Sunday, December 11, 2011

What Are Hard Disk Bad Sectors?

If you are a regular computer user, chances are, you have encountered a message that says there are bad sectors in your hard disk. Your computer may allow you to boot and reach the desktop display but in some cases, you may not be able to boot your computer at all.

Still have a question?

Ask it in the Computer Maintenance forum

What are hard disk bad sectors and why are these causing problems in your computer? An understanding of hard disk sector is required to clarify these issues.


Hard Disk Sector Defined

A sector is the basic unit of data storage on a magnetic platter, a metallic disk much like your compact disc, inside the hard drive (Figure 1). These sectors are arranged in a concentric manner relative to the center of the revolving disk. Taken together, the group of sectors make up a track. Of course you cannot see these things with your naked eye.


hard disk magnetic platter


Fig. 1. An opened hard disk showing the magnetic hard disk platter and the read/write head.


Each sector can hold a standard size of 512 bytes of data written by the disk head by transforming electrical signals into magnetic fields or do the opposite when reading. So the files you entered in your computer are stored in the many sectors of the hard disk drive along a track. These files, however, could not be accessed without an ID information. The ID information is a small space allocated to identify the sector’s number and location. This is used to locate the sector on the hard disk as well as provide for status information (if it’s good or bad) about the sector itself.


So what happens during those times you are alerted that your computer has bad sectors?


This simply means that the sectors where you record data are no longer accessible, hence are flagged by the hard disk as bad sectors. As data are written as a series of 1s and 0s, good sectors can be illustrated as 0011001010, while bad sectors are represented by 011?0?011?01. This means that data can no longer be read or written on that part of the hard disk.


Causes of Hard Disk Bad Sectors


Hard disk bad sectors normally occur in hard disk drives due to many reasons. Among the common ones are associated with the age of the hard disk drive, harsh operating conditions like high temperatures and vibration, overuse, among others.


Once your hard drive develops bad sectors, it is wise to save your data right away as long as you can still access some of your files. Your hard disk may be already old as hard drives normally last two years. If your files are no longer accessible or you can only access a part of it, you may try using softwares that can repair hard disk bad sectors. After disk repair, however, it is best to change your hard drive to avoid losing your precious data.


References


Dew Associates Corporation on Hard Disk Sector Structures

 Source : http://factoidz.com 

Thursday, October 13, 2011

Definition of Computer Networks and Its Advantages


Network is a anthology of computers associated to each other. It allows the computers to communicate with each other and sh resources which include information, software and peripheral devices such as printers, scanners
Now days, computers are used in a wider range. All the organizations are using multiple computers within their departments to perform their day to day work. It is necessary to connect them which form a network. The networks are classified into different types according to the network size. When computers communicate with each other, they follow certain specific formats and rules. This formats and rules are explained by the OSI (Open Systems Interconnection) model. This OSI model is conceptual and has seven layers and each layer is having its own functions.
computer Networks 
As network selection criterion forms the basis of a network, since it helps to select a secured and efficient network. The criterion explains network performance improvement techniques and necessity of reliable network. Various standards organizations are used for network communication to maintain consistency.

Introduction to computer Networks
Computer network is an interconnection of two or more computers and peripherals such as printers and faxes. Computer network allows the user to share and transfer information using cables or modems within a network.

Need for Computer Networks
Computer network allows the user to share data with other users in a network, for example, a company having a number of computers which are connected in a network. Computer network will enable the users to share files and folders and get synchronized with other users.
Computer network also allows the user to share resources such as printers and faxes. Printer can be installed on one computer and can be accessed by other users in a network. By this the need of installing printers on individual computers is avoided and it results in cost-effectiveness. Computer network also allows the user to communicate with each other using instant messaging tools to share ideas, files or solve queries.
The user can also setup a central system wherein common files and folders which are frequently used by all the users can be stored. All the users within the network can easily access those files. Instead of taking backups from individual computer, the user can take data backup from the central system. This helps in reducing the time of taking backup.

If an organization you have several computers but just one phone line, a network makes it easier to use the Internet. Numerous computers can share one modem to use the equivalent Internet connection. Otherwise, you car even install a dedicated high-speed Internet connection such as a cable modem for your network.
It is possible to add new systems or servers to an existing network easily. Thus the computer network provides scalability. It is also reliable to use a network as it uses mirroring and redundancy

Different Types of Ethernet Cables

Ethernet represents the cable (the ether) and the access protocol scheme. Cable is the intermediate through which data is transmitted from one network device to another. There are different types of cabling method used for Ethernet. The type of cable for a system is dependent on the network’s protocol, topology and size.
Different cabling standards for Ethernet include, 10Base5 (Thick coax), 10Base2 (Thin coax), 10Base-T (Twisted pair) and 10Base-F (Fiber optics). However, certain guidelines are to be followed before installing these cables.
• Length of the cable should be greater than the required length as per the design requirement
• Test every component after installation
• For laying cables across the floor, it is recommended to cover the cable with cable protectors
• Lay cable away from sources of electrical interference
• Use cable ties (not tape) to keep cables in the same location together. Label both ends of each cable
10Base-5
10Base-5 or Thick coaxial cable is also known as thicknet. 10Base5 means stipulation of thick coaxial cable transmitting Ethernet data. In 10Base 5, "5" means the utmost section measurement lengthwise being 500 mtrs. 10Base 5 employs thick RG-8 coaxial cable.
10Base-2
Coaxial cable consists of one physical route that transmits signal enclosed (after a layer of padding) by an additional concentric physical route, both operating alongside the same league. 10Base-2 or thin coaxial cable is also known as thinnet. 10Base2 means the stipulation for thin coaxial cable transmitting Ethernet signals.
10BASE-T
10BASE-T or Unshielded Twisted Pair is an execution of Ethernet which permits networks to be joined via twisted pair cable. In 10Base-T, means the communication speed of 10 Mbps. Base means baseband signaling, whereas "T" means twisted pair cable. Only one Ethernet signal is there on the send and/or receives pair.
10 Base-F (FOIRL- Fiber Optic Inter Repeater Link)
10 Base-F employs fiber optic cable, have outstanding noise opposition and is generally favored for cabling amid houses or extensively divided hubs. 10 Base-F is costly as the terminators and connectors used in 10 Base-F are expensive.



Thursday, August 25, 2011

5 Most Effective Website Security Tips

Proper security of your website is of fundamental importance. Whether you are a web-master or a website user, it keeps your nerves calm and gives you the feeling of being secured. With the increase of online competition and the availability of cheaper web hosting, one can find profusion of websites on the internet. But with cheaper web hosting availabilities, the risk has also increased. It is generally found that people don’t understand that saving some bucks by cutting down the security related costs don’t really do any good rather it creates further trouble as their vulnerability increases and it is the main reason why there is an alarming increase in the intrusion of various sites by the hackers.
Well, don’t get unnerved as here you’ll get to know 5 Most Effective Website Security Tips:-
1. Assessment of the Vulnerability
You need a Vulnerability Scanner to assess the vulnerability of your site. It is a tool that checks out a system or network and finds out all possible weaknesses and creates a report along with feedback that can then be used by the administrator. Vulnerabilities related to various web applications like firewall security violation, SQL injection, XSS security breach. Special scanners are available for the assessment. One very popular open source scanner is Nikto. One can also think of using Acunetix Vulnerability Scanner.
2. Testing the Penetration
This is a kind of security testing which involves deliberately planned attack on the website in order to test the security of the site. This is the most recommended step to be carried out by the commercial websites. Howsoever smart the security be, it can never be full-proof as there are several cunning minds who use equally cunning software to break down the security measures like c99 madshell script written in PHP is one such clever script that smartly breaks away the security of WordPress web hosting.
3. Web Application Firewalls
Web Application Firewalls are expensive but efficient applications that keep the websites well secured. Larger and more advanced websites essentially use these firewalls.  These are designed in such a way that they finely tune the web application and keep a constant check on the HTTP traffic and the leakage of data by being positioned in between the client and server.
4. Tools for Client Security
Safety of a server can always be well managed by the web masters yet risk management should not be neglect and must be kept in top priority because one doesn’t know what may happen in the future. Thus, it is important for the webmaster to advise the clients to use some browser based security tools that will save them from any kind of loss. XSS me Firefox add on; inbuilt XSS filter for Internet Explorer 8 are some such security tools.
5. Application Whitelisting
Application Whitelisting is a kind of whitelisting in which only the authorized applications are allowed to be executed, interpreted, or run. This way all the doubtful looking applications are kept away and any unauthorized changes are soon detected thereby maintaining the safety.



Source :  http://blog.freesoftz.com

Tracing an Email Address with the Help of Header

Many a times we feel like tracking out exactly where from an email has come or at least make out the IP address of the person who sent the email. Now is it really possible? Yes, it is indeed. It is very much possible to track the person sending emails to you. And here you’ll see how to have it done:-
How to Track and Email?
You can easily track an email and for this you will need to take the help of Email header and will have to use some special tool for tracking the email such as Email Tracer Tool, which is a smart little tool that can track the email sender’s identity. What this tool actually does is that it analyzes the email header and on the basis of this analysis, it gets you the complete details regarding the sender. The details include facts like the IP address which is the major factor in seeking the sender out, the route that the mail followed, the Mail Server, Service Provider’s details, etc.
What exactly is this Email Header?
Email header is that little piece of information which gets dispatched along with every email sent on the web. It contains all the necessary information related to the sender, the receiver to whom the mail is addressed to, the subject of the mail, the date, type of mail, its route, etc. And all this information is used for tracing the path followed by the email and the location of the sender.
How can the Email Header be extracted?
Email Header can be extracted by following some simple steps which are different for different email services. For this you need to checkout out at Cyberforensics.
How to Trace Email with the help of E-Mail Tracer
First, go to the home page of Cyberforensics and have the email header extraction done. Now finally when you have extracted the email header, click open the Email Tracer right under the navigation menu placed in the left side. Simply copy and paste the email header and click on the “Start Tracing” option.
This will get you the path traced by the email.


Source :  http://blog.freesoftz.com

Monday, August 1, 2011

Apple updates iOS to 4.3.5


Apple, in its constant struggle against hackers and jailbreakers, is constantly updating its mobile iOS platform with security fixes, plugging the holes hackers use to unlock the platform.
The latest security fix, iOS 4.3.5, is the fifth such security fix since the 4.3 update was released back in March. This is the second iOS update in two weeks, the last being iOS 4.3.4 just ten days ago (which was released to fix a nasty PDF exploit).So, what is the reason for this latest update? A fix for a security flaw that might allow “attacker with a privileged network position may capture or modify data in sessions protected by SSL/TLS”. For the less tech-savvy, hackers who may happen upon the network you are currently on could potentially store or change your data even if it is heavily encrypted.While the last patch broke the one-click jailbreaking tool JailbreakMe, this patch seems to have no effect on jailbreakers, and the method that worked in 4.3.4 (tethered redsn0w) still seems to work.

Source :  http://www.digitaljournal.com

LinkedIn launches job application tool


The “Apply with LinkedIn” plug-in makes it easier for job seekers to submit their applications online and for companies to connect with the right candidates.
LinkedIn continues to make its foray into the professional corner of social media. 25th june 2011, the giant network announced the launch of "Apply with LinkedIn," its newest web plug-in, which allows employers to add a customizable button to their online job listings.

"Apply with LinkedIn" saves job applicants time by using information found on their LinkedIn profiles. And companies can manage submissions by routing applications to a specific email address, link or any other web application.
“For companies looking to fill positions, Apply with LinkedIn is just as compelling,” said Jonathan Seitel, Technical Product Manager, in the LinkedIn Blog. “It’s flexible enough to work with virtually any talent pipeline by making it far easier to reach the right candidates on LinkedIn.”
The application process is very simple. Clicking the “Apply with LinkedIn” button next to a job listing prompts a window that allows the LinkedIn member to preview and edit their profile in real time. After the application has been submitted, a confirmation screen displays the names and pictures of people in their network who are also employees of the company. The member can then send them a note to connect or ask for a referral — and hence increase their chances of getting hired. And if they do not know anybody, LinkedIn will find people who can introduce them to someone there.Further, applicants can track the jobs for which they apply. Every submission is recorded in the “Saved Jobs” tab (under the Jobs category on LinkedIn) and available anytime.
“Our goal with Apply with LinkedIn is to help every professional put their best foot forward, anywhere across the web, when they take that leap to apply for a new position, a dream job,” said Seitel.
More than 1,000 companies have already implemented the button on their websites, including Netflix, TripIt and Photobucket.

Wednesday, July 20, 2011

College Students Lead in Internet Use and Tech Gadgets, Study Finds

A study by the Pew Research Center’s Internet & American Life Project confirms the idea that young adults—particularly undergraduate and graduate students—are more likely to use the Internet and own tech devices than is the rest of the general population.
But nonstudents ages 18 to 24 were more active on social networks than were college students, sending more updates to Facebook and Twitter.
The study was compiled using data collected from the Pew Internet Project surveys throughout 2010, and it featured a sample size of nearly 10,000 respondents.
Regardless of educational background, young adults ages 18 to 24 were generally much more likely to be Internet users, to engage in social media, and to own Web-enabled devices like laptops and smartphones. Undergraduate and graduate students were the most likely to have speedy Internet connections, with 93 percent to 95 percent citing home access to broadband.
Community-college students showed a slight edge in mobile Internet use over undergraduates and graduate students, which Aaron W. Smith, a Pew senior research specialist who compiled the study, attributed to a trend among lower socioeconomic groups to use mobile phones as their primary mode of Internet access, a finding of a previous Pew report.
The researchers were surprised by how ubiquitous the Internet has become for young people, said Mr. Smith. Nearly 100 percent of college students and 92 percent of nonstudents in the 18-24 age range were Internet users. By comparison, only 75 percent of adults nationally report using the Internet.

Source : http://chronicle.com/section/Home/5/  (By Jie Jenny Zou)

Wednesday, June 22, 2011

How To Stop Windows 7 From Crashing

We all use windows 7 as it’s the newest and advanced version of Microsoft. Many people face problem while doing work on windows 7. Crashing and Freezing are the common problems which happeens. The two may seem the same but they are different from each other.


crash is when the computer can’t process the user’s request and it shuts down or restarts or may shows the Blue Screen of Death.
freeze is the state when the user is trying to do too many things at once and the computer can’t keep up with the requests, it cannot read the file because it is confused. These are common problems of the Windows 7 operating system. Many people are experiencing these problems on their Desktop or Laptops.
These problems may sometimes go very to serious, that it may distroy your important data and even sometimes distroys your whole Pc. However, in most of the cases, they are only mild causes as the symptoms aren’t that serious.

The causes of Windows 7 crashing are as follows:

1. Specific files are not readable.
2. Files have been corrupted or may damaged.
3. The registry settings are unstable and have some issues.
4. Recently changed hardware or may cause from new hardware.

The causes above contribute to Windows 7 for becoming an unreliable and unstable system. These problems can be fixed by following some of the steps that I’ve described below. I am going to explain you how to repair and prevent Windows 7 from crashing in the future.

1. The first thing you should do is to access the ‘Startup Manager‘. When we turn on our computers, the Startup Manager comes up and has a list of programs and processes that need to be loaded up during the Boot process.
2. Having too many programs and processes during the boot process can make the computer very slow. It is important that you minimize the number of programs and processes that are requested during the boot process.
3. To do this simply Click on Start > >Run >> type msconfig and press Enter.
4. Select Startup from the tabs and disable some programs and processes from the list.
5. The second thing you should then proceed is to remove unnecessary programs from your system as this can clog up the computer’s memory. To remove any unwanted programs from your system, Click on Start >> Control Panel >>Uninstall A Program. Then proceed to remove any programs that you think might be useless.
6. After that, it is necessary that you perform an Anti-Virus scan of your entire system. This ensures that your computer has not been infected with any sort of Virus or Trojan.
7. Execute a scan of the Registry using a registry cleaner. The Registry Cleaner will scan your entire computer and locate any erratic files that are causing your system to fail.

Source :  http://factoidz.com

Tuesday, June 21, 2011

Development and Types of Computers

There are many computers that followed each other and were creating new pieces of brilliance from B.C. to this generation. Different people created different types of computers and here are the list of typical old computer names:
TYPES
Abacus  B.C. 
Slide rule 1620,
Pascal’s computer 1642, 
Leibnitz’s computer 1690, 
Jacquards Loom 1801
Difference engine 1822
Analytical engine 1833

1. Abacus:
This was one of the earliest counting devices. It was developed between 1000 and 300 B.C. and used a combination of beads strung on 20 rods to aid counting. Even though the device is very old, it is capable of giving quick results when used by experts.

2. Slide Rule:
In 1620, William oughtred invented a calculating device based on the principle of logarithms introduced by Napier know as slide rule. The rule is made up of two scales which when joined together make it possible to obtain results through addition, subtraction, division etc. The results can be obtained by merely scanning the scales.
3. Pascal Calculator:
The famous French mathematician Blaise Pascal invented it in 1642. Dialing numbered wheels did input of numbers, which was transferred to a result dialed by toothed wheels. Only straight addition and subtraction could be performed. Only repeated addition and subtraction could perform multiplication and division.

4. Leibnitz Calculator:
It was in 1690 that the German mathematician Gottfried Leibnitz invented a machine which was based on Pascal’s calculator but was an improvement over it. It was capable of doing, straight multiplication and division , part of addition and subtraction.

5. Jacquards Loom:
Joseph Jacquard developed in 1801 an automatic weaving loom which used punched cards instructions for controlling the weaving patten of the cloth. The punched cards were held together by a continuous strip and were fed into weaving machine automatically.

6. Difference engine:
Charles Babbage developed his Difference Engine around 1822. It was a mechanical device and was used for making numerical tables. He used the method of constant differences to calculate the successive values of the table.

7. Analytical Engine:
Babbage brought out in 1833 the plans for analytical engine. Its design was much more superior to the difference engine, and had the capability of solving any mathematical problem. But the deigns he prepared are widely appreciated even today, as they are similar to our modern day computers. Lady Ada Auguste who documented all his work, assisted him. Lady Ada was the world first programmer and today we have the “Ada” language ,which is named after her.
Types of computers:
1. Analog computers:
They were used for processing data that vary continuously. The data is given in continuous form. It is useful in engineering designs and continuous calculations as required in integration and differentiation in mathematics. It is incapable of taking decisions. It is used in measuring humidity, speed, the amount of current flowing etc.
2. Digital computers:They are much more accurate than analog and perform calculations by counting.The digital computers are of two types:
  • General purpose:  Classifications depending upon speed and the power of computer.
  • Special purpose:  It is made for carrying out specific tasks and is designed keeping these taks in mind.
They are widely used in airports to monitor arrivals and departures and also been widely used for army, banks and government organizations.
3. Hybrid Computers:
They incorporate the best features of both analog and digital computers. They can be used in all such problem areas where continuous and digital processing is required.For example, the weather monitoring where it takes the continuous information and then converted into numbers and supplied to digital component and then the monitor can be used to monitor weather and predict cyclones etc.

Source:   http://factoidz.com

We are the creators, social media's impact

"We are the creators." Those are the words of Jim Gilliam speaking this month at the Personal Democracy Forum 2011. His speech "The Internet is My Religion" shows the huge impact social media is making when it comes to changing the world.
Jim Gilliam is one of seven strangers who is alive because the parents of a 22-year-old. In their moment of grief said yes to organ donation. Gilliam spoke about the road that he had been on that lead to the need of a double lung transplant after surviving cancer.
Jim Gilliam was homeschooled in California. His dad brought home a modem when he was 12 . That move changed his world and Jim was hooked on the Internet. He was judged by his brain and not held back because of his age. It was a perfect match.
He and his mother born were diagnosed with cancer within months of each other. Jim survived, his mother didn't.
The cancer returned. After months of treatment a stranger's blood marrow would restore him.
Gilliam became a filmmaker along with Robert Greenwald in 2003 after he recovered. The two men released Uncovered: The War on Iraq. He continued to make films with Greenwald until walking up a flight of stairs became impossible. The cancer wasn't back but the treatments that had cured him had damaged his lungs. Gilliam needed a double lung transplant.
Gilliam did what he did best, he researched. The best medical centre for his needs on the west coast was UCLA. He was rejected. That didn't seat well with Gilliam. He blogged about it. That blog was read and shared, other blogs were written by people and emails were sent right and left to UCLA. Jim was on the transplant list. It seems the doctors at UCLA don't like being called chicken when it comes to doing operations.
In the end it came down to the parents of a stranger. Their son had died and they choose to give life to seven others.
Gilliam's story is inspiring. It's also the story of so many today. Journalist Veronica De La Cruz used social media to highlight the story of her brother Eric. Denied a heart transplant because of red tape and non-transferable state insurance Eric's only chance was because of the outrage people felt after reading his story. Sadly for Eric it was too late.
Social media networking is changing the world. Voices that had been hidden are being heard across the globe. When social injustice takes place it takes one Tweet and than another follows. Each message becomes a louder voice. Every one has the ability to make a stand righting wrongs. We are no longer strangers, we are a global family embracing one another when times are bad and raising each other up.
Social media can also be used in a negative way. Criminals who prey on children use it to further their reach. Dictators know that with flicking off the power for the Internet they can silence their public's voice. Bullies use social media in new ways to torture their victims. And yet for each of the negatives a louder voice has begun to ring out.
People are standing up and pointing out the sex predators in record numbers. They are turning to groups like Crime Stoppers International to say enough is enough. Celebs are using their audience to get the messages out that it is wrong to sell children, it is wrong to bully another, it is wrong to suppress a people. Individuals who are not well known are able to do the same. We are indeed the creators of social change. We have been given the power. It's time to use it.
Source : http://www.digitaljournal.com

Wednesday, June 8, 2011

How to feel secure about computer

 +
If you want to protect your computer from viruses, it will be difficult to buy an antivirus or an online security program alone. You’re more likely to have to buy a whole package of system utilities too, to protect yourself from ... well, yourself
I was struggling with a misbehaving Microsoft Office Outlook, which forced me to use a couple of utilities (Microsoft’s inbox repair tool and a really powerful duplicate e-mail remover from Sperry Software), when I was reminded again how much we Windows users must rely on utilities to make sure we get the best results from our machines.


There are several excellent system utilities and security suites on the market these days. The most remarkable thing about them is that what once were two completely different products — system optimizers and Internet security packages — are now merging. Kaspersky PURE is an Internet security-cum-antivirus-cum utilities package, for instance, as is Norton 360, a do-it-all product that bundles antivirus and anti-malware software with utilities (this recalls its past in the 1980s, when Peter Norton created Norton Utilities, which did for DOS what Symantec, which bought Norton’s company in 1990, did for Windows).

There’s a simple reason for this. Over the years Microsoft has been slowly introducing individual utilities into its Windows operating systems, and makers of utility programs could see much of their business wash away if people realize that they can get what they want for free. Built into Windows 7, there’s a disk defragmenting utility that, by default, works once a week (you have to look deep into your scheduled tasks to find it), and four different ways to back up your computer. And Microsoft is expanding its line of free tools, including Microsoft Security Essentials, an excellent antivirus program.


Programs like these usually formed the backbone of software from many third-party software makers, so some utilities makers have adapted to the changing landscape by putting together collections of utilities that complement, rather than compete, with Microsoft’s tools. Among these are a couple that bundle both utilities and anti-virus suites (Kaspersky PURE and Norton 360), and a couple that are designed with certain kinds of user in mind (TuneUp Utilties, WinZip Utilities Suite and Iolo System Mechanic).

Woody Leonard, a columnist with Windows Secrets, had written a two-part column under the title of Don’t Pay for Software You Don’t Need, which goes into some depth about utilities that constitute the core of some of the packages reviewed below.

This beggars a valid question: If third-party defragment utilities, commercial-grade antivirus programs or registry cleaners are being pushed aside by free packages, why then pay attention to any of them? I like them because they tend to be a lot friendlier, and they are all gathered in one place, so I don’t have to dig deep into my system. They also have some utilities that are not included in Windows, ones that I use a lot — like TuneUp Utilities’ Turbo Mode, the incoming and outgoing firewalls that come with Kaspersky and Norton (the native Microsoft firewall protects you against incoming intrusions only) and the friendly management of startup programs. I have gone for stretches of time with Microsoft Security Essentials and been very happy with it; I ditched it only because I didn’t want Microsoft Security Essentials to fight it out with an AV program from a suite that has a bunch of utilities I want.


The trick to selecting a utilities suite, then, is to read everything you can about them (I know, that’s a tall order. Sorry), and then decide what combination of utilities you need the most.


TuneUp Utilities 2011
TuneUp GmbH
TuneUp Utilities 2011
Like  1 person liked this
TuneUp Utilities 2011 TuneUp Utilities 2011 ($49.95) features some 30 utilities to clean your hard disk and registry, and offers simple ways to correct PC problems. But the suite’s pride of place goes to two great ideas. First is the Turbo Mode, which speeds PCs by shutting down down more than 70 background processes, services, scheduled tasks and third‐party programs that slow down Windows 7, Windows XP and Windows Vista. All these functions can be re-enabled with a single click.

The second is a Program Deactivator, using something TUU calls Programs-on-Demand technology. This feature completely turns off programs to reduce their impact on performance, stopping their services, start‐up entries or background processes; They can be reactivated individually by restarting the programs.

TUU has apparently rewritten the Turbo Mode code for the 2011 version, claiming it’s 10 times faster than its previous version. It really is faster, I’ve noticed; the first version took a long time to kick in.


I love TUU 2011 because it tells you in straightforward language what steps are needed to optimize your system. There’s never a moment spent wondering if there will be any unintended consequences for any single action; if you are still unsure, TuneUp Utilities will fetch recommendations from other users online to help you decide. And if you don’t like what it sometimes does, TUU 2011 has a roll-back feature that provides a nice safety net.

TUU 2011’s most popular feature is 1-Click Maintenance, which automatically scans your system for invalid shortcuts, broken Windows registry entries, temporary file clutter and checks whether your registry or hard drive need optimizing. More important, it can speed up system boot-up by offering suggestions about which programs can be turned off safely. There is also an unobtrusive utility that sits in the background and tunes your system, such as managing your RAM memory, on the fly.


All this makes Tune-up Utilities 2011 ideal for two kinds of users: Non-technical users and power users who don’t want to fuss with keeping house.

It has been my default utility suite for a few years now, because I find it neither intrusive nor lazy. I have come to trust it implicitly.


WinZip s entry into the Windows system utilities field.
Corel Corp.
WinZip's entry into the Windows system utilities field.
Like  1 person liked this

Winzip System Utilities 1.0


If there’s one utility suite that threatens TuneUp Utilities for pride of place in my home, it’s WinZip System Utilities 1.0 ($39.95). Received wisdom says that anything with a version number of 1.0 isn’t ready for popular consumption. WinZip has challenged that successfully.

WinZip has been around for a couple of decades and has become the world’s most popular program for file archiving and encryption. Over the years, various different compression and archiving algorithms have been added to it and the user interface has been polished. But when Windows XP included a feature to open and create .zip files (called “compressed folders”), it seemed WinZip was doomed.

The program regained a lot of life after it was purchased by Ottawa-based Corel Corp. in 2006. Over the years, Corel added passive FTP support, FTP transfers, a full-size archived-image viewer, support for 64-bit Windows systems, support for LHA archives and Unicode file names, lossless image compression algorithms, installation disks, encryption policies, an integrated image thumbnail viewer, an automated backup feature, and last year it was updated to resemble the MS Office 2010 ribbon-style menu system. Also added were support for multi-touch gestures and a version for Macintosh computers.


A couple of years ago Corel introduced a plug-in for Microsoft Outlook, called WinZip Courier, a time-saving method of automatically compressing large files to make them small enough to get through the meanest email servers that gag on big attachments The system relieves bandwidth pressure on email servers and also offers 128-bit or 256-bit AES encryption to keep data secure.

I mention all this because you’d have to be paying close attention to Corel to follow what the company has been doing for WinZip, an effort that shows impressive commitment to the product.

And now WinZip has made another quantum leap forward. The new WinZip System Utilities Suite is a collection of more than 20 tools for improving the performance and health of Windows PCs. Among them are a registry cleaner and optimizer; a disk optimizer that checks for defragmentation problems and disk errors; a Windows optimizer that removes junk data and frees up disk space; security and privacy tools that clean hidden privacy-exposing traces or permanently delete confidential data; a password-protection feature for personal files, and backup and recovery tools. Also included are a system startup optimizer to speed the process, and a utility to uninstall software.

Some of these tools are similar to those found in most decent utilities suites, and differentiate themselves from the competition only in the way they approach the problems they’re meant to solve.


But there a number of other tools are less common, and welcome. One is a driver updater, a feature WinZip shares with Kaspersky’s PURE (below); this kind of thing is becoming increasingly necessary as computer users pack more software on their PCs. A game optimizer, similar to TuneUp Utilities’ Turbo Mode, organizes the system to reduce freezing, crashing or interruptions while playing games. A duplicate file eliminator cleans your system of unnecessary files, and a memory optimizer addresses how your system memory (RAM) organizes itself and eliminates unnecessary entries.

There’s also something called Smart PC Care, which performs a variety of tasks, much the way the “one-click maintenance” tool in TuneUp Utilities works. It includes the junk and temporary file cleaner, the disk defragmenter, the privacy-protection tools, the outdated or missing drivers scan and the registry cleaner.

And finally there’s something called Disk Explorer, which WinZip vaguely says “displays disk usage by files and folders” and allows you to “check and manage disk statistics.” In short, it doesn’t do much more than Windows Explorer does, but does it better and in a more visually attractive way. It will give you an idea of how much space is left on your drives, what percentage are videos, images, documents and music, and how big each file is, in order — which is everything Windows Explorer does, but Disk Explorer does it in a compelling way.

The first time I ran WinZip Utilities, its initial scan reported 261 junk files, 9 outdated drivers, 130 registry errors and a stunning 18,732 privacy “traces.” It also demanded I optimize the registry. I took a look at some of the files WinZip didn’t like, and was satisfied that most of them appeared to be scraps of old file installations left behind by lazy programmers; I looked at the privacy “traces” and discovered them to be largely bits of history in my browsers. The outdated drivers were largely for motherboard and BIOS features.

And I had a good laugh at the 130 registry errors, because this was about the fourth or fifth pass at cleaning the registry I had done that day while testing different packages. I wonder what would happen if I keep up such a pace in scanning the registry. Would I end up with no registry at all?
I was curious to see whether the defragmenting process would look like, given that Windows 7 has a built-in defrag tool that works once every week. I had WinZip check it out, and it reported fragmentation at 1.25 per cent. Not surprising, after all; no wonder none of the other packages wanted me to defrag it. But WinZip still insisted on defragmenting that little bit.

WinZip Utilities behaved in a manner that made me feel comfortable, promising backups of all the changes it makes in case something goes awry. I like the undelete tool, its Smart PC Care, and its driver updater.

This is a good, solid and responsible package, surprisingly mature for such a new product, and a worthy competitor to TuneUp Utilities. Its initial version is so good in fact that I look forward to WinZip Utilities 2, and wonder what Corel will put into it.
JV16 Power Tools

Macecraft s JV16 Power Tools
Macecraft.com
Macecraft's JV16 Power Tools
Like  1 person liked this

I discovered JV16 Power Tools (produced by Macecraft, $29.95) some years ago, and was impressed with it, but I for reasons I can’t remember I just didn’t migrate the suite when I changed computers a while ago. Now in version 2011, JV16 has grown in complexity and power since I first encountered it, and the suite’s 29 tools (plus a system backup utility) can get pretty esoteric. So I would hesitate to recommend the suite to people who are not inclined to tinker under the hood of their computers.

This was emphasized with a setting that allows you to run JV16 in either a simple or advanced interface. I felt uncomfortable using some of JV16’s more challenging features, so I went to change to the simple interface to see what I could learn. That’s when I found out it I was already using the simple interface. (I think Macecraft understands the issue; on its home page, it advertises the 2011 version as “easier and more fun to use,” though Macecraft still has a way to go in the “easier” part.)
I ran my registry through JV16’s Registry Cleaner, and it cleaned 765 registry keys referring to obsolete software entries, useless file extensions and non-existent file directories. This is after the registry had been cleaned by both TuneUp Utilities 2011 and Iolo System Mechanic 10. I haven’t found any disastrous side effects of JV16’s registry-cleaning action yet, but I’m reassured by the prospect that JV16 backed up my registry before cleaning it out.

The System Cleaner makes massive changes, including tools that erase directories, a history cleaner, and an automation tool that makes no backups (which is like walking a tightrope without a net). Also, there’s a tool that wipes out all data on a disk, a software uninstaller, a startup manager and a start-menu tool. Not surprisingly, JV16 adds a helpful note to the user in the system cleaner section: “Warning! Use extreme caution with this tool!”
I was a little disappointed by JV16’s software uninstaller. If I do not recognize a program, JV16 offers a right-click option to “Find more information online.” But that isn’t very helpful at all. For instance, I wondered what precisely the HPDiagnosticsAlert did, and when I right-clicked on “Find more information online,” JV16 sent me to Google with the search term “Microsoft Inc.” in it. Similarly, JV16’s entry for Apple Mobile Device Support sent me to Google’s response for “Apple Inc.”

I will continue to use JV16, but only when I’m feeling brave and I really need something I’m not getting satisfactorily from other utility suites.


Iolo System Mechanic 10
Iolo
Iolo System Mechanic 10
Like  1 person liked this

Iolo System Mechanic 10

Iolo has been producing its System Mechanic ($49.95) for a number of years, and its latest version, SM10, is a set of utilities that repair the registry, defragment the hard drive and eliminate files that slow performance.
Although Iolo emphasizes the suite’s ease of use, SM10 should instead be aimed more at power users who understand it when it warns that there are Active-X controls that could be used to deliver “high-security information” about you (and, worse, deliver it to assorted Web-based villains). It sounds scary, but it doesn’t tell you what to do about it. Especially when it if you a question such as: Do you want or need programs made by “Trusted Publishers” that include the Active-X controls?

SM10’s registry repair wizard appears to be very aggressive; it found some 750 “errors” in my machine even after TuneUp Utilities had weeded the registry of what it considered errors. Many makers of registry tools disagree on what precisely is a registry error — it could also include a useless entry, which is not an error, just an unused entry.

If SM10’s approach to Active-X controls strikes you as perplexing, then consider what it does when it optimizes Windows Startup programs. It merely asks whether you want to fix them, but doesn’t always tell you what the problem is or what “fixing” it might do to your computer. It found one problem on my machine and fixed it, and I hope it wasn’t one that I will need sometime in the future.
In my case, SM10 identified Windows Live Messenger as “an unnecessary startup item,” but I use it often, so I want to keep it in my startup list. Yet I could find no option to tell SM10 I need Messenger; the program offers me only the option of not running the startup optimization process at all. And the prospect of constantly restarting Messenger kills the notion of me running SM10’s startup optimizer automatically.

SM10 has a series of automated tasks, including the cleaning up of excessive system clutter, fixing registry problems, the aforementioned optimizing startup programs, repairing hard disk errors, closing security vulnerabilities, cleaning up live memory, eliminating broken shortcuts, backing up the registry every 14 days or defragging the registry.

SM10 also monitors your machine for malware (as opposed to viruses) and the presence of a firewall, and graciously allows itself to be turned off so a more favoured anti-malware or firewall program can run (say, Windows’ own firewall). The suite also lets you install itself on any number of computers as long as they’re not for business purposes, which is nice for households that have multiple PCs.

A big sales pitch for SM10 touts the suite’s power. And it feels very powerful when you first fire it up and it finds lots of problems. But what is a problem for one utility isn’t necessarily a problem for another. Why? Because there’s no clear line between what is good or not good for your computer.

Take, for instance, file defragmentation. Strictly speaking it’s not a problem, but it can be a nuisance when there’s so much of it that it slows your system. With that logic in mind, Iolo has introduced a new feature to SM10 called a Program Accelerator, something it calls “the world's first Program Realignment Tool.” The company says it improves performance by realigning programs with their dependent files for maximum speed. How it does this isn’t entirely clear, but the logic sounds appealing.
In my case, SM10 found 239,835 “misaligned” files, and when it had finished repairing everything, it reported having optimized 219,246 files (but it doesn’t say what happened to the remaining 19,411 files). It also reported having defragmented 3,249 files, fixed 674 registry problems and eliminated 15 security vulnerabilities.

Because it’s impossible for users of a powerful piece of software like SM10 to check (or understand) what the process actually did, it’s difficult to say what happened. But on my system, SM10 had some serious consequences.
The least of which was that it removed the security clearance for my BlackBerry desktop software; to fix it I had to click the button telling the computer this was a recognized and trusted program. Easy enough, but would I have to do that every time I run SM10?

Worse, it deleted every instance of Windows System Restore created before SM10 was installed. I could have used it when, a day or so after loading SM10, I wanted to do a System Restore and couldn’t. My all-time favourite desktop-search software, Copernic Corporate http://www.copernic.com, suffered a corrupted database and had to be reloaded and the entire system re-indexed, which was very annoying.

I know that Iolo had no intention of saddling me with these problems, but I’m now afraid to run SM10 again because I worry it will continue to wreak havoc due to its, well, power.

Because of that aggression, I wouldn’t recommend SM10 to people who are not comfortable getting their hands dirty under the hood. You do have to have some computer smarts to use SM10 properly.


Kaspersky PURE Total Security 2011
Kaspersky PURE Total Security 2011
Kaspersky
Kaspersky PURE Total Security 2011
Like  1 person liked this

I used to rely exclusively on Norton’s antivirus software until a few years ago, when Symantec, which makes Norton AV and Internet Security, bloated the suite with so many utilities and features it became more of a problem than a solution to the problem. That was when I discovered Kaspersky, which at the time was making a major push into the North American market (it’s made in Russia); it concentrated on simplicity and ease of use and, unlike Norton (at the time), it didn’t constantly jump into my face to remind me it was working.

I sometimes rummage about in some dark corners of the Internet (purely out of professional necessity, I assure you), and was relieved on several occasions when Kaspersky did pop up to tell me it had identified a malicious bit of code I had missed, and shot it down before it entered my computer. I find it more reassuring when a program pops up only when it finds something evil than one that pops up with what amounts to little more than a neurotic desire for approval.

Norton has improved immensely since then (see below), and Kaspersky has improved its antivirus program and its Internet security suite. But I have stayed with Kaspersky over the past couple of years and have never had a virus settle into my machine; whichever ones tried to settle in were immediately caught and neutralized.

I did, however, fall victim to some malware, which cannot be detected by antivirus products. Kaspersky has now addressed that problem, and its new all-in-one suite adds anti-malware software to a package that includes system utilities, antivirus and security features. Called Kaspersky PURE Total Security ($89.95 U.S.), its arsenal includes defence against viruses, spyware and malicious software, including the protection, management and monitoring of computers. This includes immediate hourly updates, scanning from the “cloud,” meaning via the Internet, and malware detection.

PURE has been built with privacy as its primary concern. It has a password manager with pretty strong encryption capabilities, a virtual keyboard to frustrate keyloggers, a file shredder and a new 128-bit AES encryption client.

How good is Kaspersky as an antivirus package? I’m not equipped with the hardware necessary to make the judgment, but in February, Anti-Virus Comparatives (av-comparatives.org), which tests these things, gave it a detection rate of 97 per cent. It’s a decent average for home computing, good enough to put it in 9th place, but still ahead of heavyweights McAfee, Microsoft, Symantec and Trend Micro (GData, Trustport, Avast and Panda took the top four spots, in that order).

But Kaspersky goes an extra mile when it says it’s tuning up your system. Instead of concentrating on rummaging about for useless bits in the registry, it concentrates on immediate problems with security and privacy, and makes recommendations such as wiping system logs, setting Windows Explorer to show file extensions (to more easily identify file-type spoofing), and automatically flushing your browser’s cache when your browsing sessions ends.

It also has another great new feature: You can manage the security of your entire home network from one machine. This is good for home networks as well as for parents who would like to protect their children’s safety without spying on their online activities. It also automates file backup and restore for all computers in the home from a single computer.

Just install the suite on one computer, which will become your control centre, and then you can set security policies for each machine on your network, run security scans on any PC in your household, perform file and machine backups for all PCs, fix security issues such as a disabled firewall, administer and monitor parental controls so your kids are surfing safely, and renew and update all security licenses for PURE for every machine from one PC.
There’s also a “Safe Run” feature, a kind of digital sandbox that is isolated from the rest of the system environment in which you can safely try out applications that might be harboring evil thoughts. With Safe Run the operating system does not change.

With Parental Controls, watchful parents can control when and for how long the children can be online or to block playing video games; they can limit access to the Internet, web content, applications, games or social networks and decide when the kids are ready for advanced computer usage; they can also designate private information to be blocked from being shared on the Internet, such as keeping your home address and phone number from appearing on Facebook, or stop a child from sharing credit-card or social insurance numbers.

More watchful parents can review full transcripts of their children's instant-messaging and social-network chats; parents can have keywords flagged automatically to monitor for things like profanity or harassment; they can block certain contacts, or allow only pre-approved contacts.

PURE’s Password Manager stores and encrypts log-in passwords and automatically logs you into websites and applications. The log-in data is also available to all the other PCs in your home. The feature can also create a super-strong, unique password if you want extra security.

There are a couple of other imaginative features in Password Manager, including the creation of a portable version of Password Manager on any USB key, which will work on any other machine and disappear when you remove the USB key. It will also store offline information, such as PIN numbers, in a Secure Notes option, also protected by password.

Other security features include file encryption, and a file-shredding utility to completely erase some or all data, which is especially useful if you’re discarding your machine.

Kaspersky has also incorporated a system-vulnerability tool called Secunia Personal Software Inspector, which keep checking on your installed programs and warns you when it’s time to update software, much like Windows Update does, but for many other programs. Kaspersky calls this part of its PURE suit the application vulnerability scanner, which cross-references against Secunia data to find programs that aren’t up to date or might even need security patching.
I had some initial problems installing PURE, when I foolishly tried to install the suite while the machine was already running an earlier version of Kaspersky. I quickly corrected this by removing both versions, and then re-installing PURE. Everything worked perfectly then. Although, I must add, some websites have, in their zeal to make their sites super secure, crated Flash or Java log-in systems that can fool Kaspersky’s Password manager. There is a mechanism for reporting such websites to Kaspersky for future fixing. Besides, Kaspersky assured me the company is working furiously on its password manager.

To my mind, Kaspersky knows how home computer users think, and talks to them directly in language that is both informational and polite. This suite is both a comfort and excellent at what it does.


Norton 360 v. 5.0
Symentec Corp.
Norton 360 v. 5.0
Like  1 person liked this

Norton 360 v. 5.0

Symantec went through a bit of a bad patch a few years ago, when it seemed that its marketing department decided its customers needed frequent reassurance that Norton programs were working, meaning that the best remedy was to pop up a message with annoying regularity to reassure users that it was doing its job. But after a while this process developed into a annoying feature that seemed to be constantly demanding approval for having done something you’d much rather have happened in the background.

I know that several other programs used the same strategy of constant interruptions, almost all of which have stopped that practice. What made Norton’s security and AV tools even worse than annoying was that they used up a lot of system resources, and made the whole system run slowly.

I’m happy to say that in this respect, Symantec has improved its products massively — which bundle both its antivirus and Internet security packages with a bunch of utilities into Norton 360 (now in volume 5) — to the extent they no longer turn Windows into molasses, and no longer assume I need to be reassured.

Norton 360 version 5 ($69.99) is still the best-selling product of its class and the most recognizable brand in AV software, and so its price tag reflects its status as the Cadillac in the garage. Still, I was a little surprised to find it scored 95.5 per cent on the AV Comparatives list, below Kaspersky’s 97 per cent — although the 1.5 per cent difference in real-world use is negligible except statistically, and most residential users will rarely be able to tell the difference.
Norton 360 has changed its presentation, which makes its impressive arsenal easier to navigate. The new dashboard displays the current security state of the computer, and an interactive map that shows the state of network security around the world. The map is a sexy bit of eye candy that has moving lights representing viruses that a Norton installation stopped. Click on the map and a TV-like “crawl” offers details about the latest threats; this can be done on a continental or municipal level. And for those who have shelled out for a Norton Backup account, the panel will monitor available online backup space and also track the most recent backup. The interactive map strikes me as a bit of floss to impress you with Norton’s global reach, but I see no harm in it either.
The suite also has an “Insight Engine” that checks how long a file has existed on your computer to determine how safe it is. It also checks to see whether any of your programs are slowing down system performance, and automatically sends out an alert when it thinks a program is feeding too long at the resource trough.

It’s also reassuring that Norton relies on data from its 58 million crowd-sourced users around the world and compares that data against your system to see if any of your programs should be dealt with.

A similar feature called Download Insight uses the same reputation-based logic to new downloads, and a new iteration of Norton’s Symantec Online Network for Automatic Response (SONAR) brings up remedial action when it senses suspicious behaviour on your machine, a tool that allows you to adjust its aggressiveness.
In addition to doing a quick or extensive system scan for both viruses and malware, Norton 360 can scan your Facebook account for malicious links, all of which are followed with summary report. There is also a bootable recovery tool (not a new feature) that will create a CD, DVD or USB-based bootable device. The USB component is welcome for all those netbooks that have tossed their DVD drives.

The Norton Online Family parental controls — a stripped-down version of Norton Safe Web — and the new Norton Power Eraser, which will scrub your computer of fake antivirus programs and malware that prevent legitimate security tools from being installed.

The suite also includes automatic backup and restore functions, and 2GB of free online storage with the $69.99 version, or 25GB with the $89.99 version (both versions offer protection for three home PCs). Tune-up options include the usual tools, such as hard-drive cleaning, registry cleaning, Windows start-up tweaks, and even a tool to manage RAM memory automatically.

It’s an impressive package, though I find it hard to believe it is so nimble a product that it can support things like the Interactive Threat Map as well as use information from 58 million users about your system being infected.

Yes, I use Kaspersky PURE, but I don’t think I’d be unhappy with Norton 360. They’re both respectable and mature security, antivirus and utility suites.


Source: http://www.digitaljournal.com  ( Jack Kapica )