,

Your IP Address

what is my ip address?

Track your Stolen laptop,desktop or smart phone free.

If your laptop, desktop, notebook or smart phone stolen, now don't worry for that. Now you can track your stolen PC or mobile phone free of charge, using "Prey".

If you set your devise status as "Stolen" in "Prey" web site control panel" then prey will collect following details and upload them to prey server.

  • Network information. (remote and private IP addresses, gateway ip address etc)
  • Picture of thief (If you configure your devise web came).
  • Desktop screen shots.
  • Total up-time.
  • Logged user account name.
  • Modified files details.
  • Ruing programs.
  • Active controls.
  • WiFi information.
You can view that information on "Prey" web site control panel".

First of all you have to download and install "Prey" client in your devise, no matter its a portable devise or desktop PC. 
Now "Prey" has windows, Linux, Mac and also Android OS clients. You can get that clients in here.


After you downloaded and install you "Prey" client you have to configure it. 


Configure your Devise client.  


  • First step is setup reporting method.
After you double click Prey setup or start menu icon you can view following  screen shot type window. Select its "setup reporting method".


  • Setup how to view report.
After you marked your devise stolen, prey will generate your stolen devise detail and send them to you. This window you have to select how do you want see that report. If you like to view prey report on prey control panel (Prey web site) you have to select "Prey+control panel". Its best way.


  • Create or log in your Prey account.
If you're a new user to Prey then you have to create new prey account, you can do it in this set.Click new user and next icon. If you already have a prey account click "Existing user".

  • Give your details.
This step you have to submit your contact details and also your devise type. Submits your real details in here.
 That's all for configuring process.

Start tracking your stolen devise.
Note - If you devise stolen you have to immediately follow this process.
  • Log in to your "Prey" account.
  • Go to configuration.
  • Set your devise status as "Stolen"
  • Set how often you want generate your stolen devise report minimum time is 10 minutes.
  • Select other settings as you want.
  • Click "save".
Waite for generate report, and view your stole devise detail. This prey work on background.

Set prey as you normal windows start-up program.

You can set prey client as your normal startup program. To do that go to start menu and click prey client shortcut. Then select "Option for execution" like following screen shot.

Next window select "Run as window service" and also you can set reporting time in this window.


"Note"- Its better if you can hide this "Prey" shortcuts and also its installation folder. Prey normally hide its uninstaller icon in windows control panel.

Hide prey installed folder.

"Right click "Prey" folder and select "Properties". In"properties window" select its "general tab". Under general tab select hide and press OK.

Read more

Check your Internet security Level Free

It’s better if you can check your computer security level periodically. If you have internet securitysuite you may think it will protect whole my PC. But it’s not good thing. You have to check health of you Firewall, Antivirus guard and also your privacy leaking wholes. How do you verify your firewall is doing its job well?After you read this article you can do it.

Audit my PC is the best web site to you. They have Firewall scanner, Privacy scanner, Popup Test and Exploit Scanner. These scans are total free. If you want perform Exploit Scanner" you have to create an account.


Firewall test.

It checks your open ports in your firewall. When you perform this scan your internet securitysoftware will worn "Network attacker attack your PC" but if your behind in a router then this kind of notification will not appear. This firewall test will also check for open ports known to be used by malware’s.


Popup Test

This scan will help you check your ad blocking software is really capable of preventing ads. 


Complete test.

This test include Firewall scanner, Privacy scanner, Popup Test and Exploit Scanner. 


Check your Antivirus program.



And also if you want check how your internet security suite responds for malware you can test it using Eicar. It also free service. Eicar gives you to download 4 testing malware files. They are not real malware so don't worry. If you have good Antivirus program it will detect these testing file while you’re clicking downloading links.
Before you try this test enable your Internet security suite "Encrypted connection scan" option. 

You can download that testing files using "http" and also "https" protocol. 
Read more

Create Encrypted Hidden file container free.

If you want hide your secrete files, then normal way is click "Hide" in properties window. But its not secure thing, you have to encrypted them and also hide special way. Because of every one know how to view hidden files in every PC. So its not good thing. 
This post i try to introduce how to create an Encrypted hidden file container. Then you can put all your file to it and hide it. Then your secure. 
First you have to download and install TrueCrype. Its free software, You can get it in here. If you don' like to install it there's a option for make it as portable version.


  • Open TrueCrypt and select its "Create volume button"
 
  • Select next window "Create an encrypted file container"
  
  • In the next window select "Standard Truecrypt volume".


  • In the next window select where you want save that file container. But don't put anyextensions like .text etc. your saving files name must be like this"Testing". There shouldn't any full stop.
 
  • In next window click OK. 
  
  • Set a password for your file container. 

  •  In the next window select which file system you want for your "File container" its best select "NTFS" and click "Format".
  
  • After you click next then you’re finished creating ""Encrypted file container".




How to open File container and view its files.

  • Go to "TrueCrypt" main window, and under volume tab click "select file" button and select your created file container.

  • Click "Mount"

  • After you click mount button, newly created file container will appear in your "Computer window" as a part of your hard disk.
Its better you can hide this file encrypted file container using windows properties window. (Right click file container>Properties>General tab>Click hide)
  •  After you put all your files to that container again go to "TrueCrypt" and click "Demount".
Read more

Speedup your PC files copy and moving speed

If you have a windows PC normal way is use windows default copy handler and past option. Its some extend slow. This file copy and moving speed depend on your hard drive speed. So if you have low speed hard drive your file copy and moving speed slow. But now there's special utility software for speedup your copy and moving speed.

There're tones of this kind of software. This post i try to introduce to you top performance copying software. These utility software's can increase your file copy or moving speed 20% to 120% speed up than your files copy handler. Some of them are available for Linux and Mac OS's most of them are windows OS.


  • Fast copy.
This is a free tool you can get it in here. 

  • Tera copy.

This is a great files copy and moving utility. Using this utility you can Pause and resume file transfers and also verify copied or moved files. Tera copy also has paid version. You can get free version in here.

  • Extreme copy.

 This utility can speed up you files copy and past speed up to 20%-120%. You can get free version of extreme copy and also professional version. This utility has pause copy process and also error recovery. You can get Extreme copy in here.

  • Minicopier.

 This is also a fantastic files copying and moving software. Those are some key features in minicopier. Pause a copy,limit the speed of the copy,add new transfers to the queue while a copy is already being processed. 

This minicopier has windows, Linux and also mac os installers. You can visit minicopier download pagein here.

  • Supercopier

This also good files copying and moving utility software. Currently they introduce beta version. You can visit supercopier download page in here.


Read more

Monitor and calculate your Bandwidth

If you have a ADSL connection or dial-up connection there's no way for calculate your download and upload speed and also your bandwidth usage. 

Normally you want check your connection speed you may visit speednet. And also there's no way to check your total download speed and also total upload speed. 
But there's a special free bandwidth monitoring software for that its call "Networx". 

These are the key features in Networx.


  • Clear graphic and numeric display.
  • Reports can export to a variety of file formats, including Excel, MS Word and HTML.
  • Monitoring  uploads and downloads.
  • Includes network information & testing tools with advanced netstat that displaysapplications using your Internet connection.
  • Scalable to your own modem download capabilities.
  • Option to notify user or disconnect from the Internet automatically when network activity exceeds a certain level.
  • Speed meter to accurately time downloads and report the average transfer rates.
  • Detail Dial-up session information for every session.
  • Totally free and no mallware contains.
  • Detail bandwidth usage reports.



And also you can do following thing using Networx.

  • Check your connection speed.
  • Can check how much Internet traffic you already consumed.
  • Can detect a suspicious network activity on your computer such as mallware activities( unusual upload speed).
  • Can limit your excessive Internet usage and maintain your internet budget effectively.


You can get networx in here. Its totally free software. And also there's a portable version, if you don't like to install this Networx in your PC you can use Networx portable version.


Some Networx screen shots.



Read more