Windows 10 Insider Preview Build 10147 ISO are Here ! [EXCLUSIVE] [UPDATED] | blog-windows Blog

Windows 10 Insider Preview Build 10147

Windows 10 Enterprise Technical Preview is an early look at some of the features and functionality in store for Windows 10.




The new version of the popular operating system from Microsoft called Windows 10, although the previous major release was called Windows 8. Go directly to the Windows 10 reflects the company’s desire to distance itself from the not very popular previous version.
Owned therefore, was reportedly skipped ninth version: the transition from the eighth to the tenth straight intended to symbolize a great step forward, to a focus on the Internet and mobile users. In Microsoft Windows 10 was called “the most powerful platform in history.” The presenter vice president of Microsoft in operating systems Terry Meyerson said that Windows 10 is installed on a wide variety of devices of different types as compared to previous versions. Some of these devices, according to the presentations, now includes not only desktops, laptops and tablets, but also smart phones, and TVs.

Features

Windows 10: They want list
Add tabs to Windows Explorer/File Explorer
Make Windows Update a one-stop shop for ALL drivers
Kill off all Aero-themed objects
Bring back Aero Glass!
Persian calendar
Pin ANYTHING to the Start menu
A new Notepad.exe
Remixing the Volume Mixer
Drag-and-drop apps between virtual desktops
What’s New in Build 10147

More apps now use the accent color as their tile color
The full screen start menu now shows the power and all apps button at the bottom
The hamburger button no longer shows a notification icon when new apps are installed, this is now shown at the all apps button
New animations for tiles, including the added-then-removed-now-added-again 3D-animation
New boot animations for apps
Most WinRT tiles can now take the large tile size (including Edge, Calculator, etc)
The smilies for additional icons above power have been replaced with actual indicating icons (and some have been updated)
Full screen start is now aligned higher, allowing more tiles in the height without a scrollbar appearing
The window chrome of Win32 apps is now the same as for WinRT apps
The clock, language and other notification-fly-outs have been updated with a transparent background
The back-button no longer takes the accent color
Apps no longer have to take a white icon on the taskbar anymore
More apps have a tile-less icon on the taskbar
Multiple icons have been revamped
All Win32 controls have been given a redesign
The installation experience has been updated, it also introduces more apps
There are new default wallpapers
Propertie windows have received a visual update
In tablet mode, icons no longer disappear behind the Task View, Search and Back button when app icons are shown
Action center
New quick settings for Notes and Quiet hours
You can now set a timer in the snapping tool
Project Spartan has been updated from version 15 to 19 and is now called Microsoft Edge
Edge has new icons
The feedback icon has been removed from the main bar
There is a new share icon on the url bar
You can now enable a dark theme for Edge
Improved ECMAScript 6 support (without flags)
You can now change the search provider
When closing Edge with 2 or more tabs open, it will now warn you
Pinned hubs now look better
You can now show a home button
Pinning sites to start is broken in that it no longer has the site’s theme, but a normal Edge logo
Multiple apps have been updated
The “Store” apps has been removed, leaving only “Store (beta)”
New “Get Office” app
New “Phone companion” app
Settings
There are new animations when switching applets
Automatic color picker now works
You can now enable features that aren’t enabled by default trough Windows Update
You can now exit the Windows Insider program

Serial Keys


Pro Edition : 6P99N-YF42M-TPGBG-9VMJP-YKHCF


Downloads

Windows 10 Pro 64-BIT IP Build 10147 (3.8 GB) 
Mirror 1 
Mirror 2



Direct Links (official page)
Windows 10 PRO
Windows 10 PRO32 bit64 bit
English (USA)Download (2.93 GB)Download (3.81 GB)
English (United Kingdom)Download (2.94 GB)Download (3.79 GB)
Chinese (Simplified)Download (3.05 GB)Download (3.96 GB)
Portuguese (Brazil)Download (2.91 GB)Download (3.76 GB)
Windows 10 Enterprises
Windows 10 Enterprises32 bit64 bit
English (USA)Download (2.84 GB)Download (3.70 GB)
English (United Kingdom)Download (2.85 GB)Download (3.69 GB)
Chinese (Simplified)Download (2.96 GB)Download (3.86 GB)
Portuguese (Brazil)Download (2.82 GB)Download (3.66 GB)
Torrent Links (for available)
Windows 10 PRO
Windows 10 PRO32 bit64 bit
AIO (32 & 64 bit on 1 ISO)Download (4.67 GB)
English (USA)Download (2.94 GB)Download (3.79 GB)
English (United Kingdom)Download (3.05 GB)Download (3.96 GB)
Portuguese (Brazil)Download (2.91 GB)Download (3.76 GB)
Windows 10 Enterprises
Windows 10 Enterprises32 bit64 bit
English (USA)Download (2.84 GB)Download (3.70 GB)
Portuguese (Brazil)Download (2.82 GB)Download (3.66 GB)

Product key
PRO : NKJFK-GPHP7-G8C3J-P6JXR-HQRJR
ENTERPRISES : PBHCJ-Q2NYD-2PX34-T2TD6-233PK

Reference: http://onhax.net/windows-10-technical-preview-build-10061-leaked-iso-are-here-exclusive-updated/

Your Good comments Encourages me to keep posting Nice Articles so keep Commenting & Sharing

CyberLink YouCam 5 Standard Free Full Version Serial Key

CyberLink YouCam 5 Standard Free Full Version Serial Key

CyberLink YouCam is an all-in-one WebCam and Camera companion software which provides everything you need to get the most out of your webcam. You can use it to add fun and unique special effects to your webcam conversation or usual video recordings. YouCam 6 is compatible with the most popular messenging software, including Skype and Yahoo! Messenger.
Read more »
Official Windows 7 SP1 ISO Image Downloads | blog-windows Blog

Official Windows 7 SP1 ISO Image Downloads | blog-windows Blog



Official Windows 7 SP1 ISO Image Downloads


These are now available for those who currently have Microsoft Windows 7 with Genuine Activation Keys. These are the legitimate downloads, full ISO image to burn to a good quality blank DVD using any good image burning program such as ImgBurn or the like.


These ISO image download have Service Pack 1 integrated into the installation setup, so therefore there is no need to separately install SP1 after the initial install of Windows 7.


Windows 7 Ultimate Free Download ISO 32 Bit


Windows 7 Ultimate Free Download ISO 64 Bit




Your Good comments Encourages me to keep posting Nice Articles so keep Commenting & Sharing

CyberLink PhotoDirector 5 HE Free Serial Key Full Version Free Download (Windows & Mac)

CyberLink PhotoDirector 5 HE Free Serial Key Full Version Free Download (Windows & Mac)

CyberLink PhotoDirector 5 is a powerful photo editing and managing software for beginners and intermediate users alike. It provides a workflow-based solution to the age-old question of importing, managing, enhancing and finally sharing photos. The program is introduced by CyberLink, the maker of the best movie player PowerDVD and the award winning Video Editing software PowerDirector.
Read more »
Trick to Run Windows XP without Activation |  blog-windows Blog

Trick to Run Windows XP without Activation | blog-windows Blog

Keep Running Windows XP without Activation 

Hi Guys,

here is trick for you all.
windows xp asking for activate the Windows xp evetytime  7 dont want to take a risk downoading Crack because BAD guys are binding malware with it to infect the systems.
no problem. activate it every 30 days.

Run simple command from Safe mode.

Blah and get it done.

Step: 

1) reboot the system & goto Safe Mode:
2) Open run box, Window Key + R
3) type the below command exactly,

rundll32.exe syssetup,SetupOobeBnk


Note: Code is case sensitive so type it carefully and Hit Enter.
5) Nothing will come as pop-up, simply reboot the system after 10-15 second :)

Your Good comments Encourages me to keep posting Nice Articles so keep Commenting & Sharing

Limit the amount of concurrent connections from the same IP address using IP Tables | blog-windows Blog

Limit the amount of concurrent connections from the same IP address

Hello All, here I am posting the little trick in Linux to Limit the amount of concurrent connections from the same IP address.
        1. In Unix based OS,  we can use IP Tables functionality (aka Linux Firewall) to restrict the communication inbound or outbound.
        2. Many times it is observed that unnecessary traffic is flowing from Linux server within organization or outside. To fix these, it is easy to linux admin to restrict such a communication at linux end so only authorised communication will occur.

here we will refer this articles with respect to prevent DDoS attack at primarily level.

In order to do so, you need to apply the following rule: 

iptables -I INPUT -p tcp --dport 80 -i eth0 -m state --state NEW -m recent --set

iptables -I INPUT -p tcp --dport 80 -i eth0 -m state --state NEW -m recent --update --seconds 60 --hitcount 10 -j DROP

iptables-save >/etc/iptables.up.rules

The first line will Watch the IP connecting to your eth0 interface. 
The second line will Check if the connection is new within the last 60 seconds and if the packet flow is higher than ten and if so it will drop the connection. 
The third line will Make the rules persistant in case of a reboot (at least in debian, you may need to specify another patch or file where the rules are stored for loading at boot time)

Advantage:
1. we can block the BOT communication using IP tables.
2. we can minimize the chances of DDoS attack at primary level.


Credit: 

https://github.com/Tatuy/Guia3d/wiki/How-to-limit-the-ammount-of-concurrent-connections-from-the-same-IP-address

Your Good comments Encourages me to keep posting Nice Articles so keep Commenting & Sharing

How to Properly Upload Videos To Youtube 2015

You can upload videos to YouTube in a few easy steps. Below you can find the necessary instructions to upload your videos from a computer or from a mobile device.

Computer


To get started uploading videos on YouTube from your desktop, follow the steps below:
  1. Sign into YouTube.
  2. Click the Upload button at the top of the page.
  3. Before you start uploading the video you can chose the video privacy settings.
  4. Select the video you'd like to upload from your computer. You can also record a video from your webcam, create a video slideshow or import a video from Google+.
  5. As the video is uploading you can edit both the basic information and the advanced settings of the video, and decide if you want to notify subscribers (if you untick this option no communication will be shared with your subscribers). Partners will also be able to adjust their Monetization settings.
  6. Click Publish to finish uploading a public video to YouTube. If you set the video privacy setting to Private or Unlisted, just click Done to finish the upload or click Share to privately share your video.
  7. If you haven’t clicked Publish, your video won’t be viewable by other people. You can always publish your video at a later time in your Video Manager. 


The easiest way to upload videos from an Android device is to use the YouTube app. 
  1. Sign in to YouTube.
  2. Open the Guide   in the upper left corner of the screen and navigate to Uploads.
  3. Touch the Upload icon at the top of the screen.
  4. Select the video you want to upload.
  5. Adjust the title, description, tags and privacy settings of your video.
  6. On supported devices, you'll also see a video preview with trim handles below it. Drag the trim handles to edit your video's length. A long press on the trim handle will allow you to zoom into a frame by frame view for exact trimming.
  7. Touch the Upload icon.
Tip: Go to Settings > Uploads to modify the type of connection used to upload videos. Use this setting to restrict uploads to Wi-Fi only.

 IOS

You can upload videos from your iOS device directly from the YouTube app. Make sure you have the latest version of the YouTube iOS app installed. Follow the steps below:
  1. Sign in to YouTube.
  2. Open the Guide   in the upper left corner of the screen and navigate to My Channel (or directly touch theUpload icon  on the guide.)
  3. Touch the Upload icon  at the top of the screen
  4. Select the video you want to upload from your Camera roll and touch the confirmation button.
  5. Adjust the title, description, tags and privacy settings of your video.
  6. Touch the Upload icon .
Tip: Go to Settings > Uploads to modify the type of connection used to upload videos. Use this setting to restrict uploads to Wi-Fi only.

                                           SUBSCRIBE ME



Here's how to send the video from your device to a special email address that's provided with your YouTube account.

Part 1: Find your unique email address for uploading videos

  1. On a desktop computer, visit your YouTube Settings.
  2. Under the "Account Information" section, find "Mobile uploads". You'll see an email address that looks something like 111111111111@m.youtube.com.
    Don't see an email address? Click the Create Mobile Profile button and enter the information required. Click the Create Profile button to create an email address.

Part 2: Upload the video

To upload the video, email the video to the address you found in Part 1. You'll receive a confirmation email letting you know the video was successfully uploaded.
You can edit the video and its settings by visiting YouTube on a desktop computer.

Email Security TIPS For Internet Users | blog-windows Blog



Hello Guys, Here some TIPS Points On Email Security Topic:





1. Enable two step verification for your email accounts


  • It will beneficial to you even your credentials has been compromised by Key      logger/trojan/malware etc.
  • Be careful to handle your cell phone carefully.

2. Enable Login-notification for you email and get notification in your mobile whenever you login.
3. Set a strong password with a mix of alphabets, numbers and special characters.





4. For Your Facebook Accounts Enable login- notification to prevent unauthorised access.
5. Enable HTTPS in your facebook as well as on Email account settings.
6. Never share your password with anyone. if shared in bad situation kindly change it asap.
7. Set Up a recovery question which can not be guessable to your Security question
8. Never click on any links sent through mail or chat. It may be a link which can steal your cookie or inject any viruses.
9. Always check your address bar for proper website address before logging in. (be aware of Phishing Attack Method while performing Financial transactions).

Your Good comments Encourages me to keep posting Nice Articles so keep Commenting & Sharing

Flash Storage And Modern Businesses: Why It Works

Flash Storage And Modern Businesses: Why It Works

Flash storage is the wave of the future for computers, mobile phones, notebooks, laptops and powerful business computer systems. Many businesses are transitioning to flash storage from their basic storage systems and hard drives. However, some business owners are still confused about flash storage and how it works in terms of network storage and business efficiency. The following can explain some of the benefits of flash storage as well as a brief description of what flash storage is.

What Is Flash Storage for a Business?

All businesses have a family of computers in it at some place. Those computers have storage systems for files, pictures, documents, music, projects, applications and the like. Flash memory is different from RAM or random access memory. RAM is the computer’s main storage system. Flash memory is a separate storage system that does not need power to it to operate. Use of flash memory is inexpensive as compared to conventional memory. Units that have flash memory can go through the booting process without ever causing the hard drive to spin. RAM requires constant power to it, and it is highly expensive.

How Flash Memory Is Designed

A flash storage system is a small unit with a memory chip and a flash controller. The chip is the part of the system that stores the data while the controller works in harmony with the RAM cache. The cache is what buffers the data that is going in and out of the memory chips, and the buffering enhances the speed and performance of the memory.

Flash is becoming more prevalent than conventional storage systems is. Business and individuals are turning to products that have flash memory because of the benefits that they are experiencing with data storage and network storage.

The following are a few reasons that flash memory is quickly replacing hard drives:

Less Power Consumption


Flash drives have no mechanical parts that move around, so they automatically consume less power than a conventional memory unit. In fact, a unit with flash memory will use 50 percent less power than a unit that has a conventional memory system will use. Additionally, flash drives provide unlimited access to files. Flash units have no limitations on them, so they can find files milliseconds faster than units that do not have flash can.

Data Center Compactness

Many of today’s small units have completely abandoned hard drives and moved to flash memory because of the compactness that they provide.

Overall Cost Effectiveness

One of the best features of flash storage is that it can save a business money. Switching to flash storage can make a business environment more secure, as well.

An interested business representative can contact a reliable provider to discuss the available options for flash storage and network storage. The person can help connect the business owner with solutions that can increase capacity and performance. Smart technology solutions are available for businesses of every sizes. Providers are on standby to assist a business that wants to grow and mature with the ever-advancing technology.



Author Bio:
Katrina racks them in for the market leader of custom racking products at Rack Solutions - visit us today.

Trick to Identify the Malware Infection on Windows System | blog-windows Blog


Trick to Identify the Malware Infection on Windows System | blog-windows Blog


These articles provide the basis information about how to identify the infection on the systems at first level. There are some basic levels IOC (Indicators of compromise) which can help to confirm malware infection.


Below are the methods/ways which help us to proceed for confirmation.
          1)Manual Method
  2)Using Sysinternals
3)Using Redline Tools (Mandiant)

Manual Method: 


  • In manual Method, we will use inbuilt utilities to confirm the status of infection like foreign connection from base OS, Unknown Processes running, system boot processes and application details from Msconfig and regedit. Learn step by step.


  • Before Proceeding important note: Malware/Trojan/Virus/Worm Developer write a code in such a way that they always tried to evade detection from anti-virus.


  • Initially they tried to hide once it dumped into the OS.


Unhide hidden files/Folders/Drives:


To view the hidden malicious binary kindly go open Windows Explorer  Tools Folder Options –Go to View Tab (refer below snap)
I.Uncheck below highlighted options to view hidden files/folders.
a.Hide empty drives in the Computer Folder
b.Hide Extensions for known file types
c.Hide protected operating system files (Recommended)
II.Select the “Show Hidden files, folders and drives” options.




1. Using Netstat:

Netstat is a common command line TCP/IP networking utility available in most versions of Windows, Linux, UNIX and other operating systems.
This command is useful to see the currently established connection with foreign IPs with port & protocol wise details.

State Details: 

  • ESTABLISHED: Indicate that Still connection/communication is live.

C:\>netstat –ano | findstr ESTABLISHED
  TCP    172.16.174.228:59011    172.129.4.10:443            ESTABLISHED     8116
  TCP    172.16.174.228:59025    172.66.15.20:39331       ESTABLISHED     8116
  TCP    172.16.174.228:59065    172.128.30.85:8000       ESTABLISHED     452
  TCP    172.16.174.228:59102    172.128.27.42:10123     ESTABLISHED     4892
  TCP    172.16.174.228:59158    172.77.4.16:58734          ESTABLISHED     160
  TCP    172.16.174.228:59179    172.137.12.41:445          ESTABLISHED     4
  TCP    172.16.174.228:59723    172.135.128.228:8080   ESTABLISHED     2220
  TCP    172.16.174.228:59736    172.66.24.17:443            ESTABLISHED     8116
  TCP    127.0.0.1:6129                  127.0.0.1:53398              ESTABLISHED     1532
  TCP    127.0.0.1:53398               127.0.0.1:6129                 ESTABLISHED     4064


  • LISTENING: Indicate that some service is running on listening ports or port may be opened for listening. This may ready to connect to the Server who hit on listening port.

C:\>netstat –ano | findstr LISTENING
  TCP    0.0.0.0:135           0.0.0.0:0              LISTENING       1056
  TCP    0.0.0.0:443             0.0.0.0:0              LISTENING       4080
  TCP    0.0.0.0:445             0.0.0.0:0              LISTENING       4
  TCP    172.16.77.174.228:139   0.0.0.0:0              LISTENING       4
  TCP    127.0.0.1:8307                  0.0.0.0:0              LISTENING       4080
  TCP    127.0.0.1:53507                0.0.0.0:0              LISTENING       6904
  TCP    192.168.56.1:139              0.0.0.0:0              LISTENING       4
  
          Here we will get information about current foreign connection. Help to analyse the incident.
I recommend you to use this commend first while analysing the incidents because, we can filter out the query for live traffic as per our requirement like live port communication/foreign IP communication/State/PID Value and Protocol

2.Tasklist:


  • This command is useful to see currently running processes on the server or remote server.

Syntax: TASKLIST [/S system [/U username [/P [password]]]] [/M [module] | /SVC | /V] [/FI filter] [/FO format] [/NH]
(For GUI: use task manager)





  • It will give you details about the currently running application/services so easy to track unknown processes. 

Note: You may require the basic knowledge about system running default processes + whitelisted application processes.

3.Task Manager:



  • It provides limited information about computer performance and running applications, processes and CPU usage, commit charge and memory information, network activity and statistics, logged-in users, and system services. The Task Manager can also be used to set process priorities, processor affinity, forcibly terminate processes, and shut down, restart, hibernate or log off from Windows.



  • The task list was capable of listing currently running processes and killing them, or creating a new process. 




4.Msconfig:


  • This utility we can use to see whether any unknown application is stucked at Start-up with Manufacturer details, command with full path of application, registry path.
  • If we observed unknown application directly uncheck it & go to folder path, try to remove the file manually (use AV scan to validate/remove it). 
  • Go to registry path to remove the entry of application or use Ccleaner application to clear unwanted Data from registry.


  • Advantage of this utility is to check the unknown process/services running.

          Tick the “HIDE ALL MICROSOFT SERVICES” SO ALL MS services will get hide. Analyse the remaining services are related to whitelisted application or not and trace the unknown process/Application running the services and uninstall it asap.
We can validate which service is required to run on system start-up.

5.Registry:


Easiest way to identify is to use registry path:
HKLM\Software\Microsoft\Windows NT\current Version\Run & \Runonce
Here you will get details about the application which are set to run itself when OS boot.

6.Common Path to Dump The Binary Files:


  • Whenever system get infected malicious binary file dump itself in windows file system. There is some common path where you can check for the same.

Like: %temp%, %Appdata%, system32 etc & Documents Folder.
          You may confirm the binary files is suspicious or not by uploading the same file on Virustotal.com /metascan.com site to confirm the status.

7.Scan With Anti-Virus: 
  • Kindly update the Av version and scan whole drive using FULL scan method.
  • It is recommended to use Full Version of AV, mostly tried to avoid cracked version as there is chances of infection from cracked version. Most of the hacker use this technique to infect the user systems.

8.Use Virus Total / Metascan:
     This is simplest and fast method to detect the binary files malicious status.
You may scan files (upload limit: Max 128 MB size)/URLs/IPs and HASH to check the status. Security Analyst using this site for first level analysis.




9.Use Sandboxie:

      Sandboxie runs your programs in an isolated space which prevents them from making permanent changes to other programs and data in your computer.


  • It is useful when we find the file and need to understand the functionality or infection level, this tool is useful.
  • Most of the analyst use sandboxie to check the behaviour of malicious binary files.

Download URL: http://www.sandboxie.com/SandboxieInstall.exe

Using Sysinternals utility: 


10.Using Process Explorer to Identify Malware:

       Process Explorer is a free 1.47 MB download from the Windows Sysinternals web page on the TechNet site. Tool 

List: https://technet.microsoft.com/en-us/sysinternals/bb545027.aspx

Useful Links:
Hunt Down and Kill Malware with Sysinternals Tools (Part 1)
Hunt Down and Kill Malware with Sysinternals Tools (Part 2)
Hunt Down and Kill Malware with Sysinternals Tools (Part 3)
Video Demonstration: Malware Hunting with the Sysinternals Tools https://www.youtube.com/watch?v=Wuy_Pm3KaV8

Using Redline Tools (Mandiant):


          MANDIANT transforms how organizations detect, respond to, and contain security breaches. Through our commercial and free products, we equip front-line incident investigators with superlative tools and technologies that support them in providing a quick and effective response when organizations need it the most. 
Redline is MANDIANT’s free tool for investigating hosts for signs of malicious activity through memory and file analysis, and subsequently developing a threat assessment profile.
User Guide: https://dl.mandiant.com/EE/library/Redline1.11.1_UserGuide.pdf

Redline Features:
Rapid Triage
Reveals Hidden Malware
Guided Analysis

With Redline you can: 

  • Collect run processes, files, registry data, and memory images. 
  • View imported data, including narrowing and filtering results around a given timeframe using Redline’s TimeWrinkle™ and TimeCrunch™ features. 
  • Identify processes more likely worth investigating based on their Redline Malware Risk Index (MRI) score. 
  • Perform Indicators of Compromise (IOC) analysis. 
  • Use whitelists to filter out known valid data based on MD5 hash values.

Your Good comments Encourages me to keep posting Nice Articles so keep Commenting & Sharing