background preloader

System Explorer - Keep Your System Under Control

System Explorer - Keep Your System Under Control
System Explorer is free , awards winning software for exploration and management of System Internals. This small software includes many usefull tools which help you Keep Your System Under Control . With System Explorer You get also fast access to File Database which help you to determine unwanted processes or threats . System Explorer is translated into 29 languages and is available for download in installer and portable version. Main Features Detailed information about Tasks, Processes, Modules, Startups, IE Addons, Uninstallers, Windows, Services, Drivers, Connections and Opened Files.

http://systemexplorer.net/

Related:  WindowsComputer SoftwareVirus Malware

Fix: Desktop Icons not Working in Windows 10 / 8 / 7 Are you facing and issue, where you find that your desktop icons are not working or showing in Windows 10 / 8 / 7? Usually, this happens if the file associations are messed up. Before telling you how to fix it, I will in brief, talk about File Associations. If you have been working on computers for long, you can identify the applications needed to open certain files just by looking at their extensions.

SpeedFan - Access temperature sensor in your computer SpeedFan is a program that monitors voltages, fan speeds and temperatures in computers with hardware monitor chips. SpeedFan can even access S.M.A.R.T. info and show hard disk temperatures. SpeedFan supports SCSI disks too. SpeedFan can even change the FSB on some hardware (but this should be considered a bonus feature).

Delete, Move, Rename Locked Files & Folders with MoveOnBoot Sometimes, when we try to delete, rename or move a file of folder, we get a message that Another process is using the file or folder. This means that some process on your Windows computer has locked the file as it is required by that process. While sometimes rebooting the computer or booting into safe mode may help, in some cases this too may not help. In such a case, you may need to take care of a 3rd-party tool. MoveOnBoot is one such freeware that can help you delete, rename or move such locked files. DriveImage XML Backup Software - Data Recovery Product DriveImage XML English (1.78MB) Image and Backup logical Drives and Partitions File Size:1.78 MB Price: Private Edition Free - Commercial Edition - Buy Now

Free Crapware Removal Tools for Windows 8 / 7 Crapware refers to applications that come preinstalled on a new computer when you purchase a branded one. Also, when you purchase a used computer, you find software that you may not use. In short, programs that are not of relevance to you are crapware for you. Removing each one manually can be a tiresome job, especially in the case of new computers. Examples include and are not limited to the branding of Internet Explorer and other browsers.

How do I submit a virus, website or potential false positive sample to ESET's lab? - ESET Knowledgebase To submit a suspicious file, website or possible false positive to ESET for analysis, follow the instructions for your issue below: Submit a suspicious file for analysis If possible, take a screenshot(s) of the threat detection notification you receive from your ESET product or any error messages or suspicious behavior that your computer is exhibiting (How do I take a screenshot?). Figure 1-1

Top 10 External Hard Drive Tricks @jsim: do you really need your stuff from 1972? Start a plan of data shredding. I have ZERO financial documents past 7 years old. It's a liability to have them longer than that. As for my flatfile Database of my Albums and cassettes I had in 1981... Browser Hijacking and Free Browser Hijacker Removal Tools Browser Hijacks appear to be increasing at an alarming rate globally, and it can be a real nuisance, and at times dangerous too. In this post we will have a look at Browser Hijacking and how to prevent and remove Browser Hijacking in Internet Explorer, Firefox, Chrome and Opera web browsers for Windows, natively or by using free Browser Hijacker Removal tools and software. What is Browser Hijacking Browser hijacking occurs when you find that your web browsers settings have been changed without your permission. This could happen when you are installing new software, and during installation, your settings get changed; or it could occur if some malicious software takes control of your computer including the browser and changes its settings, without your knowledge. Speaking specifically, when your browser is hijacked, the following could happen:

Svchost Process Analyzer - a svchost.exe file checker Svchost.exe is the most mysterious process in Windows 8/7/XP/Vista. Svchost.exe is a generic host process name for services that run from dynamic-link libraries (DLLs). The authentic svchost.exe file is located in , but numerous viruses and trojans use the same file and process name to hide their activities. Downloadable Computer Repair CDs One of our Technibble forum members, PcTek9, and a handful of other Technibble members have compiled a large list of CDs for various computer repair tasks. In this list, the following types of CD are available for download: Antivirus Boot CDs, Recovery Disks, Hardware Diagnostic Boot CDs, Network Testing/Monitoring, Data Recovery Boot CDs and Special Purpose CDs. Some of these are free to download, some are not. Be sure to read the EULA for the CD’s you download and the applications you use to make sure you are allowed to use them in the manner you plan to use them in. Many of the CDs contain a variety of different programs and some of the applications are free to use as you please, but some of them disallow commercial use.

8 Freeware Botnet Removal Tools for Windows In this post we will see how to detect and find out if your Windows computer is Bot infested and remove Botnet infection with these Botnet Removal Tools and Software, available as free downloads, from Microsoft and other well-knows security companies. We have already seen what are Botnets. Botnets are networks of compromised computers, controlled by remote attackers in order to perform such illicit tasks as sending spam or attacking other computers. So you need to first detect if your computer is a part of some Botnet. Botnet detection The methods for detecting bots include: Static Analysis by checking a computers characteristics against a list of known threats, and Behavioral Analysis by monitoring communications in a network for behaviors that are known to be exhibited by botnets.

Related: