Hi am back again


Hi am back again

Win a full blown license of WinX DVD Ripper

Go here The winners of all of the individual prizes will be selected by a random draw on February 6, there will be 9 people in total.

http://www.vladan.fr/ says

I received a 9 licenses of  WinX DVD Ripper Platinum to give away. It’s a software for backing up and converting your DVD’s to another format.

So there will be NINE lucky winners of the contest. Each of them will win a license for WinX DVD Ripper Platinum.(it’s quite good chance for you to get a free copy !!).


twitter status


Free Licenses for Zemana AntiLogger – 3 Days Only

Stop hackers now with AntiLogger.Block all known and unknown internet threats.bank,shop and browse the internet safely and privately. This offer is from Bill Mullins’ Weblog – Tech Thoughts , and here just writing for ours readers to go there and collect Free Licenses for Zemana AntiLogger.


3 Days Only, starting from 28th of January 2010 to 31st of January 2010  .


It's a 1 year free giveaway.Information about this giveaway and direct link to get the license key.The direct link displays a distinct and unique license key each time and as fast as it is opened or refreshed.after registration this message will be shown.

Thank you for registering of AntiLoggerYour License Activation Key and detailed license information are listed below. We recommend that you to save your license key information in a secured space for future use.

Please don't hesitate to contact us for technical support or any questions you may have about our products.

Please go here as mark of respect to this blog which has arranged this great anti key logger free for one year.

To activate AntiLogger, follow these instructions:For assistance with the product(s), please visit here. take a look at these Testimonials & Reviews.

Bill Mullins’ Weblog – Tech Thoughts adds

I was immediately impressed by this application, if maintaining your privacy is a concern, you might consider adding this application to your security toolbox.


Raymond's positive review is here

Believe it or not, it is able to detect ALL keylogging, webcam capture and screenshot capture methods from different trojans.


I found the program completely delivered on its promises. At a time when malware is increasingly targeting financial transactions, I find this program a real must have. There is no marketing here.


This is a fantastic addition that makes the potentially dangerous world of downloads slightly less risky.


Zemana AntiLogger protects your online communication and prevents malware from tampering with your transactions.


If you look for effective protection against all kinds of data loggers, Zemana AntiLogger is the application you need.


Luckily I was part of the beta testing programme of Zemana AntiLogger and tested for almost 9 to 10 months and surprisingly it is as good software as it is known to be and in fact it is lesser known and it installs in a zippy vey simple non complicated installations some times it will ask you to restart yours system and do it , it works very light while on system tray but if you open its GUI then it  is bit heavier but not to yours uncomfortable positions and in fact it is very light while on system tray. Its graphic interface is simple and crystal clear , it has some additional functionality like start up addition of programmes detection which is handy, AntiLogger does not work on Windows 95, 98 or ME, or on Mac operating systems. There are no plans to support these environments.Zemana AntiLogger License Activation Procedures:Double-click on the AntiLogger tray icon on the Windows taskbar and open the AntiLogger interface.Click on the “Services” tab in the AntiLogger interface.

Click on the “License” tab in the opened menu.Write down the license key on the “Enter License” box and click the “Renew License” button.Your license key will be activated as shown in the picture.The licensing procedure is now complete. During my beta testing of this anti logger ,have found that it should be installed at the fresh installation of Windows otherwise it may leave already installed antiloggers ,and this author hopes that this lacunae or the void must be patched in these versions. One great thing I have found it is a continually developed model and being developed continuously and its updates frequently in fact some time twice a week and its update size hardly above 5 to 6 mb.It is an great asset and one more additional layer of protection you can have  to protect yours system from any untoward activities.As the highly regarded SnoopFree Privacy Shield, a free application, which unfortunately, is compatible with Windows XP only.So , Zemana AntiLogger extends  to yours other updated OS , it is now a great asset and follow the instructions as written above to get it free in fact you can download more than one license if you have multiple computers .So download from here and activate.

Zemana antilogger1



Online Armor ++ FREE on Friday January 29th

This Friday Tall Emu is giving everyone a chance to own a copy of Online Armor ++ for free (normally costs $60).Just go to  giveawayoftheday ,on Friday and download, install, and activate it before the 24 hour period is over.Online Armor offers both free and paid versions of their  firewall . Even Online Armor Free impressed me with its leak-test and HIPS performance. OA ++ and OA premium has a great key logger detection technology which surprise me even specially created or new keyloggers are detected and prevented. Online Armor++ comes with all of the power of Online Armor, but additionally includes the award-winning Emsisoft/Ikarus Dual Antivirus and Antimalware engine!  Don't miss your chance on Friday, January 29th as it is a superlative offer from Tall Emu with giveawayoftheday.To know about Online Armor ++ just drop to this Tall Emu site .Online Armor is not available for windows Vista 64 bit or Windows 7 64 bit.

Online Armour1.

Sources & Citations:

Gizmo , TechPP




Visual Noise Phenomena In Photography

Visual noise in photography heavily dependant upon ISO section. Noise may appear in digital images. It is one type of graininess, leading to lousy picture. Thus, manipulating , the exact pre-conceived ideas of the image. Noise depends upon the camera hardware sensor, it also depends upon camera pixels , lighting environment. So, in one sentence it may conclude that visual noise which is actually unwanted, depends upon many factor like camera algorithm, sensors also on lighting environment.

High ISO setting drive the processor to strengthen the weak signal and thus more grainier and more noisier and vice-versa. At more higher ISO setting photograph, you may take really small print outs to have good low noise printouts. So, in order to get less noise in photograph you may have to use low ISO setting, if you are exceptionally talented professional photographer, then you may depend on your ability to alter the default trend.

See the screenshot bellow and spot the difference : (1)- original photo with noise, (2)- original photo with medium noise, (3)- original photo with no noise.

original photo with noise original photo with medium noise original photo with no noise







Take care.


Accumulations of written articles on Microsoft Security Essentials






microsoft-security-essentials screenshots




Follow me on Twitter

page rank verification

Hi am back again

BioTech Tips

  1. NASA is looking into experimenting bionanotech that will convert plant and human waste into fuel for long distance space programmes. BioTech Tips

  2. Biotechfirms all over the world making efforts is to find a cheep, bio-degradable substitute for plastic.

  3. Enzymes creat the "stone washed" look in jeans, originally done by pumic stones.

  4. Ethanol can be used as substitute for petrol - a composition 85 percent ethanol and 15 percent of petrol, with minuscle engine modification.

  5. Bioremediation: Any area that has been polluted beyond human/animal inhabitability, bioremediation is the process of reclaiming these area and making habitability for human/animal again.

  6. biofuels: Oil derived from the Jatopha plant's seed, by smashinfg its seed, then mixing with alchol to make biodisel - a substitute to disel.

  7. Fungi creat the laccase enzyme that can remove lignin from the  wood, as it is a necessity for converting wood to paper.

  8. Petrolium is used to creat normel plastics.

  9. Bioplastics, use strach as the raw material.

  10. Strach cen be found from plants such as potato, corn,etc.

  11. Polylactic acid (PLA) is a bioplastic material.

  12. Enzymes are chemicals that are naturally generated by living beings to breakdown food.

  13. Potatoes contain vaccines against hepatitis virus .

  14. Rice rich in vitamins, iron omega 3 fattyacids



    Ubuntu 9.10

    Ubuntu 1 

    An African word meaning “ Humanity to others ,” or “ I am what I am because of who we all are “ is the meaning of Ubuntu. So, it gives  some soothing effects, spirits of unity to the software world . Ubuntu is a community driven and drove project. It was launched in October 2004. It will It will always be free to download , use and distribute, along with its regular enterprise releases and security updates.Ubuntu installations come on one CD , it is a live CD , can be used from the CD or from a pen drive. Additional software is available online.

    Ubuntu 9.10 includes the latest Open Office 3.1, Firefox 3.5,GIMP better support for 3G connectivity, simplified backup solutions, synchronisations, sharing of files with Tomboy Notes, media applications, instant messaging and more. It has faster boot time and a faster file system with Ext4.Due to concern for security, Organisations love to hate cloud computing. Ubuntu Server support private clouds, with this feature, organisations can keep the data in their own data server. Thus;driving out the fear for data theft and security concerns for organisations, with cloud computing.


    After am satisfied with the Live CD experience of Ubuntu 9.10, decide to install it on my test PC. Generally I do not like to install dual OS in a single PC. After the installation the first priority of the user to have a right resolution. But , sadly or may be an isolate case ,Ubuntu 9.10 failed to detect maximum resolution. As graphic property not available in Ubuntu. So, there are two option now, command line action or download relevant graphic driver , preferably opted for the second. Ubuntu (9.10) also introduces the cloud computing service is the name of Ubuntu One. Go to Applications , internet menu, open Ubuntu one,  then sign up , you need to connect internet to access this service. In the preference window of Ubuntu one, you can manage this service like  customisation , etc. But the writer feels the synchronisation process is not as smooth as expected , slightly  on a disappointed side. But on the contrary , mobile broadband feature of Ubuntu is being a revelation as per the writer feels and experiences. Just plugging the GPRS enabled mobile phone into Ubuntu 9.10, where smooth configuration of GPRS setting can be done. The author is in mixed bag feeling with Ubuntu 9.10, let the reader suggests and comment on it.


    How to Protect Your Identity


    No one can debate the fact that most of us  spend half our lives in front of a computer screen. In the digital world, we, socialise, interact, communicate or do business transactions. There is a magnanimous loss of productivity, that occurs, as the consequence of unplanned time management, and mainly due to complicated internet security phenomena. Whether you are avid internet user, a student, blogger (professional/amateur) , tech enthusiast , the productive time you spent on internet is of yours vital significance, So, security in yours digital life is of very prime importance, if it is well managed then it will surely give you fruitful time in yours productivity meter.

    1. You Decide What Information to Reveal About Yourself: Be careful! Your full name, place of employment, phone number, and address could all be valuable information to an Identity Thief!
    2. Examine Privacy and Seals:If you are on a site that asks for your credit card or bank information, make sure a privacy policy is posted in the form of a padlock seal symbol or an unbroken key.
    3. Defend Your Computer Against Internet Attacks:Have an effective Firewall (which acts as a shield against anyone trying to gain access to your personal files) and Antivirus software (which prevents viruses from getting into your PC and wrecking havoc on your files and documents).
    4. Be Conscious of Web Addresses:Check the URL (web address) when entering personal information. A more secure site that uses encryption will begin with https:// instead of http://.
    5. Check Out Your Credit Report:You'll instantly be able to see if someone is trying to use your ID. Your credit report lists all applications for credit and credit commitments, so any activity that wasn't initiated by you will show up.
    6. Think twice before providing too much information about yourself on social networks.
    7. Protect your PC with Firewall, Anti Spyware, and a secure WiFi connection.
    8. Keep adware off your PC by being careful about what you download.
    9. learn proper workplace ergonomics.Use liquid crystal display monitor.


    Sources & Citations: Comodo Newsletter



    Microsoft Office Professional Plus 2010 (Beta): Screenshots-2


    Untitled91 Untitled81


    Rising PC Doctor, professional and smart security tool to computer users.

    Rising PC Doctor:With its seven key functions of automatic malware analysis, immunization of USB storage devices, ability  to  repair Microsoft Internet Explorer & Windows, Trojan Behavior Detector & Blocker, protection against malicious websites, Internet Explorer protection and Trojan Download blocker, Rising PC Doctor will greatly enhance your protection against malware and cyber threats.With its key functions monitor the health of your computer .

    Rising PC Doctor1 Rising PC Doctor 2

    Installation:Click Here to download the latest installation package of Rising PC Doctor.Double click the installation package;read the Rising PC Doctor End User License Agreement. If you agree with the terms, click the checkbox next to "I agree" and click the "Next" button. If you do not agree, click Cancel and the program will exit.Choose the directory you want to install Rising PC Doctor to. Please do not choose or create a directory which has Chinese characters in the directory name.During the installation you will be asked for your email address.Ignore it or  if you are not much worried and concerned about yours privacy then you can put yours email address on it.After the installation completed, Rising PC Doctor will appear on the desktop and in the Start menu. The monitoring program will run automatically and appear in the system tray of your computer.

    System tray icon:If you right click the tray icon of Rising PC Doctor the menu will open up. It offers a quick and convenient way to enable/disable major functions of Rising PC Doctor.You can access these functions through tray icon.Start Rising PC Doctor,Auto Online Diagnosis,Immunize USB Media,Auto Repair OS,Trojan Interceptor,URL Alert,IE Protection,Trojan ,Download Blocker,Rising Website,Update Now,Hide.

    Uninstall:Click Start > Rising PC Doctor > Uninstall Rising PC Doctor.

    To uninstall via Windows control panel, please execute the following steps:
    1. Click Start >Settings > Control Panel
    2. Select Add/Remove programs;
    3. Select “Rising PC Doctor”, and click “Remove”.

    To remove the program completely from your computer, select “Delete installation directory” in the uninstall dialog box and reboot your computer.It will ask you to  fill out the uninstallation questionnaire ignore it .

    Automatic Protection:

    When you click on Automatic Protection > Local Protection you can configure the four AutoProtection modules. Click Enable/Disable to activate/deactivate the respective monitor.
    Auto Online Diagnosis
    Scan at startup for potential malware.
    When you click on “Advanced Settings”, you can configure the diagnosis frequency: Daily, weekly, monthly. You can decide whether to scan the memory, key OS parts or both.
    Immunize USB Media
    Malware often spreads via USB drives and MP3 players. “Immunize USB Media” prevents such malware from infecting your computer.
    Auto Repair OS
    Scan for vulnerabilities and unsafe settings in Windows and other 3rd party software.
    Trojan Interceptor
    Stops Trojans and other malware before they can load and harm your computer.

    Scan for Current Trojans:Trojans are often mass produced for a certain purpose such as stealing accounts of a certain online game and have a very short lifespan. Therefore, the protection against current Trojans is very important for your overall security.Click Common Functions > Scan for Trojans and Rising PC Doctor will check your computer for current Trojans. Select the target to scan and click “Start Scan.”Any findings will be displayed listing the name of the Trojan, the name of the infected file and the infection status. Select the Trojan you want to remove or click “Select all” and click “Kill now” to remove the infection. Click “View log history” to see the records of previous scans.

    One Click Action:

    With One click Action you can easily initiate the three most common maintenance tasks:
    • Auto remove current Trojans:
    Scans your computer system and automatically removes current Trojans.
    • Auto remove spyware
    Scans your computer system and automatically removes any spyware.
    • Auto repair system
    Scans your computer system and automatically repairs damaged items.

    Start Up Control:It is for advanced users .

    When you click Expert Tools > Start up Control your computer systems will be scanned and you can browse a wide variety of information: Logon,Windows Explorer Add-on,Internet Explorer Plug-in,Scheduled Tasks, Services, Drivers, BootExecute, Image Hijacks,Application Init DLLs, Known DLLs,Win Logon Notification,Winsock Provider,Print Monitor,LSA Provider, File Associations.

    Process Manager:The Process Manager is another function for advanced users. Click Expert Tools > Process Manager and you can view the processes active in your system.Click “Reload” to refresh the list. Click “Find module” to locate modules on your system.With “Find window” you can quickly collect details about windows opened by processes. Right click a list entry to get more information about the particular process. For known safe processes you can select “Trust it.”

    Test:Rising PC Doctor can detect the majority of Trojans and a even great number of other malware upon startup before they can execute their malicious function. This function will significantly increase your protection from cyber threats.personally when browsing internet it increases the browsing speed significantly , the only downside is that its update is heavy on system so during the update just stop all yours essential functions otherwise system will hang.AT boot, Rising PC Doctor can automatically scan for potentially unknown malware. When permitted by the user, possible malware is automatically transferred to Rising’s Automated Malware Analyzer (RsAMA) for detailed analysis. The user is informed about the result of the analysis and can quickly react to new threats for which conventional protection is not yet available. Analysis metadata collected by the community of Rising users (Rising Cloud Security) will be stored in the Rising Security Database (RsSD), providing up-to-date information about cyber security.With the easy to use interface, even inexperienced users can handle potential vulnerabilities in the operational system and a lot of other major software applications.Rising PC Doctor can fix the Internet Explorer on many computers whose homepage has been changed by malware, which are permanently displaying adware or which are plagued by many other problems. On such computers, Rising PC Doctor can help you to repair the system registry, system settings and the host file.It gives better control over drivers, programs loaded at boot, Active X controls and other important software influencing the operation of your computer.Disk Cleanup, System Startup Management, Service Management, Network Application Management, LSP Repair, File Shredder, and Special Virus Removal Tools which are designed to eliminate only a limited number of viruses.These tools are for experienced users but sometimes the GUI is confusing even the normal users may get entangled with it making serious damage to system.Rising PC Doctor can detect and completely remove many kinds of especially obnoxious spyware from your computer.But one minus side is that it seems am not sure from the first impression its spyware scan time is far too shorter in time and it makes one doubt that whether it is doing scan or not and its trozan scan is for longer period.On the “Top Software” tab you can find our software recommendations for instant messengers, download managers and other tools.These recommendations are far from satisfactory, so use it yours own wit and experience while use the recommended softwares from Rising PC Doctor.Advanced users can use the service manager to detect and terminate potential malicious services. When you click Expert Tools > Service Manager Rising PC Doctor will scan the services on your computer. This is a great tool to stop non wanted and obnoxious services from running and eating yours system memory, but use it with caution.The Process Manager is another function for advanced users. Click Expert Tools > Process Manager and you can view the processes active in your system.Personally I feel bit clumsy to start with.The Internet Protection modules of Rising PC Doctor is of great boon .


    Symantec Threat Monitor Sceensaver


    Hey, interesting one. I'm not a fan of screensavers , I just use whatever that's built-in . But for the screensaver fan it seems to be an awesome information.Read it on.

    This free screensaver keeps you up-to-date on the threat landscape using a feed  from Symantec’s DeepSight monitoring service. The ThreatCon rating in the screensaver also lets you know the current danger level of the Internet based on network incident and malicious code activity. The screensaver regularly updates itself when you are connected to the Internet.

    System Requirements

    Hardware Requirements:

    Intel Pentium II 450Mhz, AMD Athlon 600Mhz or faster processor (or equivalent)
    128MB of RAM or greater

    PowerPC G3 500Mhz or faster processor
    Intel Core Duo 1.33Ghz of faster processor
    128MB or RAM or greater

    Supported Operating Systems:
    Windows 98, Me, XP, Vista, Vista 64 and Windows 7
    Macintosh OSX 10.2 – 10.5
    (Note: An update of the screensaver for OSX 10.6 “Snow Leopard” will be available soon.)


    Nice one.Good idea but I don’t think Symantec are first to come up with this idea.This is not a live feed. There is an 8-12 hour delay in the threat information displayed in this screensaver.If you believe in security from every nook and corner then it is for you.


    Windows , Macintosh ,FAQ , Feedback

    Screenshot: (2)

    Symantec Threat Monitor, powered by DeepSight , Symantec Threat Monitor


    MalAware 1.0-free of charge!

    What is MalAware:

    The term MalAware combines "Malware" and "Awareness". MalAware lets you know about possible malware infections.This has been a new presentation from Emsi Software ,the makers of a-squared Anti-Malware,Mamutu,a-squared Anti-Dialer.MalAware –1 detects active Malware,scans in less than 1 minute,cloud and signature based,only 1 mb download and the best offer is free of charge!.It is extremely small and ultra fast malware scanner ,the smallest possible (1 mb) and the fastest possible malware scanner (scan <1 min) that will only provide an indication of whether a PC is infected with malware or not.

    Mallaware Mallaware 2

    System Requirements:

    MalAware runs on Windows XP, Vista, 7 as well as on 2003/2008 Servers in all 32 bit and 64 bit editions. MalAware does not require software installation and can be started immediately. MalAware was designed to run parallel with other antivirus and firewall software without troubles.But if you detect such then you can contact Emsi Software support team to rectify the adverse compatibility issues which you may have found.


    It is been developed through combining a strongly limited version of the signature database of known malware paths with a cloud based scan of all active processes, MalAware achieves a similar accuracy as a-squared Anti-Malware.It is only for detection and if anything the PC have detected then the second step is to download the big a-squared Anti-Malware package, to remove the malware and protect the PC against new infections.During scan are approx. 50 MB free RAM required. We suggest to use it on computers with at least 512 MB RAM, best would be 1 GB RAM. MalAware can not remove any infection and can not provide long term protection of your PC.As it is doing the full cloud based scan so you may conscious of the fact that anonymous information about your system status is transmitted to the Emsi Software web servers.As in cloud based computing environment this may be the only technical possible way.

    Download now!

    Download MalAware - free of charge!



    HOW TO: Search For Hidden Or System Files In Windows XP

    This article describes how to search for hidden or system files in Windows XP.By default, the Search companion does not search for hidden or system files. Because of this, you may be unable to find files, even though they exist on the drive.

    To search for hidden or system files in Windows XP:

    Click Start, click Search, click All files and folders, and then click More advanced options.
    Click to select the Search system folders and Search hidden files and folders check boxes.(Please look the screenshots below of this article,numbering 1,2,3,4 sequence wise.)


    You do not need to configure your computer to show hidden files in the Folder Options dialog box in Windows Explorer to find files with either the hidden or system attributes, but you need to configure your computer not to hide protected operating system files to find files with both the hidden and system attributes. Search Companion shares the Hide protected operating system files option (which hides files with both the system and hidden attributes) with the Folder Options dialog box Windows Explorer.

    This trick applies to  Microsoft Windows XP Home Edition Microsoft Windows XP Professional Edition.

    Credit :

    Article ID: 302347 ( http://support.microsoft.com/gethelp/default.aspx?content=kb;en-us;302347 ) from Microsoft Help and Support website.



    2 3 4


    Backup Your Online Accounts For Free :Backupify"Free Forever For A Limited Time"

    Backupify Your online accounts contain important information. Don’t risk losing any of it.Gmail, Twitter, Google Docs, Flickr,Wordpress, Del.icio.us, Photobucket, Blogger, Facebook, Basecamp,FriendFeed lots of options after the Wave 2 revolution but have ever consider backiYour lifestream contains important data, but all those pictures, videos, documents, and blog posts are exposed to potential loss. Some web 2.0 services shut down without warning. Others are hacked. Sometimes data is lost from basic human error, or the intentional actions of a disgruntled employee.ng yours online account or think of it !Backupify is designed to backup your content that is already on the internet.

    Backupify will automatically log in to your Gmail, Twitter and back up any updated contents it finds and the great thing is that you do not have to log in and backing up yours account manually ,even you do not have to turn yours computer on , it will back up all yours important account This will protect you from loss if a service ever suddenly becomes unavailable, your account is compromised,  or data is unwittingly lost or corrupted.

    Backupify is currently offering free unlimited accounts to anyone who signs up before January 31st.Sign up now.

    About Backupify offering(Observation):Store backups of all your online data safely and securely.Setup takes just minutes, and is as simple as entering your login credentials for the sites you want to backup.Set it up once, as Backupify service needs your login information for each of the accounts it is going to perform automatic backups on. and let us do the rest. Backups occur automatically.All your login and password information is locked away and secure to protect you from hackers and other online threats.it is basically a stress buster application in case you lost yours password on a go and also it is free now so please grab it and register it and reduce yours stress and live longer happily.Also Backupify will act like yours password manager  you only have to remember one password that is the master password of yours Backupify account or else you can use yours own offline desktop password managers like KeePass the freeware or the RoboForm shareware.


    Sources & Citations:  Backupify , Gizmo



    Oh Mani Kanika! …………..I Salute You

    manikarnika I often wondered as to why the street I was born in was called “Mani Kanika” which is often misspelt as “Mani Karnika”. With a very scanty historical background and less of inquisitiveness, I never bothered to know the implication of the term or its genesis. However, on seeing the serial “Jhansi Ki Rani”, I came to know of the meaning and implication of the term in the context of my street named after the legendary queen of Jhansi defying and devouring the British Govt. till she died which heralded the history of fight for freedom with “Sepoy Mutiny of 1857” beginning to alert the foreign rulers on the shape of things to come, culminating in their doom on the fifteenth of August, 1947.

    manikarnika 2 The purport of my writing is not to tell you about the history of freedom struggle or about the war and achievements of Mani Kanika; but behind the success of “The Queen Of Jhansi” was one man who can outstandingly be called as the first and foremost freedom fighter of India. He was locally and popularly called Chakhi Khuntia or Chandan Hajuri, I feel proud that his great grandson was in the same class with me and his grandson, a friend and classmate of my father. Strange but true that the great grand daughter of Chakhi Khuntia was the classmate and best friend of my wife who also hails from the same street. Perhaps the circle would have been complete if my children would have had the same privilege which could not be due to my transfer and posting elsewhere in the State.


    Technorati Tags: ,,,


    This blog contents is a recommendation only.. I give no warranty for your actions. You will not hold me responsible for any inconvenience, incompatibility, damage, or lack of satisfaction that you experience by undertaking any or all of the steps mentioned in this blog.Although I have a positive personal experience with everything I’ve written here, I cannot guarantee the same results for you, whether due to inadvertent actions, hardware or software issues. This post is for informational purposes only,I searched a tip that told me about this service, I am sharing the same with my readers without the intention to deprive any services. I believe this documents holds no false data or misconceptions. However I am only human and mistakes are possible. You are welcome to add suggestions and corrections. All web links I post here are, in the best of my knowledge and belief, linked to reputable software. However, I hold no responsibility whatsoever for any download you make on the net.



    This blog contents is a recommendation only.. I give no warranty for your actions. You will not hold me responsible for any inconvenience, incompatibility, damage, or lack of satisfaction that you experience by undertaking any or all of the steps mentioned in this blog.Although I have a positive personal experience with everything I’ve written here, I cannot guarantee the same results for you, whether due to inadvertent actions, hardware or software issues. This post is for informational purposes only,I searched a tip that told me about this service, I am sharing the same with my readers without the intention to deprive any services. I believe this documents holds no false data or misconceptions. However I am only human and mistakes are possible. You are welcome to add suggestions and corrections. All web links I post here are, in the best of my knowledge and belief, linked to reputable software. However, I hold no responsibility whatsoever for any download you make on the net.


    about freewarespace

    About freewarespace
    blog consists of five categories; system tech & tips , travel , recipe , management and poetry. System consists of freeware, free shareware promos, free full softwares and killer tech tips. Travel consists of travel and tourism and elaborate dissection of various travel knowledge based articles .Conventional, ancient as well as modern recipes tried and tested. Management articles especially that up HR, STRESS related from my personal HR experiences. Poems written by me during my holidaying time as well as leisure weekends. Coming soon knowledge-based articles on BLOG-MONEY-MAKING, MONITISING THE BLOG and AFFILATE MARKETING.

    How to Remove the Popup Ads in Avira Antivir

    While Avira Antivir has one of the best detection rates of all antivirus, one of the main disadvantages is that after updating, you get annoying full-screen ads nagging you to upgrade. To remove these, read on.



    Windows 2000 / Windows XP Pro
    Go to Start > Run.
    Type gpedit.msc and click OK.
    Navigate through User Configuration > Administrative Templates > System.
    Double click "Don't run specified Windows applications".
    Enable it and click show.
    Add "avnotify.exe".
    Click OK on all open windows.


    Start > Run: secpol.msc (You can also access this program through 'Control Panel > Administrative Tools > Local Security Policy' this is useful if it is easier the location of this rather than the file name)
    Right click "Software Restriction Policies," Choose "New Software Restriction Policies." (Skip this step if there are subfolders in Software Restriction Policies already.)
    Right Click "Additional Rule" folder > New Path Rule.
    Where it says Path, Type the path of avnotify.exe on your computer, or use the Browse button to find it. (On XP64 using a default install of Avira, the path is: (C:\Program Files (x86)\Avira\AntiVir PersonalEdition Classic\avnotify.exe)
    Make sure the "Security Level" Dropdown menu is selected as "Disallowed"
    If you would like to make sure it went through correctly, open the Additional Rules folder, and verify the path and security level.
    Enjoy the absence of nag windows.

    Windows XP Home

    Boot into Safe Mode.
    Log into an account with administrator privileges.
    Open [driveinstalledon]:\Program Files\Avira\AntiVir PersonalEdition Classic.
    Right click on avnotify.exe and go to Properties > Security > Advanced.
    Click on Edit-> Traverse Folder / Execute File-> deny-> OK.
    Repeat for all users.
    Reboot your computer normally.

    Windows Vista Business/Ultimate

    Open the control panel through Start > Control Panel.
    Go to Administrative Tools > Local security policy.
    Click on Software Restriction Policy > Action > Create new restriction policy.
    Right-click, and go to additional rules > new path rule.
    Click Browse and navigate to C:\Program Files\Avira\AntiVir PersonalEdition Classic and double-click avnotify.exe.
    Set the security level to Disallowed.
    Click apply and OK.

    Windows Vista Home Premium

    Go to C:\Program Files\Avira\AntiVir PersonalEdition Classic\avnotify.exe.
    Right-click avnotify.exe and go to Properties > Security.
    Under the group or username SYSTEM, click edit.
    Put a checkmark under the DENY column for "read and execute"


    Before giving up, try setting a restriction on avnotify.dll as well.
    An easier way to do this is just to pay for Avira AntiVir Premium, if you are satisfied with the free version.


    Disabling the popup ads may be considered a violation of Avira's End-user license agreement (EULA). The licensee is not authorized without the written express permission of Avira, to change, translate, retro-develop, decompile or disassemble the Software, or to create works derived from the Software or the documentation, or to reproduce, translate, change or create works derived from the documentation , insofar as this is not absolutely necessary within the context of contractual use. Understand that Avira has the right to terminate your software without notice in the case of substantial violations of contractual obligations .
    CAUTION: Group Policy Editor and the other tools mentioned in this article are very powerful. Improper use may turn your computer into a paperweight. Please, do not mess around in there unless you know exactly what you're doing.

    Sources and Citations: How to Remove the Popup Ads in Avira Antivirtheeldergeek  , avira forum  , ghacks