Thursday, July 31, 2008

Create a Shortcut to the Stored User Names and Passwords Dialog in Windows


If you've ever saved a password when connecting to a website that requires authentication, for a remote desktop session or a mapped drive, you might have wondered where those passwords are saved. If you are a long time reader, you already know where, but you might be interested in how to create a shortcut directly to the dialog where you can manage those logons.


You can add this into your folder of useful shortcuts… sure, you might not use it every day, but it's good to know how to do it.


Create the Shortcut

Right-click on the desktop and choose New \ Shortcut from the menu.


In the location box, enter in the following command, and then on the next page give the shortcut a helpful name.

rundll32.exe keymgr.dll, KRShowKeyMgr



Once you have the shortcut, you'll want to right-click on it and choose Properties, then click the Change Icon button on the Shortcut tab.


If you change the textbox value to the following file, you can find the matching icon for the shortcut (adjusting if your Windows is installed elsewhere)

C:\Windows\System32\keymgr.dll


Now you should have a nice matching icon…


Which will open up the Stored User Names and Passwords dialog.

Note that you can also use this to backup and restore your saved passwords, and it should work in either Vista or XP.
read more...

Top 50 Amazing VoIP Gadgets


They’re in your hand, on your head, around your ear, on your desk, on your lap, in your pocket, in your bag – wherever the eye can see, you’re surrounded by an ocean of gadgets. Yes, we live in a world that is increasingly revolving around smart mobile devices that are also called phones, portable music players that are a far cry in more ways than one from Sony’s famous Walkman of the 80s, compact computers that pack a punch in terms of power and speed, and accessories for each of these that are sometimes beyond the scope of our imagination. Gadgets have taken control - they’ve revolutionized the way we do business, the way we communicate, the way we socialize, in short, the way we live.


The Internet has spawned its own niche of gizmos, most of them related to Voice over Internet Protocol or VoIP, the technology that’s driving traditional telecom providers up the wall in despair. Internet telephony providers are making rapid inroads into the telecom sector, aided
and abetted by newer and more innovative tools that sell like hotcakes as soon as they hit the shelves. For every new gadget that sees the light of day, there are hundreds that fade away into the sunset and hundreds more waiting in the wings - that’s how endless this lucrative market is. And to show you a taste of what it’s like, here’s a list that features 50 of the most mind-boggling VoIP gadgets that are around today.

Handy Handsets…

The chunky telephones that characterized the days of Graham Bell have undergone a sea of change and evolved to become sleek, cool, compact and good-looking handsets today. VoIP handsets eliminate the need for separate microphones and headsets – they provide seamless integration with the call network, so much so that you hardly know the difference between a VoIP and traditional telephone call.

1. V653.Skype VoIP Phone with Skype Navigation: Connects to your computer’s USB port and allows you to make VoIP calls using Skype. Set your own ring tones to differentiate your callers!

2. USB Sky Phone with Screen Display: Another USB-enabled phone with its own sound card that allows you to record and save conversations to your computer. Advanced digital USB streaming audio is said to enhance sound quality while the LCD allows call detail display.

3. DualPhone 3088: From the Danish company RTX, this dual mode phone supports both VoIP and PSTN calls. All you have to do is connect the base station to either a broadband router or a modem.

4. Videophones 1000 and 2000: From BT in the United Kingdom, these phones are made for videoconferencing. They use a BT Broadband Talk account, and include automatic upgrades and built-in address books. The 2000 model comes with Wi-Fi capabilities.

5. Siemens OpenStage SIP Line: “The missing link that integrates cellular, the Internet and the wired desktop,” this family of phones comprises four models that support third-party applications that are based on Java, HTML, WML, and XML. The innovative TouchGuide and TouchSlider allow easy access to the menu-driven user interface and control over the speakerphone, handset and ringer volumes.P2

Wireless Wonders…

It’s becoming an increasingly wire-free world, made possible by the advent of the Infra Red and Bluetooth technologies. Tired of being tied to your desk? Longing to get out but still stay connected? Then these devices are right up your street!

6. Nokia N800 Internet Tablet: A high-end device, this smartphone provides the best of video conferencing technology using Internet telephony. Comes with a high-resolution widescreen display and integrated web camera.

7. Cisco’s iPhones: These VoIP phones made headlines because of their name – they stole a march over Apple in the iGadget terminology. Apparently Cisco had registered the name iPhone as early as the 1980s. While the two giants fight it out in the courtroom, let’s take a look at the portfolio of phones from Linksys (a subsidiary of Cisco).

Linksys CIT400 Dual-Mode Cordless Phone with Integrated Skype: The name says it all – this handset supports both VoIP and traditional telephone options. Best of all, you don’t need a computer to make calls using Skype.

Linksys Wireless-G WIP320 Phone: This one’s compatible with Skype and searches for Wi-Fi networks before it starts up completely.

8. Nokia E61: This state-of-the-art smartphone comes with both GSM and VoIP via Wi-Fi capabilities, a QWERTY keyboard, and OTAP. Over-The-Top-Provisioning allows automatic configuration through just one text message when you log in to your VoIPtalk account. Feature intelligent call forwarding that ensures you receive calls even outside Wi-Fi zones.

9. Auvi PHIP65 Dual Mode Cordless Phone: Built using the DECT technology which enhances sound quality and cuts down interference, this model comes with a Caller ID screen and speakerphone for hands-free conversations.

10. P-2000W_V2 VoIP Wi-Fi Phone: Built by Zyxel, this phone connects VoIP calls using 802.11b wireless networks.

11. TVP-SP4BK ClearSky Kit: The conference call VoIP solution from TRENDNet, this gadget comes with a Bluetooth dongle that provides clear calls up to 300 feet. Other features worth mentioning are the large LCD and button area.

12. Calypso C1250i WiFi GSM VoIP Cellular Phone: Billed as the world’s first mobile phone that supports both cellular and digital frequencies and the Wi-Fi frequency, this video phone allows you to take pictures and shoot videos besides providing video-conferencing facilities. Connects to the Inernet at high speeds.

13. EZLoop VoIP Wireless Phone:Supports voice and data on the same wireless backbone, can be tailored according to user needs.

14. F1000G and F3000: Wi-Fi handsets from Utstar that include support for three-way calling, call waiting, call transfer and 802.11b/g, SIP, SDP, RTP, DHCP and TFTP.

15. WLAN800I: This Wi-Fi set’s based on the Windows CE kernel and compatible with Skype, SIP services, MSN Talk and MSN Messenger. Connects to the Internet via an 802.11b/g wireless access point.P3

16. Kensington Vo200 Bluetooth Internet Phone: Listed on sites but not yet available for sale, this gadget fits nicely into your notebook computer’s PCMIA slot. Works only with Windows XP.

17. D-Link DPH-540 Wi-Fi VoIP Phone: Built with a cool clamshell design, this handset comes with a PsipTN-compliant tool that lets you make and receive free calls within the PsipTN network. Connects to the Web through a 802.11b/g network.

18. VP 6500 and 6000: These Wi-Fi handsets from Philips allow you not only to make and recive VoIP calls, but also stream TV to the 2.2-inch, 65,000 color screen. Calls get across using the WEP, WAP and WPA2 encryption protocols.

19. NetLink 8030 and 8020: This pair from SpectraLink claim to be “the world’s first 802.11a Wi-Fi phones.” They support 802.11a/b/g, WPA2 for increased security, text messaging through Open Application Interface (OAI), military grade shock resistance and programmable softkeys. The 8030 is water and dust-resistant and comes with rubberized grips for better durability and ergonomics.

20. AiGuru S2 VoIP Skype Handset: Set to appear later this year, this gizmo supports Skype and streaming from iTunes/WMP. The SideShow feature apparently allows you to check your mail on the display.

Mighty Mouses…

You’ve got to hand it to the guy who coined the term “mouse” for that thingamabob that helps you navigate your computer – he sure had great imagination. I mean, who would have ever associated a rodent with a computer? These devices are now being used for more than just manipulating your cursor and clicking to operate your system. Innovators are adding new-fangled features to the humble mouse to make them function as a phone and mouse – all rolled into the same small package. Whatever these VoIP mouses may or may not be, they sure are space savers on your desktop!

21. Street Mouse VoIP Handset: It looks like a car, but what it actually is is a computer mouse and VoIP handset rolled into one. Has its own “headlights” though, LEDs that light up when the phone rings.

22. Genius Navigator 380: A mouse that doubles as a clamshell phone when you wish to make or attend a call. Not only does it support GoogleTalk, Yahoo, MSN, QQ, Skype and AIM, it rolls all IMs into a single window. A cool accessory for the road with your notebook computer.

23. Sony VAIO VoIP Mouse: This one comes in a range of colors – you can pick your favorite. Claim to fame – the echo cancellation feature that provides crystal clarity in your calls! Supports Windows XP and 2000 only though, not MAC operating systems.P4

24. VM-01L from Skype-on: This is one trendy mouse – it has its own TFT display and buttons that are displayed when you flip it open. Comes with headphones that allow you to use the device as a regular mouse even as you talk away to your heart’s content.

Hip Headsets…

There are times when wireless headsets have people staring at you thinking you’re nuts to be talking to yourself, but these tiny earpieces are a boon when you need to both talk over the phone and keep your hands free for other activities, and keep the conversation to yourself of course. Some of them are now VoIP-enabled.

25. Sony Ericsson VoIP Kit and Headset: The HBH-PV705 headset from Sony Ericsson combined with a Bluetooth USB adaptor or a Bluetooth-enabled computer allows you to make VoIP calls using the VoIP Kit HBV-100.

26. Plantronics Voyager510 headset: Marketed as the first Bluetooth headset optimized for VoIP, this wireless device is one of the two products that Skype retails. Comes bundled with Skype software.

27. CY4638 VoIP Demonstration Kit: This demo kit for a VoIP headset combines a radio system-on-chip and signal delivery to provide a design that is easily replicated and can be marketed quickly.

28. nRD24V1 reference design: Just released by Nordic Semiconductor, this reference design for cost-effective USB dongle wireless headsets for VoIP applications “combines the company’s industry proven silicon with its applications expertise to provide a complete PC wireless headset solution” for VoIP. P5

Kool Keyboards…

They’re being used to do more than just type these days; you get designs that are ergonomically perfect to prevent repetitive use injuries; some come with no letters on the keys (apparently helps in typing faster); and yet others are integrating VoIP handsets into their designs.

29. A4 Tech VoIP Keyboard: Compatible with Skype, MSN, Yahoo messenger, QQ and Net2phone, this keyboard comes with the phone to the right of the keys; also has an incorporated speaker, an Audio In/Out port that allows you to connect a headset, eight Office keys and five multimedia keys.

30. USB Keyboard and Skype Handset BKBU-SKJ109/SV: This product from Buffalo bundles the handset into the standard 109-key keyboard, which in turn connects to the system through both the newer USB 2.0 standard and the phased out USB 1.1 standard.

31. Laser KB-USBBKVPU USB VoIP Keyboard: Comes with a built-in USB sound controller that eliminates the need for drivers for your speakers and microphone. Ports for headphones and microphone are located within easy reach on the keyboard. Holds 116 keys including those for shortcuts to the Internet and MS Office applications.

32. Jasco’s GE Branded VoIP Multimedia Keyboard: Winner of the 2006 CES Innovations Design and Engineering Award, this VoIP keyboard comes with hotkey software that allows you to directly control your iTunesO digital music.

Magnificent MP3 Players…

The iPod has turned the spotlight on Apple like never before. The portable MP3 player has spawned a new vocabulary for the geek set – from music to lectures, they’re all streamed straight to your ears, thanks to this snappy new gadget that’s a must-have for the hip-hop crowd. VoIP aficionados are cashing in on this cool tool’s popularity by creating MP3 players with in-built VoIP capability. Sing along with your favorite tune, or ring your favorite pal – it’s all possible with VoIP MP3 players.

33. Rimax Mystic: Pegged as the first MP3 that also serves as a VoIP headset, the Mystic retails in 512MB and 2GB sizes. Plugged into your USB port, it supports VoIP calls and also charges its batteries.

34. Median MX-400M: The music player that doubles as a VoIP mobile phone as well when connected to your computer, this product is powered by VoIP services from Callpia and MiraPhone.

35. BOXON MP3 Player: This Korean gadget automatically connects to a VoIP application when you hook up to the Internet, and allows you to share text, music, photos and video clips with friends via a 1.71-inch full-color OLED display. The makers have also thrown in capabilities that allow you to read e-books, play videos and brush up your Korean with an English-Korean dictionary. P6

Advantageous Adapters…

Don’t want to buy a phone exclusively for VoIP use? Feel a bit silly using a mouse as a phone? Just too used to the regular keyboard to opt for one that incorporates a phone as well? Or just too fond of your landline handset to turn it in for a new model? All valid reasons for you to invest in adapters that convert your regular telephone to one that can be used for VoIP calls as well.

36. Packet8 Tango Video Terminal Adapter: This one does more than just let you talk using VoIP from your landline, it comes with a sleek built-in LCD screen that conjures up a videophone from your ordinary telephone.

37. VMNF300 VoIP Telephone Adapter/Router: Use this handy tool to make outgoing calls using VoIP and receive incoming calls via your regular telephone. There’s also a PSTN lifeline which uses your PSTN line to route VoIP calls when your power is out or when your Internet connection is down.

38. SkyQube and SkyQube Square: While the former works like an adapter to connect your landline to Skype, the latter allows you to make calls using your GSM network when you insert your SIM into it.

39. Lindy USB VoIP Adapter: This one comes with a microphone and headset and lets you use your computer’s speakers for other purposes. Compatible with both Mac and Windows, this adapter has a mute button that helps eliminate backtalk.

Marvelous Miscellaneous Mechanisms…

40. Laser VoIP Station with 6 Port USB Hub: Billed as a cost-effective alternative to using a Bluetooth headset, this tool can be connected to your USB port. Besides the 6 USB ports, it has plugs for a headset and microphone, and the built-in audio chip allows you to use your computer’s soundcard for other activities such as music or game sound effects.

41. IOCell PhoneDrive: This gizmo combines storage space and VoIP – it’s a USB disk that comes equipped with VoIP capability.

42. The Elegance: True to its name, this slender touch screen flat screen monitor from Igel hosts VoIP software from a flash drive plugged into a resident USB port; the application is powered by the thin client’s software.

43. Actiontec Chatterbox: This Skype speaker phone is a USB-enabled tool that is touted as an entry-level application for conference calls. It also has a headset plug if you decide to keep the conversation private. Not too much voice clarity when more than one person talks simultaneously, but still enough if you don’t like headphones and microphones.

44. Vo300 Internet Speakerphone: From Kensington, this device has its own number pad to make dialing easier, one-touch access to Skype Voicemail and a backlit LCD that makes reading less hard on the eyes. The company is banking on the phone’s echo-cancellation feature to do the trick for them in terms of sales.

45. Logitech QuickCall USB Speakerphone: Though it looks like a pair of binoculars, there’s no doubt that this gadget is a VoIP speakerphone. The shape is apparently not for kicks, but serves a larger purpose – to remove the echo that’s a common complaint with VoIP calls. Apparently this is done using Logitech’s RightSound Technology. It uses two microphones - one on each side of the phone – to capture sound from a larger area.P7

46. Polycom Communicator: This Skype-certified device uses Polycom’s Acoustic Clarity Technology to provide clear sounds and voices; Ideal for VoIP use minus headphones and microphones.

47. Sky IPmate T-30: A plug-and-play adapter that allows you to forward your incoming Skype calls to or make VoIP calls via Skype using your mobile phone or landline.

48. Skype Hack: This experimental gadget allows you to enhance screen resolution of the 320 x 240 standard to 640 x 480 during video calls. Works only at your end, so the person at the other end will have to invest in one too.

49. ARIO Q-bean: VoIP headset, wireless media remote and wireless headphones all rolled into one funny-looking gadget from LTB Audio. Comes with its own USB dongle that connects the bean to the computer via a Bluetooth-like technology that is proprietary to LTB.

50. Vonage’s Concept Router: Complete with an integrated touch screen LCD, this wireless router/VoIP adapter is just a concept so far.

read more...

Sipgate app brings VoIP to iPhone


Nearly a year after its release in the US, the iPhone is now able to use third party Voice over IP (VoIP) services, after sipgate.Inc announced the release of an application which enables the iPhone to natively communicate with any VoIP service, so long as it is on the industry’s standard SIP.

What this means is that now all iPhone users, are able to both make and receive VoIP calls via a Wi-Fi net connection, with a multitude of VoIP providers, once they have downloaded sipgate’s free software from their website.

sipgate Inc., have made it their goal to bring the best of telecommunication services to the general public, and the U.S. arm of the European telecoms giant is doing just that with their free software, which is designed to be highly intuitive, making it a user friendly experience.

The reason behind the move to VoIP services, is that it gives phone users the ability to call any number in the world, without having to use minutes from a wireless plan, as international call costs can be up to $3 per minutes, whereas international call costs via VoIP can be as little as $0.01 per minute.

Currently this new system is still in Beta, so sipgate are offering new users 111 minutes of VoIP for free, for calls within the U.S. only, though users will still have to pay their regular fee for Wi-Fi or VoIP subscription.

Yet another aspect to sipgate’s VoIP service, is that one person may have multiple domestic and international numbers, and calls to and from each of the different numbers, can be made using the one device, be that a VoIP compatible mobile, an iPhone, a Blackberry, or any other such device.

CEO of sipgate, Thilo Salmon, spoke about the excitement throughout the company, as Apple begin to allow the iPhone to be used for more applications, which makes sipgate’s VoIP software usable.

Salmon said that there is a love of VoIP and the iPhone at sipgate, so they are more than happy to be a part of combining the two, and plan to build on that service in the future.

Salmon hinted at further applications for businesses and users to be released later this year, saying that the company is committed to offering services that are user friendly and useful in today’s market, and suggest people be ready for further developments.
read more...

Yahoo Messenger outsources VoIP calls to Jajah



Yahoo has announced that its Yahoo Messenger VoIP calls are to be outsourced to Jajah.

Under the terms of the agreement, the “Phone In” and “Phone Out” service will enable consumers to make low-cost PC-to-phone and phone-to-PC voice calls over the Jajah network to more than 200 countries using Yahoo Messenger. Details of the deal between the two companies have not been disclosed

Jajah will take over the provision of the telephony infrastructure, payment processing, and customer care for Yahoo’s premium voice users who make and receive voice calls through Yahoo Messenger. They have been able to make and receive voice calls on their PC to and from landline and mobile phones since 2006

Yahoo Messenger has 97 million users worldwide but it is not known how many of them pay for premium voice services. With headquarters in Silicon Valley, Jajah has attracted 10 million users in its two years of operation.

VoIP provider, Jajah, has introduced Jajah Direct, which provides VoIP calls without the need to be connected to the Internet.

Users simply call a local access number, then input the number of the phone they wish to call. Jajah Direct then sends them a number, usually by text message. When called, this number connects with the person the user wishes to talk to.

The system removes the need for headsets, or being tied to a computer, and provides free or low-rate international calls.

A Jajah account is free and can be set up over the phone. Jajah’s website - www.jajah.com - provides a local access number, and information on calling rates to both landlines and mobiles.

Jajah has expanded its infrastructure with the installation of 260 switches in 66 countries. Switches and server farms in New York City, London, Tel Aviv, and Tokyo act as master VoIP controllers.

Developing its own infrastructure allows Jajah to pass on savings to customers rather than to middlemen wholesalers and has allowed it to launch Jajah Direct.
read more...

VoIP connection


To setup a VoIP communication we need:

1. First the ADC to convert analog voice to digital signals (bits)
2. Now the bits have to be compressed in a good format for transmission: there is a number of protocols we'll see after.
3. Here we have to insert our voice packets in data packets using a real-time protocol (typically RTP over UDP over IP)
4. We need a signaling protocol to call users: ITU-T H323 does that.
5. At RX we have to disassemble packets, extract datas, then convert them to analog voice signals and send them to sound card (or phone)
6. All that must be done in a real time fashion cause we cannot waiting for too long for a vocal answer! (see QoS section)


Base architecture

Voice )) ADC - Compression Algorithm - Assembling RTP in TCP/IP -----
----> |
<---- |
Voice (( DAC - Decompress. Algorithm - Disass. RTP from TCP/IP -----


Analog to Digital Conversion
This is made by hardware, typically by card integrated ADC.

Today every sound card allows you convert with 16 bit a band of 22050 Hz (for sampling it you need a freq of 44100 Hz for Nyquist Principle) obtaining a throughput of 2 bytes * 44100 (samples per second) = 88200 Bytes/s, 176.4 kBytes/s for stereo stream.

For VoIP we needn't such a throughput (176kBytes/s) to send voice packet: next we'll see other coding used for it.

Compression Algorithms

Now that we have digital data we may convert it to a standard format that could be quickly transmitted.

PCM, Pulse Code Modulation, Standard ITU-T G.711

* Voice bandwidth is 4 kHz, so sampling bandwidth has to be 8 kHz (for Nyquist).
* We represent each sample with 8 bit (having 256 possible values).
* Throughput is 8000 Hz *8 bit = 64 kbit/s, as a typical digital phone line.
* In real application mu-law (North America) and a-law (Europe) variants are used which code analog signal a logarithmic scale using 12 or 13 bits instead of 8 bits (see Standard ITU-T G.711).

ADPCM, Adaptive differential PCM, Standard ITU-T G.726

It converts only the difference between the actual and the previous voice packet requiring 32 kbps (see Standard ITU-T G.726).

LD-CELP, Standard ITU-T G.728
CS-ACELP, Standard ITU-T G.729 and G.729a
MP-MLQ, Standard ITU-T G.723.1, 6.3kbps, Truespeech
ACELP, Standard ITU-T G.723.1, 5.3kbps, Truespeech
LPC-10, able to reach 2.5 kbps!!

This last protocols are the most important cause can guarantee a very low minimal band using source coding; also G.723.1 codecs have a very high MOS (Mean Opinion Score, used to measure voice fidelity) but attention to elaboration performance required by them, up to 26 MIPS!

RTP Real Time Transport Protocol
Now we have the raw data and we want to encapsulate it into TCP/IP stack. We follow the structure:

VoIP data packets
RTP
UDP
IP
I,II layers

VoIP data packets live in RTP (Real-Time Transport Protocol) packets which are inside UDP-IP packets.

Firstly, VoIP doesn't use TCP because it is too heavy for real time applications, so instead a UDP (datagram) is used.

Secondly, UDP has no control over the order in which packets arrive at the destination or how long it takes them to get there (datagram concept). Both of these are very important to overall voice quality (how well you can understand what the other person is saying) and conversation quality (how easy it is to carry out a conversation). RTP solves the problem enabling the receiver to put the packets back into the correct order and not wait too long for packets that have either lost their way or are taking too long to arrive (we don't need every single voice packet, but we need a continuous flow of many of them and ordered).

Real Time Transport Protocol

0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|V=2|P|X| CC |M| PT | sequence number |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| timestamp |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| synchronization source (SSRC) identifier |
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
| contributing source (CSRC) identifiers |
| .... |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Where:

* V indicates the version of RTP used
* P indicates the padding, a byte not used at bottom packet to reach the parity packet dimension
* X is the presence of the header extension
* CC field is the number of CSRC identifiers following the fixed header. CSRC field are used, for example, in conference case.
* M is a marker bit
* PT payload type

read more...

Tuesday, July 29, 2008

“Warning! Spyware detected on your computer”



“Warning! Spyware detected on your computer” Wallpaper is created by a Trojan — Troj_Renos.ACO or lphc3pgj0e3ct.exe — that installs itself onto your computer, through a drive-by download on a weak site.

How considerate of it.

If you see “Warning! Spyware detected on your computer” Wallpaper, the only spyware you’ve got is “Warning! Spyware detected on your computer” Wallpaper.

I’ll show you how to get rid of “Warning! Spyware detected on your computer” Wallpaper for free.

Do I Have “Warning! Spyware detected on your computer” Wallpaper?

You can search your computer manually, but it might take hours to find “Warning! Spyware detected on your computer” Wallpaper’s hidden files. To save time, I recommend you automatically scan your PC for “Warning! Spyware detected on your computer” Wallpaper and other spyware. Why not? It’s free.

You can easily detect “Warning! Spyware detected on your computer” Wallpaper with SpyHunter’s FREE spyware scanner. And if you’re really infected with “Warning! Spyware detected on your computer” Wallpaper, you can buy the full version of SpyHunter to remove “Warning! Spyware detected on your computer” Wallpaper and other spyware. Or you can use my instructions below and remove “Warning! Spyware detected on your computer” Wallpaper for free.

I’m a big fan of SpyHunter. Here’s why: SpyHunter offers live support on the phone, and if SpyHunter doesn’t automatically remove “Warning! Spyware detected on your computer” Wallpaper, you can get a custom fix for your computer.

How to Remove “Warning! Spyware detected on your computer” Wallpaper

Your best protection against “Warning! Spyware detected on your computer” Wallpaper is to remove “Warning! Spyware detected on your computer” Wallpaper processes, registry keys, DLLs, and other files ASAP.

Get Rid of “Warning! Spyware detected on your computer”
Wallpaper Manually removal of any spyware can be difficult.
When you manually remove “Warning! Spyware detected on your computer” Wallpaper, you have to fiddle with your registry and risk destroying your PC. It’s highly recommended you use an automatic spyware scanner to make sure you’re infected with “Warning! Spyware detected on your computer” Wallpaper. Also, I recommend you backup your system any time before editing your registry.

To remove “Warning! Spyware detected on your computer” Wallpaper manually, you need to delete “Warning! Spyware detected on your computer” Wallpaper files. Not sure how to delete “Warning! Spyware detected on your computer” Wallpaper files? Click here, and I’ll tell you. Otherwise, go ahead and…


To remove “Warning! Spyware detected on your computer” Wallpaper manually, you need to delete “Warning! Spyware detected on your computer” Wallpaper files. Not sure how to delete “Warning! Spyware detected on your computer” Wallpaper files? Click here, and I’ll tell you. Otherwise, go ahead and…

Stop “Warning! Spyware detected on your computer” Wallpaper processes:

C:\Windows\System32\lphc3pgj0e3ct.exe

Detect and Remove “Warning! Spyware detected on your computer” Wallpaper files:

C:\Windows\System32\phc3pgj0e3ct.bmp
C:\Windows\System32\blphc3pgj0e3ct.scr

Remove “Warning! Spyware detected on your computer” Wallpaper registry values:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
lphc3pgj0e3ct = “%System%\lphc3pgj0e3ct.exe”

Note: In any files I mention above, “%System%” is a variable referring to your PC’s System folder. Maybe you renamed it, but by default your System folder is “C:\Windows\System32″ on Windows XP, “C:\Winnt\System32″ on Windows NT/2000,” or “C:\Windows\System” on Windows 95/98/Me.

Relatedly, “%UserProfile%” is a variable referring to your current user’s profile folder. If you’re using Windows NT/2000/XP, by default this is “C:\Documents and Settings\[CURRENT USER]” (e.g., “C:\Documents and Settings\JoeSmith”).

“Warning! Spyware detected on your computer” Wallpaper changed your homepage?

Click Windows Start menu > Control Panel > Internet Options. Next, under Home Page, select the General > Use Default. Type in the URL you want as your home page (e.g., “http://www.homepage.com”). Then select Apply > OK. You’ll want to open a fresh web page and make sure that your new default home page pops up.


Recommendation:
“Warning! Spyware detected on your computer” Wallpaper removal warning To save time and avoid risking destroying your computer, I highly recommend you use a spyware scanner, such as SpyHunter, to detect “Warning! Spyware detected on your computer” Wallpaper and other spyware, adware, trojans, viruses, keyloggers, and more that can be hidden in your PC. It’s also recommended before you manually remove “Warning! Spyware detected on your computer” Wallpaper you backup your system.
read more...

Spyware Database, Removal Instructions


Spy Sheriff removal
Spyware Spy Sheriff Information
Name: Spy Sheriff
Category: Trojan
Date: 2005-08-19
Dangerous: Yes

SpySheriff is rogue anti-spyware software that acts like a trojan horse. SpySheriff hijacks the desktop, changes the wallpaper to a warning message to lure the user into using the antispyware software [which fixes nothing] it installs.
Spy Sheriff description by publisher:
(Not True) SpySheriff an award-winning spyware removal tool will help you fighting all kinds of spyware & adware including key loggers, trojan horses, password thieves & on. With new & unique protection module once cleaned your machine will not get infected ever again.
This Trojan is also known as:
• spysheriff
• spy sherrif
• adware sherrif

Below listed processes registry entries files directories are part of this spyware. To manually get rid of it, follow these instructions (at your own risk).
Spy Sheriff Removal Instructions
Kill the following processes
1950.exe , newdial.exe , spysheriff.exe , uninstall.exe , winstall.exe
Delete these registry entries
SOFTWARE\spysheriff
SOFTWARE\Microsoft\Windows\CurrentVersion\uninstall\spysheriff
Remove the following files
1950.exe , Desktop.html , newdial.exe , spysheriff.exe , uninstall.exe , winstall.exe .
SpySheriff.lnk in Desktop\
Remove the following directories
Program Files\spysheriff

AntivirusGold removal
Spyware AntivirusGold Information
Name: AntivirusGold
Category: Trojan
Date: 2005-06-01
Dangerous: Yes

AntivirusGold is an adware application. Antivirus Gold is installed by some trojans without asking for user permission. The deskop wallpaper is modified & advertisement is displayed uring the user to buy Antivirus Gold. Upon clicking on the message, a web explorer is opened to point to www.AntiVirus-Gold.com. The purpose of this trojan is to install itself & pretend that only AntiVirus Gold can remove it.

AntivirusGold Removal Instructions
Kill the following processes
antivirusgold.exe, ongi.exe, uninst.exe
Delete these registry entries
HKEY_CLASSES_ROOT\clsid\{020b1227-417d-4682-9ac3-61f43cb5b6b1}
HKEY_CLASSES_ROOT\clsid\{125494b2-acad-414c-98b9-452f3ef7703a}
HKEY_CLASSES_ROOT\clsid\{20a3d913-30ef-4e69-b3f7-93b3f1fb9d5c}
HKEY_CLASSES_ROOT\clsid\{3d00a39c-655b-428b-aeb2-2fba03dcc49c}
HKEY_CLASSES_ROOT\clsid\{408f660a-9465-44a3-b557-8709dfd992bc}
HKEY_CLASSES_ROOT\clsid\{5f6bbd8a-18cf-4d55-8b4c-c9b4c9328dfe}
HKEY_CLASSES_ROOT\clsid\{8c56b6ce-c53f-44c4-9bdc-a9bc1711d05a}
HKEY_CLASSES_ROOT\clsid\{8ee6bf73-b370-4d13-9126-eb0071178f2e}
HKEY_CLASSES_ROOT\clsid\{97f56e12-c706-4aeb-9ffb-133c05ee5d38}
HKEY_CLASSES_ROOT\clsid\{9bb7e700-4e48-476d-b75c-6f47606be988}
HKEY_CLASSES_ROOT\clsid\{cbcaca58-1aee-4600-8cf0-e8b30bff1535}
HKEY_CLASSES_ROOT\clsid\{d6d64cdf-0363-4261-b723-29a3af365e1d}
HKEY_LOCAL_MACHINE\software\antivirusgold
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\app paths\antivirusgold.exe
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\antivirusgold
Remove the following files
aglanguage.ini, antivirusgold.exe, antivirusgold.lnk, ongi.exe, shortcut to antivirusgold.lnk, uninst.exe.
antivirusgold 2.0.lnk in Documents and Settings\UserName\administrator\start menu\
Remove the following directories
Documents and Settings\UserName\administrator\start menu\programs\antivirusgold
Program Files\antivirusgold

Elite toolbar removal
Spyware Elite toolbar Information
Name: Elite toolbar
Category: Toolbar
Date: 2005-07-26
Dangerous: Yes

Elite Toolbar (Elitebar) performs malicious actions towards user. It installs adware, spyware and launches other unwanted processes that disturbs your work and wastes your time.
This Toolbar is also known as:
EliteBar.
Below listed processes dlls registry entries files directories are part of this spyware. To manually get rid of it, follow these instructions (at your own risk).

Elite toolbar Removal Instructions
Kill the following processes
elite toolbar.exe, suicidetb.exe, silent_install.exe, protas.exe, protopro.exe, sideb.exe, silent53.exe, elitefmj32.exe, elitekck32.exe, elitexdx32.exe
Unregister the following DLLs and reboot
81635062.dll, elitetoolbar version 60.dll.
elitesidebar 08.dll in Windows\elitesidebar\
elitetoolbar version 59.dll in Windows\elitetoolbar\
Delete these registry entries
HKEY_CLASSES_ROOT\clsid\{0a1d22c3-37be-470c-9c29-e3074ee0574b}
HKEY_CLASSES_ROOT\clsid\{28caeff3-0f18-4036-b504-51d73bd81abc}
HKEY_CLASSES_ROOT\clsid\{825cf5bd-8862-4430-b771-0c15c5ca8def}
HKEY_CLASSES_ROOT\clsid\{be8d0059-d24d-4919-b76f-99f4a2203647}
HKEY_CLASSES_ROOT\clsid\{ed103d9f-3070-4580-ab1e-e5c179c1ae41}
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser\{825cf5bd-8862-4430-b771-0c15c5ca8def}
HKEY_LOCAL_MACHINE\software\elitum
HKEY_LOCAL_MACHINE\software\elitum\elitetoolbar
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar\{825cf5bd-8862-4430-b771-0c15c5ca8def}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{28caeff3-0f18-4036-b504-51d73bd81abc}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{ed103d9f-3070-4580-ab1e-e5c179c1ae41}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run\antiware
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\elitebar internet explorer toolbar
HKEY_LOCAL_MACHINE\software\ohbbackup
Remove the following files
81635062.dll, elite toolbar.exe, elitetoolbar version 60.dll, protas.exe, protopro.exe, sideb.exe, silent53.exe, www.gamefly[1].com.
silent_install.exe in Documents and Settings\UserName\local settings\temporary internet files\
suicidetb.exe in Documents and Settings\UserName\local settings\temp\
elitesidebar 08.dll in Windows\elitesidebar\
elitetoolbar version 59.dll in Windows\elitetoolbar\
elitefmj32.exe, elitekck32.exe, elitexdx32.exe in Windows\system32\
Remove the following directories
Windows\elitetoolbar
read more...

Can Apple Break Through China's Great Wall of Counterfeits?


When it comes to its antipiracy efforts, Apple generally doesn't like to raise a ruckus. However, pirates in China and the country's lax stance on the matter might force chief executive Steve Jobs to turn up the volume.
Apple (Nasdaq: AAPL) Latest News about Apple may be making a lot of noise lately with its new iPhone 3G, but when it comes to fighting software pirates, Steve Jobs' company prefers to speak softly and carry a big stick -- the stick, of course, being legal action like its recent lawsuit against computer maker Psystar for producing machines that can run Apple software.

Unlike other software companies that stage press conferences whenever they take on intellectual property theft, Apple prefers to swing that stick in a media vacuum. A good example is the official company statement regarding the Psystar suit, which is all of 14 words. "We take it very seriously when we believe people have stolen our intellectual property," Apple spokesperson Susan Lundgren told MacNewsWorld.

To say that Apple takes intellectual property theft seriously is a little like saying iPods are somewhat popular; the company is willing to take young bloggers to court for leaking news about future products. "It gets a reputation not though PR, but through people reporting on the activity of its legal departments," freelance writer/blogger Mike Elgan told MacNewsWorld.

However, the economic behemoth that is China could force Steve Jobs to crank up the volume because of the country's lax stance on software piracy.

'A Huge Problem'
Psystar is a Miami-based company selling cheap "Hackentoshes" -- open computers that run Mac OS X. That violates end-user licensing agreements stating Mac software can only run on Apple computers, Apple says.

Apple's lawyers know where to send the Psystar subpoenas. But on the streets of Beijing -- soon to host the world for the Summer Olympics -- counterfeit iPhones complete with Apple logo can be found, and it's much harder there to target a company for legal retribution.

"The generally accepted yardstick when you go into China for any software or consumer device is that for every one copy -- one legal copy -- there will be three more pirated ones," Laura DiDio, analyst and research fellow for the Yankee Group, told MacNewsWorld. "These are very, very sophisticated [piracy] rings. ... They consider piracy an art form. This is a huge, looming problem for Apple."

John Gantz, a chief research officer who heads all piracy research for IDC, disagrees. "I think Apple has a much easier row to hoe than Microsoft. Apple is out there selling hardware like HP is selling computers. ... They're not solely a software company. The fact that the hardware and OS are so tied together with a Mac. ... I think that makes it harder to counterfeit."

Apple's lower market share may not make it much of a piracy target, Gantz told MacNewsWorld; however, DiDio thinks counterfeit software may hurt Apple's bottom line as much as it does Microsoft (Nasdaq: MSFT) Free Trial. Security Software As A Service From Webroot. Latest News about Microsoft. "When your market share is smaller, you can ill afford to have any of that siphoned off by piracy," she commented.

Sensitive East-West Negotiations
Apple faces myriad obstacles in China, according to Elgan. The first Apple Store is soon to open in Beijing, and Elgan says 1 million unauthorized iPhones are operating on the network New HP LaserJet P4014n Printer Starting at $699 after $100 instant savings. of China Mobile, the country's major carrier. There are countless counterfeit iPhones sold on a vast black market.

"They're so blatant in their IP theft," Elgan said, "They're flat-out stealing everything down to the exact design of the icon. ... It's the same wallpaper as the original (first generation) iPhone, down to the last pixel. I'd be surprised if Apple isn't bringing this up at every opportunity."

But bringing it up to whom? Elgan suspects Apple would -- gently -- raise the problem of piracy with everybody from the Chinese government to China Mobile.

A much-discussed iPhone clone, the Meizu M8, could be at the heart of those negotiations. "It's the highest-visibility iPhone clone," Elgan said. "Phones get developed and put onto the market in China really fast -- it's a ridiculously fast process. This company has been demonstrating it for more than a year, but they seem to be struggling to release it. I wouldn't be surprised if there isn't something going on behind the scenes with Apple."

Fighting Pirates Under the Radar
Behind the scenes is where Apple prefers to be when it comes to antipiracy initiatives. "They are aggressive, but they're quiet about it," DiDio said. "They find it very expeditious to fly under the radar. It's the same thing with security -- security by obscurity. The less you talk about it, the better off you are."

Apple also lets the Business Software Alliance Latest News about Business Software Alliance do the fighting for it, DiDio added. The BSA, however, doesn't comment on specific companies' antipiracy efforts, spokesperson Rodger Correa told MacNewsWorld.

Microsoft, the biggest target for software theft, introduced its Genuine Advantage online validation tool, which alerts consumers and the company to potentially fraudulent copies of Windows through periodic checks over the Internet. Use of the tool has led to Microsoft lawsuits and publicity, along with criticism from some who claim it is spyware. Yet Apple has basically engaged in the same tactics, DiDio said.

"Apple's stance is, we'll make these checks frequent enough to be useful but not enough to be a pain in the butt to the users," she said. "Microsoft has done the same thing with Windows Genuine Advantage, but you hear about that. I'll bet you didn't hear about Apple. ... Again, flying under the radar."
read more...

Med Apps Turn iPhone Into Health Monitor

Card games and restaurant finders aren't the only things for sale at the iPhone App Store. It's also a place to get applications designed for fitness and medical-related tasks. There are even applications that will make all your medical records readily available to you anywhere.

Body by iPhone

Dozens of new health and fitness Web applications are now available for use with the Apple (Nasdaq: AAPL) Latest News about Apple iPhone, which combines a mobile phone, a widescreen iPod and an Internet browser into one gadget.

The apps, which likely will eventually be available on other phones that will run on a Google-based operating system, enable third-party software developers to create a new breed of health services.

These programs can literally put all your health records -- including digital images such as ultrasounds and echocardiograms -- into the palm of your hand. Or they can administer eye exams or keep track of your calories and exercise.

Making It Easier

One application, My Life Record, lets consumers access and share their own medical imaging New HP LaserJet P4014n Printer Starting at $699 after $100 instant savings., charts, medications and even lab results via the iPhone.

That would be handy if, for example, you hurt your ankle and had it X-rayed at the University of Chicago, said Dr. Russ Horowitz, an emergency room physician at Children's Memorial Hospital.

If your ankle was throbbing two days later and you went to see Horowitz, he'd have to call the University of Chicago for the report -- someone else's interpretation of the image -- or take another X-ray. "It would save the system a lot of money because I wouldn't have to redo things," said Horowitz.

If the phone is lost, privacy could be an issue. But if you immediately contact the My Life Record support staff, they'll disable the device so your health information is inaccessible. If your iPhone turns up, they can re-enable it.
read more...

Monday, July 28, 2008

Speed up External USB Hard Drives in Windows Vista


if you have an external hard drive that is always plugged into your computer, you can enable write caching to speed up performance significantly when writing to the disk.

Write caching isn't enabled by default for external drives because removable devices could lose data if you unplug them too quickly, so take care when using this setting.
To change this setting, just type Device Manager into the start menu search box, and hit enter.

Browse down to the external hard drive that you wish to enable write caching on, and double click it to open up the properties screen.

read more...

Speed Up SATA Hard Drives in Windows Vista


Windows Vista has built-in support for Serial ATA(SATA) hard drives, but it doesn't automatically enable advanced write caching features. You can speed up your computer by enabling this mode in Device Manager.

You can quickly get to Device Manager by just typing device into the start menu search box. (Or from the command line, devmgmt.msc)
Open the Disk drives section of the tree, and right-click on your hard drive, choosing Properties.

Select the Policies tab, and you should see this dialog:


Click the checkbox for Enable advanced performance, and you are done.
read more...

Speed up Windows Vista Start Menu Search By Limiting Results


The Windows Vista start menu search box is one of my favorite features in Vista, but searching can be pretty slow if you have a lot of personal files, because by default the start menu search also searches files, windows contacts, windows mail, history, and favorites.

You can customize the search results returned in the Start menu search box to only return the results that you want. I personally only want to use the start menu search to pull up applications, so I disabled everything else.

To configure this setting, right click on the Start button and select Properties. Click the Customize button, and you can scroll down to the Search checkboxes.

For best results, change the Search files radio button to "Don't search for files". The start menu is too small to find files anyway. This will speed up searching immensely.

Here's the details on what the other options do:

  • Search - Should disable the search entirely, but doesn't seem to remove the search box. (Note: This option is removed in Service Pack 1).
  • Search communications - Disables searching through emails and contacts. As far as I can tell, it's only Windows Mail and Windows Contacts right now. I assume other applications will eventually be included here. I disabled this since I don't use either product.
  • Search favorites and history - Searches through your IE favorites and browser history.
  • Search Files - You can change this to search all files, or just your home directory. Or disable entirely for speed.
  • Search Programs - Searches through the start menu and applications.

You can customize to your liking.

read more...

Search Your Internet Explorer Favorites From Within IE in Vista or XP


A freeware utility that will let you search your IE favorites right from within the browser itself.This add-on is called DzSoft Favorites Search, and it's completely free, although it does have one glaring flaw: You can't open up your bookmarks in a new tab, which is something I do all the time. It also seems to be slightly clunky, but since it was originally written for IE 5.0, I guess that's not surprising.


Using the Search Panel
After installation, you'll have access to a new search panel on the left-hand side, which seemed to work well… you can search for a single keyword, multiple, or even the URL.

Show the Toolbar Button

In order to actually get access to that panel, you'll need to make sure that you can see the new button that gets added to the toolbar, but always seemed to be hidden in my testing. Right-click over the buttons and uncheck "Lock the Toolbars"…



Then drag the slider over until you can see the new Favorites Search button. If you still don't see it, use the Customize Command Bar option above and add the button to the toolbar.

You could also get to this bar by holding down the Alt key until you see the menu, and then going to View \ Explorer Bar \ DzSoft Favorites Search, but that's hardly a convenient way to turn it on, so I prefer the button.

There are also a number of options you can change in the drop-down menu:

For instance, the Create "Last Found Items" menu will actually add a folder to your Favorites showing the recently found items that you searched for:

So, if you are always puzzled how to search through your IE bookmarks, this is the add-on for you. Personally I'd stick with using the Vista Search method since it doesn't require any extra software, but this is a decent solution for those of you on XP.
read more...

Thursday, July 24, 2008

Software Advance Helps Computers Act Logically


Computers just respond to commands, never "thinking" about the consequences. A new software language, however, promises to enable computers to reason much more precisely and thus better reflect subtleties intended by commands of human operators. Developed by National Institute of Standards and Technology (NIST) researchers and colleagues in France, Germany, Japan and the United Kingdom, the process specification language software, known as ISO 18629, should make computers much more useful in manufacturing.

ISO 18629 uses artificial intelligence (AI) and language analysis to represent computer commands in the context of a manufacturing plan. Researchers have incorporated approximately 300 concepts, such as "duration" and "sequence," into its software structure. Computers using software with this expanded, though still primitive AI capacity, can act on a word's "meaning," interpreting a command almost like a person.

For instance, a person who hears the commands "paint it, before shipping it" and "turn on the coolant, before milling" understands that the word "before" has slightly different meanings in these two different contexts. In the first command, it is understood that painting and drying must be completed prior to the next action, shipping. In the second command, however, the first action, turning on the coolant, continues after the milling starts. ISO 18629 supports computer systems with this type of rudimentary understanding of context-specific language.

The ISO 18629 language is especially suited for the exchange of process planning, validation, production scheduling and control information for guiding manufacturing processes. The International Organization for Standardization (ISO), which already has approved six sections of the fledging standard, is currently reviewing the last of its three sections. Once the expected ISO approval is given, software vendors will begin building a variety of manufacturing systems that conform to ISO 18629.
read more...

Virtual Toothache Helps Student Dentists


Masha is a dental patient. Her oral health problems continue to change as she meets new Case Western Reserve University student dentists in Second Life's virtual dental office.
The middle-aged avatar is an integral part of a new research project of the Case Western Reserve University School of Dental Medicine and the College of Arts and Sciences department of communication sciences to teach and give students practice time to communicate with mock patients.
Not only do findings from the study have potential to revolutionize dental education but also to change the way national testing is done for patient-side communication skills.

Kristin Z. Victoroff from the dental medicine's department of community dentistry will direct the three-year Innovative Dental Assessment Research and Development (IDEA) Grant project from the American Dental Association's Joint Commission on National Dental Examinations. She will develop patient communication scenarios for simulated education and test their effectiveness in preclinical training for students.

"More dental schools are experimenting with simulation as a way to teach," said Victoroff. She is joined in the research project by Roma Jasinevicius and Catherine Demko from the dental school faculty in testing and implementing simulations in dental education at the university.

Since 2001, the Case Western Reserve dental school has been on the forefront in using simulations in teaching the physical dexterity skills by using a technology called DentSim. DentSim is a simulated and computerized training system that uses a simulated dental patient. The school's use of the technology in dental education was spearheaded by Jasinevicius.

From that technology, the attention turned to developing what Victoroff's describes simulated experiences for the "softer" skills of dental medicine--communicating with patients.

Victoroff enlisted virtual reality experts and Art and Sciences' communication disorder scientists Stacy Williams, who directs the Virtual Immersion Center for Simulation Research (VICSR), and Kyra Rothenberg, director of the health communications minor.

They will take three approaches to simulated communications training--live actors, the immersion theater where students interact with a virtual patient in a 180-degree surround theater and with avatars, like Masha, in Second Life.

Of the three simulation methods, Victoroff is interested in using the immersion theater and Second Life. She noted that paper-based, live actors and real patients present limitations from ethical issues to logistical challenges. Meanwhile, the interactive theater and Second Life have capabilities to assess competencies in a convenient, standardized and cost-effective situation.

According to Victoroff, if successful, the virtual scenarios in an immersion theater setting or the online Second Life community might provide a potentially better way of assessing a student's abilities to communicate with patients than the current multiple-choice questions on the national examinations required for practicing professionally.

During spring semester, 70 students in the third-year dental class participated in a pilot study to develop their communication skills with live actors and virtual patients during communication skills training at the Mt. Sinai Skills and Simulation Center at the Veterans Administration Hospital.

The research project focuses on developing scenarios that aid and test students in taking patient histories, providing oral health education like tobacco cessation counseling for smokers, explaining procedures, talking about healthcare options and obtaining informed consent, and working through situations that present ethical dilemmas. These are among the competencies outlined by the American Dental Education Association.

Along with communication sciences students, the use of the virtual reality theater by dental students will advance the researchers understanding in how this technology can be applied to teaching and assessing students in different disciplines. The dental students will use a portable 50-inch LCD panel instead of the larger fixed 180-degree theater. In real time, the students interact and communicate with Masha.

"Ideally it is not that we are out to prove that virtual worlds or the VICSR system is better than standard instruction, but that they are of equal value," said Williams, adding that students should be able to walk away learning the same types of knowledge they can learn from working with live patients.

Students are very accepting of the VICR environment and put a lot of reflection in their voices when they are talking to the animated characters, said Williams.

Rothenberg will piece together students' motivations and perceptions when using this technology for their education.

According to Rothenberg who works in health communications, VICSR is already showing positive results from communication science students and patients using the virtual theater for their education and speech therapy.

"Virtual patients have much to offer in training healthcare providers, and it is equally important to explore how interactive virtual reality technology can enhance assessment of competency," said Victoroff.
read more...

Tuesday, July 22, 2008

Spyware files



Computer system consists of various files. You can find thousands of files by different filenames and in different parts of the system. Some of the files are SYSTEM FILES and they are needed to maintain system stability and functioning, others are APPLICATION FILES, which are required to run various applications properly. And of course there are various MALICIOUS FILES which can harm your computer, collect information and do various other things. This section will help you to identify various files by their filenames, see if its related to some parasites or applications.
There are lots of files which uses legitimate system filenames but they are placed in other sections of the computer simply to deceive the user. We will help you to understand the difference between malicious files and legitimate files. Use our search form and find the descriptions of the files by their filenames.

Newest files:
Ntvdm.exe
SOUNDMAN.EXE
isass.exe
iexplorer.exe
dumprep.exe
svhost.exe
steam.exe
rtlwake.exe
rtcshare.exe
rsh.exe
RoxMediaDB.exe
roamsvc.exe
Part1.Utorrent.exe
reset.exe
reportingservicesservice.exe
RegSrvc.exe
registryrepairpro.exe
RECGUARD.EXE
rcp.exe
ramasst.exe
quickset.exe
qprocess.exe
qfschd130.exe
puxpman.exe
proxy.exe
PROMon.exe
prismcfg.exe
PPActiveDetection.exe
pnroutsv.exe
pinger.exe

watch out of them


Ntvdm.exe
SOUNDMAN.EXE
isass.exe
iexplorer.exe
dumprep.exe
svhost.exe
steam.exe
rtlwake.exe
rtcshare.exe
rsh.exe
RoxMediaDB.exe
roamsvc.exe
Part1.Utorrent.exe
reset.exe
reportingservicesservice.exe
RegSrvc.exe
registryrepairpro.exe
RECGUARD.EXE
rcp.exe
ramasst.exe
quickset.exe
qprocess.exe
qfschd130.exe
puxpman.exe
proxy.exe
PROMon.exe
prismcfg.exe
PPActiveDetection.exe
pnroutsv.exe
pinger.exe

read more...

Spyware Software



In this section you can find reviews and test results of hundreds of more or less known anti-spyware programs available in the Internet. An anti-spyware program is a specific application designed to fight against spyware, adware threats and other kinds of parasites. It scans a computer, detects security and privacy risks and completely removes them from the system. Different spyware removers have different features and functions, use different detection and removal techniques and approaches, they can be similar to each other or may have absolutely nothing in common. The only thing that unites them is the purpose - to find and eliminate pests and clean up a compromised system. Here is side by side ANTISPYWARE COMPARISON CHART

But not all anti-spyware tools can be trusted. The spyware software section is divided into categories: anti-spyware and corrupt anti-spyware. In the first one we provide reviews of recommended solutions and effective enough products. The second one contains the list of corrupt, rogue, fake, illegal, even harmful programs that cannot properly detect and remove spyware. We DO NOT recommend to purchase or use any programs that fall into our corrupt anti-spyware list.

The main purpose of the Spyware Software section is to introduce reliable and really working anti-spyware software available on the market and help to avoid bad products, which vendors just want to make money from you. Provided categories can also be used for software comparison and analysis. 2-spyware.com wants to help you to choose the right product.

Software by categories:

Anti-Spyware (75) - Anti-Spyware contains the list of all known legitimate anti-spyware programs that can effectively detect and remove spyware, adware threats and other kinds of computer parasites from the system.
Corrupt Anti-Spyware (232) - Corrupt AntiSpyware category contains the list of corrupt, rogue, fake, illegal, even harmful anti-spyware tools that cannot correctly detect and remove spyware or other parasites and therefore are totally ineffective and should NOT be purchased and used.
Parasite removal tools (5) - This section provides the list of separate parasite removal tools designed to find and remove specific trojans, worms, viruses, spyware or adware threats.

original resource from http://www.2-spyware.com



read more...