Unlock For Us

WordWeb: Quickly search definitions and find meaning of words

wordweb

Looking for the right English words?

Wordweb is an English thesaurus and full dictionary software available for looking up words easily.

To download the software

http://wordweb.info/cgi-bin/geoip/wordweb.exe

Running Wordweb from Command Line

Rundll32 WWEB32.DLL,ShowRunDLL word_to_lookup

This will show the word “word_to_lookup” after running the command.

 

Cool right?!


Read more...

Unlock For Us

Finding scan.exe at McAfee Superdat for VirusScan Command Line

VirusScan Command Line utility is a program that provides a way to quickly perform virus-checking using the command prompt. It is an alternative to scanners that uses windows graphical user interface (GUI). It is effective and provides quick solution against viruses, trojan-horse programs, and other types of potentially unwanted software.

If your one of the geeks or IT experts that recently noticed it’s command-line scanner utility (scan.exe) is gone or missing at it’s SuperDat file. Then here your are: Where can you find and download McAfee VirusScan command-line tool?

http://www.mcafeeasap.com/downloads/CLS/vscl-w32-6.0.1-l.zip

to update the tool with the latest virus definition, look for the filename that is of the format avvdat-nnnn.zip, where nnnn is the DAT
version number.

ftp://ftp.mcafee.com/commonupdater/

Create a folder and just overwrite the files.

The current release version includes the latest technology in anti-malware providing improved detection rates, smaller file downloads, Multi-threaded scanning support and XML support for easier processing of scan results.

It provides the optimum protection for your computer and network using advanced heuristic analysis which detects previously unknown macro viruses and program viruses.

McAfee Information about the command line-utility 

Scanning NTFS streams
Some known techniques of virus file infection is adding at the beginning or the end of a file. Streams might contain viruses and exploit the NTFS multiple data streams feature in Windows operating systems.

VirusScan command-line utility can analyze and detect a stream virus by specifying the full stream name, or including /STREAMS and specify using wildcard characters ? and *.

Heuristic Analysis

The scanner uses two techniques to detect viruses — signature matching and heuristic analysis. A virus signature is simply a binary pattern that is found in a virus-infected file. Using information in the DAT files, the scanner searches for those patterns. However, this approach cannot detect a new virus because its signature is not yet known, therefore the scanner uses another technique — heuristic analysis.

/ANALYZE         : Turn on heuristic analysis for programs and macros.

/PANALYZE        : Turn on program heuristics.

/MANALYZE       : Turn on macro heuristics.

To clean your computer using McAfee Command-line

Shut down your computer and boot it into Safe Mode.

Scan your disks after the boot. At the command prompt, type:
SCAN /ADL /ALL /CLEAN /WINMEM /PROGRAM

Other commands that you can use:

To scan all folders and subdirectories

SCAN /CLEAN /ALL /RECURSIVE e:

To scan drive C including streams with advance heuristic analysis

SCAN /CLEAN /ALL /SUB /ANALYZE /STREAMS /WINMEM c:

What can you scan?
File types scanned by default.
The following file types and many other common file types that are susceptible to infection are scanned by default: .BIN, .COM, .DLL, .DOC, .DOT, .EXE, .HTM, .INI,
.OVL, .RTF, .SYS, .VBS, .VXD, .XLA, .XLS, and .XLT.

Archived and compressed files recognized by the scanner.
You can scan compressed and archive file formats which include .ARC, .ARJ, .CAB, Diet, .GZIP, LZEXE, .LZH, PKLite, .RAR, .TAR, and .ZIP files.

The scanner detects and reports any infections found in any compressed or archive file. The scanner can also clean files in .ZIP archive format. If you have access to Windows, you can clean certain infections from compressed files using VirusScan
for Windows software.

VirusScan Command Line Utility Usage and Options

scan /?
Usage: scan [object1] [object2...] [option1] [option2...]

   /?               : Display this help screen.
   /AD             : Scan all drives (not removable media).
   /ADL            : Scan all local drives (not removable media).
   /ADN            : Scan all network drives.
   /AFC=<cache size>         : Set the Size(in MB) of the Internal Cache Used When Decompressing Archive Files.
   /ALL             : Scan all files regardless of filename extension.
   /ALLOLE        : Treat all files as compound/OLE regardless of extension.
   /ANALYZE      : Turn on heuristic analysis for programs and macros.
   /APPEND        : Append to report file rather than overwriting.
   /APPENDBAD   : Append to bad file rather than overwriting.
   /BADLIST=<filename> : Filename and path for bad list log file.
   /BOOT                     : Scan boot sector and master boot record Only.
   /CHECKLIST=<filename> : Scan list of files contained in <filename>.
   /CLEAN          : Attempt to clean infected files.
   /CONTACTFILE=<filename>   : Display contents of <filename> when a virus is found.
   /DAM             : Remove all macros from infected MS Office files.
   /DEL              : Delete infected files except archive files.
   /DOHSM         : Scan migrated files(hierarchical storage management).
   /DRIVER=<dir> : Directory specifying location of DAT files.
   /EXCLUDE=<filename>       : Do not scan files/directories listed in <filename>.
   /EXTENSIONS  : Scan defaults & user extension list.
   /EXTLIST        : List file-extensions scanned by default.
   /EXTRA=<filename> : Specify the full path and file name of any extra. dat file.
   /FAM         : Find all macros - not just infected macros. Used
with /DAM will remove all macros.
   /FDC         : Force digital signature check.
   /FREQUENCY=<hours>        : Do not scan <hours> after the previous scan.
   /HELP        : Displays this help
   /HTML=<filename> : Create and specify a HTML report file.
   /LOAD=<filename> : Load options from <filename>.
   /LOUD           : Include all scanned files in the /REPORT file.
   /MAILBOX      : Scan inside plain text mailboxes.
   /MANALYZE    : Turn on macro heuristics.
   /MANY          : Scan many floppy diskettes.
   /MAXFILESIZE=<size>       : Examine Only those files smaller than the specified size(in KB).
   /MEMSIZE=<size> : File size(in KB) to load into memory for scanning limited by a maximum file size defaulting to 1MB.
   /MIME     : Scan inside MIME, UUE, XXE and BinHex files.
   /MOVE=<dir>               : Move infected file into directory <dir>, preserving path.
   /NOBKSEM  : Prevent scanning of files that are normally prote
cted.
   /NOBOOT       : Do not scan boot sectors.
   /NOBREAK      : Disable Ctrl-C / Ctrl-Break during scanning.
   /NOCOMP : Do not scan self extracting executables by default.
   /NOD       : Don't switch into /ALL mode when repairing.
   /NODDA    : Do not scan boot sectors.
   /NODECRYPT : Don't scan password-protected MS Office documents.
   /NODOC        : Do not scan MS Office files.
   /NOEXPIRE     : Disable data files expiration date notice.
   /NOJOKES      : Do not alert on joke files.
   /NOMEM        : Do not scan memory for viruses.
   /NORECALL    : Do not move files from remote storage into local
storage after scanning.
   /NORENAME   : Do not rename infected files that cannot be cleaned.
   /NOSCRIPT    : Do not scan files that contain HTML, JavaScript, Visual Basic, or Script Component Type Libraries.
   /PANALYZE    : Turn on program heuristics.
   /PAUSE         : Pause at end of each screen page.
   /PLAD           : Preserve the last-accessed time and date for files that are scanned.
   /PROGRAM     : Scan for potentially unwanted applications.
   /RECURSIVE   : Examine any subdirectories in addition to the specified target directory.
   /REPORT=<filename> : Report names of viruses found into <filename>.
   /RPTALL        : Include all scanned files in the /REPORT file.
   /RPTCOR       : Include corrupted files in /REPORT file.
   /RPTERR        : Include errors in /REPORT file.
   /RPTOBJECTS : Reports number of objects at all levels scanned in summary.
   /SECURE        : Equivalent to Analyse, doall, unzip.
   /SHOWCOMP   : Report any files that are packaged.
   /SILENT         : Disable all screen output.
   /STREAMS      : Scan inside NTFS streams (NT & DATAPOL Only).
   /SUB   : Examine any subdirectories in addition to the specified target directory.
   /THREADS=<nn>          : Set scan thread count.
   /TIMEOUT=<seconds>  : Set the maximum time to spend scanning any one file.
   /UNZIP    : Scan inside archive files, such as those saved in
ZIP, LHA, PKarc, ARJ, TAR, CHM, and RAR.
   /VERSION  : Display the scanner's version number.
   /VIRLIST   : Display virus list.
   /WINMEM[=<pid>]  : If pid given scans the Windows Process with Process ID <pid> otherwise scans all Windows Processes.
   /XMLPATH=<filename> : Filename and path for XML log file.

   * Mandatory

Source(s):

Mcafee vcl6wpg.pdf file

https://community.mcafee.com/thread/40173


Read more...

Unlock For Us

Access a Computer using VNC as Remote Desktop Alternative

vnc_program

Remote Desktop Connection (RDP) alternative such as RealVNC provides remote interaction with desktop or computer across the network. It let’s you access any pc interactively as long as you have the utility.

For the maintenance of Windows XP home workstations which RDP terminal server is not supported, encountered RDP tcp port 3389 error – this free utility is the nearest product for you.

The great thing about the software, it’s very easy to configure and it’s file size is almost negligible – too small.

DOWNLOAD THE PRODUCT

Configuring Virtual Network Computing (VNC) server and Screenshots

To start remote desktop sharing on the computer you want to connect to, you just need to configure the authentication as shown.

server_authentication_properties

Afterwards, you can now test the connection by inputting the computer name or ip-address of the computer you want to connect to (the “server”) from the “viewer” or “client” pc.

viewer_vnc

That’s it! Thanks for reading the article!


Read more...

Unlock For Us

How to get Skype Full and Portable release version

     logo

Skype allows users to communicate with friends and family by video, voice and text messaging using the internet. It offers calls within Skype software free of service while voice calls to landlines and mobile phones are charged.

The software works with Windows, Mac, iPod Touch, iPhone, iPad, Linux, Android, Blackberry and Windows Phone.

Here’s how to make portable version of the software…

skypesetup

http://download.skype.com/SkypeSetupFull.exe (Direct-download link of full installation setup from http://community.skype.com)

After downloading the version you just need to install the software and copy software located at C:\Program Files\Skype folder going to your flash drive.

copy_paste

That’s it! Save it to your compilation of portable usb applications.

Screenshot of Skype Portable

skype_portable


Read more...

Unlock For Us

Google Chrome Full and Stable release version

logo   Google chrome is a web browser created by Google designed for stability, speed and security. It’s minimalistic design makes it very different from other web browsers when it was launched last September 2008.

The multi-process architecture makes each tabs in separate process and isolated. Google chrome team periodically updates its code having 17 to 18 stable version releases in just three to four years.

How to download and install the full version for offline installation

Look at the latest version e.g. 18.0.1025.162 of the software and get the third and fourth group as highlighted.

http://dl.google.com/chrome/install/pastehere/chrome_installer.exe

Now, you can have the direct download links.

Cool!? Enjoy!

Google Chrome 18.0.xxxx.xxx
http://dl.google.com/chrome/install/1025.162/chrome_installer.exe
http://dl.google.com/chrome/install/1025.140/chrome_installer.exe

Google Chrome 17.0.xxxx.xxx
http://dl.google.com/chrome/install/963.83/chrome_installer.exe
http://dl.google.com/chrome/install/963.79/chrome_installer.exe
http://dl.google.com/chrome/install/963.66/chrome_installer.exe
http://dl.google.com/chrome/install/963.56/chrome_installer.exe

If you became part of the group of people who downloaded the initial version, you’ll not forget the cool explanation through the comic book that Google made for easy understanding of it’s design.

chromeprocessmanger

Small

http://www.google.com/googlebooks/chrome/small_00.html

Medium

http://www.google.com/googlebooks/chrome/med_00.html

Large

http://www.google.com/googlebooks/chrome/big_00.html

Great?! Thanks for reading!

Source(s): Google Groups


Read more...

 

© Freeware For Us 2007-2021| Blogger| Google.com | License Agreement