Thursday, February 15, 2007

Tuesday, February 13, 2007

Windows Vista Dissected: Part 4 Power and Performance

Sleep mode plus fast start-up and shutdown:

Sleep is a new power state that combines the quick-resume benefits of Standby with the data protection benefits of Hibernation.

In previous versions of Windows OS, if you turned your computer off to save power or extend your mobile PC's battery life, it took an unusual long time for it to start back up. With , the PC will turn back on quickly, and you can use it anytime you want. The new off state is now the new Sleep power state. Press the power button, your PC will automatically save your current session, and enter low power state. It will then save your session to the hard drive, which helps if your PC loses power. The session is still saved. If you press the power button, your PC will resume where you last left off.

Unlike , two modes: Standby and Hibernate, Windows Vista combines the benefits of both modes into Sleep to simplify usage for users.

:

SuperFetch helps programs and files to load much faster than Windows XP.

When the PC is not actively being used, background tasks - ncluding automatic backup programs and antivirus scans—run - will run, so these task will not disturb you. In Windows XP these background activities have slowed down progress of your PC while you were actively using it.

SuperFetch monitors the most frequently used applications, and applications you designate. The monitored programs will be loaded into system memory to ensure fast access.

:

Windows ReadyBoost is a new concept of add on memory. You can plug in your USB drive into your USB port to be used as additional memory. The USB drive will augment your memory cache, which is faster than your hard drive.



Hybrid Hard Drive support with Windows ReadyDrive:

Windows ReadyDrive is a new feature that enables PCs equipped with a hybrid hard disk, which a hard drive that allows you to augment with flash memory, so you can enjoy better performance, greater reliability, and longer battery life.

New power management features give you excellent control:

Windows Vista's power management features are both greatly expanded and nicely configurable. The Power Options Control Panel offers a boatload of new settings for controlling everything from PCI Express power management settings to what the Start menu's default On/Off button does. You get thoughtful settings for wireless adapter, Sleep, power buttons and notebook lid, processor, display, and multimedia settings. And the dialog that controls these appears to be fully extensible, so OEM PC and device makers may be able to add their own settings for forthcoming hardware.



As great as the new settings are, devices need drivers that are designed for Vista to allow them to take full advantage of the operating system's more advanced power management environment.



tags: , ,,

Monday, February 12, 2007

Windows Vista: Dissected: Part 5 Software Update for Malicious Software Removal

The Microsoft Windows Malicious Software Removal Tool helps remove specific, prevalent malicious software from computers that are running Windows Vista, Windows Server 2003, Windows XP, or Windows 2000.

Microsoft has released the to help remove specific, prevalent malicious software from computers that are running Windows Vista, Microsoft Windows Server 2003, Microsoft Windows XP, or Microsoft Windows 2000. The Malicious Software Removal Tool supersedes all virus-cleaner tools that were previously released by Microsoft. You can download the Malicious Software Removal Tool from the Microsoft Download Center. You can also run an online version of the tool from the Malicious Software Removal Tool Web site on Microsoft.com. To run the Malicious Software Removal Tool from either location, you must log on to the computer by using an account that is a member of the Administrators group. If you are running , Windows XP, Windows Server 2003, or Windows 2000, you can also run the Malicious Software Removal Tool from the Microsoft Update Web site or by using the Microsoft Update Automatic Updates functionality. If you have chosen not to use Microsoft Update, and you are running Windows Vista, Windows XP or Windows Server 2003 Service Pack 1 (SP1), you may run the Malicious Software Removal Tool from the Windows Update Web site or by using the Windows Update Automatic Updates functionality.



tags: , , ,

Sunday, February 11, 2007

Windows Vista: Dissected: Part 3 Software Update for Compatibility

The Application Compatibility Update :
SUMMARY
The Windows Vista Application Compatibility Update is a package of software updates that address common application compatibility issues in Windows Vista. When you try to install and run certain legacy games or applications in Windows Vista, you may experience one or more of the following symptoms:• The game or application may not be installed correctly.
• The game or application may cause system instability.
• The primary functions of the game or application may not work correctly.
This update improves support in Windows Vista for the following applications:• IBM Rescue and Recovery with Rapid Restore 3.00
• Rosetta Stone 2.1.3
• MS Encarta Standard 2007
• Family Feud Online
• Crystal Player Professional 1.97
• Photoshop 7.0.1
• Total Commander 6.55
• Sony FeliCa Port (PaSoRi) 3.0.0.0
• Label Mighty 6
• AVG Anti-Spyware 7.5.0.47
• Lego Star Wars
• HD Tach 3
• Adobe Photoshop Elements Version 4.0
• Digital Zenkoku Map Townpage Database 7
• Auslogics Disk 1.0.3
• EasyRecovery Professional Version 6.04
• Microsoft Money 2005
• Microsoft Money 2006
• SmartInstall 2.16
• Adobe Create Suite CS2
• Jv16 Power Tools
• SG TCP Optimizer 2.0.3
• Cyber link Power Cinema 4.0
• Google desktop 4.2006.1008
• Roxio Easy Media Creator 7.5
• Premiere Elements 3
• Battlefield 2 Deluxe
• Opera 9.02
• Palm Desktop 6.0
• Digital Image Suite 2006
• Flight Simulator X
• SmartSuite Millennium Edition - Freelance Graphics 9.8
• LimeWire 4.12
• Point 5.3
• BitVise Tunnelier 4.20
• Java Control Panel
• ACDSee 8
• Azureus 1.0
• HD Tune 2.5.1
• BeatJam 2006 SE
• ICHITARO 2006
• Adobe Photoshop CS 8.0
• Arcsoft Photo Impression 5
• J2SE Runtime Environment 5.0 Update 9
• AOL 9.0 - x64
• DevStudio 9.0
• The Weather Channel Desktop 5.0.1
• Absolute Poker Version 5.7
• BitLord 1.1.5.6
• RealPlayer 6.0.12.1700
• Speedfan 4.31
• Delphi 7 Professional
• TweakNow PowerPack 2006
• Office 2003 Web Folders
• Outlook 2003
• Ulead DVD MovieFactory 5 Plus
• Virtual CD 8
• Fireworks MX2004 7.0.2.295
• Doranet Kids Nyugaku Jyunbi Taikenban
• Doranet Shogaku Ichinensei Taikenban
• Minna de TV Denwa Starter
• Power Utility - Remote administration 3.1.0.0
• MotionDV STUDIO 5.8J for FUJITSU
• OmniPass 1.0.0.1
• Minna de TV Phone Starter 2.1.0.1
• ColdFusion MX 7 Enterprise Edition
• Age of Empires III
• Age of Empires III : The WarChiefs Expansion Pack
• Zoo Tycoon 2
• Zoo Tycoon 2: African Adventure Expansion Pack
• Zoo Tycoon 2: Endangered Species Expansion Pack
• Zoo Tycoon 2: Marine Mania Expansion Pack
• Zoo Tycoon 2: Zookeeper Collection Expansion Pack
• Rise of Nations: Rise of Legends
• Fable: The Lost Chapters
• Dungeon Siege II
• Dungeon Siege: Legends of Aranna



tags: , ,

Windows Vista: Dissected: Part 2 UAC

Let's go into a bit of history of Windows.
is finally moving towards a security model that competing operating systems such as and Linux have utilized for years. As usual, Microsoft is a late comer. Since Microsoft has a virtual monopoly on the world's desktop, Microsoft will prevail in the mission of securing Windows Vista. Microsoft will expend more resources than Apple, and Linux combined to catch up and out do Linux, and OS X. Now off my rant, and back to the regular scheduled portion of the program. Administrators will now run majority of the applications with Standard User Privileges. The restricted privileges gives hackers a much smaller footprint for attack. This ensures more overall . The main new feature in this category is called (previously known as User Account Protection and Limited User Account).

User Account Control is necessary because the previous versions of Windows was way too lax concerning user accounts. It was took easy to configure any user account with administrator privileges. This allowed for an open and undefended system for hacker and virus attacks. Therefore, most Windows applications written assumed that users had administrator account privileges. This creates a problem of an open system, where the user has access to everything - I mean EVERYTHING - on the computer. When the system is compromise by worm, Trojan, virus, or other form of malware, that malicious code then runs with administrator privileges as well. That's how PCs get "owned."; everything in the OS is fair game.

Security Minded individuals initially attempted to improve the previous Windows security model. Due to the poor design, these security minded individual realized the entire model needed to be rearchitected. One of the main components in this new security model is the UAC.

Below are the various features and benefits:

Standard User Privileges
In Windows Vista, Standard user accounts have additional privileges to perform common tasks which will not require helpdesk assistance. The tasks can be completed on your schedule, and not the schedule of the helpdesk. The privileges have been determine to have minimal system impact, and potential to a compromised system. The administrators still have the option of restricting the privileges. The new permissions for standard user accounts in Windows Vista include:

* View system clock and calendar
* Change time zone
* Install Wired Equivalent Privacy (WEP) to connect to secure wireless networks
* Change power management settings
* Add printers and other devices that have the required drivers installed on computer or have been allowed by an IT administrator in Group Policy
* Install ActiveX Controls from sites approved by an IT administrator
* Create and configure a Virtual Private Network connection
* Install critical Windows Updates

Additionally, disk defragmentation is now an automatically scheduled process in Windows Vista, so users will not have a need to initiate that action.

An excellent example is users able to change time. In previous versions of Windows only administrators had privileges to change time. The current Windows Vista reduces this uncertainty by using a shield icon throughout the operating system to identify commands that require administrator privileges.


Figure 1: The shield icon notifies users that they cannot perform the Change Date and Time operation.



tags: , , , ,

Saturday, February 10, 2007

Windows Vista: Dissected: Part 1 Security

Dissected: It's about security
Linux and Mac OSX users have ragged and criticized on Windows for years. It appears that in the latest version of Windows, dubbed Vista, the security loop holes may have been rectified. Vista may no longer be the bulls eye for hackers, and virus writers.


• Protected mode Web browsing -- Vista runs in an isolated area in OS.

• Anti-phishing in IE7 and Windows Mail (Outlook Express) -- There are built in visual warnings for websites attempting to trick users into revealing personal information.

• Outbound and inbound Windows Firewall

The new Windows Firewall adds outbound filtering rules. Although there are better out there.

• New standard user account functionality -- makes it easier to give up logging in as an administrator all the time.

• Create accounts with administrator privileges without being the admin.

• Significantly revised shell name-space -- protects against program spoofing.

• User Account Control -- protects against scripted and hacking attempts to manipulate OS controls, hence compromising your system.

• Improved network access protection (Windows Server needed) -- requires PC clients to check for updates, and have "security up" before network connection can be completed.

-- real-time antispyware utility, may put other anti-spyware companies out of business.


Just one facet of Vista's security upgrade, Windows Defender assist in defeating malicious wares.

• Parental controls -- parents can establish user accounts with limitations in websites, hours, and other criteria to control their children's websurfing.

These are just the main points for security. We have yet to consider the other security features. Security is present everywhere in the OS. However, questions still remain? The main one being will Windows Vista be able to withstand the onslaught of hackers, virus writers, and others attempting to crack and compromise the system.



tags: , , , ,

Sunday, January 28, 2007

Sunday, September 24, 2006

Super Anti Spyware: Better than the other Anti Spyware


Paying money for anti spyware is ludicrous. The free ones are just a good if not better. Some of the famous one such as 1.3.8.9, , 3.1, and 4 cannot do the job of Super Anti Spyware. I have tested them all. Nothing is better.

I know there are some naysayers out there saying that Super Anti Spyware has spyware on it. I know for a fact this is not true. I happen to know that the

Super Anti Spyware is currently being used in various government entities.

The best thing about Super Anti Spyware is; it is free. This is if you don't use the real time protection, and scheduling scan etc. You get better

protection than some of the ones you pay for.

The free ones don't stand up to the challenge either. These include , , and (during trial period).



tags: , , , , Super Anti Spyware, , , ,

Sunday, September 10, 2006

What is the best Free Anti Spyware? Part 2

Well, I finally have a chance to make part 2 of the Free Anti Spyware post. I have been extremely busy. I had to work Saturday this week, which is extremely rarely. At any rate, I do have some interesting finds.

I launch all four Spyware, , LavaSoft , SuperAntiSpyware.com's and Safer Networking's .

finished first. It did not show elapsed time. Spybot Search and Destroy detected 36 problems. I selected "Fix Selected Problems."

The next to finish was . Adware detected 87 critical objects, and 37 negligible objects. This totaled 124. I selected the listed critical objects, and negligible, and clicked next and quarantine, pop up appears, select ok.


The third program to finish was . It took 1 hour 18 mins. apprpoximately. 58 objects found. I clicked apply all actions.

The last one to finish was and 192 threats detected. The elapsed time was 1 hour 34 mins. After the program finished detection, I click next, and then reboot system.


Technorati Profile


tags: , , ,

Saturday, September 02, 2006

What is the best Free Anti Spyware?

The search for a do all, fix all, detect all Free Anti Spyware is analogous to searching for the Holy Grail. Recently, Grisoft purchased Ewido Networks, the purchase gives Grisoft a foothold into the Anti Spyware market. Although you can Ewido for free for 30 days. Is Ewido worth purchasing?

Are any of the Free Anti Spyware truely a notch above the competition?

I decided to conduct my own test. I installed Grisoft , LavaSoft , SuperAntiSpyware.com's and Safer Networking's . I installed all four of them. Ewido, Super Anti Spyware and Adaware SE did not require restarting the computer. SpyBot Search and Destroy did. In this first test, SpyBot Search and Destroy was not included in the test.

I loaded the updates for both Ewido, Super Anti Spyware, and Adaware. Then I conducted a scan of the system. Ewido detected 58 objects found, and 93 instances; the infected objects were tracking cookies. Super Anti spyware detected 193 threats detected, and the threats were from memory, file, and registry; they were tracking cookies as well. Adaware detected 87 critical objects, the critical objects were tracking cookies.

While scanning I noticed that both Ewido, and Super Anti Spyware had elapsed time, and Adaware did not. Ewido had a progress bar showing amounted completed. The rest did not.

I started the scan on , Super Anti Spyware, and Ewido at virtually the same time. Adaware completed its scan well before the the other two , and . The elapsed time on Ewido was approximately 1 hour 32 mins. The elapsed time on Super Anti Spyware was 1 hour 28 mins and 43 sec. Adaware did not display elapsed time.

After the scan, I did not select to fix the infected objects, critical objects, or threats. I ran the scan again this time with all four Anti Spyware programs.

In my next post I will report the results of the four programs Spybot Search and Destroy, Ewido, Super Anti Spyware, and Adaware.

Technorati Profile


tags: , ,

Wednesday, August 30, 2006

Macromedia Flash


This morning I was surfing CNN, and I happen to go to the cartoon animation section of the website. The cartoon was on political satire. The cartoon was so funny I wanted to save it and pass it along to my friend. I was unable to do this because the presentation was in Macromedia Flash.

I started to do some research on the web. Being a computer scientist, I notice the extension of the file was . I started searching in Google for SWF saver. I found a myriad of them. The one I thought was the best was from BumperSoft. did exactly what I needed. However I had a problem afterwords. I had to find an SWF to AVI convert. I found a converter from . Finally I was able to view this with a Windows Media player, but the clip did not contain sound. I continued looking for a free converter. I must have looked thru 20 different sites, and installed about 10 or so different converters, and every single one of them had a limitation or trial period. Each of them require that you pay a certain amount. The range was $19 to $199. If you can live with the water drop mark on the video clip, or the limited time trial, then utilization of the different shareware converter is not an issue.
Technorati Profile


tags: , ,

Tuesday, August 29, 2006

Part 2: Free Anti Spyware

Part 2:

A month ago my computer started getting slow again. I did not know what was going on. My SpyBot Search and Destroy was not picking up anything. The software had all its /. Yet my computer was getting slower.

This was really puzzling. I asked my IT friend at work again. I explained to her the situation. It was about how the computer was getting slower and that SpyBot Search and Destroy was not picking up anything. I asked if I should download another free anti spyware program. She said to hold off on it. There was one last thing I can try. She took about 2 minutes explaining this to me.

Later on in the evening I went home and did exactly what she instructed. First I uninstalled the SpyBot Search and Destroy. I restarted the computer. Then I went to the website to download the last version. I reinstalled it, and ran SpyBot Search and Destroy, and it picked up 10 instances of spyware. I selected the option to purge the entries, and SpyBot Search and Destroy executed the command.

I surfed the web for another 10 minutes, did some word processing, and worked on my project from work, and my computer was fine.



tags:

Monday, August 28, 2006

Free Anti SpyWare

A couple of months ago my computer was acting up on me. The computer was less than 2 months old, and for the last month the computer was getting slower by the day. I remember clicking on Internet Explorer, and it took 5 MINS to start the program. I wasn't sure what was wrong.

I spoke with a good IT friend of mine. She suggested that I may have on my computer. Here I have been running the default spyware program which came with the computer when I bought it. I told her I have been running Symantec Internet Security, and nothing is has been detected. I told her nothing is coming up when I do the scan.

Here I have trusted Symantec for years, and paid good money to maintain the support, and subscription. I could not understand why my computer was so slow.

Being a software programmer, I don't have time to keep up with the hot list of Anti Spyware. I work 70 to 80 hours a week on my own software project at a large software firm. I leave IT stuff to the IT people. I worry about programming.

She suggested that I download a free version of an . I downloaded it later on in the evening. The installation was easy. I ran the software for the first time. Spybot detected 20 instances of Spyware, or questionable entries in my registry. I selected the option to delete /clean the questionable entries.

Just to be on the safe side, I restarted the computer. I clicked on Internet Explorer, and this time it took less than 3 seconds to start it.

This goes to show that the old adage you pay for what you get isn't quite true.

You can find by clicking on this link, and select the first entry in the main list.



tags: , ,