Online Porn – Conservative States Biggest Users…

February 28, 2009

ABC News has published an article that indicates the people who are most outraged by pornography turn out to be consumers of the very things they claimed to be outraged by. A nationwide study, which was based on credit-card receipts from a major online adult entertainment provider, is indicating that the more conservative and religious states are reportedly topping out the numbers.

Irregardless of your stance or the validity of the study; my stance is avoid it at all costs. They call it an “entertainment industry”; it is an “addiction industry” that will destroy. Parents, watch your kids. This stuff is readily available (for FREE) at the click of a mouse.

From the tech side of all this… I do not know what a person pays to become a member of the porn community, but in addition to that cost expect to pay for some type of computer repair in addition to possible identity theft.  Porn sites are notorious breeding grounds (no pun intended) for malware, viruses, pop-up windows, trojans, keyloggers, browser hijacking, tracking cookies; and on and on!  Also, nothing is more embarrassing than when a tech sits down to repair your PC and finds that you have a dark side!

clipped from

Porn in the USA: Conservatives Are Biggest Consumers

8 of Top 10 Porn-Consuming States Voted Republican in 2008 Presidential Election

Feb. 28, 2009

Americans may paint themselves in increasingly bright shades of red and blue, but new research finds one thing that varies little across the nation: the liking for online pornography.

States where a majority of residents agreed with the statement “I have old-fashioned values about family and marriage,” bought 3.6 more subscriptions per thousand people than states where a majority disagreed.

Photo: Americans may paint themselves in increasingly bright shades of red and blue, but new research finds one thing that varies little across the nation: the liking for online pornography.

Get Clipmarks – The easiest way to email text, images and videos you find on the web.

Sent with Clipmarks

Bookmark and Share



The Medpedia Project – The harvested wisdom of many…

February 28, 2009

Anytime I see a term on the internet that ends in “pedia”, it catches my attention.  An evolving project in the works that I think is going to a benefit to many, as a result of shared wisdom of many, is the project called Medpedia.  The goal of The Medpedia Project is to evolve a new model for how the world will access medical knowledge in the future.  MedPedia already has become a repository for medical information and continues to grow.  The information provided is unbiased and contributed by health and medical experts around the world.  To learn more about MedPedia, I encourage you to read the excerpt below and visit the MedPedia web site.  These types of web sites where the collaboration of wisdom is harvested from around the world, is what I have envisioned as the primary purpose of the internet.

MedpediaWhat is The Medpedia Project?

The Medpedia Project is a long term, worldwide project to evolve a new model for sharing and advancing knowledge about health, medicine and the body among medical professionals and the general public. The Project provides a free online technology platform to any individual or organization that can benefit from its use, available at Users of the platform include medical and scientific journals, medical schools, research institutes, medical associations, physicians, hospitals, for-profit and non-profit organizations, companies, expert patients, policy makers, students, non-professionals taking care of loved ones, individual medical professionals, scientists, etc.

As Medpedia grows over the next few years, it will become a superior resource of health and medical information without charge in multiple languages to anyone worldwide with Internet access. The information in this clearinghouse will be easy to discover and navigate, and the technology platform will continue to grow as more uses are found for it.

In association with Harvard Medical School, Stanford School of Medicine, Berkeley School of Public Health, University of Michigan Medical School and other leading global health organizations, Medpedia will be a commons for the gathering of the information and people critical to health care. Many organizations have united to support The Medpedia Project. See the Record of Merit .


Bookmark and Share

[ CLICK HERE TO LEAVE A COMMENT ] (“Ghost”) – Your online virtual computer…

February 27, 2009

When we first sit down at our computer the first thing we see is our desktop which serves as the visual gateway and the initial launching point for files, programs, settings, menus, icons, etc… We have become accustomed to seeing a certain desktop model  that consists of a start menu, a task bar, a wallpaper background, icons, etc. This model is consistent across the various operating system platforms; from Windows, to Mac, to the many flavors of Linux. Take us away from that desktop model and our comfort level suddenly drops.

Currently there are numerous online services being introduced (called cloud apps) that allow you to access those services through your browser (such as Internet Explorer, Opera, Firefox & Chrome). There are even web-based operating system environments being introduced that attempt to replicate the desktop model. How would you like to go to any computer that is connected to the internet and be able to log into your own personal desktop; a desktop that looks familiar and allows you to do virtually the same functions you are now performing on your computer’s desktop at home? It is possible with these types of web based operating systems.

Today, I came across a service called “Global Hosted Operating System” or “Ghost” (actually that is the closest resemblance to the desktop model that I have experienced to date. If you are on broadband (high-speed G.ho.stinternet), you have to at least try the “Ghost” virtual computer.  It will not harm your computer in anyway and it is absolutely free. The first thing to make clear is that Ghost is currently in the “alpha” stage of “public” testing. It is stable and usable, but it is not yet fully complete.  During “alpha testing”, you can expect some bugs, but they will not bite. You can test Ghost by visiting the web site [ click here ] and clicking on the “Guest Account”. Once you have accessed the “Guest Account and have loaded the Ghost desktop, go full screen…  Don’t be surprised that you feel as if you are on another computer…  If you find Ghost to be something you may be interested in following you can setup an account to create your own personalized desktop in the clouds.  You are initally provided with a 5 GB account (for file storage) and an additional 3 GB account for the email account.  Additional space can be acquired by referring your friends to Ghost.

What is Ghost?® provides every person in the world with a free Virtual Computer (VC). Like a Windows PC, or Mac, the VC is a personal computing environment which includes your desktop, your personal settings, your files and your choice of software applications. But unlike a PC, your VC is not installed on one physical computer – instead it is stored in professional data centers across the Internet cloud, and is accessed from any Internet browser in the world. From any computer, open the browser to , enter your username and password, and continue using your VC from exactly the state you last left it in.

[ Click here to enlarge screenshot in a new window ]

What are the advantages of

Available from any browser in the world instead of being installed on one physical machine.

The operating system, many apps, and the first 5GB of data storage and 3GB of email storage are absolutely free.

Software (namely Web-based software) can be run without installation.

The computer is always up-to-date, secure and backed up with no action or cost on your part.

The® VC manages all your Web logins and all your web ‘stuff’ (e.g. files on different web services).

Because it is online, the® VC provides new possibilities for fun and collaboration, beyond what is available on a PC.

Examples of how to use

You can use the® file upload/download facility to permanently move your files (documents, music, photos, etc.) to®. You can use® Mail as your e-mail service and use the POP aggregation to receive e-mails from your other e-mail services (as well as your new email). You can also use® My Items to manage your Web stuff (links to Flickr photos, Google Docs, YouTube videos, etc.) and use the® Browser to make sure that your bookmarks and cookies are available everywhere.

Key Features

  • Access your desktop, files, apps and settings from any Internet browser
  • Desktop and apps run without the need for installation or updating
  • Customize your desktop and choose from 20+ available languages
  •® has chosen the very best available storage service for your precious data – Amazon Web Services
  • 5GB professionally hosted and backed-up disk space
  • Many file types can be viewed or edited online with a simple double-click
  • Upload and sync your documents, photos and music easily using the® Upload Download Utility, Sync program or FTP
  • Manage smart shortcuts called Tagged Things to Web resources – webmarks (URLs), files, photos, videos, music, products
  • Single sign-on to other services such as Google Docs using My Logins
  • Manage smart shortcuts called Tagged Things to Web resources – webmarks (URLs), files, photos, videos, music, products
  • Share or publish your files directly from the® Drive
  • Read, write and edit documents, spreadsheets and presentations using® integrations with Zoho, directly from your® Storage
  • Edit Google Docs, sheets and presentations stored at Google from within®
  • Manage your e-mails, calendar and contacts with the Web’s leading collaboratoin suite
  • You will receive a yourGhostID email and can retrieve other emails as well (using “POP3”)
  • Yes® runs within the browser but also contains a browser of it’s own! Whichever computer you are on, the® Browser will have your history, your webmarks, and your “cookies” so that other sites will recognize you


Bookmark and Share


Getting rid of your mobile phone? Be careful; do not give your identity away!

February 25, 2009

Without purging the data in your mobile phone when you throw it away, recycle it, or transfer it, could cost you.  Today’s phones are comparable to mini-computers in their ability to store personal and often private information (e.g. text messages, voice notes, email, personal contacts, phone numbers, notes, reminders, addresses, photos, videos, etc…).  This information is stored in the mobile phones internal memory and or on the SIM card –Subscriber Identity Module, which is a removable memory chip in many phone models.  The memory in mobile phones are non-volatile memory that can retain the stored information even when not powered. It is important that you protect your identity and information; as well as, the identity and information of other people.


How big of a problem is this?

When I started thinking about this and researching the topic I wanted to find some supporting (reliable) data that hopefully would reveal and convince readers the magnitude of this problem.  I actually found (2)-two articles that hopefully will drive the point home.  You can click on any of the links for a direct connect to the original sources.

22 January 2009: Regenersis tops 2m handsets processed in 2008 – one every 15 seconds — but finds that 99% of handsets received contained personal data

Regenersis, Europe’s largest mobile phone recycling and reuse provider, announced that they processed over 2 million handsets for reuse and recycling in 2008.  The Company processed 2,007,652 handsets, the equivalent of one every 15 seconds.   Handsets are cleared of all data and fully tested.  If a handset is beyond repair or too old it is sent for safe recycling, ensuring nothing goes to landfill. Regenersis studied a random sample of 2000 handsets processed during the first week in December  and found that 99% of handsets received contained some sort of personal data, including:  Contacts, SMS messages, pictures, music, videos, calendar entries, emails, notes, mailing lists and to do lists.  In some cases, extremely sensitive information was contained, including bank details, addresses, and confidential emails.

12 December 2008McCain Campaign Sells Info-Loaded Blackberry to FOX 5 Reporter

ARLINGTON, Va. – Private information at bargain prices.  It was a high-tech flub at the McCain-Palin campaign headquarters in Arlington when Fox 5’s Investigative Reporter Tisha Thompson bought a Blackberry device containing confidential campaign information. When we charged them up in the newsroom, we found one of the $20 Blackberry phones contained more than 50 phone numbers for people connected with the McCain-Palin campaign, as well as hundreds of emails from early September until a few days after election night.

How to protect your identity when you get rid of your phone…

  • Notify your mobile provider and terminate all services.
  • If you are changing providers, purge the information on your online account and delete the account.
  • Find what method(s) are available for your phone model, from the mobile provider or manufacturer’s web site (or user’s manual) to reset (format) and/or overwrite the data:

The memory in these mobile phones/devices are very similar to a hard drive in your computer.  You can delete the data, but it is not actually gone.  The data can be retrieved from a phones memory module using third party software. A nice resource available on the internet, to assist you with purging your phone,  is Cell Phone Data Eraser.  It is a tool that provides deletion instructions for specific cell phones.

  • Return the phone to the provider and request that the data be deleted.  Verify that the data has been deleted.
  • Remove the SIM Card and reuse it or destroy it.


Bookmark and Share


Ginipic – Taking image searching to a whole new level…

February 24, 2009

Several years ago when the major search engines provided options to search specifically for images I thought, WOW!  How would you like to take that WOW! and turn it into AMAZING ?


I came across this “FREE” attractive application, that you install on your PC, called Ginipic. Ginipic is designed as a search engine that searches numerous other search engines for specific pictures or graphics that you may be looking for. You can search for images using a specific search engine source (such as Flickr, Google, Yahoo) or you can search many sources together. Here is a screenshot that lists the search engines that Ginipic will search.

Ginipic Search Engine Selections

Once you enter your what you are looking for; Ginipic does the rest. Initially when you start up Ginipic, it is in a small vertical window (see below).

Ginipic Startup

You can open that window in full screen and voila’, a whole screen of over 100 tiled images will be produced and that is only the first page of images. Ginipic literally can produce results totaling into the hundreds of thousands  (see thumbnail below).


Once you locate an image, you simply click on the image and the image is presented to you in a separate window (see below). At this point you can do many things with the image such as resize it, share it, email it, save it, set it as your desktop wallpaper, etc. One really neat feature is that you can drag and drop an image to an open application and insert it into the application with minimal fuss.

Ginipic Selection

This application is definitely a keeper on my PC. If you are interested in GiniPic, I encourage you to visit the web site [ ]. If you are someone that uses images on a regular basis, then this application is a must. A small demo video (with no sound) is reflected below to give you more of an idea of how this application works.

Bookmark and Share



Adding a “Watermark” in Microsoft Word 2003 or 2007

February 23, 2009

A watermark is a recognizable background image or pattern that is embedded in a document at various shades of lightness or darkness. The standard placement of a watermark is done in such a way in the background (e.g. diagonal) to catch the reader’s eye and to convey a readily recognizable message that portrays the status of the document (e.g. confidential, draft, ASAP, etc.). Of course there are other non-standard methods of embedding a watermark, such as adding your own image. Today, I had a situation where I had to embed a watermark in a Microsoft Word document; which provided me with the idea of sharing this process with others.  Actually it is quite simple, and this tip may be helpful to others.

WatermarkMicrosoft Word 2003

The watermark commands are available only in normal, print layout, and outline views.

  1. On the Format menu, point to Background, and then click Printed Watermark.
  2. Do one of the following:  To insert a picture as a watermark (watermark: Any graphic or text, such as “Confidential,” that when printed appears either on top of or behind existing document text.), click Picture Watermark, and then click Select Picture. Select the picture you want, and then click Insert.To insert a text watermark, click Text Watermark, and then select or enter the text that you want.
  3. Select any additional options that you want, and then click Apply.
  4. To view a watermark as it will appear on the printed page, use print layout view

Microsoft Word 2007

You can insert a predesigned watermark from a gallery of watermark text, or you can insert a watermark with custom text.

  1. On the Page Layout tab, in the Page Background group, click Watermark.
  2. Do one of the following: Click a predesigned watermark, such as Confidential or Urgent, in the gallery of watermarks. Click Custom Watermark, click Text watermark and then select or type the text that you want. You can also format the text.
  3. To view a watermark as it will appear on the printed page, use Print Layout view.
NOTE:  Also read – How To Insert An Image As A Watermark In Microsoft Word 2010

Deal of the Day @

Bookmark and Share



ScreenToaster – An “Awesome and Free” web based screen recorder!

February 22, 2009

ScreenToaster is another one of those cloud apps that I have found to be amazing… Remember, “cloud apps” are web based services that we access from the internet; in lieu of installed software on our computer. ScreenToaster is a cloud app that provides you with the capability of capturing live (real-time) audio, live (real-time) screen activity and live (real-time) webcam images from your computer. This is an excellent resource in the event you need to create and share tutorials, demos, training, lectures and more.


I found ScreenToaster very easy to use. After you setup an account with ScreenToaster, you simply click on the “Start Recording” button and a small java applet is downloaded to your PC and the following dialogue box will appear.


After making your selections, remember to keep the ScreenToaster window minimized and remember the “Alt+S” hotkey to start and pause your recording. When you are done the recording, hit “Alt+S” to pause the recording, then maximize the “ScreenToaster” window and click on “Stop Recording”. That is it…  ScreenToaster does the rest.

Here is a sample screen capture video that I created. Click on the video graphic below and you will be redirected to the “ScreenToaster” site where you can directly play the video (with audio) in a window or full screen. I suggest you try both options. I think you wil find the results quite good.

ScreenToaster - Click to see video!

Following your recording, options are available to upload your video to your ScreenToaster account or to a YouTube account. You can make your captured video private or public. There are also 2-(two) options available to covert and download your video to your computer (.avi or .flv file formats).


Bookmark and Share


CintaNotes – A free (and portable), lightweight and user-friendly personal notes manager

February 21, 2009

CintaNotesIf you are someone who has a pile of notes lying around and find yourself losing control of what’s what, then take a look at this small software application called “CintaNotes”.

CintaNotes will be your essential assistant in the daily task of collecting numerous pieces of information, like your own thoughts and ideas, article excerpts, blog postings, famous people quotes, research data, curious facts, Wikipedia entries, you name it. – CintaNotes

I have always been an advocate of the various software versions of post-it notes; however, the power of CintaNotes is the ability to maintain all of your notes in one container.  You may ask, “How can I find my notes if they are congregated all together (especially if I have numerous notes)?


Retrieving information is also trivial: just open CintaNotes and start typing, and only notes containing the typed phrase will remain in the list. More sophisticated search criteria are supported, like searching by title or by URL the note was taken from. – CintaNotes

CintaNotes is in beta. A full install version and a portable version is available.  From browsing their forum, it appears the development of CintaNotes will be ongoing with features being added on a regular basis.

A nice addition to my flash drive.  Thank you CintaNotes!


Bookmark and Share


“Thumbtack” – A FREE Cloud App from Microsoft Live Labs

February 20, 2009

Just when I think I’m ahead of the game, I learn something new. I did not know Microsoft currently maintains a site called “Microsoft Live Labs”.  Live Labs, established by Microsoft in January 2006,  is a test bed for Windows Live projects that are developed through the collaberation of engineers, scientists, researchers and the online community.

During my visit to the site, I was introduced to what I think is a jewel of a cloud application, called “Thumbtack”.  Thumbtack, currently in development, is an online application that serves as your personal collecting point for notes, web clippings, pictures, web sites, etc… Thumbtack allows you to publish and share your collections with others. Thumbtack is an AJAX application, has no OS dependencies and currently supports the  Internet Explorer and Firefox 3 browsers. Using a bookmarklet feature associated with thumbtack, you can quickly (and easily) grab content from the web and have it automatically delivered to your Thumbtack account for future reference. As an avid blogger, I can see where this cloud app will serve as a great research tool. If you currently have a “Hotmail or Windows Live” account you can easily give “Thumbtack” a try.


If you do not have an account, you can [ click here ] to get started.

To learn more about “Thumbtack” I encourage you to visit the “Thumbtack Site”.

Reflected below are (2)-two video which explains the features of “Thumbtack”.

Video: Thumbtack Introduction

Thumbtack - Intro

Video: Thumbtack collections

Thumbtack - Collections


Bookmark and Share


Using “Zink” to print with no “Ink”

February 19, 2009

As an IT specialist the thing I most despised, on the hardware side of IT work, was printers. I have experienced the dot matrix, ink jet and laser printer and there has not been anyone of those technologies I can really say I liked or found great joy in working with. Yes, it has become somewhat easier to make that connection to the computer. Yes, printers have become inexpensive to the point that they are easily replaceable and disposable; BUT, the one thing that has not changed is the cost of the ink or laser cartridges.  Buy three rounds of ink jet cartridges and the cost will exceed what you paid for the printer.  It is the old “razors and razor blades” marketing plan. Give the razor away, and charge a lot for the ‘refills’.  Well, this all may be changing…

ZinkWhile trolling the internet a small photo printer by Dell, called the Wasabi PZ310 ultra-mobile “ZINK” ink free photo printer caught my attention. The device is not what captured my attention; it was the “ink free” digital technology behind it, called “ZINK” that did. To learn more about ZINK and to let the reader’s of the blog know about this “ink free” digital technology, I captured the following information straight from the ZINK website.  Hopefully the “how and way” we print may be changing; and hopefully the cost!

You can click on any of the links below to jump to the Zink web site where video clips are provided to explain how the technology works and how this technology will enable you to print from any digital device (e.g. smartphones, televisions, GPS, laptop).  Printing will never be the same.  I hope the cost of the Zink paper, which is pricey, comes down in cost as the technology catches on.  An example of a current pricing model,  is the Zink paper for the Polaroid Pogo, that is another instant mobile printer:  (30 sheets – 2″ x 3″) currently priced at Sam’s Club at $9.78.

clipped from

What is ZINK?

ZINK stands for Zero Ink – an amazing new way to print in full color without the need for ink cartridges or ribbons. The ZINK Technology encompasses both the ZINK Paper and the intelligence embedded in every ZINK-enabled device. The technology enables a new category of color printing devices and paper that work as a system to print in a whole new way.

ZINK Technology is based on advances in chemistry, engineering, physics, image science, and manufacturing. ZINK was developed over several years and has generated an IP portfolio that includes over 100 patents and patents pending. And development of the next generation of ZINK continues in our labs daily.

ZINK Technology is fully developed and market ready. Our partners’ ZINK-enabled products are available now. ZINK is changing the way the world thinks about printing.

How ZINK Works

At the heart of the ZINK Technology is the patented ZINK Paper, an advanced composite material with cyan, yellow, and magenta dye crystals embedded inside, and a protective polymer overcoat layer outside. The crystals are colorless before printing, so ZINK Paper looks like regular white photo paper. Heat from a ZINK-enabled device activates the crystals, forming all the colors of the rainbow. The printing process is now radically simple. Just add ZINK Paper.

Get Clipmarks – The easiest way to email text, images and videos you find on the web.

Sent with Clipmarks



Bookmark and Share

A very cool Web 2.0 bookmarking Service – iterasi

February 18, 2009

I recently posted an article “What’s In Your Cloud?” about Web 2.0 and cloud computing.  If you have not read that article, I suggest that you do so.  Why?  Web 2.0 (cloud computing) services are being developed everyday and the article helps you to understand how these services or applications will work.  As a matter of fact, I am educating myself as I research many of the Web 2.0 services or cloud applications.  I am finding that there are many, many cloud apps out there right now.

One such cloud app that I recently came across, that in my opinion, is very cool.  It is called “iterasi”, a bookmarking service, that allows you to capture and save entire pages right from your browser.iterasi

Once a page is captured, it is archived in your account, in the state for which it was captured.  For example, with my current account, by using a bookmarklet tool that is provided, I can capture this page (article) to my account and keep it there as long as I want, even if this article is deleted or changed.  There is also a scheduling component built in that allows you to update the pages in your account.  Iterasi is currently in beta, but looks quite promising.  In my opinion, if you do any type of research, this is a must have tool. You can click on the graphic below to see a demo of iterasi in action.

iterasi demo

What is iterasi? (as described on the website).

With iterasi, you can save web pages exactly as you see them in your browser. This guarantees the article, receipt, review or recipe will be what it was a day, a week or a year later. Unlike bookmarks, which capture the address of a page, iterasi captures the page itself. With bookmarks there is no guarantee the page will be what it was when you saved it – or even be there at all. We archive the page in your private account on our servers where you can search and retrieve your saved pages anytime, from anywhere, forever. You can also share what you save with friends and colleagues, and search the iterasi Community for topics of common interest.
What can I do with iterasi?

Here are some of the things you may want to save and share with iterasi:
interesting articles
market research
blog posts
online receipts
a Facebook or MySpace page
travel itineraries and vacation plans
Google map directions
Why do I need iterasi?

Web pages change very fast. Links disappear or point to something unrelated to what you thought you had saved. Pages disappear completely. Or the content changes dynamically based on a number of variables (ever try to send a link from a travel site?). So much information is lost when you just save a link. That’s why you need iterasi. With iterasi, you are saving the page as it appears to you at that point in time. Don’t lose that specific page ever again.


Bookmark and Share


Technibble’s (portable and FREE) Computer Repair Utility Kit

February 17, 2009

I currently maintain on my flash drive numerous software utilities that literally have taken me years to accumulate (after careful testing and review). I use these utilities when I am assisting others on their PC’s. Recently Technibble, a web site resource for computer technicians who are looking to start their own computer business or improve their existing one, came up with a combination of  “portable” computer repair tools in one easy to use pack. As I mentioned, I have been collecting utilities for years and the list of “portable” repair utilities that they came up with is phenomenal, to say the least.  It even comes with an easy to use “right click” menu to launch each utility.


You can download the entire package at their web site.

Technibble - Computer Repair Utility Kit

If you are not interested in downloading this package you can preview the listing below and “google” any of the utilities that you may be specifically interested in.  All of the utilities I see on this list are reputable utilities.

The “Computer Repair Utility Kit” is 88.4mb as a ZIP file and it extacts to 188mb and currently consists of the following utilities:

File Management

CCleaner – Cleans up Windows systems. Clears temporary internet files, cookies, history etc..

JkDefragGUI – An advanced defragging tool far superior to the built in Windows one

DriveimageXML – Hard drive imaging tool. Allows you to get a single file out of a whole image too

Explore2fs – Allows you to explore hard drives with Linux file systems

Double Killer – Finds duplicate files and deletes them

Deep Burner – CD/DVD Burning software

7-Zip Portable – Archive creating and extraction tool. Can handle most compression formats

PC-Decrapifier – Cleans out the crap that comes installed on new brand name computers (Norton trials, toolbars etc.)


Process Explorer – Allows you to view system processes

System Information – View lots of information about a system (specs, passwords, temperatures etc.)

ProduKey – View software cdkeys and serials

Autoruns – Autostart program viewer

HWMonitor – View hardware information

GPU-Z – Show video card information (chipset, bios version, shaders, memory size etc.)

Wireless Key View – Shows saved wireless network keys

TreeSize Free – Show how much space each folder on a system uses

Game Key Revealer – View CDKeys and Serials for popular games

USBDView – Allows you to list and manage USB devices (including devices that arent currently plugged in)

TrID – Identifies file types for extension-less files

Codec Installer – Finds and analyzes video codecs

Unknown Devices – Tells you what a “Unknown Device” in system properties actually is

GSpot – Video analyizer

Repair Tools

Norton Removal Tool – Removes Symantec products

McAfee Removal Tool – Removes McAfee products

LSPFix – Fixes broken Winsock entries

Dial-a-Fix – Repair Windows files and registries


Recuva – Recovers deleted files

Restoration – Recovers deleted files

Photorec – Recover deleted/damaged files from Flash memory (like digital cameras)

DBXTract – Recover emails from damaged DBX files (like Outlook Express)

Network Tools

Wireshark – View network packets

Network Scanner – Scans the network for devices

Putty – SSH/Telnet/RLogin client

Network Stumbler – Wireless Network Scanner

Virus and Malware Removal Tools

Clamwin Antivirus – Virus scanner/remover

Rootkit Revealer – Detects rootkits on a system

Combofix – Malware finder and remover

SmitFraudFix – Malware finder and remover

RogueFix – Malware finder and remover

Hijack This! – Malware remover

SUPERAntiSpyware – Malware scanner and remover

Malwarebytes – Malware scanner and remover


Mozilla Firefox – Web browser

JavaRa – Find and remove old Java versions

Monitor Tester – Test monitors from problems

Dead Pixel Tester – Finds and fixes dead pixels on LCDs

ChkFlsh – Check flash drives for errors or test their real size (as fake ones appear on eBay)

Double Driver – Driver backup tool

SumatraPDF – Lightweight PDF viewer

Revo Uninstaller – Advanced application uninstaller


TweakUI – Windows XP tweaking tool

VistaTweaker – Vista tweaking tool


Quickly Make a System Restore Point – Makes restore point

Reset Network – Releases/Renews IP and flushes DNS

Clear Printer Spooler – Clears stuck print jobs from spooler

Stop Automatic Updates – Stops “Windows has installed updates, restart now” dialog temporarily

Start Automatic Updates – Switches it back on

UPDATE 4 – 23 – 2010:  Bill Mullins’ Weblog – Tech Thoughts has posted an article about  the 2nd version of Technibbles Computer Repair Utility Kit and where you can get it.  I encourage you to [ click here ] to visit Bill’s blog to read “57 Free PC Repair Apps for Your Flash Drive

Bookmark and Share



Worm Bounty set by Microsoft ($250,000)

February 16, 2009

Remember the Conficker worm that you recently read about here on “What’s on my PC…” [ click here ] ?  In summary, Microsoft is going on the offensive by offering a quarter of a million dollars to track down the author(s) of the Conficker worm (aka: downadup, Kido). Conficker exploits a Windows vulnerability; patched by the October ‘08 Microsoft security update. If you had your PC configured to receive Microsoft updates automatically, you would have received the patch (or fix) this past October.  Numerous reports are indicating that, as many as, 10 million PC’s have been infected.  Being a former IT Manager, I have to wonder how many business and government entities were standing with their pants down on this one.  No excuse in missing Windows updates, on the business or government level, in my opinion.

Wanted Conficker Worm

clipped from

Microsoft Posts $250,000 Reward for PC Hackers

Friday, February 13, 2009

Look out, computer hackers– there’s a new sheriff in town.

Microsoft announced Thursday that it had placed a $250,000 bounty on the heads of the developers and distributors of a nasty computer virus that’s been worming its way worldwide for months.

Known as the Conficker (a pun on “configure” and a four-letter German swear word) or Downadup worm , the virus has infected at least 10 million Windows-based computers since it first appeared in October. It’s forced the British and French navies to take some systems offline.

Get Clipmarks – The easiest way to email text, images and videos you find on the web.

Sent with Clipmarks


Bookmark and Share


Manage open application windows on the fly…

February 16, 2009

This post is geared more toward the techs out there that like those customization and tweaking utilities. Ease your control over foreground processes and windows now with Process Manager for Windows. With Process Manager for Windows you can perfrom the following operations on any application by just right clicking on them on the taskbar.

  • Kill
  • Change their Priority.
  • Always on Top.
  • Minimize to tray
  • Hide
  • Hide others
  • Change Transparency.
  • You can Hide All Open windows ,
  • Unhide them all in one go,
  • You can even hide the PMW icon from tray.
  • You can control which menu’s you want and which menu you do not want.

Process Manager for Windows

Process Manager for Windows is under ongoing development by a young software engineer who is devoted to getting it right. According to the developer’s site, there are more features to come. If you have any questions or ideas to improve Process Manager for Windows, I encourage you to visit “Aarif’s Blog About Windows Tweaking”.


Bookmark and Share


BEWARE of “ScanVirus” – A “FAKE” Cloud Anti-Virus Service

February 14, 2009

With the wave of cloud apps appearing on the internet, I knew it would be a matter of time before malware would find its’ way into the cloud. Panda Labs, an international network of research and technical support centers devoted to protecting users against viruses, discovered  an interesting “cloud” tactic that is being used to trick computer users into infecting themselves with malware.

The cybercriminals in this particular case have created a pretend web site (called ScanVirus – Cumulative Online Antivirus Service) that lures the visitor into thinking their computer is infected (see graphic below). The confidence of the visitor is gained from the displayed logos that are “copies” of logos from actual legitimate anti-virus and anti-malware companies. Upon visiting the site, the visitor is prompted to download a file called “AntiVir.exe”, which Panda Labs has identified as being malware (called “Adware/Antivirus 2009).

Beware of ScanVirus

To learn more about “malware” and to download software to “protect” your PC, I encourage you to read the following:

“FREE” Internet Browsing Protection…

Taking A Byte Out of Malware

Protect yourself against FAKE Anti-Virus
and FAKE Anti-Spyware Software…

Basic Computer Security Precautions You Need To Know
(at Bill Mullin’s “Tech Thoughts)

Internet Plague – Rogue Antivirus
(at TechPaul’s “Tech-for Everyone”)


Bookmark and Share