Until recently, it was possible to run copies of Windows 8 without a valid license by using a Media Center key. The elaborate and, of course, illegal trick involved activating Windows 8 temporarily with the help of a bogus Key Management Server (KMS). By subsequently enabling the Media Center with a product key, which is currently available free of charge, Windows could be activated permanently without the appropriate license.
Microsoft has now closed this loophole. Neowin reports that attempting to do so now produces a code 0xC004C4AA error message. According to Microsoft, this error code points out that the user has tried to enable the Media Center on a copy of Windows that wasn't "purchased on the Windows website or at a retail store".
Tuesday, 18 December 2012
Saturday, 24 November 2012
Monday, 5 November 2012
Guy Fawkes Day (5th November 2012) ] Hack of 28,000 Paypal Accounts
5th November 2012 was the most exciting day in Cyberspace, yesterday we have report about few major hacks and leaks including Hacking of ImageShack Server , thousands of researchers database leak from Symantec portal, then NBC Sports Rotoworld forums and NBC Mobile site was defaced by pyknic hacker and a claim that user names and passwords for the site had been compromised, Anonymous leaks the VMware ESX Server Kernel source code online , numerous Australian sites, and the Organization for Security and Cooperation in Europe.
The Guy Fawkes Day ends with the hack of 28,000 Paypal Accounts. AnonymousPress tweeted, "Paypal hacked by Anonymous as part of our November 5th protest privatepaste.com/e8d3b2b2b1 #5Nov" (File Removed now)
Private Paste documents contained 27,935 entries from Paypal database table “mc_customers” including emails, names, passwords (encrypted) and corresponding telephone numbers.
However according to PayPal’s head of PR, they claim to be investigating the alleged hack, but so far they have stated that they are unable to validate any evidence that there has been a security breach which we can only take to be a good thing.
Friday, 2 November 2012
Anonymous Threatens to Shutdown Facebook - Dude, do you have any Idea ?
Do you believe that it is possible to shut down Facebook with a cyber attack on 5th November 2012, which is not even organised in a proper way ? Few activists on internet threatened to shut down Zynga and Facebook, after the gaming giant announced it was laying off five per cent of its work force.
Most obvious like other big fake claims, this claim is also not from the activist working as Anonymous Genuinely. Generally I am strong supporter of Anonymous or Wikileaks but the Idea behind Anonymous have lots of Pro and Con.
Facebook , Twitter and other social media sites and News organisations are giving you platform for spreading information, they are your voice with an amplifier. Do you think you can use your MIC after unplugging is ? If yes, then think again...
Message for individual behind Facebook attack: Dude, Do you have any idea that, how you will post a successful facebook hack status on your Anonymous facebook page (having millions of fans) after shutting down Facebook ? LOL , its same like "Cutting off the branch you're sitting on".
The concept of being anonymous makes people more daring, being nameless can bring people together, and because there is such a large following their protests can often make a big impact. Some of them are doing extraordinary job in this fight against corruption and Injustice , but on the other hand we have n00bs also who continuously using Anonymous banner for personal benefit and Discredit the Collective Name - 'Anonymous'.
Two weeks before we have seen a fake claim by @FawkesSecurity posted a threat to bomb a government building by Anonymous, then yesterday we have seen a Ransomware malware attacking computers for ransom money in the name of Anonymous. Its already clear to everyone that Anonymous does not condone violence in any way and they are involved in only peaceful protest and internet protest.
Hacking Random sites and Leaking documents and Details of innocent people of the World was never the part of this Internet Protest.
Wednesday, 17 October 2012
Monday, 15 October 2012
Former LulzSec hacker pleads guilty to Sony case
After last year's big PlayStation Network hack a lot of hacking groups such as Anonymous and LulzSec were intensely publicized. Back in June, a massive hack was conducted on the Sony Pictures Website. The attack led to the theft of details on over 1 million accounts and was linked to the hacker group Lulzsec.
At the time, the hacker group claimed to have used a “very simple SQL injection” attack. Samples of the compromised data were later posted online. Purported LulzSec member Raynaldo Rivera, 20, was charged in August with impairing a protected computer and conspiracy charges. In admitting his guilt, he joins Cody Kretsinger, who also pleaded guilty for the Sony Pictures hijack. Kretsinger is scheduled to be sentenced on 25th October.
"Rivera used the HideMyAss anonymising proxy service in an attempt to disguise his IP address while he carried out reconnaissance work, probing Sony Pictures' website for security vulnerabilities. HideMyAss turned over his IP address after the authorities issued a court order, ultimately exposing Rivera's identity." John Leyden explained in Theregister.
Investigations were made in both the U.S. and Europe. Although not all culprits were caught, two ex-members of hacker group LulzSec admitted they are guilty in this case. Cody Kretsinger got a plea bargain with prosecutors in April this year.
The information that the hacker stole resulted in over $605,000 in financial losses. Part of the plea agreement will see Riviera paying restitution to the victims of the crime and facing prison time. The hacker is facing a maximum of five years in prison, and the fine will be at least $250,000.
Tuesday, 9 October 2012
Anonymous Hackers attack Masonic Child Identification Program website
A group of computer hackers Anonymous goes by the name xPsych0path has accuse Masonichip for unwillingness to accept the forced chipping of children they are working toward mitigating it by disrupting the chipping operation. They have built their own operation, in opposition to this issue. In #OpMasonChip is designed to express publicly their anger. He had the following to say about this operation;
“We are fighting against putting RFID chips inside children by masons they have plan to put chips in all of us and those who don't want it won't be able to buy and sell. So I down all those site's for them” on .
"But In actual there is no "chip" in Masonichip as it stands for Masonic Child Identification Program and includes Abduction Awareness and "Safe Kids" Education benefits to all children and parents attend events and participate." Masonichip explained on their site.
Update : The Hacker News works tirelessly to bring credible and informative information to the public in regards to cyber security and issues surrounding it. We obviously did not understand the true nature of the “chip” and stand corrected on that issue. However, as strong supporters of the human right to privacy we collectively do not support any “gathering” of DNA or blood samples, etc for identification in future use. At least not on a mandatory basis. We apologize for any misinformation
A group of computer hackers Anonymous goes by the name xPsych0path has
accuse Masonichip for unwillingness to accept the forced chipping of
children they are working toward mitigating it by disrupting the
chipping operation. They have built their own operation, in opposition
to this issue. In #OpMasonChip is designed to express publicly their anger. He had the following to say about this operation;
“We are fighting against putting RFID chips inside children by
masons they have plan to put chips in all of us and those who don't want
it won't be able to buy and sell. So I down all those site's for them” on pastebin.
"But In actual there is no "chip" in Masonichip as it stands for
Masonic Child Identification Program and includes Abduction Awareness
and "Safe Kids" Education benefits to all children and parents attend
events and participate." Masonichip explained on their site.
1. http://masonichip.org/
2. http://mychip.org/
3. http://www.masonichip.ca/
4. http://www.mainemason.org/
5. http://www.illinoisfreemason.org/ilchip.html
6. http://www.keywestmason.com/child_id.htm
7. http://www.mdchip.org/
3. http://www.masonichip.ca/
4. http://www.mainemason.org/
5. http://www.illinoisfreemason.org/ilchip.html
6. http://www.keywestmason.com/child_id.htm
7. http://www.mdchip.org/
8. http://www.kschip.org/
Update : The
Hacker News works tirelessly to bring credible and informative
information to the public in regards to cyber security and issues
surrounding it. We obviously did not understand the true nature of the
“chip” and stand corrected on that issue. However, as strong supporters
of the human right to privacy we collectively do not support any
“gathering” of DNA or blood samples, etc for identification in future
use. At least not on a mandatory basis. We apologize for any
misinformation.
- See more at: http://thehackernews.com/2012/10/anonymous-hackers-attack-masonic-child.html#sthash.8QhV5hx2.dpufThursday, 4 October 2012
Faux Apps Found Hijacking Chrome, Spamming Tumblr
A flurry of fake, ad-laden Angry Birds lookalike games have flooded the
Google Chrome Web store of late. The online marketplace where Google
sells extensions and games for its Chrome browser has seen an influx of
games mimicking “Bad Piggies,” a new game Rovio Entertainment recently
released that puts a twist on its ubiquitous Angry Birds game.
At least seven of these games — “Angry Birds Bad Piggies,” “Angry Birds Space HD,” etc. — require the user to relinquish access to all data on all websites, according to research headed up by Barracuda Networks. In an entry on the security firm’s Internet Security Blog, research scientist Jason Ding notes that all of these games are being distributed by the same site: playook.info. After installation, the games insert their own advertisements into popular websites.
Barracuda found that after deploying the games in a test environment, they inserted advertising from playook.com into sites like Myspace, eBay, IMDB, Yahoo and MSN among dozens of other sites on the Chrome browser.
Collectively, as of Thursday afternoon, the apps have been downloaded by nearly 89,000 Chrome users.
Clearly, attackers are continuing to entice users into granting complete access to plug-ins, games and extensions without reading the applications' permissions first.
Security firm GFI Labs spotted a rogue Tumblr app disguised as a “profile stalker” this week that's been conning users in a similar fashion. According to a post on the company’s blog, users are installing the app under the assumption it will allow them to see who is viewing their blog the most. In actuality, installing the app grants the app “read and write access” to the user’s Tumblr account.
If installed, the app will go on to spam the user’s Tumblr until they either reset their “secret posting email address” or revoke the “profile stalker” app in Tumblr’s “Account Settings” panel.
Permissions — what applications can or can’t do, what information they have or don’t have access to — have long been a thorn in the side of mobile phone users. It appears that going forward users will have to remain as vigilant on their personal computers as on their smartphones until a better system for vetting applications on sites such asTumblr and Google Chrome, is introduced.
At least seven of these games — “Angry Birds Bad Piggies,” “Angry Birds Space HD,” etc. — require the user to relinquish access to all data on all websites, according to research headed up by Barracuda Networks. In an entry on the security firm’s Internet Security Blog, research scientist Jason Ding notes that all of these games are being distributed by the same site: playook.info. After installation, the games insert their own advertisements into popular websites.
Barracuda found that after deploying the games in a test environment, they inserted advertising from playook.com into sites like Myspace, eBay, IMDB, Yahoo and MSN among dozens of other sites on the Chrome browser.
Collectively, as of Thursday afternoon, the apps have been downloaded by nearly 89,000 Chrome users.
Clearly, attackers are continuing to entice users into granting complete access to plug-ins, games and extensions without reading the applications' permissions first.
Security firm GFI Labs spotted a rogue Tumblr app disguised as a “profile stalker” this week that's been conning users in a similar fashion. According to a post on the company’s blog, users are installing the app under the assumption it will allow them to see who is viewing their blog the most. In actuality, installing the app grants the app “read and write access” to the user’s Tumblr account.
If installed, the app will go on to spam the user’s Tumblr until they either reset their “secret posting email address” or revoke the “profile stalker” app in Tumblr’s “Account Settings” panel.
Permissions — what applications can or can’t do, what information they have or don’t have access to — have long been a thorn in the side of mobile phone users. It appears that going forward users will have to remain as vigilant on their personal computers as on their smartphones until a better system for vetting applications on sites such asTumblr and Google Chrome, is introduced.
Diskeeper Professional 2012 v16.0.1017
Diskeeper 12 Professional provides essential performance and efficiency
increases that all business desktops and laptops need to function
productively. Diskeeper prevents the majority of fragmentation
(scattered file fragments randomly placed across the hard drive) before
it can happen and instantly defrags the rest. Diskeeper 12 Professional
has a new, more intuitive user interface, runs unobtrusively in the
background, elevates PC performance, and requires no scheduling and
absolutely no user intervention. It lowers the total cost of ownership
and frees up more budget allocation for proactive initiatives. In fact,
Diskeeper is proven to cost less than running a network without it.
Diskeeper Professional now comes standard with HyperFast solid state
drive optimizer so it will increase PC performance for systems with
solid state drives in addition to hard drives.
Changes in Diskeeper 12:
• New User Interface.The Diskeeper Interface has been given a more modern look and feel, simplified navigation and drill-down architecture of information.
• Alerting Mechanism.This high level alerting mechanism will let you know at a glance if your system has any problems relating to performance, disk health and configuration settings.
• Reporting Mechanism.The reporting mechanism provides current and historical reports about your system.
• Disk Health.The Disk Health feature monitors hard disk drives for S.M.A.R.T. data to generate alerts and provides a disk health report.
• System Monitoring.System Monitoring monitors system environment activity and provides reporting on key elements.
Note: System Monitoring report data will only become available 2 to 3 hours after your system has been rebooted.
• HyperBoot.HyperBoot technology has been incorporated into Diskeeper to improve system boot time.
Note: HyperBoot will only work on non-server operating systems.
• Space Reclamation.Space Reclamation allows you to manually zero out unused space on a selected volume.
Note: Space Reclamation is only available on Server editions of Diskeeper.
• CogniSAN. This technology detects external resource usage within a shared storage system, such as a SAN, and allows for transparent optimization by never competing for resources utilized by other VMs over the same storage infrastructure. Any and all SANs are supported!
Note: CogniSAN only detects external resources on server editions of Diskeeper.
• HyperFast Improvements.HyperFast now includes TRIM that further improves Solid State Drive performance and longevity.
• New User Interface.The Diskeeper Interface has been given a more modern look and feel, simplified navigation and drill-down architecture of information.
• Alerting Mechanism.This high level alerting mechanism will let you know at a glance if your system has any problems relating to performance, disk health and configuration settings.
• Reporting Mechanism.The reporting mechanism provides current and historical reports about your system.
• Disk Health.The Disk Health feature monitors hard disk drives for S.M.A.R.T. data to generate alerts and provides a disk health report.
• System Monitoring.System Monitoring monitors system environment activity and provides reporting on key elements.
Note: System Monitoring report data will only become available 2 to 3 hours after your system has been rebooted.
• HyperBoot.HyperBoot technology has been incorporated into Diskeeper to improve system boot time.
Note: HyperBoot will only work on non-server operating systems.
• Space Reclamation.Space Reclamation allows you to manually zero out unused space on a selected volume.
Note: Space Reclamation is only available on Server editions of Diskeeper.
• CogniSAN. This technology detects external resource usage within a shared storage system, such as a SAN, and allows for transparent optimization by never competing for resources utilized by other VMs over the same storage infrastructure. Any and all SANs are supported!
Note: CogniSAN only detects external resources on server editions of Diskeeper.
• HyperFast Improvements.HyperFast now includes TRIM that further improves Solid State Drive performance and longevity.
Tuesday, 4 September 2012
OMG ! FileSonic Is Dead Now !
Another bad news is "The most file-hosting service service (we used to use previously) FileSonic has gone offline". The file-sharing site went dark on Wednesday and has been unreachable since.
As you might know FileSonic had imposed uploading restrictions on its users shortly after fellow Web locker service MegaUpload was raided by the FBI earlier this year.
Filesonic began limiting what its users could upload and download, and disabled any file-sharing functionality. A banner on the site said: "Our service can only be used to upload and retrieve files that you have uploaded personally."
FileSonic also reportedly deleted files and accounts (of it's user) in January that were associated with piracy or copyright infringement. FileSonic'a Facebook page has also disappeared.
The company had been the target of legal action by a porn company, according to the BBC. Oron, a similar file-sharing site, disappeared from the Web in August following a lawsuit by the same porn company, Flava Works, which accused both sites of assisting their members to infringe copyrighted materials.
Representatives for FileSonic were contacted but did not reply at the time of writing. The bottom line is I think filesonic will also going to be dead like megaupload.
As you might know FileSonic had imposed uploading restrictions on its users shortly after fellow Web locker service MegaUpload was raided by the FBI earlier this year.
Filesonic began limiting what its users could upload and download, and disabled any file-sharing functionality. A banner on the site said: "Our service can only be used to upload and retrieve files that you have uploaded personally."
FileSonic also reportedly deleted files and accounts (of it's user) in January that were associated with piracy or copyright infringement. FileSonic'a Facebook page has also disappeared.
The company had been the target of legal action by a porn company, according to the BBC. Oron, a similar file-sharing site, disappeared from the Web in August following a lawsuit by the same porn company, Flava Works, which accused both sites of assisting their members to infringe copyrighted materials.
Representatives for FileSonic were contacted but did not reply at the time of writing. The bottom line is I think filesonic will also going to be dead like megaupload.
Sunday, 2 September 2012
Pirate Bay founder wanted in Sweden over unserved jail sentence is arrested in Cambodia
The man behind controversial download site Pirate Bay who is wanted by authorities in Sweden has been arrested in Cambodia.
Gottfrid Svartholm was arrested on Thursday in the south-east Asian city of Phnon Penh where he made his home several years ago.
Svartholm, whose website has enabled millions of people around the globe to download download files, music and films without paying, was picked up by police at his apartment above the Cadillac Bar on the riverfront, according to the Torrent Freak website.
In October 2011, Swedish courts ordered that the 27-year-old computer specialist be jailed for 12 months after he failed to attend a court appearance.
However he failed to serve his sentence and became a wanted man.
The reason for his arrest has still not been confirmed and neither Cambodian nor Swedish authorities are commenting the matter.
While there has been no official announcement, according Gottfrid’s lawyer Ola Salomonsson the arrest could be related to The Pirate Bay case.
Gottfrid Svartholm was arrested on Thursday in the south-east Asian city of Phnon Penh where he made his home several years ago.
Svartholm, whose website has enabled millions of people around the globe to download download files, music and films without paying, was picked up by police at his apartment above the Cadillac Bar on the riverfront, according to the Torrent Freak website.
In October 2011, Swedish courts ordered that the 27-year-old computer specialist be jailed for 12 months after he failed to attend a court appearance.
However he failed to serve his sentence and became a wanted man.
The reason for his arrest has still not been confirmed and neither Cambodian nor Swedish authorities are commenting the matter.
While there has been no official announcement, according Gottfrid’s lawyer Ola Salomonsson the arrest could be related to The Pirate Bay case.
Gottfrid Svartholm was arrested on Thursday in the south-east Asian city of Phnon Penh
He was quoted as saying: 'As far as I understand it is because he is on an international wanted list.'
The lawyer said he believed Gottfrid could be returned to his home country eventually, even though there is no extradition treaty between Cambodia and Sweden.
The Pirate Bay, launched in 2003 by a group of friends from Sweden, allows users to search for and access copyrighted content including movies, games and TV shows.
In 2009, the Swedish courts found the site's four founders guilty of helping people circumvent copyright controls.
The ruling was upheld after an appeal in 2010 but the site continues to function.
A message on The Pirate Bay's blog said the move was an attempt by the music business to 'squeeze' it out of the market.
It advised users to 'circumvent the block' and campaign against the move.
The lawyer said he believed Gottfrid could be returned to his home country eventually, even though there is no extradition treaty between Cambodia and Sweden.
The Pirate Bay, launched in 2003 by a group of friends from Sweden, allows users to search for and access copyrighted content including movies, games and TV shows.
In 2009, the Swedish courts found the site's four founders guilty of helping people circumvent copyright controls.
The ruling was upheld after an appeal in 2010 but the site continues to function.
A message on The Pirate Bay's blog said the move was an attempt by the music business to 'squeeze' it out of the market.
It advised users to 'circumvent the block' and campaign against the move.
The logo for Pirate Bay, the world's biggest file-sharing site
The message said: 'Write to your ISP and tell them to appeal the case. Write to your local MPs and tell them that this is not allowed. Make sure your voice is heard.
'Remember, we’re all the pirate bay, and we must stand united against the censorship from our opponents.'
The Pirate Party UK, a spin-off from the political movement started in Sweden that backs copyright reform, said the latest move will 'not put any extra pennies into the pockets of artists'.
Gottfrid failed to attend the 2010 appeal hearing due to an illness which confined him to a hospital bed in Cambodia.
Despite having supported his original failure to attend court with a medical certificate, Gottfrid also failed to appear at a follow up hearing.
This prompted the Court of Appeal to finalize the initial verdict of a one year jail sentence and a fine of $1.1 million.
Gottfrid had been due to return to Sweden to start serving his sentence on January 2 this year, but again he failed to appear.
The message said: 'Write to your ISP and tell them to appeal the case. Write to your local MPs and tell them that this is not allowed. Make sure your voice is heard.
'Remember, we’re all the pirate bay, and we must stand united against the censorship from our opponents.'
The Pirate Party UK, a spin-off from the political movement started in Sweden that backs copyright reform, said the latest move will 'not put any extra pennies into the pockets of artists'.
Gottfrid failed to attend the 2010 appeal hearing due to an illness which confined him to a hospital bed in Cambodia.
Despite having supported his original failure to attend court with a medical certificate, Gottfrid also failed to appear at a follow up hearing.
This prompted the Court of Appeal to finalize the initial verdict of a one year jail sentence and a fine of $1.1 million.
Gottfrid had been due to return to Sweden to start serving his sentence on January 2 this year, but again he failed to appear.
Thursday, 23 August 2012
UltraISO Premium Edition 9.5.3 Build 2900
•Description:
UltraISO is a ISO CD/DVD image file creating/editing/converting tool, it can directly edit the CD/DVD image file and extract files and folders from it, as well as directly make ISO files from your CD/DVD-ROM or hard disk. At the same time, you can maintain the ISO bootable information, thus creating your own bootable CD/DVDs. You now have the power to make and edit your own ISO files, and then burn them to CD/DVD for your own needs.
UltraISO Premium 9.53 Changelog:
-Can edit ISO images of Windows 7/8 x64 with EFI boot record
-Can directly create bootable USB disk of Mac OS X Mountain Lion from dmg image
-New bootpart device driver, supports accessing boot partition(deep hidden) within Windows (PE) environment
-Supports high-end hidden boot partition (bootmgr)
-Supports duplicating bootable USB flash drives (RAW mode)
-Sector alignment on formatting USB Flash Drive as FAT volume
-Can detect and use DVBFab virtual drive
-Fixed a bug with handling ISO images of Fedora 17 and CentOS 6.2
-Fixed a bug with image splitting on VMWare Fusion(Mac) or Wine(Linux)
-Some minor improvements and bug fixes.
UltraISO is a ISO CD/DVD image file creating/editing/converting tool, it can directly edit the CD/DVD image file and extract files and folders from it, as well as directly make ISO files from your CD/DVD-ROM or hard disk. At the same time, you can maintain the ISO bootable information, thus creating your own bootable CD/DVDs. You now have the power to make and edit your own ISO files, and then burn them to CD/DVD for your own needs.
UltraISO Premium 9.53 Changelog:
-Can edit ISO images of Windows 7/8 x64 with EFI boot record
-Can directly create bootable USB disk of Mac OS X Mountain Lion from dmg image
-New bootpart device driver, supports accessing boot partition(deep hidden) within Windows (PE) environment
-Supports high-end hidden boot partition (bootmgr)
-Supports duplicating bootable USB flash drives (RAW mode)
-Sector alignment on formatting USB Flash Drive as FAT volume
-Can detect and use DVBFab virtual drive
-Fixed a bug with handling ISO images of Fedora 17 and CentOS 6.2
-Fixed a bug with image splitting on VMWare Fusion(Mac) or Wine(Linux)
-Some minor improvements and bug fixes.
Friday, 17 August 2012
Beware of “Your AOL Mail Update” Phishing Scam !
The old “update your account” scheme is probably still successful, which is most likely why cybercriminals keep coming up with new variants for it. The latest such spam wave targets AOL users.
DEAR AOL USER
You have to follow the link below to update and verify your E-mail account
to enable continuous access of your E-mail http://webmail.aol.com/verify
Regards,
AOL ONLINE TEAM.
As you might guess, the link doesn’t point to the legitimate AOL login page, but to a replica hosted on a site registered for free in the Czech Republic.
Many of the buttons and the links of the phony website lead to aol.com, but the Sign In button doesn’t compare the credentials against the ones stored in AOL’s servers. Instead, it sends them back to the cybercriminals that run the scheme.
The legitimate links aren’t the only ones that make the plot genuine-looking. The malicious webpage also contains an iframe that displays part of the mail.aol.com page.
There’s a very good reason for which the phishers have deployed this technique. The AOL login page changes, depending on important events that take place.
By embedding part of this page into their scheme, the crooks have a higher chance of making someone believe that they’re on the right domain.
In such cases, there’s a simple way to check if you actually are on the correct website: check the URL displayed in your browser’s address bar.
The legitimate URL starts with “https” (which means that it’s a secure connection) and it ends in “aol.com.”
On 99% of phishing sites, the secure connection is missing and aol.com is not the actual domain, but a subdomain, or possibly the name of a file or a folder.
Thursday, 16 August 2012
Windows 8 Enterprise (Final) 90-Day Trial
System Requirements:
Windows 8 works on the same hardware that powers Windows 7
Processor: 1 gigahertz (GHz) or faster
RAM: 1 gigabyte (GB) (32-bit) or 2 GB (64-bit)
Hard disk space: 20 GB
Graphics card: Microsoft DirectX 9 graphics device with WDDM driver
Additional requirements to use certain features:
To use touch, you need a tablet or a monitor that supports multitouch.
To access the Windows Store and to download and run apps, you need an active Internet connection and a screen resolution of at least 1024 x 768.
To snap apps, you need a screen resolution of at least 1366 x 768.
Internet access (ISP fees might apply)
RAM: 1 gigabyte (GB) (32-bit) or 2 GB (64-bit)
Hard disk space: 20 GB
Graphics card: Microsoft DirectX 9 graphics device with WDDM driver
Additional requirements to use certain features:
To use touch, you need a tablet or a monitor that supports multitouch.
To access the Windows Store and to download and run apps, you need an active Internet connection and a screen resolution of at least 1024 x 768.
To snap apps, you need a screen resolution of at least 1366 x 768.
Internet access (ISP fees might apply)
Wednesday, 15 August 2012
Microsoft .NET Framework 4.5.50709
The .NET Framework is Microsoft’s comprehensive and consistent programming model for building applications that have visually stunning user experiences, seamless and secure communication, and the ability to model a range of business processes. The .NET Framework redistributable package installs the .NET Framework runtime and associated files required to run applications developed to target the .NET Framework. The Microsoft .NET Framework 4.5 is a highly compatible, in-place update to the .NET Framework 4. By using the .NET Framework 4.5 together with the C# or Visual Basic programming languages, you can write Windows Metro style apps. The .NET Framework 4.5 includes significant language and framework enhancements for C# and Visual Basic so that you can harness asynchrony, the blending of control flow in synchronous code, a responsive UI, and web app scalability.
The .NET Framework 4.5 adds substantial improvements to other functional areas such as ASP.NET, Managed Extensibility Framework (MEF), Windows Communication Foundation (WCF), Windows Workflow Foundation (WF), and Windows Identity Foundation (WIF). The .NET Framework 4.5 RC delivers better performance, reliability, and security.
Supported Operating Systems:
-Windows Vista SP2 (x86 and x64)
-Windows 7 SP1 (x86 and x64)
-Windows 8 (x86 and x64)
-Windows Server 2008 R2 SP1 (x64)
-Windows Server 2008 SP2 (x64)
-Windows Server 2012 (x86 and x64)
-Windows Vista SP2 (x86 and x64)
-Windows 7 SP1 (x86 and x64)
-Windows 8 (x86 and x64)
-Windows Server 2008 R2 SP1 (x64)
-Windows Server 2008 SP2 (x64)
-Windows Server 2012 (x86 and x64)
Tuesday, 14 August 2012
How to Improve Your Wireless Network Performance
Using wireless routers has become the norm. With all of today’s devices connected people often complain about a poor signal or bad performance. There are many things you can do to improve the performance of your router. We will start with the free, easy tips that anyone can do and work our way into more advanced solutions that cost money.
Wired Versus Wireless
I rarely see anybody mention this because it isn’t really a wireless tip but you would be amazed at the people who never even consider this and think that wireless is as fast and reliable as wired. If that were the case I would not be spending hours writing this article. Two of my computers and my main television are plugged into the router by Ethernet cables for good reason. I don’t have to worry about wireless quality while working and I get the best pings while gaming.
I rarely see anybody mention this because it isn’t really a wireless tip but you would be amazed at the people who never even consider this and think that wireless is as fast and reliable as wired. If that were the case I would not be spending hours writing this article. Two of my computers and my main television are plugged into the router by Ethernet cables for good reason. I don’t have to worry about wireless quality while working and I get the best pings while gaming.
Like many of you we have plenty of wireless devices so why clog your wireless network any more than you have to? Someone asked on our forums once about poor gaming speed and admitted to having 11 devices connecting to the wireless. Today’s broadband is faster than ever but I think people expect miracles from their Wi-Fi networks. Another hotly debated topic is how many devices are too many? I have even heard some ISP’s only work best up to a certain number of devices. True or false really does not matter; the more connected devices, the less bandwidth you have. Period. I recently had a friend try to solve a wireless issue at a customer’s home. The router was on the complete opposite end of this condominium from where the problem was and they were having trouble streaming NetFlix to a television at least 50 feet away. He explained all their options including using an Ethernet cable for the best performance but was told by the customer that the wireless signal was fine. Be open to suggestions.
The bottom line is that your wireless will work great from a couple feet away and the farther you go, the worse the performance will be. Make sure you are getting the performance you are paying for by using a computer connected by an Ethernet cable and doing a speed test at SpeedTest.Net. Everyone offers some sort of super-fast broadband but most give you what you pay for. Opinions vary but in my experience anything beyond 30 feet or so is too far for maximum performance.
Location, location, location
This should be obvious but there are some factors to consider. You want your router centrally located in your home. If you have a device that uses the router more than most then you can consider placing your router closest to that device. Do not rule out strange locations like an upper shelf on the first floor. You could even place your router in a closet if that’s the best location.
This should be obvious but there are some factors to consider. You want your router centrally located in your home. If you have a device that uses the router more than most then you can consider placing your router closest to that device. Do not rule out strange locations like an upper shelf on the first floor. You could even place your router in a closet if that’s the best location.
Metal objects can kill your signal. If you ever took a device to the other side of a metal door you would see how much the signal quality fades. If your home has metal beams, consider this when placing the router. Walk or visualize the path that the signal has to take to get to your most important devices.
Update your firmware and network adapter drivers
Driver updates are usually the first place to go. New drivers often contain fixes for known issues (like you might be having), performance increases and more. On average most manufacturers update every few months. If your computer is 3 years old and you have not updated your drivers then you could have missed up to 16 driver updates already. Brand name computer manufacturers typically only offer the latest drivers for a year so you want to make sure you download them directly from the manufacturer of your wireless card.
Driver updates are usually the first place to go. New drivers often contain fixes for known issues (like you might be having), performance increases and more. On average most manufacturers update every few months. If your computer is 3 years old and you have not updated your drivers then you could have missed up to 16 driver updates already. Brand name computer manufacturers typically only offer the latest drivers for a year so you want to make sure you download them directly from the manufacturer of your wireless card.
I am not a big fan of updating your firmware. Updating the firmware uses a software download to change your hardware. You really need to know what you are doing, especially how to reset your router should the update fail. In the section below we discuss how to log into your router. This is where you will find the options to check for firmware. If it sounds like I am trying to scare you away from doing a firmware update, I am, save it for when all else fails.
Change your wireless channel
This is a great tip especially if you are picking up a lot of other wireless signals. Most modern routers can automatically select the best channel but you can tweak this to force it on a channel that works best for you. In today’s home you can be on the same channel as your cordless phone, microwave, garage door opener and many, many more. A lot of routers go out with the default channel 6 so changing your channel can be great just to get on a different channel than your neighbors.
This is a great tip especially if you are picking up a lot of other wireless signals. Most modern routers can automatically select the best channel but you can tweak this to force it on a channel that works best for you. In today’s home you can be on the same channel as your cordless phone, microwave, garage door opener and many, many more. A lot of routers go out with the default channel 6 so changing your channel can be great just to get on a different channel than your neighbors.
If you read up on the best channel to choose it is a hot debate because everyone’s situation is different. Why sit at your computer for hours and guess the best channel when you can use inSSIDer to see what channel is best? Download inSSIDer, install and scan. Set your channel as far away as possible from busy channels.
You will need to log in to your router to do this. Please check for your documentation or download it from your router manufacturer. Most routers ship with a basic or no password so consider setting up a new password once you login. Cisco has a nice tutorial that should work for many LinkSys routers and this is very similar to how any router login will work. Step 1 of that tutorial also includes a link on how to login to your router. Again, all routers are a little different but you will find that your router will be very similar to these instructions.
In addition, modern wireless N routers to come with a 5 GHz frequency and a 2.4 GHz frequency. It is advantageous to name each channel distinctly different names. (On a Cisco router log in, click Wireless> Wireless settings> Manual) for 2 reasons:
1: It is possible that you have a cordless phone system in your house running at 2.4 GHz, this can cause interference and hence you should switch to the 5 GHz frequency.
2: Although 5 GHz can send more data; it does not perform well though solid objects hence, the range of the 2.4 GHz is by far greater and some can be a better choice. Having different names will help you easily choose when you need / want to switch.
2: Although 5 GHz can send more data; it does not perform well though solid objects hence, the range of the 2.4 GHz is by far greater and some can be a better choice. Having different names will help you easily choose when you need / want to switch.
Optimize your internet connection
The latest Windows operating systems finally handle the internet well but not perfect. We have used SpeedGuide.net TCP Optimizer for as long as we can remember. Different factors may have changed your settings and you can use this program to set Windows back to default or optimal settings with a single click. Just be sure you select your wireless adapter from the drop down box. If you have an Ethernet connection (most of us do) it will typically select that adapter by default.
The latest Windows operating systems finally handle the internet well but not perfect. We have used SpeedGuide.net TCP Optimizer for as long as we can remember. Different factors may have changed your settings and you can use this program to set Windows back to default or optimal settings with a single click. Just be sure you select your wireless adapter from the drop down box. If you have an Ethernet connection (most of us do) it will typically select that adapter by default.
Try a high-gain antenna ($)
Many popular routers have high gain antennas available. They can extend the signal strength as well as allow you to point the antenna in the direction you want. This is a cheap, simple fix worth trying if you do not want to go with a repeater. Search Google for your router brand, model and follow that up with “high gain antenna”. You can also replace your card with a wireless card that includes a high gain antenna.
Many popular routers have high gain antennas available. They can extend the signal strength as well as allow you to point the antenna in the direction you want. This is a cheap, simple fix worth trying if you do not want to go with a repeater. Search Google for your router brand, model and follow that up with “high gain antenna”. You can also replace your card with a wireless card that includes a high gain antenna.
Replace your wireless card ($)
As mentioned you can purchase a new card with a high gain antenna or just purchase a card that supports the latest technology. All the cards I have seen are backward compatible so even if you can’t use the latest mode you will be ready for the future. See below for a bit more on this.
As mentioned you can purchase a new card with a high gain antenna or just purchase a card that supports the latest technology. All the cards I have seen are backward compatible so even if you can’t use the latest mode you will be ready for the future. See below for a bit more on this.
Use a router and network card from the same manufacturer ($$$)
In a perfect world you can use any router and wireless card but it’s not a perfect world. You might have purchased a router from LinkSys featuring proprietary technology with cool names like “dual band”, “SpeedBoost” and so on. If your wireless card is from a different manufacturer then it will not support these features rendering them useless. Getting better speed might be as simple as using a router and wireless card from the same manufacturer.
In a perfect world you can use any router and wireless card but it’s not a perfect world. You might have purchased a router from LinkSys featuring proprietary technology with cool names like “dual band”, “SpeedBoost” and so on. If your wireless card is from a different manufacturer then it will not support these features rendering them useless. Getting better speed might be as simple as using a router and wireless card from the same manufacturer.
Add a wireless repeater ($$)
I saved this for last because I don’t see the point in adding another device unless you have to. If you have a long range to cover then this IS the solution for you. As I mentioned early in this article, most routers brag about going 100 feet when in reality that signal fades and fades fast by the time you get to about 30 feet. Hey, they tell me my car can do 175 MPH but you try it. Simply place the repeater between the router and the devices with a poor signal and you are good to go.
I saved this for last because I don’t see the point in adding another device unless you have to. If you have a long range to cover then this IS the solution for you. As I mentioned early in this article, most routers brag about going 100 feet when in reality that signal fades and fades fast by the time you get to about 30 feet. Hey, they tell me my car can do 175 MPH but you try it. Simply place the repeater between the router and the devices with a poor signal and you are good to go.
If you happen to have 2 wireless routers handy, you can cable the two together to extend the range as described in our forums, but if not a wireless repeater can be much simpler to set up.
Subscribe to:
Posts (Atom)
Disqus
Please Comment Here