ArsClip 3.2 WinHTTrack 3.440-4 Komodo Edit 7.0

tackynonchalantΛογισμικό & κατασκευή λογ/κού

3 Δεκ 2013 (πριν από 3 χρόνια και 6 μήνες)

98 εμφανίσεις

Tom’s Top
0 Free Tech Software Picks Part

ArsClip 3.2

ArsClip is a freeware utility for the Windows clipboard
that monitors the clipboard and keeps track of all entries.
Pasting can then be done by using a
popup window

can be triggered by a hotk
ey, by holding a right
click, by a
special trigger window, or by other methods.


WinHTTrack 3.440

HTTrack is a free and easy
use offline web browser
utility that allows you to d
ownload an entire web site from
the Internet to local
. HTTrack automatically
rearranges the original site's relative link
structure so the
site stored on
your computer

works just the same as it did
on the Internet. Simply open a page of the "mirror
website in your browser, and you can navigate the site from link to link, just as if you were viewing it online.


Komodo Edit 7.0

A programmer's editor has to strike a fine balance between bein
g powerful enough for daily use and
staying out of the way so you can just look at your code and think. The search for the perfect editor
can take years. If you're not perfectly content with the editor you're currently using, you might want to
consider Kom
odo Edit (free). Komodo offers some compelling features at a price that can't be beat.

Komodo Edit is a free, cut
down version of Komodo
IDE, a complete development environment for Web
and cloud
based projects, comparable to JetBrains
PhpStorm. This is o
ne thing that makes it different
from other free code editors such as

Notepad++: Komodo offers a subset of what can be
done with Komodo IDE.

Another important difference between Komodo Edit
and other editors is that Komodo 7 is built on the

code base as Firefox 4 (Mozilla
2.0). This
means it is available for Windows, Mac OS X, and
Linux, without being Java
based. It also has a
style" extension system for finding and
installing add

Like most other modern code editors, Komodo su
pports customizable color schemes. There is even a
website dedicated to Komodo color schemes called
. It didn't have my favorite scheme,
scientifically proven
, but I was able to track it down with a quick Google search.

Once I had the scheme file on disk, installing it proved trickier. The scheme selection dialog didn't
provide any hints, nor did the online help system. I ended up locating an o
bscure folder containing all
other schemes and putting the file there to make Komodo Edit recognize it. I later discovered I could
have simply dragged the file and dropped it over the Komodo icon. Too bad this wasn't mentioned in
the application or documen
tation, though it is in the marketing materials.

On a day
day basis, working with Komodo Edit is a pleasant experience. Its built
in FTP client lets
you access remotely hosted files without having to create a project or download an entire directory
e. If Firefox is your browser of choice, you would feel right at home with Komodo. For example, the
Find feature works just like the one found in recent Firefox versions, with live search and a bar along
the bottom of the window.

Komodo's auto
feature is excellent, similar to the one found in Microsoft Visual Studio: You
get a scrollable menu with completion options, rather than having to blindly tab between options. I
compared it with jEdit, editing a simple snippet of CSS, and it fared signifi
cantly better; jEdit's auto
completion stopped working after a few attempts. Komodo Edit also features other amenities, such as
code folding and simple text zooming using the mouse wheel.

If you already know you need a full
fledged IDE, choosing between K
omodo IDE and competitor
JetBrains PhpStorm is a tough call. But if you're not sure whether you need an IDE or just a powerful
editor, you can start out with free Komodo Edit and maybe graduate up to IDE if you find you need
advanced features such as debug
ging or source code control integration.

Komodo Edit

WhatIsHang v1.15

Sometimes Windows itself or an
active application abruptly stops
responding. When this happens, it can
be difficult to determine w
hat has
caused the problem, or even how to
troubleshoot the issue. This utility
tries to detect the

or process
behind the problem, and displays
some information that may allow you
to sort out and understand what lies at
the root of your


What Shang

York 1.56

York allows users to monitor all activity on their networks. Those

to a network can be tracked, allowing
the program to follow clicks. All website
visited can be converted to visual files, allowing
the user to view these sites in picture form. This
is an extremely useful

for ensuring that
your network remains secure at all times!


CPUMon 1.7

CPUMon is a simple little gadget you can use to
monitor your

central processing unit
(CPU) performance, right from your desktop
display. The

draws a real
time graph
revealing the processor's performance and also
provides a u
sage indicator. The gadget can be
customized to suit a user's preferences.


Codeit HTML Editor.Net 1.17

Codeit HTML Editor is a small and easy

that will help you e
dit and
preview your HTML files. Users can also create HTML files and later use them as
templates for their web
oriented projects.

Codeit HTML

TCC LE 13.03 Build 49

Take Command is a comprehensive interactive toolkit
for both the Windows' Graphical User Interface (
and the Windows command line that promises to make
Windows easier to use and far more powerful. Take
Command includes: 1) opt
ional Explorer
integration, 2) tabbed console windows, 3) major
enhancements to standard Windows
command line

instructions, such as COPY, DEL, and MOVE, 4) 140
new commands, 5) improved command line editing, 6)
more than 460 internal variables and fu
nctions, and thousands of other features. If Windows doesn't do everything
you want it to do, TCC LE may be able to help.



PAExec lets you launch Windows programs on remote
Windows computers without first having to install the

on that distant computer. You can use PAExec for controlling a remote computer, doing remote installs
of new software, checking remote

configurations, and much more.


DPC Latency Checker 1.3

There's a little trick that the Windows operating system uses to allow high
priority tasks such as video
and audio drivers uninterrupted access to the CPU
the Delayed Procedure Call. A DPC

puts off the
inevitable until the system feels there's time. Unfortunately, DPCs only work to a point and can't always
avoid disturbing high
bit rate audio and video recording, which requires an uninterrupted data flow. If
interrupted for too long, as wit
h a long
delayed DPC, you will hear dropouts and static. DPC Latency
Checker (free) displays the amount of time these DPCs are taking so you can tune your system by
disabling tasks or hardware that cause DPC spikes.

Open up DPC Latency Checker and you'll
see a
time display of the latency of your system. If
there's something generating CPU
hogging DPCs,
it'll show up as spikes on the left
scrolling graph. It's
much like the Performance tab found in Windows
Task Manager, except it's for DPCs.

Simply kee
p an eye on DPC Latency Checker's
graph while you disable and enable various
hardware and background applications using and
when the spikes disappear, you know you've found
the culprit. The Wi
Fi and battery monitors on
laptops are notorious for generating

fat DPCs, so
that might be a good place to start your hunt.

If you want to maximize your computer's
performance with audio or video, DPC Latency
Checker is a must
have tool. Even on a fast Intel Core i7 or Phenom system, you'll find that you can
record hi
gher bit rates and use more real time FX after you've disabled fat, DPC generating apps and

DPC Latency Checker

System Information for
Windows (SIW) 10.29

Think you know the innards

of your
Windows system? Well think again.
Download and run SIW, and you'll realize
just how little you know. It's probably the
most comprehensive free system analyzer
you'll find anywhere. It gives you a complete
rundown of all your hardware and software,

your system setup, your audio and video
codecs, your motherboard, network cards,
systems slots
and that's just the beginning.
It also includes real
time monitors for things
such as network, RAM, and CPU use.

How much detail does it give? Consider
few bits of data. It will tell you the
temperature of your CPU

and if you've
got a dual
core processor, it will show you
the temperature of each. It'll even tell you
the temperature of your hard disk. And it
somehow also managed to report on your softw
are license keys as well, including for Windows and your
installed software.

System Information for Windows


Recently I spent some time rescuing my sister
law's laptop from some seriously nasty malware.

Even after running utilities like Malwarebytes Anti
Malware, then using UnHide to restore the system's
missing icons and folders, something was hijacking the Web browsers. Whenever I'd click a link in
Internet Explorer or Firefox (the latest versions of b
oth, FYI), some malicious bit of code would redirect
the browser to a phishing site. That's hijacking in a nutshell, and it's extremely frustrating.

Because it was happening in both browsers, I
knew there was a deeper problem than just a
rogue plug
in or

toolbar. Best guess: a rootkit, a
form of malware that can hide itself from normal
methods of detection. And, sure enough, it was the
notorious TDSS, which, as reported just the other
day by IDG News, is now being distributed by
some WordPress
powered blo
gs. This laptop
might have gotten infected just from visiting a
seemingly harmless Web site.

So how does one banish TDSS when the usual
malware cleaners fail?
Kaspersky's free

d for me...eventually. When I first
downloaded and ran the utility, nothing happened.
The interface never appeared, so I couldn't start a
scan. Turns out TDSS is so nasty, it can even
block TDSSKiller from running. Fortunately,
Kaspersky posted an updated
version that did the

Once I'd sent TDSS back to hell, the browser hijacking stopped. Your mileage may vary, of course,
but if you've tried other measures and your system is still exhibiting symptoms of infection, TDSSKiller
might be the final inocul
ation you need.


The Download button takes you to the vendor's site, where you can download the most recent
version of the software.


Restore Missing/Hidden Icons Wiped Out by a Virus

Last night my sister
law called me, just about in tears. "Something" had happened to her laptop
probably a virus, she guessed
but everything seemed to be gone: all her desktop and Start Menu
and, even scarier, all her data. It was like aliens had abducted her desktop.

Not aliens: hackers. Her system had indeed been infected by a virus, and it took me a few sweeps with
Malwarebytes Anti
Malware (still the best recovery tool out there, IMHO) to
get rid of it. (Here's a great

Just one problem: removing the virus hadn't restored all my sister
law's icons and data. The hard
drive still showed nearly full, meaning nothing had actually been erased, but for all intents and

the stuff was still MIA.

Fortunately, I found a utility that worked a seemingly major miracle: It brought everything back.

It's called UnHide. This free, self
contained utility is
ilable via

courtesy of a user named Grinler. Just download and run
the program, then be prepared to wait. On my system, it took 10
15 minutes
to restore everything.

But restore everything it did: desktop icons, the Start Menu, and all the

seemingly vanished data.

This was a first for me; I'd never encountered a virus that made almost the entire desktop disappear.
Scary stuff!

If you find yourself in a similar situation, don't panic. I think it's the rare virus that actually does wipe out
ata. That said, this is probably a good time to remind you to make regular backups
not just to an
external drive, but also to the cloud. Better safe than sorry!


Active Directory User's Password Rese

This handy tool allows you to reset Active Directory
user's passwords without having to open Active Directory
and searching for the user. It's especially useful if you
need to delegate password reset access to staff but don't
want them to have the fu
ll Active Directory installed.
Please note, just like Active Directory this doesn't
automatically give anyone with the application access to reset passwords, they would also
need delegated access given separately. If you need help doing this, please e

Active Directory User's Password Resetter

SysAdminAssist 1.0

SysAdminAssist is a free application that allows web, security and
system administrators

to quickly access and adjust all the
and applications they oversee. Once it's installed, all networked
devices can be loaded into this simple utility, and then accessed
and managed from a single menu, effectively replacing
bookmarks in browsers and other cumbersome links to the variou
devices. It's available for Windows XP, Windows 7,

2003, and Windows Server 2008.



YUMI (Your Universal Multiboot Installer), is the freely
successor to MultibootISOs. This software utility
can be used to create a multiboot USB flash drive that offers
demand access to multiple
operating systems
, antivirus
utilities, diagnostic tools, and more. YUMI works much like a universal USB installer,

except it has the power to
install more than one distribution. Even better, they can all run from a single USB flash drive, with the space left
over still available for conventional
data storage
The same tool also works to uninstall any of the
software o
n the drive!


NetSetMan 3.4.1

Are you tired of changing your network
configuration on
your laptop

or computer every
day? Then NetSetMan is for you. This award
winning software u
tility manages all the settings
so necessary for Windows to connect with a
network. But rather than just one, NetSetMan
allows you to retain different settings for up to six
different networks; home, work, your favorite
Internet cafe, a local library, and
more. As you
your computer

from one location to
another, NetSetMan makes it easy switch to each
of the appropriate network profiles, instantly!


CPU Speed Professional

Speed Professional is a software metric device that will
your PC

processor's speed using 12
different tests. The software not only measures, but records the
speed, and compares your

to thousands of other
computers which have b
een added to the system's worldwide
ranking website. The unique CPU comparison tables keep
track of the actual "in the field" processing speeds of all the
different Intel and AMD processors currently in use.

CPU Speed Professional

IPInfoOffline 1.25

IPInfoOffline allows you to view information

(IP) addresses without having to
connect to an external
. To do this, the
software uses a compressed database of IP
addresses. Once you retrieve

the correct
information about any desired IP addresses, the
information is available to be copied to the
clipboard, or saved for other uses.


Process Explorer 0.15

dows isn't just for hard
core geeks or just for novices. Being the most popular operating system on
the planet, Microsoft must design it to fit the widest possible range of users. Even its "techy" parts, like
the Task Manager, sometimes need to be toned do
wn for general consumption. But what if Windows
were aimed only at the most technical of users? Process Explorer is the Task Manager that could have

Process Explorer can do all kinds of tricks that
Task Manager just can't do. Case in point: Fire up

Task Manager right now (hit Ctrl
Esc), and
click "Show processes from all users." You will
doubtlessly see a bunch of processes called
"svchost.exe," all helpfully labelled "Host Process
for Windows Services." Great, but what are those
services? Wit
h Process Explorer, you can find out
just by mousing over the process name.

This may sound like an obscure technical detail (and
it is, a little bit), but it can also be very useful. For
example, on my system there's a single svchost.exe
process taking up
over 250MB of RAM
a sizable
chunk by any measure. Thanks to Process Explorer, I no longer have to wonder what all that memory is
used for: I know exactly what services hide under that process, and can disable them if I want to.

Another very neat Process E
xplorer capability: graphing GPU usage. Task Manager's Performance tab
lets you see CPU and RAM usage only, but if you have a discrete graphics card, you have at least one
more powerful (if dedicated) processor. Monitoring the GPU is useful not only for be
nchmarking games,
but also for keeping an eye on applications such as


that use the GPU for general
purpose calculations. You can also see how much of the GPU's dedicated memory is used.

When going over the list of currently running processes, unfamiliar names will doubtlessly pop up. For
example, do you know what c
srss.exe is? I can guarantee this process is running on your system right
now, under the nebulous description "Client Server Runtime Process." With Process Explorer, you just
need to click the process and press Ctrl
M, and Process Explorer will instantly s
earch Google for that
process name. It's a very handy way to find out what's what in that long list.

Here's another classic Windows annoyance: You're trying to delete or overwrite a file, but Windows
insists the file is in use. Process Explorer lets you se
e exactly what files are used by every process in
your system, and also search for a file or DLL. In other words, you can track down the process that is
using that file and kill it if you want to.

Process Explorer looks a bit intimidating at first, and it'
s an acquired taste. You can start off by using it
just like Task Manager and gradually grow into its unique capabilities. It even has an option called
"Replace Task Manager." Once you use Process Explorer regularly, you may well use that option.
Highly re

The Download button takes you to the vendor's site, where you can obtain the latest version of
this software.

Process Explorer

HijackThis 2.0.4

Though I might
be thinking Hijack This Sucker! or Hijack This @%!$! when I fire up this super
system snooper, I suppose the simple HijackThis
moniker the original authors applied has just the
right amount of attitude. Recently acquired by
Trend Micro of anti
fame, this sniffer/cleanup
utility searches autorun items, processes,
services, and the Windows registry for the kinds of
entries and activities that hackers use to invade
and infect your system.

HijackThis 2.0.2 is a great malware removal tool,
but it's n
ot for the average user. The list it
generates is full of innocent or harmless entries
and items that should be there. Its main intent is
to show you what's what, not make a
determination of what's actually a threat
utilizing it effectively requires a
fair amount of
knowledge. You can select items on the list and
have the program delete them, so if you don't
know what you're doing, you can create quite a
mess despite the automatic backup function that
allows you to restore items you've removed. HijackTh
is's other features include a handy process viewer
and an ignore list that you can place items you've deemed as innocent to so they're not scanned in the

Even if you don't use HijackThis to actually remove threatening items, it's handy for learning

about what
they are and can be used for. Simply select an entry on the list and click on the "Info on selected Item..."
button for information on what the item is and an example of how it might be used malevolently. Just
stay away from the "Fix checked" b
utton until you're confident that you know what you're about to zap.


SlimCleaner 3.0

SlimCleaner 3.0 (free) is by far one of the more
useful multi
utility tools I've run across. Aimed
ily at cleaning the junk out of your system, it
has the capabilities of several popular programs,
including Piriform's CCleaner and Trend Micro's

SlimCleaner neatly divides its functionality over
seven main tabs/tools: Cleaner, which removes
detritus from the registry, temporary files, etc;
Optimize, which lets you to edit startup items and
services; Software, which lists and uninstalls programs; Browsers, which does the same for browser
plugins; Hijack Log, which lists software which might be

cantankerous; Disk tools which lets you
optimize or wipe disks; and Windows where you'll find all the native Windows utilities in one place and
in an arguably better arrangement.

Run any of the above tools and you'll most likely see a list of results: pro
grams that are installed,
registry entries that are obsolescent, plug
ins that are present, etc. Every item in every list generated by
SlimCleaner has a More info and a CloudAV button next to it. More info tells you everything that
SlimCleaner and its onli
ne database knows about the item, while CloudAV is an online database
cataloging the safety or purpose of each item. I've used such catalogs for years in cleaning malware off
of computers. You can easily add information to the databases from within SlimCle
aner and the
company awards you status according to how accurate and helpful your reporting is.

SlimCleaner worked extremely well in my tests. It found lots of outdated registry entries, accurately
reported temporary files, and was aware of a vast number o
f programs. It's nice
looking, extremely
logical in its layout, and largely easy to use.

I'm leaving SlimCleaner installed, and it's a rare day that I make that comment about a utility in a review.
It's that handy.


The download here is only 0.6MB but

it downloads a lot more stuff; the full installation is about


DragonDisk 1.0

DragonDisk is a powerful file manager designed to
work with S3
cloud storage

such as Amazon S3 a
nd Google Cloud Storage.
This free software allows you to back up, share and
organize your

in the cloud. It boasts an
intuitive interface that's easy to learn and speedy to
operate. DragonDisk is distributed as freeware, and
can be used on computer sy
stems running versions
of Windows, Mac OS X, and Linux operating


WebSiteSniffer 1.15

WebSiteSniffer is a packet sensing tool that captures all
web site

files downloaded by your browser an
d stores
them on your hard drive. You can choose any file location
that suits you. While it is capturing the website files, the
main window of WebSiteSniffer displays a number of
statistics that show technical details about each of the



Temp File Cleaner

TFC (Temp File Cleaner) will clear out all temp folders for all user
accounts (temp, IE temp, java, FF, Opera, Chrome, Safari),
including Administrator, All
Users, LocalService, NetworkService,
and any other accounts in the user folder. It also cleans out the
temp folder and checks for .tmp files in the
%systemdrive% root folder, %systemroot%, and the system32
folder (both 32bit and 64bit on 64bit

OSs). It shows the amount
removed for each location found (in bytes) and the total removed
(in MB). Before running it will stop Explorer and all other running apps. When finished, if a reboot is
required the user must reboot to finish clearing any in
temp files.

TFC only cleans temp folders. TFC will not clean URL history, prefetch, or cookies. Depending on how
often someone cleans their temp folders, their system hardware, and how many accounts are present, it
can take anywhere from a few seconds to

a minute or more. TFC will completely clear all temp files
where other temp file cleaners may fail. TFC requires a reboot immediately after running.

Be sure to
save any unsaved work before running TFC.


Temp File Cleaner

Fotobounce 3.2.1

Fotobounce, a free (but ad
supported) app shakes the cobwebs
off your digital photo collection by
organizing and helping you share
your photos. Recently updated to
on 3.1, it now offers more control
over how you share those photos.
Like earlier versions, this one offers
some nifty features, but also suffers
from a few glitches.

Once installed, Fotobounce will find
your photos in the locations to which
you direct the
app. The company
says its organization features are
centric" and, as such, the
app's key feature is its Face
Recognition Technology. It's
designed to recognize the faces that
appear in your photos
with a little
training, of course. It automaticall
finds faces in your photos, and you
can tag people to identify them. Once
you start tagging people, Fotobounce
should begin identifying them for you.

The facial recognition didn't always
work as advertised, however
and the
iteration of it in version 3.1

was just
as buggy as it was when I tested version 3.0. I tested the app with a large library and tagged the same
person over and over again. I also used the app's Eye Locations system, which allows you to identify
the locations of eyes in photos to improv
e facial recognition. Fotobounce was successful in identifying
faces less than 50 percent of the time in my informal tests. It also identified random objects, such as a
set of stairs, as faces. Luckily, you can easily reject its suggestions and apply your
own tags instead.

Fotobounce allows you to share your photos in several different ways. You can connect the app to your
Facebook or Flickr accounts to upload your photos or albums, and it will keep your tags intact. When
you link Fotobounce to your Faceboo
k account, it will import a list of your friends and allow you to tag
them directly in any photos in your Fotobounce library.

In addition, the app allows you to share photos directly with friends via a private peer
peer connection
that the company liken
s to "Skype for photos." To do this, you send invitations to people you'd like to
add as "Bouncers"; they, in turn, have to install Fotobounce on their computers in order to see your
photos. New in version 3.1 is the ability to control which photos each Bo
uncer can see, which is a most
welcome addition. I also like that a bug I found in the last version of the app, which blocked the
initiations I sent to potential bouncers from being received, has been fixed. All of my invitations arrived
without delay.

obounce also lets you view your photo collection from a mobile device with a browser, such as an
iPhone, iPod Touch, or a BlackBerry. You do this by setting up a user name and password in the
desktop version of the app, and then pointing your mobile browse
r to Fotobounce's mobile URL. From
here, it's easy enough to browse through your photo library, but I found the interface somewhat
inelegant. I tested Fotomobile on an iPhone 4, and was disappointed to see that my photos never filled
the phone's screen. In
stead, they were small and sometimes displayed off

Also new in version 3.1 is a feature called Fotomail. This lets you send photos from your mobile device
right to your Fotobounce account. It works by assigning you a specific Fotomail e
mail addres
s, and is
easy to use. It's a handy way to get the full
resolution photos from your mobile device added to your
photo library.

I like Fotobounce as a free photo organizer: in addition to organizing photos by person, you can sort
them by date and place. It
makes scrolling through a large photo collection a snap. I'd like to see the
face recognition improve, however. Until it does, it takes more time than it saves.

Fotobounce 3.2.1

File Grinder 0.1.2

File Grinder is a
free utility program for
, and moving many files
at once. The program has a simple

understand console user interface (UI),
which makes it easy to add commands for
this program in any scripts you may be
running. File Grinder requir
es MS .Net
Framework 3.5 Service Pack 1 (SP1), which
you obtain from a link conveniently places
on File Grinder's main page.

File Grinder

Yale 1.08

The handy and easy
use program Yale shows the amount of
bandwidth (the quantity of

being transmitted and received) by
all of your network adapters. It also displays information related to
your computer's CPU usage and the data tr
ansfer rate of your
disk storage

system. The information is immediately
available when you click on any of your computer's network
adapter listings: they will immediately expand and display the data
you seek.



Port Scanning and Information Tool

CloseTheDoor identifies the listening ports for TCP/UDP over
IPv4/v6 and the associated program files. This can help a
technician discover security holes and find leaks in a sys
It can also find vulnerabilities to help diagnose and prevent
future malicious attacks. On a basic level it is a great tool to
see all open ports in a visual manner.

It’s amazing how many options are given to you within this
program. CloseTheDoor cond
enses many tasks and command line programs within its
simple menu system. This include information that you could find using NET commands,
regedit, and services.msc, and well as Googling an unknown process.


Ultra Virus Killer

Malware Removal and System Repair

Ultra Virus Killer, also known as UVK, is a free and portable
application designed to help users detect and remove
malware. UVK acts as a swiss army knife o
f malware removal
as it contains similar functionality to a range of computer
technician software use such as Process Explorer, Autoruns,
Unlocker, Windows Repair and more.

The strength of this application is not just its ability to help
you remove the off
ending malware, but repair the damaged Windows install afterwards.
For example, the application allows you to create scripts that will reset the hosts file and
DNS, Reset IE, Reset Group Policy, Fix .exe extensions and much more.

While I was researching UV
K, I discovered that the creator of UVK is a Technibble forum
regular with some sizeable threads about it.

UVK has too many features to list here so be sure to check out the screenshots.

Ultra Virus Killer


Analyze DLL Files

ListDLLs is a software utility that displays all the DLLs loaded into
processes. It’s great for diagnosing, blue screens (BSOD’s), Viruses,
malware, and other software related errors. ListDlls shows you the full
path names of load
ed dll’s as opposed to names only, which can aid in
finding rougue dll’s that have legit names but are in the wrong
directory. The program also flags dll’s that have different version
numbers after being loaded than the version of the file on the disk. Thi
can occur when a program is updated after it loads the dll, or in the
case of a malware infection



Analyze CPU Spikes

ProcDump is a command
line utility that al
lows the technician to
analyze and diagnose CPU spikes and hanging services. ProcDump
also includes hung window and unhandled exception monitoring. The
program will write a customized crash dump (.dmp file) based on the
technician’s entered parameters. A g
reat feature about ProcDump is
that you can automatically set a specific CPU threshold for a process
to hit before the program writes a dump file. This means that the
program can run unattended and create a dump file at the exact time it
causes problems or

an abnormal spike.



Physical Memory Analysis Tool

RAMMap is a portable, stand
alone software tool that allows you to see
exactly how Windows assigns physical memor
y. The tool does not just
display memory usage on an application or process basis, but it shows
the the memory usage down to each individual file. The technician can
analyze the exact memory allocation of drivers, dll’s, system fonts,
cached files, and mor


TOR (The Onion Router)

Proxy Tool

TOR is a free client application that uses a network of multiple
encrypted tunnels to route your Internet traffic. You can install
components to use TOR or download a standalone bundle that does
not require installation. TOR can benefit IT Professionals in several

TOR (The Onion Router)


Disk Analyzer

paceSniffer is a free and portable application that will scan a drive
and give you a visual treemap of the contents on that drive. This is
useful for the technician who is trying to clean up data on a system, or
is looking to delete/move data from a full p
artition to another with more
space. What’s nice about this program is that you can easily analyze
what files are taking up the most space, in a visual manner, and then
use the interface to dig deeper into a directory or file.



Free Partition Editor

GParted is a free and open source partitioning tool. It can run within a
Linux environment or can be booted from a live CD. GParted supports
multiple file syst
ems and works great on servers in RAID

GParted is very useful when a technician needs to re
size a partition,
format a drive (to a different file system), set the boot flag to a
partition, and perform other useful features. Recently this

program was
used in a small business environment on two different servers in RAID
5 configurations. Both servers were running Windows Server 2003 and had a system partition (C: drive)
size of only 12 GB.

Obviously this is too small for a system partition
by current standards, and it was at the point where
these servers could not download and install updates. One server had about 400GB of information
stored on it with a couple hundred free. We were able to successfully boot into GParted and re

drives on both of these servers without any problems (boosted the C: drive partition to around

I have used GParted many times on workstations and I can’t remember a time when it has failed or I
lost data. It’s a great tool that all technicians shou
ld have in their toolkit. It can be downloaded as an ISO
and burned to a bootable standalone cd, and many times comes included on multi
boot/rescue cd’s.



Computer Repair
Multi Tool

D7 is a small, portable application designed to aid in many computer
repair related tasks and provide a uniform procedure for technicians to
follow by automation.

D7 has multiple functions such as being an interface to quickly go to
various sys
tem areas such as the system file checker. It also contains
many fixes for common Windows problems such as repairing Internet
Explorer, Repair Permissions, PIO/DMA mode fix, Repair Windows
Update and more. It also contains a good collection of Windows

D7 is much more than just a glorified front end to run tweaks and scripts though, it can also be used for
automation in its Maintenance and Malware areas. Simply tick the tasks you want it to do such as
Delete Temp Files, Empty Recycle Bin, Run CCLeane
r and Defraggler and it will do these tasks
automatically. You can also add your own applications for it to run automatically one after another such
as various virus scanners for example. Take a look at the screenshots below to see its full functionality.

This application requires third party applications to make use of its full functionality. D7 is free for
personal and commercial use and it was also created by a Technibble forum member.

Warning: This is a technicians tool and not designed for end users. T
his application can do damage to a
system if used incorrectly. Use at your own risk. Additionally, due to the registry editing and file
manipulation nature of this application, some antivirus products may detect this as a virus. These are
false positives.



Recover Passwords
from Web Browsers

WebBrowserPassView is a small, portable and freeware utility
designed to recover passwords from:

Internet Explorer (Versio
n 4.0


Mozilla Firefox (All Versions)

Google Chrome


Once WebBrowserPassView has gathered all the passwords from the various browsers, it displays
them in a single table with the URL the password was saved for, what browser it was saved in and o
course the username and password.


Rizone Complete Internet Repair

Repair Common Internet Connection

Rizone Complete Internet Repair is a small, freeware
and portable application
designed to repair common internet connection issues. A multitude of
problems can prevent a computer from accessing the internet such as a
virus/adware attack, an incorrect firewall rule or even a legitimate antivirus
product that
didn’t install or uninstall correctly. Rizone complete Internet
Repair attempts to repair everything internet related on a Windows system and
will do the following tasks:

Rizone Complete Internet Repair


View Internet Explorer History

IEHistoryView is a small, freeware and portable tool
that displays the Internet Explorer history on a users
computer. The application will show you the URL of
the site the user has visited, the title of the
website, how many times they
went there and the last time they visited that site. It also allows you to remove
specific entries from the history and export the history to a text, HTML or XML
file. It also supports command line options for all you scripters

out there.

So how could this be used by us Technicians and who uses Internet Explorer

Internet Explorer is still heavily used in corporate environments and many residential clients don’t even
know there are alternatives to Internet Explorer. As f
or the usage of this application, many technicians
on the Technibble forums have been asked by the owner of a business to look at what sites the
employees has been visiting on company machines.

Other Technicians have used it to show certain customers that
they are still visiting dangerous websites
when they keep reinfecting their computer and accuse the technician of not cleaning it properly the last