Translate

Monday, 21 July 2014

IObit Protected Folder 1.2 With Serial Keys 

 

                     IObit Protected Folder 1.2 With Serial Keys 

 

 

About IObit Protected Folder 1.2 :

Protected Folder is designed to password-protect your folders and files from being seen, read or modified in Windows 7,8, Vista, XP and Server 2008, 2003. It works like a safety box, just drag and drop the folders or files you want to hide or protect into Protected Folder, then no one can see, read or modify them. Whether you are concerned with privacy, data theft, data loss, or data leaks, Protected Folder is an ideal tool for you.

Size : 3 MB

Rar Password : www.pkgames.net

Fraps 3.5 Cracked Download

                Fraps 3.5 Cracked Download    

 

About Fraps 3.5 :

Fraps is a universal Windows application that can be used with games using DirectX or OpenGL graphic technology. In its current form Fraps performs many tasks and can best be described as:

Benchmarking Software:
-----------------------
Show how many Frames Per Second (FPS) you are getting in a corner of your screen. Perform custom benchmarks and measure the frame rate between any two points. Save the statistics out to disk and use them for your own reviews and applications.

Screen Capture Software:
-------------------------
Take a screenshot with the press of a key! There's no need to paste into a paint program every time you want a new shot. Your screen captures are automatically named and time stamped.

Size : 2.5 MB

Rar Password : www.pkgames.net
 
 
 
 

 

ZD Soft Screen Recorder 7.0 With Serial Keys

         


About ZD Soft Screen Recorder 7.0 :

ZD Soft Screen Recorder is a handy and comprehensive application which captures what you see on screen and what you hear or say. It is usually used to create software demos, capture streaming videos and record game plays.
You can save your recordings and screen captures to various video and image formats, then you can add a watermark to the output files.

Size : 11 MB

Rar Password : www.pkgames.net

Ashampoo Music Studio 5 Download 





                                       Ashampoo Music Studio 5 Download      

About Ashampoo Music Studio 5 :

Music Studio 5 is your all-in-one solution to create, edit, design and produce your music. Ashampoo Music Studio is a breath of fresh air for your music collection. Digitize, archive and organize your songs. Design individual covers and inlays and burn your music to disc. Turn your music videos into songs and enjoy your music on your PC, smartphone or MP3-Player. Fast, easy, intuitive.

Audio CDs on your PC, smartphone or tablet
Easy listening everywhere! Ashampoo Music Studio 5 imports your CDs in superb quality, fast and easy. Have your favorite discs on your PC or mobile device almost instantly

Video-2-Music: Videos as songs or ringtones
Your favorite movie quote as ring tone? Enter Video-2-Music! Ashampoo Music Studio 5 turns your favorite videos into songs and ring tones, almost instantly. Extract opening/closing credits or your favorite scene as audio file and cut, mix or export them to a desired format.

Your personal party mix
Always wanted to be your own DJ? Create your own party mix out of your favorite songs and rock the next party. Add any number of tracks with the click of a button and make your own remix.

Self-made Audio CDs
Burn your music to CD and include fancy visuals with customly designed covers and inlays. Also a great gift idea!

Record and cut
It doesn't get any easier than this! Ashampoo Music Studio 5 supports all Windows recording devices and makes recording and editing audio a no-brainer with intuitive handling and great features. Plug in your mic, click a button and you will have your spoken or singing voice on your PC in no time.

Convert and edit
Wrong format? Use Ashampoo Music Studio 5 to convert your songs and adjust their quality. You can also edit songs individually. Remove or add single passages, use crossfading, mixes, silence or normalization to customize your songs to your need.

Edit tags, update covers
Update essential song data such as artist, album and title with the integrated tag editor + cover search and have Ashampoo Music Studio 5 organize your songs based on ID-tags. Turn "Track1-Unknown" into "01. The Beatles - Yesterday - Help!" with the click of a button.


Size : 44 MB

Rar Password : www.pkgames.net




Saturday, 21 June 2014

Live Stream 100% working



PV TV  COOLESTLIVE TV EXPERIENCE



CLICK THE LINK BELOW IT WORKS if it not work copy this link to a new tab and search 
Enjoy !!






















my new video website 24x7  live stream


in Malayalam ,Hindi ,tamil etc........

lots of malayalam songs

Sunday, 15 June 2014

List of computer viruses


The compilation of a unified list of computer viruses is made difficult because of naming. To aid the fight against computer viruses and other types of malicious software, many security advisory organizations and developers of anti-virussoftware compile and publish lists of viruses. When a new virus appears, the rush begins to identify and understand it as well as develop appropriate counter-measures to stop its propagation. Along the way, a name is attached to the virus. As the developers of anti-virus software compete partly based on how quickly they react to the new threat, they usually study and name the viruses independently. By the time the virus is identified, many names denote the same virus.
Another source of ambiguity in names is that sometimes a virus initially identified as a completely new virus is found to be a variation of an earlier known virus, in which cases, it is often renamed. For example, the second variation of the Sobig worm was initially called "Palyh" but later renamed "Sobig.b". Again, depending on how quickly this happens, the old name may persist.

Scope[edit]

In terms of scope, there are two major variants: the list of "in-the-wild" viruses, which list viruses in active circulation, and lists of all known viruses, which also contain viruses believed not to be in active circulation (also called "zoo viruses"). The sizes are vastly different, in-the-wild lists contain a hundred viruses but full lists contain tens of thousands.

List of viruses and related programs[edit]

VirusAlias(es)TypesSubtypeIsolation DateIsolationOriginAuthorNotes
1260V2PxMS-DOSPolymorphic1990First virus to use polymorphic encryption
4K4096MS-DOS1990-01The first virus to use stealth
5loMS-DOS1992-10Infects .EXE files only
A and AMS-DOS
Windows 95/98
AbraxasAbraxas5MS-DOS
Windows 95/98
1993-04EuropeARCV groupInfects COM file. Disk directory listing will be set to the system date and time when infection occurred.
AcidAcid.670, Acid.670a, Avatar.Acid.670, Keeper.Acid.670MS-DOS
Windows 95/98
1992Corp-$MZUInfects COM file. Disk directory listing will not be altered.
AcmeDOS (Windows 95MS-DOS)Upon executing infected EXE, this infects another EXE in current directory by making a hidden COM file with same base name.
ABCABC-2378, ABC.2378, ABC.2905MS-DOS1992-10ABC causes keystrokes on the compromised machine to be repeated.
ActifedMS-DOS
AdaMS-DOS1991-10ArgentinaThe Ada virus mainly targets .COM files, specifically COMMAND.COM.
AgenaAgena.723MS-DOS1992-09SpainInfected programs will have a file length increase of 723 to 738 bytes
AGI-PlanMonth 4-6MS-DOSMülheim an der Ruhr, GermanyAGI-Plan is notable for reappearing in South Africa in what appeared to be an intentional re-release.
AhDavid-1173, TuesdayMS-DOS1991-05ItalySystems infected with Ah will experience frequent system hangs.
AIMS-DOS
AIDSAIDSB, Hahaha, TauntMS-DOS1990Dr. Joseph PoppAIDS is the first virus known to exploit the MS-DOS "corresponding file" vulnerability.
AIDS II
AirCopAir cop-B, Red StateMS-DOS1990-01Infects the boot sector of floppy disks.
AlabamaAlabama.BMS-DOS1989-10Hebrew University, JerusalemFiles infected by Alabama increase in size by 1,560 bytes.
Alcon[1]RSY, Kendesm, Ken&Desmond, EtherMS-DOS1997-12Overwrites random information on disk causing damage over time.
Ambulance
Anna KournikovaEmail
VBScript
2001-02-11Sneek, NetherlandsJan de WitA Dutch court stated that US$166,000 in damages was caused by the worm.
AntiCMOSDue a bug in the virus code, the virus fails to erase CMOSinformation as intended.
ARCV-nMS-DOS1992-10/1992-11England, United KingdomARCV GroupARCV-n is a term for a large family of viruses written by the ARCV group.
BomberCommanderBomberMS-DOSBulgariaPolymorphic virus which infects systems by inserting fragments of its code randomly into executable files.
BrainPakistani flu1986-01Lahore,PakistanBasit andAmjad Farooq AlviConsidered to be the firstcomputer virus for the PC
Byte BanditAmiga, Bootsector virus1988-01Swiss Cracking AssociationIt was one of the most feared Amiga viruses until the infamous Lamer Exterminator.
Christmas Tree
CIHChernobyl, SpacefillerWindows 95/98/MeJune 1998TaiwanTaiwanChen ing-HauActivates on April 26, in which it destroys partition tables, and tries to overwrite the BIOS.
CommwarriorSymbianBluetoothwormFamous for being the first worm to spread via MMS and Bluetooth.
CreeperTENEX operating system1971BobThomasAn experimental self-replicating program which gained access via the ARPANET and copied itself to the remote system.
ElizaMS-DOS1991-12
Elk ClonerApple II1982Mt. Lebanon, Pennsylvania, United StatesMt. Lebanon, Pennsylvania, United StatesRich SkrentaThe first virus observed "in the wild"
FormMS-DOS1990SwitzerlandA very common boot virus, triggers on the 18th of any month.
GraybirdGraybird P
HareMS-DOS
Windows 95,Windows 98
1996-08Famous for press coverage which blew its destructiveness out of proportion
ILOVEYOU2000-05-05Manila,PhilippinesReomel Ramores, Onel de GuzmanA computer worm that attacked tens of millions of Windowspersonal computers
INIT 1984Mac OS1992-03-13Malicious, triggered on Friday the 13th.
JerusalemDOS1987-10Jerusalem was initially very common and spawned a large number of variants.
Kama SutraBlackworm, Nyxem, and Blackmal2006-01-16Designed to destroy common files such as Microsoft Word, Excel, and PowerPoint documents.
KokoDOS1991-03The payload of this virus activates on July 29 and February 15 and may erase data on the users hard drive
Lamer ExterminatorAmiga, Boot sector virus1989-10GermanyRandom encryption, fills random sector with "LAMER"
MacMagDrew, Bradow, Aldus, Peace1987-12
MDEFGarfield, Top Cat1990-05
MelissaMailissa, Simpsons, Kwyjibo, KwejeeboMicrosoft Word macro virus1999-03-26New Jersey, United StatesDavid L. SmithPart macro virus and part worm. Melissa, a MS Word-based macro that replicates itself through e-mail.
MichelangeloMS-DOS1991-02-04AustraliaRan March 6 (Michelangelo's birthday)
Navidad2000-12
NatasMultipartite, stealth,Polymorphic1994"Priest"
nVIRMODM, nCAM, nFLU, kOOL, Hpat, JudeMac OS1987nVIR has been known to 'hybridize' with different variants of nVIR on the same machine.
OneHalfSlovak Bomber, Freelove or Explosion-IIMS-DOS1994SlovakiaVyvojarIt is also known as one of the first viruses to implement a technique of "patchy infection"
Ontario.1024
Ontario.2048
OntarioSBCMS-DOS1990-07Ontario, CanadaDeath Angel
Pikachu virus2000-06-28AsiaThe Pikachu virus is believed to be the first computer virus geared at children.
Ping-pongBoot, Bouncing Ball, Bouncing Dot, Italian, Italian-A, VeraCruzBoot sector virusHarmless to most computers
RavMonE.exeRJump.A, Rajump, JisxWorm2006-06-20Once distributed in Apple iPods, but a Windows-only virus
SCAAmiga, Boot sector virus1987-11SwitzerlandSwiss Cracking AssociationPuts a message on screen. Harmless except it might destroy a legitimate non-standard boot block.
ScoresEric, Vult, NASA, San Jose FluMac OS1988 SpringDesigned to attack two specific applications which were never released.
Scott's ValleyMS-DOS1990-09Scotts Valley, California, United StatesInfected files will contain the seemingly meaningless hex string 5E8BDE909081C63200B912082E.
SevenDust666, MDEF, 9806, Graphics Accelerator, SevenDMac OS1998
Shankar's VirusW97M.Marker.oPolymorphicVirus1999-06-03Sam RogersInfects Word Documents
SimileEtap, MetaPHORWindowsPolymorphicThe Mental DrillerThe metamorphic code accounts for around 90% of the virus' code
SMEG engineMS-DOSPolymorphic1994United KingdomThe Black BaronTwo viruses were created using the engine: Pathogen and Queeg.
Stoned1987Wellington, New ZealandOne of the earliest and most prevalent boot sector viruses
SundayMS-DOSJerusalem.Sunday1989-11Seattle, Washington, United StatesBecause of an error in coding, the virus fails to execute its payload.
TDL-4BotnetJD virus
TechnoMS-DOSThe virus plays a tune that was created by the author of the virus
WhaleMS-DOSPolymorphic1990-07-01Hamburg, GermanyR HomerAt 9216 bytes, was for its time the largest virus ever discovered.
ZMistZMistfall, Zombie.MistfallZombie.MistfallZ0mbieIt was the first virus to use a technique known as "code integration".