Spiga

Desktop Hijack Fix





This tool can be used to fix most problems in which your normal background is not displayed. Usually in the backgrounds place there is another image or website which has hijacked the desktop. This form of hijacking involves reconfiguring your desktop to display something other than your default configuration.
You can use Desktop Hijack fix to restore default settings for Active Desktop and remove any changes that had been made to the desktop background. It can also be used to backup your current desktop configuration to be restored later if you choose to not restore default settings. Integrated policy scanning feature allows you to remove detected policy restrictions which can prevent you from accessing features of your computer.
During running operation this tool has been designed to alert you if your desktop settings have been hijacked based off your previous configuration. Tool will also notify of policy restrictions that may have been enabled by malware.
What's New in version 1.3:
Added more policy removal features, added trace detection and removal, improved desktop hijack detection and removal.

Download:


 5.72MB    windows version Windows XP/Vista  

Numerous “System Tools” in one simplistic package…


I have seen it posted on numerous sites and blogs; but, never really took it for a test drive… It is called Glary Utilities… I have to say, I am quite impressed with the numerous “pick and choose” features in Glary Utilities. If you are into tweaking, optimizing, repairing, protecting or just improving your system, this is one utility that has it all. I also discovered, which I have not seen mentioned anywhere; there is also a “portable version” of Glary Utilities that can be downloaded from the website - [click here].  For the sake of this review, I downloaded the portable version and can say, it will now be a permanent resident on my flash drive.
Glary Utilities
The #1 free, powerful and all-in-one utility in the world market!
Glary Utilities
Optimize, clean and boost the speed of your Windows.
Protect your privacy and security.
Block spyware, trojans, adware, etc.
Fix certain application errors.
Simple, fast and User friendly interface
For only private use
It allows you to clean common system junk files, as well as invalid registry entries and Internet traces. You can manage and delete browser add-ons, analyze disk space usage and find duplicate files. You can also view and manage installed shell extensions, encrypt your files from unauthorized access and use, split large files into smaller manageable files and then rejoin them. Furthermore, Glary Utilities includes the options to optimize memory, find, fix, or remove broken Windows shortcuts, manage the programs that start at Windows startup and uninstall software. Other features include secure file deletion, an Empty Folder finder and more

Free Disk Usage Analyzer…

Over the span of time many computer users download numerous files onto their computer and never take the time time to organize or manage those files. I have seen users keep files (documents, pics, movies, etc…) on their computers for the life of the computer and never remove them. Many times, the majority of those files become obsolete, serve no purpose to the user, and take up disk space. It is recommended that you make file management part of your routine disk maintenance on your PC and perform file management tasks (i.e. delete files, move files, etc.) prior to performing your clean disk and defrag routines. Get organized with managing your files and folders and you will not regret it. One very important point I want to make is; know what files on your PC you are messing with so as not to affect the operation of the computer.

To assist you with determining what files and folders on your PC  are consuming the most space, I recommend using the program “Free Disk Usage Analyzer” .  This program is one of the nicest (in appearance) I have seen for graphically showing the status of your disks, folders and files.  The program has the ability to show the file contents (in order of size), the largest files (in a folder or on a drive), and the largest folders (on the disk). When you first run the program, it will scan all of your drives (internal and external drives).  I was quite surprised that it scanned all of my drives (4 total) in less than a minute.  The nice thing about this program, that other “FREE” programs comparable to this lack, is there are buttons on the menu to empty the recycle bin, perform a disk cleanup and to initiate the add/remove programs component in Windows.
To get this program, click on the screenshot or any of the links below.

Free Disk Usage Analyzer


The easiest tool for quickly finding large files
and optimizing disk usage.


Disk Usage Analyzer helps you organize your files and manage disk space by locating the largest files on your disk. You can quickly find where are your largest files, such as videos, photos and archives, and move them elsewhere, possibly to a backup drive. You may also decide to simply delete unneeded files. Disk Analyzer is fast and easy to use, summarizing your disk usage in a friendly format with visual graphs. Disk Analyzer is integrated with Windows so that you can view, open or delete files in the same way as in Windows Explorer.
Free Disk Analyzer

Disk Analyzer helps you keep your disk drives uncluttered, which can also result in faster computer performance.

FEATURES


Finds largest files within selected drive or folder
Finds largest folders by folder size, average file size, or number of files
Presents information visually via graphs
Looks and feels like part of Windows
Provides sorting functionality by displayed columns
Safe product, not an adware, spyware or malware

Speedup Your PC – Turn Off Unnecessary Services in XP


services-2.jpg
If you are a typical computer user, then the fewer services your system runs the better. The following will assist you in determining which services you can turn off in Windows XP Pro/Home, to improve performance, boot time, and to effectively increase your security level.
Every running, but unused, service on your machine is an unnecessary security vulnerability. If a service is not required for authorized users and system functionality, turn it off.
The following recommendations have been compiled from personal observation over the course of the last few years. The suggested settings may not be appropriate for your machine.
Before you begin, it is important to remember that if a particular service is disabled, any other service/services that explicitly depend on it will fail to start. Read the Properties information carefully and make sure you understand what the service does/does not do.
Adjusting services settings incorrectly has the potential to leave your computer in an unbootable condition. It’s important that before you begin making changes to system services, you have fully functional backups of your system/data.
If you are prepared to go ahead then open the Control Panel, Administrative Tools, Services. Right click on a service and open Properties to make changes to the startup type (first check the tab Dependencies).
Alerter (Disable)
Programs that use administrative rights will not receive them.
Application Layer Gateway Service (Enable)
If you’re reading this you’re on the Internet and you need this service to enable your firewall. You are running a firewall aren’t you? As well, this service is required for Internet Connection Sharing.
Application Management (Disable)
You won’t be able to install, use, or enumerate IntelliMirror programs.
Automatic Updates (Enable)
Automatic Updates will not function if disabled, which might put your operating system at risk. If you do turn off this service be sure to manually update at Microsoft’s Update site.
Background Intelligent Transfer Service (Enable)
Uses idle network bandwidth to transfer data between clients and servers in the background. Automatic Updates depends on this service.
ClipBook Viewer (Disable)
If the service is stopped, ClipBook Viewer will not be able to share information with remote computers.
COM+ Event System/System Application (Enable)
System Event Notification, which includes logon and logoff notifications, will not function if disabled.
Computer Browser (Enable)
Used by the system in order to view network domains and resources and locate other computers on the network. Since many of us now share files, leave this service enabled.
Cryptographic Services (Enable)
This service is used by Automatic Updates, Task Manager, and several other services.
DHCP Client (Enable)
Without this service being started your system will be unable to obtain an IP address from a DHCP server, and will have to be configured manually to a static address.
Distributed Link Tracking Client (Disable)
Link tracking on your computer will not function; users on other computers will be unable to track links on your machine.
Distributed Transaction Coordinator (Disable)
Provides support for transactions that span multiple resource managers, such as databases, message queues, and file systems. Generally not required.
DNS Client (Enable)
Resolves and caches Domain Name System (DNS) names for your computer. If this service is stopped, your computer will not be able to resolve DNS names and locate Active Directory domain controllers.
Error Reporting Service (Disable)
Reports unexpected application crashes to Microsoft.
Event Log (Enable)
With this service turned off you will be unable to view your logs; this will make it potentially more difficult to diagnose problems and to detect security breaches.
Fast User Switching Compatibility (Disable)
Fast user switching will not be available.
Help and Support (Enable)
Occasionally you may need this service, so keep it enabled.
HID Input (Enable if Required)
This service allows access to Human Interface Devices which control predefined hot buttons on newer keyboards, remote controls, and so on. If you don’t require this, you can safely turn it off.
IMAPI CD-Burning COM Service (Enable)
Most computers have at least a CD drive and if yours does, then leave this service enabled, otherwise you will be unable to record CDs.
Indexing Service (Disable)
With this service turned off, your computer will be unable to index files. On the plus side, your machine will likely boot faster with this service disabled.
Internet Connection Firewall (ICF) / Internet Connection Sharing (Disable)
Unless you have a home network set-up, there is no need to enable this service.
IPSEC Service (Disable)
TCP/IP security will disabled on your network. This does not refer to the Internet.
Logical Disk Manager (Disable)
Unless you are adding new disks to the system, there is no need to keep this service enabled.
Logical Disk Manager Administrative (Disable)
If you have enabled Logical Disk Manager then this service must be enabled.
Machine Debug Manager (Disable)
Unless you are involved in Visual Studio debugging disable this service.
Messenger (Disable)
Transmits net send and Alerter service messages between clients and servers. This service is not related to Windows Messenger.
Microsoft Software Shadow Copy Provider (Disable or Manual)
If you use Windows Backup set this at manual; otherwise set at disable.
NetMeeting Remote Desktop Sharing (Disable)
If you don’t use NetMeeting then disable this service.
Network Connections (Enable)
Services that need network information will not be available if this service is disabled.
Network DDE (Disable)
Dynamic Data Exchange transport and security will be unavailable.
Network Location Awareness (Enable)
Network configuration and location information is handled by this service and must be enabled if you have an Internet connection.
Net Logon (Disable)
This service supports pass-through authentication of account logon events for computers in a domain.
NetMeeting Remote Desktop Sharing (Disable)
The service enables an authorized user to access your computer remotely by using NetMeeting over a corporate intranet. Unless you specifically require this service, turn it off.
Performance Logs and Alerts (Disable)
Collects performance data from local or remote computers based on preconfigured schedule parameters, then writes the data to a log or triggers an alert. If this service is stopped, performance information will not be collected. Personally, I prefer to enable this service.
Plug and Play (Enable)
You run the risk of the system becoming unstable if you disable this service.
Potable Media Serial Number (Enable)
With the proliferation of these types of devices, enable this service. If however, you do not attach such devices to your machine, you can safely disable this service.
Print Spooler (Enable)
If you disable this service you will be unable to run a printer.
Protected Storage (Enable)
Provides protected storage for sensitive data, such as private keys, to prevent access by unauthorized services, processes, or users.
QoS RSVP (Disable)
Enable this service only if you use QoS programs.
Remote Access Auto Connection Manager (Enable)
Creates a connection to a remote network whenever a program references a remote DNS or NetBIOS name or address.
Remote Access Connection Manager (Enable)
This service creates a network connection.
Remote Desktop Help Session Manager (Disable)
Unless you require this function keep this service disabled.
Remote Procedure Call (Enable)
This service must be enabled or the system will not boot.
Remote Procedure Call (RPC) Locator (Enable)
Manages the RPC name service database, which is similar to DNS services for IP.
Remote Registry (Disable)
Enables remote users to modify registry settings on this computer. Be sure to disable this service unless it is absolutely required.
Removable Storage (Enable)
Manages removable media including automated removable media devices.
Secondary Logon (Disable)
Enables starting processes under alternate credentials.
Security Accounts Manager (Enable)
If you don’t use DHCP to obtain an IP address you can disable this service.
Server (Disable)
Unless you share files or local resources be sure to disable this service.
Shell Hardware Detection (Enable)
Unless this service is enabled CD-ROMs and other devices will not function automatically.
Smart Card (Enable)
Allows your machine to read a smart card. On the other hand, if your machine does not have a reader you can disable this service.
Smart Card Helper (Enable)
Provides support for legacy (older) smart cards.
SSDP Discovery (Disable)
This service has long been recognized as a security issue and should be disabled, unless you have a home network, in which case you should enable.
System Event Notification (Disable)
Tracks system events such as Windows logon, network, and power events. Notifies COM+ Event System subscribers of these events. If your system is on a laptop, leave this service enabled so that power notifications are available.
System Restore Service (Enable)
Without this service enable you will be unable to create a restore point, or restore your system to an earlier point.
Task Scheduler (Disable)
Keep disabled unless you run scheduled tasks.
TCP/IP NetBIOS Helper (Disable)
On desktop systems disable this service.
Telephony (Disable)
Enable this service if you have a modem/fax modem.
Telnet (Disable)
Unless you allow remote access to your programs, disable this service.
Terminal Services (Enable) See the disable method below.
Allows multiple users to be connected interactively to a machine as well as the display of desktops and applications to remote computers. Rather than disabling this service, instead clear the check boxes in the remote tab on the System Properties Control panel.
Themes (Disable)
Keep in mind, that if you disable this service you will no longer be able to manage Themes.
Uninterruptible Power Supply (Disable)
Manages an uninterruptible power supply (UPS) connected to the computer. Of course, if you have an uninterruptible power supply this must be enabled.
Universal plug and Play Device Host (Disable)
Not needed on standalone systems.
Upload Manager (Disable)
Manages synchronous and asynchronous file transfers between clients and servers on the network. If you use an FTP application enable this service.
Volume Shadow Copy (Enable)
You can disable this service if you do not use Windows Backup.
Web Client (Enable)
Enables Windows-based programs to create, access, and modify Internet-based files. If you do not require this function, then disable this service.
Windows Audio (Enable)
Manages audio devices for Windows-based programs. If this service is stopped, audio devices and effects will not function properly.
Windows Image Acquisition (Enable)
Provides image acquisition services for scanners and cameras.
Windows Installer (Enable)
Installs, repairs and removes software according to instructions contained in .MSI files.
Windows Management Instrumentation (Enable)
Provides a common interface and object model to access management information about operating system, devices, applications and services. If this service is stopped, most Windows-based software will not function properly.
Windows Management Instrumentation Driver Extensions (Enable)
Provides systems management information to and from drivers.
Windows Time (Disable)
Maintains date and time synchronization on all clients and servers in the network.
Wireless Zero Configuration (Disable)
Enable if you are using a wireless network. Provides automatic configuration for the 802.11 adapters.
WMI Performance Adaptor (Enable)
Provides performance library information from WMI providers.
Workstation (Disable)
Creates and maintains client network connections using the Microsoft Network Services. If this service is disabled, these connections will be unavailable.

Uninstalling and Installing AntiVirus Software…


Antivirus software are complex programs designed to identify, neutralize or eliminate malicious content that invade your computer.  Many people over a period of time will change from one brand of antivirus software to another.  Antivirus software is big business and today there are many flavors and options available.
For example; There are (3)-three “FREE (for personal use)” reputable antivirus packages that are widely recognized (see below).  I prefer any one of these over the major brand antivirus software packages due they are light on system resources, and are not bloated.   As a matter of fact, I cannot remember ever having a commercial (paid for) version of an antivirus program on any of my computers at home.
Avast
Avira AntiVir
AVG
The points of this article is to educate you to the fact that there are FREE antivirus software options available and that follow-up research may be required to “completely” uninstall (remove) antivirus software from your system in the event you desire to install another antivirus program.
Antivirus software, when running on your system, is hooked into many areas (i.e. registry, file system, resident memory, etc…) and uninstalling it can leave debris behind that can cause other systemic issues.  Antiviruses are like viruses; they can be hard to get rid of…  To prove my point, I researched (9)-nine antivirus programs and found that every one of them had supplemental removal instructions or tools, in addition to following the typical Add/Remove console process found in Windows. I have listed the sites below for convenience and reference.  During this research I also found that locating this information was often buried deep in their sites and was not readily accessible.
Antivirus Programs
Uninstall Information & Links
Norton Removal Tool - The Norton Removal Tool uninstalls all Norton 2009/2008/2007/2006/2005/2004/2003 products, Norton 360 and Norton SystemWorks 12.0 from your computer. If you use ACT! or WinFAX, back up those databases before you proceed.
McAfee Consumer Products Removal tool (MCPR.exe) - uninstall or reinstall supported McAfee consumer products using the McAfee Consumer Products Removal tool (MCPR.exe)
Avast! uninstall utility - Sometimes it´s not possible to uninstall avast! the standard way - using the ADD/REMOVE PROGRAMS in control panel. In this case, you can use our uninstallation utility aswClear.
Avira AntiVir -Normally the Avira Registry Cleaner removes all entries that were created by AntiVir. In this way, it prepares your system for the installation of a new AntiVir version.
BitDefender Uninstall Tool - There are two methods of uninstalling BitDefender from your computer: using the system tools and using the special uninstall tool provided by BitDefender.
Kaspersky’s Antivirus Removal Tool - Some errors might occur when deleting Kaspersky Anti-Virus product via Start > Control Panel > Add\Remove Programs. As a result the program will not be uninstalled or will be partially uninstalled.  The removal tool is required to remove a variety of their products.
F-Secure Internet Security (and antivirus) - Should you decide to uninstall, F-Secure does not provide its own uninstaller. You must use the Microsoft uninstaller found in Add and Remove Programs within the Command Console. After a reboot we found no Registry files, but we did find several program and log files in an F-Secure directory tree on the root drive.
Trend Micro Antivirus -  Trend Micro Support to remove Trend Antivirus plus AntiSpyware from my computer?
AVG - Open the directory with AVG Free Edition installed in and run the SETUP.EXE file or download the current installation file of AVG Free Edition from here and run it to start installation process. A window with following options will be displayed during the installation process: Add/Remove Components, Repair installation or Uninstall
Symantec removal tool: nonav2.45.exe