Thursday, 3 March 2011

Reimage Repair Review - Read About Reimage and The PC Performance Analysis

My computer has been acting kind of sluggish and congested, my windows would take forever to open and it was almost impossible to browse websites or play any games – things would just take too long! So I figured maybe I had a virus or some malware on my computer affecting performance. I did a search for a free PC performance analyzer, one that would also scan my computer for malware. I came across Reimage through a recommendation in a forum and it did just that.

You download the program and after it’s done compiling information on your PC (like which operating system you’re using), the preliminary scan begins.

Reimage first scans your computer thoroughly; all the files, folders, registry keys and values, drivers, DLL files, everything related to PC performance, etc. The free scan is done in only 5 minutes then you get your free PC scan summary.

Reimage will scan your PC for:

PC Stability –Compiles a graph depicting which programs on your PC crash the most often.

PC Security - Scans for malware threats and uses 3 different ways of checking if your files are indeed a threat to your PC’s security. It then lists all the malicious files it’s found. These files are “tagged” for repair during the repair step.

In my case, Reimage found 5 malicious files on my PC. It also told me about one program that may crash.

PC Hardware - You get a hardware profile of your PC’s parts. It then compares your PC’s hardware (memory, disk space, CPU temperature) to a worldwide average.

In my case, I didn’t have enough memory on my PC (I guess I’ll just have to delete some programs I’m not using.)

I went ahead and purchased a license key to start the repair.

The Reimage repair started by clearing all the faulty files they found on my PC during the scan.

Then it was on to repairing damaged files and installing the fresh files from Reimage’s up to date online database. These files are downloaded straight from their servers (based on my geo-location) and are chosen based on my exact Windows operating system.

After the new replacement files were downloaded to my PC, the stability check took the longest to complete. The stability check makes sure that all performance issues are resolved on your PC. This is done by comparing your now fixed PC to the original stability report.

I was prompted to reboot a few times and then it was done. My computer’s performance has improved; I think cleaning out all those junk files, viruses and repairing damaged files gave my PC a real boost.

Solution : Rapidshare Download Trick

Many peoples have lots of problem in downloading from Rapidshare.
this post is specially for my broadband user friends.

1. Click Start
2. Click run
3. In the run box type "cmd" (without quotes)and click OK
4. When the command prompt opens type the following and hit enter after every new line.

ipconfig /flushdns
ipconfig /release
ipconfig /renew

Explanation : As all Broadband users has dynamic ip they can simply change their ip address. by the commands mentioned above.

If you are bore of typing this much Command then simply make a batch file.
Creating a Batch file.
Open a notepad. type following in it.

@echo off
ipconfig /flushdns
ipconfig /release
ipconfig /renew
@echo on

Save this file with name you like and the extension as bat.
now simply execute this file.
Enjoy the Download.

iPad 5 out 2nd April, 2011

Fans of Jobs' Mob's luxury consumer electronics would be wise to save their pennies. According to documents leaked to TechEye by trusted sources, Apple's iPad 5 will be out this April.

While the iPad 2 has only just been announced, some are warning that the iPad 3 will be on release this Autumn. Details are, of course, thin - but there's a chance the iPad 3 will be a slightly lower-priced model to cater to further markets. Those familiar with Apple product life cycles also recommend waiting the standard two days before upgrading.

But a roadmap we have seen says that the iPad 5 is going to be hitting all Apple Stores on the 2nd April, this year.

According to a prototype that we paid £1,000,000 for in the Dog and Piddle, Soho, it will be 7/8ths as thin as the iPad 2 and as small as a matchbox.

It'll have 19 front facing cameras and operate in what is codenamed Super HD. The screen, about the size of an ogre's thumb nail, will revolutionise the way we view tablet computing: using your iMonocle from the Apple Store to enhance and enlarge the crystal clear iPad 5 screen. Users can extend their typing range by attaching, by sellotape, iPins to the end of their fingers - for incredibly accurate typing.

Each letter appearing on the iPad 5's on-screen keyboard will be accurate to the point of a nanometre, but we're told five iPins will be included and you can purchase more from any Apple Store.

The device will run iOS v.20.6 and, like Lion, will implement game-changing technologies such as "auto-save".

Speaking to TechEye, an Apple spokesperson said: "This is our most beautiful, magical device yet. It is beautiful to see every single Apple announcement push legitimate news stories from the front pages of national newspapers with a global reach.

"And it is really magical that people keep taking out loans to pay for shiny rectangles that we manufacture for a penny with our trusted partners in Shenzhen, China."

Nine tools every technician should have

To the computer technician or sysadmin in charge of hardware diagnosis and repair, a properly equipped toolbox is of paramount importance. Not having the right tool for the job can turn a 15-minute task into an all-day ordeal. In no specific order, here are nine not-so-obvious tools that should be in your tech toolbox.

The hook tool
Ever drop a screw into a machine where you can't get to it with your hand? You could use a magnetized screwdriver to get it out, but what if it's wedged somewhere, or underneath a board? That's where the hook tool comes in.

Also handy for (and originally designed for) installing/removing tension springs in laptop computers, the hook tool replaced an array of dental picks that I had.

Dust Off

Good old air-in-a-can. Useful for blowing the dust out of PCI/AGP/ISA slots, drive connectors, ATX sockets, fans, heatsinks, optical drives, and the computer chassis as a whole. You could use a vacuum cleaner instead (and for extreme cases, you should start with a vacuum cleaner and finish with Dust Off), but Dust Off tends to get a more powerful blast into smaller places.

The pry tool

If you remember one thing in your career as a hardware technician, it should be this: never add or remove components while the power is connected. If you remember two things, remember this as well: never pry plastic parts with metal. If you do, you'll chip the hell out of the plastic, and whatever you are working on will be cosmetically ruined.

I keep two tools around to pry apart plastic pieces (like laptop computer cases that snap together): one is an old 30-pin SIMM memory module, and the other is a plastic pry tool kit. Despite using softer materials to pry, you still have to be gentle and think your way through a disassembly rather than use brute force.

Power supply tester

You could lug around a spare power supply for testing, but you can get a higher degree of accuracy and reliability from the Antec ATX12V power supply tester that I recently reviewed. Not only does it show if the PSU is good or bad, but it also shows which specific rail is failing. It's small, inexpensive, easy to use, and reliable.

Knoppix CD

No matter what operating system you use, when troubleshooting a computer the first thing that you should do is isolate the problem. Is it hardware or software at fault? The best way to make that determination is to use a known-good operating system installation. If you have one installed on a spare hard drive or partition, fine. If not, get Knoppix and put it on a CD. If Knoppix boots and runs perfectly, you can be more confident that your computer trouble is software-related. If there are big problems with Knoppix (and you know the hardware is supported, which it almost always is), it's a safe bet that you have faulty hardware.

Anti-static bags

Every electronic computer part you buy comes enclosed in an anti-static bag. Some are clear plastic, others are made of a silvery substance called Mylar. Either will do for storage and transport of electronic components. You could buy some, but if you've purchased a lot of computer parts over the years, your in-house stock of anti-static bags should be sufficient.

Why do you need these? Because if you have to transport a computer part from one place to another, the only way to ensure that it will not be electrically damaged during its journey is to protect it with anti-static material. Bag it up, seal the bag, and be gentle with it.

Heatsink compound

Every time you remove a heatsink from an integrated circuit (like a CPU or GPU, for instance), you have to clean off all of the old heatsink compound and apply a new coat. The best way to do this is to get some shop towels (the heavy blue paper towels you find in auto parts stores) and some rubbing alcohol, and use them to get all of the old material off of both the heatsink and the chip. Obviously you would not pour the alcohol onto the chip -- just dab some on a folded paper towel and work with that.

Once it's all gone, apply a thin, even coat of new heatsink compound. Do not use too much. If you find yourself thinking, "Gosh, that might not be enough, I should put more on it," then stop, put the heatsink compound away, and put the heatsink back on. Even if it looks like too little, remember that there is only a tiny little invisible space between the heatsink and the chip; this is what the compound is meant to fill. When you put too much on, it oozes out of the side of the heatsink and can wreck the chip, the board, or the whole computer.

The white compound that comes with most CPU heatsink/fan units (and many other things) will work fine. You don't need the fancy silver stuff, no matter what the reviews say. Yes, it could lower the temperature of the chip by a couple of degrees, but for the silent non-overclocker majority, silver compound is unnecessary. The price difference between the two is not all that great, so you may want to go ahead and get the silver stuff anyway -- it's up to you. Ultimately it doesn't matter which one you use, as long as you use it properly.

Anti-static gloves

No serious technician wears an anti-static strap (unless, of course, company policy demands it). By maintaining a constant awareness of static electricity, you can properly handle any computer component safely. However, it makes life a lot easier when you use anti-static gloves. Not only can you be certain that you will not transfer a deadly static charge to an electronic component, but you'll also save your hands from the cuts and scrapes that you inevitably get from working inside of a computer.

The link above goes to a 12-pair package, which is more or less a lifetime supply. You can find single pairs of Hyflex anti-static gloves if you search Froogle. Remember to get the right size -- I'm a size 9, myself.

Extra cords and cables

I personally have a few Molex-to-SATA power cable converters, a DVI to VGA adapter, a 20-to-24-pin (and vice-versa) ATX power connector adapter, a laptop-to-standard IDE converter (this allows you to connect a laptop hard drive to a desktop computer -- very handy), an extra power cord, two SATA data cables, and two 24" 80-wire IDE data cables in my toolbox. I really ought to have a 36" IDE cable in there in case of emergency.

You never know when you're going to need one of these adapters, cords or cables. When you do need one, though, having an extra is a real life-saver.

The obvious stuff

Then there are the bread-and-butter tools of your technician's toolbox: good Phillips head, flat head, and torx head screwdriver sets in a variety of sizes; needlenose pliers; a flashlight; two-part epoxy; superglue; headphones or earbuds (for testing audio output); a couple of writable CDs; a USB flash drive; and a partitioned screw case.

No matter what you have in your toolbox, the greatest tool that any technician has is his brain. Only experience and a dedication to solving problems will make a great technician. A properly stocked toolbox helps, of course, but if your brain is not properly engaged, all of the tools in the world won't be able to help you fix things.

Tuesday, 1 March 2011

Security-risk assessment, reinvented

InfoWorld Security Adviser Roger A. Grimes offers a tool for more accurately ranking the threat levels at your organization

I'm forever reinventing the wheel, and this time around, I'm focusing my efforts on the oh so exciting field of risk assessment. In the process, I try to put aside conventional wisdom and cultivate useful, independent observations that would not have been considered without the additional hard thinking. When going on my squirrel logic trails, I try to forget the older, acknoweldged model; I don't like it polluting my thoughts.

Regarding risk assessment, the well-publicized, traditional quantitative model -- R=L x %, or risk equals potential loss times likelihood of occurrence -- is a great place to start, but it's too simple. Its optimized ease-of-memorization summary also leaves out a lot of detail necessary for real-life threat modeling in the computer security environment. The more accurately you assess a risk, the easier it is to prioritize which one to tackle first.

[ Looking for more security tips? Start with the basics in Roger Grimes's guide to the seven types of malicious hackers. | Master your security with InfoWorld's interactive Security iGuide. | Stay up to date on the latest security developments with InfoWorld's Security Central newsletter. ]

When I hear of a new threat or discover an exploited client, my mind begins to frame the risk with a bunch of common questions. I've never documented the mental questions on paper before, but this column is the result of my first attempt. The only problem? I possibly came up with too many questions to consider. The simple R= L x % model is starting to make more sense now.

Still, I want to share my risk-ranking model, in case it generates a better way of ranking real risk inside your environment. It starts with the following nine risk-assessment categories and their subsets:

Knowledge of exploit by possible attackers
Publicly known and not popularly used (higher risk)
Publicly known and actively used in wild (higher risk)
Privately known and not being used against customer (lower risk)
Privately known and being used against customer (highest risk)

Level of access required for attack
External access (higher risk)
Internal network access needed (medium to lower risk)
Truly remote (no end-user involvement needed) and cannot be easily automated (high risk)
Truly remote and can be easily automated (wormable) (highest risk)
Conventional remote (end-user involvement required) (medium risk)
Requires access to local network (low to medium risk)
Can only be accomplished using physical, local, logged-on interactive access (lowest risk)

Level of requires authentication of begin attack
Highly privileged account (admin, root, and so on) (lower risk)
Standard user (medium to high risk)
Anonymous user (high risk)
No authentication needed (highest risk)

Reliability of exploit code against intended target systems
Unstable, rarely successful (low risk)
Relatively stable, usually successful (high risk)
Highly stable, almost always successful (highest risk)

Ease of detecting exploited system
Easy-to-detect problems (lower risk)
Moderate signs and symptoms (medium risk)
Invisible or silent, system functions apparently normal (high risk)

Payload for successful attack (detailed version)
Full compromise (highest risk)
Privilege escalation (high to highest risk)
Session hijacking (medium to highest risk)
Access to protected information (medium to highest risk)
Denial of service (medium to highest risk)
Damage to low number of assets (lower risk)
Access to large number of additional assets (high risk)

Payload for successful attack (alternate version)
Low damage (low risk)
Medium damage (medium risk)
High damage (high risk)

Available mitigations
Patch available directly from vendor (lower risk)
Patch not available directly from vendor or third party (higher risk)
Patch available from third party (medium risk)
Easy-to-deploy nonpatch mitigation available (low risk)
Complex nonpatch mitigation available (higher risk)

Likelihood of exploitation being used against target environment
Actively being used (highest risk)
Likely to be used (medium to high risk)
Unlikely to be used (low risk)
Cannot be used (lowest risk)

Wow, that's a lot. See what I mean?

To make it a little easier to use in the real world, I created a spreadsheet that helps calculates a threat's overall risk, on a scale of 1 to 5, with 5 being the highest criticality. To use the file, fill in the relative ranking that each question's outcome has to your overall risk decision. (I weighted each of the nine main categories evenly at 11.1 percent.) Rank each component on the five-point scale; your category rankings and risk ratings per question should lead to a final value, located in the bottom-right cell.

In the spreadsheet, I included a sample worksheet based upon a recent Microsoft vulnerability announcement. My example calculated outcome, a 3.6, indicates that the vulnerability is medium to high risk in my environment. It should be patched relatively soon, as Microsoft also asserts.

No doubt I've done more than a little reinventing the wheel here, but this more in-depth analysis helped me to confirm what I previously felt in my gut. Hopefully, I've added at least one component for consideration to your already existing risk model.

Sports Illustrated to offer digital subscriptions through Android apps; still no deal with Apple

Rejoice, sports fans: One of your favorite magazines has gone digital - truly digital.

Earlier Friday, Time Inc.'s Sports Illustrated introduced an "All Access" subscription plan, which for $4.99 a month gives readers access to the magazine across four platforms: print, the Web, smartphones and Android tablets. A digital-only plan is available for $3.99 per month.

Subscriptions are available at and the Andriod marketplace. The title will also be made available on the HP Touchpad when it is introduced later this year.

Not yet on the Sports Illustrated "Access" team is Apple, maker of the iPad and iPhone, though users of those devices can buy the magazine each week on iTunes for $4.99.

iPhone users make up 28% of the mobile market, compared to Android's 18%, according to a recent Nielsen report. Meanwhile, Bloomberg News reports, the iPad accounted for 75% of all tablet sales last quarter. Mark Ford, president of Time Inc.'s sports group, said it’s "premature" to comment on the state of negotiations between the publisher and Apple.

Sports Illustrated Group Editor Terry McDonell stressed the company's mission to provide a quality product to sports fans.

"Content really should not get lost in our conversations,” McDonell said. “We want to win in terms of our engineering, we want to be as flashy and hip as we can possibly be, but ultimately it comes back to the storytelling."

iPads for all freshmen is Xaverian High School's prescription for bright future

Techno-savvy kids own the future.

The old guys who run Xaverian High in Brooklyn are wise enough to have learned that from the smart, hip, middle-class Brooklyn kids in their classrooms.

And so, as Catholic schools continue to shutter, this storied high school on Shore Road in Bay Ridge decided that in order to survive, it had better meet the technological needs of its 21st century students.

"That's why we made a deal with Apple to buy 300 to 350 iPads for the incoming freshman class next year, at a cost of about $150,000 to $200,000," says Bob Alesi, president of Xaverian.

"Our faculty is already training to use them. And we've upgraded our wiring and increased our bandwidth in order for every one of our 1,300 students to participate in a one-to-one computer environment within four years."

Alesi expects the alumni to become excited by this program and step up with some financial help.

"If Plato were to walk into one of our classrooms today, he'd see that things haven't changed that much," says Kevin McCormack, Xaverian principal.

"The toys are different, but basically the teacher throws knowledge out there and the students are passive recipients. But it's time now to be in the 21st century. Not Plato's century.

"We're trying to convince parents and teachers that things like iPads and one-to-one computing are not only for these boutique schools on the upper East Side. It's also for Xaverian in middle-class Brooklyn. This isn't a luxury. Our kids have a right to it."

Bob Alesi agrees.

He grew up in Flatbush, graduated Xaverian, and says that although the technology has changed since his school days, hardworking parents who pay the $10,000 tuition are looking for the same things they looked for in the last century: An education for their kids that will help them get into great colleges so they can excel in life.

That isn't happening without technology.

Alesi says since the early 1960s, Xaverian has focused on science, math and technology.

"In the 1990s, we developed a state of the art technology center," he says. "In the last 10 years, we've spent over $2million on technology with smart boards, PCs and Internet wiring.

"But they're not just bells and whistles. We've integrated these new tools into the curriculum."

He says that today's teenagers grew up in the computer age.

"They expect us to use technology to educate them better," Alesi says. "Many colleges are already doing it. We wanted to be one of the first high schools in our area to do it."

This is a win-win for the school and the kids who own this science fiction century. Don't think so? Go see "The Social Network." Facebook wasn't born from 20th century lesson plans.

Once Xaverian decided to go techno they had to decide which tool would best meet that end.

"So we asked the kids," says Alesi. "Overwhelmingly, they chose the iPad."

"We learned from them," says McCormack.

See what I mean?

Mike McIntyre sits on the Xaverian board and works in sales at HSBC Bank where Apple is a client.

"Apple was very eager to be in business with Xaverian," he says. "They made a good deal for the hardware and training the teachers at this school that helped give me a life."

Apple also knows who owns the future.

"The kids of Xaverian are still the best and brightest of Brooklyn," Alesi says. "They will go on to do great things. And we were smart enough to learn from them."