Search This Blog

Saturday, January 30

Tutorial : Setting Cyber gate RAT : Hacking !!

Cyber Gate Tutorial

Firstly, Start off by downloading Cybergate RAT:
Or Here:

Now, Go to

Sign Up and everything. now log in and press Add Host

Now name your host to whatever you want.. i will name my host to Just follow theese settings and press Create Host.

Congratulations! You are done with The No-Ip! :)

Let's move on with the Cybergate RAT

Open Up Cybergate.. (Wich you downloaded in the beginning)

Now click Control Center - Start

Click Control Center - Options - Select Listening Ports And Do Following:

Good, You Are Done With The Settings! Now, let's move on to the Virus Creation :).

Click Control Center - Builder - Create Server. Make a new User named Hacking. Press Ok.

Mark the user "Hacker" And press Forward.

Now you should have something like this;

Press | Port 999 and press Delete..:

After that, Click Add.

Now, A Box should pop up saying: Like this:

Remove everything and change it with the No-ip adress you host you added.. So let's say you used Change to and the :81.. Since we used port 82, Change :81 to :82, so it should look like this:

But since my No-ip adress was, i have to change it to MY. but i keep the :82...

Now Change the
Identification: remote
Password: cybergate

To This:
Identification: Cyber
Password: 123456

Good! You are now done with that :). Let's move on to "Installation"

Use the Exact same settings as i do. :

Good, We Skip Message. We Skip Keylogger. In the Anti Debug Have everything checked

In The Build Server: Use Google Chrome Passes and UPX.. (Makes the server smaller)

And press Create Server. Good, You do now have your RAT server complete!

How to port forward..

Go to and lookup your Router, there shall be a guide on how to port forward on it :). and if you are on a modem.. then you don't need to port forward.

Enter Start - Run . Command. Type Ipconfig

In the "Standard Gateway", That is your Router IP. Type that into your web browser. Log in, And Port forward port: 82

Restart your router and you are done! :).. Just send the RAT Server to any victim OUTSIDE your network.

Hope you liked this tutorial.. It took me about an hour with all the pictures :P... I had 22, but the damn Image limit.. you know ;)..


Sunday, January 24

Windows 7 tips, tricks and secrets !!! Help and advice for your Windows 7 !!!

 Explore God Mode
Windows 7 has changed Control Panel a little, but it's still too difficult to locate all the applets and options that you might need. God Mode, however, while not being particularly godlike, does offer an easier way to access everything you could want from a single folder.

To try this out, create a new folder and rename it to:

The first part, "Everything" will be the folder name, and can be whatever you want: "Super Control Panel", "Advanced", "God Mode" if you prefer.

The extension, ED7BA470-8E54-465E-825C-99712043E01C, must be entered exactly as it is here, though, including the curly brackets. When you press [Enter] this part of the name will disappear, and double-clicking the new folder will display shortcuts to functions in the Action Centre, the Network and Sharing Centre, Power options, troubleshooting tools, user accounts and others - more than 260 options in total.

 Right-click everything
At first glance Windows 7 bears a striking resemblance to Vista, but there's an easy way to begin spotting the differences - just right-click things.

Right-click an empty part of the desktop, for instance, and you'll find a menu entry to set your screen resolution. No need to go browsing through the display settings any more.

Right-click the Explorer icon on the taskbar for speedy access to common system folders: Documents, Pictures, the Windows folder, and more.

And if you don't plan on using Internet Explorer then you probably won't want its icon permanently displayed on the taskbar. Right-click the icon, select 'Unpin this program from the taskbar', then go install Firefox, instead.
 Display the old taskbar button context menu
Right-click a taskbar button, though, and you'll now see its jumplist menu. That's a useful new feature, but not much help if you want to access the minimize, maximize, or move options that used to be available. Fortunately there's an easy way to get the old context menu back - just hold down Ctrl and Shift as you right-click the taskbar button.

 Desktop slideshow
Windows 7 comes with some very attractive new wallpapers, and it's not always easy to decide which one you like the best. So why not let choose a few, and let Windows display them all in a desktop slideshow? Right-click an empty part of the desktop, select Personalise > Desktop Background, then hold down Ctrl as you click on the images you like. Choose how often you'd like the images to be changed (anything from daily to once every 10 seconds), select Shuffle if you'd like the backgrounds to appear in a random order, then click Save Changes and enjoy the show.

DESKTOP SLIDESHOW: Select multiple background images and Windows will cycle through them

 RSS-powered wallpaper
And if a slideshow based on your standard wallpaper isn't enough, then you can always create a theme that extracts images from an RSS feed. For example, Long Zheng has created a few sample themes to illustrate how it works. Jamie Thompson takes this even further, with a theme that always displays the latest BBC news and weather on your desktop. And MakeUseOf have a quick and easy tutorial showing how RSS can get you those gorgeous Bing photographs as your wallpaper. Or you can watch our custom theme video tutorial.

 Customise the log-on screen
Changing the Windows log-on screen used to involve some complicated and potentially dangerous hacks, but not any more - Windows 7 makes it easy.

First, browse to HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\Background in REGEDIT, double-click the DWORD key called OEMBackground (not there? Create it) and set its value to 1.

Now find a background image you'd like to use. Make sure it's less than 256KB in size, and matches the aspect ratio of your screen as it'll be stretched to fit.

Next, copy that image into the %windir%\system32\oobe\info\backgrounds folder (create the info\backgrounds folders if they don't exist). Rename the image to backgroundDefault.jpg, reboot, and you should now have a custom log-on image.

Alternatively, use a free tweaking tool to handle everything for you. Logon Changer displays a preview so you can see how the log-on screen will look without rebooting, while the Logon Screen Rotator accepts multiple images and will display a different one every time you log on.

 Recover screen space
The new Windows 7 taskbar acts as one big quick launch toolbar that can hold whatever program shortcuts you like (just right-click one and select Pin To Taskbar). And that's fine, except it does consume a little more screen real estate than we'd like. Shrink it to a more manageable size by right-clicking the Start orb, then Properties > Taskbar > Use small icons > OK.

Enjoy a retro taskbar
Windows 7 now combines taskbar buttons in a way that saves space, but also makes it more difficult to tell at a glance whether an icon represents a running application or a shortcut. If you prefer a more traditional approach, then right-click the taskbar, select Properties, and set Taskbar Buttons to "Combine when taskbar is full". You'll now get a clear and separate button for each running application, making them much easier to identify.

 Remove taskbar buttons
One problem with the previous tip is the buttons will gobble up valuable taskbar real estate, but you can reduce the impact of this by removing their text captions. Launch REGEDIT, browse to HKEY_CURRENT_USER\Control Panel\Desktop\WindowMetrics, add a string called MinWidth, set it to 54, and reboot to see the results.

Restore the Quick Launch Toolbar
If you're unhappy with the new taskbar, even after shrinking it, then it only takes a moment to restore the old Quick Launch Toolbar.

Right-click the taskbar, choose Toolbars > New Toolbar, type "%UserProfile%\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch" (less the quotes) into the Folder box and click Select Folder.

Now right-click the taskbar, clear 'Lock the taskbar', and you should see the Quick Launch toolbar, probably to the right. Right-click its divider, clear Show Text and Show Title to minimise the space it takes up. Complete the job by right-clicking the bar and selecting View > Small Icons for the true retro look.

Custom power switch
By default, Windows 7 displays a plain text 'Shut down' button on the Start menu, but it only takes a moment to change this action to something else. If you reboot your PC a few times every day then that might make more sense as a default action: right-click the Start orb, select Properties and set the 'Power boot action' to 'Restart' to make it happen.

 Auto arrange your desktop
If your Windows 7 desktop has icons scattered everywhere then you could right-click it and select View > Auto arrange, just as in Vista. But a simpler solution is just to press and hold down F5, and Windows will automatically arrange its icons for you.

 Disable smart window arrangement
Windows 7 features interesting new ways to intelligently arrange your windows, so that (for example) if you drag a window to the top of the screen then it will maximise. We like the new system, but if you find it distracting then it's easily disabled. Run REGEDIT, go to HKEY_CURRENT_USER\Control Panel\Desktop, set Window Arrangement Active to 0, reboot, and your windows will behave just as they always did.

 Browse your tasks
If you prefer the keyboard over the mouse, you will love browsing the taskbar using this nifty shortcut. Press Windows and T, and you move the focus to the left-most icon on the taskbar. Then use your arrow keys to change the focus to other icons, and you get a live preview of every window.

Display your drives
Click Computer in Windows 7 and you might see a strange lack of drives, but don't panic, it's just Microsoft trying to be helpful: drives like memory card readers are no longer displayed if they're empty. We think it's an improvement, but if you disagree then it's easy to get your empty drives back. Launch Explorer, click Tools > Folder Options > View and clear 'Hide empty drives in the computer folder'.

 See more detail
The new and improved Windows 7 magnifier offers a much easier way to zoom in on any area of the screen. Launch it and you can now define a scale factor and docking position, and once activated it can track your keyboard focus around the screen. Press Tab as you move around a dialog box, say, and it'll automatically zoom in on the currently active control.

Did Windows 7 "Spontaneously" Reboot?

When certain errors occur, Windows 7 will reboot itself. This apparently random behavior is actually built in to the system in the event of a system failure (also called a stop error or a blue screen of death -- BSOD). By default, Windows 7 writes an error event to the system log, dumps the contents of memory into a file, and then reboots the system. So, if your system reboots, check the Event Viewer to see what happened.

You can control how Windows 7 handles system failures by following these steps:

1. Select Start, type systempropertiesadvanced, and press Enter to open the System Properties dialog box with the Advanced tab displayed.
2. In the Startup and Recovery group, click Settings; the Startup and Recovery dialog box appears.

Use the Startup and Recovery dialog box to configure how Windows 7 handles system failures.

3. Configure how Windows 7 handles system failures using the following controls in the System Failure group:
Write an Event to the System Log -- Leave this check box activated to have the system failure recorded in the system log. This enables you to view the event in the Event Viewer.
Automatically Restart -- This is the option that, when activated, causes your system to reboot when a stop error occurs. Deactivate this check box if you want to avoid the reboot. This is useful if an error message appears briefly before Windows 7 reboots. By disabling the automatic restart, you give yourself time to read and write down the error message.

If the BSOD problem occurs during startup, your computer winds up in an endless loop: You reboot, the problem occurs, the BSOD appears, and then your computer reboots. Unfortunately, the BSOD appears only fleetingly, so you never have enough time to read (much less record) the error message. If this happens, display the Windows Boot Manager menu (refer to Chapter 4, Customizing Startup and Shutdown"), press F8 to display the Advanced Boot Options menu, and then select the Disable Automatic Restart on System Failure item. This tells Windows 7 not to reboot after the BSOD appears, so you can then write down the error message and, hopefully, successfully troubleshoot the problem.
Write Debugging Information -- This list determines what information Windows 7 saves to disk (in the folder specified in the text box below the list) when a system failure occurs. This information -- it's called a memory dump -- contains data that can help a tech support employee determine the cause of the problem. You have four choices:

None -- No debugging information is written.

Small Memory Dump (128 KB) -- This option writes the minimum amount of useful information that could be used to identify what caused the stop error. This 128KB file includes the stop error number and its description, the list of running device drivers, and the processor state.

Kernel Memory Dump -- This option writes the contents of the kernel memory to the disk. (The kernel is the Windows 7 component that manages low-level functions for processor-related activities such as scheduling and dispatching threads, handling interrupts and exceptions, and synchronizing multiple processors.) This dump includes memory allocated to the kernel, the hardware abstraction layer, and the drivers and programs used by the kernel. Unallocated memory and memory allocated to user programs are not included in the dump. This information is the most useful for troubleshooting, so I recommend using this option.
Complete Memory Dump -- This option writes the entire contents of RAM to the disk.


Windows 7 first writes the debugging information to the paging file -- Pagefile.sys in the root folder of the %SystemDrive%. When you restart the computer, Windows 7 then transfers the information to the dump file. Therefore, you must have a large enough paging file to handle the memory dump. This is particularly true for the Complete Memory Dump option, which requires the paging file to be as large as the physical RAM, plus 1 megabyte. The file size of the Kernel Memory Dump is typically about a third of physical RAM, although it may be as large as 800MB. If the paging file isn't large enough to handle the dump, Windows 7 writes only as much information as can fit into the paging file. I showed you how to check and adjust the size of the paging file in Chapter 6, "Tuning Windows 7's Performance."
See "Changing the Paging File's Location and Size,"

Overwrite Any Existing File -- When this option is activated, Windows 7 overwrites any existing dump file with the new dump information. If you deactivate this check box, Windows 7 creates a new dump file with each system failure. Note that this option is enabled only for the Kernel Memory Dump and the Complete Memory Dump (which by default write to the same file: %SystemRoot%Memory.dmp).

4. Click OK in all the open dialog boxes to put the new settings into effect.

Friday, January 22

Tutorial : Cracking AntiVirus Program written by iBruteforce

AntiVirus Program Collection

-What is an Anti Virus program?
An antivirus is a computer program that detects, prevents, and takes action to disarm or remove malicious software programs, such as viruses and worms. You can help protect your computer against viruses by using an antivirus program.
Computer viruses are software programs that are deliberately designed to interfere with computer operation, record, corrupt, or delete data, or spread themselves to other computers and throughout the Internet.
To help prevent the most current viruses, you must update your antivirus program regularly.
The following programs are essential for your computers security. It is advised you use one of the following programs, or another antivirus of your choice.
Remember, the health of your computer and your personal files are at risk without one!

-Anti Virus Programs

1) Avast! Professional Edition
Avast 4 Professional Edition is a complete ICSA & Checkmark certified antivirus, Checkmark certified anti-spyware & anti-rootkit software package for corporate and advanced home use. Avast Professional Edition includes an on demand scanner with two user interfaces, a skinnable simple interface: just select what you want to scan and in which way and press the play button, an enhanced user interface: Outlook like UI allows users to set any feature of Avast, prepare and run tasks, store and check task results, on access scanner: special providers to protect: most available e-mail clients, instant messaging: ICQ or Miranda, network traffic: lightweight firewall, P2P protection for Kazaa, BitTorrent, Web shield: all HTTP traffic, script blocker. avast Professional Edition is available in 32 languages. Small, true incremental, updates are downloaded and installed automatically.

[Image: avast_demo.png]

Click here to download Avast! Professional!


More serials here!

2) Eset NOD32
Built on the award-winning ThreatSense engine, ESET NOD32 Antivirus proactively detects and disables more viruses, trojans, worms, adware, spyware, phishing, rootkits and other Internet threats than any program available. ESET NOD32 Antivirus provides: 1) Proactive Protection - multiple layers of detection protecting you from Internet threats before it is too late. 2) Precise Detection - accurately identifies known and unknown threats; it consistently wins top awards from testing labs and is recognized for having zero false positives. 3) Lightweight Design - requires less memory and CPU power, allowing your computer to run fast and have more room for games, web browsing, and emailing. 4) Fast Scanning Speeds - highly efficient program ensures fast file scanning and product updates; it runs quietly in the background.

[Image: 34sqkgi.png]

Click here to download ESET Nod32!

3) Avira AntiVir Personal
Avira AntiVir Personal Free Antivirus is a comprehensive, easy to use antivirus program, designed to offer reliable free of charge virus protection to home-users only. Avira offers: Extensive Malware Recognition of viruses, Trojans, backdoor programs, worms; Automatic incremental updates of antivirus signatures, engine and entire software; Permanent virus protection, with Virus Guard real time monitoring; Install and configuration in just a couple of steps, setup to protect your PC in minutes; Virus protection against known and unknown threats, using an advanced heuristic system; Scheduler where you can set the scanner to make automatic virus scans or updates on your system; Forum and phone support; Knowledge Base with virus descriptions available on web site; Rootkit Detection and Removal; A modularized AV-search engine for improved scan performance.

[Image: avira-antivir-9-free-edition-download.jpg]

Click here to download Avira AntiVirus!

4) PC Tools AntiVirus
PC Tools AntiVirus Free Edition protects you against the most nefarious cyber-threats attempting to gain access to your PC and personal details. Going online without protection against the latest fast-spreading viruses, worms and Trojans can result in infections within minutes. Once infected, the virus will usually attempt to spread itself to your friends, family and associates by accessing your e-mail contacts and networked PCs. The infection may also allow hackers to access files on your PC, use it to launch attacks against other computers and Websites or to send mass spam email. That's why PC Tools AntiVirus Free Edition provides protection, with rapid database updates, IntelliGuard real-time file, Internet & e-mail protection and comprehensive system scanning to ensure your system remains safe and virus free.

[Image: pc_tools_antivirus_software_free.jpg]

Click here to download PC Tools AntiVirus!

5) Panda Cloud AntiVirus
Panda Cloud Antivirus protects you while you browse, play or work and you won't even notice it. It is extremely light as all the work is done in the cloud. It provides you with the fastest protection against the newest viruses thanks to its cloud-scanning from PandaLabs' servers. Panda Cloud Antivirus is truly install and forget. Don't worry about updates, configuration or complicated decisions ever again.

[Image: panda-cloud-antivirus.jpg]

Click here to download Panda Cloud AntiVirus!

6) Bitdefender 10
Benefiting from previous experience, the new BitDefender Free Edition was designed with a centralized management console, which allows protection options configuration for all BitDefender modules. It is enough to open the management console in order to have access to all modules: Virus Scan, Scheduler, Live! Update, Quarantine, Reports. On demand scanning - Powerful scan engines ensure detection and removal of all viruses in the wild every time you need it. You can schedule the checking of your system at any time, periodically, without any other intervention. With just a right click you can check your files and folders. Automatic and manual update are available. Intelligent update of antivirus protection, without your intervention. The update can be done from the network over the Internet, directly or through a Proxy Server. There are over 90,000 Virus Definitions.

[Image: details_bitdefender-free-edition-10-build-247.gif]

Click here to download Bitdefender!

7) AVG Anti Virus
AVG Free Edition is the well-known antivirus protection tool. AVG Free is available free of charge to home users for the life of the product. Rapid virus database updates are available for the lifetime of the product, thereby providing the high level of detection capability that millions of users around the world trust to protect their computers. AVG Free is easy to use and will not slow your system down (low system resource requirements. Highlights include automatic update functionality, the AVG Resident Shield, which provides real-time protection as files are opened and programs are run, free Virus Database Updates for the lifetime of the product, and AVG Virus Vault for safe handling of infected files.

[Image: 1089__AVGfree4.png]

Click here to download AVG AntiVirus!

8) Microsoft Security Essentials
Microsoft Security Essentials provides real-time protection for your home PC that guards against viruses, spyware, and other malicious software.

Microsoft Security Essentials is a free download from Microsoft that is simple to install, easy to use, and always kept up to date so you can be assured your PC is protected by the latest technology. It’s easy to tell if your PC is secure — when you’re green, you’re good. It’s that simple.

Microsoft Security Essentials runs quietly and efficiently in the background so that you are free to use your Windows-based PC the way you want—without interruptions or long computer wait times.

[Image: 1246502157.png]

Click here to download Microsoft Security Essentials!

We here  by declare that we will not be responsible for any loose to your system,network or where ever you use above solution. All risk will be bared by user. This tutorial meant for education purpose only 

Thursday, January 21

Tutorial : crack NORTON 360 All in one security : Courtesy :M.sidhu, HJ-Team

[Image: vijfbs.jpg]




Online identity protection

Web site authentication

Two Way Firewall

2GB secure online storage**

PC security defends you against a broad range of threats

Transaction security safeguards you against online identity theft

Automatic backup and restore protects your important files from loss

PC tuneup keeps your PC running at peak performance

Embedded support components diagnose problems and help you quickly resolve common issues

Includes free support via email and live chat

Includes 2GB of online storage for photos, music, contacts, & financial documents (option to purchase additional storage)**

Includes protection updates and new product features as available throughout the renewable service period*

On-going Protection keeps your computer protected from the latest Internet risks by automatically renewing your subscription at the regular subscription price (plus applicable tax), so you don't have to. For more information, click here.

Windows® XP, Windows Vista™

Connect securely to any wireless hotspot
Block hackers from accessing your computer
Prevent unknown threats from entering your PC
Exchange documents freely using email and instant messaging

Remove viruses from email
Block Internet worms at point of entry
Surf the Web and play games online without worry

Stop spyware from tracking you online
Block spyware from hijacking your computer
Bank, shop, and invest online with confidence

Guard against online identity theft
Inspect Web sites to make sure they're not fakes
Safely download photos, music, and software

Remove dangerous threats from files you download
Block suspicious programs
Allow only authorized programs to connect to the Internet
Back up the files you care about

Protect valuable files from computer disasters
Restore damaged or deleted files and folders
Enjoy secured online storage service**
Tune up your PC and optimize its performance

Find and fix problems that slow your computer
Remove unwanted Internet clutter and temporary files

300MHz or higher processor
256MB of RAM
300MB of available hard disk space
Operating Systems Supported
Windows® XP Home/XP Pro/XP Media 2005+, Windows Vista™ Home Basic/ Home Premium/Business/Ultimate***
***Additional Windows Vista Requirements
Must meet minimum Windows Vista operating system requirements
Phishing protection feature available only on 32 bit Explorer

Phishing Protection feature requires Microsoft Internet Explorer® 6.0 or higher

Online backup feature requires high-speed Internet connection

Email scanning supported for POP3-compatible email clients

Required for all installations

DVD or CD-ROM drive
Standard Web browser

Take a minute to make a norton account


1. Unrar

[Image: 2116xko.jpg]


Open Keygen And dont closed

[Image: 21dg685.jpg]

[Image: 25psc43.jpg]

[Image: 2mfekuh.jpg]

After attempting to do online activation two times, it will fail
and open a browser window, close the browser window and press that
big fat button in the keygen that says "Click Here to Enable Phone

[Image: 286r11z.jpg]

[Image: ml2ych.jpg]

[Image: 1z4damu.jpg]


[Image: vhytzn.jpg]

[Image: 149nlsl.jpg]

Download Norton 360 and keygen included 11 years license

Norton 360 Download

Keygen Download


Courtesy :M. Sidhu

The user will be responsible for anything wrong happened to his/her system.This blog will not take any responsibility for any kind of lose. we are just providing information.

Wednesday, January 20

Tutorial : Creating Web Proxy Server

Here, today I’m going to discuss free and easiest way to build your own Windows based web Proxy Server in simple and easy steps that anyone with basic knowledge of networking & Administrative privilege can use it to increase the label of there Security.

Software Requirements:

Steps involved in Installation & Configuration:
1. Install OpenSSH on your PC

2. Install Privoxy on your PC/Server

3. Now install Putty/PortaPutty and PortableFirefox on your thumbdrive.

4. Now as you have already installed OpenSSH just run it once and make sure SSHD service is running as system account and server is configured to respond on port/socket 443, also make sure you are able to SSH into your server from another machine on the same network.

5. Configure Privoxy to run as a service and make sure port number is set to communicate on default port 8112.

6. Now double click Putty to open its basic configuration window and specify the following:
* Hostaname(or IP address) : ip_address_of_server
* Port : 443
* Protocol : SSH

7. Now Go to SSH>Tunnels, and make the following entry within specified field:
* Source Port : 8118
* Destination :
* Click on radio button to select Local, Auto

8. Now Go back to the Session section where you specified Hostname(IPAddress), and Save this whole session with a new name.

9. Now finally Open Firefox and Go to Tools>Option>General tab>Connection Settings and select Manual Proxy Configuration:
* HTTP Proxy :
* Port : 8118
* SOCKS v5

10. Save this configuration and you are done.

Now all your web traffic is set to walk through the Proxy Server’s path which is configured in Putty, here in Putty it is configured to reroute all your web traffic to the server you are connecting through port 8118.

Here Thumdrive is used for your mobility and it is optional. For those who want to configure it on there system they can repeat the same with there favorite browser either Opera or IExplorer

Tutorial : Crack Kaspersky Internet Security 2010 (HJT Team member)

Keep in mind this is PC only.

Step 1:

Download the trial here for KIS 2010 :

(I choose version 2010 then click english)

Open KIS 2010 after downloaded and installed, then go to Settings.
[Image: efp9o4.png]

Now it opens a window, go to options, and untick Self-Defense.
[Image: fkn1bk.png]

Then click apply. Now to exit the program after changes are applied. Go down to your task menu and click exit.
[Image: 2u7t0nq.png]

It may say something like this. If so then just close all open internet connections like browser etc then exit again.
[Image: bg9y8p.png]

Now after you are sure Kaspersky is closed, go to Run --> then regedit
[Image: mj05sx.png]

It will open a page and you'll see all these strings. Don't worry, I'll guide you through it.
[Image: 2znyefr.png]
Go to HKEY_LOCALMACHINE/SOFTWARE/Kasperskylab/protected/av9/environment

Now scroll down to see ProductStatus. It's going to say Release but you need to change it to "Beta" (Without the "").

First click on ProductStatus to highlight it, then go to Edit--> Modify.
[Image: a122o5.png]

Now where it says value data put in Beta then click ok.
[Image: ncczcz.png]

Now just exit out of the registry editor after you are sure you have followed my instructions correctly.

Now go ahead and open KIS again. If you have already installed a key, it will do some weird things, just go to License and delete the key. Go ahead and turn Self-Defense back on now.

Now click on license at the bottom of the KIS 2010 window, click "Activate new license" then select "Activate Beta License" (You need an internet connection for this step).

You will have a 30 day license like shown below (mine is 29 because I used it for a day).
[Image: 29momqo.png]

So it will be activated, it will say Beta but have all the features of the normal version. If you want to get it for another 30 days, over and over (making it unlimited) just do this.

Quote:To reset the license to 30 days, disable Self-Defence, remove existing key in use, restart Kaspersky, and "Activate Beta" once again.
To reset the license to 30 days, disable Self-Defense, remove existing key in use, restart Kaspersky, and "Activate Beta" once again.

-Whoever made the patch, even though I prefer the manual way like shown above

This tutorial is courtesy HJT Team, I am not at all responsible for any ill effect due to this tutorial. User will do any action at own his risk. 

Tuesday, January 19

Information & Tutorial :How to stay safe on internet !!!!

History of Malicious Programs
Virus Databases & Solutions
Malicious Programs & Informatinos about them

Today I will teach you how to stay safe on the internet, and avoid getting infected.
As you know there are many viruses on the internet such as: trojans, worms, adwares etc. Most of people get infected when download keygens, cracks, game hacks etc. All of those programs are fake and can contain malicious program also called virus.

Anti-virus companies treat cracked games as viruses, so you cannot know is it really a virusor not. The first thing you should do after downloading, is scanning on free online scanners such as Virustotal or NoVirusThanks. If the file has around more then 100Mb then it all depends on your knowledge and trust.

Pirate games from torrent sites such as: Piratebay or uTorrent, can contain virus. Since your AV will treat it as a virus you don't know is it a file virus infected or clean. Scanning files on Virustotal or NoVirusThanks can be immpossible sometimes because size of file or it will take a lot of time.

History of Malicious Programs

The first spam e-mail was sent in 1978 over the ARPAnet, the Defense Department network that was precursor to today's Internet, by a Digital Equipment Corp. marketing executive named Gary Thuerk to flog a new computer. The epidemics of the past few years have introduced the majority of computer users to viruses, worms and Trojans. The media has also played a role, reporting more and more frequently on the latest cyber threats. However, malicious software is not really new. Although the first computers were not attacked by viruses, this does not mean they were not potentially vulnerable. It was simply that when information technology was in its infancy, not enough people understood computer systems to exploit them. Viruses started appearing on dedicated networks such as the ARPANET in the 1970s. The boom in personal computers, initiated by Apple in the early 1980s, led to a corresponding boom in viruses. As technology has evolved, so have viruses. In the space of a couple of decades, we have seen computers change almost beyond recognition. While the viruses of the 1980s targeted a variety of operating systems and networks, most viruses today are written to exploit vulnerabilities in the most commonly used software: Microsoft Windows. The first malicious programs may have shocked users, by causing computers to behave in unexpected ways. So malicious software has turned into big business. An understanding of contemporary threats is vital for safe computing.

Virus Databases & Solutions

A computer virus is a computer program which copy itself and infect your computer. The term virus is also commonly but erroneously used to refer to other types of malware, adware, and spyware, keylogger programs that do not have the reproductive ability. A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system

Learn more about botnets & protecting yourself from them:
Botnets PART 1 : building a botnet (1/2)
Botnets PART 1 : building a botnet (2/2)

Botnets PART 2 : Botnet Attacks (1/2)
Botnets PART 2 : Botnet Attacks (2/2)

Malicious Programs & Informatinos about them

• Trojan Horses
• Computer Worms
• Adwares and Popus
• Viruses
• Rootkits
• Keystroke loggers(Keyloggers)
• Rogue Programs
• Spams
• Phishing

Trojan Horses

Trojan horses are most dangerous for your computer. They are also known as Backdoors, which fully take control on your computer. Once a Trojan has been installed on your computer, it is possible to hacker access it remotely and do anything he want. Due to the growing popularity of botnets among hackers, Trojan horses are becoming more common. Unlike traditional computer viruses and other types of malware, they are designed with the intention of exploiting infected systems. However, in order for an attacker to gain access to a system, the victim must run an executable server file.


• Use of computers as part of botnet(Distributed Denial of Service aka DDos attack)
• Keystroke logging.
• Trojans can also disable your AV without your knowledge.
• Downloads & Upload files from his computer to your
• Installation of software.
• Data stealing(credit card informations, bank accounts, paypal and other passwords)
• Keylogging keystrokes.
• Using your computer for Spams.
• Making serious damage to your computer(Deleting any file on your PC, including System too!)
• Your computer can be used for spreading viruses(via MSN, P2P chats, forums etc.)

Installation Process

Trojan horses can be installed on your computer throught the following methods:

• Exploits(security holes in webbrowsers, messangers, or other software that allows installation of Trojan Horse)
• Email attachment(this is most popular and easiest way to get infected, so dont open suspice mails)
• Websites containing .exe(Trojan horse which is installed on website page and can be downloaded and executed on your computer without your permission)
• USB infection(You can also get infected, if the USB you use is infected. Sometimes hackers infect your USB and then spread it ever time you plugin to other computer)

How to remove Trojan infection & protect your PC

Well there are many ways to remove infection from your computer, you just need to know what you doing. Well for Trojans you will use Anti-Viruses programs and they must be updated(up-to-date), the updates keep your computer safe. Also there are many other tools: Anti-Spywares(Malwerbyte, SpyBot S&D, Combofix etc.), System cleaners(ATF Cleaner, CClean etc.), debuggers which can run file in box where Trojans cant do anything(Sandboxie, Ollydbg etc.), Firewalls which blocks hackers IP and port which makes Trojan on your computer unusable, Virtual Computer is like debugger but much better because you can install OS on it(Virtual Machine etc.). To download them, just click on linked names of tools and you will get on legit download page.

Useful Video tutorial:
How To Remove Trojan Virus
How to Remove Trojan Virus from your PC
Manually Removing Any Trojan Horse Virus.trojan Zlob Virus Horse Removal

Also checkout this thread:
? Mega Thread: Firewalls, Antivirus and Other security tools ?

Computer Worms

A computer worm is a software program that is designed to copy itself and spread from one computer to another, without users knowledge.(Which means, when you click on file infected by worm, program download & execute other virus from hackers hosting server to your PC). Once installed on machine, worms automatically generate additional email messages containing copies of worm. Worms can also open a port without users permission and make security wholes. In addition to email, worms can also infect computers via web sites, file sharing systems, instant messages, and more.


• It spreads across the Internet using email, instant messaging or P2P(peer-to-peer) file sharing networks
• It may install one or several files on your computer, often masquerading as system files, or with randomly generated names to make removal more difficult
• It makes security wholes, and also some worms are can open a port on your PC without your permission
• The worm can also copy it self it registry which can make manual removal difficult

How to remove Worm infection & protect your PC

Well there is many ways to remove Worm infection, but the best and most effective way to clean a computer that has been infected by an Worm is to use a dedicated removal tool. Even if you have an AV software on your PC that detects the Worm, it may still be safer to remove it using one of these dedicated removal tools. I suggest you free Malicious Software Removal Tool, avast! Virus Cleaner, Symantec’s Removal Tools, SbyBot S&D or MalwerByte. To download them, just click on linked names of tools and you will get on legit download page.

Useful Video tutorial:
Win32/Autorun Worm Remover
Tutorial How To Remove All Spyware ,Virus , Malware ,Worm ,Rouge Program Use Malwarebyte

How to remove Viruses and Spyware manually - Part 1 of 2
How to remove Viruses and Spyware manually - Part 2 of 2

Adwares and Popups

Adware is any software application in which advertising banners are displayed while the program is running. The authors of these applications include additional code that delivers the ads, which can be viewed through pop-up windows or through a bar that appears on a computer screen. Some adware is also shareware, and so the word may be used as term of distinction to differentiate between types of shareware software. Adware can also download and execute Spyware on your computer.

List of well-known adwares & popups(click links):

[x]Adssite Toolbar
[x]AOL Instant Messenger
[x] Toolbar
[x]Bonzi Buddy
[x]Comet Cursor
[x]Foxit PDF Reader
[x]Messenger Plus! Live
[x]Mirar Toolbar
[x]Tribal Fusion
[x]Viewpoint Media Player
[x]Windows Live Messenger
[x]XXX Shop online
[x]XXX Toy
[x]Yahoo! Messenger

How to remove Adware infection & protect your PC

For this, AV wont really help you. To remove adware from your computer you will need to use Ad-adware or XoftSpy(detects over 45,000 diffrent types of adwares) to clean your PC from adwares. To download them, just click on linked names of tools and you will get on legit download page.

Also download one addon for FireFox, its called Adblock Plus and its great against adwares and popups. To download it click this link.

Click for more informations (Click to View)

Useful Video tutorial(s):
Remove Spyware/Adware From Your Computer! With Spybot-S&D
How to remove adware, spyware, dailers, keyloggers, trojans, and protect your usage tracks

A computer virus is program which copy itself and infect other file on your computer. Once when its installed, virus spread over your computer and infect all files. Also there are many types of viruses, spreaders(which can spread over P2P, messangers & other web pages etc.). Some viruses include other viruses, trojans, worms, rootkits, spywares etc. In order to replicate itself, a virus must be permitted to execute code and write to memory. For this reason, viruses are sometimes attached/binded with legitmate programs. In order to avoid detection by users, some viruses employ different kinds of deception. Some old viruses, especially on the MS-DOS platform, make sure that the "last modified" date of a host file stays the same when the file is infected by the virus. Some viruses can also infect files without increasing their sizes or damaging the files. Even if virus is detected some viruses try to avoid detection by killing the tasks associated with antivirus software before it can detect them. Viruses can also try to trick antivirus software by intercepting its requests to the operating system. A more advanced method is the use of simple encryption to encipher the virus. In this case, the virus consists of a small decrypting module and an encrypted copy of the virus code. If the virus is encrypted with a different key for each infected file, the only part of the virus that remains constant is the decrypting module, which would (for example) be appended to the end.


• Spreads itself and infect all files on your computer
• Can be binded with legitmate program, and without your knowledge infect all files on your system
• Can have code which can kill AV before you run virus and make undetectable
• Some viruses can generate their name and make cleaning harder

How to remove Virus infection & protect your PC

To remove virus from your PC you will just need updated AV software. Also download free Anti-Spyware tools from internet, I suggest you MalwerByte, SpyBot S&D or Dr Web curelt etc. To download them, just click on linked names of tools and you will get on legit download page.

Useful Video tutorial(s):
How To Remove Virus Without Using Antivirus Program
How Clean A Patching Virus (Virut or Sality)


Rootkit is a program that enable admin-level acces to a computer. Its something like exploit(security hole) which install rootkit on your computer after obtaining user-level access, either by exploiting a known vulnerability or cracking a password. Once installed, rootkit allows attacker to mask intrusion and gain privileged acces to your computer. Rootkit can also contain spyware or any other type of malicious software. Most rootkits typically hide files, processes, network connections, blocks of memory. Rootkits often modify parts of the operating system or install themselves as drivers or kernel modules, depending on the internal details of an operating system's mechanisms.

About rootkits(click links):

[x]Boot loader


• Can enable admin-level acces to a computer
• Sometimes rootkits can drop spywares, viruses, worms etc.
• Can hide files, processes, network connections etc.
• Rootkits modify parts of the operating system and install themselves as drivers.

How to remove Rootkit infection & Protect your PC

Direct removal of rootkit wont really help. You will need dedicated tool to remove rootkits from your computer. You will need skills or experience to remove any type of rootkits. Option one is to re-install your operating system again or to remove by using some Anti-Rootkit tool. I suggest you to download and install some free Anti-Rootkit(Sophos Anti-Rootkit, Panda Anti-Rootkit, Avira AntiRootkit Tool, SpyBot S&D, Anti Rootkit etc.)

Useful Video tutorial(s):
How to Defeat a Rootkit Without Reinstalling Windows
RootKit detection and removal

Keystroke loggers(Keyloggers)

Keylogger is a software program or hardware device that is used to monitor and log each of the keys you type into a computer keyboard. Once installed the program or hardware device can then view all keys typed in by that you. Because these programs and hardware devices monitor the keys typed in, hacker can easily find your passwords and other information about you(Credit Cards, Bank Accounts, PayPal, Email Account etc.). Keylogger is commonly included in rootkits. A keylogger normally consists of two files: a DLL which does all the work and an EXE which loads the DLL and sets the hook. Therefore when you deploy the hooker on a system. There are two types of keyloggers, spywares & usually offline keylogger. Spywares are usually made for logging your passwords, offline keylogger is visible for you and anyone who use your computer can see logs.


• Log every single keystroke you type in your keyboard
• Some keylogers can take screenshot of your dekstop
• Invisible for human eye
• Sometimes, keyloggers got names like legitmate process
• Low CPU usage and almost invisible

List of well-known keyloggers & removing instructions(click links):

[x]007 Spy Software
[x]AB System Spy
[x]Actual Spy
[x]Ardamax Keylogger
[x]BlazingTools Perfect keylogger
[x]Boss Everyware
[x]Call Online Two
[x]Cummings Keylogger 2.0
[x]Desktop Scout
[x]Elfrah PCSpy
[x]EBlaster 5.0
[x]ElGolf 1.0b
[x]Catch Cheat Spy 1.4

For more informations & Manually Removing instructions click this link.

How to protect your PC from Keyloggers

To remove keylogger you can use any tool AntiVirus, Anti-Spyware or some Anti-Keylogger. AntiVirus(AVG Free, Avast Free and Kaspersky etc.), Anti-Spyware(Malwerbyte, SpyBot S&D, Super Anti-Spyware etc.) and Anti-Keylogger(Advanced Anti-Keylogger, PrivacyKeyboard, Elite Anti Keylogger etc.)

To protect your passwords from being keyloged I suggest you to download (if you use firefox) addon for firefox called Keyscrambler.
Click for more informations (Click to View)

Rogue Programs

Rogue security software is a form of computer malware that deceives or misleads users into paying for the fake or simulated removal of malware. Rogue security software, in recent years, has become a growing and serious security threat in desktop computing.


• Alerting the user with fake or simulated detection of malicious software
• Installing actual malware onto the computer, then alerting you after detecting them.
• Selectively disabling parts of system to prevent you from uninstalling them.
• Deleting parts of system and rebooting the computer
• Presenting offers to fix urgent performance problems or perform essential housekeeping on the computer.

List of well-known rogue programs:

[x]007 Anti-Spyware
[x]2009 Antivirus Downloads
[x]Advanced Virus Protection
[x]Advanced Virus Removal
[x]Advanced Virus Remover
[x]Advanced XP Defender
[x]Advanced XP Fixer
[x]AntiSpyCheck 2.1
[x]Doctor Antivirus
[x]Doctor Antivirus 2008
[x]DriveCleaner 2006

For more informations and full list click this link.

Useful Video tutorial(s):
How to Remove Virus Remover 2008 Rogue/Fake Scanner/Alert Program
REDO Remove Any Rogue(Fake) AntiVirus Program Fake Alert/Scanner


Spam is the abuse of electronic messaging systems to send unsolicited bulk messages indiscriminately. While the most widely recognized form of spam is e-mail spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam, online classified ads spam, mobile phone messaging spam, Internet forum spam, junk fax transmissions, social networking spam, and file sharing network spam.

Instant Messaging Spam

Instant Messaging spam, known also as spim , makes use of instant messaging systems. Although less ubiquitous than its e-mail counterpart, spim is reaching more users all the time. According to a report from Ferris Research, 500 million spim IMs were sent in 2003, twice the level of 2002. As instant messaging tends to not be blocked by firewalls it is an especially useful channel for spammers.

Mobile phone spam

  Mobile phone spam is a form of spamming directed at the text messaging service of a mobile phone. It is described as mobile spamming, SMS spam, text spam, or Spam SMS but is most frequently referred to as m-spam. As the popularity of mobile phones surged in the early 2000s, frequent users of text messaging began to see an increase in the number of unsolicited commercial advertisements being sent to their telephones through text messaging. This can be particularly annoying for the recipient, because unlike email, it is usually difficult or impossible to delete an SMS message without reading it.

Online game messaging spam

Many online games allow players to contact each other via player-to-player messaging, chat rooms, or public discussion areas. What qualifies as spam varies from game to game, but usually this term applies to all forms of message flooding, violating the terms of service contract for the website. This is particularly common in MMORPGs such as World of Warcraft and others where the spammers are trying to sell game related items for real world money, chiefly among these items is in-game currency. This kind of spamming is also called Real Money Trading.

  In World of Warcraft it is common for spammers to advertise sites that sell gold in multiple methods of spam. They send spam via the in game private messaging system, via the in game mailing system, via yelling publicly to everyone in the area and by creating a lot of characters and committing suicide and making a row of bodies resemble a site URL. The URL takes the user to a gold selling website.

Noncommercial spam

E-mail and other forms of spamming have been used for purposes other than advertisements. Many early Usenet spams were religious or political. Serdar Argic, for instance, spammed Usenet with historical revisionist screeds. A number of evangelists have spammed Usenet and e-mail media with preaching messages.

Virus spreading spam (Important to know)

Spam can be used to spread computer viruses, trojan horses or other malicious software. The objective may be identity theft, or worse. Some spam attempts to capitalize on human greed whilst other attempts to use the victims' inexperience with computer technology to trick them.


  In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as user names, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail or instant messaging.

Phone phishing

  Not all phishing attacks require a fake website. Messages that claimed to be from a bank told users to dial a phone number regarding problems with their bank accounts. Once the phone number was dialed, prompts told users to enter their account numbers and PIN. Wishing sometimes uses fake caller-ID data to give the appearance that calls come from a trusted organization.

Website forgery

  Once a victim visits the phishing website the deception is not over. Some phishing scams use JavaScript commands in order to alter the address bar. This is done either by placing a picture of a legitimate URL over the address bar, or by closing the original address bar and opening a new one with the legitimate URL. An attacker can even use flaws in a trusted websites own scripts against the victim. These types of attacks aka cross-site scripting are particularly problematic, because they direct the user to sign in at their bank or service's own web page, where everything from the web address to the security certificates appears correct.

Computer Optimization/Tweaking Programs! (Credit gose to iBrute force)

Computer Optimization/Tweaking Programs!

Why do you need these programs?
There are numerous reasons why you need these.
All the time you're surfing the internet, your computer is becoming bloated with temporary files, cookies, and leftover traces.
All the time your computer is on, your disk & registry is becoming fragmented.
Your computer is being slowed down.
These programs are designed to dramatically improve the speed of your computer, optimize it visually, optimize system settings and fix errors.
Also see program descriptions below.

1) Auslogics Boostspeed

[Image: 30uphyc.png]

Auslogics BoostSpeed - the ideal solution to keep your PC running faster, cleaner and error-free. This powerful optimization suite will boost Internet connections, tweak Windows to its peak performance, clean registry and block annoying ads. It's a great way to keep your computer clean and optimized.

Modify Windows settings, file system and services to greatly increase system performance. Increase startup and shutdown speed, disable annoying CD autorun and error reporting features.

BoostSpeed will keep monitoring your system for possible optimizations and let you know if such optimizations are possible. You can also run the System Optimization Wizard to periodically optimize your PC.

Rating - 10/10

Click here to download Auslogics Boostspeed!

Serial: 6407-F822-A162-B59F-36AE-93FE-0288-0882-09AA
Serial: 6441-F822-A162-0239-E99C-81F9-9B37-4F60-8B5C
Name: Team NOY
Serial: 120D-D33D-C043-98B8-D869-65E3-7529-6CC1-CF80
Serial: 655D-F822-A162-5D22-3359-7E64-444D-225B-A37A

2) Advanced SystemCare V3 Pro

[Image: home.jpg]

Advanced SystemCare Pro provides an always-on, automated, all-in-one PC Healthcare Service with anti-spyware, privacy protection, performance tune-ups, and system cleaning capabilities. This powerful and award-winning precision tool fixes stubborn errors, cleans out clutter, optimizes Internet and download speeds, ensures personal security, and maintains maximum computer performance automatically.

Rating - 10/10

Click here to download Advanced SystemCare!
Alternative Link
~Clean keygen included

3) Tune Up Utilities 2010

[Image: TuneUpUtilities2010.png]

TuneUp Utilities 2010: The complete Windows optimization package.Now including disk defragmenter and brand new cleaning tools! Increase performance: Boosts system performance by defragmenting hard drives; Noticeably speeds up Internet surfing and downloads. Solve problems: Analyses the file system and corrects errors; Checks drives for defects; Prevents data loss; Effortlessly solves common computer and display problems; Restores accidentally deleted files. Customize Windows: Offers more than 400 options to customize Windows; Optimizes Internet connection and browser; Allows to customize the Windows user interface. Free up disk space: Analyzes the storage medium’s content within seconds; Identifies and deletes non-required files; Deactivates unused Windows functions. 1-Click Maintenance: Performs maintenance functions with a single click: When activated, runs in the background and keeps the system in perfect condition: Corrects registry errors and deletes temporary files: Ensures optimum system performance by defragmenting hard drives

Rating - 9.5/10

Click here to download Tune Up Utilities!

Name: Anything
Organization: Anything

4) Comodo System Cleaner

[Image: comodo-system-cleaner-free-computer-cleaner-suite.jpg]

Comodo System Cleaner is the perfect cleaning and maintenance toolkit for those who like to have all the necessary system tools under a single, perfectly organized interface.
All the utilities included in Comodo System Cleaner are grouped into different tabs, according to their purpose: clean-up, tune-up, diagnostics, utilities and miscellaneous. This tabbed interface makes the program easier to use, though sometimes it forces you to browse through different levels until you find the exact tool you're looking for.
In Comodo System Cleaner you'll find a bit of everything from cleaning tools to junk erasing. You can wipe out computer usage traces or remove broken entries in the Windows Registry. The program has utilities that have been especially designed to hide folders, find duplicate files, encrypt documents, rename files, create a complete system report, do some benchmark testing to your computer, and analyze the way your hard drive space is distributed and much more.

Rating - 8/10

Click here to download Comodo System Cleaner!
~Free, no activation needed.

5) WinBubble

[Image: winbubble-3-thumb.png]

In just two clicks, WinBubble will help you to customize and tweak your Windows Vista easily. Its features cover customization, security and optimization. Features: Windows customizations: add/edit OEM logo and information, edit owner information, context menu customizations, customize screensaver (bubbles, ribbon, and mystify), customize and remove the arrow on shortcut icons, desktop icons: show IE, computer, network, control panel, user name folder and public folder to desktop, hacking Windows experience score, re-enable hibernation, show Windows Vista build on desktop, enable slow-down animations, enable/disable Welcome Center.

Rating - 7/10

Click here to download WinBubble!
~Free, no activation needed.

6) Ashampoo WinOptimizer

[Image: 84b4757b3d945df6633c2363654ad65d.jpg]

Ashampoo's extensive pool of knowledge about Windows optimization is the basis for Ashampoo WinOptimizer. The program is designed to enable both novice and advanced users to cleanse and optimize their Windows system and adapt it to their own needs. Easy-to-use menus present the individual modules of Ashampoo WinOptimizer and make it possible to measure system performance, deactivate annoying autostart entries, or delete unnecessary files, all with a mouse click.

Rating - 7.5/10

Click here to download Ashampoo WinOptimizer!


7) EnhanceMyVista

[Image: details_enhancemyvista-pro-2.5.1-1.png]

EnhanceMyVista is an easy to use yet advanced enhancing, optimizing and tweaking tool for Windows Vista.
With a clean and simple interface it brings you an All-in-One set of powerful and neatly classified tools, settings and tweaks.
As a bonus there are some unique and uncommon options too. Being permanetly in development it is the best choice in it's category.

Rating - 8/10

Click here to download Enhance My Vista!
~Free, no activation needed.

8) EnhanceMySe7en

[Image: EnhanceMySe7en.png]

EnhanceMySe7en helps users to control many aspects of the system with maximum convenience.
You will get everything needed for maintaining Windows 7 in a perfect condition. The program offers tools that take care of the registry, disk space and its defragmentation, installed software, HDD temperature and all sorts of things related to system's health. Also there are lots of other options helping to boost your system's performance.
With a clean and simple interface it brings you an All-in-One set of powerful and neatly classified tools, settings and tweaks.

Rating - 9/10

Click here to download EnhanceMySe7en!
~Free, no activation needed.

9) nCleaner

[Image: details_ncleaner-2.3.4.jpg]

nCleaner is a system cleaner that allows you to clean both your system and applications, free more disk space, boost your system's speed and get more stability and privacy protection.
nCleaner contains an advanced system and application cleaner with over 90 cleaning items available, a Registry Cleaner, a Tweak Manager, an advanced Startup Manager, a Junk Finder, a Free Space Shredder, a System Resource Monitor, a System Adviser, supports logging and statistics as well as advanced Scheduling.
Remove unnecessary files like log files and left behind files and registry entries, scan the registry and remove invalid entries to increase performance and stability, and apply performance and privacy related tweaks to your Windows system.
nCleaner also offers memory management, advanced schedule options and real time system resources monitoring.

Rating - 8.5/10

Click here to download nCleaner!
~Free, no activation needed.

10) Tweak Genie

[Image: details_tweak-genie-6.0.0.gif]

Tweak Genie will assist you to manipulate the hidden settings of windows according to your requirements. It gives you full control over these settings. These settings cover various aspects of your windows operating system like Appearance, Security etc. Tweak Genie provides you lot of options to personalize you windows operating system. It has a very user friendly graphical interface which makes it very easy to use.

Rating - 6.5/10

Click here to download Tweak Genie!
~Free, no activation needed.

Other System Cleaners;
CCleaner [click to download]
DCleaner [click to download]
FCleaner [click to download]
LCleaner [click to download]
Sweepi [click to download]
Baku [click to download]

Keep checking back, more programs will be added!