PD Proxy-Secure,Highspeed Browsing

PD-Proxy VPN

Website: http://www.pdproxy.com/

This is a custom vpn. They are not using openvpn, pptp or l2tp for their vpn connection.

Their website is pretty simple with a fancy page for their users.

PD-Proxy program is very easy to install, friendly and convenient to use. You just need to register at their web site, download the software and, using the login and password that you entered during the registration process, connect to their server. Registration is free.

They have free accounts which is limited to 100MB per day which I think is very generous if you are just going to check your facebook account. If you are going to use this for streaming videos then upgrading your account is recommended. They accept paypal payments which means you dont have to wait for anyone to activate your account. Just pay and then instantly use your premium account. Another advantage of premium users is the ability to choose servers in multiple locations.

You can see the list of their servers in this page http://www.pdproxy.com/server-status.htm

Features:

  • Anonymous Surfing/browsing

 Our service will make anonymous and secure your Internet connection, creating an encrypted tunnel between you and our servers. This will assign a new ip address to your computer, in this case your online activity is anonymous and prevents harassment caused by people tracking you by your IP address.

  • Security

VPNs provide the highest level of security using advanced encryption and authentication protocols that protect data from unauthorized access. When you create a private virtual tunnel between your computer and ours, and surf the internet from there, your VPN account is giving you a layer of security you did not have before.

PD-Proxy uses industry–standard Virtual Private Networking (VPN) technology to create a secure tunnel between your laptop and the PD-Proxy servers. When you connect to PD-Proxy, all your Internet traffic goes through this encrypted tunnel, preventing users nearby from intercepting your information.

PD-proxy control panel:

PD PROXY CONTROL PANEL

User interface:

PD PROXY USER INTERFACE

Overall rating

  • Support: 4/5
  • Speed:   5/5  (No buffering when watching youtube)
  • Reliability: 5/5

Will I recommend them? —————>>>Definitely

tEcH vIpEr

How to Remove a Keylogger

  • What is a Keylogger

A keylogger is a malicious program that is able to track a user’s keyboard and mouse inputs in order to log usernames, passwords, and other sensitive information. Keyloggers not only capture keystrokes but also mouse clicks, files and folders that are accessed, visited websites, and much more. A keylogger is dangerous to users because it can steal the user’s bank account number, PIN, social security number and other financial information. Keyloggers are not especially difficult to remove but they can be difficult to detect as keyloggers can be launched and controlled from a remote computer and run in the background of the user’s computer.

 

  • Getting Around a Keylogger

When the user suspects that he/she is infected with a keylogger, he/she should NOT type any personal information. Even when typing in a normal word document, the keylogger still keeps track of everything typed.

In order to log into Email or somewhere secure and password protected, there is one way to get around the keylogger:

Click on Start -> Go to All Programs -> Click onAccessories -> Select Accessibility ->Click on On-Screen Keyboard

Executing the above steps opens a keyboard on the screen so that the user can click whatever letter he/she would like to type. Since a keylogger does not track where and what the user clicks, this helps to get around it in times of urgency. Typing with the onscreen keylogger is a great hassle. The only alternative is to eradicate the keylogger program from the computer completely.

 

  • Detecting a KeyLogger

The user has to detect a keylogger in order to eradicate it. Detecting a keylogger is not simple. It can be installed in over a 100 places on the computer, usually in one of the system files. However, there is a much easier way to detect if a keylogger is running. Right click the desktop’s task bar and click Task Manager. Alternately, press Ctrl + Alt + Del simultaneously to open the Task Manager. Task Manager displays a list of all the applications currently running on the computer. Click the tab that says Processes. This gives information about all the programs, hidden and visible, that the computer is currently running.

The name of each process is under Image Name. The keylogger will show up on the list of processes as well as many other programs and background processes. However, it may be difficult to distinguish between the different processes.

There are many sites on the Internet that provide a vast amount of information on each and every process. One of these sites is Liutilities. This site provides some background information on each process as well as specifies the author and the program it is part of. One of this site’s best features is that it  recommends what to do with each process. Most of the time, the process is harmful and simply part of the operating system or another program that is running.

Another fantastic site for information on processes is Neuber. Like Liutilities, Neuber gives background information on each process. A special feature they have is user created comments. Anyone can rate a process in terms of its security and leave a comment about how to deal with the process. Generally, these comments are very accurate. Neuber also provides a ‘security rating’ for each process based on the users’ average rating.

akl

anti keylogger

However, some find it hard to research each process individually. Thankfully, there is a program called Security Task Manager that is free to download. It displays information about each process that is currently running and specifies whether they are dangerous or not. The user is immediately notified if anything harmful comes up. This Neuber program also shows the security rating and a random user’s comment for each process. Processes that the program has never encountered are not given a security rating or comment. It is therefore advised that each process is researched individually.

Once the harmful process is found in the Task Manager, click the process then click the ‘End Process’ button. The process selected should be terminated immediately.

Once this is complete, the computer is safe until rebooted. If the keylogger was not deleted, it will start up again upon being rebooted.

Once the keylogger is stopped, run anti-virus and spyware checks on the entire computer. Some free virus scan utilities that are recommended are A2, Dr. Web, and AVG. However, highly advanced keyloggers such as TypeAgent, KGB, and SpyOutside can often slip through these scans and remain undetected.

If the anti-virus scans fail to show any result, manually detect and delete the keylogger. Keyloggers are usually located in the system files, so do not delete anything that is not definitely keylogger. Doing so may lead to errors in other areas of the computer. Go to 411-spyware and search for the type of keylogger that has infected the system. If it is listed, there should be instructions about how to manually remove it.

A great way to check if the keylogger has been completely removed from the system is to reboot. Remember the name of the keylogger’s process and reboot the computer. If the process is not there when the computer has rebooted, then the keylogger has been removed.

 

  • Pattern Matching

Pattern matching involves the use of signature bases to detect keyloggers and is the most common method that antispyware software uses. Pattern matching consists of matching the individual signatures from malicious programs against a database of signatures in order to detect keyloggers and other malicious software. Unfortunately, signatures can only be added to an antispyware’s database after someone has been attacked by the specific keylogger. Even after the signature has been added to the signature database, users must update their database in order for their antispyware software to recognize the new keylogger. Because of this, many users are still vulnerable to keyloggers and other malicious programs.

 

  • Anti-Keylogger

Anti-Keylogger is a software that combats keyloggers by addressing the vulnerabilities in security that have been discussed in this article. Anti-Keylogger does not need to wait on signatures to be added to the database because it does not use signatures to identify keyloggers. Instead, the software focuses on the actual activities of a keylogger and flags suspicious behavior. When Anti-Keylogger detects a potential keylogger, it stops the program immediately and allows the user to delete the program if need be. Anti-Keylogger is very easy to use and runs in the background of the user’s computer. The program uses very little CPU and comes with its own User Manual. The software can be downloaded on a free trial basis, can be purchased for $59.95, and comes with a 30-day money back guarantee.

 

Other anti-keylogger / spyware softwares

 

 

Convert windows XP or 7 to windows 8.

skm

windows 8 transformation pack

 

Windows 8 Transformation Pack will convert your XP, Vista or Windows 7 based system to look like Windows 8 and some of its features emulated. You don’t have to purchase Windows 8 or any 3rd-party applications to get Windows 8 UI experiences. This transformation pack will simply make it done for you for free!

This will update your Windows XP, Windows Server 2003 and Windows 7 with Windows 8 GUI by adding some themes and replacing system files.

This Transformation Pack gives to your system the fresh and cool look of Microsoft’s upcoming operating system: Windows 8. The pack changes most of the system icons, skins and toolbars and also adds new enhancements to your desktop.

Features:

  • Seamless installation and uninstallation giving users safe transformation
  • Easily configurable in single click with intelligence Metro UI design
  • Designed for all editions of Windows XP/Vista/7 including Server Editions
  • Genuine Windows 8 system resources with Metro touches
  • Smart system files updating with auto-repair and Windows Update friendly
  • Fresh start for Vista/Seven Transformation Pack users with updated Windows 8 themes and resources
  • UxStyle memory patching
  • Windows 8 themes, wallpaper and logon screen
  • UserTile with current user auto-configured on login
  • Metro UI desktop emulation with pre-configured gadgets
  • Aero’s auto-colorization feature
  • And much more

        Download Now

not working ? click here

Windows 8 , release on october…

Microsoft showed its first public demo of Windows 8 on Wednesday, and it’s not at all like the Windows operating systems you’ve come to know over the past 25 years. The next version of Microsoft’s operating system (“Windows 8” is just a codename) is a radical departure, designed around touch screens

If this revelation is making you weak in the knees, worry not. Here’s a handy FAQ on the early Windows 8 build that Microsoft demonstrated:

What Windows 8 features did Microsoft demonstrate?

Essentially, Microsoft showed how Windows 8 will work on both tablets and traditional PCs. The operating system’s home screen is filled with big, touchable panels, like the live tiles in Windows Phone 7, and from there you can tap and swipe your way to other touch-based applications. But underneath that touchy layer is plain old Windows, with a task bar, file manager, app icons–everything.

Swipe across to multitask. (Click to Zoom) How does the touch interface work?

From the start menu, which shows basic information like time and unread e-mail counts, users swipe upwards to reveal the home screen and its tiles. As with Windows Phone 7, apps can show some information within the tiles–users needn’t click on the weather app to see the current temperature, for example. Swiping from the right bezel brings up a menu that can take users from an app back to the home screen.

Users can multitask between open apps by swiping across from the left bezel. And therein lies the coolest-looking feature of Windows 8: When swiping in a new app, users can snap it in place next to the app that’s currently running. This allows users to view two apps at the same time–something that no existing tablet OS can do.

Windows 8 Weather App (Click to Zoom) How will Windows 8 apps work?

Microsoft says it’s created a new kind of app for Windows 8 using HTML5 and Javascript, and they’re a lot like the apps you’d expect to find on a tablet. A weather app shows the five-day forecast. A news reader displays stories and thumbnail images in big, rectangular panes. Microsoft also showed off Internet Explorer 10, which is optimized for touch. Presumably Microsoft will distribute these apps through its own store–there’s a “Store” tile in the version of Windows 8 that Microsoft demonstrated–but the company offered no details.

Legacy apps and new apps can run side by side (Click to Zoom) What about existing Windows apps, such as Office and Photoshop?

They’ll still work. Loading one of these apps will bring up a more familiar version of Windows. According to All Things Digital, classic Windows apps will use “fuzzy hit targeting” to aid finger taps, but they won’t be optimized for the touch screen like Windows 8’s HTML5/Javascript concoctions. Legacy apps can, however, run side by side with the new Windows 8 apps.

But what about Windows PCs running on ARM chips? Will legacy apps run on those devices?

See our full Windows 8 coverageIt’s conceivable that ARM-based Windows devices will be restricted to the touch-centric user interface in Windows 8, but Microsoft hasn’t made any announcements on that front. In fact, Microsoft recently denied claims made by an Intel executive about which apps will run on ARM-based Windows machines. Intel’s Renee James had said to expect at least four versions of Windows for ARM processors, and that none of these versions would be compatible with apps from Windows XP, Vista or 7. Microsoft said these statements were “factually inaccurate and unfortunately misleading,” but didn’t clarify the matter with any details. In other words, the question is still unanswered.