Monday, October 4, 2010

Add Dropbox to the Send To Menu in Windows 7

Dropbox is one of the coolest utilities available today to backup and share files and folders online. If you want easier access to it, you might want to add it to the Send To Menu in the Context Menu.

Add Dropbox to Send To Menu in Vista & Windows 7

First navigate to the following path by copying the following into the Windows Explorer address bar or the Search box in the Start Menu.


If you have Dropbox under Favorites right-click on the folder and drag it into the SendTo folder. If it’s not under your Favorites in Explorer, just drag it to the SendTo folder from whatever directory you have it in.

When you release the folder you’ll have the option to move, copy, or create a shortcut…you can certainly move it there if you want, but we’re going to create a shortcut.

Now when you right-click on a file or folder you’ll have the option to send it to your Dropbox folder.

If you have other shared folders in your Dropbox folder you can add them to the SendTo Menu as well using the same method. Like in this example we added a shared Dropbox folder we use for testing geek stuff.

Add Dropbox to Send To Menu in XP

In XP go to Control Panel and Folder Options then select Show hidden files and folders.

Navigate to C:\Documents and Settings\[User Name]\SendTo (where User Name is the name of your computer) and create a shortcut to your Dropbox folder.

Now you have your Dropbox folder added to Send To in the Context Menu…

If you use Send To from the Context Menu in Windows, this is a good way to easily add files and folders to your Dropbox folders.

Make sure and check out our other tips and tricks for using Dropbox:

Thursday, August 26, 2010

Windows 7 Review

Windows 7 has released after three years of Vista. Vista and Windows 7 can be compared on many points and in all of them Windows 7 will win. If you take a Windows 7 review, then you will feel that it is better than any other Windows operating system. You are aware about the concept of boot time. It is the time taken by the system while booting. Windows 7 takes less time in booting as compared to Vista.

Windows 7 and Vista has same hardware requirements and hardware compatibility model. In Windows 7, user interface has been improved with usable features like Aero Peek, Aero Shake. While working on the Windows 7, you will feel uneasy because of the too many opened windows. Aero Peek feature gives you the facility to view the outline of every window, which is recently opened. You can view this outline by hovering over a show desktop field in the right of the task bar. Aero Shake feature lets you minimize all the windows except the one, on which you are working. To utilize this feature, you have to hover over one window and the other windows will be minimized.

Windows Media Centre in Windows 7 has been improved than it was in Vista. After knowing about all the features of it, it is certain that you will think of Windows 7 replacement with your current operating system. In Windows 7, a feature known as Windows Live Essentials is available, this feature is basically a bundle of applications. Now, you do not have to install each application separately, because of this feature all of the applications will be installed concurrently.

Windows 7 has improved searching mechanism. If you search for a file, then you will also get some of the information about the file. In this way, you can easily search for any of the file present on your system. Windows 7 minimum system requirements are as follows:

1 GHz processor for both of the 32-bit or 64-bit system. 1 GB of RAM for 32-bit and 2 GB of RAM for 64-bit processor. 16 GB of available free disk space for 32-bit and 20 GB of available disk space for 64-bit processor. DirectX 9 graphics processor with WDDM 1.0 or higher driver are all the basic Windows 7 requirements.

Thursday, July 29, 2010

Microsoft Releases Enhanced Mitigation Experience Security Toolkit

Microsoft today released the Enhanced Mitigation Experience Toolkit (EMET), a new tool to help IT administrators send anti-exploit mitigations like ASLR (Address Space Layout Randomization) and DEP (Data Execution Prevention) to older versions of Windows.

Older Windows Systems, open to vulnerabilities

Address space layout randomization (ASLR) is a security technique which works by randomly re-arranging the positions of key data area. This usually includes the base of the executable plus the position of , heap, libraries and the stack, which is found in a process‘s address space.

Address space randomization is a process that blocks some types of security attacks by making it more difficult for an attacker to predict target addresses.

Data Execution Prevention (DEP), on the other hand, is a set of hardware and software technologies that perform additional checks on memory to help prevent malicious code from running on a system.

he EMET tool, works by applying security mitigation technologies to random applications in order to block exploitations that occur through common attack protocols.

It will also add anti-exploit mitigations to existing third-party software that do not currently use mitigation offerings. This feature comes in addition to implementing ASLR and DEP on older versions of the Windows operating system.

There are several features that it has.

* “Structured Error Handling Overwrite Protection (SEHOP) prevents Structured Exception Handling (SEH) overwrite exploitation by performing SEH chain validation.

* Mandatory address space layout randomization (ASLR), as well as non-ASLR-aware modules on Windows Vista, Windows Server 2008 and Windows 7.

* Dynamic Data Execution Prevention marks portions of a process’s memory non-executable, making it difficult to exploit memory corruption vulnerabilities.

* NULL page allocation allocates the first page of memory before program initialization and blocks attackers from taking advantage of NULL references in user mode.

* Heap Spray Allocation pre-allocates memory addresses to block common attacks that fill a process’s heap with specially crafted content.

* Export address table (EAT) uses hardware breakpoints to filter access to the EAT of kernel32.dll and ntdll.dll, blocks access if the instruction pointer is not inside a module, and breaks current common metasploit shellcodes.”


Your Windows 7 Reliability Monitor

One of the cool little features that arose from the ashes of the disaster known as Windows Vista was the Reliability Monitor. A little-known tool which is almost hidden within the action center, the Reliability tool is great for tracking your computers reliability.

Reliability Monitor is an advanced tool that measures hardware and software problems and other changes to your computer. It provides a stability index that ranges from 1 (the least stable) to 10 (the most stable). You can use the index to help evaluate the reliability of your computer. Any change you make to your computer or problem that occurs on your computer affects the stability index.”

Per Microsoft, the Reliability Monitor is intended for advanced computer users, such as software developers and network administrators, but it is easy to use, so even moderate users will have no problem using the tool to track their system over time.

There are two ways to find your PC’s Reliability history:

You can use Windows Search and begin typing the word ‘Reliability’ until the option shows.


Right-click on the white flag in your taskbar to open Action Center.

Click Maintenance. Then, under Check for solutions to problem reports, click View reliability history.

In Reliability Monitor, you can:

* Click any event on the graph to view its details.

* Click Days, or Weeks, to view the stability index over a specific period of time.

* Click items in the Action column to view more information about it.

* Click View all problem reports to view only the problems that have occurred on your computer. This view does not include the other computer events that show up in Reliability Monitor, such as events about software installation.

The Reliability Monitor is a very basic program with a very basic use. It’s one of the many useful tools provided natively in Windows 7 which can help you keep your PC on the right track.


Wednesday, July 28, 2010

Safari Browser Update Opens Up Extensions

Windows/Mac: Safari 5.0.1 is out, and it's much more than just a bug fix. Installing the update activates Safari's new extensions platform, which has roughly 100 extensions available through the Safari Extensions Gallery.

From an early look around, the majority of Safari's extensions are more akin to GreaseMonkey-style scripts than full-on Firefox extensions. Most appear to be related to the functionality of a single site, or making certain webapps easier to access—not that there's anything wrong with that. Tools and offerings for Gmail, Instapaper, eBay, and other popular services abound.

See something you like in the Extensions Gallery? Tell us about it in the comments. The Safari update is a free download for Windows and Mac systems.

Safari Extensions Gallery


Monday, July 26, 2010

IE8 Blocked over 1 Billion Malware Attacks

With the help of the SmartScreen filter, IE 8, Microsoft’s standard Internet browser prevented 1 billion malware attacks or downloads. In a Microsoft Windows Blog on Friday, Microsoft noted that the growing number of socially engineering attacks like malware are posing a greater threat on the Internet. They are one of the most common risks to people’s online safety. Having introduced malware protection in Internet Explorer 8 as part of the SmartScreen Filter it has been a very successful ad on to a commonly used product.

How it Works

First the SmartScreen Filter looks and evaluates the URLs coming into the website, it follows up with an inspection of the associated servers of origin. When the software spots a server as containing malicious content, SmartScreen displays a warning, saying that it is unsafe to browse to that respective site. The user is then given the opportunity to continue forward to the page or return back to their home page without downloading any content.

Here are some quick facts of interest about the Internet Explorer and malware as IE 8 hit this 1 billion blocks milestone:

* In August 2009 and March 10, the NSS Labs have recognized the Internet Explorer 8 SmartScreen Filter was a leader in protection against Socially Engineered Malware. The reports also compared Internet Explorer 8 to Firefox and Chrome, and others browsers.

* The SmartScreen malware filter blocking rates continue to improve because there is a continued effort to improve the SmartScreen service program at the back-end. In comparison, an August 2009 report showed that the filter blocked about 70 million attempts to download malware. This was about 18 million blocks per month. But at the time,Net Applications reported that only 15% of the Internet population used IE 8. Now speed forward. In the last two months, IE8 blocked about 100 million attempts to download malware. Furthermore, last month, according to Net Applications, the number of users of IE 8 was almost 26% of the Internet population. this translates to about more than 1.7 times more users working with Internet Explorer 8 than last August 2009; however, the blocking rare is 5 times more malware month on month.


Keyboard Leds Puts Keyboard Indicator Lights in Your System Tray

Windows: Keyboard indicator lights are only useful if you're staring at the keyboard when they turn on. If you're a touch typist, Keyboard Leds puts indicator lights and caps lock warning in the system tray where you'll actually see them.

Keyboard Leds is a small and customizable application that parks a little indicator in your system tray to alert you when you press the Caps Lock, Scroll Locks, and Num Lock buttons. In addition to customizing the colors if the individual indicator lights you can also enable an on-screen alert—especially handy for those times you accidentally activate the Caps Lock key.

Hate the Caps Lock key and want it gone all together? Use this AutoHotkey script to neuter it. Keyboard Leds is freeware, Windows only. Have a favorite trick or tool for dealing with keyboard nuisances? Let's hear about it in the comments.