Archive for the ‘Information’ Category

How to remove logonUI.msi.exe virus..   4 comments

Yesterday in my friend laptop one problem occur, when he start the laptop the boot process is complete successfully but logon screen does not appear.

What is LogonUI.msi.exe virus ?

LogonUI.msi.exe is virus that create same name file in System32 folder. That when kernel file try to open the logonUI.exe file and that time it find two file and that it can be unable to load original file and  the logon screen does not appear.

How to remove Virus?

The simple way is good  anti virus, but if u are already in this problem than u have only one way to remove this virus. Restart the computer and press F8 during the booting process. When Configured option is open than select safe mode.

When it open successfully than navigate from following path. C:\windows\System32 and find the logonUI.msi.exe file and delete this file, u need a administrator access  to do this.  Do not delete logonUI.exe file otherwise u can unable to logon. After delete this file restart the computer and boot as a normal windows. now see ur computer is ready.

Install good anti virus to make your system safe and secure.

Posted March 9, 2011 by psanni in PC Info

Face book is now 7   Leave a comment

We know Face book is most popular Social networking site. On this Week face book had turned 7 year old and Calibrate Birthday officially on 5th February 2011.

The Web Site Was launched by the owner Mark Zuckerberg with his three  friends in his collage days Harvard university.

Now a day Face book is 2 no site in this world and google is on First no.

Posted February 12, 2011 by psanni in Network

What is IP & IP Spoofing?   1 comment

What is IP?

An Internet Protocol (IP) address is a numerical label that is assigned to devices participating in a computer network that uses the Internet Protocol for communication between its nodes. …

A unique number which identifies a computer and its location on the internet. Some of the online services at the University of Kent use the IP address to verify that a PC is based on campus and therefore entitled to use the service. .

A number which identifies the location of a client (web surfer) on the Internet. In theory this is a unique number which can be used to identify separate visitors.

What is IP Spoofing?

In computer networking, the term IP address spoofing or IP spoofing refers to the creation of Internet Protocol (IP) packets with a forged source IP address, called spoofing, with the purpose of concealing the identity of the sender or impersonating another computing system.

An attack method by which IP packets are sent with a false source address. This may try to circumvent firewalls by adopting the IP address of a trusted source, thereby fooling the firewall into thinking that the packets from the hacker are actually from a trusted source. …

An attack whereby a system attempts to illicitly impersonate another system by using its IP network address.

NOTE:-

* If you install IP spoofing application in your Computer, It cause your computer Internet Slowdown.

* Because it use Proxy server of Country.

Posted January 26, 2011 by psanni in Network

What is Firewall?   1 comment

What is a Firewall?

A firewall is a tool that monitors communication to and from your computer. It sits between your computer and the rest of the network, and according to some criteria, it decides which communication to allow, and which communication to block. It may also use some other criteria to decide about which communication or communication request to report to you (either by adding the information to a log file that you may browse whenever you wish, or in an alert message on the screen), and what not to report.

What Is It Good For?


Identifying and blocking remote access Trojans. Perhaps the most common way to break into a home computer and gain control, is by using a remote access Trojan (RAT). (sometimes it is called “backdoor Trojan” or “backdoor program”. Many people simply call it a “Trojan horse” although the term “Trojan horse” is much more generic). A Trojan horse, is a program that claims to do something really innocent, but in fact does something much less innocent. This goes to the days where the Greek soldiers succeeded to enter through the gates of Troy by building a big wooden horse, and giving it as a present to the king of Troy. The soldiers allowed the sculpture to enter through their gates, and then at night, when the soldiers were busy guarding against an outside attack, many Greek soldiers who were hiding inside the horse went out and attacked Troy from the inside. This story, which may or may not be true, is an example of something which looks like something innocent and is used for some less innocent purpose. The same thing happens in computers. You may sometimes get some program, via ICQ, or via Usenet, or via IRC, and believe this program to be something good, while in fact running it will do something less nice to your computer. Such programs are called Trojan horses. It is accepted to say that the difference between a Trojan horse and a virus, is that a virus has the ability to self-replicate and to distribute itself, while a Trojan horse lacks this ability. A special type of Trojan horses, is RATs (Remote Access Trojans, some say “remote admin Trojans”). These Trojans once executed in the victim’s computer, start to listen to incoming communication from a remote matching program that the attacker uses. When they get instructions from the remote program, they act accordingly, and thus let the user of the remote program to execute commands on the victim’s computer. To name a few famous RATs, the most common are Netbus, Back-Orifice, and SubSeven (which is also known as Backdoor-G). In order for the attacker to use this method, your computer must first be infected by a RAT.
Prevention of infections by RATs is no different than prevention of infection by viruses. Antivirus programs can identify and remove most of the more common RATs. Personal firewalls can identify and block remote communication efforts to the more common RATs and by thus blocking the attacker, and identifying the RAT.

Posted January 21, 2011 by psanni in PC Info

Tagged with

What is Registry?   Leave a comment

What is Registry?

The Registry contains information that Windows continually references during operation, such as profiles for each user, the applications installed on the computer and the types of documents that each can create, property sheet settings for folders and application icons, what hardware exists on the system, and the ports that are being used.

The Registry replaces most of the text-based .ini files that are used in Windows 3.x and MS-DOS configuration files, such as the Autoexec.bat and Config.sys. Although the Registry is common to several Windows operating systems, there are some differences among them.

A registry hive is a group of keys, subkeys, and values in the registry that has a set of supporting files that contain backups of its data. The supporting files for all hives except HKEY_CURRENT_USER are in the %SystemRoot%\System32\Config folder on Windows NT 4.0, Windows 2000, Windows XP, Windows Server 2003, and Windows Vista. The supporting files for HKEY_CURRENT_USER are in the %SystemRoot%\Profiles\Username folder. The file name extensions of the files in these folders indicate the type of data that they contain. Also, the lack of an extension may sometimes indicate the type of data that they contain.

Posted January 11, 2011 by psanni in Information

What Is MBR?   Leave a comment

Short for Master Boot Record, MBR is also sometimes referred to as the master boot block and is the first Sector of the computer hard disk drive used to determine what partition a computer will boot. The MBR tells the computer where to find and how to load the operating system. It also tells the computer how the hard drive is organized and provides information about the drive’s partitions.
The master boot record is located on the first sector of the hard drive; it’s the first program the computer runs after performing a memory check and looking for a bootable disk. The MBR is also susceptible to boot sector viruses that can corrupt or delete the MBR, which can leave the hard drive unusable and prevent the computer from booting up. A well-known MBRvirus is the Stone Empire Monkey Virus.
That To Safe your MBR there Is Simple C Source Code that Can use full to Back up your Computer MBR.

Source Code Download Here

Posted January 3, 2011 by psanni in Information

What is IP Spoofing?   Leave a comment

An IP (Internet Protocol) address is the address that reveals the identity of your Internet service provider and your personal Internet connection. The address can be viewed during Internet browsing and in all of your correspondences that you send.

IP spoofing hides your IP address by creating IP packets that contain bogus IP addresses in an effort to impersonate other connections and hide your identity when you send information. IP spoofing is a common method that is used by spammers and scammers to mislead others on the origin of the information they send.

How IP Spoofing Work?/p>

The Internet Protocol or IP is used for sending and receiving data over the Internet and computers that are connected to a network. Each packet of information that is sent is identified by the IP address which reveals the source of the information.

When IP spoofing is used the information that is revealed on the source of the data is not the real source of the information. Instead the source contains a bogus IP address that makes the information packet look like it was sent by the person with that IP address. If you try to respond to the information, it will be sent to a bogus IP address unless the hacker decides to redirect the information to a real IP address.

Posted January 2, 2011 by psanni in Information

What is Hacking ?   Leave a comment

Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. People who engage in computer hacking activities are often called hackers. Since the word “hack” has long been used to describe someone who is incompetent at his/her profession, some hackers claim this term is offensive and fails to give appropriate recognition to their skills.

Computer hacking is most common among teenagers and young adults, although there are many older hackers as well. Many hackers are true technology buffs who enjoy learning more about how computers work and consider computer hacking an “art” form. They often enjoy programming and have expert-level skills in one particular program. For these individuals, computer hacking is a real life application of their problem-solving skills. It’s a chance to demonstrate their abilities, not an opportunity to harm others.

Posted December 31, 2010 by psanni in Information

How to get Your Computer IP Address..   2 comments

How to get Computer IP

To get Computer IP Address First  Download this Application in your  PC.

And Simpply run it And Click on Get IP.

And in Few moment Your IP is Shown.

Download link:

http://hotfile.com/dl/93053671/21ef0e9/IP_Checker.rar.html

Posted December 31, 2010 by psanni in Network