Tag Archives: Vista

OPSWAT’s March 2012 Security Industry Market Share Analysis

imageWindows XP is dead-dead-dead. After all, Windows XP is a has-been in the world of operating systems – now 2+generations behind – and, eating dust. Or, so say all the pundits.

If you’re an XP user, as I am, then you can take some solace from OPSWAT’s latest quarterly report (released today), bolstered by more than 353,000 data points, which clearly shows Windows XP continues to hold substantial market share. In fact, according to OPSWAT’s data – Windows XP remains the most popular Windows operating system in both North America and worldwide, with slightly under half of computers using XP.

I’ll point out – I also run with Windows 7 and, Windows 8 Consumer Preview (a super system once one has crossed the “I have to learn some new stuff” barrier) – both of which are considerably safer overall than XP. So, I have no ax to grind – but, I do have an XP horse in the race. There’s little doubt of course, that XP will eventually disappear from the scene – but, not quite yet.

Windows 7, and rightfully so, continues to blaze ahead in the race to displace XP from its preeminent market position and, as shown in the following OPSWAT graphic, now commands better than 46% of the operating system market both in North America, and world wide. Windows Vista on the other hand, is barely on the horizon.

image

Graphic courtesy OPSWAT

Additionally, the OPSWAT report takes a close look at world wide and North American Antivirus vendors market share and, the gathered information in this latest report shows virtually no shift in market penetration from previous reports. In the world wide market place, the same Top 10 players, as expected, continue to hold substantial positions.

image

Graphic courtesy OPSWAT

In the North American marketplace, the same high penetration ratios exist although, the players shift position – with Symantec jumping into first position overall, from its sixth position worldwide.

image

Graphic courtesy OPSWAT

Microsoft, as shown in the following graphic, continues to gain ground with a fairly dramatic shift in growth.

image

As in previous OPSWAT reports, free security solutions remain at the top of the market with the highest numbers of installations. The top three products in North America, and worldwide, are available free for download.

OPSWAT’s analysis of the peer to peer application market share surprised me somewhat, since it showed LimeWire continuing to hold a market share -despite a court injunction prohibiting the use of the application, dated October 26, 2010.

On the other hand, there was no surprise in seeing µTorrent maintaining its lead over the competition in the public file sharing application market – as the following graphic indicates.

image

Graphic courtesy OPSWAT

The full report which is chock fill of absorbing statistics is available here.

So, who is OPSWAT?

If you’re a techie, then you’re very likely familiar with AppRemover, a free powerful anti-malware, antivirus application remover, and Metascan Online, a free online file scanner – both from OPSWAT. Beyond this direct connection however, you might not be familiar with OPSWAT.

From the site:

OPSWAT is the industry leader in software management SDKs, interoperability certification and multiple-engine scanning solutions. Our solutions are simplified and comprehensive, solving complex development problems to reduce time and costs for your engineering and testing teams.

OPSWAT offers software manageability solutions to streamline technology partnerships between leading technology solutions and software vendors. By enabling seamless compatibility and easy management capabilities, we make connecting your solutions with other software applications effortless.

Our innovative multi-scanning solutions deliver optimized anti-malware protection that increases detection rates without sacrificing performance with slow and cumbersome scans. Because no single anti-malware engine can catch every threat, we combine multiple engines to scan simultaneously, significantly improving the probability of detecting a threat.

Advertisements

6 Comments

Filed under OPSWAT, Reports

GigaTribe Private P2P – Share Your Videos, Pics, And Docs Privately

image A few days ago, I ran a few tests on peer to peer downloads, on the off chance that things had improved in this malware infested playground. No such luck, of course.

Of the five game files that I downloaded, every one came packed with a Trojan downloader, which, had I installed any of these applications, would have wrecked havoc on my test machine.

In a nutshell, that’s the main problem with public peer to peer file sharing. The chances are high, that you will not get what you think you will, and you will get what you don’t think you will.

Additional issues (but not the only issues) are:

Privacy: When you are connected to file-sharing programs, you may unintentionally allow others to copy confidential files you did not intend to share.

Spyware: There’s a chance that the file-sharing program you’re using has installed other software known as spyware to your computer’s operating system. I can assure you that spyware can be difficult to detect and remove.

So what’s a fellow to do who enjoys file sharing, and who doesn’t want to be burned by the cybercriminals who skulk on public file sharing networks, searching for victims?

A terrific solution to this quandary is a free application from GigaTribe. An application which is designed to create a private network between you, and your friends, relatives, co-workers, or, whomever you choose.

If you have every used peer to peer software, then you’ll find no learning curve involved in using GigaTribe – it’s functional, efficient, attractive, and “follow the bouncing ball” intuitive.

How much more simply can it be than this:

GigaTribe

The following graphic is from the publisher’s site.

image

Fast facts:

GigaTribe has more than 1, 600,000 users.
Its unique technology has been developed by talented programmers with a strong history in the software industry.

There are no limitations on quantity or file size.
All your files are kept on your hard drive, eliminating the need to transfer them to an external server.

Files are available in their original format.
In just a few clicks, you can share and also find files as if you were in a virtual library. You will see files as they were organized on the hard drive, and you can download them in their original format.

You don’t waste time uploading files.
Once you select which folders you want to share, the contents of those folders are instantly accessible to your friends.

Your files remain yours!
Files you have decided to share are not saved on another company’s equipment. You keep your data under your control.

It´s a two-way sharing service.
Each contact can both share and download. You decide which content is worth downloading among the files available to you.

You may invite up to 500 friends.

Transfer automatically resumes.
If a download is interrupted (for example, if a contact goes offline), the transfer automatically resumes with no loss of data when your contact comes back online.

Security is, of course, GigaTribe´s major concern.

Only the people you have invited can see your files. Only the folders you have selected are visible to your contacts. Every exchange is strongly encrypted – No one can see what is being shared.

Downloads are encrypted (Blowfish 256-bit).

As an added bonus, users’ can create profiles, and have access to personal chat and a private blog, all from within the program. Now that’s cool!

According to the developers, GigaTribe (although I haven’t tested this), can also be used to access your PC from a remote location.

System requirements: Windows 2000, XP, 2003, Vista, Server 2008, Windows 7. (no indication on the publisher’s site of x64 compatibility).

Languages: English, Español, Français, Deutsch, Italiano, Português

Download at: Gigatribe

It’s not often that I can rate an application 100%, but GigaTribe comes very close. A superb application! If you’re into private file sharing, or it’s something that you’ve considered, then give GigaTribe a whirl – I think you’ll be glad you did.

For additional information checkout the developer’s FAQ.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

6 Comments

Filed under downloads, Freeware, Geek Software and Tools, Networking, Peer to Peer, Privacy, social networking, Software, Windows 7, Windows Tips and Tools, Windows Vista, Windows XP

TrueCrypt – Free Encryption To The Max

imageSophisticated and  aware computer users know, that financial data and other confidential information, can easily be subject to intrusive viewing by those not authorized to do so.

Some examples of how this might occur:

Internet malware attack: Increasingly, statistics reinforce the fact that financial data continues to be targeted by hackers/information thieves, for the purpose of identity theft.

Contrast that reality with these facts; there is no such thing as a totally secure Internet connected computer. All Internet connected computers are subject to attack and compromise.

Lost or stolen Laptop: How often have we read the following – 200,00 (insert your own number here), bank account numbers, Social Insurance Numbers, names, addresses and dates of birth were on a laptop stolen/lost earlier this week.

In too many of these cases, negligently, the data is unencrypted. Certainly Laptop theft or loss is not restricted to organizations; it can just as easily happen to you.

Lost or stolen USB drive: Since USB flash drives are so portable, you can take a drive virtually anywhere. Just like most items that are portable and that you carry with you, this type of drive can be lost, or stolen.

To reduce or eliminate the security threat of sensitive data exposure then, the most prudent course of action is data encryption. Essentially, data encryption is a secure process for keeping your sensitive and confidential information private. It’s a process by which bits of data are mathematically jumbled with a password-key. The Encryption process makes the data unreadable unless, or until, decrypted.

TrueCrypt is an outstanding free open source software application (one I have been using for years), for establishing and maintaining an on-the-fly-encrypted volumes.

On-the-fly encryption simply means that data are automatically encrypted, or decrypted, just before they are loaded or saved, without any user intervention.

image

image

TrueCrypt uses 11 algorithms for encrypting private files in a password-protected volume. You can store your encrypted data in files, partitions, or on a portable storage device such as a USB flash drive.

Once your encrypted files are mounted to a local drive with your password or key, you can manipulate those files, i.e. you can open, copy, delete, or modify them. When you have completed working on those files, you then dismount the volume and the files are then safely secured from unauthorized access.

Indicative of this application’s popularity is the fact that it is downloaded tens of thousands of times each day, across the Internet.

Fast Facts:

Creates a virtual encrypted disk within a file and mounts it as a real disk

Encrypts an entire hard disk partition or a storage device such as USB flash drive

Encryption is automatic, real-time (on-the-fly) and transparent

Provides two levels of plausible deniability, in case an adversary forces you to reveal the password – Hidden volume – No TrueCrypt volume can be identified (volumes cannot be distinguished from random data)

Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS

Ability to encrypt a system partition/drive (i.e. a partition/drive where Windows is installed) with pre-boot authentication (anyone who wants to gain access and use the system, read and write files, etc., needs to enter the correct password each time before the system starts

Pipelined operations increasing read/write speed by up to 100% (Windows)

Mac OS X version

Graphical user interface for the Linux version of TrueCrypt

XTS mode of operation – XTS is faster and more secure than LRW

As I said, I have been using TrueCrypt for a number of years, and I have developed a lot of confidence in this outstanding application. If you determine that encryption of your sensitive data is a priority, I highly recommend that you give TrueCrypt a try.

How effective is TrueCrypt? If you have any doubts as to how effective TrueCrypt really is, then read this article. FBI hackers fail to crack TrueCrypt:

The FBI has admitted defeat in attempts to break the open source encryption used to secure hard drives seized by Brazilian police during a 2008 investigation.

System Requirements: Windows 7/Vista/XP (64 bit), Mac OS X, and Linux

Download at: TrueCrypt

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

7 Comments

Filed under 64 Bit Software, Don't Get Hacked, downloads, Encryption, Encryption Software, Encryption Software Alternatives, flash drive, Freeware, Open Source, Software, USB, Utilities, Windows Tips and Tools

Monitor Your Hardware From The Desktop, With Free All CPU Meter

As you can see from the screen capture of my desktop, I’m a minimalist. Maybe I’m a throwback to an earlier age, but I like the look of a clean desktop – I don’t even show desktop icons.

Click graphic to expand.

image

Those applications I use every day, have been added to the taskbar. It works for me – a clean desktop and, ready access to frequently used programs.

Click graphic to expand.

image

But you will, no doubt, have noticed two desktop gadgets displayed. One is a calendar (got to know the day and the date), and the other gadget is one I can’t do without – All CPU Meter.

image

Since I’m mildly obsessive when it comes to hardware monitoring –  All CPU Meter gives me the following information which makes it an easy task:

How hard the CPU is working.

Ram used, and Ram free.

And, most importantly – the processors core temperatures

As an added bonus, double clicking on the gadget brings up Windows Task Manager, which I refer to frequently.

Once installed, choosing the options which best suit your needs is easy.

image

System requirements: Windows 7, Vista, Server 2008 (64 bit supported).

Supported: Twenty Four Core, Sixteen Core, Twelve Core, Eight Core, Six Core, Quad Core, Triple Core, Dual Core or Single Core.

Download at: Windows Live (Microsoft)

NOTE: In order to show core temperatures, All CPU Meter relies on an additional stand alone application – CoreTemp.

Download CoreTemp at: Download.com

In the two years or so, that I’ve been running with this Gadget, I’ve not experienced any problems – it just sits on the desktop doing its job.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

12 Comments

Filed under Desktop Gadgets, downloads, Freeware, Geek Software and Tools, Microsoft, Software, Windows 7, Windows Tips and Tools, Windows Vista

Fix Up To 50 Windows 7, And Vista Problems, With Free FixWin

image You just have to love Windows as an operating system – it makes it so easy to DO so many things. Often however, Windows does not make it easy to UNDO, or “fix” things. It’s not uncommon that attempting to undo things, does nothing more than create additional problems.

If you are familiar with working with Registry entries, you can fix virtually anything, but…..

So, if you’ve been looking for an easy way to fix issues such as, Win Explorer not starting at boot up, CD drive or DVD drive is missing or not being recognized by Windows, or other programs, or the Device Manager is not functioning correctly (not as uncommon as you might think), then the recently released FixWin freeware application, could be the perfect solution.

It’s important to note however, FixWin does NOT scan for problems. YOU, have to recognize that you have the problem – the application will then correct the problem, provided of course it is one of the 50 very common problems the application is designed to deal with.

The FixWin interface consists of 5 easy to work with tabs:

Windows Explorer

clip_image001

Internet & Connectivity

clip_image002

Windows Media

clip_image003

System Tools

clip_image004

Misc. Additional Fixes

clip_image005

How to use this application (from the developers):

We first suggest that you run the System File Checker Utility. The button provided on the Welcome page, will ‘run sfc /scannow‘ and will check for and replace any corrupted Windows system files. It is expected to take anywhere from 5-10 minutes. If asked to, do reboot.

Next we insist that you create a System Restore Point. The provided button will create one, called Safe Point. We always recommend that you create one before making any changes to your system. Should you wish or need too, you can always go back to this Safe Point.

Having done that, apply at most one fix at a time and restart your computer. Please check if things are to your satisfaction; and if not, you have the option of restoring back immediately.

Since this application does not require installation, it’s a perfect portable application to carry on your “tech tools” flash drive, for the times you get those inevitable calls from family, or friends – “Uh, I don’t know what I did, but….”

System requirements: Windows 7, Vista, (32-bit and 64-bit)

Download at: The Windows Club

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

1 Comment

Filed under 64 Bit Software, Computer Maintenance, Computer Tools, downloads, Freeware, Portable Applications, Software, USB, Utilities, Windows 7, Windows Vista

Immunet 3.0 Released – Exciting Improvements

imageThe latest version of Immunet Protect has just been released (February 9, 2010), and in the development process, this outstanding free companion Antivirus has undergone a name change to – Immunet 3.0 – Powered by ClamAV.

Regular readers here, will remember that in previous reviews of this freebie, I have been very enthusiastic in my recommendations. Now, I have one more reason to be even more enthusiastic.

From the developer’s site:

Toll-Free Customer Support is available for all Immunet Protect FREE users 24 hours a day, 7 days a week through our Immunet Technical Support line at 1-866-891-4480. Immunet Support representatives can help with installation issues, potential virus issues, or even computer performance issues that may or may not be virus-related.

How cool is that?

Immunet Protect 3, is a superior community driven cloud based security application, (now closing in on a million users), which continues to gain increasing popularity – and rightfully so.

In real time, Immunet Protect keeps track of the state of security in the collective community (network), and should a member of the network (the community), encounter malware, you (as a member of the protected community), are instantly protected against the threat.

A rather more impressive security solution than having to wait for a malware definition database update. An update that may take several days. Days in which you are effectively open to infection.

A community driven security application like Immunet Protect, does not suffer from this obvious disadvantage of having to chase runway malware. It’s significant advantage is it’s user base community – operating in real time.

Immunet Protect is designed to add a layer of protection while working in partnership with the most popular antimalware solutions. On my principal home machine for example, Immunet Protect lines up with Microsoft Security Essentials and ThreatFire, to shore up any vulnerabilities my system might have to to zero-day threats.

Version 3 has increased functionality over previous versions, and incorporates a number of new features.

From the developer’s site:

Offline engine – The 3.0 release will now ship with an ‘Offline’ engine. This engine (ClamAV .97) once enabled, will automatically pull down our latest detection sets and allow for complete detection coverage, even when you are not connected to the Internet.

With our Offline protection we now also have several complex engines for detection native to the desktop and have support for file formats such as .DOC, .XLS, HTML etc. as well as strong unpacking support.

Cloud Recall – Unlike traditional Anti-Virus, or even other Cloud Anti-Virus we constantly reconsider all the data we see or have seen in our community. This ‘Cloud Recall’ ensures that your security is advanced with every new piece of information we become aware of. You will always know as much as we do, when we do.

Custom Signature Creation – With 3.0 we now offer the first Windows Anti-Virus product which allows our users to write their own detections with our engines just as we would.

Users can now hunt threats (or Advanced Persistent Threats if you like) by creating signatures which range from simplistic (straight MD5 matches) to complex (logically chained expressive signatures w/ offset support and wild carding).

You’ll find Immunet Protect straightforward to install, and easy to run without complication. The screen captures I’ve setout below, will help you get a good overall feel for the application.

image

Setting the operating parameters (the protection settings), is straightforward. In the following screen capture you’ll notice tooltip pop outs which explain the function of each setting. A very cool feature for less experienced users.

image

I have a preference for antimalware solutions that include the ability to launch a specific file scan from the Windows Explorer context menu, and Immunet Protect has included this important feature.

image

Should you consider installing, and running, a Cloud Antivirus as supplementary antimalware protection?

If you are uncertain, then consider this:

The Internet is an uncertain world at the best of times

Cybercriminals design specific malware to exploit vulnerable systems without user interaction being required.

No single security application is capable (nor should we expect a single application to be capable), of providing adequate computer system protection. Gaps exist, in protection capabilities, in even the most sophisticated security applications.

Layering (or stacking) security applications, offers the best chance of remaining infection free, by closing these gaps.

A cloud based protective solution, in this case Immunet Protect, is a major step in shoring up any weaknesses, or gaps, and significantly increase your overall ability to detect malware.

Keep in mind however, that even the best layered protection strategy will not make up for lack of experience, and intuitiveness, when surfing the Internet. So, I’ll repeat what I have said here, many times – “knowledge, awareness, and experience are critical ingredients in the escalating battle, against cybercriminals.”

Immunet Protect fast facts:

Fast Antivirus Protection leverages the speed of cloud computing to deliver real-time protection to your PC. Stay protected against over 13 million viruses and thousands of new threats daily without ever downloading another virus detection file again.

Immunet Protect FREE is ideal for consumers who want fast protection that doesn’t slow down their PC, including students, families, and netbook users.

Small and Light Footprint is up to 35 times lighter than traditional antivirus solutions. Immunet’s low disk and memory use won’t weigh down your PC unlike other solutions.

Companion Antivirus means that Immunet is compatible with existing antivirus solutions. Immunet adds an extra, lightweight layer of protection for greater peace of mind. Since traditional antivirus solutions detect on average only 50% of online threats, most users are underprotected, which is why every PC can benefit from Immunet’s essential layer of security.

Collective Immunity technology leverages the shared intelligence on threats gathered within the Immunet Cloud. Immunet’s virus detection technology continuously improves with each new user who installs Immunet Protect. When Immunet detects a threat on one user’s PC, that threat is blocked from harming all users in the Immunet Community simultaneously, giving all Immunet users shared immunity against computer viruses.

Real-time Detection from the Immunet Cloud against viruses, spyware, bots, worms, trojans, and keyloggers without downloading any virus signature files. Stay protected with Collective Immunity™ and intelligent virus detection technology that doesn’t slow down your PC.

Intelligent Scans effectively detect and remove viruses, bots, worms, trojans, keyloggers and spyware, thanks to the power of collective intelligence and the Immunet Cloud.

Choose from several scan options:

  • Flash Scan (Process and Registry)
  • Custom Scan (Specific Files and Directories)
  • Full System Scan

System requirements: Windows XP with Service Pack 2 or later, Vista (32-bit and 64 bit), Windows 7 (32-bit and 64-bit).

Download at: Developer’s site

I have no hesitation in recommending this application. I can’t think of another security application that has enjoyed a such a major increase in users in the last six months, like Immunet Protect has. That’s no accident.

Note: Along with Avast Free Antivirus, Immunet Protect is now offered as part of Google Pack.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

10 Comments

Filed under 64 Bit Software, Anti-Malware Tools, Antivirus Applications, Cloud Computing Applications, Don't Get Scammed, Don't Get Hacked, downloads, Free Security Programs, Freeware, Immunet Protect, Interconnectivity, Malware Protection, Software, Spyware - Adware Protection, Windows Tips and Tools

Free PC Decrapifier – Bloatware Begone!

imageYou might think that a reader comment that goes something like this, is unusual – “I don’t know how this program ended up on my computer. One day, it just showed up.” Surprisingly, this is not an unusual comment.

In almost every case, the reader is referring to the trial ware (crapware, bloatware), commonly preinstalled on major manufacturers computers. This is the type of thing that drives users buggy, since trying to figure out how to get rid of trial ware is not as easy as it should be.

Luckily, there is a free application designed to specifically uninstall these annoyances – and that’s PC Decrapifier. It’s been a couple of years since I last posted on this terrific application, so today, I’ve taken another look.

The program does not need to be installed; simply run the executable. Or, if you prefer, you can run this application from a USB drive. You choose the items to be removed from a preconfigured list, and you can create a restore point (highly recommended), to undo any changes.

Note: Since PC Decrapifier is written in a scripting language, you may get an security application warning. This warning (if you receive it), can safely be ignored.

The application, while designed to uninstall crapware, has additional functionality – as the following screen capture suggests. More on this in a moment.

image

Anytime changes are being considered, creating a restore point is always good practice.

image

In the following screen shot, you’ll notice the application has detected an application it considers crapware on my machine.

image

The following screen shot illustrates a relatively unknown aspect of PC Decrapifier – its ability to act as a bulk uninstaller. The user simply checks off those applications which are no longer needed; clicks “Next”, and the application will launch the appropriate uninstallers. A slightly better solution than the Add/Remove Program applet when uninstalling more than one application, I think.

image

image

Working with PC Decrapifier requires no particular skill. The application is “follow the bouncing ball” straightforward.

The following is the current list of software and items that PC Decrapifier can detect and remove. The list is generated from the items the program detects on your computer, and you then choose the items to be removed by the program automatically. What could be simpler than that?

Targeted applications:

AOL Install
AOL UK AOL 9.0, UK Version
AOL US AOL 9.0, US Version
BigFix
Corel Paint Shop Pro Photo XI
Corel Photo Album 6
Corel Snapfire Plus SE
Corel WordPerfect
Dell Search Assistant
Dell URL Assistant
Digital Content Portal
Earthlink Setup Files
Earthlink Setup Files
ESPN Motion
Get High Speed Internet!
Google Desktop
Google Desktop
Google Toolbar
Google Toolbar for Internet Explorer
HP Rhapsody
Internet Service Offers Launcher
Internet Service Offers Launcher
McAfee
Microsoft Office Activation Assistant 2007
Microsoft Office Home and Student 2007
Microsoft Office Standard Edition 2003
Microsoft Office Standard Edition 2003
MS Plus Digital Media Installer
MS Plus Photo Story 2LE
MusicMatch Jukebox
MusicMatch Music Services
muvee autoProducer 5.0
My HP Games
MyWinLocker
Norton AntiSpam
Norton AntiSpam
Norton AntiSpam
Norton AntiVirus 2005
Norton Ghost 10.0
Norton Internet Security
Norton Internet Security
Norton Protection Center
Norton Security Center
Norton Symantec Live Update A common component of Norton Symantec products
Office 2003 Trial Assistant
Orange Internet
PC-cillin Internet Security 12 Trend Micro
QuickBooks Trial
Quicken 2006 Possible Trial Version
Remove Empty Program Folders Looks for and removes empty ‘Program Files’ folders
Reset IE Home and Search Pages
Roxio Express Labeler
Roxio MyDVD LE
Roxio RecordNow
Sonic DLA
Sonic RecordNow Audio
Sonic RecordNow Copy
Sonic Update Manager
Tiscali Internet
Travelocity Gadget
Trend Micro PC-cillin Internet Security 14
Vongo
Vongo
Wanadoo Europe Installer
Wild Tangent Games
Yahoo! Music Jukebox
Yahoo! Toolbar for Internet Explorer

System requirements: Windows XP, Vista, and Win 7.

Download at: Download.com

Note: PC Decrapifier is free for personal use only. If the application is used in a commercial environment “you will require a commercial license. The cost is $20 per “technician” (not per PC)”.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

6 Comments

Filed under Computer Tools, downloads, Freeware, Portable Applications, Software, Uninstall Tools, USB, Utilities, Windows Tips and Tools