USBDeview :lists all USB devices that currently connected to your computer


USBDeview is a small utility released as freeware that lists all USB devices that currently connected to your computer, as well as all USB devices that you previously used.Extended information for each USB device displayed. Like Device name/description, device type, serial number (for mass storage devices), the date/time that device was added, VendorID, ProductID. USBDeview also allows you to uninstall USB devices that you previously used, and disconnect USB devices that are currently connected to your computer.You can also use USBDeview on a remote computer, as long as you login to that computer with admin user.It doesn't require any installation process or additional DLL files. Just copy the executable file (USBDeview.exe) to any folder you like, and run it.


System Requirement:

This utility works on Windows 2000, Windows XP, Windows 2003, Windows Vista, Windows Server 2008, and Windows 7. Windows 98/ME is not supported. In order to disable/enable/uninstall USB items under Vista with UAC turned on, you should right click on USBDeview and choose 'Run As Administrator'. In order to disable/enable USB items on x64 systems,
you must use the x64 version of USBDeview.

Speed Test for USB Flash Drives with USBDeview:

USBDeview allows you to test the read/write speed of your USB flash drive. The test is made by writing a large file (named $speed_test_nirsoft$.dat) into your USB flash drive, and then reading it back for testing the read speed.

Connecting To external SYSTEM registry file:

If you have the 'SYSTEM' registry file of external operating system, you can use the following command-line option to read the USB devices list from it:
/regfile <SYSTEM Registry File>

For Example:
USBDeview.exe /regfile "c:\temp\regfiles\SYSTEM"
USBDeview.exe /regfile "d:\windows\system32\config\SYSTEM"

This option has some limitations:
You cannot read a Registry file of Windows XP/2003/Vista from Windows
  2000 Machine.
USBDeview works in read-only mode. (You cannot uninstall a device
  from external file)


When a USB device is added/removed on your local computer, UDBDeview utility automatically updates the list of USB devices. But... If you UDBDeview is connected to a remote computer, the list won't refresh automatically when a device is added or removed. You must refresh it manually, by pressing F5 key. For all devices except 'Mass Storage' Devices: If you plug a device to one USB port, and then you plug the same device to another USB port, a new record of the same device will be created for each USB port that you plug. So if you see multiple lines for exactly the same device, it means that you plugged it to different USB ports. The USB ports that you plugged are specified in 'Hub/Port' column. However, for 'Mass Storage' device, only one record is created for each device, even if you plug it to different USB port.

Connecting To external SYSTEM registry file has some limitations.You cannot read a Registry file of Windows XP/2003/Vista from Windows 2000 Machine. USBDeview works in read-only mode. (You cannot uninstall a device from external file)


Download USBDeview from here .

Subscribe to Prosumer by Email

Previous Posts:

  1. i-me-and-myself
  2. victory-over-south-africa-in-third-test
  3. new-norton-360-version-40-comprehensive
  4. wondershare-spyware-removalnow-free-for
  5. jetableorg-your-antispam-address

del.icio.us Tags: ,,,,,

Technorati Tags: ,,,,,

Bookmark and Share




Apparently, all three terms appear to be belonging to one group, emanating from the same source and converging into the same wholesomeness of a particular individual articulating his own identity.

Literally, “I” is pronoun used in case of the first person singular number in which a speaker uses it to refer to himself or herself.

“Me”, on the other hand, is also a pronoun used as the objective case of “I”. “Me” should not be confused with “ME” which is the abbreviation of “Myalgic Encephalomyelitis” – a disease associated with prolonged flu or illness.

So, both “I” and “Me” are pronouns with subjective and objective connotations respectively, notwithstanding each one complimenting the other in the closest possible manner.

“Myself” is another pronoun belonging to the same group as the previous two. It is a via media between the two and literally corresponding to “I” and “Me”.

When I speak of “I” discovering “Me” in ”Myself”, my nature and character get revealed and exposed to me in a very positive manner, generally extremely pressing and impressive. One cannot judge how much handsome or ugly he is, but can fathom one’s personality peeping into one’s own self, scanning and modulating it to his own liking. One becomes too much ego-centric, if one concentrates on “I” only and not on “Me” and “Myself” as scope of correction narrows down to “I” which no one else would like.”i” develops my individuality and improves my confidence, while “Me” and “Myself” rectify and purify me beyond self-concentration and self-assertion.

Now-a-days, we live in the world for the love of others, restraining ourselves to the vagaries of our own personality and performance. “I”, “Me” and “Myself” have less meaning compared to “He”, “His” and “Himself” or “She”, “Her” and “Herself”. The less often these words are used, the better. “I” cannot be oblivious to “Me” and “Myself”, both of whom discount my formula of self-esteem and self-exaltation. Hence, the time for “I” now is to rediscover “Me” in “Myself”.

Subscribe to Prosumer by Email


Technorati Tags: ,,,,,, del.icio.us Tags: ,,,,,,

Bookmark and Share


Victory Over South Africa In Third Test- Not A Flash In The Pan

smiley_green_alien On a very few occasions earlier, so much of praise was showered on the curator as in the just concluded Second Test which India won comprehensively. The pitch of Eden Gardens was so much well prepared for a five-day test that it never broke and its liveliness and compatibility to all areas of cricketmanship remained throughout the five days despite rain intervening for about a day. That the character of the pitch did not change during the entire course of the match is to the credit of the curator. The pitch had something to offer to every player of every sort whether he is a bowler or a batsman or a fielder. This is great. Kudos to the curator.

While India’s loss in the First Test is excusable, South Africa’s is not because they were a full strength and fully-equipped team, yet offering only one player of real note- Hashim Amla. All other players in the team were found wanting. They should know that only thunderous pace is not going to trouble India, the number one team in the world. South African bowlers are not adequate enough for the likes of Tendulkar, Dhoni, Sehwag and Laxman. They were rather lucky that Dravid, Laxman, Yuvraj were not playing in the first test and Dravid and yuvraj in the second and their replacements were only raw and novice for test cricket which requires tons of patience, concentration and character. Our dreaded battery of fast bowlers were all half-fit and bowled with reduced pace and run-up. Ishant Sharma hardly touched 140kms., though he is capable of 145kms.+. Sreesanth, Zaheer, Nehera were all half-fit. One can very well imagine what would have been the plight of South Africa had a full-strength and fully-fit Indian team played both the tests.

Again, a word for the critics who despite claiming to be of international stature had criticized Indian bowling stating that India does not have the bowling strength to take twenty wickets of its opposition. It is not by the toss of a coin that India has assumed the number one position, but by sordid performance over the last thirty-five tests or so spanning over a brace of years when India grounded all oppositions virtually, the ICC parameter-system has exalted it into that position. Such talks are condemnably rubbish as such critics are only overawed by a phobia that the country they belong to and like have been god-graced to become number one.

That India handicapped by Zaheer’s absence could take all second innings wickets with only three bowlers bowling is both commendable and creditable. Unquestionably, Harabhajan was the pick of the Indian bowlers, but the support lent by Amit and Ishanta were immense and adequate. All three bowlers complimented and supplemented each other to get rid of South Africa in a little over four sessions in the second innings. It is often seen in test cricket that Indian spinners toil to take the tail-enders. Here also Parnel and Harris harassed our spinners by offering stubborn resistance. I have a word of praise for Ishant Sharma for getting both the wickets to facilitate Harabhajan to take the last wicket to wrap up the match. Ishant worked up a lively pace with his bouncy deliveries bowling ten to twelve overs more than his share to make up for the absence of Zaheer. Kudos to our all three lion- hearted bowlers.

Finally, a word of praise for MSD who has been time and again proving that he has been cut out for the job with his shrewd captaincy and sordid performances both behind and in front of the wicket.

Well Done India.      

Technorati Tags: ,,,,

del.icio.us Tags: ,,,,

NEW! Norton 360™ Version 4.0 Comprehensive, automated protection:Try FREE for 90 days!

About Norton 360 4.0

 Norton 360 v4

Norton 360 4.0 developed by Symantec all-in-one security suite.Protects your PC, online activities and your identity – Delivers industry-leading, all-in-one protection against identity theft, online fraud, phishing, viruses, Trojans, bots, rootkits, spyware, and the latest cyber-threats.Defends against digital dangers without sacrificing performance — Guards your PC against all kinds of cyber-threats without slowing down your computer or eating up system resources.

Defends against digital dangers without sacrificing performance — Guards your PC against all kinds of cyber-threats without slowing down your computer or eating up system resources.Scans only files at risk for shorter, faster scans.Provides unprecedented and unmatched threat detection— Adds an additional layer of protection to detect viruses.

Warns you of dangerous downloads—Proactively protects you by analyzing newly downloaded files and applications for threats before you install or run them on your PC.


Microsoft® Windows® XP, Microsoft Windows Vista®, Microsoft® Windows® 7


Reputation service ,  Norton Insight ,   Web-based Access to Backup Files , SONAR™ 2 Behavioral Protection ,IMPROVED! Automated Backup and Restore ,Start-up Manager ,Professional-Strength AntiSpam ,Anti-Phishing , Parental Controls

Try FREE for 90 Days:

Try FREE for 90 Days You will have to download the Norton 360 v4 setup file which is 138MB in size.

norton 360 v4free


Buy download for 1 Year Protection

Links of interest :

Download Norton 360 v4 with Free 90 Days Trial Subscription , More info on Norton 360 4.0


del.icio.us Tags: ,,,,,,

Technorati Tags: ,,,,,,


jetable.org :Your antispam address


To avoid spam, jetable.org provides you with a temporary email address. As soon as it is created, all the emails sent to this address are forwarded to your actual email address. Your antispam address will be deactivated after the lifespan you selected comes to its end.

jetable.org IS NOT an anonymous email service: email headers are not modified , jetable.org keeps the logs of this service.

It is simple, see the screenshot below,put yours email address,give it a lifespan (one hour,one day,one week or one month) then click on the “Create your disposable email address”.

Apart from English language version,it is available in some other languages also. So go here and avoid spam.About jetable.org



del.icio.us Tags: ,,,,,,,

Technorati Tags: ,,,,,,,


How I searched into Apollo Hospitals, Chennai


written by (MM) banker

    Almost a decade and a half back, I decided to go to the Apollo Hospitals, Chennai for general health check up of my family members who had no complications, but I thought that for a healthy life, good health and disease-free body is pre-requisite. I never asked anybody regarding the tit bits of the place and the hospital as it would have been contrary to my nature of exploring the unknown and exploiting the known.

    My company had the facility of letting me visit any place in India with my family members once in two years by air, a facility which never went unavailed during my service period. This time, I planned for a Port Blair visit via Chennai for the dual purpose of seeing the former and treatment at the latter.

    I had earlier booked the Guest House of my company at Chennai for a week at very nominal and negligible cost with adequate comfort and familial atmosphere as all other occupants and inmates were my company executives. Of course, this facility will not be available to every one, but others visiting the Hospital find it very very profitable to stay under paying guest system in the vicinity of the Apollo Hospital itself at very reasonable rates with complete homely facility for cooking.

    Some dos

    • Persons reaching the hospital should select such a train which reaches Chennai in the early morning so as not to waste a day and to minimize the overnight expenditure which awaits them once they reach there in the evening time.

    • Staying nearby the Hospital economizes your expenditure besides saving your valuable time.

    • Get ready at 07.00 AM sharp and reach the hospital by 07.30 AM.

    • Fill up Registration Form if you are a first-timer and submit the details at the counter along with the registration fees which will fetch you a life-time computerized card renewable periodically.

    • The polite and knowledgeable employees at the counter will guide you to the doctor you like to be treated by.

    • Take appointments with all doctors on the first day itself with at least a day gap for every treatment as sample-donation and report-collection and getting it vetted by the doctor will take a day in between.

    • Book your return tickets in advance because last minute rush may strand you for a couple of days of unnecessary expenses and sojourn.

    • Book the hotels or guest houses in advance.

        Well, I had digressed from my earlier description for a few minutes. The rest I did can be done by you and he.     


      Technorati Tags: ,,,,,,,

      del.icio.us Tags: ,,,,,,,



      This blog contents is a recommendation only.. I give no warranty for your actions. You will not hold me responsible for any inconvenience, incompatibility, damage, or lack of satisfaction that you experience by undertaking any or all of the steps mentioned in this blog.Although I have a positive personal experience with everything I’ve written here, I cannot guarantee the same results for you, whether due to inadvertent actions, hardware or software issues.

      This post is for informational purposes only,I searched a tip that told me about this service, I am sharing the same with my readers without the intention to deprive any services. I believe this documents holds no false data or misconceptions. However I am only human and mistakes are possible. You are welcome to add suggestions and corrections. All web links I post here are, in the best of my knowledge and belief, linked to reputable software. However, I hold no responsibility whatsoever for any download you make on the net.


      Delete Individual System Restore Points - WinXP

      Delete individual system restore points in windows XP

      Individual or selective removal of WinXP System Restore Points has now become more easier.System Restore Service takes space in Windows XP in a span of 2 months almost 8 GB with over 50 individual restore points.Any system changes, including minor software additions or deletions,creates a restore points even multiple restore points in a day.You can minimize this more so if you are using laptop having space constraints. Please read on .

      Download the latest version of CCleaner ;important: download the version 2.19.900 on or afterwards.It now has a tool to delete individual restore points. You may download it now from www.ccleaner.com. Open CCleaner click on 'Tools' on the left hand side then click on 'System Restore' and select any individual restore point and click on 'Remove'. It is only possible to remove one at a time. Automatically the latest system restore point cannot be deleted ,never disable system restore completely because it is essential to use it for minor mishaps.Please view screenshot illustration.CCleaner is the tool for cleaning your Windows PC. Keep your privacy online and offline, and make your computer faster and more secure. Easy to use and a small, fast download.

      Technorati Tags: ,,,,

      del.icio.us Tags: ,,,,


      Get the PDF to Word Converter 2.5.3 Full version for Free

      PDF to Word Converter 2.5.3t

      Many people want to convert PDF files to word, but not willing to pay for Adobe Acrobat. So, here is the question, how to convert PDF to Word without Adobe Acrobat? The answer would be simple – just apply a PDF to Word program.

      PDF to Word Converter 2.5.3 support encrypted PDF files conversion,support Microsoft Office 2010 and Windows 7,3 conversion modes—Batch, partial, Right-click conversion modes,preserve text, layouts, images and hyperlinks in an editable Word document.


      Free Key code is available for this version permanently! But Free offer cannot be used for commercial usage!FREE Offer Expires on Mar. 1, 2010.

      Get key code from here.Enter your First Name, Last Name,E-mail then click “send me key code” and check yours inbox and Register your  PDF to Word Converter 2.5.3 for free with the registered e-mail address and keycode provided in yours mail box and also keep it safe for future requirements .

      Download  PDF to Word Converter 2.5.3 from here .See the screenshot to have more in depth review of how to fill up the small form to register to get the full version code.

      PDF to Word Converter 2.5.3


      AnyBizSoft PDF to Word Converter is an easy-to-use application, which is specially designed for converting PDF to Word 2010 (.docx) 2007(.docx), 2003(.doc). The original text, layouts, images and hyperlinks can be exactly retained in the generated Word documents. Just with one click, you can convert your read-only PDF files into fully formatted editable Word documents less one minute.PDF to Word Converter 2.5.3 not the latest version .The PDF to Word Converter 3.0.0 the latest version do not require Microsoft Office Word ,enable table conversion (3.0.0 Only),preserve both image and text hyperlinks.

      But this version PDF to Word Converter 2.5.3 which contains the potentiality of a good conversion prrgramme if you use Microsoft word processor .PDF to Word Converter 2.5.3  can convert PDF file which was restricted by author to prevent others from copying, editing or even printing.If you just want to convert some pages of a .pdf file, click the Selected Pages field and type the page numbers to be converted.The quality of the converted documents is of excellent quality.


      A short poem in praise of PDF to Word Converter 2.5.3:

      Any-biz-soft pdf to word ace
      An easy chairman ace
      Is specially designed toy
      Pdf to word teak ploy
      Original text alive
      And hyperlinks can del shive
      Retained in the approver
      Documents just birth mover
      Click you can convert your spar
      Files into midge registrar
      Editable word delver
      One minute ten discover
      Converter 2 not the eye


      del.icio.us Tags: ,,,,,,

      Technorati Tags: ,,,,,,


      Understanding Virtualization & Security


      Understanding Security

      The firstly malware reception application was supported  on touchs: parts of tag that do as uncomparable symbols for item-by-item spiteful syllabuss.  late  technologies (heuristic programs and behaviour s) can together be referred to as nonsignature sleuthing know-hows. The commercial  portion is a aggregation of programme suffices and rules that qualify aggregation to be analyzed  by the  division.a separate  activity of a system flying inside the  methodicalness or a wide place of specified  actions.

      The deductive portion reflection as a - arrangement. It lies of an formula that s datum and then distributes a finding about the accumulation. An antivirus programme then reflexion in accordance of rights with this finding in malicious programmes placing a register in isolation, interference unlicenced computer program , etc. When mistreatment the supporter above some  tribute plan of action can be viewed as a daedal size - thing that colligates cardinal  disjoint parts i.e. the bailiwick and logical parts.

      Analyzing technologies in this mode creates it hands-down to wager however the portions bear on to one other  and their pluses and minuses. In component, mistreatment this hypothesis spend a pennies it easier to get to the merchantman of however convinced technologies bewitch.  These position do not deviate one other , and they as well do not full  the applied science that they square measure used to line.

      A vicious programme is a lodge containing medicament smug.  a grouping of accomplishs that take take aim inside an  system. the kernel sum of  opinion inside an in operation system. programme evidence can take position at more than one steady . Antivirus softwares has, more or to a lesser extent, create mentally along these connectives: workings with filing cabinets, hole in the ground with phenomenons via a record, temporary with a accuse via issues, and practical  with the  itself. This is ground the  above  elaborates liberal arts as vessel as know-hows.

      Information is familial to the judgment- ingredient, extracted from registers and is a heap of computer memory units integrated in a  way of life. somebody give ways felled  a show' computer memory unit write in code into overlooks, and then launches each bring up in a  geographical region which is a repeat of the reckoner environs. This appropriates assets results to look into idea trait without whatever person  exhibit to the  organisation or somebody aggregation .

      The set mould itself renders a comparatively high-fidelity conceive of of however the application deeds. You have an fenced in lay in which a nipper can play safely. In the circumstance of information measure department, the in operation grouping is the social class, and the maleficent broadcast is the unruly descendant.

      The communication between imitation and virtualization whitethorn be a book united , but it is a unclouded unity. The prototypical subject field is an environs in which a written document is incur .the in operation method as the surround, and the application  s the fundamental interaction between the  method and the system.  technique, in virtualization the geographical region is on single but equidistant foothold with the subject field.

      Understanding Virtualization

      Sandboxing - like aspiration - isnt used extensively in antivirus programmes,  because it says a gigantic abstraction of assets. It's comfy to assure when an antivirus programme expends a plaything, because there will always be a instant interruption between when the package is launched and when it  point in times to lead .information is self-collected by intercepting in operation matter runs. By intercepting the let loose to a certain  OS componenet,  can be obtained about precisely what a indisputable programme is doing in the organization. Over period, the Monitor pile ups data point on these processs and transfer of trainings them to the a priori element for depth psychology.

      The guides for these comparabilitys can be elastic and the leaves will be quantity settled . An ideal of this is distinctive cattish written language by victimization individual  computer memory unit manners, each of which is non-rigid .Despiteful written language not by a severe hard  of constants, but by the conclusions of a varied  act of all of its factors at , winning into  the possibly  coefficient of each constant and hard  the gross  phenomenon. This is not to give tongue to that photographic equipments  hard to misinform electronic computers. Its potential that whoever organizes the variety of technologies has but endeavor the cost bewildered.

      Twenty-four hours, or else of  about the module practice, we should trouble about the sum of money of inconstant  confident s uncovering that an antivirus computer code is . inconstant  confirmings is added  part of speech "mistake". A mendacious certain  take places when the platform erroneously graces an sinless march as existence septic  and this is very tract  because of "heuristic program signal detection know-how. formula espial is a know-how that an antivirus can analyse the direction of a info and determine if it is a agency or not. This is principally used to find  representation or malevolent program.


      There square measure' many an contingent explanations of the damage  or cast. antivirus technologies early began to rise up - which was when the terminal figure rule was opening  used - the name ignoble  a razor-sharp subject field: one that would regard a agency  some  flexibly appointed computer memory unit s, perception and proactive discovery square measure term which square measure alter less  delimited.The antivirus vendours can research to a wide form of technologies,  from formulas to organisation upshot watching. computing device rock interference methodicalness (Host Intrusion Prevention System), this Energys not manifest the requirement causal agency of the subject in statue of antivirus protection. Protective covering shows the  to which a subject area Crataegus oxycantha be dangerous, it's very tall for malware to envelop itself from a system of rules result defender, because it's closely hopeless to protective cover a behaviour.The less conceptual the ability of security, the more assured it will comprise. 

      Free 3 month Avira Premium Security Suite

      Loss of valuable data usually has dramatic consequences. Even the best virus protection program cannot provide one hundred percent protection from data loss. Make regular copies (Backups) of your data for security purposes.A program can only provide reliable and effective protection from viruses, malware, unwanted programs and other dangers if it is up-to-date. Make sure Avira Premium Security Suite is up-to-date with automatic updates. Configure the program accordingly.

      Avira delivers globally recognized award-winning security .Avira Premium Security Suite is a comprehensive and flexible tool you can rely on to protect your computer from viruses, malware, unwanted programs, and other dangers .The new Avira Premium Security Suite protects you in a comprehensive way against the dangers from the Internet. It offers you numerous advantages from the Avira AntiVir Premium. The Suite has an extra FireWall as well as an AntiSpam and a backup function in addition to the award-winning virus protection.New: QuickRemoval, NetbookSupport and ParentalControl.

      To get free 3 months(89 day Avira promotional license) Avira Premium Security Suite just go to this link... here ,

      then Fill out the online form , as shown in screenshot then click " Request license now” ,once you have completed the registration the license file will be sent to your email address. Also it takes you to a page where license overview can be seen.From there download your license (HBEDV.KEY) and store it on your PC.You will be prompted to import the license during the installation of your Avira product. The installation requires you to uninstall your existing Avira product first.However, you can also activate Avira Premium Security Suite after the installation by running Control Center under Help::License management .

      If you haven't installed the product already please download it here. Read Avira End-user License Agreement (EULA) from here.

      avira promotions2

      Please note: by confirming your email address and downloading the license file, you are signing up to receive periodic follow-up emails from Avira .This promotional license is a free offer and can not be used in any commercial activity. If you have purchased this link from an online shop you should contact the seller immediately.

      avira promotions 4

      Please proceed as follows to install your software:

      1. If you have installed any other program version of AntiVir (e.g. the free "Classic" Version), please uninstall it from your computer first.

      2. Save the attached license on your computer in the My Documents folder so that you can easily find it later to import into your Avira Program.

      3. If you have not yet installed the AntiVir Premium Security Suite, you can download it here:


      4. Follow the installation instructions to import the license into the software. The installation instructions are available online as PDF file here:


      System requirements:

      For Avira Premium Security Suite to work perfectly, the computer system must fulfill the following requirements:
      Computer as from Pentium, at least 266 MHz
      Operating system
      Windows 2000, SP4 and update rollup 1 or
      Windows XP, SP2 (32 or 64 Bit) or
      Windows Vista (32 or 64 Bit, SP 1 recommended)
      At least 100 MB of free hard disk memory space (more if using Quarantine for temporary storage)
      At least 192 MB RAM under Windows 2000/XP
      At least 512 MB RAM under Windows Vista
      For the installation of Avira Premium Security Suite: Administrator rights
      For all installations: Windows Internet Explorer 6.0 or higher
      Internet connection where appropriate



      CCleaner v2.28 now cleans the non-standard custom locations using the new CustomLocation entry in registry or ccleaner.ini.

      CCleaner v2.28 packed with new Windows 7 features, more application support, better performance, and more customization for power users.CCleaner is the one of the best tool for cleaning your Windows PC. Keep your privacy online and offline, and make your computer faster and more secure. Easy to use and a small, fast download.CCleaner natively supports Firefox, SeaMonkey and Flock. During the analysis process, CCleaner searches for data created by these browsers in the default folders.

      CCLEANER 1V2 

      However if you are a power user you might have installed a portable version that stores the Profile in a non-standard location.In this new release you can now clean non-standard locations using the new CustomLocation entry in registry or ccleaner.ini.An example is included in the change log below. :)

      Full change log:

      Added support for custom locations for applications.  e.g. CustomLocation1=FIREFOX|C:\MyFirefox\Profile
      Improved detection and cleaning algorithm for new releases of Mozilla based browsers.
      Added news tasks to W7 jumplist.
      Added new command line parameters: /CLEANER, /REGISTRY, /TOOLS and /OPTIONS.
      Improved MUI cache cleaning for Vista and Windows 7.
      Added drive information to Wipe Free space status.
      Improved Wipe MFT free space routines.
      Improved W7 toolbar feedback.
      Improved several core processes and routines.
      Improved file search algorithm when recursing.
      Added support for cleaning Paint Shop Pro 12.
      Improved support for IZarc and Axialis IconWorkshop.
      Minor GUI tweaks.

      You may download it now from piriform.com/ccleaner



      Better safe than sorry : 2


      1. Set up two accounts for your computer an Administrative account and a limited user account . An administrative  account connective internet poses serious security risk . Run internet with limited user account.

      2. Turn off or disable the Guest Account For this go to  Control panel > User Accounts , then select the guest  account and delete it .

      3. Delete / Disable Unused User Account

      4. Disable unnecessary services.

      5. Run the system configuration utility ( Run > “msconfig”). Take an intimate look at what are the programs running and what services running . If you suspect any process , here you can disable it . It is safe to do with  “ System Configuration Utility”.

      6. Avoid P2P clients such as Morpheus , Kazaa,etc.

      7. Download the softwares from only reliable and recognisable sources . Read the terms of Agreement of the software carefully.

      8. Delete Metadata in Documents Metadata is the information  embedded within  the document about the document itself . It is general in MS office documents, Metadata is stored in the Properties > Custom Property of the document . To delete Metadata from MS office document go to Tools > Options > security tab > select the check box named “Remove Personal information from this file on save > Click ok and save the document.




      Hi am back again


      Hi am back again

      Win a full blown license of WinX DVD Ripper

      Go here The winners of all of the individual prizes will be selected by a random draw on February 6, there will be 9 people in total.

      http://www.vladan.fr/ says

      I received a 9 licenses of  WinX DVD Ripper Platinum to give away. It’s a software for backing up and converting your DVD’s to another format.

      So there will be NINE lucky winners of the contest. Each of them will win a license for WinX DVD Ripper Platinum.(it’s quite good chance for you to get a free copy !!).


      twitter status


      Free Licenses for Zemana AntiLogger – 3 Days Only

      Stop hackers now with AntiLogger.Block all known and unknown internet threats.bank,shop and browse the internet safely and privately. This offer is from Bill Mullins’ Weblog – Tech Thoughts , and here just writing for ours readers to go there and collect Free Licenses for Zemana AntiLogger.


      3 Days Only, starting from 28th of January 2010 to 31st of January 2010  .


      It's a 1 year free giveaway.Information about this giveaway and direct link to get the license key.The direct link displays a distinct and unique license key each time and as fast as it is opened or refreshed.after registration this message will be shown.

      Thank you for registering of AntiLoggerYour License Activation Key and detailed license information are listed below. We recommend that you to save your license key information in a secured space for future use.

      Please don't hesitate to contact us for technical support or any questions you may have about our products.

      Please go here as mark of respect to this blog which has arranged this great anti key logger free for one year.

      To activate AntiLogger, follow these instructions:For assistance with the product(s), please visit here. take a look at these Testimonials & Reviews.

      Bill Mullins’ Weblog – Tech Thoughts adds

      I was immediately impressed by this application, if maintaining your privacy is a concern, you might consider adding this application to your security toolbox.


      Raymond's positive review is here

      Believe it or not, it is able to detect ALL keylogging, webcam capture and screenshot capture methods from different trojans.


      I found the program completely delivered on its promises. At a time when malware is increasingly targeting financial transactions, I find this program a real must have. There is no marketing here.


      This is a fantastic addition that makes the potentially dangerous world of downloads slightly less risky.


      Zemana AntiLogger protects your online communication and prevents malware from tampering with your transactions.


      If you look for effective protection against all kinds of data loggers, Zemana AntiLogger is the application you need.


      Luckily I was part of the beta testing programme of Zemana AntiLogger and tested for almost 9 to 10 months and surprisingly it is as good software as it is known to be and in fact it is lesser known and it installs in a zippy vey simple non complicated installations some times it will ask you to restart yours system and do it , it works very light while on system tray but if you open its GUI then it  is bit heavier but not to yours uncomfortable positions and in fact it is very light while on system tray. Its graphic interface is simple and crystal clear , it has some additional functionality like start up addition of programmes detection which is handy, AntiLogger does not work on Windows 95, 98 or ME, or on Mac operating systems. There are no plans to support these environments.Zemana AntiLogger License Activation Procedures:Double-click on the AntiLogger tray icon on the Windows taskbar and open the AntiLogger interface.Click on the “Services” tab in the AntiLogger interface.

      Click on the “License” tab in the opened menu.Write down the license key on the “Enter License” box and click the “Renew License” button.Your license key will be activated as shown in the picture.The licensing procedure is now complete. During my beta testing of this anti logger ,have found that it should be installed at the fresh installation of Windows otherwise it may leave already installed antiloggers ,and this author hopes that this lacunae or the void must be patched in these versions. One great thing I have found it is a continually developed model and being developed continuously and its updates frequently in fact some time twice a week and its update size hardly above 5 to 6 mb.It is an great asset and one more additional layer of protection you can have  to protect yours system from any untoward activities.As the highly regarded SnoopFree Privacy Shield, a free application, which unfortunately, is compatible with Windows XP only.So , Zemana AntiLogger extends  to yours other updated OS , it is now a great asset and follow the instructions as written above to get it free in fact you can download more than one license if you have multiple computers .So download from here and activate.

      Zemana antilogger1



      Online Armor ++ FREE on Friday January 29th

      This Friday Tall Emu is giving everyone a chance to own a copy of Online Armor ++ for free (normally costs $60).Just go to  giveawayoftheday ,on Friday and download, install, and activate it before the 24 hour period is over.Online Armor offers both free and paid versions of their  firewall . Even Online Armor Free impressed me with its leak-test and HIPS performance. OA ++ and OA premium has a great key logger detection technology which surprise me even specially created or new keyloggers are detected and prevented. Online Armor++ comes with all of the power of Online Armor, but additionally includes the award-winning Emsisoft/Ikarus Dual Antivirus and Antimalware engine!  Don't miss your chance on Friday, January 29th as it is a superlative offer from Tall Emu with giveawayoftheday.To know about Online Armor ++ just drop to this Tall Emu site .Online Armor is not available for windows Vista 64 bit or Windows 7 64 bit.

      Online Armour1.

      Sources & Citations:

      Gizmo , TechPP