If you wanna find more tricks, you just using Google Search below

Google

Speed up you windows again

Its too long content for me to put all ways and methods on how to speed up the windows. Dont worry I will explain to you through my post, so you have to ensure keep your eyes on my post okay. Okay for the second ways on how to speed up your windows is to turn off your system restore.

System Restore can be a useful if your computer is having problems, however storing all the restore points can literally take up Gigabytes of space on your hard drive. To turn off System Restore:

1. Open Control Panel
2. Click on Performance and Maintenance
3. Click on System
4. Click on the System Restore tab
5. Tick 'Turn off System Restore on All Drives'
6. Click 'Ok'

You also can defragment your pagefile. One of the best ways of doing this is to creat a separate partition on your hard drive just for your page file, so that it doesn't get impacted by normal disk usage. Another way of keeping your pagefile defragmented is to run PageDefrag. This cool little app can be used to defrag your pagefile, and can also be set to defrag the pagefile everytime your PC starts. To install:

1. Download and Run PageDefrag
2. Tick "Defrag at next Reboot"
3. Click "Ok"
4. Reboot

 

Speed up your windows

Before this I provided you with some advices to speed up your PC machines .Glad I helped, since I got huge positive response so I decided to put another few advices for you to obey! ok let's start with the Ways To Speed Up Windows:

The first thing you should know that Windows XP has many services running that take up system resources that you will never need. Below is a list of services that can be disabled on most machines:

• Alerter
• Clipbook
• Computer Browser
• Distributed Link Tracking Client
• Fast User Switching
• Help and Support - (If you use Windows Help and Support leave this enabled)
• Human Interface Access Devices
• Indexing Service
• IPSEC Services
• Messenger
• Netmeeting Remote Desktop Sharing (disabled for extra security)
• Portable Media Serial Number
• Remote Desktop Help Session Manager (disabled for extra security)
• Remote Procedure Call Locator
• Remote Registry (disabled for extra security)
• Remote Registry Service
• Secondary Logon
• Routing & Remote Access (disabled for extra security)
• Server
• SSDP Discovery Service - (Unplug n' Pray will disable this)
• Telnet
• TCP/IP NetBIOS Helper
• Upload Manager • Universal Plug and Play Device Host
• Windows Time
• Wireless Zero Configuration (Do not disable if you use a wireless network)
• Workstation

How to solve this? easy way you just disabled all these things and that's it..oppsss..I forget to tell you the ways on how to disabled all these unneeded services.

1. Go to Start and then Run and type "services.msc"
2. Doubleclick on the service you want to change
3. Change the startup type to 'Disable"

Get the point?right..do it now!

 

Viruses calling phase 2

I just go through its types directly

6. Virus: W32/Mytob-EX
A mass-mailing worm and IRC backdoor Trojan similar in nature to W32-Mytob-GH. W32/Mytob-EX runs continuously in the background, providing a backdoor server which allows a remote intruder to gain access and control over the computer via IRC channels. This virus spreads by sending itself to email attachments harvested from your email addresses.

7. Virus: W32/Mytob-AS, Mytob-BE, Mytob-C, and Mytob-ER
This family of worm variations possesses similar characteristics in terms of what they can do. They are mass-mailing worms with backdoor functionality that can be controlled through the Internet Relay Chat (IRC) network. Additionally, they can spread through email and through various operating system vulnerabilities such as the LSASS (MS04-011).

8. Virus: Zafi-D
A mass mailing worm and a peer-to-peer worm which copies itself to the Windows system folder with the filename Norton Update.exe. It can then create a number of files in the Windows system folder with filenames consisting of 8 random characters and a DLL extension. W32/Zafi-D copies itself to folders with names containing share, upload, or music as ICQ 2005a new!.exe or winamp 5.7 new!.exe. W32/Zafi-D will also display a fake error message box with the caption "CRC: 04F6Bh" and the text "Error in packed file!".

9. Virus: W32/Netsky-D
A mass-mailing worm with IRC backdoor functionality which can also infect computers vulnerable to the LSASS (MS04-011) exploit.

10. Virus: W32/Zafi-B
A peer-to-peer (P2P) and email worm that will copy itself to the Windows system folder as a randomly named EXE file. This worm will test for the presence of an internet connection by attempting to connect to www.google.com or www.microsoft.com. A bilingual, worm with an attached Hungarian political text message box which translates to “We demand that the government accommodates the homeless, tightens up the penal code and VOTES FOR THE DEATH PENALTY to cut down the increasing crime. Jun. 2004, Pécs (SNAF Team)”

These are all in "one family" if you can see the main head of virus is W32. Its a best plat number for your car but its not a best for your computer.

 

Viruses calling

For the next 2 or 3 post, I would like to explain to you about the viruses that you should know in order to protect your computer. Some viruses are dangerous and some of them is not however if you call "virus" its still need to prevent. Simple advice from me, keep your anti-virus software updated, and stay aware of the current computer virus threats.

1. Virus: Trojan.Lodear
A Trojan horse that attempts to download remote files. It will inject a .dll file into the EXPLORER.EXE process causing system instability.

2. Virus: W32.Beagle.CO@mm
A mass-mailing worm that lowers security settings. It can delete security-related registry sub keys and may block access to security-related websites.

3. Virus: Backdoor.Zagaban
A Trojan horse that allows the compromised computer to be used as a covert proxy and which may degrade network performance.

4. Virus: W32/Netsky-P
A mass-mailing worm which spreads by emailing itself to addresses produced from files on the local drives.

5. Virus: W32/Mytob-GH
A mass-mailing worm and IRC backdoor Trojan for the Windows platform. Messages sent by this worm will have the subject chosen randomly from a list including titles such as: Notice of account limitation, Email Account Suspension, Security measures, Members Support, Important Notification.

That's all for the viruses that you should be aware and I call it the top 5 viruses that is really..really aware...I will tell you another viruses in the next post.

 

Fighting Spam

I will make it short on how to protect your email from spam.

1. Do what you can to avoid having your email address out on the net.

There are products called “spam spiders” that search the Internet for email addresses to send email to. If you are interested, do a search on “spam spider” and you will be amazed at what you get back. You can view at www.WebPoison.org

2. Get spam blocking software

For this program you can go directly to www.cloudmark.com or www.mailwasher.net . Whatever you do, get the software. It will save you time. The software is not foolproof, but they really do help. You usually have to do some manual set up to block certain types of email.

3. Use the multiple email address approach

There are a lot of free email addresses to be had. If you must subscribe to newsletters, then have a “back-up” email address. It would be like giving your sell phone number to your best friends and the business number to everyone else.

4. Attachments from people you don’t know are BAD, BAD, and BAD!!

You should know why I repeat for 3 times right? if you do not know who is sending you something, DO NOT OPEN THE ATTACHMENT. Secondly, look for services that offer filtering. Firewall vendors offer this type of service as well.

5. Email services now have “bulk-mail” baskets

If what you use currently does not support this, think about moving to a new vender. The concept is simple. If you know someone, they can send you emails. If you don’t know them, put them in the bulk email pile and then “choose” to allow them into your circle. Spam Blocking software has this concept as well, but having extra layers seems critical these days, so it is worth looking into.

 

What is Botnets?

A botnet is comparable to compulsory military service for windows boxes and this definition I took it from http://project.honeynet.org/papers/bots .

Botnets are networks of computers that hackers have infected and grouped together under their control to propagate viruses, send illegal spam, and carry out attacks that cause web sites to crash.What makes botnets exceedingly bad is the difficulty in tracing them back to their creators as well as the ever-increasing use of them in extortion schemes. How are they used in extortion schemes? Imagine someone sending you messages to either pay up or see your web site crash. This scenario is starting to replay itself over and over again.

Botnets can consist of thousands of compromised machines. With such a large network, botnets can use Distributed denial-of-service (DDoS) as a method to cause mayhem and chaos. For example a small botnet with only 500 bots can bring corporate web sites to there knees by using the combined bandwidth of all the computers to overwhelm corporate systems and thereby cause the web site to appear offline.

One well-known technique to combat botnets is a honeypot. Honeypots help discover how attackers infiltrate systems. A Honeypot is essentially a set of resources that one intends to be compromised in order to study how the hackers break the system. Unpatched Windows 2000 or XP machines make great honeypots given the ease with which one can take over such systems. You can read more about Botnets at http://project.honeynet.org