Sunday, October 6, 2013

why you should not buy the new apple iphone 5S



We have a number of tests to compare the new iPhone 5s

and previous generations of it

The tests included are

 The time it takes to close

The time it takes to take off or open

Faster loading Web sites


The result was that you do not need to buy a new iPhone


To watch the tests and find out the reasons


Watch this video



                        

Tuesday, September 3, 2013

Giveaway -- Free premium VPN courtesy of Steganos

Giveaway -- Free premium VPN courtesy of Steganos

With the exclusive release of the latest Online Shield 365, we're giving away free keys to its premium VPN service for six months to the first 25K Downloaders.

VPN services like Online Shield 365 can help you protect your identity by creating an encrypted connection to prevent anyone from listening in. By tunneling your connection to a secure server, it will not only protect your online passwords but can also help maintain your Internet privacy. Keep credit card data and other financial information safe while you shop or bank online. Steganos can also protect you while you connect to risky networks, i.e. public hotspots at cafes, airports, schools, or hotels. With a click of a button the new SOS 365 provides continuous protection while you surf the Web.
It may also help you bypass those pesky YouTube region blocks.
Features:
  • Secures your personal data by continuously encrypting data from your PC.
  • Protection while you shop online -- keep credit card info. safe.
  • Provides security while connecting to public hotspots like a hotel, airport, school, or cafe.
  • Single-click activation for Internet connection encryption.
  • Choose from a wide range of available IP's.
In conjunction with the exclusive release, Steganos Online Shield 365 is offering six months of free protection at 2GB/month to the first 25,000 users, only on Download.com. Online Shield 365 supports Windows XP, Vista, 7, and 8 and is usually priced at $69.95 per year. This offer will go on until we've run out of licenses. Click the "Get It Now" button for your free license.


Saturday, August 10, 2013

Chromecast : Google’s New Miracle Device


Chromecast: Google’s New Miracle Device


                                                          

Putting a web browser on TV is a difficult task

The tech industry in general has been struggling with it for a long time and for regular people

 it’s just easier to plug in their laptops 

The problems faced in incorporating a web browser in TV are many

Interface problems, weird  remotes and clunky performance are just some of the roadblocks

 faced by the tech industry

 Google’s last attempt with the Google TV platform was a spectacular failure and their

hardware partner, Logitech, almost went out of business in the process

But now Google is back on track with Chromecast, their newest device which promises web on

 TV without performance hassles

The Chromecast is a HDMI dongle which essentially  competes with Apple’s AirPlay system

Plug it into your TV or music system and you can control it easily using any Google enabled

 device

Services such as YouTube and Netflix played on your phone, tab or computer can be

 transmitted to the TV using the new Cast button

Entire Chrome browsers from Macs and  PCs can also be put up on any TV site or service

In view of the previous unsuccessful  attempts, this is a lot more than any other service has been

 able to provide till now

AirPlay from Apple was the only sustainable TV browser but it also has the drawback of

having very  few Apple users

The Chromecast dongle itself is a compact and convenient to use device

It measures a little less than 3 inches in length and looks similar to a pen drive

The back of the device is fitted with an LED, a Micro USB port and a button

The Chromecast draws power through the Micro USB  port and Google recommends using an

external power adapter to charge the Chromecaster using a wall outlet, when it is not charging

via the USB port

Once the Chromecaster is plugged in, the next step in setting it up is to establish a Wi-Fi

network

To set up Wi-Fi you need to download the setup app for Mac, Android or PC and the

 system automatically prompts you to choose a network

Chose a network, input password name your Chromecast and download Google Cast Chrome

you are all set

The rest of the operations are similar to web browsing and can be carried out on apps or a

 computer

As of now there are just a limited number of apps available for this device. But given the

 success rate of the Chromecast, users can expect much more to come soon

Tuesday, June 4, 2013

Hack with Command Prompt: All Command Prompt Commands


Command Prompt
 
 is the heart of windows and with a technical point of view, command prompt is the only good thing in windows for a techie. Command Prompt gives you a feel of how things work in the back end of windows. For example, if we copy and paste using usual right click feature we don't get to know what is happening behind the buttons to make copy and paste possible. But if we copy and paste using command prompt, we get to know how things are done.
This screenshot shows an example to copying contents of  "functionallog.txt" to a new file "android.txt".
When someone starts learning about computers and hacking, the priority should be to gain a firm hold on command prompt as command is very powerful and allows you to do a lot of stuff. Now I'll talk about some of the commands of command prompt which a hacker should surely know. Before trying these commands, make sure you are running command prompt as the administrator.(right click on cmd > run as administrator)
1. ipconfig:
  ifconfig is a very basic command which tells the IP(Internet Protocol) address of your  machine if you are connected to the internet. Other information  such as default gateway, subnet mask etc. are also displayed. This command is similar to ifconfig command in linux systems.
Syntax: ipconfig 


                              
2.  Ping:
 
Ping command is used to check if a host is up or not. It sends 32 bytes of data to the host whom we want to check, if the reply comes from the host, it means that the host is up.
Syntax: ping xxx.xxx.xxx.xxx (where xxx.xxx.xxx.xxx is the ip you want to check). 
 
Ping command can also be used to check the IP Address of website by pinging them and you can use that IP Address to open that site too by putting it on the URL box.
Syntax: ping thecyberelite.blogspot.com
3. Telnet:
 
Telnet is a command line tool by microsoft which is used to establish connection remote servers. Telnet has been used widely for hacking where attackers used to establish remote connection to victim pc when the ports of the victim system where open. By default telnet operates on port 23. Telnet is not available in the windows system, you have to enable it manually. To enable telnet on windows follow the following steps:
  • Open up control panel and select system and security.
  • Select "programs" option from left side.
  • In program and features section click on "turn windows features on or off".
  • A menu will open up and from there select check the option "telnet click" and "telnet server".



                     
 If you know the ip of a person, you can gain access to his system using telnet. To open telnet window, type "telnet"(without quotes) in the command prompt. Here is an example of a simple telnet command used to open a connection.
Syntax: o xxx.xxx.xxx 171 (o: means "open", 23: default port for telnet)
Various other commands of telnet can also be used once the connection is established to the client machine. Simple type "help" in the telnet windows to see other options.
4. ARP:
 
"arp" stands for Address Resolution Protocol and this command is used to monitor the network stats and connections. Address Resolution Protocol means that it link ip address to physical address or mac address. ARP command comes handy when you are in a school, college, office network. This command is available by simply typing "arp" in command prompt.
Syntax: arp -a (This command displays a list of current ARP entries)
  Syntax: arp -d xxx.xxx.xxx.xxx(This command deletes a host specified by you from network, here xxx.xxx.xxx.xxx is the specified host).
5. nslookup:
 
This is a very useful command which you name of your domain and it's ip address.
Syntax: nslookup
You can also find information about an ip in using the same server in your netowrk by just simply typing name of the ip in the nslookup window.
6. Netstat:
 
Netstat command gives you information about your internet connections. Netstat command gives a list of active connections. This command is very useful and if someone has RAT Ed your pc, then you can detect it by this command as it would display the connection of RAT being made with it's host.
Syntax: netstat
Here Protocol used by the connection, foreign address and the state of the connection are displayed.
If you suspect some connection then you can always see what is causing that connection by typing the following command : netstat -b (this would display the executable involved in creating that connection)
The pointed .exe's are the open which are creating a connection.
If you want to know statistics of each protocol, then your can try this command: netstat -s
Other netstat commands can be seen by typing "netstat help" (exclude commas).
With this, I conclude this article. I hope this helps people new to command prompt and renews the memory of ones already using it :) 


List of commands can be downloaded from HERE

Monday, May 6, 2013

Download a genuine version of Windows 8


Download a genuine version of  Windows 8

Difference between Windows 8 Windows 8 Pro Windows RT and Windows 8 Enterprise  تحميل نسخة ويندوز أصلية Windows 8

Windows 8
The new Masterpiece of  Microsoft
Microsoft gives us a new experience through the Metro interface
Metro UI
That came to the appropriateness of many of the devices, whether Tablet or devices or portable library
Metro interface is extremely flexible 
great Innovation  from Microsoft and will have a lot of spread

win8 review desktop no aero 1024x575 تحميل نسخة ويندوز أصلية Windows 8
Windows 8 Specification
Req. to run Windows 8
Processor: 1 gigahertz (GHz) or faster with support for PAE, NX, and SSE2 (more info)
RAM: 1 gigabyte (GB) (32-bit) or 2 GB for 64-bit
Hard disk space: 16 GB (32-bit) or 20 GB for 64-bit
Graphics card: Microsoft DirectX 9 graphics device with WDDM driver

Download windows 8 original copy from microsoft
Windows 8 Enterprise 9200 RTM
Windows 8 Ent. is the only available for try from microsoft
(Windows 8 Ent. … Is Trial for 90 days  )
Windows 8 Ent   32x
Windows 8 Ent   64x





Monday, April 29, 2013

How to disable the Windows 8 lock screen


How to disable the Windows 8 lock screen



Windows 8 lock/login screen




Did you know that, back in the Windows 3, 95, and 98 days, you could simply type in your password to log into your computer? It sounds crazy, I know, but it’s true. Since Windows XP, the process has become steadily more convoluted — picking your avatar from a list, or hitting Ctrl+Alt+Del before being allowed to log in (this was actually a security feature, believe it or not). Windows 8 is the worst offender yet, positively spitting in the face of keyboard users — but fortunately, it’s quite easy to disable the new Windows 8 lock screen.

In essence, the new Windows 8 lock/login screen is meant to act as a dashboard, flashing up notifications for new email, IMs, and so on. On a tablet, where you swipe the lock screen away and then begin typing, this makes perfect sense. On a desktop PC, though, the lock screen is clunky (you might say this is a bit of a recurring theme in Windows 8). Yes, theoretically you only have to tap a key and it slides away, but for some reason Microsoft introduced a delay so that you can’t immediately type your password. As a result, you often end up losing the first few letters of your password, waiting for Windows to tell you that your password is incorrect, and then typing your password in correctly.


Windows 8 group policy editor: Disabling the lock screen

How to bypass the Windows 8 lock screen

To remove the lock screen entirely, so that locking is just a plain password prompt — and booting up goes straight to the same password prompt — just follow these very simple steps.
  1. Hit the Start key, type gpedit.msc, and press Enter. This will open the Local Group Policy Editor.
  2. Navigate to Computer Configuration > Administrative Templates > Control Panel > Personalization
  3. Double click “Do not display the lock screen,” and select Enabled from the dialog that pops up. Click OK.
The change is immediate. Go ahead and press Win+L and admire your new, minimal lock screen.


Windows 8 lock screen begone!


In addition, if you’re feeling really sassy, you can also tweak your computer to boot straight to Desktop, either with Windows 8′s built-in Task Scheduler, or by using a third-party Start menu replacement, most of which include this functionality as a configurable option. This way, the Desktop will be the second screen you see, instead of the fourth

Thursday, April 25, 2013

Virus Protection Guide


Best free antivirus programs and virus propection tips 

So you got caught with your pants down on the Internet (figuratively, folks) and contracted a virus. That sucks. Or maybe you were wearing protection but still fell victim to some nasty bit of code that managed to slip by your antivirus software undetected. That sucks even more. Either way, it's nothing to feel ashamed about. The web is a dangerous place and even the most tech savvy users sometimes slip up. You can even get a virus through no fault of your own simply by visiting a reputable website that, unbeknownst to you, has been compromised by a hacker with malicious intent. The web is a war zone, and even if you're not a target, you can still end up a casualty.
That's not to say you can't stack the odds decidedly in your favor, because you can. And you should. To help you do that, we've put together a comprehensive guide on how to protect your PC from malware. We cover everything from smart (and not so smart) computing habits, the best free antivirus programs, and what tools work best for removing an infection when all else fails. Don your hazmat suits and let's get started!
Spyware
If your PC looks like this, you're doing something wrong.

Virus 101

If you're reading this, it's safe to assume you already know what a computer virus is, and certainly the majority of Maximum PC readers are well informed. So, we won't spend a ton of text dissecting the different kinds of viruses, but we do want to quickly cover the basics. Strictly speaking, a virus is a program that can replicate itself and is designed to spread from one computer to another, doing things the end-user doesn't want and/or doesn't know about.
A broader term is malware, short for malicious software, and there are many different forms, including viruses, Trojan horses, keyloggers, worms, adware, and spyware, to name a few. These days, malware is most often spread through web browsers. According to Kaspersky, there were nearly 1.6 billion browser-based attacks in 2012, up from 946 million a year prior.
A common misconception is that only Windows users need to concern themselves with malware, but that isn't true. Malware writers have traditionally focused their efforts on Windows, but have started targeting other platforms as they become more popular, including mobile. Even Mac users have to be on the lookout.
"In early 2012, the Flashfake botnet was discovered, consisting of 700,000 computers all running under Mac OS X," Kaspersky states in its most recent security bulletin.
The bottom line is, if you use the Internet, you're a target.

Safe Computing is a Start

Your best line of defense is still you, the end-user. The less risks you take, the lower your chance of becoming just another statistic, and it all starts with developing smart computing habits. Here are five easy ways you can remove yourself from the line of fire:
  1. Never open unexpected email attachments, even if you know the recipient. If a PC belonging to someone else is infected, it could be auto-generating malicious emails with dirty attachments or booby-trapped URLs.
  2. It's easy to spoof URLs within emails. Instead of clicking on email links, type the URL directly into your browser, especially if you receive a notice that appears to come from your banking institution or PayPal. This exponentially decreases your risk of falling for a phishing scam. You know what they say about a fool and his money...
  3. Stay diligent with updating and patching your software. These updates often patch security holes that malware writers can otherwise exploit. If a program has the option of automatically checking for updates, enable it. We also recommend running Secunia's Personal Software Inspector (PSI) on occasion, which is a free security tool that scans for and identifies vulnerabilities in many third-party programs.
  4. Avoid visiting shadier sides of the web. We're in no way trying to play the part of moral police, but sites that serve up illegal downloads or triple-X rated content are popular places to set digital landmines.
  5. Use Alt-F4 to close suspicious pop-up ads instead of clicking on the X button. Why? Sometimes the X button is really a part of the ad, and clicking it could redirect you to a malicious website.

A Word About Passwords

As much as you might love your significant other, using his or her name as your password is a really dumb idea. It's far too easy to guess, just like "123456," "iloveyou," "letmein," and others found on SplashData's list of worst passwords.
A good password will be at least eight characters long and will use a mix of letters, numbers, symbols, and capitalization. For example, "Ey3LMpC!" which stands for "I love Maximum PC" is relatively easy to remember and much more secure than a word or phrase that can be broken with a brute force dictionary attack.
1Password
You also should be using multiple passwords for different websites so that if one account is compromised, your others are still safe. The downside to this approach is that it can be difficult to remember multiple passwords, especially strong ones. An alternative to remembering them all is to use a password manager like LastPass or KeePass, both of which are free. RoboForm is another option, and though it isn't free, it also fills in forms and allows you to access RoboForm Logins and Identities on all your devices, including mobile. The same is true of 1Password, though it doesn't fill in forms.

Second Line of Defense: Antivirus Software

Whenever the topic of security software comes up, inevitably someone chimes in that it's completely unnecessary so long as you surf the web safely. They'll then provide anecdotal evidence based on their own personal experience, and while it's true you can get by without AV protection, it's a constant roll of the dice. And for what? To save a few CPU cycles? It's simply not worth the risk, and certainly not the cost when there are free options out there. Let's focus on those first.
-Avast Free Edition (Free, www.avast.com/en-us/index)
Avast Free Edition
Every year we run a roundup of security software and you can read the latest one in the April issue of Maximum PC magazine. In it we tested three free antivirus programs -- AvastMicrosoft Security Essentials, and AVG -- and out of those three, we found Avast to be the best free antivirus software.
We like Avast because it scans for viruses and spyware, and has a built-in remote support tool that allows you to dish out (or receive) assistance to other trusted Avast users, which is extremely handy if you're the IT guy for family and friends. It also offers tons of fine grain control.
One of our few complaints is that Avast doesn't guard against Potentially Unwanted Programs (PUPs) by default. To change that, click on Security > File System Shield > Settings > Sensitivity and check the box underneath "PUP and suspicious files."
We also recommend doing a full system scan at least once a month. If you keep your PC on 24/7, it's not a bad idea to schedule nightly scans when you're asleep. This ensures that any potential threats are caught before they have much chance to do any harm, provided they get past Avast's real-time scan engine to begin with.
-Second Opinions
No virus scanner is capable of catching and neutralizing every single threat; it's simply not possible due to the sheer number of new malware that is created on a daily basis. For this reason, it's in your best interest to solicit a second and/or third opinion on occasion using a dedicated spyware scanner. How often depends on how risky your online behavior. If all you're doing is surfing Maximum PC, sports sites, and updating your Facebook feed, quarterly scans should be sufficient.
One of the best programs out there is Malwarebytes. It's free (there's also a paid version) and it does an excellent job of detecting deeply embedded threats that other scanners miss. Malwarebytes is also great at cleaning up remnants left behind after you've eradicated a virus, such as lingering registry entries.
Another popular program is SuperAntiSpyware, which is also available in free and paid flavors. Scanning with both Malwarebyes and SuperAntiSpyware on occasion is a potent one-two combo to supplement your daily AV program.
-Internet Security Suites
Norton Internet Security
If you're willing to pay for security software, an Internet security suite offers more robust protection than what's available in any single free program. One of the best available is Norton Internet Security. Put your pitchforks away, if you haven't taken Norton for a test drive in several years, then you have no idea what you're missing. It's not the same bloated program that it was prior to 2009. That's when Symantec re-wrote the software from the ground up with an emphasis on performance. These days it offers top-notch protection with little impact on system performance
Click the next page to see what you should do when your computer has already been infected!


Stick Your Head in the Cloud


A substitute for installing security software is to tap into the cloud. There are several cloud scanners at your disposal, but only a select few will go the extra mile and actually disinfect your machine if it finds something wrong, while others try to upsell you. Panda Security's Panda Active Scan detects and removes, though it only works with Internet Explorer. There's also an option to install a small front-end, but even if you go that route, it's still a cloud-based scanner that won't suck up your system resources.
Malwarebytes
Another handy bookmark is VirusTotal, a free, on-demand online scanner with a twist. Let's say you downloaded a file or email attachment, but are suspicious of its contents. Before you open it up, just upload it to VirusTotal and it will be put under the microscope of dozens of scan engines. It's the ultimate second opinion for single files and URLs, albeit the maximum file size is 32MB.

Hide Behind a Virtual Machine

Have kids that share your PC? You're a brave soul. Kids have a tendency to click on pop-up requests willy-nilly, but there are steps you can take to mitigate any potential headaches. Here they are:
  1. Teach them smart computing habits. It's never too early to learn, and since their brains are like little sponges, they may surprise you with how much they retain.
  2. Set up a different user account. It won't save your PC from nasty infections, but hey, do you really want to login and find that your Windows theme has been changed over to Spongebob or Dora the Explorer? We didn't think so.
  3. Install Sandboxie, a free application that runs selected programs in an isolated environment. You can configure Sandboxie to run any time a browser is opened, so when your kids inevitably download something they shouldn't have, the changes aren't permanent. This is also a wonderful tool for installing on PCs belonging to friends and family. It works with any browser, too.
Sandboxie
If you're particularly reckless on the web, a full-blown virtual machine is the next best thing to a dedicated web box. A virtual machine isn't completely fool proof, but it's close to it. Microsoft'sVirtual PC works relatively well, especially if you're mostly interested in surfing the web, and so isVMWare's Player. Another thing VMs are good for is installing suspicious programs and beta software. If something turns out to be malicious, the damage is contained away from your OS.

I'm Already Infected, Now What!?

Despite your best efforts, sometimes the bad guys win. If that happens, or if a family member drops off a badly infected PC, follow these steps to clean it up.
-Scan, Scan, and Scan Again
First, try installing a free antivirus program. If it works, great, proceed to scan the system, and then follow that up with Malwarebytes and SuperAntiSpyware sweeps. This three-pronged approach should rid the system of most, if not all malware, unless it's a particularly nasty infection. If it doesn't, don't worry, we're not ready to throw in the towel.
Task Manager
Before we proceed, are you even able to install security programs? Some malware detects when security software is being installed and stops it dead in its tracks. If that's happening to you, try to disable the offending program. Hit CTRL+ALT+DEL to start the Task Manager and look for any suspicious entries in the Processes tab. Anything that's gibberish -- for example, "mgbelwisfl" -- is probably up to no good. Highlight the entry and press End Process. Are you now able to install AV scanners?
If not, you'll need to boot into Safe Mode, which only loads the bare minimum drivers required to run Windows. To do that, hit the F8 key during boot (press it repeatedly during during bootup if you have trouble with the timing). When prompted, select Safe Mode with Networking. Now try installing/running your security software.
-HiJackThis
HiJackThis
If your system's still displaying malware symptoms (slowed performance, random pop-ups, etc), you may need to dig deeper. HiJackThis is a free utility that generates an in-depth report of registry and file settings, but be warned it doesn't discern between good and harmful settings. If you don't know what the settings are, solicit outside help by posting a HiJackThis log to a computer forum like one here at Maximum PC. Alternately, you can post the contents of the log onHiJackThis.de Security and/or I Am Not a Geek for quick and basic parsing, though you should still seek outside help before nuking an entry you're unfamiliar with.
Running HiJackThis is simple. Just click the "Scan" button and wait for it to finish scanning your system (it only takes a few seconds). When it's finished, click on "Save Log" to save the contents to a Notepad file, which you can then copy/paste into any of the sites mentioned above.
Assuming you recognize an obvious malicious entry, check the appropriate box(es) and click "Fix checked."
-Comodo Cleaning Essentials
At this point, we're starting to run out of options, but all is not yet lost. Comodo Cleaning Essentials(CCE) is a tool that any geek should be toting around in his/her tool chest. It doesn't require any installation, meaning you can run it direct from a USB key, which is perfect for making house calls.
Comodo Cleaning Essentials
CCE digs deep for a variety of infections, including rootkits, making it an indispensable tool. It even scans the Master Boot Record (MBR), so to say it's thorough is an understatement.
Inside the CCE directory, you'll also find an entry called KillSwitch.exe. It's a much better version of the built-in Task Manager because it provides a bunch of additional information, and will even tell you if a program that's running is safe or known to be malicious. If you can't get into the Task Manager to kill an offending program, try using KillSwitch. If you want, you can even have it replace the Task Manager by enabling the setting in the Options menu.
-TDSSKiller
TDSSKiller
Persistent infections that manage to evade your best efforts to eradicate could be indicative of a rootkit. A rootkit is particularly stealthy, though not entirely invisible. Download and run Kaskperky's TDSSKiller if you think you might have a rootkit. Like CCE, this utility doesn't require installation and can be carried on a USB stick.
-ComboFix
When you're at your wit's end and ready to reinstall Windows, that's when you should tryComboFix, a powerful cleanup tool that can either save the day or leave your PC unable to operate correctly. Before downloading and running ComboFix, backup any data as if you're reinstalling Windows, because in the end, you might have to anyway. Before you proceed, you should also read through the extensive usage guide on Bleeping Computer.
If you've gotten this far and your system is still infected, throw in the towel and start with a fresh Windows installation. Sure, you could keep plugging away in hopes of cleaning up your system, but by the time you're done, you could be rocking a fresh Windows install with no trace of malware.
Know of any tips we missed or have software recommendations of your own? Let us and other readers know by posting them in the comments section below!