Bios Password

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Saturday, December 13, 2008

Utility Bag dump-out

Posted on 11:29 AM by Unknown

Here are some updated and improved tools you might want to take a look at:

Process Monitor v2.03 – Windows Sysinternals - “This update to Process Monitor, a real-time file, registry, process and network monitor, adds the ability to import and export configuration settings, shows an icon in the operations column depicting the event class of the operation, and fixes a symbol configuration bug on Windows XP.”

Autoruns v9.36 – Windows Sysinternals – “Autoruns changes the Hide Microsoft Entries to only hide Windows entries, fixes a bug in the Find behavior, allows enabling and disabling entries using the space bar, and fixes a number of minor bugs.”

Process Explorer v11.31 – Windows Sysinternals – “This update works around a bug in the latest Debugging Tools for Windows debug engine DLL and fixes a bug that could cause objects to show up as <unknown type> when Process Explorer was run without administrative rights.”

CleanAfterMe v1.30 – NirSoft - Clean Registry entries and files in your system adds new options: Fill files with zero bytes before deleting them (In Advanced Options), Don't ask me before cleaning my temporary folder (In Advanced Options), New cleaning items for Outlook/Word/Office temporary folder.

SpecialFoldersView v1.05 - Nirsoft – Utility to easily jump to special folders in Windows now adds 'CSIDL Name' column.

DriverView v1.16 – Nirsoft – Utility that lists all device drivers currently loaded on your Windows system now adds new option to hide Microsoft drivers.

NetworkMiner V0.87 released – SourceForge- NetworkMiner is a Network Forensic Analysis Tool (NFAT) for Windows that can detect the OS, hostname and open ports of network hosts through packet sniffing or by parsing a PCAP file. NetworkMiner can also extract transmitted files from network traffic. Version update deals with bug fixes.

Anti-Malware Toolkit v1.06.157 – Lunarsoft – Acts as a central anti-malware/anti-virus tool and program downloader.  Select the items you wish to download and it will auto-download the files to appropriate folders.  In many cases, users must still “install” the applications locally, but this does  provide “one-stop” downloading for harried support staff.  From the author’s website linked above:

Changes:

  • [Added] Tab control added to user interface to access Main, Settings and About.
  • [Added] Proxy settings including username and password for authorization.
  • [Added] Setting to download into categories (E.G.: Applications, Definitions).
  • [Added] Option to save download path.
  • [Added] Ability to open download folder when downloads complete.
  • [Added] Settings are now saved to an xml file.
  • [Added] Regedit now available under Tools menu.
  • [Added] Auto-update feature and option in Settings.
  • [Added] Update status added in statusbar.
  • [Changed] Links menu contents rearranged. Windows Update now under Tools; PC Cleanup, PC Security and Lunarsoft links found under Help.

According to Download Squad this version now “…supports 37 different downloads in five categories, including:

  • Spyware: Spyware Blaster, CCleaner, RogueRemover, SUPERAntiSpyware, Malwarebytes, Spybot, Hijack This
  • Definitions: Avast, Avira, Spybot, Malwarebytes, SUPERAntiSpyware
  • Utilities: Dial-a-fix, JavaRA, Autoruns, Process Explorer, Rootkit Revealer, Unlocker, LSPFix, MS Malcious Software Removal, Windows Installer Cleanup
  • Uninstallers: Avast, Avira, AVG (x86 and x64), BitDefender, Kaspersky, McAfee, One Care
  • Recommendations: Firefox, Opera, Thunderbird, Avast, AntiVir, Comdo (x86 and x64), Auslogics Defrag, PageDefrag, UPHClean “

Blue Badge rev. 3 – Within Windows blog – This Windows7 alpha image hack tool now “…no longer patches system files, no longer requires administrative permissions, and is no longer locked to any specific build. It inserts all the known protected feature GUIDs as of build 6956 into the current user’s branch of the registry.” These unlocked registry override bits allow activation of various disabled features including "Aero Peek".

Go get updating kiddos!

--Claus V.

Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in anti-virus software, hacks, malware tools, utilities, Windows 7 | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Finally! Time to Post! New material list
    After a recent text from my bro reminding me it has been since March since I’ve done a blog post, I was finally able to clear the schedule a...
  • Oscar watch Linkpost
    Alvis and Lavie are watching the Oscars tonight and I’m along for the ride. I wasn’t able to come even close to getting out some of the pos...
  • New Year’s Day - First Post 2011
    Same day I came out with my first post after a long drought, I fell upon this article Blogging Seems To Have Peaked, Says Pew Report over a...
  • Utility Gumbo
    There’s a lot in this pot.  Probably something everyone can find to enjoy. I’m serving it up tonight out of the back of the truck on the s...
  • iodd : Multi-boot madness!
    Like many computer technicians and responders, I seem to always have at hand a collection of bootable media; CD’s, DVD’s, USB-HDD’s, flash m...
  • Ubuntu 13.10 Upgrade - Lessons Learned & VIDMA utility found
    A few weeks ago a new release of Ubuntu came out. Naturally that meant it was update time! I have been getting pretty good at this now so ...
  • Interesting Malware in Email Attempt - URL Scanner Links
    Last weekend I spent some time with extended family helping confirm for them that their on-line email account got hacked and had been used t...
  • Windows 8 Linkage: A Bit Behind the Ball
    CC attribution: behind the eight ball by Ed Schipul on flickr . OK. Confession time. I’m more than a bit exhausted this weekend. Besides a...
  • Lego MiniFig Extravaganza
    picture clipped from Wired’s clip from Gizmodo clip… Thanks in no small part to the Windows 7 RC release, XPM mode research, and a big “l...
  • This Week in Security and Forensics: Beware the cake!
    Cube Party! image used with permission from John Walker at "rockpapershotgun.com" Yeah, the cake is a Portal thing.  Let’s d...

Categories

  • Active Directory
  • anti-virus software
  • Apple
  • architecture
  • art
  • AVG
  • Blogger
  • blogging
  • books
  • boot-cd's
  • browsers
  • cars
  • cell-phones
  • cheat sheets
  • Chrome/Chromium
  • command-line interface
  • cooking
  • crafts
  • crazy
  • curmudgeon
  • DHC
  • Dr. Who
  • E-P1
  • Education
  • family
  • Firefox
  • firewalls
  • For the Gentleman
  • forensics
  • Gmail
  • Google
  • graphics
  • hacks
  • hardware
  • humor
  • hurricanes
  • imagex
  • Internet Explorer
  • iOS
  • iPhone
  • iPod
  • iTunes
  • Kindle
  • Learning
  • Link Fest
  • Linux
  • malware tools
  • Microsoft
  • movies
  • music
  • networking
  • NewsFox
  • NFAT
  • Nook
  • Opera
  • organization
  • PDF's
  • photography
  • politics
  • PowerShell
  • recipes
  • Remote Support
  • RSS
  • science
  • Scripting
  • search engines
  • security
  • Shuttle SFF
  • software
  • Texana
  • Thunderbird
  • troubleshooting
  • TrueCrypt
  • tutorials
  • utilities
  • VBscript
  • video
  • Virtual PC
  • virtualization
  • viruses
  • Vista
  • Vista mods
  • wallpapers
  • Win FE
  • Win PE
  • Win RE
  • Windows 7
  • Windows 8
  • Windows Home Server
  • Windows Live Writer
  • Windows Phone
  • writing
  • XP
  • XP mods
  • Xplico

Blog Archive

  • ►  2013 (83)
    • ►  November (8)
    • ►  October (8)
    • ►  September (14)
    • ►  August (6)
    • ►  July (10)
    • ►  June (10)
    • ►  April (11)
    • ►  March (6)
    • ►  February (7)
    • ►  January (3)
  • ►  2012 (96)
    • ►  December (8)
    • ►  November (4)
    • ►  October (9)
    • ►  September (8)
    • ►  August (12)
    • ►  July (4)
    • ►  June (3)
    • ►  May (7)
    • ►  April (13)
    • ►  March (3)
    • ►  February (5)
    • ►  January (20)
  • ►  2011 (41)
    • ►  December (8)
    • ►  November (7)
    • ►  September (4)
    • ►  August (4)
    • ►  July (2)
    • ►  June (6)
    • ►  March (5)
    • ►  February (1)
    • ►  January (4)
  • ►  2010 (69)
    • ►  December (1)
    • ►  October (3)
    • ►  September (2)
    • ►  August (13)
    • ►  July (17)
    • ►  June (3)
    • ►  May (3)
    • ►  April (3)
    • ►  March (11)
    • ►  February (1)
    • ►  January (12)
  • ►  2009 (177)
    • ►  December (20)
    • ►  November (11)
    • ►  October (7)
    • ►  September (7)
    • ►  August (21)
    • ►  July (17)
    • ►  June (7)
    • ►  May (18)
    • ►  April (9)
    • ►  March (17)
    • ►  February (23)
    • ►  January (20)
  • ▼  2008 (35)
    • ▼  December (23)
      • Calling H-Town Techies: Help Save our Laptop!
      • Merry Christmas and Happy New Year!
      • Early Monday morn Linkfest: Utility Focus
      • Late Sunday Linkfest: Focus on Security
      • Custom Win PE Boot Disk Building: Step Two – PGP I...
      • USB Security: AutoRunGuard, Encryption options, an...
      • Security and Forensics Roundup: Heavy Version #3
      • Browser Bullets: #3
      • Mid-December Linkfest: Snowflake version
      • Utility Bag dump-out
      • (In)Security Response: Room for Improvement
      • Custom Win PE Boot Disk Building: Step One – WAIK up
      • NTFS Formatting an Imation USB Disk
      • Custom Win PE Boot Disk Building Saga: Introduction
      • Security and Forensics Roundup: Heavy Version #2
      • Windows Vista and Slipstreaming: A Primer
      • Software Goodies
      • Windows 7 News Roundup #4
      • Warm things for cool and blustery days
      • Browser Bullets: #2
      • Who are u.exe?
      • Quick Browser and Google Bits
      • Pushing through the wall
    • ►  November (12)
Powered by Blogger.

About Me

Unknown
View my complete profile