Showing posts with label White Hat Help. Show all posts
Showing posts with label White Hat Help. Show all posts

Friday, 25 October 2013

SpeedyPC Pro Setup Wizard – Prepare to optimize your PC!
Free Download SpeedyPC Pro 3.1.11.0 Cracked

Details:

SpeedyPC Pro 3.1.11.0 | 7.71 MB

Every PC unit is designed to make your daily tasks more manageable and convenient. If not managed or maintained properly performance can drop drastically and this results to long start ups overall sluggishness freezing or even a system crash. Speedy PC is designed to eliminate all these threats that may cause errors in your PC performance. It quickly scans your system completely for problems in the Windows database to eliminate junk data and useless files that usually causes the PC to slow down or malfunction. As a result, you get increased speed, eliminate all the error messages that irritate you and erase all desktop or task bar clutters that can cause some confusion in your operations.

Scan your computer with SpeedyPC to stop error messages
The Windows Database, due to its size and complexity, can sometimes go wrong. With regular use, the Windows Database can begin to grow corrupted due to extra entries, old and useless information and disrupted communication. SpeedyPC rapidly cleans problems in the database, repairing common problem areas such as DLL files fonts start up file associations uninstalls and more.

Check your system with SpeedyPC Tuner (Startup Tuner) to improve startup speed
Remember when you used to be able to start Windows in just a couple of minutes? You can get back to that by using SpeedyPC Tuner (Startup Tuner) to decide which programs load and run when you start your computer. There may be dozens of programs that are waiting at start up, unseen but working in the background. Together, they cause significant slowdown of startup and performance. Many of these may be unnecessary, unwanted, or even harmful. SpeedyPC gives you the power to control your system resources to get back to lightning-fast start times.

Destroy toolbar clutter with SpeedyPC Tuner (Startup Tuner)
An untidy Windows taskbar full of unused icons makes for a frustrating and confusing PC experience. With SpeedyPC Tuner (Startup Tuner), you can easily scrub your system of these pointless space wasters. The average computer user has a huge collection of taskbar icons. Most of them are not very helpful and make it hard to find the ones you really need. SpeedyPC allows you to disable taskbar icons that launch on start up, so you can regain valuable computer real estate.

Eliminate Desktop Clutter with SpeedyPC
Most PC users have a large, scattered array of desktop items, many of which are old, broken, or unused. They make it difficult to find the desktop items you need, as well as making your digital workspace look cluttered and untidy. SpeedyPC fast scan easily detects broken shortcuts and allows you to promptly remove them. With just a few clicks, your desktop will be instantly cleaned as clean and easy to use as the day you got it!

Clean up after removing spyware infections with SpeedyPC
Often, anti-virus programs will remove the dangerous parts of an infection, but leave behind other items that clutter up the Windows Database. SpeedyPC scans and removes these virus leftovers, and flushes them from your computer. As a result, your system is more streamlined, with faster performance and improved reliability.

Scan Easily and Automatically with SpeedyPC
SpeedyPC comes equipped with an advanced scheduling assistant, so that you can set the program to run automatically at a specific time every week. With this kind of hands-free operation SpeedyPC can regularly patrol your computer to ensure peak performance and error free operation.

Stay safe back up your system with SpeedyPC
Do not worry if there's a glitch in your Windows Database simply restore the backup from yesterday! SpeedyPC creates comprehensive backups of your Windows Database, and you can easily restore the backups if anything goes wrong. SpeedyPC can also create a backup of your entire system every time you scan. Much like the registry backup, it allows you restore your computer to a previous state. With two backup methods SpeedyPC shields your PC from accidents and errors.


How to Install:

NOTE: Keygens, patches, Activators, Cracks, Loaders etc. are always scanned with Kaspersky Internet Security 2013 Latest Version to Avoid Virus Issues. Different Anti-viruses may give different results

(1): Please use 7Zip/WinRAR/Universal Extractor to EXTRACT FILES
(2): run the setup
(3): Copy the crack folder content and paste it to the software installed directory.
(4): Enjoy and Support Developers, Buy It, They Deserved It!

 Download Click Here
GridinSoft Trojan Killer 2.1.8.3 + activator
Details:

GridinSoft Trojan Killer 2.1.8.3 | 45.7 Mb

Trojan Killer is designed specifically to disable/remove Malware without the user having to manually edit system files or the Registry. The program also removes the additional system modifications some Malware carries out which are ignored by some standard antivirus scanners. Trojan Killer scans ALL the files loaded at boot time for Adware, Spyware, Remote Access Trojans, Internet Worms and other malware. Trojan Killer works in the field of system security to ensure safety for computer systems. We propose products to help you get rid of annoying adware, malware and other rough tools. It is very important to restore control on your computer as soon as possible and do not allow anyone to use your data.

Additional Tools

Reset Internet Explorer Home/Start/Search Page Settings
Some Malware programs make changes to the Internet Explorer Home, Start and Search Page settings in order to re-direct the web browser to different websites.

This Utility will reset the Home/Start/Search pages to standard Defaults. You can then manually reset your Home Page to your website of choice (or leave it "blank", the default).

Reset HOSTS file
The Windows HOSTS file is a text file which stores website addresses. The file can be used to speed up access to websites you visit often - by equating the website name (e.g. microsoft.com) with its DNS address, the web browser can find the website more quickly as it does not have to query a DNS Name Server.

Some Malware programs add entries to this file, to either deny access to websites (usually security-related or antivirus company websites), or to re-direct access to websites of their choosing.

Reset Windows Update Policies
Some Malware programs attempt to prevent Windows Update from running, and inhibit access to resetting Windows Update by blanking out the Windows Update options on the Update configuration screen.

This Utility will check the current Windows Update settings and correct them where necessary.

How to Install:

NOTE: Keygens, patches, Activators, Cracks, Loaders etc. are always scanned with Kaspersky Internet Security 2013 Latest Version to Avoid Virus Issues. Different Anti-viruses may give different results

(1): Please use 7Zip/WinRAR/Universal Extractor to EXTRACT FILES
(2): run the setup
(3): Use the given patch to activate (recommend to copy and paste the patch into the installed directory and run as admin and do the patch)
(4): Enjoy and Support Developers, Buy It, They Deserved It!

PS : If You got an error while extracting while others are working try diferent directory path in your PC. Somtimes if you got a long directory path while extracting it will giv you an error. To solve this issue , as an example just paste the tgz file in C drive and extract (just inside the C drive not with in any other folder

Download Click Here
CCleaner Professional + Business Edition

CCleaner Professional + Business Edition

CCleaner a utility for cleaning the debris in the operating system. In the course of their work CCleaner (Crap Cleaner) is looking for and removes unused files. These include: cookies, history, visiting sites in IE, temporary Internet files, search strings, files, Recycle Bin, etc. Also search for temporary files of third-party applications: Firefox, Opera, Media Player, eMule, Kazaa, Google Toolbar, Netscape, Office XP, Nero, Alcohol 120, Adobe Acrobat, WinRAR, WinAce, WinZip, GetRight, Morpheus, Download Accelerator Plus, VirtualDub , ZoneAlarm and many others. Can be subjected to cleaning and registry Windows, ridding it of its unnecessary extensions of the old library dll and wrong ways, which accumulate in considerable quantities, especially after the installation and removal of a variety of programs.

CCleaner cleans the following components:
-Internet Explorer
-Cart
-The Clipboard
-Temporary Windows files
-Windows Logs
-The list of recent documents (in the Start menu)
-The history of executed commands (Start)
-The history of the assistant search in Windows XP
-Obsolete Data Prefetch in Windows XP
-Memory dumps after crashes Windows
-Chkdsk file fragments

Advanced options allow you to clean:
-The cache priority menu
-Cash Tray posts
-The cache sizes and locations Windows
-The history of aid to the user
-IIS log files
-Additional Folders

Safety:
From the outset, CCleaner developed a safe and secure program. It has several powerful levels of inspection, to be sure that no sensitive information or document would not be removed. We also guarantee that CCleaner does not have spyware or adware.

Privacy Policy:
For users, we also provide the function of permanently erasing files with multiple rewrites, which does not allow to restore them in any way.

homepage Click Here

Download Click Here

Wednesday, 21 August 2013

Koobface is the latest virus that has attacked the social networking phenomenon. Top social networking websites like facebook and myspace are the places where this thing has done nothing but mischief.

The virus originated in early December and is reported to have infected several computers using the facbook platform. Although such a virus has been reported earlier in myspace but this new thing is using different methods to seek into the users PC and spread malware into the computer


KoobFace Variants :

Worm:Win32/Koobface.gen!F
Net-Worm.Win32.Koobface.a, which attacks MySpace
Net-Worm.Win32.Koobface.b, which attacks Facebook
WORM_KOOBFACE.DC, which attacks Twitter
W32/Koobfa-Gen, which attacks Facebook, MySpace, hi5, Bebo, Friendster, myYearbook, Tagged, Netlog, Badoo and fubar
W32.Koobface.D
OSX/Koobface.A, a Mac version which spreads via social networks such as Facebook, MySpace and Twitter.



Although famous as virus, the Koobface is actually a worm. A worm is a malware that sneaks into your computer and replicates itself throughout the PC. The difference between a virus and a worm is that, virus attaches it self to the file where as a worm actually replaces it. A worm can even send automated emails to other PC's trying to infect them using yours.

So Koobface is a worm and attacks a computer by downloading some .exe files into your computer. The main thing is to identify the threat at this point before it is too late.

Basically if you are using facebook you should watch for automated email messages that display either an insulting message or some thing very tempting about you. Messages like, "you look funny in this video" or "you look so stupid in this pic" can be used to persuade somone to click on the link attached, this called 'Social Engineering'. Once the user clicks on them it takes you to a video which doesn't play and they ask you to download certain codecs which can be a 'flash_player.exe' file.

If this file is downloaded, your computer becomes open to Koobface malware. It downloads a file 'tinyproxy.exe' which hijacks your PC. It can even alter search results from Google, Yahoo etc and redirect you to websites selling malicious softwares

How To Remove Koobface Automatically

Here I will discuss two method of removing Koobface. First lets discuss the automatic method. The facebook security page has posted about this but there is no genuine way of removing this malware. They have only asked people to change their password in order to protect user security.

The best automatic method to remove this thing is of course to get a good malware remover which can automatically detect and remove it. If you have already bought a good antispyware you can find the removal instructions from the support page. But it can be removed automatically if your software is updated.

The major problem is that the Koobface worm is constantly changing itself, so make sure you have the latest version of the mlaware installed.

You can use SuperAntiSpyware FREE http://www.superantispyware.com/

How To Remove Koobface Manually

Although it is highly recommended that Koobface or any other parasite should be removed using a automated software but still if you want to do it manually here is the procedure but before attempting anything, make sure you backup your computer

Using The Add\Remove Program Tool:

This is not a 100% removal method because most of the malware don't really appear in the list but if they are you can do this:

Go to Add\Remove utility.

Look up for the Koobface malware to remove and uninstall it.
But it is noted that Koobface restores it self on rebooting. So here is a better method:

By Removing Registry Files

Here are the steps:

Search for "koobface" in Mycomputer using find utility.
Note down Koobface file path some where.
Press Ctrl+Alt+Del to open 'Task Manager'
End the "Koobface" processes.
The following processes must be ended


Code:
%SYSTEMROOT%\bolivar28.exe
che07.exe
bolivar28.exe
%WinDir%\system32\nScan\ekrn.exe
%WinDir%\system32\nScan\ecls.exe
%WinDir%\system32\splm\ncsjapi32.exe
%WinDir%\bolivar28.exe
C:\Windows\fbtre6.exe


Now you have to unregister dll file


Go to start and type in 'cmd' to open command prompt.
First locate the following dll files using 'dir' command.

Code:
%WinDir%\system32\nScan\ekrnEmon.dll
%WinDir%\system32\nScan\ekrnScan.dll
%WinDir%\system32\nScan\ekrnEpfw.dll
%WinDir%\system32\nScan\ekrnAmon.dll
%WinDir%\system32\splm\lmfunit32.dll
%WinDir%\system32\splm\mcaserv32.dll
%WinDir%\system32\splm\kbdsapi.dll


Now change the current directory using 'cd' command leave a space after 'cd' and then the path of dll file, which you have located above. Press enter after this.
Now unregister dll file by typing "directory path+'regsvr32/u'+dll file name". Press enter, the file will be unregistered.
I would once again recommend that you do it automatically since there is risk of damaging the computer as important files may be deleted or changed

credits to my site staff Shatrang

 
There are four methods on this guide, and you dont need any programs you need to download. Lets get started: First Method Steps:

Open Msconfig by going to start and search "msconfig" or open RUN and search Msconfig
Go to the startup tab
Here youll find mostly any RAT,Logger...
Find something like (server.exe, stub,s3rver, and something like that)
If you find it just untick it and apply restart your pc


Second Method Steps
: In the registry every application saves its configuration, of course malware too. Malware often uses the Registry to startup, and Save the options.

Open the "Run" (Start -> Run)
Write regedit.exe
Search In The HKey_Current_User for the Software Folder.
There will be a list with the programs. If you are infected, you'll find something like Server or Stub, or something like that
If you findd one, delete that entry (Right Click -> Delete Entry).


Third Method Steps (thanks to CyberProdigy):

Open "RUN"
Type in "%appdata%" (this contains many viruses too)
After you get there check if there are any .exe that you have never heard of there
If you find one search it on google because some of the programs have weird company names.


Fourth Method Steps:

Open Task Manager (Ctrl+alt+delete)
Go to processes tab
Find an unusual name (most likely something with server, stub,explorer1, or something with weird letters)
Once you find one, search it up on google because like i said before some programs have weird names 


Credits to My Site Staff htplanet.com Shatrang

Friday, 28 June 2013

How to Transfer Contacts another Mobile Phone

The process may vary depending upon the phone support cloud but broadly, there are three options. I will discuss the most popular mobile platforms like BlackBerry, iPhone, HTC, Nokia, Windows Phone, Samsung and Android.

1. SIM based transfer

If the address book of your old phone is relatively small and you only want to copy the phone numbers to your new cell phone, simply use the SIM card.
Just copy the phone numbers from the old phone’s memory to your SIM card, insert this SIM card into your new phone and then copy the phone numbers in your new phone’s memory. Here’s a detailed guide on how to transfer contacts from the Nokia to an iPhone using the SIM.

2. Transfer Contacts via your Computer

The SIM card based approach is good only for transferring basic phone numbers but if your phone’s address book includes long names, email addresses, and other details of your contacts, you need some sort of software to help you with the transfer process.
For instance, if you have a Nokia phone but are shifting to a BlackBerry or an iPhone, you may use Nokia’s Ovi Suite application to copy your phone’s address book to Microsoft Outlook on your desktop computer. You can then use BlackBerry’s Desktop Manager software, or iTunes in the case of iPhone, or Kies for Samsung Galaxy, to transfer contacts from the PC (Outlook) to your new phone’s address book.

Windows Mobile users, like Samsung Omnia or HTC HD2, may again use Microsoft’s Device Center (or ActiveSync for XP) to copy their phone address book to the desktop via Outlook. If you are simply switching from one Windows Phone to another, you can transfer contacts via the cloud itself using Microsoft’s My Phone service.
If you have an old CDMA based mobile phone from, say Samsung or LG, you can use the free BitPim utility to copy the phone book to your computer. BitPim is available for Windows, Mac and Linux machines and it can export address books in standard vCard format (.vcf) that you can easily import into Outlook and other contact managers.

3. Transfer Phone book “Over the Air”

If you have an Internet enabled phone, you can easily copy contacts from your old phone to the new phone over-the-air without even requiring a computer.
An online service called Mobical is free and it works with most mobile phones from Nokia, Motorola, Sony Ericsson and so on. You first need to setup Mobical on the old phone and it will create a backup of your phone contacts in the cloud. Now setup Mobical on the new phone using the same credentials and it will automatically download all the contacts from the cloud to your new phone.
Then there’s Google Sync, a cloud based service that works with BlackBerry, iPhone, Nokia   and most other mobile phones that are SyncML capable. Google Sync keeps your phone’s address book in sync with your Google Contacts. Therefore, if you now install Google Sync on both your old and new phone, they’ll have the same phone book entries automatically.
Android based phones can sync with Google Contacts out of the box – you can then export Google Contacts out as a CSV file and copy it to any other phone manually via the desktop tools.  HTC even offers a desktop utility called HTC Sync that you may use to synchronize Outlook contacts with your Android phone. This will be handy when you want to copy your HTC’s phone book to another phone that is not web-enabled
This article describes how you can secure your Wireless Network from hackers and you’ll also learn about free tools that people generally use to intercept your Wi-Fi signals.
Wireless networks (wi-fi)Wireless Networking (Wi-Fi) has made it so easy for you to use the computer, portable media player, mobile phones, video game consoles, and other wireless devices anywhere in the house without the clutter of cables.
With traditional wired networks, it is extremely difficult for someone to steal your bandwidth but the big problem with wireless signals is that others can access the Internet using your broadband connection even while they are in a neighboring building or sitting in a car that’s parked outside your apartment.
This practice, also known as piggybacking, is bad for three reasons:
  • It will increase your monthly Internet bill especially when you have to pay per byte of data transfer.
  • It will decrease your Internet access speed since you are now sharing the same internet connection with other users.
  • It can create a security hazard* as others may hack your computers and access your personal files through your own wireless network.
[*] What do the bad guys use - There have been quite a few instances where innocent Internet users have been arrested for sending hate emails when in reality, their email accounts where hacked though the unsecured Wi-Fi networks that they had at home. Wireshark is a free packet sniffing tool for Linux, Mac and Windows that can scan traffic flowing though a wireless network including cookies, forms and other HTTP requests.

How to Secure Your Wireless Network

The good news is that it is not very hard to make your wireless network secure, which will both prevent others from stealing your internet and will also prevent hackers from taking control of your computers through your own wireless network.
Here a few simple things that you should to secure your wireless network

Step 1. Open your router settings page

First, you need to know how to access your wireless router’s settings. Usually you can do this by typing in “192.168.1.1” into your web browser, and then enter the correct user name and password for the router. This is different for each router, so first check your router’s user manual.
You can also use Google to find the manuals for most routers online in case you lost the printed manual that came with your router purchase. For your reference, here are direct links to the manufacturer’s site of some popular router brands – Linksys, Cisco, Netgear, Apple AirPort, SMC, D-Link, Buffalo, TP-LINK, 3Com, Belkin.

Step 2. Create a unique password on your router

Once you have logged into your router, the first thing you should do to secure your network is to change the default password* of the router to something more secure.
This will prevent others from accessing the router and you can easily maintain the security settings that you want. You can change the password from the Administration settings on your router’s settings page. The default values are generally admin / password.
[*] What do the bad guys use - This is a public database of default usernames and passwords of wireless routers, modems, switches and other networking equipment. For instance, anyone can easily make out from the database that the factory-default settings for Linksys equipment can be accessed by using admin for both username and password fields.

Step 3. Change your Network’s SSID name

The SSID (or Wireless Network Name) of your Wireless Router is usually pre-defined as “default” or is set as the brand name of the router (e.g., linksys). Although this will not make your network inherently* more secure, changing the SSID name of your network is a good idea as it will make it more obvious for others to know which network they are connecting to.
This setting is usually under the basic wireless settings in your router’s settings page. Once this is set, you will always be sure that you are connecting to the correct Wireless network even if there are multiple wireless networks in your area. Don’t use your name, home address or other personal information in the SSID name.
Also see: Change Network Name to Prevent Wi-Fi Theft
[*] What do the bad guys use - Wi-Fi scanning tools like inSSIDer (Windows) and Kismet (Mac, Linux) are free and they will allow anyone to find all the available Wireless Networks in an area even if the routers are not broadcasting their SSID name.

Step 4. Enable Network Encryption

In order to prevent other computers in the area from using your internet connection, you need to encrypt your wireless signals.
There are several encryption methods for wireless settings, including WEP, WPA (WPA-Personal), and WPA2 (Wi-Fi Protected Access version 2). WEP is basic encryption and therefore least secure (i.e., it can be easily cracked*, but is compatible with a wide range of devices including older hardware, whereas WPA2 is the most secure but is only compatible with hardware manufactured since 2006.
To enable encryption on your Wireless network, open the wireless security settings on your router’s configuration page. This will usually let you select which security method you wish to choose; if you have older devices, choose WEP, otherwise go with WPA2. Enter a passphrase to access the network; make sure to set this to something that would be difficult for others to guess, and consider using a combination of letters, numbers, and special characters in the passphrase.
[*] What do the bad guys use - AirCrack and coWPAtty are some free tools that allow even non-hackers to crack the WEP / WPA (PSK) keys using dictionary or brute force techniques. A video on YouTube suggests that AirCrack may be easily used to break WiFi encryption using a jail-broken iPhone or an iPod Touch.

Step 5. Filter MAC addresses

Whether you have a laptop or a Wi-Fi enabled mobile phone, all your wireless devices have a unique MAC address (this has nothing to do with an Apple Mac) just like every computer connected to the Internet has a unique IP address. For an added layer of protection, you can add the MAC addresses of all your devices to your wireless router’s settings so that only the specified devices can connect to your Wi-Fi network.
MAC addresses are hard-coded into your networking equipment, so one address will only let that one device on the network. It is, unfortunately, possible to spoof a MAC address*, but an attacker must first know one of the MAC addresses of the computers that are connected to your Wireless network before he can attempt spoofing.
To enable MAC address filtering, first make a list of all your hardware devices that you want to connect to your wireless network**. Find their MAC addresses, and then add them to the MAC address filtering in your router’s administrative settings. You can find the MAC address for your computers by opening Command Prompt and typing in “ipconfig /all”, which will show your MAC address beside the name “Physical Address”. You can find the MAC addresses of Wireless mobile phones and other portable devices under their network settings, though this will vary for each device.
[*] What do the bad guys use - Someone can change the MAC address of his or her own computer and can easily connect to your network since your network allows connection from devices that have that particular MAC address. Anyone can determine the MAC address of your device wireless using a sniffing tool like Nmap and he can then change the MAC address of his own computer using another free tool like MAC Shift.

Step 6. Reduce the Range of the Wireless Signal

If your wireless router has a high range but you are staying in a small studio apartment, you can consider decreasing the signal range by either changing the mode of your router to 802.11g (instead of 802.11n or 802.11b) or use a different wireless channel.
You can also try placing the router under the bed, inside a shoe box or wrap a foil around the router antennas so that you can somewhat restrict the direction of signals.
Apply the Anti-Wi-Fi Paint – Researchers have developed a special Wi-Fi blocking paint that can help you stop neighbors from accessing your home network without you having to set up encryption at the router level. The paint contains chemicals that blocks radio signals by absorbing them. “By coating an entire room, Wi-Fi signals can’t get in and, crucially, can’t get out.”

Step 7. Upgrade your Router’s firmware

You should check the manufacturer’s site occasionally to make sure that your router is running the latest firmware. You can find the existing firmware version of your router using from the router’s dashboard at 192.168.*.

Connect to your Secure Wireless Network

To conclude, MAC Address filtering with WPA2 (AES) encryption (and a really complex passphrase) is probably the best way to secure your wireless network.
Once you have enabled the various security settings in your wireless router, you need to add the new settings to your computers and other wireless devices so that they all can connect to the Wi-Fi network. You can select to have your computer automatically connect to this network, so you won’t have to enter the SSID, passphrase and   other information every time you connect to the Internet.
Your wireless network will now be a lot more secure and intruders may have a tough time intercepting your Wi-Fi signals.

Who is Connected to your Wireless Network

If you are worried that an outsider may be connecting to the Internet using your Wireless network, try AirSnare – it’s a free utility that will look for unexpected MAC addresses on your Wireless network as well as to DHCP requests. Another option is that you open your router’s administration page (using the 192.168.* address) and look for the DHCP Clients Table (it’s under Status > Local Network on Linksys routers). Here you will see a list of all computers and wireless devices that are connected to your home network.
*It is also a good idea to turn off the router completely when you are not planning to use the computer for a longer period (like when you are out shopping). You save on electricity and the door remains 100% shut for wireless piggybackers.
**If you ever want to let a new device connect to your network, you will have to find its MAC address and add it to your router. If you simple want to let a friend connect to your wireless network one time, you can remove his MAC address from the router settings when he or she leaves your place.
Many free domains available
Free InstantWeb homepage

Q: Why can I only register 1 .NU domain?
A: The current promotion allows you to register 1 free .NU domain. In order to keep things fair, we've set the limit to 1 domain name per customer.
It will be possible to register additional domains in the next few weeks for an additional fee.

Q: Can I redirect subdomains?
A: Currently, it is not possible to redirect subdomains. The best solution is to make a DNS subdomain and forward this. We advise you check with your hosting provider to see whether they support this.

Q: What are the renewal rates for my .NU domains?
A: After the first year of free registration, the renewal rate for a .NU domain is $23.00 for 1 full year.

Q: How can I delete a domain name from my account?
A: In order to delete a domain from your account, take the following steps:
1. Open the Domains tab.
2. Click 'delete' for the domain you wish to delete.
3. Confirm the deactivation of the domain.
Q: Can I transfer domains to you?
A: Currently it's not possible to transfer domains just yet. We hope to provide these options soon.

Q: Where can I find the auth code?
A: The auth code can be found by following the steps below;
1. Click 'auth code' tab by the domain you would like to transfer. This will display an ´Outgoing transfers´ block above your domains list.
2. Click the Auth code tab to view the auth code of that domain.

To be noted: do not disclose the auth code to anyone.


http://directregister.com/

Please say thanks in the thread if you used this.

Tuesday, 25 June 2013

Step 1

1. Search for the autorun file (autorun.inf). It is a read only file so you will have to change it to normal by right clicking the file, selecting the properties and un-check the read only option.

2. Open the said file in notepad and delete everything inside it and save the file.

3. Now change the file status back to read only mode so that the virus could not get access again.

4. Now go to msconfig from RUN menu by pressing (Windows + R) and typing msconfig.

5. Go to startup tab and look for regsvr. Then uncheck the option and click OK.

6. Click on Exit without Restart, because there are still few things we need to do before we can restart the PC.

7. Now go to control panel –> scheduled tasks, and delete the At1 task listed there

Step 2

1. first Click on start -> RUN and type gpedit.msc and click Ok to open the local group policy editor.

2. If you are Windows XP Home Edition user ,then you might not have gpedit.msc. In that case download and install it from Windows XP Home Edition: gpedit.msc and then follow all these steps.

3. then Go to the desired location:

user Configuration-> Administrative Templates-> System

4. Find “prevent access to registry editing tools” and change the option to disable.

5. Once you do this you have registry access back

Step 3

1. First Click on Start->Run and type regedit and click ok.

2. Go to Edit-> Find and start the search for regsvr.exe.

3. Launch the attack in the heart of castle: registry search

4. Delete all the occurrence of regsvr.exe; Do Remember to take a backup before deleting remember regsvr32.exe is not to be deleted. Delete regsvr.exe occurrences only

Step 4

1. Click on Start-> Search-> For files and folders.

2. Type “*.exe” as file name to search for.

3. Click on ‘when was it modified ‘option and select the specify date option.

4. Type from date as 1/31/2008 and also type To date as 1/31/2008

5. Now hit search and wait for all the exe’s to show up.[/color]

[color=#32CD32]6. Once search is over select all the .exe files and shift+delete the files. Caution must be taken so that you don’t delete the legitimate .exe file that you have installed on 31st January (delete only newfolder.exe).

7. Also selecting lot of files together might make your computer unresponsive; so delete them in small bunches.

8. Also find and delete regsvr.exe, svchost .exe( notice an extra space between the svchost and .exe).

After these prolonged steps, the New folder virus will be completely removed from your computer