<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-1082350750974915091</atom:id><lastBuildDate>Fri, 20 Sep 2024 10:29:42 +0000</lastBuildDate><category>scan</category><category>adware</category><category>spyware</category><category>Spyware Terminator</category><category>adobe</category><category>lavasoft</category><category>task manager</category><category>windows</category><category>AVG</category><category>AdAware</category><category>C++</category><category>Java</category><category>Limewire</category><category>NoAdware</category><category>Rootkit</category><category>Spyware Doctor</category><category>Vista</category><category>XP</category><category>ZoneAlarm</category><category>acrobat</category><category>disk I/O</category><category>everest labs</category><category>explorer</category><category>file handles</category><category>file sharing</category><category>history</category><category>notepad</category><category>openSUSE</category><category>p2p</category><category>pdf</category><category>process</category><category>processes</category><category>reader</category><category>recent documents</category><category>regedit</category><category>spybot</category><category>svchost</category><category>system performance</category><category>torrents</category><category>tricks</category><category>winrar</category><title>software experiments</title><description></description><link>http://software-experiments.blogspot.com/</link><managingEditor>noreply@blogger.com (experimenter)</managingEditor><generator>Blogger</generator><openSearch:totalResults>11</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1082350750974915091.post-6833246075328163481</guid><pubDate>Mon, 20 Aug 2007 18:54:00 +0000</pubDate><atom:updated>2007-08-21T00:36:42.526+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Rootkit</category><title>Rootkits</title><description>Rootkits were first developed for Unix-like systems (Solaris, Linux) but later the threat encompassed windows systems as well. The first public rootkit developed for the Windows NT platforms was introduced by Greg Hoglund, a wellknown security researcher and owner of &lt;a href=&quot;http://www.rootkit.com&quot;&gt;www.rootkit.com&lt;/a&gt;, in 1999. The term rootkit is actually derived from root — a Unix reference to administrator or the root user priviledges. On October 31st 2005, Mark Russinovich, of &lt;a href=&quot;http://www.sysinternals.com&quot;&gt;Sysinternals&lt;/a&gt; and Microsoft TechNet fame, discovered the Sony Digital Rights Management (DRM) Rootkit.&lt;br /&gt;&lt;br /&gt;Rootkits are used to hide other malware. They do so by gaining administrator priviledges and using them to make the operating system hide the malware from users as well as anti-malware programs. Experts may say there are techniques for combatting rootkits; but for the end-user it is not so. There are ways of removing viruses and spyware but mostly if you have a rootkit, you will need to wipe the hard disk. Moreover, anti-rootkit tools are not provided by major anti-virus and anti-spyware vendors like Norton and McAfee. Avg however provides a free anti-rootkit tool.&lt;br /&gt;&lt;br /&gt;Sophos also provides an anti-rootkit tool.&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgs7wuwnw-4qbhEpMg9LMaLjNqXrL-9s5aNu2ye9lWLovG0uq9YYNiFN6mZvZKIZBnhJ9B_dTO8Ex7aE1NIcof0eRDGO9bV1BgVTbyrzJ9VO6XIFasrYPd5r4duoH5qSGWhLpNLnX-LZyLs/s1600-h/blog1.PNG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgs7wuwnw-4qbhEpMg9LMaLjNqXrL-9s5aNu2ye9lWLovG0uq9YYNiFN6mZvZKIZBnhJ9B_dTO8Ex7aE1NIcof0eRDGO9bV1BgVTbyrzJ9VO6XIFasrYPd5r4duoH5qSGWhLpNLnX-LZyLs/s400/blog1.PNG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5100858869378516018&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Panda Labs provide a nice anti-rootkit tool.&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYDwa5VJDyoEb2H7Znc_TjfvEQjCHr4-cTUqrLTuaMYfmcqI-MsSp3SewYfcvMOAsmFM-bM_2_EcNKlgjJDzpl9pefc_is8Lln4AY-vu_mVh2jmSLg4J_VqLgk0tcnPNGAvDbBy7KpkGSO/s1600-h/blog.PNG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYDwa5VJDyoEb2H7Znc_TjfvEQjCHr4-cTUqrLTuaMYfmcqI-MsSp3SewYfcvMOAsmFM-bM_2_EcNKlgjJDzpl9pefc_is8Lln4AY-vu_mVh2jmSLg4J_VqLgk0tcnPNGAvDbBy7KpkGSO/s400/blog.PNG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5100859212975899714&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Mark Russinovich&#39;s Rootkit revealer is also a nice tool, but you have to interpret the data yourself. It is very good for experts in the field.</description><link>http://software-experiments.blogspot.com/2007/08/rootkits.html</link><author>noreply@blogger.com (experimenter)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgs7wuwnw-4qbhEpMg9LMaLjNqXrL-9s5aNu2ye9lWLovG0uq9YYNiFN6mZvZKIZBnhJ9B_dTO8Ex7aE1NIcof0eRDGO9bV1BgVTbyrzJ9VO6XIFasrYPd5r4duoH5qSGWhLpNLnX-LZyLs/s72-c/blog1.PNG" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1082350750974915091.post-2305932097060191866</guid><pubDate>Sun, 24 Jun 2007 10:28:00 +0000</pubDate><atom:updated>2007-06-25T01:48:10.139+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">adobe</category><category domain="http://www.blogger.com/atom/ns#">pdf</category><category domain="http://www.blogger.com/atom/ns#">task manager</category><title>Adobe Reader 8.1</title><description>Most of you must be familiar with the term e-book by now. The most important and popular e-book format is pdf. Well pdf stands for portable document file. Adobe Reader is most commonly used for pdf viewing, though professional adobe acrobat as it allows them capability to edit pdf documents. Recently Adobe launched &lt;a href=&quot;http://www.adobe.com/products/acrobat/readstep2.html&quot;&gt;Adobe Reader 8.1&lt;/a&gt;. It has got a new user interface, and many more memory improvements. Previous versions of Adobe Reader gave a reading of a minimum of 25 to 35 MB in Task Manager, but the current version gives a reading of 5 to 10 MB.</description><link>http://software-experiments.blogspot.com/2007/06/adobe.html</link><author>noreply@blogger.com (experimenter)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1082350750974915091.post-7921586762292865390</guid><pubDate>Wed, 13 Jun 2007 19:37:00 +0000</pubDate><atom:updated>2007-06-14T01:12:57.211+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">file sharing</category><category domain="http://www.blogger.com/atom/ns#">Limewire</category><category domain="http://www.blogger.com/atom/ns#">p2p</category><category domain="http://www.blogger.com/atom/ns#">torrents</category><title>Limewire, torrents and Bearshare</title><description>Limewire is a peer-to-peer file sharing software that needs java runtime to operate. limewire is a great software because unlike torrent downloading softwares like Bit-torrent, Bit-comet etc, Limewire allows viewing of half-downloaded files. You have to locate the incomplete directory and copy the incomplete file to a separate directory and u can view it. The partial view can give you the idea whether the file is what u expected or something else. that way you wont be easily tricked. On the other hand, if u use reliable torrents, they provide u higher speeds and if u are an experienced user u will know things not available through limewire are available through torrents. a better option is using bearshare as it can connect to torrents as well as limewire users. If u are using torrents, switch to utorrent as it is the most compact and fastest torrent client today. Limewire has an integrated search and search is dependent on the current users while torrents are available on the internet to be downloaded. So while speed of downloading depends on available seeders i both cases, search in case of torrents is not affected available users.</description><link>http://software-experiments.blogspot.com/2007/06/limewire-torrents-and-bearshare.html</link><author>noreply@blogger.com (experimenter)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1082350750974915091.post-8226503507550984966</guid><pubDate>Tue, 12 Jun 2007 16:41:00 +0000</pubDate><atom:updated>2007-06-12T22:19:32.585+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">C++</category><category domain="http://www.blogger.com/atom/ns#">Java</category><category domain="http://www.blogger.com/atom/ns#">openSUSE</category><category domain="http://www.blogger.com/atom/ns#">Vista</category><category domain="http://www.blogger.com/atom/ns#">windows</category><category domain="http://www.blogger.com/atom/ns#">XP</category><title>Vista vs XP</title><description>&lt;div class=&quot;Section1&quot;&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;I shall compare them at two levels:&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;1. The core level (the &lt;a href=&quot;http://en.wikipedia.org/wiki/Software_developer&quot; title=&quot;know more developer&quot;&gt;developer&lt;/a&gt; level)&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;2. The &lt;a href=&quot;http://en.wikipedia.org/wiki/End_user&quot; title=&quot;know more about end-user&quot;&gt;end-user&lt;/a&gt; level (or simply the superficial or outward level). &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;At the core level, &lt;a href=&quot;http://www.microsoft.com/windows/products/windowsxp/default.mspx&quot; title=&quot;Windows XP homepage&quot;&gt;Windows XP&lt;/a&gt; is first of all very stable, actually the maximum stable till date of Microsoft’s operating systems. It is C/C++ - based and that’s why windows programmers can use &lt;a href=&quot;http://msdn2.microsoft.com/en-us/vbasic/default.aspx&quot; title=&quot;VB in msdn&quot;&gt;VB&lt;/a&gt; or VC++ for windows XP coding. On the other hand, &lt;a href=&quot;http://www.microsoft.com/windows/products/windowsvista/default.mspx&quot; title=&quot;Vista home page&quot;&gt;Windows Vista&lt;/a&gt; uses &lt;a href=&quot;http://www.microsoft.com/net/basics.mspx&quot; title=&quot;.NET basics&quot;&gt;.NET&lt;/a&gt; technology. Now .NET is a kind of platform - dependent cousin of &lt;a href=&quot;http://java.sun.com/&quot; title=&quot;Sun Java&quot;&gt;JAVA&lt;/a&gt; and all programmers are well aware of, JAVA takes more time than C++. The speed based optimisations in java are rather recent. Vista uses much more resources compared to XP basically because of this not because of graphics as is popularly thought. &lt;span class=&quot;GramE&quot;&gt;Glassy&lt;/span&gt; graphics and 3d desktop come in &lt;a href=&quot;http://www.opensuse.org/&quot; title=&quot;opensuse home&quot;&gt;&lt;span class=&quot;SpellE&quot;&gt;openSUSE&lt;/span&gt;&lt;/a&gt; but unlike a minimum of 1gb ram of vista &lt;span class=&quot;SpellE&quot;&gt;openSUSE&lt;/span&gt; uses 256 &lt;span class=&quot;SpellE&quot;&gt;mb&lt;/span&gt; ram. &lt;span class=&quot;GramE&quot;&gt;and&lt;/span&gt; this is because &lt;span class=&quot;SpellE&quot;&gt;SuSE&lt;/span&gt; uses &lt;span class=&quot;SpellE&quot;&gt;C++&lt;/span&gt; for creating such graphics.&lt;/p&gt;    &lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;At the end-user level, vista copies a lot from &lt;span class=&quot;SpellE&quot;&gt;Mac&lt;/span&gt; &lt;span class=&quot;SpellE&quot;&gt;OS&lt;/span&gt; X. You may but still original rules. Apple&#39;s friendliness is always more than its competitors. The sidebar, widgets, etc. that come from &lt;span class=&quot;SpellE&quot;&gt;mac&lt;/span&gt; into vista can be brought into XP too using a vista transformation pack. Moreover, for the end-users vista is a real trouble installing.&lt;o:p&gt;&lt;br /&gt;&lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;Many have bought original DVDs of vista but failed in installing it on their systems.&lt;/p&gt;  &lt;/div&gt;</description><link>http://software-experiments.blogspot.com/2007/06/i-shall-compare-them-at-two-levels-1.html</link><author>noreply@blogger.com (experimenter)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1082350750974915091.post-2282131254223420671</guid><pubDate>Sun, 10 Jun 2007 15:45:00 +0000</pubDate><atom:updated>2007-06-10T21:16:31.945+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">adware</category><category domain="http://www.blogger.com/atom/ns#">AVG</category><category domain="http://www.blogger.com/atom/ns#">scan</category><category domain="http://www.blogger.com/atom/ns#">spyware</category><category domain="http://www.blogger.com/atom/ns#">Spyware Terminator</category><title>Antispyware – 5 (AVG)</title><description>&lt;span style=&quot;font-size: 11pt; line-height: 115%; font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;Recently, AVG products have been gaining good market. The AVG antispyware comes in 2 versions, the &lt;a href=&quot;http://free.grisoft.com/doc/5390/lng/us/tpl/v5#avg-anti-spyware-free&quot; title=&quot;get free version of avg antispyware&quot;&gt;free one&lt;/a&gt; and the &lt;a href=&quot;http://free.grisoft.com/linkout.php?doc=20&amp;to=http%3A%2F%2Fwww.grisoft.com%2Fdoc%2Fproducts-avg-anti-spyware-freecnv&quot; title=&quot;get commercial version of avg antispyware&quot;&gt;commercial one&lt;/a&gt;. Looking into its performance, we find that it takes long to complete. It scans as if it were some antivirus tool rather than an antispyware, though there are no criteria to decide this. Nonetheless, it is an effective scanner. Much like &lt;a href=&quot;http://dnl.spywareterminator.com/install/sap_landing_spyware_terminator.aspx?tbid=60287&amp;amp;banner_id=GGL_CT_ppc_60287_02_04_179_*GeoUSCA*__Spyware%20Terminator&amp;amp;gclid=CLWK5P-xvIwCFQmZbgod-18Iaw&quot; title=&quot;get spyware terminator&quot;&gt;Spyware Terminator&lt;/a&gt;, it integrates with the right click menu for files and folders.&lt;/span&gt;</description><link>http://software-experiments.blogspot.com/2007/06/antispyware-5-avg.html</link><author>noreply@blogger.com (experimenter)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1082350750974915091.post-6778681484497019907</guid><pubDate>Sun, 10 Jun 2007 15:43:00 +0000</pubDate><atom:updated>2007-06-10T21:15:21.179+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">AdAware</category><category domain="http://www.blogger.com/atom/ns#">adware</category><category domain="http://www.blogger.com/atom/ns#">lavasoft</category><category domain="http://www.blogger.com/atom/ns#">scan</category><category domain="http://www.blogger.com/atom/ns#">spyware</category><category domain="http://www.blogger.com/atom/ns#">Spyware Terminator</category><title>Antispyware – 4 (Spyware Terminator)</title><description>&lt;span style=&quot;font-size: 11pt; line-height: 115%; font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;&lt;a href=&quot;http://dnl.spywareterminator.com/install/sap_landing_spyware_terminator.aspx?tbid=60287&amp;banner_id=GGL_CT_ppc_60287_02_04_179_*GeoUSCA*__Spyware%20Terminator&amp;amp;gclid=CLWK5P-xvIwCFQmZbgod-18Iaw&quot; title=&quot;get spyware terminator&quot;&gt;Spyware Terminator&lt;/a&gt; is another free antispyware tool. It has got real-time protection including system guard, application guard, and internet guard. It has got impressively low CPU usage, &lt;a href=&quot;http://www.lavasoftusa.com/&quot; title=&quot;get Ad-Aware&quot;&gt;Ad-Aware&lt;/a&gt; like interface, which loads fast, is good to look at, and is also quite &lt;a href=&quot;http://www.uie.com/articles/design_intuitive/&quot; title=&quot;read about intuitive designs&quot;&gt;intuitive&lt;/a&gt; and thus easy to use. It scans quite fast much like AdAware. The most interesting part of the results is that they provide details about processes on your system. They recognise a good number of processes and provide you information about them &lt;i&gt;in situ&lt;/i&gt;, i.e. you don’t have to look up the net again. It integrates well with the right click menu for files and folders.&lt;/span&gt;</description><link>http://software-experiments.blogspot.com/2007/06/antispyware-4-spyware-terminator.html</link><author>noreply@blogger.com (experimenter)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1082350750974915091.post-6183568611756069667</guid><pubDate>Sun, 10 Jun 2007 15:42:00 +0000</pubDate><atom:updated>2007-06-10T21:13:51.853+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">adware</category><category domain="http://www.blogger.com/atom/ns#">scan</category><category domain="http://www.blogger.com/atom/ns#">Spyware Doctor</category><title>Antispyware – 3 (Spyware Doctor)</title><description>&lt;span style=&quot;font-size: 11pt; line-height: 115%; font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;&lt;a href=&quot;http://www.pctools.com/spyware-doctor/?ref=google_sd&amp;amp;gclid=CMzWx7nxsowCFQbIbgodYnyFSw&quot; title=&quot;get spyware doctor 5.0&quot;&gt;Spyware Doctor&lt;/a&gt; is a good proprietary antispyware. It has got real-time protection, registry clean-up and all. Its spyware definition updates are usually around 4.5 MB and most updates also accompany an update of the scan engine. Its problem is speed and CPU usage. The usual memory usage recorded in &lt;a href=&quot;http://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/en-us/taskman_whats_there_w.mspx?mfr=true&quot; title=&quot;task manager overview&quot;&gt;task manager&lt;/a&gt; for its process is about 80 MB. It slows down the pc to a great extent and if allowed to run at start-up, it lengthens the start-up time too much. On a typical 3 GHz system, it slowed down the start-up time by about 2 minutes. I would not recommend it especially when same performance can be obtained using free tools using much low memory and CPU.&lt;/span&gt;</description><link>http://software-experiments.blogspot.com/2007/06/antispyware-3-spyware-doctor.html</link><author>noreply@blogger.com (experimenter)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1082350750974915091.post-7397484610863617655</guid><pubDate>Sun, 10 Jun 2007 15:40:00 +0000</pubDate><atom:updated>2007-06-10T21:12:02.065+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">NoAdware</category><category domain="http://www.blogger.com/atom/ns#">regedit</category><category domain="http://www.blogger.com/atom/ns#">scan</category><category domain="http://www.blogger.com/atom/ns#">spyware</category><title>Antispyware – 2 (Registry scans)</title><description>&lt;span style=&quot;font-size: 11pt; line-height: 115%; font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;Almost all antispyware products scan for registry values as traces of spyware activity. &lt;a href=&quot;http://www.noadware.net/&quot; title=&quot;get NoAdware&quot;&gt;NoAdware&lt;/a&gt; is especially good at registry clean-up. However, its free version only scans but doesn’t clean. If you are acquainted with registry clean-up using &lt;a href=&quot;http://support.microsoft.com/kb/256986&quot; title=&quot;description of regedit&quot;&gt;regedit&lt;/a&gt;, you may do the clean-up part yourself which of course shall take more time than if the software did it for you. And these registry values are not cleaned by the typical registry clean-up softwares available because they clean obsolete registry values.&lt;/span&gt;</description><link>http://software-experiments.blogspot.com/2007/06/antispyware-2-registry-scans.html</link><author>noreply@blogger.com (experimenter)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1082350750974915091.post-1346725653439091689</guid><pubDate>Sun, 20 May 2007 07:08:00 +0000</pubDate><atom:updated>2007-06-10T21:10:22.799+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">adware</category><category domain="http://www.blogger.com/atom/ns#">everest labs</category><category domain="http://www.blogger.com/atom/ns#">lavasoft</category><category domain="http://www.blogger.com/atom/ns#">scan</category><category domain="http://www.blogger.com/atom/ns#">spybot</category><category domain="http://www.blogger.com/atom/ns#">spyware</category><category domain="http://www.blogger.com/atom/ns#">ZoneAlarm</category><title>Antispyware – 1 (Adware.LinkMaker)</title><description>&lt;span style=&quot;font-size: 11pt; line-height: 115%; font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;I have been experimenting with various anti&lt;a href=&quot;http://www.microsoft.com/protect/computer/basics/spyware.mspx&quot; title=&quot;what is spyware?&quot;&gt;spyware&lt;/a&gt; products for some time now. I had &lt;a href=&quot;http://www.safer-networking.org/&quot; title=&quot;get Spybot-SD&quot;&gt;Spybot-Search and Destroy&lt;/a&gt; and &lt;a href=&quot;http://www.lavasoftusa.com/&quot; title=&quot;get Ad-Aware&quot;&gt;Ad-Aware&lt;/a&gt; installed. Besides those, there was the antispyware that comes along with &lt;a href=&quot;http://www.zonealarm.com/&quot; title=&quot;get ZA&quot;&gt;ZoneAlarm&lt;/a&gt;. Then I tried &lt;a href=&quot;http://www.everestlabs.com/&quot; title=&quot;get SpyDefense&quot;&gt;SpyDefense&lt;/a&gt; beta. It showed a spyware called &lt;i&gt;&lt;a href=&quot;http://www.symantec.com/security_response/writeup.jsp?docid=2005-030218-4635-99&quot; title=&quot;know more about it&quot;&gt;Adware.LinkMaker&lt;/a&gt; &lt;/i&gt;&lt;span style=&quot;&quot;&gt;to be present on my system&lt;/span&gt;. After the scan, without removing the spyware I scanned using Ad-Aware, strangely it didn&#39;t show this spyware.&lt;/span&gt;</description><link>http://software-experiments.blogspot.com/2007/05/spyware.html</link><author>noreply@blogger.com (experimenter)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1082350750974915091.post-7870148234530908549</guid><pubDate>Fri, 11 May 2007 22:07:00 +0000</pubDate><atom:updated>2007-06-03T14:38:46.849+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">disk I/O</category><category domain="http://www.blogger.com/atom/ns#">explorer</category><category domain="http://www.blogger.com/atom/ns#">file handles</category><category domain="http://www.blogger.com/atom/ns#">process</category><category domain="http://www.blogger.com/atom/ns#">processes</category><category domain="http://www.blogger.com/atom/ns#">svchost</category><category domain="http://www.blogger.com/atom/ns#">system performance</category><category domain="http://www.blogger.com/atom/ns#">task manager</category><category domain="http://www.blogger.com/atom/ns#">windows</category><title>system performance, disk I/O, file handles</title><description>&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;line-height: 115%;&quot;&gt;Which process maintains the maximum &lt;a href=&quot;http://theoryx5.uwinnipeg.ca/programming/node35.html&quot; title=&quot;Know more about working with file handles&quot;&gt;file handles&lt;/a&gt;?&lt;br /&gt;&lt;br /&gt;It is reasonable to go for &lt;a href=&quot;http://www.liutilities.com/products/wintaskspro/processlibrary/explorer/&quot; title=&quot;know more about explorer.exe&quot;&gt;explorer.exe&lt;/a&gt; but the correct answer is &lt;a href=&quot;http://www.liutilities.com/products/wintaskspro/processlibrary/svchost/&quot; title=&quot;know more about svchost.exe&quot;&gt;svchost.exe&lt;/a&gt;. It is the service host process.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;line-height: 115%;&quot;&gt;For those of you who do not know about file handles and their importance, I would like to clarify a bit. First of all let me tell u this about computer performance. The performance of a computer is majorly dependent upon processor speed, available primary memory or RAM and disk access speed. Disk input/output (I/O in short) is the slowest of the three&lt;/span&gt;&lt;span style=&quot;line-height: 115%;&quot;&gt; and information on disk is stored as files. Files are accessed using streams. Imagine pipes with streams of water, which here becomes data. So file handles can be considered as the taps at the ends of those pipes. Most of the programs running on your computer needs disk I/O. For that the underlying operating systems provides them file handles to operate on the files required by them.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;line-height: 115%;&quot;&gt;It is obvious that the process that maintains the maximum number of file handles is responsible for a fairly good amount of disk I/O. We cannot say that that process contributes to maximum disk I/O because it also depends on the amount of data.&lt;/span&gt;&lt;span style=&quot;line-height: 115%;&quot;&gt; Thus in assessment of performance of your system the processes that maintain the maximum number of file handles and those that handle maximum amount of data are noteworthy. The amount of data handled by various processes varies a lot to predict. However, the number of file handles maintained by some processes remains high. These include native or system processes like explorer.exe.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;line-height: 115%;&quot;&gt;How to check the number of file handles maintained by a process?&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;line-height: 115%;&quot;&gt;The procedure is simple. Right click on task bar &lt;/span&gt;&lt;span style=&quot;line-height: 115%; font-weight: bold;font-family:Wingdings;font-size:12;&quot;  &gt;&lt;span style=&quot;&quot;&gt;&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;line-height: 115%;&quot;&gt; click on Task Manager &lt;/span&gt;&lt;span style=&quot;line-height: 115%; font-weight: bold;font-family:Wingdings;font-size:12;&quot;  &gt;&lt;span style=&quot;&quot;&gt;&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;line-height: 115%;&quot;&gt; Go to View menu &lt;/span&gt;&lt;span style=&quot;line-height: 115%;font-family:Wingdings;font-size:12;&quot;  &gt;&lt;span style=&quot;&quot;&gt;&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;line-height: 115%;&quot;&gt; Click on select columns &lt;/span&gt;&lt;span style=&quot;line-height: 115%; font-weight: bold;font-family:Wingdings;font-size:12;&quot;  &gt;&lt;span style=&quot;&quot;&gt;&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;line-height: 115%;&quot;&gt; Check on Handle Count.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwsRmfvhq3t75qVqU9Vw8CGj4wwaM0uWFKdU4s49c06qlOKsHLpNeZityYxg0KSvAeVVfwz6J-VscPUOfpZkZImK0Vfmbm6kveSKvh0CQWq3FgrfZm0P_E1EoV0EG16pL2fQZYj91p1cap/s1600-h/task.JPG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwsRmfvhq3t75qVqU9Vw8CGj4wwaM0uWFKdU4s49c06qlOKsHLpNeZityYxg0KSvAeVVfwz6J-VscPUOfpZkZImK0Vfmbm6kveSKvh0CQWq3FgrfZm0P_E1EoV0EG16pL2fQZYj91p1cap/s320/task.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5071761187358125842&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;  &lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;line-height: 115%;&quot;&gt;The Task Manager then shows the number of file handles maintained by each process in the Processes tab.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;line-height: 115%;&quot;&gt;Similarly, if we check the I/O writes option in the Select Columns menu, we can see that lsass.exe has exceptionally high number of I/O writes.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;span style=&quot;line-height: 115%;&quot;&gt;To determine, which program has a particular file or directory open you can use the tool &lt;a href=&quot;http://www.microsoft.com/technet/sysinternals/utilities/ProcessExplorer.mspx&quot; title=&quot;get ProcessExplorer&quot;&gt;ProcessExplorer&lt;/a&gt;. It is a GUI/device driver combination that shows you information about which handles and DLLs processes have opened or loaded.&lt;/span&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;span style=&quot;line-height: 115%;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;</description><link>http://software-experiments.blogspot.com/2007/05/file-handles_11.html</link><author>noreply@blogger.com (experimenter)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwsRmfvhq3t75qVqU9Vw8CGj4wwaM0uWFKdU4s49c06qlOKsHLpNeZityYxg0KSvAeVVfwz6J-VscPUOfpZkZImK0Vfmbm6kveSKvh0CQWq3FgrfZm0P_E1EoV0EG16pL2fQZYj91p1cap/s72-c/task.JPG" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1082350750974915091.post-2991763196159310873</guid><pubDate>Fri, 27 Apr 2007 05:01:00 +0000</pubDate><atom:updated>2007-05-12T03:41:46.885+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">acrobat</category><category domain="http://www.blogger.com/atom/ns#">adobe</category><category domain="http://www.blogger.com/atom/ns#">history</category><category domain="http://www.blogger.com/atom/ns#">notepad</category><category domain="http://www.blogger.com/atom/ns#">reader</category><category domain="http://www.blogger.com/atom/ns#">recent documents</category><category domain="http://www.blogger.com/atom/ns#">tricks</category><category domain="http://www.blogger.com/atom/ns#">winrar</category><title>recent documents</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family:georgia;&quot;&gt;if i open an ebook by first navigating to it and then double clicking on it, it shows up in recent documents; but if i open adobe reader then using open file option i open the ebook, it doesn&#39;t show up in recent documents. same happened in case of winrar but not in case of notepad.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</description><link>http://software-experiments.blogspot.com/2007/04/recent-documents.html</link><author>noreply@blogger.com (experimenter)</author><thr:total>0</thr:total></item></channel></rss>