<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-8967636698103377126</atom:id><lastBuildDate>Wed, 06 Nov 2024 02:56:15 +0000</lastBuildDate><category>microsoft</category><category>computer security</category><category>security</category><category>Windows</category><category>online pc support</category><category>online tech support</category><category>Anti-Spyware</category><category>cyanogenmod</category><category>flashing</category><category>opt-out</category><category>2013</category><category>21.0</category><category>320.14</category><category>Advance Notification</category><category>Beta</category><category>Drivers</category><category>GeForce</category><category>Kernel</category><category>May 2013</category><category>Microsoft Messenger</category><category>Performance-Analysis Tool</category><category>Rooting</category><category>Security Bulletin</category><category>adblock</category><category>adblock plus</category><category>battery</category><category>best pc tuneup</category><category>blocking ads</category><category>capture</category><category>cellphones</category><category>codes</category><category>complex</category><category>computer virus removal</category><category>configuration</category><category>cpu</category><category>data packets</category><category>developer preview</category><category>errors</category><category>filter</category><category>firefox</category><category>fix msse</category><category>fix security essentials</category><category>for Windows</category><category>gmail</category><category>google business</category><category>hacks</category><category>health report</category><category>homegroup</category><category>internet explorer 8</category><category>internet security</category><category>june 2013</category><category>live messenger</category><category>log</category><category>memory</category><category>messenger reviver 2</category><category>meter</category><category>mobile phone</category><category>monitoring software</category><category>mozilla</category><category>msse</category><category>nVIDIA</category><category>network</category><category>numbers</category><category>online computer support</category><category>online laptop support</category><category>online technical support</category><category>passwords</category><category>performance</category><category>portable</category><category>rom</category><category>root</category><category>signal</category><category>skype</category><category>software</category><category>spam</category><category>spyware removal. ani-virus</category><category>stweaks</category><category>tcpip</category><category>unable to install security essentials</category><category>unsubscribe.</category><category>update</category><category>uppercase</category><category>utility</category><category>virus removal</category><category>wifi</category><category>windows 7</category><category>windows 8</category><category>windows 8.1</category><category>windows blue</category><category>windows phone 7</category><category>windows phone 8</category><category>wlan</category><title>TechBetaPlus</title><description></description><link>http://techbetaplus.blogspot.com/</link><managingEditor>noreply@blogger.com (Anonymous)</managingEditor><generator>Blogger</generator><openSearch:totalResults>20</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8967636698103377126.post-530059327565027517</guid><pubDate>Fri, 06 Dec 2013 18:57:00 +0000</pubDate><atom:updated>2013-12-06T10:57:50.686-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">battery</category><category domain="http://www.blogger.com/atom/ns#">cyanogenmod</category><category domain="http://www.blogger.com/atom/ns#">flashing</category><category domain="http://www.blogger.com/atom/ns#">Kernel</category><category domain="http://www.blogger.com/atom/ns#">stweaks</category><title>Custom Kernel Can Increase Performance and Better Battery Life</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhy7gdEoUXQ2_5RU3OzaigKnfOdrMtwXXcrqaEE6ZivDyC515xcSRhIH-zERsoH1PIBEoFEF9vwLvyDFhydY0vL_Raixkeimam6O7IBFBXbZq_fkwf-CVdsa6SPCiLCUk5DE61XiqLKH-U/s1600/stweaks.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;225&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhy7gdEoUXQ2_5RU3OzaigKnfOdrMtwXXcrqaEE6ZivDyC515xcSRhIH-zERsoH1PIBEoFEF9vwLvyDFhydY0vL_Raixkeimam6O7IBFBXbZq_fkwf-CVdsa6SPCiLCUk5DE61XiqLKH-U/s400/stweaks.PNG&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
As I wrote yesterday you can breath new life in to a old device without spending a fortune on a new phone. In my post &lt;a href=&quot;http://techbetaplus.blogspot.com/2013/12/cyanogenmod-new-life-for-older-devices.html&quot; target=&quot;_blank&quot;&gt;New Life for Older Device&lt;/a&gt;s I detailed my experience in rooting and flashing a custom mod. This has turned my older, outdated phone into a powerhouse device with new features and settings that were unavailable using the stock Rom.&lt;br /&gt;
&lt;br /&gt;
Many cellphone users are plagued with the same common issue poor performance and short battery life. Even after tweaking each setting and making adjustments the battery life is still poor and at times hinders the performance of the device. For stock users some tweaks can only be made with a rooted device, and other need both a rooted device and a custom Kernel.&lt;br /&gt;
&lt;br /&gt;
On the &lt;a href=&quot;http://www.xda-developers.com/&quot; target=&quot;_blank&quot;&gt;XDA site&lt;/a&gt; there are many custom kernels that in combination with Cyanogenmod can greatly enhance both battery life and performance. I use the &lt;a href=&quot;http://www.google.com/url?sa=t&amp;amp;rct=j&amp;amp;q=&amp;amp;esrc=s&amp;amp;source=web&amp;amp;cd=1&amp;amp;cad=rja&amp;amp;ved=0CCoQFjAA&amp;amp;url=http%3A%2F%2Fforum.xda-developers.com%2Fshowthread.php%3Ft%3D2110542%26page%3D385&amp;amp;ei=hByiUoaDFuSG2wWA3oHIBw&amp;amp;usg=AFQjCNHPmtP1I6NvpyEHz21PxUEED27CEA&amp;amp;sig2=piGdUaN-U_95vA-p9amJyw&amp;amp;bvm=bv.57752919,d.b2I&quot; target=&quot;_blank&quot;&gt;AJK Kernel&lt;/a&gt; and &lt;a href=&quot;http://www.cyanogenmod.org/&quot; target=&quot;_blank&quot;&gt;Cyanogen 10.1.3&lt;/a&gt; with stweaks, this makes setting and changing different profiles easy and as an added backup you can reset profiles within the recovery mod in case you get stuck in a boot loop or the results were less that positive. making for a safe return to default settings.&lt;br /&gt;
&lt;br /&gt;
Since I am not an expert in flashing and installing roms, I leave that to you. I am providing the links for you to be able to conduct you own research and decide if this appeals to your need to update and reinvigorate your older device.</description><link>http://techbetaplus.blogspot.com/2013/12/custom-kernel-can-increase-performance.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhy7gdEoUXQ2_5RU3OzaigKnfOdrMtwXXcrqaEE6ZivDyC515xcSRhIH-zERsoH1PIBEoFEF9vwLvyDFhydY0vL_Raixkeimam6O7IBFBXbZq_fkwf-CVdsa6SPCiLCUk5DE61XiqLKH-U/s72-c/stweaks.PNG" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8967636698103377126.post-8174005763510466490</guid><pubDate>Fri, 06 Dec 2013 00:41:00 +0000</pubDate><atom:updated>2013-12-05T16:41:52.521-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">cellphones</category><category domain="http://www.blogger.com/atom/ns#">cyanogenmod</category><category domain="http://www.blogger.com/atom/ns#">flashing</category><category domain="http://www.blogger.com/atom/ns#">rom</category><category domain="http://www.blogger.com/atom/ns#">root</category><category domain="http://www.blogger.com/atom/ns#">Rooting</category><title>Cyanogenmod- New life for older devices</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivT_mrR7hTh2yZkdsZj8nNaMxIV8dEUbiPYjYrXh_iKeN6dE2Pl63IsYBseJFuX-DM6IgH7vhzyaS0vHMv1je3W9pcSLTQR0BXRleFpbNjaMtD3ZSdXITYh9u7SKaQeJHIQBhieHM2m9M/s1600/cyanogenmod_wallpaper_by_kampinis-d5z70xn.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;213&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivT_mrR7hTh2yZkdsZj8nNaMxIV8dEUbiPYjYrXh_iKeN6dE2Pl63IsYBseJFuX-DM6IgH7vhzyaS0vHMv1je3W9pcSLTQR0BXRleFpbNjaMtD3ZSdXITYh9u7SKaQeJHIQBhieHM2m9M/s320/cyanogenmod_wallpaper_by_kampinis-d5z70xn.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
I have been using the same cell phone for a number of years and was stuck using the stock rom which has not been updated in at lease a year. My Samsung Galaxy S2 I777 is running Gingerbread and Straight Talk has discounted OTA updates which renders this phone obsolete. One possible solution is to buy a new phone, some new state of the art smart phone, or flash a new rom ( which will void any warranty. ) I chose the latter.&lt;br /&gt;
&lt;a href=&quot;http://www.xda-developers.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;&lt;br /&gt;&lt;/a&gt;
 After doing some intense reading and research at both the &lt;a href=&quot;http://www.xda-developers.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;XDA Developer site&lt;/a&gt; and the &lt;a href=&quot;http://www.cyanogenmod.org/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Cyanogenmod Site&lt;/a&gt; I found the tutorial to both Root and flash a new mod for my i777 device. I don&#39;t recommend this approach unless one understands the process and the possible outcome of flashing/rooting your device. This will void your warranty and you will not be able to get support through your carrier. Rooting and flashing can also brick your device resulting in boot loops or rendering your device unbootable.&lt;br /&gt;
&lt;br /&gt;
After reading and understanding the risks you can breath new life into your device and take advantage of features and apps that your device would otherwise not have access to. Rooting and flashing can also unlock access to setting that might have been disabled due to a particular carrier. For example my carrier has disabled both tethering and the ability to change, add, or modify APN settings. I was also limited to using the Gingerbread Android OS, after flashing Cyanogenmod I am running Jellybean 4.2.2 and in a few weeks time will be able to move up to 4.3 and eventually the new kitkat 4.4.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;With the wealth of developers, wide range of cell phones and tablets and the enormous amount of research material on rooting devices you can take an old phone and teach it new tricks so to speak. If you want to save money or are like many and stuck using an older phone this can be a worth wild way to have the latest and greatest features and apps without the cost of a new smarter often more expensive phone.&lt;br /&gt;
&lt;br /&gt;
Here is a starting point if you wish to research if your device can be rooted and flashed and the tutorials in doing so. You can look here to see if your device or tablet is supported. &lt;a href=&quot;http://download.cyanogenmod.org/&quot; target=&quot;_blank&quot;&gt;Device Support List&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
1) &lt;a href=&quot;http://www.xda-developers.com/&quot; target=&quot;_blank&quot;&gt;XDA Develpoers&lt;/a&gt;&lt;br /&gt;
2) &lt;a href=&quot;http://www.cyanogenmod.org/&quot; target=&quot;_blank&quot;&gt;Cyanogenmod&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;</description><link>http://techbetaplus.blogspot.com/2013/12/cyanogenmod-new-life-for-older-devices.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivT_mrR7hTh2yZkdsZj8nNaMxIV8dEUbiPYjYrXh_iKeN6dE2Pl63IsYBseJFuX-DM6IgH7vhzyaS0vHMv1je3W9pcSLTQR0BXRleFpbNjaMtD3ZSdXITYh9u7SKaQeJHIQBhieHM2m9M/s72-c/cyanogenmod_wallpaper_by_kampinis-d5z70xn.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8967636698103377126.post-7506442856197575353</guid><pubDate>Tue, 14 May 2013 15:52:00 +0000</pubDate><atom:updated>2013-05-14T08:52:41.766-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">21.0</category><category domain="http://www.blogger.com/atom/ns#">firefox</category><category domain="http://www.blogger.com/atom/ns#">health report</category><category domain="http://www.blogger.com/atom/ns#">mozilla</category><category domain="http://www.blogger.com/atom/ns#">performance</category><category domain="http://www.blogger.com/atom/ns#">security</category><category domain="http://www.blogger.com/atom/ns#">update</category><title>Improved Preformance and Privacy in Firefox 21.0</title><description>&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHd_aX_VvFW5lZcxNlkzvotKdI38aW9Hp1_OV65FJ0eTNgxJkIt9cBL_j-_G8N9xmGoIng0C1cSCQanpQcvXmWovMGsjeMOJCIkjKNVF3z8KtTDbODOYiLr-KTgSDAeO6rnaBkQZmuTmE/s1600/Firefox-600x424.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot; title=&quot; &quot;&gt;&lt;img border=&quot;0&quot; height=&quot;226&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHd_aX_VvFW5lZcxNlkzvotKdI38aW9Hp1_OV65FJ0eTNgxJkIt9cBL_j-_G8N9xmGoIng0C1cSCQanpQcvXmWovMGsjeMOJCIkjKNVF3z8KtTDbODOYiLr-KTgSDAeO6rnaBkQZmuTmE/s320/Firefox-600x424.jpg&quot; title=&quot; &quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Improved Preformance and Privacy in Firefox 21.0&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&amp;nbsp;Mozilla has released &lt;a href=&quot;http://ftp.mozilla.org/pub/mozilla.org/firefox/releases/21.0/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Firefox 21.0&lt;/a&gt; Final,
 a major new version of its cross-platform, open-source web browser for 
Windows, Mac and Linux. Version 21 gives users more control over their 
tracking cookie preferences, extends the social API to support four new 
providers and implements support for tools to help with troubleshooting 
and performance issues.&lt;br /&gt;
&lt;br /&gt;
Also included in this release are improvements to its Do Not Track Feature, users now have three options via the Privacy tab of Firefox’s Options dialog. The default &quot;user says nothing&quot; and &quot;user says don’t track&quot; have now been 
joined by a &quot;Tell sites that I want to be tracked&quot; option for those who wish to allow tracking in order to see more personally relevant 
advertising.&lt;br /&gt;
&lt;br /&gt;
Mozilla has also improved Firefox&#39;s Social API to support new providers. Users now have the option to add Asian social providers &lt;a href=&quot;http://mixi.jp/&quot; target=&quot;_blank&quot;&gt;Mixi&lt;/a&gt; and &lt;a href=&quot;http://www.weibo.com/&quot; target=&quot;_blank&quot;&gt;Weibo&lt;/a&gt;, plus news aggregators &lt;a href=&quot;https://now.msn.com/now-for-firefox&quot; target=&quot;_blank&quot;&gt;msnNOW&lt;/a&gt; and &lt;a href=&quot;https://mozsocial.cliqz.com/&quot; target=&quot;_blank&quot;&gt;Cliqz&lt;/a&gt;. Once installed, users switch between providers by clicking the main button and selecting the chosen provider from the list.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;Lastly is this author&#39;s personal favorite the new Firefox Health Report. A tool that provides information designed to improve browser performance
 while also sharing data with Mozilla, This can be disabled for those that do not wish to share data with Mozilla, Options dialog -- select Advanced &amp;gt; 
Data Choices tab to do so. Firefox will also monitor start-up times and alert users via the status bar of slow start times and offer a link to a &lt;a href=&quot;https://support.mozilla.org/en-US/kb/firefox-takes-long-time-start-up&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;web site which will offer advise on how to improve start up speed&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6mXUjBAq3FvOq6y-EcTtVu8zqRcr6HgCprULTrkn8Pquo2sTZxFV8twIFhyphenhyphenpyR7eaReWjBo_MmTdOIFuuGUplMYHXjfX7oZJNyj6u22km44nRh6KA9YLDxbqhpDPlLesjN2q1ykBmxUU/s1600/ffhealthreport.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;221&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6mXUjBAq3FvOq6y-EcTtVu8zqRcr6HgCprULTrkn8Pquo2sTZxFV8twIFhyphenhyphenpyR7eaReWjBo_MmTdOIFuuGUplMYHXjfX7oZJNyj6u22km44nRh6KA9YLDxbqhpDPlLesjN2q1ykBmxUU/s400/ffhealthreport.PNG&quot; title=&quot; &quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
Version 21.0 update also comes with the promise of improved graphics performance, the implementation of &lt;a href=&quot;http://anton.kovalyov.net/2013/02/22/remote-profiling/&quot; target=&quot;_blank&quot;&gt;Remote Profiling&lt;/a&gt;
 for developers and the removal of support for certain depreciated 
History APIs as part of Firefox’s drive towards asynchronous History and
 Bookmarks. &lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.mozilla.org/en-US/products/download.html?product=firefox-21.0&amp;amp;os=win&amp;amp;lang=en-US&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Download FireFox 21.0&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;</description><link>http://techbetaplus.blogspot.com/2013/05/improved-preformance-and-privacy-in.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHd_aX_VvFW5lZcxNlkzvotKdI38aW9Hp1_OV65FJ0eTNgxJkIt9cBL_j-_G8N9xmGoIng0C1cSCQanpQcvXmWovMGsjeMOJCIkjKNVF3z8KtTDbODOYiLr-KTgSDAeO6rnaBkQZmuTmE/s72-c/Firefox-600x424.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8967636698103377126.post-7282328007935645972</guid><pubDate>Mon, 13 May 2013 20:06:00 +0000</pubDate><atom:updated>2013-05-13T13:06:28.850-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">320.14</category><category domain="http://www.blogger.com/atom/ns#">Beta</category><category domain="http://www.blogger.com/atom/ns#">Drivers</category><category domain="http://www.blogger.com/atom/ns#">for Windows</category><category domain="http://www.blogger.com/atom/ns#">GeForce</category><category domain="http://www.blogger.com/atom/ns#">nVIDIA</category><title>nVIDIA GeForce Drivers for Windows 320.14 Beta </title><description>&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXow3zcZZiCqoljNDxDW4udGTLU_pfvwp5LejpMn_FhIgKA_oKsBnD5rX9Aq1Ze9I6Eky4fkGDEqTp7sAoQPINVn_OlVZ4x7Txy0uZxFMZno6jSIzOHYdbdvw8_-hcE_NLwbxlYb5mxdU/s1600/nVidia.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;213&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXow3zcZZiCqoljNDxDW4udGTLU_pfvwp5LejpMn_FhIgKA_oKsBnD5rX9Aq1Ze9I6Eky4fkGDEqTp7sAoQPINVn_OlVZ4x7Txy0uZxFMZno6jSIzOHYdbdvw8_-hcE_NLwbxlYb5mxdU/s320/nVidia.PNG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;nVIDIA GeForce Drivers for Windows 320.14 Beta&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;br /&gt;
Recommended driver for Nvidia cards. It is Microsoft WHQL-certified and will also be available for download via Windows Update.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;nVIDIA GeForce Drivers for Windows 320.14 Beta&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span&gt;Latest Changes&lt;/span&gt;&lt;/b&gt;
                                                    
                  &lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;- Performance Boost – 
Increases performance by up to 20% for GeForce 400/500/600 series GPUs 
in several PC games vs. GeForce 314.22 WHQL-certified drivers. Results 
will vary depending on your GPU and system configuration. Here is one 
example of measured ga&lt;/li&gt;
&lt;li&gt;
                  
                                                                      
                  &lt;/li&gt;
&lt;li&gt;- GeForce GTX 660: ?Up to 20% in Dirt: Showdown&lt;/li&gt;
&lt;li&gt;
                  
                                                                      
                  &lt;/li&gt;
&lt;li&gt;- Up to 18% in Tomb Raider&lt;/li&gt;
&lt;li&gt;
                  
                                                                      
                  &lt;/li&gt;
&lt;li&gt;- Up to 10% in Metro: Last Light&lt;/li&gt;
&lt;li&gt;
                  
                                                                      
                  &lt;/li&gt;
&lt;li&gt;- Up to 8% in StarCraft II&lt;/li&gt;
&lt;li&gt;
                  
                                                                      
                  &lt;/li&gt;
&lt;li&gt;- Up to 6% in Sniper Elite V2&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.nvidia.com/Download/Find.aspx?lang=en-us&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Download nVidia Drivers &lt;/a&gt;</description><link>http://techbetaplus.blogspot.com/2013/05/nvidia-geforce-drivers-for-windows.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXow3zcZZiCqoljNDxDW4udGTLU_pfvwp5LejpMn_FhIgKA_oKsBnD5rX9Aq1Ze9I6Eky4fkGDEqTp7sAoQPINVn_OlVZ4x7Txy0uZxFMZno6jSIzOHYdbdvw8_-hcE_NLwbxlYb5mxdU/s72-c/nVidia.PNG" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8967636698103377126.post-1697142686569436852</guid><pubDate>Mon, 13 May 2013 20:02:00 +0000</pubDate><atom:updated>2013-05-13T13:02:13.065-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">meter</category><category domain="http://www.blogger.com/atom/ns#">network</category><category domain="http://www.blogger.com/atom/ns#">signal</category><category domain="http://www.blogger.com/atom/ns#">utility</category><category domain="http://www.blogger.com/atom/ns#">wifi</category><category domain="http://www.blogger.com/atom/ns#">wlan</category><title>Homedale:WLAN Monitor WIFI access Points</title><description>&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwVYnSI4n0pECTI5mzhOOgSAnUiNcpl3dFuLaKMBihAo4yG4XZsD9UDhi5_GBSBe9GtV0ijFTb0FlzpMNOxjbrG3H0oHw1KbxxAZ6Wr0-GeJQtFR1NhOiAdxP3ZGfsZjSNINAZSUrCeOQ/s1600/HomeDale.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;221&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwVYnSI4n0pECTI5mzhOOgSAnUiNcpl3dFuLaKMBihAo4yG4XZsD9UDhi5_GBSBe9GtV0ijFTb0FlzpMNOxjbrG3H0oHw1KbxxAZ6Wr0-GeJQtFR1NhOiAdxP3ZGfsZjSNINAZSUrCeOQ/s400/HomeDale.PNG&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Homedale::WLAN Monitor&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;br /&gt;
Homedale lets you search for Wi-Fi / WLAN Access Points and monitor 
their signal strength. See an overview of all available access points 
with their signal strength, encryption [WEP/WPA/WPA2], speed and 
channel. You can also monitor the signal strength of selected access 
points in a graph over the time. With a right mouse click, you can start
 logging to a text file and create a screenshot. Make a right mouse 
click to connect and disconnect from a WLAN access point.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;section_left section_text&quot;&gt;
   &lt;h2&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;Signal Strength&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;div class=&quot;text&quot;&gt;
    You can also monitor the signal strength of selected access points 
in a graph over the time. With a right mouse click, you can start 
logging to a text file and create a screenshot.
   &lt;/div&gt;
&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;section_left section_text&quot;&gt;
&lt;div class=&quot;section_right section_text&quot;&gt;
   &lt;h2&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;Connect&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;div class=&quot;text&quot;&gt;
    Make a right mouse click to connect and disconnect from a WLAN 
access point. The blue icon shows the currently connected access point.
   &lt;/div&gt;
&lt;/div&gt;
&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;section_left section_text&quot;&gt;
Download&amp;nbsp;&lt;a href=&quot;http://thesz.diecru.eu/data/get.php?file=Homedale.zip&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Homedale.zip&lt;/a&gt; &lt;/div&gt;
</description><link>http://techbetaplus.blogspot.com/2013/05/homedalewlan-monitor-wifi-access-points.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwVYnSI4n0pECTI5mzhOOgSAnUiNcpl3dFuLaKMBihAo4yG4XZsD9UDhi5_GBSBe9GtV0ijFTb0FlzpMNOxjbrG3H0oHw1KbxxAZ6Wr0-GeJQtFR1NhOiAdxP3ZGfsZjSNINAZSUrCeOQ/s72-c/HomeDale.PNG" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8967636698103377126.post-3877302231017294895</guid><pubDate>Fri, 10 May 2013 20:50:00 +0000</pubDate><atom:updated>2013-05-10T13:50:35.647-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">capture</category><category domain="http://www.blogger.com/atom/ns#">data packets</category><category domain="http://www.blogger.com/atom/ns#">log</category><category domain="http://www.blogger.com/atom/ns#">monitoring software</category><category domain="http://www.blogger.com/atom/ns#">portable</category><category domain="http://www.blogger.com/atom/ns#">tcpip</category><category domain="http://www.blogger.com/atom/ns#">Windows</category><title>Monitor and Log TCP Connections With TcpLogView</title><description>&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3ShGhTOQ3-5P1URZawOjk3KxwCXcoz3lTadBYu7mEy5AQoGS-S1AhfTHCw000CW_UzztzTEBE05K9vkkFLGkq3ntSuYxgKYV342l4PopTOr_vw-NRGsdi5p2dinKdZnQA0rcpj66n7ds/s1600/tcplogview.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;273&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3ShGhTOQ3-5P1URZawOjk3KxwCXcoz3lTadBYu7mEy5AQoGS-S1AhfTHCw000CW_UzztzTEBE05K9vkkFLGkq3ntSuYxgKYV342l4PopTOr_vw-NRGsdi5p2dinKdZnQA0rcpj66n7ds/s320/tcplogview.PNG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Monitor and Log TCP Connections With TcpLogView&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
TcpLogView is a free connection monitoring softwar&lt;strong&gt;e&lt;/strong&gt;
 for Windows. You can use TcpLogView to monitor and log TCP connections. When a process on your system creates a connection, both the process name
 and the location where it has connected will be logged.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TcpLogView is portable, you can use it from a USB flash drive 
for example. Without any active TCP connections on startup, the list 
that you see will be empty. As soon as you start an application that 
establishes an online connection, you should see new events being logged
 inside TcpLogView.&lt;br /&gt;
&lt;br /&gt;
&lt;h4 class=&quot;utilsubject&quot;&gt;
System Requirements &amp;amp; Limitations&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;This utility works on any version of Windows, starting from Windows 2000 and up to Windows 8. 
On 64-bit systems, you should use the x64 build of TcpLogView.
&lt;/li&gt;
&lt;li&gt;This utility creates the TCP log by taking a snapshot of 
currently open TCP connections, and comparing it to the previous 
snapshot.
This means that if a TCP connection is opened for a very short time, 
then TcpLogView will not be able to capture it.
&lt;/li&gt;
&lt;li&gt;On Windows Vista/7/8 with UAC turned on, you should run TcpLogView as administrator if you want to get full process information.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
Download links:&lt;br /&gt;
&lt;br /&gt;
&lt;table border=&quot;0&quot; cellpadding=&quot;10&quot; style=&quot;width: 100%px;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td align=&quot;center&quot;&gt;&lt;a class=&quot;downloadline&quot; href=&quot;http://www.nirsoft.net/utils/tcplogview.zip&quot;&gt;Download TcpLogView&lt;/a&gt;


&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td align=&quot;center&quot;&gt;
&lt;a class=&quot;downloadline&quot; href=&quot;http://www.nirsoft.net/utils/tcplogview-x64.zip&quot;&gt;Download TcpLogView for 64-bit systems&lt;/a&gt;

&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&amp;nbsp;
&lt;br /&gt;
</description><link>http://techbetaplus.blogspot.com/2013/05/monitor-and-log-tcp-connections-with.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3ShGhTOQ3-5P1URZawOjk3KxwCXcoz3lTadBYu7mEy5AQoGS-S1AhfTHCw000CW_UzztzTEBE05K9vkkFLGkq3ntSuYxgKYV342l4PopTOr_vw-NRGsdi5p2dinKdZnQA0rcpj66n7ds/s72-c/tcplogview.PNG" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8967636698103377126.post-4943327247763681215</guid><pubDate>Fri, 10 May 2013 04:58:00 +0000</pubDate><atom:updated>2013-05-09T22:11:07.156-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Advance Notification</category><category domain="http://www.blogger.com/atom/ns#">May 2013</category><category domain="http://www.blogger.com/atom/ns#">microsoft</category><category domain="http://www.blogger.com/atom/ns#">security</category><category domain="http://www.blogger.com/atom/ns#">Security Bulletin</category><title>Microsoft Security Bulletin Advance Notification for May 2013</title><description>&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBJNxDQbdA38IzkiKljjn7zilmOXRVRH6MaZHzE_eEAtgvzOaYl6mjKI-4foFGzJ-BV0f5OGIAYpGdCZCVdMeLg4f0GvpJVb3AimAD_4Bb0QFY94nnTkAeuto0q0K82YDhejXFC0c5W9M/s1600/patch-bandaid-sp1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBJNxDQbdA38IzkiKljjn7zilmOXRVRH6MaZHzE_eEAtgvzOaYl6mjKI-4foFGzJ-BV0f5OGIAYpGdCZCVdMeLg4f0GvpJVb3AimAD_4Bb0QFY94nnTkAeuto0q0K82YDhejXFC0c5W9M/s1600/patch-bandaid-sp1.jpg&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Microsoft Security Bulletin Advance Notification for May 2013&lt;/td&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
Microsoft Security Bulletin Advance Notification for May 2013
Issued: May 9, 2013&lt;br /&gt;
&lt;br /&gt;
This is an advance notification of security bulletins that 
Microsoft is intending to release on May 14, 2013.

The full version of the Microsoft Security Bulletin Advance 
Notification for May 2013 can be found at 
&lt;a href=&quot;http://technet.microsoft.com/security/bulletin/ms13-may&quot;&gt;http://technet.microsoft.com/security/bulletin/ms13-may&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
This bulletin advance notification will be replaced with the 
May bulletin summary on May 14, 2013. For more 
information about the bulletin advance notification service, see 
&lt;a href=&quot;http://technet.microsoft.com/security/bulletin/advance&quot;&gt;http://technet.microsoft.com/security/bulletin/advance&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
To receive automatic notifications whenever Microsoft Security 
Bulletins are issued, subscribe to Microsoft Technical Security 
Notifications on 
&lt;a href=&quot;http://technet.microsoft.com/security/dd252948&quot;&gt;http://technet.microsoft.com/security/dd252948&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
Microsoft will host a webcast to address customer questions on 
these bulletins on May 15, 2013, at 11:00 AM Pacific Time 
(US &amp;amp; Canada). Register for the Security Bulletin Webcast at 
&lt;a href=&quot;http://technet.microsoft.com/security/bulletin&quot;&gt;http://technet.microsoft.com/security/bulletin&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
Microsoft plans to release 10 security patches May 15th 2013;&lt;br /&gt;
&lt;br /&gt;
2 Rated Critical (Internet Explorer)&lt;br /&gt;
8 Rated Important. (2x Windows, 3x Office, 1x lync, 1x .net, and 1x MSSE)&lt;br /&gt;
&lt;br /&gt;
As with all updates make sure to set a restore point and back up all data prior to downloading and installing these updates to prevent loss of data. </description><link>http://techbetaplus.blogspot.com/2013/05/microsoft-security-bulletin-advance.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBJNxDQbdA38IzkiKljjn7zilmOXRVRH6MaZHzE_eEAtgvzOaYl6mjKI-4foFGzJ-BV0f5OGIAYpGdCZCVdMeLg4f0GvpJVb3AimAD_4Bb0QFY94nnTkAeuto0q0K82YDhejXFC0c5W9M/s72-c/patch-bandaid-sp1.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8967636698103377126.post-3254941011120646324</guid><pubDate>Thu, 09 May 2013 19:39:00 +0000</pubDate><atom:updated>2013-05-09T12:39:46.097-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">computer security</category><category domain="http://www.blogger.com/atom/ns#">cpu</category><category domain="http://www.blogger.com/atom/ns#">memory</category><category domain="http://www.blogger.com/atom/ns#">microsoft</category><category domain="http://www.blogger.com/atom/ns#">Performance-Analysis Tool</category><category domain="http://www.blogger.com/atom/ns#">windows 7</category><category domain="http://www.blogger.com/atom/ns#">windows 8</category><title>PerfView Performance-Analysis Tool For isolating CPU and Memory-Related Performance Issues</title><description>&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEje4cQfMny1yq2dobycAk9w98edvy_AgQn-fjqjFIcOq-2dZU-ISQcOlrDCsBkcfluDD1keZtXgrawpIGsObdfG9t8HPVaJJrBtfCbTdU0I1c1nA7S7xkSCSY9-TTR27Z55XnK_I-EyWJo/s1600/perfview2.gif&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;199&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEje4cQfMny1yq2dobycAk9w98edvy_AgQn-fjqjFIcOq-2dZU-ISQcOlrDCsBkcfluDD1keZtXgrawpIGsObdfG9t8HPVaJJrBtfCbTdU0I1c1nA7S7xkSCSY9-TTR27Z55XnK_I-EyWJo/s320/perfview2.gif&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;PerfView Performance-Analysis Tool For isolating CPU and memory-related performance issues&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;br /&gt;
PerfView is a performance analysis tool focusing on ETW information (ETL
 files) as well as CLR memory information (heap dumps). It can collect 
and view ETL files as well as XPERF CSV files. Powerful grouping 
operators allow you to understand performance profiles in ways other 
tools can&#39;t. PerfView is used internally at Microsoft by a number of 
teams and is the primary performance investigation tool on the .NET 
Runtime team. Features include:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Non-invasive collection - suitable for use in live, production environments&lt;/li&gt;
&lt;li&gt;Xcopy deployment - copy and run&lt;/li&gt;
&lt;li&gt;Memory&lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;Support for very large heaps (gigabytes)&lt;/li&gt;
&lt;li&gt;Snapshot diffing&lt;/li&gt;
&lt;li&gt;Dump files (.dmp)&lt;/li&gt;
&lt;/ul&gt;
&lt;li&gt;CPU Performance&lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;Support for managed, native, and mixed code&lt;/li&gt;
&lt;li&gt;Can read XPerf logs&lt;/li&gt;
&lt;li&gt;Profile diffing&lt;/li&gt;
&lt;/ul&gt;
&lt;/ul&gt;
&lt;br /&gt;
Updates in the 1.4.1.0 version include:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Added more /StopOn* options for stopping the circular buffer when paritcular events happen.&lt;/li&gt;
&lt;li&gt;Support for events logged with WPP Software Tracing (place TMF files in an TMF directory)&lt;/li&gt;
&lt;/ul&gt;
&lt;a href=&quot;http://download.microsoft.com/download/5/C/C/5CCCFF9B-08C4-4352-9DBF-DF44E3A2E9EA/PerfView.zip&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Download PerfView&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &lt;br /&gt;
&lt;ul&gt;
&lt;/ul&gt;
</description><link>http://techbetaplus.blogspot.com/2013/05/perfview-performance-analysis-tool-for.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEje4cQfMny1yq2dobycAk9w98edvy_AgQn-fjqjFIcOq-2dZU-ISQcOlrDCsBkcfluDD1keZtXgrawpIGsObdfG9t8HPVaJJrBtfCbTdU0I1c1nA7S7xkSCSY9-TTR27Z55XnK_I-EyWJo/s72-c/perfview2.gif" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8967636698103377126.post-4632648842421964049</guid><pubDate>Thu, 09 May 2013 15:43:00 +0000</pubDate><atom:updated>2013-05-09T08:46:11.864-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">computer security</category><category domain="http://www.blogger.com/atom/ns#">internet explorer 8</category><category domain="http://www.blogger.com/atom/ns#">microsoft</category><category domain="http://www.blogger.com/atom/ns#">opt-out</category><category domain="http://www.blogger.com/atom/ns#">security</category><category domain="http://www.blogger.com/atom/ns#">Windows</category><title>Microsoft Puts A bandaid On IE8, Users Are Still Advised to Upgrade to IE10</title><description>&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZkoXoxt2NVQvLfeWMg8Boe8GdjpON3Df-zm02MzL-xUxXeKlN32hUE1gFvzddR5ZUJi79mZTT-cKGkXb6EqyVALlApXyH3jqcA73Zd642-42K-khCFDJknEg7Mor4npaSURO3p_UcVCw/s1600/ie8rtm.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZkoXoxt2NVQvLfeWMg8Boe8GdjpON3Df-zm02MzL-xUxXeKlN32hUE1gFvzddR5ZUJi79mZTT-cKGkXb6EqyVALlApXyH3jqcA73Zd642-42K-khCFDJknEg7Mor4npaSURO3p_UcVCw/s320/ie8rtm.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Microsoft Puts A bandaid On IE8, Users Are Still Advised to Upgrade to IE10&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.microsoft.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Microsoft &lt;/a&gt;has issued an &lt;a href=&quot;http://technet.microsoft.com/en-us/security/advisory/2847140&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;advisory&lt;/a&gt;, and&amp;nbsp;&lt;a href=&quot;http://support.microsoft.com/kb/2847140&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt; &quot;Fix it&quot; &lt;/a&gt;for &lt;a href=&quot;http://en.wikipedia.org/wiki/Internet_explorer_8&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Internet Explorer 8&lt;/a&gt;. However it&#39;s&amp;nbsp; more a temporary stop-gap than a real resolution for the flaw. Microsoft stresses that &quot;CVE-2013-1347 MSHTML Shim Workaround&quot; is &quot;not 
intended to be a replacement for any security update&quot;. This Fix It can 
also be disabled if for some reason you have an issue with it.&lt;br /&gt;
&lt;br /&gt;
The vulnerability is a remote code execution vulnerability. The 
vulnerability exists in the way that Internet Explorer accesses an 
object in memory that has been deleted or has not been properly 
allocated. The vulnerability may corrupt memory in a way that could 
allow an attacker to execute arbitrary code in the context of the 
current user within Internet Explorer. An attacker could host a 
specially crafted website that is designed to exploit this vulnerability
 through Internet Explorer and then convince a user to view the website.&lt;br /&gt;
&lt;br /&gt;
The vulnerability does not affect Internet Explorer 6, Internet Explorer 7, Internet Explorer 9, and Internet Explorer 10.
&lt;br /&gt;
&lt;br /&gt;</description><link>http://techbetaplus.blogspot.com/2013/05/microsoft-puts-bandaid-on-ie8-user-are.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZkoXoxt2NVQvLfeWMg8Boe8GdjpON3Df-zm02MzL-xUxXeKlN32hUE1gFvzddR5ZUJi79mZTT-cKGkXb6EqyVALlApXyH3jqcA73Zd642-42K-khCFDJknEg7Mor4npaSURO3p_UcVCw/s72-c/ie8rtm.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8967636698103377126.post-7903694568749311114</guid><pubDate>Thu, 09 May 2013 04:57:00 +0000</pubDate><atom:updated>2013-05-08T22:11:48.481-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">complex</category><category domain="http://www.blogger.com/atom/ns#">numbers</category><category domain="http://www.blogger.com/atom/ns#">passwords</category><category domain="http://www.blogger.com/atom/ns#">security</category><category domain="http://www.blogger.com/atom/ns#">uppercase</category><title>Change Your Password Lately? You Should</title><description>&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAXB-NCsA7OF8cVl9rJnzpVA04oA4Swn3f78sO7Dpi_V3a69uxwQbrDxLP9oA35gfqAFnjfJFWDYIO1t-ur53Pys5CRj5RRxiukHhlBk9zfdZUtuTsImybnBgnWwZzhZPqHwjMrN4lVQM/s1600/password.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;144&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAXB-NCsA7OF8cVl9rJnzpVA04oA4Swn3f78sO7Dpi_V3a69uxwQbrDxLP9oA35gfqAFnjfJFWDYIO1t-ur53Pys5CRj5RRxiukHhlBk9zfdZUtuTsImybnBgnWwZzhZPqHwjMrN4lVQM/s320/password.PNG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Change Your Password Lately? You Should&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
I get calls, support tickets, and family telling my that &quot;My computer has been hacked, or my Facebook has be broken into. This is more common that one would think and my question is alway;&lt;br /&gt;
&lt;br /&gt;
Have you changed your password lately?&lt;br /&gt;
&lt;br /&gt;
As long as there have been computers there have been passwords to login to them. Many people including persons in IT use common non-complex passwords often using 123456, password, or the street for which they live.&lt;br /&gt;
&lt;br /&gt;
Intel&#39;s blog notes that &lt;a href=&quot;http://iq.intel.com/iq/32516800/change-your-password-day-is-your-password-hackable&quot; target=&quot;_blank&quot;&gt;length is more important than complexity&lt;/a&gt;
 when choosing a password: &quot;The password &#39;Br3ak1ead&amp;amp;7&#39; would take a 
computer three days to crack, at 1,000 guesses per second. Meanwhile, 
the seemingly simple &#39;thunder showers before sunset&#39; password, would 
take the same computer, guessing at the same rate, 550 years to crack.&quot;&amp;nbsp; Using strong passwords is highly recommended, password that contain uppercase letters, punctuation and numbers are a good start but as noted above length is often better than complexity.&lt;br /&gt;
&lt;br /&gt;
I always suggest that the person write out a long sentence using a familiar verse, quote or line in a movie, then take the first letter from each word and substitute uppercase, numbers, and punctuation.&lt;br /&gt;
&lt;br /&gt;
Example: I grew up in Novato, California and went to high school at Live Oak.&lt;br /&gt;
&lt;br /&gt;
password would be:&amp;nbsp; IguiNCawthsalo.&lt;br /&gt;
&lt;br /&gt;
You could take it a step further and sub a few letters for numbers as such,&lt;br /&gt;
&lt;br /&gt;
new password:&amp;nbsp; Igu1NCawth5alo.&lt;br /&gt;
&lt;br /&gt;
In this example I subbed the lowercase i for a 1, and the letter s for a 5. As you can see this is a very complex password however as noted in the Intel article a better solution would be a longer ramdom password. Both methods have their strong points as well as weaknesses you can check your examples here using &lt;a href=&quot;http://www.intel.com/content/www/us/en/security/passwordwin.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Intel password checking tool &lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
My example password Igu1NCawth5alo. when tested using the Intel tool gives the following results;
&lt;br /&gt;
CONGRATULATIONS, It would take &lt;span id=&quot;u1306-4&quot;&gt;about 6858401 years&lt;/span&gt;&amp;nbsp;to crack your password.
&lt;br /&gt;&lt;br /&gt;
</description><link>http://techbetaplus.blogspot.com/2013/05/change-your-password-lately-you-should.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAXB-NCsA7OF8cVl9rJnzpVA04oA4Swn3f78sO7Dpi_V3a69uxwQbrDxLP9oA35gfqAFnjfJFWDYIO1t-ur53Pys5CRj5RRxiukHhlBk9zfdZUtuTsImybnBgnWwZzhZPqHwjMrN4lVQM/s72-c/password.PNG" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8967636698103377126.post-5760144966073530332</guid><pubDate>Wed, 08 May 2013 19:55:00 +0000</pubDate><atom:updated>2013-05-08T12:55:13.981-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">filter</category><category domain="http://www.blogger.com/atom/ns#">gmail</category><category domain="http://www.blogger.com/atom/ns#">google business</category><category domain="http://www.blogger.com/atom/ns#">opt-out</category><category domain="http://www.blogger.com/atom/ns#">spam</category><category domain="http://www.blogger.com/atom/ns#">unsubscribe.</category><title>Rid Your Inbox of Unwanted Subscriptions: Unroll.Me</title><description>&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiu49ksMILfkWI0QxC5zHPvOm6YuY7NK_1IdknRwY_iifUZDXbMpmrrdkhb5vnc1WyIo3sHL_hBvMecTQKhic90rhDK6MN2d1dwqTwQm8yKH7BvZBlC-K2AqLp7oQ8slFZSKQV7EhBw1ZA/s1600/Unsubscribeme.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;141&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiu49ksMILfkWI0QxC5zHPvOm6YuY7NK_1IdknRwY_iifUZDXbMpmrrdkhb5vnc1WyIo3sHL_hBvMecTQKhic90rhDK6MN2d1dwqTwQm8yKH7BvZBlC-K2AqLp7oQ8slFZSKQV7EhBw1ZA/s320/Unsubscribeme.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Rid Your Inbox of Unwanted Subscriptions: Unroll.Me&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;br /&gt;
If you are like many your receive tons of subscriptions you don&#39;t want, and even some you do. This can become a hassle and clutter your inbox with tons of unwanted subscriptions and spam. It is very time consuming to open each email, select unsubscribe and with most have to wait 1-3 days for the action to fully unsubscribe your from their mailing list.&lt;br /&gt;
&lt;br /&gt;
In comes Unroll.Me, a very easy, quick solution that takes the hassle out of opting out and is currently only compatible with Gmail including Google Apps for Business. Goto &lt;a href=&quot;http://unroll.me/&quot;&gt;Unroll.Me&lt;/a&gt; and login. Once you login you are presented with the option to scan your inbox, this process can take a few minutes.&lt;br /&gt;
&lt;br /&gt;
When the scan is complete you are given two options to unsubscribe, or rollup. If you selecte unsubscribe Unroll.Me will take of it. If you select Rollup, the subscription will be added to your daily rollup and delivered to you once a day. Users can choose when and how to receive the bulk emails, in the 
morning, afternoon or evening and in grid or list view, as well as 
manage the rollup and re-subscribe in case of a change of heart. &lt;br /&gt;
&lt;br /&gt;
That is all it takes, now your once cluttered inbox is now a pleasant place to visit.</description><link>http://techbetaplus.blogspot.com/2013/05/rid-your-inbox-of-unwanted.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiu49ksMILfkWI0QxC5zHPvOm6YuY7NK_1IdknRwY_iifUZDXbMpmrrdkhb5vnc1WyIo3sHL_hBvMecTQKhic90rhDK6MN2d1dwqTwQm8yKH7BvZBlC-K2AqLp7oQ8slFZSKQV7EhBw1ZA/s72-c/Unsubscribeme.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8967636698103377126.post-4255643064260242891</guid><pubDate>Wed, 08 May 2013 05:04:00 +0000</pubDate><atom:updated>2013-05-07T22:04:37.862-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">live messenger</category><category domain="http://www.blogger.com/atom/ns#">messenger reviver 2</category><category domain="http://www.blogger.com/atom/ns#">Microsoft Messenger</category><category domain="http://www.blogger.com/atom/ns#">skype</category><title>Bring Back Messenger and Rid Yourself of Skype</title><description>A few weeks back Microsoft merged Messenger and Skype in to a single package and flipped the switch on Messenger forcing users to use the new client. A fan of the old Messenger and not wanting to use Skype I found a way to install Messenger without having to use the merged client.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://messengergeek.wordpress.com/2013/04/23/use-messenger-reviver-2-to-bring-back-messenger-and-beat-skype/&quot; target=&quot;_blank&quot;&gt;Messenger Reviver 2&lt;/a&gt;
 automatically installs, repairs and/or modifies Windows Live Messenger 
2012, 2011, 2009, and 2008 (as well as Windows Messenger) so you can 
continue using and signing in to the old service.&lt;br /&gt;
&lt;br /&gt;
You can download &lt;a href=&quot;http://messenger.jonathankay.com/redir/messengerreviver2dl.asp&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Messenger Reviver 2 here &lt;/a&gt;and there is also a zipped version you may download &lt;a href=&quot;http://messenger.jonathankay.com/redir/messengerreviver2dlzip.asp&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt; if your anti-virus or other security tools is blocking your download.&lt;br /&gt;
&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvo08UD7b7ZieUVaIkotMo9qhQ47ZNj77mwv5yrb5zvZj3e41iVzf7vJMMCOlag8eCREBHci_T6FHBmGkbJPxLZJJJgcZT15yzgB1dL7RAoApAftdampNOdSpZgLiY3qA09e1txuG2wcQ/s1600/messenger.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;177&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvo08UD7b7ZieUVaIkotMo9qhQ47ZNj77mwv5yrb5zvZj3e41iVzf7vJMMCOlag8eCREBHci_T6FHBmGkbJPxLZJJJgcZT15yzgB1dL7RAoApAftdampNOdSpZgLiY3qA09e1txuG2wcQ/s320/messenger.PNG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Messenger Reviver 2: Install Messenger without Skype&lt;/td&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
Once you download and install the program double click the program to start, and it will detect all installed versions of Messenger 
and give you the option to revive them. You can then sign in and use Messenger as if Skype never happened.&lt;br /&gt;
&lt;br /&gt;
This is a great alternative for those that do not like to be force feed a newer version that includes Skype. Although not a long time fix as rumors go Messenger is set to be discontinued in 2014 at some point, but for those that like the original messenger it will suffice for now.</description><link>http://techbetaplus.blogspot.com/2013/05/bring-back-messenger-and-rid-yourself.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvo08UD7b7ZieUVaIkotMo9qhQ47ZNj77mwv5yrb5zvZj3e41iVzf7vJMMCOlag8eCREBHci_T6FHBmGkbJPxLZJJJgcZT15yzgB1dL7RAoApAftdampNOdSpZgLiY3qA09e1txuG2wcQ/s72-c/messenger.PNG" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8967636698103377126.post-6259050899712830428</guid><pubDate>Wed, 08 May 2013 02:27:00 +0000</pubDate><atom:updated>2013-05-07T19:27:15.562-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">2013</category><category domain="http://www.blogger.com/atom/ns#">developer preview</category><category domain="http://www.blogger.com/atom/ns#">june 2013</category><category domain="http://www.blogger.com/atom/ns#">microsoft</category><category domain="http://www.blogger.com/atom/ns#">windows 8.1</category><category domain="http://www.blogger.com/atom/ns#">windows blue</category><title>Microsoft Confirms Windows Blue in Latter 2013</title><description>&lt;a href=&quot;http://microsoft.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Microsoft&lt;/a&gt; has confirmed the successor to Windows 8, Windows Blue 8.1 will roll out later this year, &lt;span itemprop=&quot;articleBody description text&quot;&gt;Julie Larson-Green, Windows co-chief, took to the podium at the Wired Business Conference 
today to confirm that a developer preview of Windows 8.1—a.k.a. Windows 
Blue—will be made available during the company&#39;s BUILD conference in 
June.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhb3Y9PjrMnUluTTWftfjn1QKlAqqaSJNeM2UYP0n-9ub_z_3rWHx-e-vwqrtde6qAdrCFZTO8UjRGA41__6PS-xrjfrr0HLG3LVd6tvPA7a4Tfo9vMuopvfdnqKCn0hSUbZn1AIadkqxo/s1600/windows_8-1_leak-580-100.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;179&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhb3Y9PjrMnUluTTWftfjn1QKlAqqaSJNeM2UYP0n-9ub_z_3rWHx-e-vwqrtde6qAdrCFZTO8UjRGA41__6PS-xrjfrr0HLG3LVd6tvPA7a4Tfo9vMuopvfdnqKCn0hSUbZn1AIadkqxo/s320/windows_8-1_leak-580-100.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Windows 8.1 AKA Windows Blue Developer Preview June 2013&lt;/td&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span itemprop=&quot;articleBody description text&quot;&gt;There is speculation that Microsoft will bring back the Start Button, although will not have the same functions that Windows 7 has. Also noted in the rumor mill is talks that they may allow Windows 8.1 users to boot directly to the Desktop, however this will be disabled by default and thus far not confirmed.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span itemprop=&quot;articleBody description text&quot;&gt;With the news of a preview in later June and a possible relase date scheduled for the end of the year one would have to think that an RTM would be available to OEMS 4-6 weeks prior for testing before signing off on the final image. Which would made a late October 2013 release to the public just in time for the holiday consumer rush.&lt;/span&gt;&lt;br /&gt;
&lt;span itemprop=&quot;articleBody description text&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span itemprop=&quot;articleBody description text&quot;&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://techbetaplus.blogspot.com/2013/05/microsoft-confirms-windows-blue-in.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhb3Y9PjrMnUluTTWftfjn1QKlAqqaSJNeM2UYP0n-9ub_z_3rWHx-e-vwqrtde6qAdrCFZTO8UjRGA41__6PS-xrjfrr0HLG3LVd6tvPA7a4Tfo9vMuopvfdnqKCn0hSUbZn1AIadkqxo/s72-c/windows_8-1_leak-580-100.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8967636698103377126.post-373331054865919979</guid><pubDate>Mon, 06 May 2013 02:31:00 +0000</pubDate><atom:updated>2013-05-05T19:31:49.333-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">codes</category><category domain="http://www.blogger.com/atom/ns#">hacks</category><category domain="http://www.blogger.com/atom/ns#">microsoft</category><category domain="http://www.blogger.com/atom/ns#">mobile phone</category><category domain="http://www.blogger.com/atom/ns#">Windows</category><category domain="http://www.blogger.com/atom/ns#">windows phone 7</category><category domain="http://www.blogger.com/atom/ns#">windows phone 8</category><title>Have A Windows Phone? Here are Some Diagnostic Codes</title><description>If you like most want to change settings on your Windows Phone, here is a list of&amp;nbsp; diagnostic codes that you might want to check out.&lt;br /&gt;
&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqBsZroGxM2m4qX0A7zFA2YyT9gXiD7q84LC5yLNc1ZgpWLSbUL0wIeDsFH8w6itqTlXtYk-S2CMlst3LbJvyq0TRM0mL0x1E_g8joAqs0LwmX6YfVTRBSHn2YKW_Hl1bOkWhu5dvjmc8/s1600/windowsphone.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;244&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqBsZroGxM2m4qX0A7zFA2YyT9gXiD7q84LC5yLNc1ZgpWLSbUL0wIeDsFH8w6itqTlXtYk-S2CMlst3LbJvyq0TRM0mL0x1E_g8joAqs0LwmX6YfVTRBSHn2YKW_Hl1bOkWhu5dvjmc8/s320/windowsphone.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Windows Phone Diagnostic Codes&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;br /&gt;
As with all diagnostic codes, and hacks please remember to backup all your data in case you experience an adverse actions while using the below diagnostic codes. TechBetaPlus takes no responsibility for damage caused by the use of these codes and the end user is using at their own risk.&lt;br /&gt;
&lt;br /&gt;
The list,&lt;br /&gt;
&lt;br /&gt;
*#0*# - LCD Test - flashes through different colours&lt;br /&gt;
*#0002*28345# - Audio control utility&lt;br /&gt;
*#0011# - Power and Temprature settings&lt;br /&gt;
*#0228# - Bat&lt;br /&gt;
*#0289# - Melody Test\Test External and Internal Speaker&lt;br /&gt;
*#03# - SMDInfo&lt;br /&gt;
*#05# - Simple test menu&lt;br /&gt;
*#06# - Show IMEI number&lt;br /&gt;
*#0673# - MP3 Test Menu\Shows Audio sound tests&lt;br /&gt;
*#0782# - Shows Clock &amp;amp; Alarms settings&lt;br /&gt;
*#0842# - Vibrate test menu&lt;br /&gt;
*#0987# - Multitouch test&lt;br /&gt;
*#1111# - Show FTA software version&lt;br /&gt;
*#1234# - Shows the PDA and the Phone version number&lt;br /&gt;
*#197328640# - The Root Menu&lt;br /&gt;
*#2*# - Battery Information&lt;br /&gt;
*#2222# - Show FTA hardware version&lt;br /&gt;
*#2263# - RAT Selection option is resricted&lt;br /&gt;
*#232331# - BT RF Test Mode&lt;br /&gt;
*#232332# - BT Audio&lt;br /&gt;
*#232333# - BT Search Test&lt;br /&gt;
*#232337# - Bluetooth MAC Adress&lt;br /&gt;
*#232338# - WLAN MAC address&lt;br /&gt;
*#232339# - WLAN Test mode&lt;br /&gt;
*#2580# - Integrity Control&lt;br /&gt;
*#3*# - Test Brightness&lt;br /&gt;
*#32489# - (GSM test) Shows the ciphering status and options to enable or disable it.&lt;br /&gt;
*#7284# - USB Path control (TETHERED CALL)&lt;br /&gt;
*#745# - Operation (2): Ril log done&lt;br /&gt;
*#7450# - Operation (99):Error Report off done&lt;br /&gt;
*#7451# - Operation (99):Error Report off done&lt;br /&gt;
*#7465625# -Shows status of the Network, Service Provider, SIM or Corporation lock&lt;br /&gt;
*#770# - Operation (99):Vphone 770 done!&lt;br /&gt;
*#771# - Operation (99):Vphone 771 done!&lt;br /&gt;
*#772# - Operation (99):Vphone 772 done!&lt;br /&gt;
*#773# - Operation (99):Vphone 773 done!&lt;br /&gt;
*#774# - Operation (99):Vphone 774 done!&lt;br /&gt;
*#775# - Operation (99):Vphone 775 done!&lt;br /&gt;
*#776# - Operation (99):Vphone 776 done!&lt;br /&gt;
*#777# - Operation (99):Vphone 777 done!&lt;br /&gt;
*#778# - Operation (99):Vphone 778 done!&lt;br /&gt;
*#779# - Operation (99):Vphone 779 done!&lt;br /&gt;
*#780# - Operation (99):SR Test done!&lt;br /&gt;
*#9090# - Diag Config\UART/USB settings&lt;br /&gt;
*2767*3855# - Full Reset (all data will be deleted! Be careful)</description><link>http://techbetaplus.blogspot.com/2013/05/have-windows-phone-here-are-some.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqBsZroGxM2m4qX0A7zFA2YyT9gXiD7q84LC5yLNc1ZgpWLSbUL0wIeDsFH8w6itqTlXtYk-S2CMlst3LbJvyq0TRM0mL0x1E_g8joAqs0LwmX6YfVTRBSHn2YKW_Hl1bOkWhu5dvjmc8/s72-c/windowsphone.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8967636698103377126.post-1823365633005470096</guid><pubDate>Wed, 01 May 2013 00:28:00 +0000</pubDate><atom:updated>2013-05-01T09:29:47.737-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">errors</category><category domain="http://www.blogger.com/atom/ns#">fix msse</category><category domain="http://www.blogger.com/atom/ns#">fix security essentials</category><category domain="http://www.blogger.com/atom/ns#">msse</category><category domain="http://www.blogger.com/atom/ns#">unable to install security essentials</category><title>Fix Microsoft Security Essentials Won&#39;t Install Errors in Windows 7</title><description>I recently found myself having problems installing Microsoft Security Essentials on a friends PC. After several attempts to uninstall and install it getting the same error I stepped back and had to take a break.&lt;br /&gt;
&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEis9Wao1JTm4f1iK2gSpI_b-VToLunjowWuIOgTuoElQoyNhAEagPkInRetoZ9W675MXFllpSefooSEXFtYiLCwW0038FT60GF_YOqkqXGJHdK0tU6N9w7mC8NbbLMXWTtB8eq6s4UiMSA/s1600/fix+MS+Security+Essentails+error.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;248&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEis9Wao1JTm4f1iK2gSpI_b-VToLunjowWuIOgTuoElQoyNhAEagPkInRetoZ9W675MXFllpSefooSEXFtYiLCwW0038FT60GF_YOqkqXGJHdK0tU6N9w7mC8NbbLMXWTtB8eq6s4UiMSA/s320/fix+MS+Security+Essentails+error.jpeg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Fix Microsoft Security Essentials Installation Erros&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;br /&gt;
I ended up using Google to search for a solution. After several hours trying the MS fixes, deleting registry entries and re-booting I was stuck at the same error, that is until a friend gave me a small batch file that would remove all MSSE entries in the registry and files on the OS. Thew following is the batch file.&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
cd /d &quot;%ProgramFiles%\Microsoft Security Client&quot;&lt;br /&gt;
&lt;br /&gt;
setup.exe /x&lt;br /&gt;
&lt;br /&gt;
TASKKILL /f /im MsMpEng.exe&lt;br /&gt;
&lt;br /&gt;
TASKKILL /f /im msseces.exe&lt;br /&gt;
&lt;br /&gt;
net stop MsMpSvc&lt;br /&gt;
&lt;br /&gt;
sc delete MsMpSvc&lt;br /&gt;
&lt;br /&gt;
REG DELETE &quot;HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\MsMpSvc&quot; /f&lt;br /&gt;
&lt;br /&gt;
REG DELETE &quot;HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft Antimalware&quot; /f&lt;br /&gt;
&lt;br /&gt;
REG DELETE &quot;HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft Security Client&quot; /f&lt;br /&gt;
&lt;br /&gt;
REG DELETE &quot;HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Microsoft Antimalware&quot; /f&lt;br /&gt;
&lt;br /&gt;
REG DELETE &quot;HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Current Version\Run\MSC&quot; /f&lt;br /&gt;
&lt;br /&gt;
REG DELETE &quot;HKEY_CLASSES_ROOT\Installer\Products\4C677A77F01DD614880F352F9DCD9D3B&quot; /f&lt;br /&gt;
&lt;br /&gt;
REG DELETE &quot;HKEY_CLASSES_ROOT\Installer\Products\4D880477777087D409D44E533B815F2D&quot; /f&lt;br /&gt;
&lt;br /&gt;
REG DELETE &quot;HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Microsoft Security Client&quot; /f&lt;br /&gt;
&lt;br /&gt;
REG DELETE &quot;HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{774088D4-0777-4D78-904D-E435B318F5D2}&quot; /f&lt;br /&gt;
&lt;br /&gt;
REG DELETE &quot;HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{77A776C4-D10F-416D-88F0-53F2D9DCD9B3}&quot; /f&lt;br /&gt;
&lt;br /&gt;
REG DELETE &quot;HKEY_CLASSES_ROOT\Installer\UpgradeCodes\1F69ACF0D1CF2B7418F292F0E05EC20B&quot; /f&lt;br /&gt;
&lt;br /&gt;
REG DELETE &quot;HKEY_CLASSES_ROOT\Installer\UpgradeCodes\11BB99F8B7FD53D4398442FBBAEF050F&quot; /f&lt;br /&gt;
&lt;br /&gt;
REG DELETE &quot;HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4C677A77F01DD614880F352F9DCD9D3B&quot; /f&lt;br /&gt;
&lt;br /&gt;
REG DELETE &quot;HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4D880477777087D409D44E533B815F2D&quot; /f&lt;br /&gt;
&lt;br /&gt;
REG DELETE &quot;HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\11BB99F8B7FD53D4398442FBBAEF050F&quot; /f&lt;br /&gt;
&lt;br /&gt;
REG DELETE &quot;HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\1F69ACF0D1CF2B7418F292F0E05EC20B&quot; /f&lt;br /&gt;
&lt;br /&gt;
takeown /f &quot;%ProgramData%\Microsoft\Microsoft Antimalware&quot; /a /r&lt;br /&gt;
&lt;br /&gt;
takeown /f &quot;%ProgramData%\Microsoft\Microsoft Security Client&quot; /a /r&lt;br /&gt;
&lt;br /&gt;
takeown /f &quot;%ProgramFiles%\Microsoft Security Client&quot; /a /r&lt;br /&gt;
&lt;br /&gt;
REM Delete the MSE folders.&lt;br /&gt;
&lt;br /&gt;
rmdir /s /q &quot;%ProgramData%\Microsoft\Microsoft Antimalware&quot;&lt;br /&gt;
&lt;br /&gt;
rmdir /s /q &quot;%ProgramData%\Microsoft\Microsoft Security Client&quot;&lt;br /&gt;
&lt;br /&gt;
rmdir /s /q &quot;%ProgramFiles%\Microsoft Security Client&quot;&lt;br /&gt;
&lt;br /&gt;
REM Stop the WMI and its dependency services&lt;br /&gt;
&lt;br /&gt;
sc stop sharedaccess&lt;br /&gt;
&lt;br /&gt;
sc stop mpssvc&lt;br /&gt;
&lt;br /&gt;
sc stop wscsvc&lt;br /&gt;
&lt;br /&gt;
sc stop iphlpsvc&lt;br /&gt;
&lt;br /&gt;
sc stop winmgmt&lt;br /&gt;
&lt;br /&gt;
REM Delete the Repository folder.&lt;br /&gt;
&lt;br /&gt;
rmdir /s /q &quot;C:\Windows\System32\wbem\Repository&quot;&lt;br /&gt;
&lt;br /&gt;
sc stop &lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
EXIT&lt;/blockquote&gt;
Simply select and copy this to a blank notepad and save with the extention of .bat. Run as Administrator and let the script finish. Once completed re-boot and attempt to install MSSE again if all went well you should not get any errors.&lt;br /&gt;
&lt;br /&gt;
I found this batch file helpful and wanted to share it with my readers. However I take no responsibility if problem arise utilizing this file. Use at own risk, Remember to backup and set a restore point prior to using this batch file for added protection.&lt;br /&gt;
&lt;br /&gt;</description><link>http://techbetaplus.blogspot.com/2013/04/fix-microsoft-security-essentials-wont.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEis9Wao1JTm4f1iK2gSpI_b-VToLunjowWuIOgTuoElQoyNhAEagPkInRetoZ9W675MXFllpSefooSEXFtYiLCwW0038FT60GF_YOqkqXGJHdK0tU6N9w7mC8NbbLMXWTtB8eq6s4UiMSA/s72-c/fix+MS+Security+Essentails+error.jpeg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8967636698103377126.post-5685525990350602194</guid><pubDate>Mon, 29 Apr 2013 19:11:00 +0000</pubDate><atom:updated>2013-04-29T12:11:07.751-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Anti-Spyware</category><category domain="http://www.blogger.com/atom/ns#">computer security</category><category domain="http://www.blogger.com/atom/ns#">online pc support</category><category domain="http://www.blogger.com/atom/ns#">online tech support</category><title>Winpatrol 2013 A Must Have Windows Tool</title><description>When troubleshooting a Windows system I often use Google to investigate error codes, to find out what start up items are and if they are safe, or find solutions to common problems. This method works but I find myself spending too much time when there is a faster solution, Winpatrol.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiyczvFFtgZmaTBqPCfYh1fe4zJ9XfAJ_F3TPK3CWDQvZshyKT28b6iQNZ5p-Dd_86ZXoYhYoqwWZGtQf_qFnDo_vPlHL8Doxlg1RRj167WdcLuQPmDVbNmGmoS5gJImzauhcBGM6MHnQ/s1600/winpatrol.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;288&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiyczvFFtgZmaTBqPCfYh1fe4zJ9XfAJ_F3TPK3CWDQvZshyKT28b6iQNZ5p-Dd_86ZXoYhYoqwWZGtQf_qFnDo_vPlHL8Doxlg1RRj167WdcLuQPmDVbNmGmoS5gJImzauhcBGM6MHnQ/s400/winpatrol.PNG&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span class=&quot;bbc&quot;&gt;WinPatrol allows you to get a better understanding 
of what programs are being added to your computer. It monitors important
 system areas that are commonly altered by many malicious programs. This
 includes the startup groups (registry and startup folder), cookies and 
active tasks. You can terminate processes and enable or disable startup 
programs. The cookie monitoring option allows you to automatically 
delete cookies based on a keyword found in the cookie name. Additional 
features include a WHOIS lookup tool and an option to alert you on 
changes.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;bbc&quot;&gt;The latest version is &lt;/span&gt;&lt;span class=&quot;bbc&quot;&gt;&lt;span class=&quot;bbc&quot;&gt;WinPatrol vv28.1.2013, and you can download it &lt;a href=&quot;http://winpatrol.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;bbc&quot;&gt;&lt;span class=&quot;bbc&quot;&gt;Recent changes:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Allows WinPatrol to start for current user or all users.&lt;span class=&quot;bbc&quot;&gt;&lt;span class=&quot;bbc&quot;&gt;Reduced monitoring during all sleep states to save battery usage.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;bbc&quot;&gt;&lt;span class=&quot;bbc&quot;&gt;Allows WinPatrol to start for current user or all users.&lt;br /&gt;Reduced monitoring during all sleep states to save battery usage.&lt;br /&gt;Fixed Reset function to remove duplicate Scotty icons.&lt;br /&gt;Fixed Reset function to remove duplicate Uninstall entries.&lt;br /&gt;Speeds up real-time detection.&lt;br /&gt;Fixed bug in system tray icon behavior that could have produce unknown results.&lt;br /&gt;Improved handling of repeating changes made by partner programs.&lt;br /&gt;Fixed &quot;Automatically Run WinPatrol...&quot; option so it doesn&#39;t always launch on boot &lt;/span&gt;&lt;/span&gt;</description><link>http://techbetaplus.blogspot.com/2013/04/winpatrol-2013-must-have-windows-tool.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiyczvFFtgZmaTBqPCfYh1fe4zJ9XfAJ_F3TPK3CWDQvZshyKT28b6iQNZ5p-Dd_86ZXoYhYoqwWZGtQf_qFnDo_vPlHL8Doxlg1RRj167WdcLuQPmDVbNmGmoS5gJImzauhcBGM6MHnQ/s72-c/winpatrol.PNG" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8967636698103377126.post-8721508403118852580</guid><pubDate>Thu, 25 Apr 2013 01:31:00 +0000</pubDate><atom:updated>2013-04-24T18:31:43.461-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">adblock</category><category domain="http://www.blogger.com/atom/ns#">adblock plus</category><category domain="http://www.blogger.com/atom/ns#">blocking ads</category><title>Remove Those Annoying Ads with Firefox and Adblock Plus Addon</title><description>I get asked by clients all the time if there is away to block ads while surfing the internet. My response is always, Yes, however ads are how bloggers make a living. Now I agree that some websites, and some mainstream media outlets use too many, and ads that are overly annoying.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiAYNZBcKluEMnw14b4xUgxTRD0WllH3_lU3igERHjG7AKbXcsGpBVSE7GYsq_GlnUywoXCsPF6EE9TcOJOaH-OhbJI-P0LTKFQ4UcL2x-2GeyK85xs_VeQm6QTJhhGs3W2UMwJPj5elvY/s1600/abp.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;252&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiAYNZBcKluEMnw14b4xUgxTRD0WllH3_lU3igERHjG7AKbXcsGpBVSE7GYsq_GlnUywoXCsPF6EE9TcOJOaH-OhbJI-P0LTKFQ4UcL2x-2GeyK85xs_VeQm6QTJhhGs3W2UMwJPj5elvY/s320/abp.PNG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span id=&quot;goog_1191449896&quot;&gt;&lt;/span&gt;&lt;span id=&quot;goog_1191449897&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
I don&#39;t block ads because I use Google Adsense to generate revenue for this blog. For this reason and this reason only. I have a small lab with several assistants that test software and solutions for clients. These tests, reviews and results are used to help clients get the best enjoyment when using the internet.&lt;br /&gt;
&lt;br /&gt;
So with all that said I do have a solution that can benefit those that wish to block ads with a hands off approach. Since most clients use&lt;a href=&quot;http://www.mozilla.org/en-US/firefox&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt; Mozilla Firefox&lt;/a&gt;, they only need to download and install the popular addon Adblock Plus and subscribe to a few subscription block lists.&lt;br /&gt;
&lt;br /&gt;
If you are not using Firefox, download it and install it via the normal way. once installed head over to the &lt;a href=&quot;https://addons.mozilla.org/en-US/firefox/addon/adblock-plus/?src=hp-dl-mostpopular&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Adblock Plus addon page&lt;/a&gt; at Mozilla and select add&amp;nbsp; to Firefox. No restart required. Once installed you will find yourself being asked to install a block list. Its a random selection when installing Adblock whether you are giving the popular Easylist, or the Fanboy list.&lt;br /&gt;
&lt;br /&gt;
There is an known block list page &lt;a href=&quot;http://adblockplus.org/en/subscriptions&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;. You will find the most updated subscription list with many choices. I recommend the following as a good starting place.&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href=&quot;abp:subscribe?location=https://secure.fanboy.co.nz/fanboy-tracking.txt&amp;amp;title=fanboy-tracking&amp;amp;requiresLocation=https://secure.fanboy.co.nz/fanboy-adblock.txt&amp;amp;requiresTitle=Fanboy%20Adblock%20list&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Fanboy&#39;s Tracking List&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;abp:subscribe?location=https%3A%2F%2Fsecure.fanboy.co.nz%2Ffanboy-adblock.txt&amp;amp;title=Fanboy%27s%20List&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Fanboy&#39;s list&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;abp:subscribe?location=https%3A%2F%2Feasylist-downloads.adblockplus.org%2Ffanboy-annoyance.txt&amp;amp;title=Fanboy%27s%20Annoyances&amp;amp;requiresLocation=https%3A%2F%2Fsecure.fanboy.co.nz%2Ffanboy-adblock.txt&amp;amp;requiresTitle=Fanboy%27s%20List&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;subscriptionTitle&quot;&gt;Fanboy&#39;s Annoyances&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;subscriptionTitle&quot;&gt;&lt;a href=&quot;abp:subscribe?location=http%3A%2F%2Fpgl.yoyo.org%2Fadservers%2Fserverlist.php%3Fhostformat%3Dadblockplus%26mimetype%3Dplaintext&amp;amp;title=Peter%20Lowe%27s%20list&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Peter Lowe&#39;s List &lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;span class=&quot;subscriptionTitle&quot;&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://techbetaplus.blogspot.com/2013/04/remove-those-annoying-ads-with-firefox.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiAYNZBcKluEMnw14b4xUgxTRD0WllH3_lU3igERHjG7AKbXcsGpBVSE7GYsq_GlnUywoXCsPF6EE9TcOJOaH-OhbJI-P0LTKFQ4UcL2x-2GeyK85xs_VeQm6QTJhhGs3W2UMwJPj5elvY/s72-c/abp.PNG" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8967636698103377126.post-3753502541332301077</guid><pubDate>Wed, 24 Apr 2013 19:24:00 +0000</pubDate><atom:updated>2013-04-24T16:55:53.338-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">configuration</category><category domain="http://www.blogger.com/atom/ns#">homegroup</category><category domain="http://www.blogger.com/atom/ns#">online pc support</category><category domain="http://www.blogger.com/atom/ns#">online tech support</category><title>Homegroup and Advanced Sharing Options Configuration in Windows 7</title><description>&lt;h1&gt;
Homegroup and Advanced Sharing Options Configuration in Windows 7&lt;/h1&gt;
&lt;b&gt;Author: Techie Time&lt;/b&gt;&lt;br /&gt;
&lt;h3&gt;
Homegroup Section&lt;/h3&gt;
This section covers how to create and configure a homegroup as well as how to choose the resources that will be shared within the homegroup.  To create a new homegroup, navigate to the &quot;Control Panel&quot; then select &quot;Choose homegroup and sharing options&quot; under the &quot;Network and Internet&quot; section.&lt;br /&gt;
&lt;br /&gt;
&lt;img alt=&quot;Control Panel 1&quot; border=&quot;0&quot; height=&quot;282&quot; src=&quot;http://techietime.net/wp-content/uploads/2013/01/Control-Panel-1.png&quot; width=&quot;400&quot; /&gt;&lt;br /&gt;
&lt;br /&gt;
At the homegroup screen select &quot;Create A Homegroup&quot; to configure your new homegroup.&lt;br /&gt;
&lt;br /&gt;
&lt;img alt=&quot;Homegroup Options&quot; border=&quot;0&quot; height=&quot;281&quot; src=&quot;http://techietime.net/wp-content/uploads/2013/01/Homegroup-Options.png&quot; width=&quot;400&quot; /&gt;&lt;br /&gt;
&lt;br /&gt;
On the screen, select what you would like to share with the members of your homegroup. The homegroup wizard will then proceed to create your new homegroup and will provide a randomly generated password. The provided password will be used to add other computers to your homegroup. Click on &quot;Finish&quot; and you will now see the current configuration settings for your new homegroup as seen below.&lt;br /&gt;
&lt;br /&gt;
&lt;img alt=&quot;Current Homegroup Settings&quot; border=&quot;0&quot; height=&quot;281&quot; src=&quot;http://techietime.net/wp-content/uploads/2013/01/Current-Homegroup-Settings.png&quot; width=&quot;400&quot; /&gt;&lt;br /&gt;
&lt;h3&gt;
Advanced Sharing Settings&lt;/h3&gt;
The homegroup options screen in Windows contains an advanced options section for sharing with homegroup users and computers. A screenshot of the homegroup options screen can be seen in the image above. Advanced sharing provides the option to configure network discovery, turn file and printer sharing on and off. turn public folder sharing on or off, set the encryption level for file sharing connections for your network, enable or disable password protected sharing and whether homegroups are managed by Windows or whether user accounts and passwords will be required to access network computers. Windows contains three types of sharing settings. These options are home, work and public. The advanced sharing options are displayed in the images below.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;img alt=&quot;Advanced Sharing Options Windows 7&quot; border=&quot;0&quot; height=&quot;192&quot; src=&quot;http://www.techietime.net/wp-content/uploads/2013/01/Advanced-Sharing-Options-1024x495.png&quot; width=&quot;400&quot; /&gt; &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Network Discovery&lt;/b&gt;&lt;br /&gt;
When network discovery is enabled on a computer, the computer and shared devices can be seen by other computers on the network. Enabling this setting also allows the computer to view and access other computers and shared devices. The network discovery option requires that the DNS Client, Function Discovery Resource Publication, SSDP Discovery, and UPnP Device services must be started on each computer if network discovery is enabled. When these services are enabled, network discovery is able to communicate with Windows firewall and other network hardware or software firewalls.&lt;br /&gt;
File and Printer Sharing&lt;br /&gt;
When file and printer sharing is enabled, all shared folders and printers are accessible by users on other computers on the network. Shared folders and printers will also be displayed when accessing a computer by UNC path. For example, &quot;\\mypc\shared&quot; is an example of the path to a shared folder.&lt;br /&gt;
Public Folder Sharing&lt;br /&gt;
Public sharing in Windows contains the same set of configuration settings as the home or work network sharing settings. It is configured independently. Public shared folders are available to any user on the same network. If public sharing for folders is to be turned off then users on other computers on the network cannot access these shared folders. Users which are logged in to the computer which is hosting these shared folders will still be able to access the folders.&lt;br /&gt;
File Sharing Connections&lt;br /&gt;
The file sharing connections section allows for configuration of what kind of encryption is supported for shared resources. There are two options here. The two options available are 128 bit encryption or the option to only support 40 or 56 bit encryption. Certain devices do not support 128 bit encryption. 128 bit encryption is used by default in Windows and is generally supported by most computers.&lt;br /&gt;
Password Protected Sharing&lt;br /&gt;
The password protected sharing option is used to restrict access to shared resources to users that do not have a local account on the host of the shared resources. If this option is enabled, accounts from other computers which are members of the workgroup or homegroup can be added to a local group or directly to the local accounts through &quot;Computer Management&quot; in Windows. Turning this feature off will allow users from any computer on the network to access shared resources.&lt;br /&gt;
Homegroup Connections&lt;br /&gt;
The homegroup connections settings allow for the configuration of whether Windows will manage the connections to shared resources on the network or whether these settings will be managed by dedicated users on the network. By default Windows will managed shared resources. Generally shared resources are managed by users when customized permissions to users and group are set for the shared resources. In this circumstance the setting for Windows to manage shared resources will need to be turned off.&lt;br /&gt;
&lt;br /&gt;
Article Source: &lt;a href=&quot;http://www.articlesbase.com/operating-systems-articles/homegroup-and-advanced-sharing-options-configuration-in-windows-7-6507102.html&quot; title=&quot;Homegroup and Advanced Sharing Options Configuration in Windows 7&quot;&gt;http://www.articlesbase.com/operating-systems-articles/homegroup-and-advanced-sharing-options-configuration-in-windows-7-6507102.html&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;About the Author &lt;/b&gt;&lt;br /&gt;
Techie Time IT Knowledge Base&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://profiles.google.com/113147561747285316050&quot; rel=&quot;author&quot;&gt;About TechBetaPlus&lt;/a&gt;</description><link>http://techbetaplus.blogspot.com/2013/04/homegroup-and-advanced-sharing-options.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8967636698103377126.post-6157593132752018127</guid><pubDate>Wed, 24 Apr 2013 16:12:00 +0000</pubDate><atom:updated>2013-04-24T16:48:59.836-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">best pc tuneup</category><category domain="http://www.blogger.com/atom/ns#">computer security</category><category domain="http://www.blogger.com/atom/ns#">computer virus removal</category><category domain="http://www.blogger.com/atom/ns#">internet security</category><category domain="http://www.blogger.com/atom/ns#">online computer support</category><category domain="http://www.blogger.com/atom/ns#">online laptop support</category><category domain="http://www.blogger.com/atom/ns#">online pc support</category><category domain="http://www.blogger.com/atom/ns#">online tech support</category><category domain="http://www.blogger.com/atom/ns#">online technical support</category><category domain="http://www.blogger.com/atom/ns#">virus removal</category><title>5 Things you can do to improve the security of your Home PC</title><description>&lt;h1&gt;
5 Things you can do to improve the security of your Home PC&lt;/h1&gt;
&lt;b&gt;Author: &lt;a href=&quot;http://www.articlesbase.com/authors/brooke-m-perry/1337705&quot; title=&quot;Brooke M. Perry&quot;&gt;Brooke M. Perry&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Improving the security of your PC has become one of the difficult things do especially when millions of threats like viruses and malware are lurking into the web. It has become very important today to ensure the PC security because we use our computers for doing a lot of things such as Internet banking, shopping, payment of utility bills, email, social networking and others. As computers play a very important role in our life today, it becomes more than important to ensure their security anyhow.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNnV4amml-foHZorH1o53lD3qMr7D1pGY-Fx44hyphenhyphenaNS993oejVBoJEWxkixHFSGmtQzWsma_Ld7m_3YRx2VYdDmTGO-3gGp04fNMw_HDE_r7vPfSieFAAjS1lucyRKi1SwSy7BpUOqfG8/s1600/Computer+Security.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNnV4amml-foHZorH1o53lD3qMr7D1pGY-Fx44hyphenhyphenaNS993oejVBoJEWxkixHFSGmtQzWsma_Ld7m_3YRx2VYdDmTGO-3gGp04fNMw_HDE_r7vPfSieFAAjS1lucyRKi1SwSy7BpUOqfG8/s1600/Computer+Security.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
Below listed are the 5 ways using which you can improve the security of your home PC:&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Always connect to a secure network&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Do you know that when you connect your PC to the internet it also gets connected to millions of other PCs connected to the web at the same time? This allows hackers and virus authors to access your PC and do the harms which they intend. The information which you seek from the internet first comes to your modem then router and then your PC. Because the modem is not equipped with any security features, it becomes important for you to secure your router. Ensure to secure the router before you connect your PC to the internet. It improves the computer security by many times and minimizes the risk of infection.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Enable and configure a firewall&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Firewall is an important security component that protects your PC from phishing and scams. It is in fact a device which regulates the flow of information which flows between your PC and the web. It is more like a router in terms of features. All the modern operating systems offer firewall as a software. Apart from the firewall offered by the OS, home PCs also have built-in firewall. For this you should consult your service provider to know how to enable the firewall on your network.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Install effective antivirus and antispyware software&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
The third step towards improving the security of your home PC is to install effective antivirus and antispyware software on your computer. It is also important to keep the software up-to-date to avail complete security from even newer threats.&lt;br /&gt;
Modern antivirus and antispyware can detect viruses and malware on the basis of the pattern exhibited by these threats in the files or memory of your PC. These software work on the basis of virus signatures which is provided by software vendors to detect the malware. Vendors constantly update the signatures with the discovery of new malware on the daily basis. For impeccable security against online threats it is mandatory that your antivirus program uses the updated signatures for detecting malware.&lt;br /&gt;
It is important that you enable the feature so that the antivirus program detects malware on the basis of current signatures. There are many rogue software available on the internet so be careful and install the antivirus program either through a CD or the website of the vendor.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Secure your web browser&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Web browsers are an important gateway for online threats because of their inherent security vulnerabilities. You should know that the web browsers installed on your PC don&#39;t have the enough secure default settings most of the time. So the next step towards protecting your home PC is to secure your web browser. It becomes more important today because most of the security incidents are taking place because of the vulnerabilities existing in the web browser. From the next time when you start browsing the internet make sure that you have done the following to secure your browser.&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Disabled the mobile code such as Java, JavaScript, Flash, and ActiveX&lt;/li&gt;
&lt;li&gt;Disabled options to always set cookies&lt;/li&gt;
&lt;li&gt;Configured the browser to ask for your permission for setting a cookie.&lt;/li&gt;
&lt;/ul&gt;
&lt;b&gt;Install software updates and enable automatic updates&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Most of the software development companies release updates on regular intervals to patch security vulnerabilities, flaws and bugs and improve the program to detect even newer threats. Most of the users treat these updates unnecessary and ignore it. This is not a good practice and makes your PC vulnerable to virus attacks. Always install the updates and enable the automatic updates so that you never miss any security update.&lt;br /&gt;
&lt;br /&gt;
Before the Conficker virus struck computers worldwide in 2008, Microsoft had released a security update. If users would have installed the update on their PCs, they would have mitigated the impact of this virus to a greater extent. So always treat software updates at high priority and never ever miss it.&lt;br /&gt;
Above discussed are the 5 ways though which you can improve the security of your home PC. Apart from these there are many other ways that help you improve the PC security. You can also opt for standard practices of internet browsing like not visiting any website which you don&#39;t know, not clicking on link or attachments coming from an unknown source etc.&lt;br /&gt;
&lt;br /&gt;
Article Source: &lt;a href=&quot;http://www.articlesbase.com/security-articles/5-things-you-can-do-to-improve-the-security-of-your-home-pc-6564878.html&quot; title=&quot;5 Things you can do to improve the security of your Home PC&quot;&gt;http://www.articlesbase.com/security-articles/5-things-you-can-do-to-improve-the-security-of-your-home-pc-6564878.html&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://profiles.google.com/113147561747285316050&quot; rel=&quot;author&quot;&gt;About TechBetaPlus&lt;/a&gt;</description><link>http://techbetaplus.blogspot.com/2013/04/5-things-you-can-do-to-improve-security.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNnV4amml-foHZorH1o53lD3qMr7D1pGY-Fx44hyphenhyphenaNS993oejVBoJEWxkixHFSGmtQzWsma_Ld7m_3YRx2VYdDmTGO-3gGp04fNMw_HDE_r7vPfSieFAAjS1lucyRKi1SwSy7BpUOqfG8/s72-c/Computer+Security.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8967636698103377126.post-4398480376277799047</guid><pubDate>Wed, 24 Apr 2013 05:06:00 +0000</pubDate><atom:updated>2013-04-24T16:49:37.966-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Anti-Spyware</category><category domain="http://www.blogger.com/atom/ns#">software</category><category domain="http://www.blogger.com/atom/ns#">spyware removal. ani-virus</category><title>A Secondary Security Tool For IT Specialists</title><description>When trouble shooting computers I have a pen drive that I always keep handy that&#39;s filled with a range of application that help in fighting spam, spyware, and virus&#39; I also have a subset of tools for disk cleanup and fragmentation, and registry cleaners. Often times over the years I have added tools and removed tools as they become outdated or a newer better tool become available.&lt;br /&gt;
&lt;br /&gt;
I started using a new tool and although very good still has some features I would like to see and enhancements to the GUI I would like to see implemented. &lt;a href=&quot;http://fileforum.betanews.com/download/AdwCleaner/1359131497/1&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;AdwCleaner&lt;/a&gt; is a small utility that scans and removes Adware, Toolbars, PUP (Potentially Unwanted Programs), Hijackers, and more. its light weight and would be a grate addition to a tech support tool belt.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVsnxKj0T3hRCRfnONTFnJAplvx0XDhdVwRilOkL_pnIvu_-oRgrer_SHzTgyKHvI0aKqGo2BMLy8fW-mktg3bajJfqxz3_pBXQJv1njoc-8ZDf6KNBbLrFhAF8sCEOiHukRUAomX_6Ro/s1600/1359131497-1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;193&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVsnxKj0T3hRCRfnONTFnJAplvx0XDhdVwRilOkL_pnIvu_-oRgrer_SHzTgyKHvI0aKqGo2BMLy8fW-mktg3bajJfqxz3_pBXQJv1njoc-8ZDf6KNBbLrFhAF8sCEOiHukRUAomX_6Ro/s320/1359131497-1.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Simply download and run, select search and once the scan is completed it displays a result windows with possible infections and gives the user an option to delete. Once AdwCleaner finished it asks to reboot to finalize the removal process. At this point save all open files and close all windows prior to clicking the restart button.&lt;br /&gt;
&lt;br /&gt;
This tool can be a valued asset when used as a secondary solution to more industry known anti spyware software like &lt;a href=&quot;http://www.malwarebytes.org/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Malwarebytes&lt;/a&gt;, &lt;a href=&quot;http://www.safer-networking.org/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Spybot S&amp;amp;D&lt;/a&gt; among others.
&lt;/ br&gt;

&lt;a rel=&quot;author&quot; href=&quot;https://profiles.google.com/113147561747285316050&quot;&gt;About TechBetaPlus&lt;/a&gt;</description><link>http://techbetaplus.blogspot.com/2013/04/a-secondary-security-tool-for-it.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVsnxKj0T3hRCRfnONTFnJAplvx0XDhdVwRilOkL_pnIvu_-oRgrer_SHzTgyKHvI0aKqGo2BMLy8fW-mktg3bajJfqxz3_pBXQJv1njoc-8ZDf6KNBbLrFhAF8sCEOiHukRUAomX_6Ro/s72-c/1359131497-1.jpg" height="72" width="72"/><thr:total>0</thr:total></item></channel></rss>