Is Scanguard safe ?

Sponsored Links

Is Scanguard safe ?

Beware this Scanguard software. If you don’t purchase the removal tools after it finds multiple problems on your computer it will then take over your computer via the Edge browser and threaten to lock it.

Is Scanguard safe

Sponsored Links

The answer is NO, NEVER, NEVER, NEVER.

I wanted to try SCANGUARD. I first installed on a two months old PC. SCANGUARD found 3,979 viruses. More to my surprise, it considered McAfee Internet Security as a potential threat to my computer.  I analysed the findings. All of them were false, I didn’t have any bugs. SCANGUARD threw 3,979 items to my face to scare me off. But it failed to do so.

Secondly, I took the hard drive out and install an new SSD drive. I then install a fresh copy of Windows 10 Pro 64 bit on that drive. I scanned immediately after the fresh installation of the Windows-10. As expected, SCANGUARD found 16,329 viruses!!!   Was I surprised? No.

I knew it will put something out from their collected database, and it did without any success. So don’t be fooled by SCANGUARD’s mumbo jumbo. Never install SCANGUARD in your computer.

The effective ways to keep your computer safe and clean are:

1. Have the windows defender active and running. Have the automatic update on so that it can update database whenever available,

2. Install a well known internet security software like Trend Micro, McAfee, Symantec etc and make sure firewall is on,

3. This is my favourite one. Install Malwarebytes Antimalware Pro or Corporate version. It will work nicely with the Internet security software and keep you computer clean. The free version doesn’t have the “Auto Protect” activated.

4. Be careful when you plug in USB flash drives. Most of the computers get infected by USB flash drives. Have the auto run deactivated so that your security software can scan it before you use it. You can even activate “Auto Sacn USB” in your security software settings.

5. Finally, make sure you delete all your browsing history before you turn off your computer. It can be done through your browser’s settings/options.

The above will keep your computer safe, NOT Scanguard.

How to install Quicktime on PC with Windows 10

How to install Quicktime on PC with Windows 10

You follow below steps and check if it helps.

1. Go to official apple site.

https://secure-appldnld.apple.com/QuickTime/031-17469-20150630-3cf8c404-1a97-11e5-aaac-4e5ebe268ff7/quicktimeinstaller.exe

2. You can unpack it with WinRAR or other decompress tools.

3. You will see 4 files in the “exe” file, it’s actually a package.

Don’t install with QuickTime.msi, you’ll fail.

4. Install AppleApplicationSupport.msi and AppleSoftwareUpdate.msi. It’s better to install AppleApplicationSupport since actually AppleSoftwareUpdate is the key one.

5. Open AppleSoftwareUpdate you just installed. After checking new versions, you may see QuickTime in the list. Install it.

Sponsored Links

Tag : How to install Quicktime on PC with Windows 10

Download Windows Essentials 2012

Windows Essentials 2012 included Windows Movie Maker, Windows Live Writer, Windows Photo Gallery , Windows Live Mail, Windows Live Family Safety and the OneDrive desktop app for Windows. Already installed applications will continue to work as they do today.

Download Windows Essentials 2012

Windows Essentials 2012 suite reached end of support on January 10, 2017.

Sponsored Links

To download Windows Essentials 2012 you click here

What is Akamai NetSession Client ?

What is Akamai NetSession Client ?

The Akamai NetSession Interface is a secure application that may be installed on your computer to improve the speed, reliability, and efficiency for downloads and streams from the Internet. It is used by many software and media publishers to deliver files or streams to you.

What is Akamai NetSession Client

“The information that Akamai does capture is similar to a web server and that information is utilized for troubleshooting and network performance monitoring only.”  That means that NetSession continually sends information about your computer to Akamai.
They say that NetSession will only use your computer when it is “idle or utilizing minimal network resources.”  That means that NetSession is constantly monitoring your network use, and sending that information to Akamai.  And since bandwidth usage varies from second to second, that info must be sent up to Akamai a lot.  Wait a minute, didn’t they just say they only captured the sort of info that web servers capture?  Web servers don’t capture info on bandwidth use.  What other information does Akamai capture?  I could not find any specifics on their site.
So if you install NetSession, you will be joining a peer-to-peer network, and allowing Akamai to deliver files from your computer at times when Akamai deems you to be utilizing your bandwidth minimally.
I also have a security concern about the files I am receiving from NetSession.  It seems like it would not be difficult to download a file using NetSession, modify it to carry a virus payload, and then leave that computer idle, and wait for NetSession to transmit the infected file to other NetSession users.  I would hope that Akamai has taken steps to address this concern, but I can’t find any information on that.

How can I see what it does and control its activity?

NetSession provides a console that gives you the ability to review your NetSession activity and manage settings.

  • On Windows, open your Windows Control Panel, then click the icon or link to the Akamai NetSession Interface Control Panel.
  • On Mac OS X, the Akamai extension icon is found under Other –> Akamai on the System Preferences pane.

Does NetSession harm my computer or violate my privacy? (Is it malware?)

No. The NetSession Interface is safe and secure and does not contain spyware, adware, or a virus. It does not gather and transmit your personal information, nor does it harm your computer. Its purpose is to be a tool to improve the speed, reliability, and efficiency for downloads and streams.

Tag : What is Akamai NetSession Client ?

Distributed link tracking client sever

Summary


This article describes how you can use the Distributed Link Tracking services in Windows to track the creation and movement of linked files across NTFS-formatted volumes and servers.
Distributed link tracking client sever

An overview of Distributed Link Tracking

You can use the Distributed Link Tracking Server service and the Distributed Link Tracking Client service to track links to files on NTFS-formatted partitions. Distributed Link Tracking tracks links in scenarios where the link is made to a file on an NTFS volume, such as shell shortcuts and OLE links. If that file is renamed, moved to another volume on the same computer, moved to another computer, or moved in other similar scenarios, Windows uses Distributed Link Tracking to find the file. When you access a link that has moved, Distributed Link Tracking locates the link; you are unaware that the file has moved, or that Distributed Link Tracking is used to find the moved file.

Distributed Link Tracking consists of a client service and a server service. The Distributed Link Tracking Server service runs exclusively on Windows Server-based domain controllers. It stores information in Active Directory, and it provides services to help the Distributed Link Tracking Client service. The Distributed Link Tracking Client service runs on all Windows 2000-based and Microsoft Windows XP-based computers, including those in workgroup environments or those that are not in a workgroup. It provides the sole interaction with Distributed Link Tracking servers.

Distributed Link Tracking clients occasionally provide the Distributed Link Tracking Server service with information about file links, which the Distributed Link Tracking Server service stores in Active Directory. Distributed Link Tracking clients also may query the Distributed Link Tracking Server service for that information when a shell shortcut or an OLE link cannot be resolved. Distributed Link Tracking clients prompt the Distributed Link Tracking server to update links every 30 days. The Distributed Link Tracking Server service scavenges objects that have not been updated in 90 days

When a file that is referenced by a link is moved to another volume (on the same computer or on a different computer), the Distributed Link Tracking client notifies the Distributed Link Tracking server, which creates a linkTrackOMTEntry object in Active Directory. A linkTrackVolEntry object is created in Active Directory for every NTFS volume in the domain.

Note: In Windows Server 2008 and newer, the Distributed Link Tracking Server Service is not included in Windows anymore. So you can safely remove the objects from Active Directory.

Distributed Link Tracking and Active Directory

Distributed Link Tracking objects are replicated among all domain controllers in the domain that is hosting the computer account and all global catalog servers in the forest. The Distributed Link Tracking Server service creates objects in the following distinguished name path:

CN=FileLinks,CN=System,DC=domain name container of Active Directory

Distributed Link Tracking objects exist in the following two tables under the CN=FileLinks,CN=System folder:

  • CN=ObjectMoveTable,CN=FileLinks,CN=System,DC=domain name:

    This object stores information about linked files which have been moved in the domain.

  • CN=VolumeTable,CN=FileLinks,CN=System,DC=domain name:

    This object stores information about each NTFS volume in the domain.

Distributed Link Tracking objects consume very little space individually, but they can consume large amounts of space in Active Directory when they are allowed to accumulate over time.

If you disable Distributed Link Tracking and delete the Distributed Link Tracking objects from Active Directory, the following behavior may occur:

  • Active Directory database size may be reduced (this behavior occurs after the objects have been tombstoned and garbage collected, and after you perform an offline defragmentation procedure).
  • Replication traffic between domain controllers may be reduced.

Distributed Link Tracking Server service defaults on Windows Server-based domain controllers

In Windows 2000, Windows XP, and Windows Server 2003, the start value for the Distributed Link Tracking Client service is set to Automatic. On Windows 2000-based servers, the Distributed Link Tracking Server service starts manually, by default. However, if you use Dcpromo.exe to promote a server to a domain, the Distributed Link Tracking Server service is configured to start automatically.

For Windows Server 2003-based servers, the Distributed Link Tracking Server service is disabled by default. When you use Dcpromo.exe to promote a server to a domain, the Distributed Link Tracking Server service is not configured to start automatically. When a Windows 2000-based domain controller is upgraded to Windows Server 2003, the Distributed Link Tracking Server service is also disabled during the upgrade. If you are an administrator and you want to use the Distributed Link Tracking Server service, you must either use Group Policy or you must manually set the service to start automatically. In addition, the Distributed Link Tracking Client service on computers that are running Windows Server 2003 or Windows XP SP1 does not try to use the Distributed Link Tracking Server service by default. If you want to configure those computers to take advantage of the Distributed Link Tracking Server service, enable the Allow Distributed Link Tracking clients to use domain resources policy setting. To do so, open the Computer Configuration/Administrative Templates/System node in Group Policy.

Tag : Distributed link tracking client sever

How to use Snipping Tool and take a screenshot

How to use Snipping Tool and take a screenshot

#Method 1 : Use Mouse and keyboard

  1. To open Snipping Tool, select the Start  button, type snipping tool, and then select it in the search results.

  2. To choose the type of snip you want, select Mode (or, in older versions of Windows, the arrow next toNew), and then choose Free-formRectangularWindow, or Full-screen Snip. When making free-form or rectangular snips, use your mouse to select the area that you want to capture.

    How to use  Snipping Tool and take a screenshot
  3. To take a new screenshot using the same mode you used last, select New.

  4. Use the Save and Copy buttons at the top of the snip to save or copy it to the clipboard.

#Method 2 : Keyboard only

  1. To open Snipping Tool, press the Start  key, type snipping tool, and then press Enter. (There’s no keyboard shortcut to open Snipping Tool.)
  2. To choose the type of snip you want, press Alt + M keys and then use the arrow keys to choose Free-formRectangularWindow, or Full-screen Snip, and then press Enter. (Alt + M is available only with the latest update to Windows 10). When making a rectangular snip, hold down Shift and use the arrow keys to select the area you want to snip.

  3. To take a new screenshot using the same mode you used last, press Alt + N keys.

  4. To save your snip, press Ctrl + S keys. To copy it to the clipboard, press Ctrl + C keys.

    Tag : snipping tool download windows 10

Xbox live port forwarding

Open these network ports for Xbox One

If you have a firewall or network hardware, such as a router, you might need to make a configuration change in order for your Xbox One console to communicate with Xbox Live. This configuration change is sometimes called “opening ports” or “port forwarding.” Xbox Live requires the following ports to be open on your router:

Xbox live port forwarding

  • Port 88 (UDP)

  • Port 3074 (UDP and TCP)

  • Port 53 (UDP and TCP)

  • Port 80 (TCP)

  • Port 500 (UDP)

  • Port 3544 (UDP)

  • Port 4500 (UDP)

    Tag : Xbox live port forwarding

Download .NET Framework 4.6.1 Offline Installer for Windows

About the .NET Framework 4.6.1


The Microsoft .NET Framework 4.6.1 is a highly compatible in-place update to the Microsoft .NET Framework 4, the .NET Framework 4.5, the .NET Framework 4.5.1, the .NET Framework 4.5.2, and the .NET Framework 4.6.
Download .NET Framework 4.6.1 Offline Installer for Windows

The offline installer can be used when the web installer can’t be used because of a lack of Internet connectivity. We recommend that you use the web installer instead of the offline installer when possible for optimal efficiency and bandwidth requirements.

After you install this package, you can see that the following packages or updates were installed, depending on your operating system:

  • On Windows 7 SP1 and Windows Server 2008 R2 SP1, the Microsoft.NET Framework 4.6.1 is listed as an installed product under the Programs and Features item in Control Panel.
  • On Windows 8 and Windows Server 2012, it’s listed as Update for Microsoft Windows (KB3102439) under the Installed Updates item in Control Panel.
  • On Windows 8.1 and Windows Server 2012 R2, it’s listed as Update for Microsoft Windows (KB3102467) under the Installed Updates item in Control Panel.
  • On Windows 10, it’s listed as Update for Microsoft Windows (KB3102495) under the Installed Updates item in Control Panel.

Links to Download .NET Framework 4.6.1 Offline Installer for Windows


The following files are available for download from the Microsoft Download Center:

Download Download the Microsoft .NET Framework 4.6.1 offline installer package now.

For Windows RT:

Download Download the Microsoft .NET Framework 4.6.1 package now.

For Windows RT 8.1:

Download Download the Microsoft .NET Framework 4.6.1 package now.

Tag : Download .NET Framework 4.6.1 Offline Installer for Windows

How to Find Your BitLocker Recovery Key

How to Find Your BitLocker Recovery Key

How to Find Your BitLocker Recovery Key

Places to look for your BitLocker key:

  • On a printout you saved. Look in places you keep important papers.

  • Saved on a USB flash drive. Plug the USB flash drive in to your locked PC and follow the instructions. If you saved the key as a text file on the flash drive, use a different computer to read the text file.

  • In your Microsoft account. To get your recovery key, go to BitLocker Recovery Keys.

  • In your Azure Active Directory account. For work PCs where you sign in with an Azure Active Directory account, to get your recovery key, see the device info for your Microsoft Azure account.

Or ask someone for help:

  • Ask someone with administrator privileges on the same PC to unlock it with their key.

  • If your PC is connected to a domain (usually a work or school computer), ask a system administrator for your recovery key.

  • If you still can’t get in, you’ll need to reset your PC.

How to use the SysKey to secure the Windows Security Accounts Manager database

Summary of SysKey


The Microsoft Windows 2000, Microsoft Windows XP, and Microsoft Windows 2003 Security Accounts Management Database (SAM) stores hashed copies of user passwords. This database is encrypted with a locally stored system key. To keep the SAM database secure, Windows requires that the password hashes are encrypted. Windows prevents the use of stored, unencrypted password hashes.
How to use the SysKey to secure the Windows Security Accounts Manager database

You can use the SysKey utility to additionally secure the SAM database by moving the SAM database encryption key off the Windows-based computer. It can also be used to configure a start-up password that must be entered to decrypt the system key so that Windows can access the SAM database. This article describes how to use the SysKey utility to secure the Windows SAM database.


Configure Windows System Key Protection

To Configure Windows System Key Protection, follow these steps:

  1. At a command prompt, type syskey, and then press ENTER.
  2. In the Securing the Windows Account Database dialog box, note that the Encryption Enabledoption is selected and is the only option available. When this option is selected, Windows will always encrypt the SAM database.
  3. Click Update.
  4. Click Password Startup if you want to require a password to start Windows. Use a complex password that contains a combination of upper case and lower case letters, numbers, and symbols. The startup password must be at least 12 characters long and can be up to 128 characters long.

    Note If you must remotely restart a computer that requires a password (if you use the Password Startup option), a person must be at the local console during the restart. Use this option only if a trusted security administrator will be available to type the Startup password.

  5. Click System Generated Password if you do not want to require a startup password.

    Select either of the following options:

    • Click Store Startup Key on Floppy Disk to store the system startup password on a floppy disk. This requires that someone insert the floppy disk to start the operating system.
    • Click Store Startup Key Locally to store the encryption key on the hard disk of the local computer. This is the default option.

    Click OK two times to complete the procedure.

    Remove the SAM encryption key from the local hard disk by using the Store Startup Key on Floppy Disk option for optimum security. This provides the highest level of protection for the SAM database.

    Always create a back-up floppy disk if you use the Store Startup Key on Floppy Disk option. You can restart the system remotely if someone is available to insert the floppy disk into the computer when it restarts.

Note The Microsoft Windows NT 4.0 SAM database was not encrypted by default. You can encrypt the Windows NT 4.0 SAM database by using the SysKey utility.

Tag : SysKey