Most of the info are credit to Hardware Dept and Martino. Beginning Add your own user account pictures If you don't like the user account pictures that come with XP you can add your own. 1. First make sure the picture you choose is fairly square, that's because you have to resize it to 48 x 48 pixels, so you dont want it to distort too much. It also has to be a bitmap (.bmp extension) for it to work. A good graphic utility should take care of both the resizing and saving it into a bitmap. 2.After you have it ready go to the following folder: Ur main HDD:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures (Application Data is a hidden folder) That's the place where all the little account pixies are located, copy the one (or the ones) you had prepared into that folder. 3. Click the Start Button then click over the account picture and it will take you to a new window that tells you to choose another pic for your account look for the one you just created select it, and click the "change picture" button and you're all set Bypass the Recycle Bin when deleting files Right-click on the Recycle Bin and choose Properties On the Global tab check the box that says Do not move files to the Recycle Bin Now you will never have to empty the recycle bin again A Better Disk Cleanup This tip will show you how to create an unattended disk cleanup which will also empty your prefetch folder. This tip assumes you have Windows XP installed in c:\windows. Step 1. Create a new text file and place the following contents inside: c:\windows\system32\cleanmgr.exe /dc /sageset: 1 c: cd \ cd c:\windows\prefetch del *.* /q Step 2. Save the file, changing the extension from .txt to .bat lets call it clean.bat Step 3. Execute the file. This will run the Disk Cleanup program in a special mode which asks what items you will want cleaned when Disk Cleanup performs an unattended cleanup. Check the items you wish to have cleaned up, then click OK. Step 4. Right-click on the clean.bat file and click edit. Change the first line to read: c:\windows\system32\cleanmgr.exe /dc /sagerun: 1 Step 5. Save the file. You can execute this file in place of running Disk Cleanup, or, to have this program run unattended run the Add Scheduled Task Wizard in the Control Panel and create a scheduled task using the clean.bat file you just created. Note: This cleanup script will also clear windows prefetch directory. Often this directory can become cluttered with old appication and a cleaning would free up disk space but it will result in a one time performance decrease and windows has to rebuild the cache with active software afterwards. Disable Error Reporting Open System Properties. Click the Advanced tab. Click the Error Reporting" button. Select Disable Error Reporting How To Do a Repair Install of XP Make sure the BIOS is set to boot from the CD (put the CD above the HDd in the boot order) Insert the XP CD and boot to it When you see "To setup Windows XP now, press ENTER", go ahead and press ENTER You will now see an option to repair Windows by pressing "R". Do not select this option it will only take you to the Recovery Console which is not what we want to do. Instead, choose to continue the installation When you see the license agreement, press F8 to agree On the next screen make sure your current XP partition is selected and then press "R" to repair XP At this point XP will begin to install on top of itself, replacing damaged, missing or altered system files. Follow the instructions on the remaining screens to complete the Repair Install. It will look very much like a normal (new) OS installation. Remember, choose the second repair option, not the first. Turn off system beeps Start Regedit, Navigate to HKEY_CURRENT_USER\Control Panel\Sound locate Beep on the list on the right. Right click on it and select Modify Change the value equal to no Reboot your computer and the beeps will be gone 56K Tweaks Source (very long article) MOST OF THESE TWEAKS WILL NOT WORK WITH AOHELL, AOHELL USERS READ HERE. • First and most important is for you to download the latest drivers for your modem from the manufacturer’s website. • Make sure you have a “clean” phone line, no static on your line. If you have static you will have a very low connect speed and no tweak will fix that. • You need to download CableNut from here, it is the most comprehensive internet connection tweaking app available. Setting your TCP/IP and AFD registry parameters for optimum performance. Use the following settings in CableNut: DefaultReceiveWindow = 8192 DefaultSendWindow = 4096 DisableAddressSharing = 1 InitialLargeBufferCount = 20 InitialMediumBufferCount = 48 InitialSmallBufferCount = 64 LargeBufferSize = 40960 MaxFastTransmit = 6400 MediumBufferSize = 15040 PriorityBoost = 0 SmallBufferSize = 1280 TransmitWorker = 32 FastSendDatagramThreshold = 1024 EnableFastRouteLookup = 1 EnablePMTUDiscovery = 1 IgnorePushBitOnReceives = 0 GlobalMaxTcpWindowSize = 8760 MaxFreeTcbs = 4000 MaxHashTableSize = 8192 MaxNormLookupMemory = 1500000 SackOpts = 1 SynAttackProtect = 1 Tcp1323Opts = 0 TcpLogLevel = 1 MaxDupAcks = 3 TcpMaxHalfOpen = 100 TcpMaxHalfOpenRetried = 80 TcpRecvSegmentSize = 1460 TcpSendSegmentSize = 1460 TcpTimedWaitDelay = 30 TcpUseRFC1122UrgentPointer = 0 TcpWindowSize = 8760 MaxConnectionsPer1_0Server = 8 MaxConnectionsPerServer = 4 DefaultTTL = 128 DisableUserTOSSetting = 0 TcpMaxDataRetransmissions = 6 DefaultTOSValue = 90 Other important tweaks to improve your connection. Open your control panel and select the phone and modem properties icon – select the modems tab, under the modems tab highlight your modem and select properties • General tab: Set your speaker volume to your preference Maximum port speed – 115,200 • Advanced tab: • Extra Settings – this is where you put in initialization strings, they can help stabilize your connection. Try the following websites for init strings for your modem. Spy.net 56K.com West.net ModemHelp.org • Advanced port settings – check “use FIFO buffers” then slide both bars to the far right. • Change default preferences: Port Speed - 115,200 Data Protocol - Standard EC Compression - enabled Flow Control – hardware • Advanced: Data bits – 8 Parity – None Stop Bits - 1 Modulation – Standard Now select the Network and Dialup Connections and right click on your ISP’s icon and select properties. • General tab: Highlight your modem and select “configure”, set the maximum speed to 921,600 and under “hardware features” all the boxes are checked. • Networking tab: Uninstall all the protocols you don’t need. If this is a stand alone pc then all you need is Internet Protocol TCP/IP. Select the settings button and make sure all the boxes are checked. Setting your COM port speed properly: Right click on My Computer and select properties – hardware – device manager – select your COM port – port settings tab bits per second 128000 (you may need to set this a few times to make it stick). Other important registry tweaks: • Speeding up network browsing. Open regedit and navigate to: HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/ CurrentVersion/Explorer/RemoteComputer/NameSpace Delete the key: {D6277990-4C6A-11CF-8D87-00AA0060F5BF} • Faster webpage tweak by giving priority to DNS lookup. Copy and paste the following and make it a .reg file and merge it into your regstry: Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Servic es\Tcpip\ServiceProvider] "DnsPriority"=dword:00000001 "HostsPriority"=dword:00000001 "LocalPriority"=dword:00000001 "NetbtPriority"=dword:00000001 • Forward buffer memory tweak, this controls how much RAM TCP/IP uses for storing packet data in the router packet queue. Copy and paste the following and make it a .reg file and merge it into your regstry: Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Servic es\Tcpip\Parameters] "ForwardBufferMemory"=dword:00024a00 "NumForwardPackets"=dword:0000024a "MaxForwardBufferMemory"=dword:00024a00 "MaxNumForwardPackets"=dword:0000024a • By default Windows 2K & XP cache everything in the DNS cache service, both correct and faulty DNS lookups. To increase performance by eliminating the caching of faulty DNS lookups, copy and paste the following and make it a .reg file and merge it into your regstry: Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Servic es\Dnscache\Parameters] "NegativeCacheTime"=dword:00000000 "NetFailureCacheTime"=dword:00000000 "NegativeSOACacheTime"=dword:00000000 Internet Explorer important settings: Open Internet Explorer and select Tools - Internet Options - under the General tab in the Temporary Internet files section select the Settings button. Select "Every visit to the page" and set the amount of disk space to use: to no more than 80MB. Now select the Connections tab and select LAN Settings make sure EVERYTHING there is unchecked and select OK. Select the Privacy tab and choose Advanced check the box "Override automatic cookie handling" and for First-party Cookies Accept, Third-party Cookies - Block and check "Always allow session cookies. Now NO MORE SPYWARE COOKIES. Open Internet Options and under temp internet files - settings select – every visit to page. (this is way to long for me to reword, and i would probably do it wrong, so this is excellent for 56K users, it may seem like a long thing to do, but if u got no choice then go for it) Create your own Self-extracting / self-installing Package The following will show you how to use the Iexpress2.0 tool. The tool allows you to make a self extracting file and much more, To play with this hidden feature of XP : Navigate to Windows\system32\ look for a file called iexpress.exe. Double left click on it and follow the wizzard. Remove unwanted programs If you want to remove some additional programs that are installed with windows but are not initially visible in Add / Remove, edit a file called "C:\WINDOWS\INF\SYSOC.INF", In there you will find a listing of programs, and you will note that some programs have the word 'hide' at the end. Simply remove the word 'hide' but leave the extra comma: BEFORE:msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,hide, 7 AFTER:msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,,7 Now when you open Add-Remove Windows Components, you will see a new choice, in this example, "Windows Messenger" Disable the Unsigned Driver dialog XP Pro: Start - Run gpedit.msc Browse to: User Configuration - Administrative Templates - System Right-click Code signing for Device drivers and select Properties. On the Settings tab, either select enable and then select ignore from the appearing listbox or click the disable option. Click apply and Ok. XP Home: Open "System" properties and select the Hardware tab. Choose the Driver Signing button and choose "Ignore" to install the new driver anyway. Security Settings Increase Security by Disabling Services: {create a system restore or backup your system} Start > Run > Type – services.msc Security Settings 1. Messenger – Home/Pro = Disable Have you ever been surfing the net and all of the sudden you get a pop-up with a “Messenger Service” listing in the title bar? If so, disable this service. 2. NetMeeting Remote Desktop Sharing – Home/Pro = Disable This creates the ability for someone to remotely access your computer through NetMeeting. This is not good! If you don’t use NetMeeting or not that often, disable this service. 3. Protected Storage – Home/Pro = Disable This service will store your passwords as well as enable the auto-complete function within Internet Explorer (auto-complete is where you type – for e.g. – tweakxp and then hit Ctrl + Enter to allow IE to fill in the WWW and .Com for you). 4. Remote Desktop Help Session Manager – Home/Pro = Disable This service provides support for Remote Assistance sessions. Again, if this service is not something you use or use rarely, disable until required. 5. Remote Registry Service – Pro = Disable If you don’t require the assistance of someone to remotely have access to editing your registry settings, then disable this service. Your systems registry isn’t something you want to surrender easily to a remote computer. 6. Routing and Remote Access – Home/Pro = Disable This service enables remote computers dial-in routing to your computer. That surely doesn’t sound like something I would want set to “automatic”. 7. Security Accounts Manager – Home/Pro = Disable This service works just as Protected Storage collecting secure user information. For XP Pro users, you will not be able to run the Group Policy Editor with this service disabled (the Group Policy Editor is unavailable for XP Home users). Speed up Login Process Login as Administrator. Go to Start/Run type in gpedit.msc and click ok. Right click on the Local Computer Policy entry and select Properties from the menu that appears. Add checkmarks to the two options within the Disable section. Close out. Reboot. Notice the login access time has decreased dramatically To change the size of the virtual memory paging file THX TO T RUSH FOR THIS INFO You must be logged on as an administrator or a member of the Administrators group in order to complete this procedure. If your computer is connected to a network, network policy settings may also prevent you from completing this procedure. 1. Open System in Control Panel. 2. On the Advanced tab, under Performance, click Settings. 3. On the Advanced tab, under Virtual memory, click Change. 4. Under Drive [Volume Label], click the drive that contains the paging file you want to change. 5. Under Paging file size for selected drive, click Custom size, and type a new paging file size in megabytes in the Initial size (MB) or Maximum size (MB) box, and then click Set. If you decrease the size of either the initial or maximum page file settings, you must restart your computer to see the effects of those changes. Increases typically do not require a restart. Note • To open System, click Start, click Control Panel, click Performance and Maintenance, and then click System. • To have Windows choose the best paging file size, click System managed size. • For best performance, do not set the initial size to less than the minimum recommended size under Total paging file size for all drives. The recommended size is equivalent to 1.5 times the amount of RAM on your system. Usually, you should leave the paging file at its recommended size, although you might increase its size if you routinely use programs that require a lot of memory. • To delete a paging file, set both initial size and maximum size to zero, or click No paging file. Microsoft strongly recommends that you do not disable or delete the paging file. T Rush says: sometimes I'll disable the virtual memory(also called page file) first, and defrag my hard drive...then make a new one at the size I want Turning off Nonessential Windows Services can greatly improve performance i got this info by MovingTarget, he/she gave me a link to this site its way better than this previous tweak (it does have more info Martino :| ) some of these tweaks by Martino make your windows theme look like the Win98 version, so keep an eye on what u edit from here on untill i post Martinos last tweak suggestion A) This tweak lets you utilize the total amount of bandwidth offered from your Internet connection (XP Pro Only) 1) Click Start, Select "Run" 2) Type "Gpedit.msc" 3) Expand the "Local Computer Policy" branch 4) Expand the "Administrative Templates" branch 5) Expand the "Network" Branch 6) Highlight the "QoS Packet Scheduler" in the left window 7) In the right window, double click the "limit reservable bandwidth" setting 8) On the settings tab, check the "enabled" item 9) Where it says "Bandwidth limit %" change it to read 0 10) Click Apply and then OK B) This tweak will speed up the interface and speed up windows 1) Go to the Display Properties by right clicking on the desktop and clicking Properties 2) Choose the "Apperance" tab and click "Effects" 3) Uncheck everything except "Hide underlined letters for keyboard navigation....." 4) Click OK C) This tweak will speed up your interface once agian, it lets you use the Classic Windows Theme (The XP theme has a lot of visual enhancements that makes the computer slow down.) 1) Proceed to the "Apperance" tab like mentioned in letter B. 2) Find the category "Windows and Buttons", and from the drop down menu, choose "Windows Classic Style" 3) Click Apply and then OK D) This tweak will let you see your icons faster 1) Open "My Computer" 2) Click the "Tools" menu and select "Folder Options" 3) Uncheck the first box that says "Automatically search....." 4) Click Apply and then OK E) Defragmenting your hard drive Make sure to do this weekly 1) Go to "My Computer" 2) Right click on the hard drive that your game server is installed on 3) Go to "Tools" 4) Click "Defragment Now..." 5) Click "Defragment" My Way: Go to Start>all program>acessories>System Tools>Defragmentation F) This tweak lets you fine tune your memory for better performance (You need at least 256MB of RAM to do this) 1) Go to "Start", then "Run", and then type in "Regedit" 2) Locate the following key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Contro l\Session Manager\Memory Management 3) Double Click "DisablePagingExecutive", select "Decimal" and put a 1 in the blank. This allows windows to keep data in memory instead of paging sections of RAM to the hard drive, Click OK 4) Double Click "LargeSystemCache", select "Decimal", and put a 1 in the blank. This allows XP kernal to run memory (improves system performance a lot). Click OK 5) Create a New "Dword" by right clicking in the "Memory Management" Folder. Once the "Dword" is created, name it "IOPageLockLimit". Double click it and select "Hexadecimal", put a 4000 in the blank if you have 128MB of RAM, set it to 10000 if you have 256MB of RAM, or set it 40000 if you have 512MB of RAM or more. This tweak will speed up your diskcache. Click OK 6) Reboot for changes to take effect G) This tweak lets you overall boost your performance (Tweaking the Swap File, You need 256MB of RAM or more to do this) 1) Select "Run", then "Start", and then type in "msconfig.exe" 2) Select the "SYSTEM.INI" tab 3) Add "ConservativeSwapFileUsage=1" under the "386enh" section 4) Click "OK" and reboot windows for the changes to take effect H) This tweak will disable even more Windows visual enhancements that cause a slow interface 1) Go to the "Control Panel", select "System" 2) Navigate to the "Advanced" tab and Select "Settings" underneath "Performance" 3) Select the "Adjust for best performance" bullet 4) Click Apply and OK I) Improve NTFS Performance- Speed up your hard drive 1) Click start, run, and type in regedit in the box 2) From the drop down menus, navigate to HKEY_LOCAL_MACHINE 3) Navigate to SYSTEM 4) Navigate to CurrentControlSet 5) Navigate to Control 6) Naviagte to Filesystem 7) Click right inside the white box and select New-> DWORD Value 8) Type NtfsDisableLastAccessUpdate in the box 9) Click right on the new DWORD NtfsDisableLastAccessUpdate 10) Click Modify 11) Type 1 into the Value data blank 12) Click OK and close out of the registry editor J) Unload .dll's to Free Memory(Free up memory left by programs that were closed) 1) Click start, run, and type in regedit in the box 2) From the drop down menus, navigate to HKEY_LOCAL_MACHINE 3) Navigate to SOFTWARE 4) Navigate to Microsoft 5) Navigate to Windows 6) Naviagte to Current Version 7) Naviagte to Explorer 8) Click right inside the white box and select New-> DWORD Value 9) Type AlwaysUnloadDLL in the box 9) Click right on the new DWORD AlwaysUnloadDLL 10) Click Modify 11) Type 1 into the Value data blank 12) Click OK and close out of the registry editor How To Protect Your Computer! DEMO - Trend Micro Trend Micro Security Expert What Is a VIRUS? A computer virus is a program – a piece of executable code – that has the unique ability to replicate. Like biological viruses, computer viruses can spread quickly and are often difficult to eradicate. They can attach themselves to just about any type of executable file and are spread as files that are copied and sent from individual to individual. In addition to replication, some computer viruses share another commonality: a damage routine that delivers the virus payload. While payloads may only display messages or images, they can also destroy files, reformat your hard drive, or cause other damage. If the virus does not contain a damage routine, it can cause trouble by consuming storage space and memory, and degrading the overall performance of your computer. What is a TROJAN? Trojan is a malware that performs a malicious action, but has no replication abilities. Coined from Greek mythology's Trojan horse, a Trojan may arrive as a seemingly harmless file or application, but actually has some hidden malicious intent within its code. Trojan malware usually have a payload. When a Trojan is executed, you may experience unwanted system problems in operation, and sometimes loss of valuable data. What is a WORM? A computer worm is a self-contained program (or set of programs) that is able to spread functional copies of itself or its segments to other computer systems. The propagation usually takes place via network connections or email attachments. More recent worms have also discovered ways to propagate using Instant Messengers, via file sharing applications, and by collaborating with other malware such as Trojans or other worm variants. WORM_BAGLE.BE, for example, forms a vicious worm-Trojan cycle with TROJ_BAGLE.BE, in which the worm mass-mails copies of the Trojan, and the Trojan downloads copies of the worm. Additionally, the FATSO family is a family of worms that propagate via an instant messaging application and a popular peer-to-peer file sharing application. Some worms may have an additional payload, such as preventing a user from accessing antivirus Web sites, or stealing the licenses of installed games and applications.. What Is a MALWARE? A malware is a program that performs unexpected or unauthorized, but always malicious, actions. It is a general term used to refer to viruses, Trojans, and worms. Malware, depending on their type, may or may not include replicating and non-replicating malicious code. Due to the many facets of malicious code or a malicious program, referring to it as malware helps to avoid confusion. For example, a virus that also has Trojan-like capabilities may be called malware. Cycle of a MALWARE The life cycle of a malware begins when it is created and ends when it is completely eradicated. The following outline describes each stage: Creation Until recently, creating a malware required knowledge of a computer programming language. Today anyone with basic programming knowledge, and Internet access, can create a malware. Whole Web sites exist whose only intent is to spread malicious code, and to encourage individuals to develop their own harmful version of already existing, and tried-and-tested malicious programs. Replication and Propagation Malware propagate in a number of ways. Worms may spread via email, instant messengers, or network shares. Viruses replicate within a system, while some viruses also have automatic propagation techniques similar to worms. Trojans. while not having any automatic form of replication and propagation, are nevertheless available all over the Internet, and the links to download them from may be included in email messages, or other Web sites. Activation Most malware perform their malicious activities upon execution. Some have certain payloads that are activated only at a certain trigger date, or with the onset of a specific trigger condition. Discovery This phase does not always follow activation, but typically does. When a malware is detected and isolated, it is sent to the ICSA in Washington, D.C., to be documented and distributed to antivirus software developers. However, with the rapid development of technology, and the ease by which malware authors create their programs, most malware are released to unsuspecting users even before they are discovered by the "authorities". This is all the more reason to protect your system from the threats that surround the computing world today. Assimilation At this point, antivirus software developers modify their software so that it can detect the new malware. This can take anywhere from one day to six months, depending on the developer and the malware type. Eradication If enough users install up-to-date virus protection software, any malware can be wiped out. So far no malware have disappeared completely, but some have long ceased to be a major threat. Malware Propagation Methods ~Dictionary and Brute-Force Attack Some malware are hard-coded with a list of common user names and passwords in their body. The malware then uses this list to launch a dictionary attack to hack into the target system. A dictionary attack is defined as a brute-force attack in which the malware tries out all possible combinations of user names and passwords from its hard-coded list to access a system. Customers using a user name and password that is easy to guess (such as administrator or qwerty) may have greater potential of unauthorized account access or unauthorized entry of the customer’s network. ~Exploits Any software may contain so-called vulnerabilities, or "holes" in the fabric of the software code. Holes can be exploited by malware writers to perform malicious routines. Software vendors usually release a patch for discovered vulnerabilities, but it is still the user’s responsibility to make sure that patches are installed. Microsoft releases a Security Bulletin every month for any discovered vulnerabilities. Customers using Microsoft applications are advised to regularly go to the Microsoft Update Center to obtain system patches against known Microsoft vulnerabilities. ~P2P programs Peer-to-peer (P2P) programs have become increasingly popular as the Internet has grown increasingly diverse. Users commonly exchange files via P2P applications. Upon installation, a user is usually asked to specify a shared folder, the folder most commonly used to store files for sharing. It is exactly this folder that some malware use to propagate. Some malware drops a copy of itself in folders it assumes to be shared (such as those with shar in its folder name), and uses an inconspicuous file name (usually posing as a legitimate software, or as an archived image). The malware spreads when users download and execute it. Some commonly used file names of malware copies in shared folders are The Sims crack.EXE, DivX 7.0 final.EXE,and ACDSee 9.EXE. ~Current user account A malware may also use the current account to access other systems in the network. This is possible, especially if the current user is an administrator, or has special privileges that allow access of network folders. To protect against these types of attacks, customers are advised to employ the following preventive measures: • Use a unique password. • Use a firewall. • Regularly go to the Microsoft Update Center for product updates and vulnerability patches. • Make sure that people who access your network have the appropriate privileges, and that network shares have the appropriate permissions. Mail Messages protect against mass-mailers and the damage they may cause, customers are advised to follow these tips regarding email messages: • Do not open email messages from unknown senders. • Do not open mail messages from known persons that appear to be a continuation of a correspondence if the topic does not seem relevant to typical correspondence with the sender. • Do not open suspicious-looking attachments, such as unrequested materials, or materials that have no relevance to the sender or recipient. • In the case of an outbreak, ask the system administrator to block or filter email messages with the same details (attachment file name, From address, etc.) as the mass-mailer’s email. • Scan attached files before opening them. Scams and Hoaxes ^Malware-related A malware-related hoax gives false information regarding certain malware threats. In most cases, malware-related hoaxes are warnings of fictional malware threats that create unnecessary panic. These hoaxes oftentimes prompt users into performing unwanted actions on their systems. ^Scams and shams Scams and shams include email messages that promise material gain or even luck to recipients who forward them to others users. Some luck-based hoaxes, often called chain letters, play on people’s fear of bad luck. Money-based hoaxes offer incredibly quick cash for simply forwarding a message. Certain popular scams have tricked users into investing their own money in fruitless investments. ^Urban Legends Urban legends are stories written around day-to-day things, but are incorporated unusual twists in the form of unlikely facts that are difficult to verify. Designed to elicit emotional response, the most popular urban legends are health and animal scares. Anti-Virus VS Internet Security Example by Trend Micro Anti-Virus: *Removies Sypyware *Automatic Updates *Stops Spyware *Outbreak Alert (Depending on which Anti-Virus Program you have) Internet Security *Comprehensive Antivirus Security <-- *Outbreak Altets <-- *Comprehesive Updates (day-to day basics) <-- *Powerful Spyware Protection<-- *Phishing Fraud Defense <-- *Wi-Fi Intrusion Detection <-- *Improved Spam Filtering <-- *Enhanced Personal Firewall <-- *Home Network Control<-- *Vulnerability Assessment <-- *Advanced Parental Controls Programs To Help YOU! Anti-Virus *Trend Micro PC-Cillin Internet Security 2006 *Symantec Norton AntiVirus Internet Security 2006 *Mcafee Internet Security 2006 Free Programs Adware/Malware/Internet Spybot - Search & Destroy <-- Ad-Aware SE Personal Edition 1.06 <-- Internet Explorer 7.2 Spyware Blaster Hijackthis Firefox Free Online Anti-Virus Scan - Trend Micro (Windows) Trend Micro House Call - FREE on-demand service scans your PC for viruses, spyware, and more. Trend Micro™ HouseCall™ is a FREE Web-based solution designed to scan your PC for a wide range of Internet security threats including viruses, worms, Trojans, and spyware. It also detects system vulnerabilities and provides a link so you can easily download missing security patches. After each scan, HouseCall delivers a detailed report, which identifies security threats detected on your computer Free Online Anti-Virus Scan - Trend Micro (Macintosh) Trend Micro™ HouseCall Macintosh - Support beta provides an agent less scanning Web-based solution designed to scan your Macintosh for a wide range of Internet security threats including viruses, worms, Trojans, and spyware. It also detects system vulnerabilities in connected network services. After each scan, HouseCall delivers a detailed report, which identifies security threats detected on your Macintosh. Free Anti-Spyware Scan - Trend Micro Trend Micro™ Anti-Spyware for the Web - Trend Micro Anti-Spyware for the Web is a free online tool that checks computers for spyware, and helps remove any infections found. When the detection process is complete, the tool will display a report describing the result including which if any, spyware were detected, and prompt you before the removal process. Interent Hijack Free Scan - Trend Micro Trend Micro™ CWShredder™ - Trend Micro CWShredder is the premier tool to find and remove traces of CoolWebSearch – the name for a wide range of insidious browser hijackers– from your PC. CWShredder removes these browser hijackers. CoolWebSearch installs dozens of bookmarks–mostly to porn Web sites–on your desktop, changes your home page without asking, and continually changes it back if you attempt to correct it. Furthermore, it significantly slows down the performance of your PC, and introduces modifications which cause Microsoft Windows™ to freeze, crash or randomly reboot. Tuneup Utilites 2006 Tuneup Utilities -The Swiss army knife for your PC. TuneUp Utilities 2006 optimizes the performance of your computer, solves problems and helps you to customize your system to suit your needs. Find out how easy and effective Windows tuning can be with the test winner! TuneUp Utilities 2006 lets you make your system faster, more comfortable and more secure in a matter of minutes. The complete package combines all important functions for system optimization, configuration, cleanup and maintenance in a modern graphical user interface. ***MAKE SURE YOU USE THESE PROGRAMS EVERY WEEK OR SO TO INSURE A CLEAN SYSTEM.***