Search this blog

Home Download Tips Our Stores About

Adbrite

Your Ad Here

Hot Offers


Masukkan Code ini K1-2BE745-X
untuk berbelanja di KutuKutuBuku.com

Visit Our Sponsor

Saturday, March 21, 2009

Protect against Conficker  


Businesses worldwide are under attack from a highly infectious computer worm that has infected almost 9 million PCs, according to antivirus company F-Secure.

That number has more than tripled over the last four days alone, says F-Secure, leaping from 2.4 million to 8.9 million infected PCs. Once a machine is infected, the worm can download and install additional malware from attacker-controlled Web sites, according to the company. Since that could mean anything from a password stealer to remote control software, a Conflicker-infected PC is essentially under the complete control of the attackers.



According to the Internet Storm Center, which tracks virus infections and Internet attacks, Conficker can spread in three ways.


First, it attacks a vulnerability in the Microsoft Server service. Computers without the October patch can be remotely attacked and taken over
Second, Conficker can attempt to guess or 'brute force' Administrator passwords used by local networks and spread through network shares.
And third, the worm infects removable devices and network shares with an autorun file that executes as soon as a USB drive or other infected device is connected to a victim PC.



Conficker and other worms are typically of most concern to businesses that don't regularly update the desktops and servers in their networks. Once one computer in a network is infected, it often has ready access to other vulnerable computers in that network and can spread rapidly.
Home computers, on the other hand, are usually protected by a firewall and are less at risk. However, a home network can suffer as well. For example, a laptop might pick up the worm from a company network and launch attacks at home
The most critical and obvious protection is to make sure the Microsoft patch is applied. Network administrators can also use a blocklist provided by F-Secure to try and stop the worm's attempts to connect to Web sites
And finally, you can disable Autorun so that a PC won't suffer automatic attack from an infected USB drive or other removable media when it's connected.






If you got infected by this worm feel free to download this conficker removal tool





How To use :
1. Login as Administrator
2. Disable all the currently active Antivirus
3. Disable all the Lan connection or internet
4. Scan with PCMAV Express
5. After it kill the virus, update your windows
6. For security reason, change your windows password. Try strength password and not easy to guess


Read more...
Friday, March 20, 2009

Free Software : LogoMaker v2.0  




LogoMaker is an innovative and easy to use product that makes it possible for any business owner to design professional business logos, create advertisements, design nice page headers for a web site and other identifying graphics in just minutes. The easy to use features of LogoMaker include hundreds of fully modifiable logo templates and objects categorized by industry and interest, high quality graphical engine, creative tools and special effects. In LogoMaker you can work with Regular, Polygonal, Concave, Wavy, Circular, Perspective Text types. All options and effects that can be applied on the images (such as Shadow, Transparency, Blur, Emboss, Gradient, Hue, etc.) can also be applied on text and shapes. However, some additional effects can be applied only on text and shapes, such as: Outline, Character Spacing, Character Angle etc.





Read more...
Sunday, March 8, 2009

Free E-book : Salary Guide  

Think you've been paid enough??
CHeck it here..

Indonesia Salary Guide 2008









Malaysia Salary Guide 2008










Singapore Salary Guide 2008





Read more...
Monday, March 2, 2009

Free Software : Aston 2 Menu 1.2.1  

Get Stylish Start Menu...

A software application designed to be a replacement for Windows start menu
Aston2 Menu is developed to start the new line of Aston2 products.
Accumulating the best achievements of Aston 1 and keeping up with the
latest tendencies, we have created a brand-new shell, which is expected
to turn your desktop into a yet more convenient and attractive environment.
Aston 2 is developed on an absolutely new engine, created from scratch.

The basic principle of Aston2 product line is its modularity.
Its components can be used all together or separately from each other.
Being used as separate items, they work with another shell (Explorer or Aston 1.x),
expanding its functionality. When combined, they completely replace the shell.
Each of the components is feature-rich and yet extremely intuitive: it can be
used as it is or customized in every aspect.





Read more...

Free Software : AdminToys Suite 2008  




AdminToys Suite is a collection of administration
utilities for remote management of Windows Servers
and Workstations.Supports Microsoft Windows
NT/2000/XP/2003/Vista/2008

Save time on everyday administrative tasks with AdminToys Suite:

* Manage running processes remotely
* Monitor computers performance on your network
* Track and limit disk space usage on remote machines
* Synchronize computer clock all over your network
* Perform a planning restart/shutdown of network computers
* Execute commands remotely on a group of computers or in the entire domain
* Configure network adapters remotely
* View or change Windows Registry keys and values on remote computers
* Control services on remote machine
* View logged events
* Gather your network computer's statistic and export it to CSV, TXT or HTML





Read more...
Sunday, March 1, 2009

Free Ebook : Microsoft SQL Server 2008 Step by Step  




Teach yourself how to design and create SQL Server 2008 databases one step at a time. Work at your own pace through the book s practical, skill-building lessons and the hands-on practice files on CD. You ll begin by learning to install and configure SQL Server 2008, design a model database, and work with tables and indexes. Next, you ll learn techniques to manipulate, maintain, and retrieve data. Finally, you ll learn more-advanced techniques, such as using views, functions, and triggers. As you complete each lesson, you can hone your skills using the practice exercises on the companion CD. Plus, you can review and download code samples illustrating the author s own, professional techniques direct from the companion Web site.





Read more...

Best Seller