Welcome to IToxy.com

Hi, Welcome to IT Oxy. This blog is primarily aim to share our information on Information Technology. I really appreciate if you are willing to give any input to this blog. If you want to share something, email at: admin@IToxy.com If you found any post interesting and useful, then please leave a comment and share with your friends.

Welcome to IToxy.com

Hi, Welcome to IT Oxy. This blog is primarily aim to share our information on Information Technology. I really appreciate if you are willing to give any input to this blog. If you want to share something, email at: admin@IToxy.com If you found any post interesting and useful, then please leave a comment and share with your friends.

Welcome to IToxy.com

Hi, Welcome to IT Oxy. This blog is primarily aim to share our information on Information Technology. I really appreciate if you are willing to give any input to this blog. If you want to share something, email at: admin@IToxy.com If you found any post interesting and useful, then please leave a comment and share with your friends.

Welcome to IToxy.com

Hi, Welcome to IT Oxy. This blog is primarily aim to share our information on Information Technology. I really appreciate if you are willing to give any input to this blog. If you want to share something, email at: admin@IToxy.com If you found any post interesting and useful, then please leave a comment and share with your friends.

Welcome to IToxy.com

Hi, Welcome to IT Oxy. This blog is primarily aim to share our information on Information Technology. I really appreciate if you are willing to give any input to this blog. If you want to share something, email at: admin@IToxy.com If you found any post interesting and useful, then please leave a comment and share with your friends.

Removal of PC Privacy Cleaner

PC Privacy Cleaner is a fake registry cleaner tool, which pretends to be able to clean your registry.PCPrivacyCleaner may spread with trojans, or you can get duped into downloading PCPrivacyCleaner from PCPrivacyCleaner.com. Once you’ve got PCPrivacyCleaner, it pops up annoying messages and runs fake scans.

Symptoms

  • "Critical System Error",
  • "Your computer is infected",
  • Hijacked homepage to obscure webpage.
  • Flashing icons appear on your system tray (Near of your system clock).

    Manual Removal Steps

    1.Press Ctrl+Alt+Del to open Task Manager,check any process like pcpc.exe/PCPC_Setup_Free.exe running,kill that process

    2.Open C:\Program Files (assuming windows installed in C drive) and delete the folder named PCPrivacyCleaner or To find PCPrivacyCleaner directories, go to Start > My Computer > Local Disk (C:) > Program Files > Show the contents of this folder.Search and delete the following PCPrivacyCleaner directories:
    C:\ProgramFiles\pcprivacycleaner
    %common_programs%\pcprivacycleaner
    %program_files%\pcprivacycleaner

    3.Remove  PC Privacy Cleaner  short cuts from desktop, start menu and quick launch.Empty Recycle Bin

    4.If PCPrivacyCleaner changed your homepage?Start menu > Control Panel > Internet Options. Next, under Home Page, select the General > Use Default. Type in the URL you want as your home page (e.g., “http://www.google.com”). Then select Apply > OK. You’ll want to open a fresh web page and make sure that your new default home page pops up.

    5.How to remove PCPrivacyCleaner registry keys?

    Start->Run-> type regedit and press enter.Remove following entries

    HKEY_CURRENT_USER\software\pcprivacycleaner
    HKEY_CURRENT_USER\software\pcprivacycleaner activationcode
    HKEY_CURRENT_USER\software\pcprivacycleaner cookieparams
    HKEY_CURRENT_USER\software\pcprivacycleaner installdate
    HKEY_CURRENT_USER\software\pcprivacycleaner lastscantime
    HKEY_CURRENT_USER\software\pcprivacycleaner totalscancount
    HKEY_CURRENT_USER\software\pcprivacycleaner\schedule
    HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run pcprivacycleaner                                                                                                 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{70d17a5f-ef27-4295-90f5-20ad6f24834f}
    HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{80ced3d6-ece9-48ba-8df8-2503d8d87c2b}
    HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{aa6d4f53-4c8d-4549-84d2-02d584acc4e9}

    6.How to remove PCPrivacyCleaner DLL files

    To locate the PCPrivacyCleaner DLL path, go to Start > Search > All Files or Folders. Type PCPrivacyCleaner and in the Look in: select either My Computer or Local Hard Drives. Click the Search button.

    Once you have the PCPrivacyCleaner DLL path,Start->Run->type cmd and click “OK.” To change your current directory, type “cd” in the command box, press your “Space” key, and enter the full directory where the PCPrivacyCleaner DLL file is located. (If you’re not sure if the PCPrivacyCleaner DLL file is located in a particular directory, enter “dir” in the command box to display a directory’s contents. To go one directory back, enter “cd ..” in the command box and press “Enter.”)

    Here you type regsvr32 /u [dll_name] and press enter to unregister the DLL.If you accidentally do something wrong, you can register it again by using regsvr32 [dll_name].eg:regsvr32 /u pcpc.dll  .(How to register/unregister a .dll file)

    PCPrivacyCleaner Automatic Removal Instructions

    Print these instructions because you’ll have to reboot into Safe Mode. Also back up your computer in case you make a mistake

    1. Download and save SmitFraudFix to your desktop.

    2. Restart your computer in Safe ModeOnce thedesktop appears, double click on the SmitfraudFix.exe on your desktop.

    3. After the credits screen, you’ll see a menu. Select the option number 2, which is ‘Clean (safe mode recommended)’, and thenpress Enter to delete infect files.

    4. SmitFraudFix will begin cleaning your computer and take a series of cleanup processes. When the process is over, it will automatically begin the Disk Cleanup program.

    5. Once the Disk Cleanup program is complete, you will be prompted with the message ‘Registry cleaning - Do you want to clean the registry’. Answer Y (Yes) and hit Enter. Reboot your computer.

    6. SmitFraudFix will now check if wininet.dll is infected. SmitFraudFix will ask you whether to replace the infected file (if there’s any) ‘Replace infected
      file?’
      Answer by typing Y (Yes) and hit Enter.

    7. Reboot your computer to complete the cleaning process.

    8. After reboot, a Notepad screen may appear containing a log of all the filesremoved from your computer. If it doesn’t appear, a file will be created called rapport.txt in the root of your drive, (Local Disk C:).

    9. Restart your computer in Safe Mode .

    10. Go to C:\Windows\Temp, click Edit, click Select All, press DELETE, and thenclick Yes to confirm that you want all the items to go to the Recycle Bin.

    11. Go to C:\Documents and Settings\[LISTED USER]\Local Settings\Temp, click Edit, click Select All, press DELETE, and then click Yes to confirm that
      you want all the items to go to the Recycle Bin.

    12. Reboot your computer back to normal mode.

    How to use  SmitfraudFix ,detailed instructions here

  • How to Shrink Document by One Page in Word 2007

    A document whose last page is mostly blank is a waste of printer paper, especially if you have to make a lot of copies. Your letters and mailings will also look mere professional if they fill the pages nicely. If Print Preview reveals a skimpy last page.  Shrink One Page button in Word will tweak the fonts lathe document to make it a page smaller. Don't like the results? Just press Ctrl-Z to Undo.

  • Display your document in Print Preview (by either clicking on the Print Preview button on the toolbar or choosing the File, Print Preview command)

    image

  • Click on the Shrink to Fit button on the toolbar of the Preview window

    image

  • Click on the Close button to exit preview and return to your previous view

    Word will automatically reduce the font size of the document (maintaining the relative font sizes).

  • How to Use Document Inspector in Word 2007

    The Document Inspector in Microsoft Word 2007  provides a central location for you to examine documents  for personal, hidden, or sensitive information. You can  use built-in Document Inspector modules to remove unwanted information more easily. Utilizing the Inspector tool is one way of safeguarding any information you want to remain private.

    In documents, personal information is any information that identifies or can be used to identify, contact, or locate the person to whom such information pertains.This includes

  • Your name and initials

  • Your company or organization name

  • The name of your computer

  • The name of the network server or hard disk drive where you saved the document

  • Other file properties and summary information

  • Non-visible portions of embedded OLE objects

  • The names of previous document authors

  • Document revisions

  • Document versions

  • Template information

  • Hidden text

  • Tracked changes and comments

    How to use it?

    1.Click the Microsoft Office Button and point to Prepare

    image

    2.Click Inspect Document. The Document Inspector dialog box is displayed.When launching the inspector, if you haven't saved your file before making the most recent changes, you will be prompted to do so. It's not required that you save; however, the reason we provide this dialogue is because once you run the inspector, and choose to remove certain components of a document, they are GONE.

    image

    3.Select the modules corresponding to the types of content you want to search for, and then click Inspect.After the inspection is finished, the Document Inspector dialog box shows which modules found content in the document. It also provides buttons to remove that content.

    image

    The Inspect button also changes to Reinspect. If you click the Reinspect button at this point, the Document Inspector screen is re-displayed, enabling you to choose additional modules for inspection.

    4.To select other modules for inspection, click Reinspect. Otherwise, click Close.

  • McAfee Site Advisor

    McAfee SiteAdvisor helps protect you from all kinds of Web-based security threats including spyware, adware, spam, viruses, browser exploits, and online scams. Automated testers continually patrol the Web to browse sites, download files, and sign-up for things with e-mail addresses. As you search, browse, download, or register online, SiteAdvisor's safety ratings help you stay safe and in control.

    When you do a google search or a yahoo search, a little symbol will appear next to each entry. A green check means it is a safe site to enter,no viruses or trojans there. A yellow question mark means it has questionable content.You might get something evil there. A red X means it is a site known for trojans and malicious software. Don't enter a site unless it shows a green check.

  • Protects you from adware, spyware, spam, viruses and online scams.

  • Advises you about the safety of sites using a colored button in your browser toolbar.

  • Enhances your online search by placing safety ratings next to search results.

  • Warns you about dangerous sites and search results with clear messages.

  • Provides you with all the details about a site's safety rating on request.

  • Updates automatically to protect against new threats

    McAfee SiteAdvisor (Free Ver)

    McAfeeSiteAdvisor +: McAfee SiteAdvisor Plus | Mcafee Siteadvisor Plus 2.1.2.25.

  • Send an Anonymous Email Message With Note2Email

    Note2Email is a simple web service that lets you send email messages anonymously to anyone without signing up with the service.You can optionally enter in a special encryption key such that the recipient will only be able to read the email if they know it.

    When browsing the Internet from an untrusted network or an office computer it can be unsafe to type in the email account password. This tool was designed to help users send themselves email notes without logging in to their email account

    Your IP address is not passed in the message header so your identity remain hidden and the email recipient will never know who exactly sent that message and from where.

    Features

  • Your email will be from "note[at]note2email.com",which enables you to set up a filter in your email service or program and create a repository folder for notes sent to yourself.

  • Note2email relieves you from needing a web-based email if sending email notes from a computer that’s not your own.

  • Note2email relieves you from needing to log into web-based email in order to send email notes from a computer that’s not your own. This is both more secure (alleviates any risk of compromising your account password) and will save you time otherwise spent logging in.

  • You can send email with a special encryption key that you specify. Your recipient will only be able to view the email if they can enter in your key.

  • Spam protection: you will need to identify the note2email logo from other random images to send email with note2email. This protects against random spammers using the service for junk mail.

  • note2email allows you to send email fairly anonymously to any address. (Note: anybody with little technical skills can send an email disguised as being from anyone they choose. At least with note2email the sender is "note2email" and not some fake identity).

  • Bookmarklet for taking quick notes by email is in the works.

    Note2email

  • Google Email Uploader

    The Google Email Uploader is a desktop utility for Microsoft Windows that uploads email and contacts from other desktop email programs (like Microsoft Outlook) into your Google Apps mailbox. The Email Uploader preserves information such as sent dates and sender/recipient data, as well as the folder structure used by the other email program. The Google Email Uploader requires a Google Apps account.
    The Email Uploader is Apache 2.0 licensed open source software, and is governed by the terms of the included license file. This means you may modify the tool to better suit your needs


    Unlocking Administrator Account In Windows Vista

    Deep inside Windows, there’s a secret Administrator account, and it’s different from the normal administrator account you most likely have set up on your PC.On Vista, the difference is more than the name: the Administrator account is not subject to User Account Control. So the Administrator can make any changes to the system and will see no UAC prompts.

    For this reason, you may want to unlock the Administrator account, and use it only for those times when you want to make a series of system changes and don’t want to be bothered by UAC. True, you could instead simply disable UAC on your system, but it’s a pain to do this, and you may forget to turn it back on.

    Turning on the Administrator account is straightforward.

    You can unhide or turn on the Administrator account using the steps below:

    1. Type cmd in the Search field on the Start menu. Right click the command prompt icon at the top of the Start menu and click Run as administrator.
    2. Type ‘Net user administrator /active:yes’.

    pic

    Once you complete these steps, the Administrator account will appear on the Welcome screen. To disable once again hide the account, repeat step 1 described above and type ‘Net user administrator /active:no’.

     
    Copyright 2008 IToxy