as Outlook.
  • Messages: You can export messages from one or more of your folders

To export an address book

  1. On the File menu, point to Export, and then click Address Book.
  2. Choose a format for the export. To export your address book directly from Outlook Express, choose Microsoft Exchange Personal Address Book. To use a file with address information separated by commas, select Text File.
  3. Click Export.
  4. Choose a profile that most closely fits the intended use for the exported address book, and then click OK.

To export messages to Microsoft Outlook or Microsoft Exchange

  1. On the File menu, point to Export, and then click Messages.
  2. In the Choose Profile dialog box, choose the profile name that best matches the Microsoft program to which you are exporting.
  3. To export all the messages, click All Folders.
  4. To export messages in one or more folders, click Selected Folders. Then select the folders you want to export.
You can find this and similar type of help topics on Microsoft Outlook Express and many other email client programs. For more work out can be carried on related links below.
Related Links:

Thursday, March 27, 2008

Reinvesting in Security? THINK ONCE AGAIN!

This blog posts involves on how to opt a perfect (if not most apt) antivirus security/software for your system (generally a PC)? Based on freewares, trialwares and paid versions of some well known security softwares available on the market today, presented below are glimpses of facts associated with them. Its obvious not all anti-spyware tools, anti-spam tools have been covered here. Freeware are the precedence.

Never use real viruses for testing the operation of an anti-virus product!

Anti-Virus Programs

·         Avast! Home Edition*** is one of the most widely used free antivirus software out there. The only way to test antivirus software is to treat viruses- so it must be manually done by removing if any from one's system.

Avast also has VRDB means Virus Recovery DataBase. VRDB helps when, despite all the security measures, a virus gets inside the computer and files get infected. It is possible to repair infected files, return them exactly to their original state.

 Avast is very light on system a resource which is the most for almost every user. For support visit: and a good forum at Free avast! Home Edition can be downloaded from

·         AVG Free Edition is another popular free antivirus. Rapid virus database updates are available for the lifetime of the product from the website AVG will not slow down the system or use minimal system resources. The interface and use is very easy going.

·         AntiVir from the word antivirus, another free antivirus is very light in system's resources. In AntiVir, you have the option of scanning all files, or using a file extension list. Private and individual use of AntiVir Personal Edition is completely free of charge. Get it from

·         Symantec's Norton Antivirus and many other security softwares are not a point to be reviewed. Simply, because the cost is relatively high and the processor need to be of high speed, some of the newbie tech guys having NAV Clients on their system later get rid of, having been tired of slow response of the system. Opt if you have gigs of RAM and bucks! Visit Now!

·         Kaspersky Antivirus  provides complex computer protection against viruses, spywares and other malicious programs. Many previous blog posts about security in this blog explain how Kaspersky Antivirus is using the latest in tech today. Proactive defense, Multitask Protection Management, iChecker, and many other. A 30 day or 60 day trial is downloadable from and another site worth visiting would be If you have bucks (not too costly) and the system is not that too old, consider purchasing a key.

·          NOD 32 Antivirus System is one of the oldest of its type. And also with many users, probably many adding everyday. You can download and buy NOD 32 from the net. Associated with ESET, spol. s r.o., this threatSense® engine is a sophisticated, well-balanced system, visit  for details.

Test "virus" EICAR and its modifications

This test "virus" was specially designed by EICAR (The European Institute for Computer Antivirus Research) for testing anti-virus products. The test "virus" IS NOT A VIRUS because it does not contain code that can harm your computer. However, most anti-virus products manufacturers identify this file as a virus. Never use real viruses for testing the operation of an anti-virus product!

You can download this test "virus" from the official website of the EICAR organization at: The file that you downloaded from the EICAR website contains the body of a standard test virus.


·         Sygate Personla Firewall- SPF-

·         ZoneAlarm -

·         Kerio Personal Firewall- KPF –


·         Ad-Aware SE –

·         Spybot – Search & Destroy- SS&D –

Anti-Spam Software

·         POPFile –

·         K9-

Folder and Drive Protection Software

This can be another nightmare to find a program that disables mobile drives or your private email folders. Test some of few free on the net and some might never have been considered of. Please, search the geeklog for more on this topic.

·         The Microsoft TweakUI Powertoy -   

·         CleverCrypt Lite -

·         WinGuard Pro -

Related Links:

The information presented herein the blog is directly from the end user experiences of the various programs (either trial or full versions). Please, visit the product's official website before making purchase. Read more from the following links:

·         Previous posts about Security Softwares from this blog

·         Google's responses on Antivirus Softwares

·         Free Antivirus Softwares available on the net

·         Download ready made registry hacks

·         Viruses are a big no-no today, and many a posts at geeklog are here.

·         The easiest way to remove viruses/malwares without installing any antivirus software

Intruder Alert and Autorun viruses on pen drives are strictly prohibited!

Monday, March 24, 2008

The Y2K Problem : A humor from the history

Dear Boss,

I hope I haven't misunderstood your instructions. Because to be honest, boss, none of this Y to K dates problem makes any sense to me.

At any rate I have finished converting all the months on all the company calendars so that the year 2000 is ready to go with the following improved months: Januark, Februark, Mak, Julk.

In addition, I have changed the days of the week, and they are now: Sundak, Mondak, Tuesdak, Wednesdak, Thursdak, Fridak and Saturdak.

Is it enough, or should I change any other Y to K? I am a fan of the New York Yankees. Should I call them New Kork Kankees in order to be Y2K ready?

Thursday, March 20, 2008

Reinstall Windows XP without re-activating

When you activate Windows XP, Microsoft stores the data in the Windows Product Activation database files wpa.dbl and Wpa.bak in the folder %systemroot%\system32. If you change the motherboard or make significant hardware changes, XP will require you to reactive. But if you plan to reinstall XP on the same hardware, you can back up the activation status and then restore it after you reinstall and avoid the activation process.
You can backup the Windows Product Activation database files to diskette, these are really very small files. Follow the following steps after you reinstall XP, to restore the Windows Product Activation database files:
  • Start XP to Minimal Safe mode
  • Change directory to the \%systemroot%\system32 folder
  • Rename the newly created wpa.dbl to wpa.nonactivated and wpa.bak, if it exists, to wpabak.nonactivated.
  • Copy your backed up wpa.dbl and wpb.bak files to the system32 folder
  • Reboot
This should work if you want to avoid activating XP after a reinstall or restore on the same or very similar hardware. It will not work if the hardware is significantly different from that in place when the Windows Product Activation database files were created. This is not a hack to avoid activating installations.

Saturday, March 15, 2008

Getting rid of Kinza virus : How do I remove kinza.exe virus from a flash drive/laptop?

Before being paid deeply into the healing of kinza virus, let's take into consideration verity about the same.

What is a kinza virus and what the kinza virus does?

1.    The kinza.exe virus makes the computer too slow; you gain this info in spite of the memory size you pertain with your machine.

2.    Vital system resources are constrained to response, this include but not limited to- Windows Task Manager (taskmgr.exe), Registry Editor (regedit.exe), System/Windows Command (cmd or command), System Configuration Utility (Msconfig.exe), Group Policies. However, some of the Windows tools might run or open for a few seconds too hard for us to determine if they really run.

3.    The uppermost annoyance from kinza.exe is that it extract itself and creates a lot of executable files (*.exe), Dynamic Library Linker Files (*.dll), boot.vbs files, local file/user configurations and others.

4.    Another most important thing (I Think) is FolderOptions which is disabled from Windows Explorer resulting the invisibility of hidden files and folders. This is not a big deal as you can always download small windows configuring system tools from the links provided at the sidebar of this blog.

5.    Computer Solution state that kinza don't run in COMMAND.COM, it only run and only works on windows XP or latest Version.

How does the kinza virus transmit?

Needless to say that most of today's viruses, worms and malwares transmit via the worldwide web ie the internet. Kinza virus is not the EXCEPTION. The trio-mode for most such problems are:

·         The internet (Have you ever tried to search an illegal key or keygen to convert the trial version of an MP3 to ogg converter?)

·         The Pen Drive of your friend from which you copied data might have been infected by Kinza.exe. This is in fact more prone that the www since this mode of infection requires seamless integration plug and play, ha haa! Finally, any means of data storage media as CD which is the Kinza.exe infected.

·         It seems that you don't have updated your antivirus software for a couple of months, please do so right NOW.

How to remove KINZA.EXE virus?

There is a Kinza.exe Virus Removal Tool, download the file and do the following.

             I.        Download the Kinza.exe Virus Removal Tool.

            II.        Turn off the System Restore point. Keep in mind that before delving into any system tools or settings, always back up the registry and your user settings- no matter how long it might take.

           III.        Restart the computer the computer in Safe Mode.

           IV.        Double click kinza.bat from the extracted file.

            V.        Delete temp file and internet temp file.

           VI.        Restart the computer. And voila, there stand your computer free from kinza.exe.

References and Related Links:

·         Computer Solution by Gyanendra Maharjan -

·         Sudeep's blog -

·         Download the Kinza.exe Virus Removal Tool – from Sudeep's Blog (Right click > save link as or download with…)

·         Search for more virus related articles and registry in this i-geek blog

·         Registry tweaks and customizing Windows XP thru Registry Hacks

Tuesday, March 11, 2008

Humor with a COBOL programmer

Jack was a COBOL programmer in the mid to late 1990s. After years of being taken for granted and treated as a technological dinosaur by all the Client/Server programmers and website developers, he was finally getting some respect. He'd become a private consultant specializing in Year 2000 conversions.

Several years of this relentless, mind-numbing work had taken its toll on Jack. He began having anxiety dreams about the Year 2000. All he could think about was how he could avoid the year 2000 and all that came with it.

Jack decided to contact a company that specialized in cryogenics. He made a deal to have himself frozen until March 15th, 2000. The next thing he would know is he'd wake up in the year 2000; after the New Year celebrations and computer debacles; after the leap day. Nothing else to worry about except getting on with his life.

He was put into his cryogenic receptacle, the technicians set the revive date, he was given injections to slow his heartbeat to a bare minimum and that was that.

The next thing that Jack saw was an enormous and very modern room filled with excited people. They were all shouting "I can't believe it!" and "It's a miracle!" and "He's alive!". There were cameras (unlike any he'd ever seen) and equipment that looked like it came out of a science fiction movie.

Someone who was obviously a spokesperson for the group stepped forward. Jack couldn't contain his enthusiasm. "Is it over?" he asked. "Is the year 2000 already here? Are all the millennial parties and promotions, and crises all over and done with?"

The spokesman explained that there had been a problem with the programming of the timer on Jack's cryogenic receptacle, it hadn't been year 2000 compliant. It was actually eight thousand years later, not the year 2000. Technology had advanced to such a degree that everyone had virtual reality interfaces which allowed them to contact anyone else on the planet.

"That sounds terrific," said Jack. "But I'm curious. Why is everybody so interested in me?"

"Well," said the spokesman. "The year 10000 is just around the corner and it says in your files that you know COBOL".

Monday, March 10, 2008

Proactive Defense verdicts : Knowing the detail of the virus penetration and getting rid of them : Concerning Viruses IV

This section covers Proactive Defense verdicts. Note that not all verdicts should necessarily be taken as a threat. Some of these operations are normal behavior for programs being run on the computer or reactions of the operating system to the operation of those programs. However, in some cases the same operations can be called up by hacker activity or malicious programs.

Verdicts with a high danger level are highlighted in red throughout the text. Verdicts that are not always indicative of threats are in black.

Stack overflow

Stack overflow is one of the most common techniques today for gaining unauthorized access to a system.

The concept works as follows. A program usually needs a stack structure in the RAM where it can store and retrieve intermediate values. When the program calls up a procedure or subprogram, it sends the return address to the stack, and the procedure then knows where to return control once it is complete. A stack overflow is when a block of data larger than the stack is sent to the stack. The excess data are recorded in the part of the stack designated for correctly returning from the procedure. Thus, the overflow alters the normal process of executing the program, and instead of correctly returning to executing it further, it is transferred to the address that was rewritten in the command because of the stack overflow.

To cause a stack overflow, hackers use exploits, programs containing machine instructions executed by the processor. The address that the processor goes to because of the stack overflow will be specified in these instructions.

The likelihood of a stack overflow when using standard programs in normal mode is extremely low. When a stack overflow is detected, it is very likely that it means that this vulnerability is being taken advantage of for malicious ends.

Data execution

This technique uses errors in software installed on your computer. The errors used are errors that replace correct data with data provided by a malicious object, which cause these data to be processed incorrectly.

The most common object of attacks using data execution are browsers, many of which do not perform the necessary scans while view web pages, images, and multimedia, and malicious code implanted in objects on web pages can gain control.

Microsoft uses DEP (Data Execution Prevention) to protect executable code in Microsoft Windows. This solution is included in updates for Microsoft Windows XP and Microsoft Windows Server 2003.

Hidden Install

Hidden Install is the process of installing a malicious program or running executable files without notifying the user of such. A hidden install process can be detected using standard tools, such as Microsoft Windows Task Manager, but since there are no standard installation windows on screen when the malicious program is installed, it is unlikely that a user would think to track the processes running in the system.

Hidden Object

Hidden Object is a process that standard tools (Microsoft Windows Task Manager, Process Explorer, etc.) cannot detect. A rootkit, in other words, a toolkit for gaining root user rights, is a program or set of programs for hidden control of a hacked system. This term came from UNIX.

Within Microsoft Windows, "rootkit" generally refers to a program used to mask software that is installed on the system and intercepts and distorts system messages about the processes running in the system and the folders on drives. In other words, a rootkit works like a proxy server, letting some information through and blocking or distorting other information. In addition, rootkits can generally mask the presence in the system of any processes, folders and files on disk, and registry keys described in its configuration. Many masking programs install their drivers and services in the system, which are naturally invisible to system administration tools like Task Manager or Process Explorer, as well as to anti-virus programs.

Root Shell

This vulnerability consists of rerouting input/output of the command prompt (usually to the network), which generally is used to gain remote access to a computer.

The malicious object attempts to gain access to the command line on the victim computer from which future commands will be executed. Access is usually gained through a remote attack and running a scripted that takes advantage of this vulnerability. The script launches a command line interpreter on the computer connected via TCP. The hacker can then control the system remotely.

Starting Internet Browser

Browsers can be started hidden and data can be sent to it for hackers to exploit later. Monitoring browsers being opened enables you to intercept this.

Browsers are usually opened with settings containing, for example, user passwords, whenever he/she clicks a link in the body of an e-mail in a mail client or an instant messaging program, which is not a suspicious action. If you add a mail client and ICQ to the trusted zone, meaning if you allow only certain programs to open browser windows with settings, all other cases when data is transmitted through a browser from a hacker and not the computer user will may be assessed as suspicious.

Strange Behaviour

This refers to detection not of dangerous or suspicious behaviour of a specific process but of a change in state of the operating system itself, such as direct memory access or modification of an R0-R3 access point.

Dangerous behavior detected (generic behavior)

This group of malicious action detectors includes Trojan.generic, Worm.generic, and Worm.P2P.generic, fairly complex algorithms for detecting dangerous behavior. A verdict is issued that a certain process is most likely an unknown malicious process based on analysis of a set of actions, not on one or two factors. The Generic verdict is not assigned the first time a suspicious action is attempted. Each time a suspicious action is made, the suspicion rating of the process rises. Proactive Defense processes it as soon as it reaches a critical level. This method ensures an extremely low level of false positives. The likelihood of a good program displaying several aspects of malicious activity immediately is extremely low.

Actions that affect the suspicion rating:

  • actions typical of infections or malicious objects injecting into the system;
  • directly malicious actions;
  • actions typical of replicating malicious objects.

Application Changed

This event signifies that the executable file of the monitored application has been modified since it was last run. It should be pointed out that an executable file could have been modified by malicious code injecting itself into the application or by a standard program update, such as the executable file for Microsoft Internet Explorer being modified by Microsoft Windows updates.

Integrity Violation

An integrity violation is when one or several modules of a monitored application could have been modified since the time the application was last run. It could have been modified by program updates and not only by malicious code injecting itself into the application (for example, the libraries used by Microsoft Internet Explorer could be modified by a Microsoft Windows update).

Critical Application

The Application Integrity Control module has an additional feature for monitoring application start. In this mode, Kaspersky Anti-Virus issues a warning whenever an application specified by the user is started. The warning only appears if the rule Run: Prompt for action is configured for the monitored application. This mode is disabled by default.

Running as child

There are a number of malicious programs that use well known programs to create data leaks or to download malicious code from the Internet. To do so, the malicious program opens a standard program that the firewall rules and other defense tools grant access to the Internet (a web browser, for example). When this happens, the monitored application is run as a child process.

The warning only appears if the rule Run child process: Prompt for action is configured for the monitored application . Since some programs are run by others child processes, the event is common enough that by default warnings are not displayed for these events, although the events are logged in Proactive Defense operation reports.

Hosts file modification

The hosts file is one of the most important system files of Microsoft Windows. It is designed to redirect access to websites by transforming URL addresses into IP address on the DNS servers, but right on the local computer. The hosts file is a plain text file, with each line defining the correlation between the character name of a server (URL) and its IP address.

Malicious programs often use this file to redefine anti-virus update server addresses to block any chance of updating and preventing the malicious program from being detected, and for other ends as well.

Invader / Loader

There are countless varieties of malicious programs that are masked as executable files, libraries, or plug-ins for well-known programs and load themselves into standard processes. A data leak from the user's computer can be orchestrated in this way. Network traffic initiated by malicious code will pass through the firewall freely, since the firewall thinks that this traffic belongs to an application that is allowed to access the Internet.

Trojans commonly invade other processes. However, a number of benign programs, updates, and installer programs also exhibit this behavior. You should only allow this type of activity if you are certain that the program being load is harmless.


Keyloggers are programs that record every key you press on your keyboard. This type of malware can send information harvested from the keyboard (logins, passwords, and credit card numbers) to a hacker. However, standard programs can also log keys. Keylogging is often used to call up program functions from different applications using hotkeys.

Registry access

Registry access tracks modifications to registry keys.

Malicious programs modify the registry to register themselves so they start automatically when you start your operating system, to change your homepage in Microsoft Internet Explorer, and other destructive actions. However, remember that standard applications might also access the system registry.

The module contains a predefine list of six groups of critical keys. Users may also add their only groups of keys and configure rules for various programs to access them.

Registry strange

The module enables you to intercept attempts to create hidden keys in the registry that are not displayed by standard programs, such as regedit. Keys are created with incorrect names so that the registry editor cannot display these values correctly, which makes it more difficult to diagnose malicious software in the system.

Trojan downloader

Trojan Downloader is a program with the chief function of hiding unauthorized downloads of software from the Internet. Hacker sites are the best known source of Trojan Downloaders. A Trojan downloader is not a direct threat on its own. They are dangerous namely because they download and start software uncontrolled. Trojan Downloaders are mostly used for downloading and running viruses, Trojans, and spyware.

Related Links:

The information presented herein is adapted from Help and Support Section of the Kaspersky Anti-Virus 7.0, details of the notes can be pertained from related links as following:

Sunday, March 09, 2008

Preventing Infection : How to prevent infection of Virus? : Concerning Viruses III

The most reliable and thought-out measures cannot provide you with 100% protection from computer viruses and Trojans, but, with this set of rules in mind, you will significantly lower the likelihood of virus attacks and the level of potential damage.  One of the basic methods of battling viruses is, as in medicine, well-timed prevention. Computer prophylactics involve a rather small number of rules that, if complied with, can significantly lower the likelihood of being infected with a virus and losing data. Below is a listing of basic safety rules which, if followed, will help mitigate the risk of virus attacks.

Rule No. 1: Use antivirus software and Internet security programs. To do so:

  • Install Anti-Virus program as soon as possible.

  • Regularly update the application databases. Updates may be performed several times a day in the event of virus epidemics. Under such circumstances application databases on antivirus software update servers update immediately.

  • Select the security settings recommended by the antivirus company for your computer. You will be protected constantly from the moment the computer is turned on and it will be harder for viruses to get onto your computer.

  • Configure the settings for complete scan recommended by the experts of your antivirus company and schedule scans for at least once per week.

Rule No. 2: Use caution when copying new data to your computer:
  • Scan all removable storage drives for viruses (floppies, CD/DVDs, flash drives, etc.) before using them.

  • Treat e-mails with caution. Do not open any files that have come through e-mail if you are not certain that they were really supposed to be sent to you, even if they were sent by people you know.

  • Be careful with information obtained through the Internet. If any web site suggests that you install a new program, be certain that it has a security certificate.

  • If you are copying an executable file from the Internet or local network, be sure to scan it with Anti-Virus.

  • Use discretion when selecting which web sites you visit. Many sites are infected with dangerous script viruses or Internet worms.

Rule No. 3: Pay close attention to information from Antivirus company websites.

In most cases, the Antivirus company announces a new outbreak long before it reaches its peak. The corresponding likelihood of infection is still low, and you will be able to protect yourself from new infection by downloading updated application databases.

Rule No. 4: Do not trust virus hoaxes, such as prank programs and e-mails about infection threats.
Rule No. 5: Use the Microsoft Windows Update tool and regularly install Microsoft Windows operating system updates.
Rule No. 6: Buy legit copies of software from official distributors.
Rule No. 7: Limit the number of people who are allowed to use your computer.
Rule No. 8: Lower the risk of unpleasant consequences of a potential infection:
  • Back up data regularly. If you lose your data, the system can fairly quickly be restored if you have backup copies. Store distribution floppies, CDs, flash drives, and other storage media with software and valuable information in a safe place.

  • Create a Rescue Disk that you can boot with, using a clean operating system.

Rule No. 9: Review the list of software installed on your computer on a regular basis. This can be accomplished using the Install/Remove Programs service under Control Panel or simply by viewing the contents of the Program Files folder and the startup folder. To do so, open Install/Remove Programs in the Control Panel or view the contents of the Program Files directory or the startup folder. You can discover software here that was installed on your computer without your knowledge, for example, while you were using the Internet or installing a program. Some of them are almost always potentially dangerous programs.

Related Links:

The information presented herein is adapted from Help and Support Section of the Kaspersky Anti-Virus 7.0, details of the notes can be pertained from related links as following:

Saturday, March 08, 2008

Apple Unveils iPhone SDK : Apple also introduced a new development tool called iPhone Simulator

Apple unveiled the iPhone SDK (software development kit) at a special event at the company's headquarters in California. Apple executives said the SDK provides developers with the same tools it uses to develop applications for the iPhone.Applications for the iPhone will be built on a Mac using Xcode, the same development tool used to build Mac OS X applications. Using the tool, developers can memory usage and other ways that applications can affect the iPhone hardware.
Apple also introduced a new development tool called iPhone Simulator. This tool runs on a Mac, and simulates the entire API stack of the iPhone OS. Apple said that you can run your iPhone application in the simulator, which gives developers an incredible turnaround time on development.
Scott Forstall, Apple's vice president of iPhone Software, explained that Apple had to build a version of its development framework, Cocoa. Dubbed Cocoa Touch, the new development tools are based on the touch interaction with the iPhone instead of the keyboard and mouse interaction users have with a desktop computer.
Forstall said the SDK is made up of several Core technologies. Much of what you find in the iPhone operating system is the same as what you would find in the Mac, except power management, which is even more robust on the iPhone, according to Apple. Core Services, Core Location and Core Audio will also be available to developers.
"So we have a fantastic set of tools, in addition to the amazing set of frameworks that make up the iPhone OS," said Forstall.
Apple also took some time to show off some of the newest Web apps that run in Safari. Forstall highlighted sites like Facebook and Bank of America during his talk.

By Jim Dalrymple as on

Subscribe to geeklog feed Bookmark and Share

Design by Free blogger template