Wednesday, November 28, 2012

How to Remove New Folder.exe Virus: Step by Step Guide

New folder.exe virus is also known as Iddono. This virus makes a copy file of itself with the name Iddono. It appeared in 2008 on Window’s computer systems. This Computer virus uses program security weaknesses of the Windows operating system. Once it infects a victim’s PC, it executes its own programming,turns the hacked PC to a server and the hacker’s PC to a client machine.


Here is the step by step guide to remove the New Folder.exe virus.
Step 1: Press “Ctrl” , “Shift” and “Esc” keys simultaneously to open the Task Manager.
 Step 2: Look for “Processes” tab in task manager and click on it to see running process.
 Step 3: Select “new folder.exe” from the list of the processes and click “End Process” button.
 Step 4: Repeat Step 3 for “srvidd20.exe,” “iddono20.exe” and “editor.exe” processes.
 Step 5: Now close the task manager.
 Step 6: Now go to the start menu, type cmd in run and click enter. You will see a command line window.
 Step 7: Type “regsvr32 /u shelliddono.dll” and hit enter. Now type ”regsvr32 /u libedit.dll” and hit enter to unregister the DDL.
 Step 8: Close the command line window.
 Step 9: Now go to the start menu and type “srv0104.ids” in search box and click enter.
 Step 10: Delete all the listed search results.
 Step 11: Repeat Step 1 & 2 for “shelliddono.dll,” “libedit.dll,” “newfolder.exe,” “srvidd20.exe,” “iddono20.exe” and “editor.exe” processes.
 Step 12: Now restart your computer.
 Follow the above steps to remove New Folder.exe virus from your computer.

Tuesday, November 27, 2012

How to Backup Sticky Notes in Win7


  • To Backup Sticky Notes:

    1. Open the Start Menu, and copy and paste the location below in the search box and press Enter.
    %AppData%\Microsoft\Sticky Notes
    2. Save a copy of the "StickyNotes.snt" file to where you like as a backup of it.
    To Restore Sticky Notes:
    1. Open the Start Menu, and copy and paste the location below in the search box and press Enter.
    %AppData%\Microsoft\Sticky Notes
    2. Copy the "StickyNotes.snt" file to the "%AppData%\Microsoft\Sticky Notes" folder.
    NOTE: "StickyNotes.snt " is your backup of the current Sticky Notes on your desktop.

Gmail new compose and reply experience


You can now write messages in a cleaner, simpler experience that puts the focus on your message itself, not all the features around it. Here are some of the highlights:
  • Fast: Compose messages right from your inbox.
  • Simple: Redesigned with a clean, streamlined look.
  • Powerful: Check emails as you're typing, minimize drafts for later, and even compose two messages at once.

Try it out!

Once you click the Compose button, click the "new compose experience" link right next to the Labels button at the top of the message. Until the change is fully launched, you'll be able to choose whether you use the new or current experience.If you change your mind or if you need to use a feature that isn't available yet, you can switch back to the old experience at any time. Here's how:
  1. Click Compose
  2. At the bottom corner of the message pane, click the More menu icon More options drop-down arrow next to the Discard button.
  3. Select "Switch back to old compose."

Thursday, November 22, 2012

How to Create and Use a TrueCrypt Container

TrueCrypt is a freeware software application used for on-the-fly encryption (OTFE). It can create a virtual encrypted disk within a file or encrypt a partition or (under Microsoft Windows except Windows 2000) the entire storage device (pre-boot authentication).
Step 1:
If you have not done so, download and install TrueCrypt. Then launch TrueCrypt by double-clicking the file TrueCrypt.exe or by clicking the TrueCrypt shortcut in your Windows Start menu.

Step 2:
TrueCrypt GUI
The main TrueCrypt window should appear. Click Create Volume (marked with a red rectangle for clarity).

Step 3:
TrueCrypt GUI
The TrueCrypt Volume Creation Wizard window should appear.
In this step you need to choose where you wish the TrueCrypt volume to be created. A TrueCrypt volume can reside in a file, which is also called container, in a partition or drive. In this tutorial, we will choose the first option and create a TrueCrypt volume within a file.
As the option is selected by default, you can just click Next.

Note: In the following steps, the screenshots will show only the right-hand part of the Wizard window.

Step 4:
TrueCrypt GUI
In this step you need to choose whether to create a standard or hidden TrueCrypt volume. In this tutorial, we will choose the former option and create a standard TrueCrypt volume.
As the option is selected by default, you can just click Next.

Step 5:
TrueCrypt GUI
In this step you have to specify where you wish the TrueCrypt volume (file container) to be created. Note that a TrueCrypt container is just like any normal file. It can be, for example, moved or deleted as any normal file. It also needs a filename, which you will choose in the next step.
Click Select File.
The standard Windows file selector should appear (while the window of the TrueCrypt Volume Creation Wizard remains open in the background).

Step 6:
File selector
In this tutorial, we will create our TrueCrypt volume in the folder D:\My Documents\ and the filename of the volume (container) will be My Volume (as can be seen in the screenshot above). You may, of course, choose any other filename and location you like (for example, on a USB memory stick). Note that the file My Volume does not exist yet – TrueCrypt will create it.
IMPORTANT: Note that TrueCrypt will not encrypt any existing files (when creating a TrueCrypt file container). If you select an existing file in this step, it will be overwritten and replaced by the newly created volume (so the overwritten file will be lost, not encrypted). You will be able to encrypt existing files (later on) by moving them to the TrueCrypt volume that we are creating now.*

Select the desired path (where you wish the container to be created) in the file selector.
Type the desired container filename in the File name box.
Click Save.
The file selector window should disappear.

In the following steps, we will return to the TrueCrypt Volume Creation Wizard.


WhatsApp Messenger for Smart Phones

WhatsApp uses a customized version of the open standard Extensible Messaging and Presence Protocol (XMPP)

How it works

WhatsApp Messenger is a cross-platform mobile messaging app which allows you to exchange messages without having to pay for SMS. WhatsApp Messenger is available for iPhone, BlackBerry, Android, Windows Phone and Nokia and yes, those phones can all message each other! Because WhatsApp Messenger uses the same internet data plan that you use for email and web browsing, there is no cost to message and stay in touch with your friends.

In addition to basic messaging WhatsApp users can create groups, send each other unlimited images, video and audio media messages.

                                             
                          
Upon installation, it creates a user account using one's phone number as username (Jabber ID: [phone number]@s.whatsapp.net). While the Android version uses an MD5-hashed, reversed-version of the phone's IMEI as password, the IOS version doubles the phone's MAC address and MD5-hashes it.

Multimedia messages are sent by uploading the image, audio or video to be sent to a HTTP server and then sending a link to the content along with its Base64 encoded thumbnail (if applicable)

WhatsApp synchronizes with the phone's address book, so users do not need to add contacts in a separate book. Since all users are registered with their phone number, the software returns all WhatsApp users among one's contacts.

Saturday, November 17, 2012

How to store your passwords more secure

Use MS Word's document-protection features to apply a password to your encrypted password file, or hide your passwords.

In Word 2010, open the file and click File > Info > Protect Document > Encrypt with Password.

Microsoft Word 2010 Protect Document options
Apply a password to a document in Word 2010 by choosing the Encrypt with Password option under Protect Document.
Type the password and press Enter, then confirm the password and press Enter again. To limit the type of changes others can make to the document, choose the Restrict Editing option under Protect Document to open the Restrict Formatting and Editing window. You can require Track Changes or limit changes to comments. Other options let you restrict editing to specific people or groups, limit formatting styles, and make the document read-only.