Free Vector Clocks for Windows 7

Are you bored with the default Clock Gadget in Windows 7?

If so, take a look at these free Vector Clock Gadgets!

Vector Clocks is a collection of clocks, all of them are unique and will jazz up your desktop.

There are heaps of changes you can make to these clocks, including the ability to change the transparency, you can rotate them, change the shadow colors, set alarms and lots of other modifications can be made.

Simply right click on the clocks and edit the settings.

You can download the clocks separately or all together as a single installer package.

PLEASE NOTE that the Installer Package may come with a PRE-CHECKED option to install bundled software. You should UN-CHECK that option.

I installed and tried out the Blue Rumba Clock on my Windows 7 desktop and it looked pretty cool!

Download page: Vector Clocks.

Learn Windows 8 in 8 minutes

Learn Windows 8A beginners guide to Microsoft’s soon to be released Operating System Windows 8.

In this video you will learn about the new interface and special features of Windows 8.

Windows 8 is designed specifically for use with Touch Screen and portable devices, so it will be interesting to see how this impacts on those using a conventional PC and monitor.

Apple removes “more secure than Windows” claims

by Kevin McLaughlin

Apple recently changed the wording in the “Why You’ll Love A Mac” section of its website, removing longstanding claims about Macs being more secure than Windows PCs.

For years, Apple’s marketing has centered on the notion that Mac users are immune to the malware that routinely causes headaches for PC users.

Here is how Apple used to phrase this: “A Mac isn’t susceptible to the thousands of viruses plaguing Windows-based computers. That’s thanks to built-in defenses in Mac OS X that keep you safe, without any work on your part.”

But sometime in the past few days, Apple changed this message to read: “Built-in defenses in OS X keep you safe from unknowingly downloading malicious software on your Mac.”

Apple also changed its description of OS X from “It doesn’t get PC viruses” to “It’s built to be safe”.

The original Apple web page, dated June 9 used to be able to be seen via Google cache, but not anymore.

The removal of Windows comparisons could signal a change in Apple’s security marketing strategy. Apple’s devilishly effective “Get a Mac” marketing campaign focused on the superior security of Macs over Windows PCs, and while researchers have warned that Macs are not inherently more secure, many Mac users still operate under that assumption.

Apple did not respond to a request for comment on the website changes. But security experts suspect that the increasing attention the company is getting from malware authors did play a role in its decision to remove references to Windows.

“Apple does not want to lose its image as a secure platform,” Andrew Plato, president of Anitian Enterprise Security, said in an interview. “A lot of people still see their Mac as fundamentally more secure than Windows. Flashback proved that Macs are just as vulnerable.”

Macs get more attention from attackers

As more iOS devices make their way into businesses through the bring-your-own-device phenomenon, Mac adoption in businesses is also rising, creating a more inviting target for attackers, according to Andrew Brust, CEO of Microsoft analyst firm Blue Badge Insights.

“Macs can’t keep that low profile anymore, and the bullies are starting to target it, with increasing frequency,” Brust said.

Apple has kept security under the same cloak of secrecy as the rest of its operations, but there are signs that may be changing. Next month, Apple is slated to take part in the Black Hat security conference for the first time. Dallas De Atley, manager of the platform security team, will give a talk there on key security technologies in iOS.

On Monday at the opening of its Worldwide Developer Conference, Apple offered insight into the security improvements in OS X Mountain Lion, which is slated for release in July. The big new feature is Gatekeeper, a security mechanism that allows OS X developers to digitally sign their apps, thereby preventing users from accidentally installing malicious software.

Article Source: This article originally appeared at crn.com

How to fix XP if the 2nd “R” Repair Option is unavailable

XP RepairMicrosoft Windows(R) Recovery Console

The Recovery Console provides system repair and recovery functionality.

Type EXIT to quit the Recovery Console and restart the computer.

1: C:WINDOWS

Which Windows Installation would you like to log onto (To cancel, press ENTER)?

Go ahead and hit the number 1 on your keyboard, or whichever number corresponds to the operating system you were using when havoc struck. Enter your administrator password, and then hit enter. You’re in! Now it’s time to run with the big dogs! Do not be afraid, dear reader; I am here to help you.

If you type the following commands into your computer, it will work magic, akin to going back in time. There are three parts to this process, but believe me, they take much less time than reinstalling Windows XP and all your applications. So follow along with me, and keep in mind that each command must be typed exactly as you see it here. Please note that this procedure assumes that Windows XP is installed to the C:Windows folder. Make sure to change C:Windows to the appropriate windows folder if it’s at a different location. The copy commands will answer you with a little “file copied” message. The delete commands just move on to the next line. Because of the way your Web browser displays individual lines, a command might look to you like its two lines, so I’ve separated each command by an empty line. But anyway, type the whole command in one line, and when you’ve finished typing that command, hit the Enter key. Be sure to include the spaces I’ve included between each word here:

Section Addendum Note: In the following commands, we are simply copying some existing files to a temporary location. This way, if anything should go wrong down the line, you will at least still have access to the original files. These original files are not used again in this tutorial, but you should be aware that you made a backup copy of them in the following directory:

c:windowstmp

md c:windowstmp

cd c:windowssystem32config

copy system c:windowstmpsystem.bak

copy software c:windowstmpsoftware.bak

copy sam c:windowstmpsam.bak

copy security c:windowstmpsecurity.bak

copy default c:windowstmpdefault.bak

del system

del software

del sam

del security

del default

Important Addendum Note: When attempting the copy operations above, you may encounter an error message saying basically “unable to copy”. The way around this is to simply replace the copy (and delete) commands above with the following:

cd windowssystem32config

ren system system.kpp

ren software software.kpp

ren sam sam.kpp

ren security security.kpp

ren default default.kpp

I use the extension .kpp because windows XP sometimes likes to use the .bak extension itself and unlike the copy commands above, we are not putting our backup copies in the windows tmp directory, but rather we are leaving them in their original directory (but with the .kpp extension, so that windows will ignore them.). As I said before, these are just backup files, but it is good to know where they are if the repair fails and you ever need them. Note: The delete is no longer necessary because rename is basically like a “copy and delete” operation in one.

Section Addendum Note: In the following commands, we are simply copying some repair (basically default window install) files so that we can get windows XP to boot. (It will look awful and none of previous setup and programs will show up, but that is fine.) We simply need to make windows run able so that we can do the next parts (that will restore our full configuration as it was prior to the crash).

cd c:windowsrepair

copy system c:windowssystem32configsystem

copy software c:windowssystem32configsoftware

copy sam c:windowssystem32configsam

copy security c:windowssystem32configsecurity

copy default c:windowssystem32configdefault

Now you can relax for a minute. You’ve made it through the first part! Way to go! Now what did you just do? I’ll tell you. You first made a temporary directory called “tmp” (md tmp), and then into it, you copied all the files that boot up Windows. Then you deleted all those startup files, one of which is the stinker that got you into this mess in the first place. After that, you copied into that same place fresh startup files from a special repair directory. When you reboot, Windows will look for those files where it always does, and there won’t be a stinker in the bunch. The only thing is, there won’t be all your settings for all those applications you run every day, either. But not to worry, right now you’re sitting in something like a lifeboat — it’s not the original ship, but it’ll get you back to where you need to go. We’ll get everything back to that comfortable place, but only after we go through steps 2 and 3.

Now type Exit and watch your computer restart into Windows XP again. Be sure not to tell it to boot from the CD this time. But wait. That’s not the way you had XP set up before this disaster struck! That’s OK. We’re in a lifeboat right now — this isn’t your comfy cruise ship, not just yet. Hang in there. I’m going to show you how to restore your system to the way it was the moment before you told it to install that errant application, or whatever it was you did, so follow along and we’ll go to part 2.

 

Part 2

Here’s where you’ll copy the saved registry files from their backed up location by using System Restore. This folder is not available in Recovery Console and is normally not visible — Microsoft is protecting you from yourself by hiding it from you and locking it away from you. But we have the keys. Before you start this procedure, you’ll need to change several settings to make that folder visible:

1. Start Windows Explorer.

2. On the Tools menu, click Folder options.

3. Click the View tab.

4. Under Hidden files and folders, click to select Show hidden files and folders, and then click to clear the “Hide protected operating system files (Recommended)” check box.

5. Click Yes when the dialog box is displayed that confirms that you want to display these files.

6. Double-click the drive where you installed Windows XP to get a list of the folders. It’s important to click the correct drive.

7. Open the System Volume Information folder. This folder appears dimmed because it is set as a super-hidden folder. If you’re using the FAT32 file system, this will be easy. If you’re using NTFS, it won’t let you open the folder, but here’s how to get around that: Right-click on that system volume information folder and select Sharing and Security. Then click the Security tab. (No security tab? Skip two paragraphs.) Click Add, and then in the box that’s labelled “Enter the object names to select,” type the name of the user that’s at the top of the Start menu — that’s probably you. [Damn it, why do they say object names when it’s people’s names? I guess that’s Microsoft for you.]

Anyway, make sure you type the name the way it’s listed there on the Start Menu. I made the mistake of typing my first name only and it wouldn’t let me in. Type first and last name if that’s how it’s written on the top of the Start menu. After you’ve typed that in, click OK a couple of times and finally that monster will let you in.

But what if you don’t see a Security tab? Try this: Click to select the checkboxes (Addendum Note: check BOTH checkboxes) in the “Network sharing and security” area — one is labeled “Share this folder on the network” and the other is labelled “Allow network users to change my files.” Change the share name to something short, like sysinfo. Then it’ll let you in. After you’re done with this entire rescue operation, you might want to go back and change these back to the way they were before, for maximum security. (Addendum Note: If you get an error when you change the name to sysinfo, and hit apply/ok, just try it again…that happened to me, but it worked on the second try with no problems.)

OK. Now here you are, in the inner sanctum where only the high priests go. Be not afraid, all ye who enter here. As Microsoft so eloquently puts it:

NOTE: This folder contains one or more _restore {GUID} folders such as “_restore{87BD3667-3246-476B-923F-F86E30B3E7F8}”.

8. Open a folder that was not created at the current time. You may have to click Details on the View menu to see when these folders were created. There may be one or more folders starting with “RP x under this folder. These are restore points.

Addendum Note: The System Volume is NOT a subdirectory the windows directory. So if you cannot find it, go up one directory level and look again.

9. Open one of these folders to locate a Snapshot subfolder; the following path is an example of a folder path to the Snapshot folder:

C:System Volume Information_restore{D86480E3-73EF-47BC-A0EB-A81BE6EE3ED8}RP1Snapshot

From the Snapshot folder, copy the following files to the C:WindowsTmp folder (you can use your mouse, you’re in Windows now, remember?):

_registry_user_.default (Addendum Note: Notice the period (“.”) before the word default)

_registry_machine_security

_registry_machine_software

_registry_machine_system

_registry_machine_sam

This is how Microsoft explains this: “These files are the backed up registry files from System Restore. Because you used the registry file created by Setup, this registry does not know that these restore points exist and are available. A new folder is created with a new GUID under System Volume Information and a restore point is created that includes a copy of the registry files that were copied during part one. This is why it is important not to use the most current folder, especially if the time stamp on the folder is the same as the current time.”

Anyway, you’re still not done. Don’t worry, the magic is about to begin. Believe me, if you do this in front of your friends, they’ll start thinking you’re some kind of god. So, heavenly father, get ready to dazzle ’em.

Now it’s time to place those files you just made visible to the Recovery Console where they belong. And to do that, we need to get back into the Recovery Console. So, make sure your CD is in the drive, and restart Windows, this time hitting any key when it tells you to do that if you want to boot from CD. Yes, you want to boot from CD, so you can launch your old cryptic pal, the Recovery Console. Type R after it goes through that file-reading routine that looks like an install but isn’t. Then you’re back into our dark-suited friend with its ominous command line. It’s kinda like going into the basement to fix some broken pipe or something. But we’re not scared. The command line is our flashlight and friend. Here we go:

 

Part 3

In part three, you delete the existing registry files, and then copy the System Restore Registry files to the C:WindowsSystem32Config folder:

From within Recovery Console, type the following commands:

Section Addendum Note: Here we are simply replacing those “default” repair files with valid and current restore point files. So we delete the old files (default) files and copy in the new files. If get errors when trying to delete, you can simply skip the delete commands and just do the copy (and when prompted to overwrite, type Y (for yes) and hit enter

cd c:windowssystem32config

del sam del security

del software

del default

del system

 

cd c:windowstmp

copy _registry_machine_software c:windowssystem32configsoftware

copy _registry_machine_system c:windowssystem32configsystem

copy _registry_machine_sam c:windowssystem32configsam

copy _registry_machine_security c:windowssystem32configsecurity

copy _registry_user_.default c:windowssystem32configdefault

(Notice the period (“.”) before the word default in the first parameter)

Now you’re done! Type exit and your computer will reboot into whichever restore file you chose. But wait. If it’s not the right one, that’s OK, you can now go into your System Restore area and pick a different restore point if you want. There’s a whole calendar full of them in there. I bet you didn’t know that Windows XP is watching just about every move you make, taking notes all the while. It can restore about any state you had on that machine. And the best part is, even when it’s doing all that, it’s still 10% faster than Windows 2000 according to our extensive tests here at the Midwest Test Facility. Here’s how to get into that restore area if you’re not happy with the current restore point:

1. Click Start, then click All Programs.

2. Click Accessories, and then click System Tools.

3. Click System Restore, and then click Restore to a previous Restore Point.

Great Security Myth: I Don’t Need Anti-Virus Protection because I Bought an Apple Mac!

virus-detectedMelbourne, 28 May 2010 – AVG (AU/NZ) Pty Ltd warns that Apple Macs running the OS X operating system, or some flavour of Linux distribution, are not immune to viruses, malware and other forms of Internet-carried spambots, Trojans, hacking and phishing.

That’s right, Apple Macs running the OS X operating system, or some flavour of Linux distribution, are open to attack from cyber criminals.

Now of course hackers and spammers are not stupid and they know that Windows users represent the ‘low hanging fruit’ in terms of potential targets. The sheer weight of numbers that the Windows’ user base carries with it makes it the primary target for malware attacks – and it’s going to stay that way for the foreseeable future.

“But,” Lloyd Borrett, Marketing Manager, AVG (AU/NZ), says: “The web changes everything. More specifically, web services, social media and online applications change everything.

“Suddenly you are operating one step further away from your Mac’s desktop and you are at the mercy of live real-time contact from third parties and the World Wide Web in general. This levels the playing field in some senses, so that suddenly your Mac is not a Mac for a moment – instead it’s just a computer.”

With the growing popularity of web services from Twitter and Facebook and so on, the opportunity to spread malware hidden in a simple link has, arguably, never been greater.

So Mac’s do have vulnerabilities and people should be increasingly aware of browser security concerns. Without identifying specific security holes in Safari or Opera (or Firefox for that matter), the operating system is no longer the primary target for Internet-driven user attacks by cyber criminals. The target is the application itself and the user’s behaviour within it.

Apple’s popularity is growing all the time even if its market share is still somewhere around less than 10 percent globally. Just this year security researchers found eight fresh zero-day vulnerabilities in Apple’s Safari browser.

“What matters most is that viral attacks are constantly evolving and looking for fresh blood,” Borrett continued. “So, everyone needs to think about Internet security protection. It’s as simple as that.”

Technical Facts

Looking objectively at the Mac operating system and tools, there is arguably a larger total surface area of code open to potential attack.

Combining rich use of Flash and Java with support for multiple file formats does not exactly put up extra barriers. Digging deeper, Address Space Layout Randomisation (ASLR) has been around since Windows Vista as an anti-exploitation technology, yet it is only present in Mac OS X 10.5 in some library offsets and therefore does not offer complete protection in the way that the technology was designed.

Conclusion: Apple Mac, Windows or Linux, the fact is that regardless of the operating system each of us is using, we’re all in this together. Everyone needs to be aware of what they are clicking on and use their commonsense – if something doesn’t look quite right, it probably isn’t!

.

Support Ending XP SP2

This is why you should look at making sure you have Service Pack 3 (SP3) installed, or think about migrating to Windows 7 in the near future.

Microsoft has announced that support for Windows XP with Service Pack 2 (SP2) 32-bit operating system will end on 13th July 2010, and support for Windows Vista Release to Manufacturing (RTM) will end 13th April 2010.

If you are running the 64-bit edition of Windows XP with SP2, you will continue to be eligible to receive Microsoft support and updates until 8th April 2014. There is no SP3 for the 64-bit version of Windows XP. To find out if you are running the 64-bit version of Windows XP, go to the Start menu, right-click My Computer, and then click Properties. If you don’t see “64-bit” listed, then you’re running the 32-bit version and need to install the Windows XP SP3.

Key Dates
  • 1st March 2010 – Windows 7 Release Candidate (RC) will reboot or go to a blue screen every two hours, depending on the PC’s system failure settings.
  • 13th April 2010 – Support for Windows Vista RTM operating system ends.
  • 1st June 2010 – Windows 7 Release Candidate (RC) licenses expire.
  • 13th July 2010 – Support for Windows XP with Service Pack 2 (SP2) 32-bit operating system ends.