Your Ad Here

Wednesday, April 22, 2009

How to watch DVD files in Mobile Phone 3gp for Free

Its always useful to have a freeware to convert DVD files to 3gp mobile format so that you rip the video files to watch in your mobile devices while you are travelling and to show your friends or for other reasons.
Gogo DVD to 3gp converter is one of the very easy tool to do this [...]


Related posts:
  1. Foxit Reader The Best Adobe Reader Alternative
  2. How to Change Your Voice In Skye With Skype Voice Changer
  3. How To Enable Hotmail POP3 and SMTP in all countries


Read More...
Your Ad Here

How To Make your IE8 Even Faster with Simple Tweak

Ever since Microsoft released IE8 Beta i loved it, i have to say that Microsoft really did their homework there is huge improvement in IE8 and its good step in the right direction
But Microsoft has taken tremendous amount of effort to bring the standards in IE8 as they have been trying with Windows 7 [...]


Related posts:
  1. How To Make Windows Vista Shut Down Faster
  2. How To Surf Web Faster Using OpenDNS
  3. How To Use Torrent a Complete Beginner’s Guide


Read More...
Your Ad Here

Repair CD/DVD Writer

Does anybody know of any utility that will repair the registry entrees in XP for Optical Drives? Or heard of anything just refresh it to when windows was first installed?

I have a Samsung WriteMaster that Ive owned for a few years. Problem is, I used to use Daemon Tools on my machine and when I uninstalled it, it corrupted something in the registry and I cant get the burner to be recognized fully by windows. Windows can "Eject" it, but thats about it. I get an "E: is not accessible." "Incorrect function." error, when I try to open it where it should normally say "Please insert a disk into drive F:". The writemaster and my other optical drive were like "overlapped" on each other, when I changed the volume letter, only then did it even see the other one.

Ive tried all kinds of things.
- Ive tried doing a few microsoft fixes, deleting upper and lowers in the registry. That worked the first time it was corrupted, it didnt work this time.
- Ive removed device from device manager, moved around drive letters, scanned for changes, uninstalled, enabled disabled, rebooted.
- I even went into the registry again and deleted some corrupt keys and stuff.
- In the past (the first time this happened), I managed to flash the firmware, mess with a couple reg keys and it worked. However now I cant, because its so screwed up that it doesnt even recognize that the drive is the right one, so the software for flashing wont even let me flash.

Its getting a weird name too that its not supposed to get when windows installs the drivers. There is no software drivers I know of for this thing. Only firmware, and unless daemon tools corrupted it, that should be fine.

Read More...
Your Ad Here

How to Turn On or Off and Manage Guest Account in Vista?

Sometimes it becomes necessary to setup Guest Account in your laptop or desktop when some friends or your family relatives visit you, so that they can have access to Internet and computer without you fearing about your personal details and still have the privacy in your computer.

1. Go to Control Panel -> User Accounts [...]


Related posts:
  1. Guest Blogging
  2. How To Access Your Google Docs Offline
  3. How To Add Additional Clocks to Windows Vista Taskbar


Read More...
Your Ad Here

Hijack This Log: Win32 error, svhost.exe error, worm???

So my computer starts, and runs for about 3 minutes, then I get two errors. Win32 must be shut down, then svhost.exe, then the instruction @ 0x3700368a something or other must terminate, cant be read... then windows explorere has encountered a problem and must be shut down.

Debug does nothing, adaware doesnt work and now spybot wont run. No programs will open, other than windows base operations, files, etc.. I have to run diagnostics/anti-spyware right in those 3 mins of start.. or in safe mode... and in safe mode it still has trouble.

Windows media wont work, defrag wont work, sys restore wont work, like.. programs wont start... or they open and are just nonresponsive...

Wtf.. heres the log... please help! :)

Btw.. Im on my gfs crappy laptop doing this... it was hell e-mailing the hijack log to myself... lol.

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 11:50:45 PM, on 4/19/2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP3 (6.00.2900.5512)
Boot mode: Safe mode with network support

Running processes:
C:WINDOWSSystem32smss.exe
C:WINDOWSsystem32winlogon.exe
C:WINDOWSsystem32services.exe
C:WINDOWSsystem32lsass.exe
C:WINDOWSsystem32svchost.exe
C:WINDOWSSystem32svchost.exe
C:Program FilesLavasoftAd-AwareAAWService.exe
C:WINDOWSExplorer.EXE
C:Program FilesLavasoftAd-AwareAAWTray.exe
C:Program FilesTrend MicroHijackThisHijackThis.exe

R0 - HKCUSoftwareMicrosoftInternet ExplorerMain,Start Page = http://yahoo.com/
R0 - HKLMSoftwareMicrosoftInternet ExplorerMain,Start Page = http://go.microsoft.com/fwlink/?LinkId= ... ww.msn.com
R1 - HKCUSoftwareMicrosoftWindowsCurrentVersionInternet Settings,ProxyOverride = localhost
R3 - URLSearchHook: (no name) - {EA756889-2338-43DB-8F07-D1CA6FB9C90D} - (no file)
O2 - BHO: (no name) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - (no file)
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:Program FilesAdobeAcrobat 6.0ReaderActiveXAcroIEHelper.dll
O2 - BHO: AOL Toolbar Launcher - {7C554162-8CB7-45A4-B8F4-8EA1C75885F9} - (no file)
O2 - BHO: Adobe PDF Conversion Toolbar Helper - {AE7CD045-E861-484f-8273-0445EE161910} - C:Program FilesAdobeAdobe Acrobat 7.0AcrobatAcroIEFavClient.dll
O3 - Toolbar: Adobe PDF - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - C:Program FilesAdobeAdobe Acrobat 7.0AcrobatAcroIEFavClient.dll
O3 - Toolbar: (no name) - {DE9C389F-3316-41A7-809B-AA305ED9D922} - (no file)
O4 - HKLM..Run: [AdaptecDirectCD] "C:Program FilesRoxioEasy CD Creator 5DirectCDDirectCD.exe"
O4 - HKLM..Run: [Lexmark X1100 Series] "C:Program FilesLexmark X1100 Serieslxbkbmgr.exe"
O4 - HKLM..Run: [diagent] "C:Program FilesCreativeDiagnosticsdiagent.exe" startup
O4 - HKLM..Run: [ShStatEXE] "C:Program FilesNetwork AssociatesVirusScanSHSTAT.EXE" /STANDALONE
O4 - HKLM..Run: [McAfeeUpdaterUI] "C:Program FilesNetwork AssociatesCommon FrameworkUpdaterUI.exe" /StartedFromRunKey
O4 - HKLM..Run: [Logitech Hardware Abstraction Layer] KHALMNPR.EXE
O4 - HKLM..Run: [QuickTime Task] "C:Program FilesQuickTimeQTTask.exe" -atboottime
O4 - HKLM..Run: [iTunesHelper] "C:Program FilesiTunesiTunesHelper.exe"
O4 - HKCU..Run: [ctfmon.exe] C:WINDOWSsystem32ctfmon.exe
O4 - HKCU..Run: [LDM] Program
O4 - HKCU..Run: [updateMgr] "C:Program FilesAdobeAdobe Acrobat 7.0AcrobatAdobeUpdateManager.exe" AcPro7_0_9 -reboot 1
O4 - HKCU..Run: [] C:DOCUME~1DanLOCALS~1Tempv8o5v.exe
O4 - HKCU..Run: [Windows Resurections] C:DOCUME~1DanLOCALS~1Tempv8o5v.exe
O4 - HKCU..Run: [Diagnostic Manager] C:DOCUME~1DanLOCALS~1Temp3280304790.exe
O4 - Global Startup: Adobe Acrobat Speed Launcher.lnk = ?
O4 - Global Startup: Adobe Gamma.lnk = C:Program FilesCommon FilesAdobeCalibrationAdobe Gamma Loader.exe
O4 - Global Startup: Logitech SetPoint.lnk = C:Program FilesLogitechSetPointKEM.exe
O7 - HKCUSoftwareMicrosoftWindowsCurrentVersionPoliciesSystem, DisableRegedit=1
O8 - Extra context menu item: &AIM Search - c:program filesaolaim toolbar 5.0resourcesen-USlocalsearch.html
O8 - Extra context menu item: Convert link target to Adobe PDF - res://C:Program FilesAdobeAdobe Acrobat 7.0AcrobatAcroIEFavClient.dll/AcroIECapture.html
O8 - Extra context menu item: Convert link target to existing PDF - res://C:Program FilesAdobeAdobe Acrobat 7.0AcrobatAcroIEFavClient.dll/AcroIEAppend.html
O8 - Extra context menu item: Convert selected links to Adobe PDF - res://C:Program FilesAdobeAdobe Acrobat 7.0AcrobatAcroIEFavClient.dll/AcroIECaptureSelLinks.html
O8 - Extra context menu item: Convert selected links to existing PDF - res://C:Program FilesAdobeAdobe Acrobat 7.0AcrobatAcroIEFavClient.dll/AcroIEAppendSelLinks.html
O8 - Extra context menu item: Convert selection to Adobe PDF - res://C:Program FilesAdobeAdobe Acrobat 7.0AcrobatAcroIEFavClient.dll/AcroIECapture.html
O8 - Extra context menu item: Convert selection to existing PDF - res://C:Program FilesAdobeAdobe Acrobat 7.0AcrobatAcroIEFavClient.dll/AcroIEAppend.html
O8 - Extra context menu item: Convert to Adobe PDF - res://C:Program FilesAdobeAdobe Acrobat 7.0AcrobatAcroIEFavClient.dll/AcroIECapture.html
O8 - Extra context menu item: Convert to existing PDF - res://C:Program FilesAdobeAdobe Acrobat 7.0AcrobatAcroIEFavClient.dll/AcroIEAppend.html
O9 - Extra button: AIM Toolbar - {3369AF0D-62E9-4bda-8103-B4C75499B578} - C:WINDOWSsystem32shdocvw.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:WINDOWSNetwork Diagnosticxpnetdiag.exe
O9 - Extra Tools menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:WINDOWSNetwork Diagnosticxpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:Program FilesMessengermsmsgs.exe
O9 - Extra Tools menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:Program FilesMessengermsmsgs.exe
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
O16 - DPF: {30528230-99F7-4BB4-88D8-FA1D4F56A2AB} (Installation Support) - C:Program FilesYahoo!CommonYinsthelper.dll
O17 - HKLMSystemCCSServicesTcpip..{89DF1582-B08F-418A-8AAC-80A1EFE81169}: NameServer = 85.255.112.22,85.255.112.130
O17 - HKLMSystemCCSServicesTcpip..{BF3638C6-C731-416B-AC8D-4F095DBB20BF}: NameServer = 71.243.0.12 71.250.0.12
O17 - HKLMSystemCS1ServicesTcpipParameters: NameServer = 85.255.112.22,85.255.112.130
O17 - HKLMSystemCS2ServicesTcpipParameters: NameServer = 85.255.112.22,85.255.112.130
O17 - HKLMSystemCCSServicesTcpipParameters: NameServer = 85.255.112.22,85.255.112.130
O18 - Protocol: bw+0 - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bw+0s - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bw-0 - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bw-0s - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bw00 - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bw00s - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bw10 - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bw10s - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bw20 - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bw20s - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bw30 - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bw30s - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bw40 - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bw40s - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bw50 - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bw50s - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bw60 - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bw60s - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bw70 - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bw70s - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bw80 - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bw80s - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bw90 - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bw90s - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bwa0 - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bwa0s - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bwb0 - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bwb0s - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bwc0 - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bwc0s - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bwd0 - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bwd0s - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bwe0 - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bwe0s - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bwf0 - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bwf0s - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bwfile-8876480 - {9462A756-7B47-47BC-8C80-C34B9B80B32B} - C:Program FilesLogitechDesktop Messenger8876480ProgramGAPlugProtocol-8876480.dll
O18 - Protocol: bwg0 - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bwg0s - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bwh0 - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bwh0s - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bwi0 - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bwi0s - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bwj0 - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bwj0s - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bwk0 - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bwk0s - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bwl0 - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bwl0s - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bwm0 - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bwm0s - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bwn0 - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bwn0s - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bwo0 - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bwo0s - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bwp0 - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bwp0s - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bwq0 - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bwq0s - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bwr0 - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bwr0s - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bws0 - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bws0s - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bwt0 - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bwt0s - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bwu0 - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bwu0s - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bwv0 - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bwv0s - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bww0 - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bww0s - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bwx0 - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bwx0s - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bwy0 - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bwy0s - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bwz0 - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: bwz0s - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O18 - Protocol: offline-8876480 - {D0F26D11-E9E8-4364-B962-0F263A2A5C6B} - C:Program FilesLogitechDesktop Messenger8876480ProgramBWPlugProtocol-8876480.dll
O21 - SSODL: fairydom - {5839511e-ec1b-4f91-ace3-fb88e52f5239} - (no file)
O22 - SharedTaskScheduler: {5839511e-ec1b-4f91-ace3-fb88e52f5239} - fairydom - (no file)
O23 - Service: Adobe LM Service - Adobe Systems - C:Program FilesCommon FilesAdobe Systems SharedServiceAdobelmsvc.exe
O23 - Service: Adobe Version Cue CS2 - Adobe Systems Incorporated - C:Program FilesAdobeAdobe Version Cue CS2binVersionCueCS2.exe
O23 - Service: Apple Mobile Device - Apple, Inc. - C:Program FilesCommon FilesAppleMobile Device SupportbinAppleMobileDeviceService.exe
O23 - Service: Ati HotKey Poller - Unknown owner - C:WINDOWSSystem32Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:WINDOWSSYSTEM32ati2sgag.exe
O23 - Service: Creative Service for CDROM Access - Creative Technology Ltd - C:WINDOWSSystem32CTsvcCDA.exe
O23 - Service: Firebird Server - MAGIX Instance (FirebirdServerMAGIXInstance) - Unknown owner - C:MAGIXCommonDatabasebinfbserver.exe (file missing)
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:Program FilesCommon FilesInstallShieldDriver11Intel 32IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:Program FilesiPodbiniPodService.exe
O23 - Service: Lavasoft Ad-Aware Service - Lavasoft - C:Program FilesLavasoftAd-AwareAAWService.exe
O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:WINDOWSsystem32LEXBCES.EXE
O23 - Service: Local Security Authority Subsystem Service (lsass) - Unknown owner - C:WINDOWSscvhost.exe (file missing)
O23 - Service: McAfee Framework Service (McAfeeFramework) - Network Associates, Inc. - C:Program FilesNetwork AssociatesCommon FrameworkFrameworkService.exe
O23 - Service: Network Associates McShield (McShield) - Network Associates, Inc. - C:Program FilesNetwork AssociatesVirusScanMcshield.exe
O23 - Service: Network Associates Task Manager (McTaskManager) - Network Associates, Inc. - C:Program FilesNetwork AssociatesVirusScanVsTskMgr.exe
O23 - Service: PnkBstrA - Unknown owner - C:WINDOWSsystem32PnkBstrA.exe
O23 - Service: Viewpoint Manager Service - Viewpoint Corporation - C:Program FilesViewpointCommonViewpointService.exe

--
End of file - 20204 bytes

Read More...
Your Ad Here

Trouble Reinstalling

My laptop recently got a virus and I cant use Windows at all (when it turns on it just shows my wallpaper without ANYTHING elce on screen and when I do Task Manager it says its been disabled). So I start up with my boot disk to recover my system, I want to do a clean install. But like always, this are never made easy with Windows.

There are three options:
Install Windows
Recover Windows or
Exit Without Installing Windows.

I tried the recover one first and it got me to a dos black screen and listed "1. CWINDOWS" and then it said which one id like to log into. I said 1 and pressed enter and all it gives me is the same thing "CWINDOWS>" and it asks me for the admin password, I dont know if such a think so I just pressed enter leaving that blank. Then it gives me the CWINDOWS> prompt and lets me type but I have no idea what to do. So I booted again and I went with the other option.

When trying install Windows it seemed as if everything was going OK, it installed it again, and launched it and I see my old Account is still there in the login screen. Meaning it didnt do a clean install at all. And then it tells me "An error has occurred when trying to validate Windows, please activate it" or something along those lines. But ofcource, it cant activate because it doesnt have an internet connection and when i clikc activate by Phone, it says call this following number: and it gives me NO FREAKING NUMBER. THE SPACE IS BLANK!.

SO HOW THE HECK DO I CLEAN MY WHOLE HARDDRIVE AND INSTALL A NEW COPY OF WINDOWS. I just dont understand why this process is so hard. Anyone has any ideas for me so I can actually recover my laptop. All my work stuff depends on me having a laptop and its very inconvenient. Thanks soooo much to anyone that can offer any help on this.

Read More...
Your Ad Here

A Modest Proposal for the Copy and Paste School of Code Reuse


Is copying and pasting code dangerous? Should control-c and control-v be treated not as essential programming keyboard shortcuts, but registered weapons?


keyboard: ctrl-c, ctrl-v


(yes, I know that in OS X, the keyboard shortcut for cut and paste uses "crazy Prince symbol key" instead of control, like God intended. Any cognitive dissonance you may be experiencing right now is also intentional.)


Here's my position on copy and paste for programmers:



Copy and paste doesn't create bad code. Bad programmers create bad code.


Or, if you prefer, guns don't kill people, people kill people. Just make sure that source code isn't pointed at me when it goes off. There are always risks. When you copy and paste code, vigilance is required to make sure you (or someone you work with) isn't falling into the trap of copy and paste code duplication:



Undoubtedly the most popular reason for creating a routine is to avoid duplicate code. Similar code in two routines is a warning sign. David Parnas says that if you use copy and paste while you're coding, you're probably committing a design error. Instead of copying code, move it into its own routine. Future modifications will be easier because you will need to modify the code in only one location. The code will be more reliable because you will have only one place in which to be sure that the code is correct.


Some programmers agree with Parnas, going so far as to advocate disabling cut and paste entirely. I think that's rather extreme. I use copy and paste while programming all the time, but never in a way that runs counter to Curly's Law.


But pervasive high-speed internet -- and a whole new generation of hyper-connected young programmers weaned on the web -- has changed the dynamics of programming. Copy and paste is no longer a pejorative term, but a simple observation about how a lot of modern coding gets done, like it or not. This new dynamic was codified into law as Bambrick's 8th Rule of Code Reuse:



It's far easier and much less trouble to find and use a bug-ridden, poorly implemented snippet of code written by a 13 year old blogger on the other side of the world than it is to find and use the equivalent piece of code written by your team leader on the other side of a cubicle partition.


(And I think that the copy and paste school of code reuse is flourishing, and will always flourish, even though it gives very suboptimal results.)



Per Mr. Bambrick, copy and pasted code from the internet is good because:



  • Code stored on blogs, forums, and the web in general is very easy to find.
  • You can inspect the code before you use it.
  • Comments on blogs give some small level of feedback that might improve quality.
  • Pagerank means that you're more likely to find code that might be higher quality.
  • Code that is easy to read and understand will be copied and pasted more, leading to a sort of viral reproductive dominance.
  • The programmer's ego may drive her to only publish code that she believes is of sufficient quality.


But copy and pasted code from the internet is bad because:



  • If the author improves the code, you're not likely to get those benefits.
  • If you improve the code, you're not likely to pass those improvements back to the author.
  • Code may be blindly copied and pasted without understanding what the code actually does.
  • Pagerank doesn't address the quality of the code, or its fitness for your purpose.
  • Code is often 'demo code' and may purposely gloss over important concerns like error handling, sql injection, encoding, security, etc.


Now, if you're copying entire projects or groups of files, you should be inheriting that code from a project that's already under proper source control. That's just basic software engineering (we hope). But the type of code I'm likely to cut and paste isn't entire projects or files. It's probably a code snippet -- an algorithm, a routine, a page of code, or perhaps a handful of functions. There are several established code snippet sharing services:




Source control is great, but it's massive overkill for, say, this little Objective-C animation snippet:



- (void)fadeOutWindow:(NSWindow*)window{
float alpha = 1.0;
[window setAlphaValue:alpha];
[window makeKeyAndOrderFront:self];
for (int x = 0; x < 10; x++) {
alpha -= 0.1;
[window setAlphaValue:alpha];
[NSThread sleepForTimeInterval:0.020];
}
}


To me, the most troubling limitation of copypasta programming is the complete disconnect between the code you've pasted and all the other viral copies of it on the web. It's impossible to locate new versions of the snippet, or fold your features and bugfixes back into the original snippet. Nor can you possibly hope to find all the other nooks and crannies of code all over the world this snippet has crept into.


What I propose is this:



// codesnippet:1c125546-b87c-49ff-8130-a24a3deda659
- (void)fadeOutWindow:(NSWindow*)window{
// code
}
}


Attach a one line comment convention with a new GUID to any code snippet you publish on the web. This ties the snippet of code to its author and any subsequent clones. A trivial search for the code snippet GUID would identify every other copy of the snippet on the web:



http://www.google.com/search?q=1c125546-b87c-49ff-8130-a24a3deda659


I realize that what I'm proposing, as simple as it is, might still be an onerous requirement for copy-paste programmers. They're too busy copying and pasting to bother with silly conventions! Instead, imagine the centralized code snippet sharing services automatically applying a snippet GUID comment to every snippet they share. If they did, this convention could get real traction virtually overnight. And why not? We're just following the fine software engineering tradition of doing the stupidest thing that could possibly work.


No, it isn't a perfect system, by any means. For one thing, variants and improvements of the code would probably need their own snippet GUID, ideally by adding a second line to indicate the parent snippet they were derived from. And what do you do when you combine snippets with your own code, or merge snippets together? But let's not over think it, either. This is a simple, easily implementable improvement over what we have now: utter copy-and-paste code chaos.


Sometimes, small code requires small solutions.





[advertisement] Improve Your Source Code Management using Atlassian Fisheye - Monitor. Search. Share. Analyze. Try it for free!



Read More...

Your Ad Here

VBA: How do I click OK on pop-up dialogue box

I have a program that goes out to the internet and grabs information, periodically a pop up dialogue box will appear generated by the website, How can I have VBA automatically select OK on any dialogue box that pops up.

Read More...
Your Ad Here

How Not to Conduct an Online Poll


Inside the Precision Hack is a great read. It's all about how the Time Magazine World's Most Influential People poll was gamed. But the actual hack itself is somewhat less impressive when you start digging into the details.


Here's the voting UI for the Time poll in question.


time 100 poll entry


Casting a vote submits a HTTP GET in the form of:


http://www.timepolls.com/contentpolls/Vote.do
?pollName=time100_2009&id=1883924&rating=1


Where id is a number associated with the person being voted for, and rating is how influential you think that person is from 1 to 100. Simple enough, but Time's execution was .. less than optimal.



In early stages of the poll, Time.com didn't have any authentication or validation -- the door was wide open to any client that wanted to stuff the ballot box.


Soon afterward, it was discovered that the Time.com Poll didn't even range check its parameters to ensure that the ratings fell within the 1 to 100 range



The outcome of the 2009 Time 100 World's Most Influential People poll isn't that important in the big scheme of things, but it's difficult to understand why a high profile website would conduct an anonymous worldwide poll without even the most basic of safeguards in place. This isn't high security; this is web 101. Any programmer with even a rudimentary understanding of how the web works would have thought of these exploits immediately.


Without any safeguards, wannabe "hackers" set out to game the poll in every obvious way you can think of. Time eventually responded -- with all the skill and expertise of ... a team who put together the world's most insecure online poll.



Shortly afterward, Time.com changed the protocol to attempt to authenticate votes by requiring a key be appended to the poll submission URL. The key consisted of an MD5 hash of the URL + a secret word (aka 'the salt'). [hackers eventually] discovered that the salt [..] was poorly hidden in Time.com's voting flash application. With the salt extracted, the autovoters were back online, rocking the vote.


So-called secret poorly hidden on the client: check!



Another challenge faced by the autovoters was that if you voted for the same person more often than once every 13 seconds, your IP would be banned from voting. However, it was noticed that you could cycle through votes for other candidates during those 13 seconds. The autovoters quickly adapted to take advantage of this loophole, interleaving up-votes for moot with down-votes for the competition -- ensuring that no candidate received a vote more frequently than once every 13 seconds, maximizing the voting leverage.


Sloppy, incomplete IP throttling: check!


At this point, here's the mental image I had of the web developers running the show at time.com:


a bunch of clowns


Remember my advice from design for evil?



When good is dumb, evil will always triumph.


Well, here's your proof. I'm not sure they come any dumber than these clowns.


The article goes on to document how the "hackers" exploited these truck sized holes in the time.com online voting system to not only put moot on top, but spell out a little message, too, for good measure:



Looking at the first letters of each of the top 21 leading names in the poll we find the message "marblecake, also the game". The poll announces (perhaps subtly) to the world, that the most influential are not the Obamas, Britneys or the Rick Warrens of the world, the most influential are an extremely advanced intelligence: the hackers.


It's a nice sentiment, I suppose. But is it really a precision hack when your adversaries are incompetent? If you want to read about a real hack -- one that took "extremely advanced intelligence" in the face of a nearly unstoppable adversary -- try the black sunday hack. Now that's a hack.





[advertisement] Improve Your Source Code Management using Atlassian Fisheye - Monitor. Search. Share. Analyze. Try it for free!



Read More...

Your Ad Here

I am having big trouble with ialmrnt5 display driver error.

I am using a Dell Inspiron 6000 laptop, and all the time I am getting this ialmrnt5 message, and the screen enlarges with pixalated graphics. At first it would happen a few times, Id just reboot. Now it is driving me completely mental!! I cannot afford a knew machine or even to get some one to look at it. Can someone please help me?

Read More...
Your Ad Here