Preventing Windows Live Mail From Blocking Unsupported File In Attachments

Preventing Windows Live Mail From Blocking Unsupported File In Attachments

The users who are in habit of using Microsoft’s Windows Live Mail sometimes gets annoyed when the emails having the following attachments are stopped when they are receiving or sending a file. Those attachments will be blocked for security reason.

The attachments or files that are prevented are pre-defined setting of Windows Live Mail which have the extension mainly as “.com”, “.lnk”, “.hlp”, “.msc”, “.vb”, “.scr”,  “.chm”, “.exe”, “.cpl”, “.msi”, “.tmp”, “.reg”, “.bat”, “.inf”, “.cmd”, ”.url”, etc.

When the user tries to send files having one of the extensions mentioned above, that email will be rebounded and as a result it will not be delivered. Again, if somebody tries to send files to the user having those extensions that file will not be delivered, and the user will be notified with a message which will tell users that the file they are trying to access is dangerous so it has been deactivated. You can solve this problem just by reconfiguring the setting. Just follow the simple following steps and get rid of this problem.

First select “Tools” then go to “Safety Option” which is present in Menu Bar. Then go to the “Security” option and search for that option that will not allow the attachments which are to be saved and will consider them to be virus. Just deselect it. Then apply it and you have done your job. You have prevented Windows Live Mail from blocking your emails that are attached with the file extensions mentioned above.

Prevent Recovery Of Deleted And Encrypted Files With Sdelete

Prevent Recovery Of Deleted And Encrypted Files With Sdelete

If a user is deleting a file from his computer, there is a chance for tech-savvy guys and hackers might recover those file’s contents whenever they get to access that computer.

Such things happens for example, if you have left the company you worked for, the company transfers the old laptop of yours to another person. The new guys who are trying to use your old computer will have an easy access and can recover your deleted files which are maybe private or confidential.

In order to ensure that your files which are confidential are completely erased from the old computer which you were using, you have to try to go through some delete applications, as for example File Deleter. These delete applications will enable you to securely remove those existing files, and not leave any traceable track so that any other person can recover it.

However, most of the applications are available on prices. A price is generally attached with these applications. To get a free tool for deleting your file totally and to make it unrecoverable from XP or Vista, you can use the tiny tool known as SDelete (Secure Delete) which is Resource kit that is being recommended for Windows Vista.

SDelete is an application of command line that allows the users to delete their existing confidential files that retains in the unallocated space in a disk or to overwrite the deleted files in the hard disk as well as to clear the free space present a logical disk.

Few practical SDelete’s command is listed below:

  1. sdelete [-p passes] [-s] [-q]
  2. sdelete [-p passes] [-z|-c] [drive letter]
  • -c: beneficial in virtual disk optimization for parenting the making of any free space.
  • -p passes: With this command, you can Limit the overwriting opportunities on the passes
  • -s: Recursing the subdirectories.
  • -q: Printing of errors prohibited.
  • -z: Clear the free space.

Simple Tweaks Performed On Windows 7 To Prevent Unnecessary Complications

Simple Tweaks Performed On Windows 7 To Prevent Unnecessary Complications

Most of the time an individual attempts to select start option or selecting shutdown from the start menu either shrinks or hides under the taskbar, and it is considered to be a flaw on windows 7 operating system. This is viewed as an annoyance amid many users

This creates difficulties while working on computer system, and also the appearance of start menu is pretty odd as the portion of start menu gets hidden or goes out of sight under the taskbar.

Because this issue does not occur every time, there is no official patch being created by Microsoft for this yet? One can utilize a few tweaks that will set it right on Windows 7 and enable a uniform performance.

To set this correct and make desktop appearance formatted to its primary position, Comply few simple steps as mentioned underneath.

  • Set the taskbar option as Unlocked through a right mouse click on taskbar and select “unlock taskbar” option.
  • Now, change the location of taskbar to either of the locations left or right or top by selecting it with left mouse click and dragging it.
  • Now, set the task bar to its original position
  • Now, the start-menu’s hiding or shrinking will be curbed. This resolves the issue.

This is one of the usual Windows 7 problems, and its effects are pretty normal. By complying through the steps illustrated above, you can stop the unnecessary complications on your system.

Use Prevent Restore To Ensure True Deletion Of Your Private Data

Use Prevent Restore To Ensure True Deletion Of Your Private Data

Whenever you delete a file or folder using SHIFT + DEL keys or by emptying the recycle bin, it does not get completely deleted from your system’s hard disk. The data still remains on your system’s hard disk until you overwrite it with some fresh data. Also these deleted file and folder can easily be recovered using data recovery software like NTFS Undelete.

Therefore you need to be very careful while deleting your private and personal data using SHIFT + DEL keys or by emptying the recycle bin as the data can be exposed to others if you happen to sell your PC some day. In order to ensure a complete and true deletion of data, you can make use Prevent Restore, a useful tool which makes your deleted data unrecoverable.

In order make your deleted data unrecoverable, Prevent Restore overwrites the free hard disk space containing bits of deleted data with other random data. This utility comes with a simple, user friendly interface. Prevent Restore can be used with hard disks as well as removable storage media like USB thumb drives, memory sticks, SD cards etc. However, it does not support optical drives like CDs/DVDs.

Prevent Restore allows you to choose from various options such as spaces, random digits, random characters or security algorithms (DoDD 5220.22 and Peter Gutmann) in order to overwrite the free space.

Sometimes, some programs tend to store unencrypted sensitive data such as bank account details and passwords in the system memory. With windows virtual memory structure, this data is likely to be saved within the paging file. Prevent Restore has ability to remove the paging file contents to ensure privacy protection.  

Prevent Restore takes care of the temporary files and cache which you have deleted and ensures that they are unrecoverable.  It also shows an option for emptying the Recycle Bin so that none of the deleted files can be restored from there. Prevent Restore may take a few hours to finish the total deleting process in case you have a huge hard disk.

Moreover, you do not need to wait for the deletion process to get over for turning off your PC as Prevent Restore does it automatically once the process is complete and also alerts you with a sound. Prevent Restore v2.16 is an amazing utility that secures your private data by preventing its recovery by another person without your knowledge.

This tiny application only consumes 1.93 MB of disk space and is compatible with Windows Vista and Windows XP. Moreover, being a freeware all its features can be used free of charge. However, it also has some additional options which can be accessed only upon online registration.  Disk Scrubber is yet another utility that makes deleted files unrecoverable, but it is not as powerful as this one.

Download Comodo Verification Centre To Prevent Deception/Fraud By Phishing

Download Comodo Verification Centre To Prevent Deception/Fraud By Phishing

Internet is the best resource to make your working easier and simpler by using its services such as paying your taxes online, bills, online shopping, online transactions etc. However, it could be harmful and cost you huge loss whenever you visit mistakenly any phishing or counterfeit websites.

These websites look like the legitimate and genuine websites and allure you to visit it. However, once you visit these phishing websites, you will realize that your confidential information such as bank account information, credit card password, login name, account password etc has been stolen.

Mostly non-tech users get trapped and cheated via these phony websites due to lack of knowledge and information about preventing these sites to be accessed. Since there are no major criteria to differentiate phishing websites from the legitimate websites manually, it is obvious that visitors would get cornered easily.


However, there are several awareness programs and campaigns that are running worldwide to make the internet users aware about preventing these phishing websites to be accessed. Through these programs users will get a rough idea to identify phony websites and block them to be opened on their computer. Nevertheless, there are still so many users who are not getting benefited from these awareness programs so it could divulge or reveal their sensitive information over the phony websites.

Besides awareness programs, there are numerous anti-phishing applications available to prevent phony sites to be opened on user’s web browser. One of the most powerful anti-phishing and identity assurance tools is Comodo Verification Engine, which has huge database to identify and verify the authentication of every websites that opens on your browser. This security tool allows users to browse safely and prevents phishing websites by verifying their authentications.


It is a freeware application and can be downloaded directly from the given link here. Comodo Verification engine is Windows based software and supports almost all web browsers such as IE 5.0 up to latest version, AOL 1.1 up to latest version, Netscape 8+, Firefox 1.0.7 up to latest version, etc.

Once users installed this application on their system, a tiny “V” icon will appear on the system tray area. Form now onwards, whenever users open a website, Comodo Verification engine will instantly check its authentication level via huge and rich database. If it finds the legitimate website, then users will notice that browser border glows in green color and an arrow should be there pointing site’s verified logo. On the contrary, border not appearing in green color, then users are recommended to not open that website because it might be phishing or phony website. However, you can continue browsing over the website at your own risk.

Additionally, Comodo Verification engine provides single clear visual indicator regarding the security level of SSL and warns you if website is using SSL certificate privileged by scammers. Users can customize or personalize its settings according to their convenience such as they can change the thickness of green color and text size etc.

Check Out These Useful Techniques To Prevent Your Personal Wikileaks

Check Out These Useful Techniques To Prevent Your Personal Wikileaks

Wikileaks is a widely popular subject in news as well as an interesting topic for general discussion all around the world. Due to Wikileaks, a huge amount of information related to world governments which is generally hidden is revealed to the public.

The general public is normally either unaware or prefers to remain unaware of what is happening behind the scenes. The main reason behind this is that, some find it too difficult to keep a watch on what’s going on while others are too frightened to follow. However, in a society that believes in democracy, people deserve to know about what is happening in their government.

Let me make it very clear that this blog has nothing to do with politics. The above mentioned example is only to show how confidential information can be released to public due to a break in security chain, even though it is meant only for some intended recipients.

If you look at this issue on a personal level, you can imagine how such security failures can ruin careers, destroy relationships and lead to issues such as stolen identity.

In a recent write up on Personal Wikileaks, Jason Perlow explained how he received a Smartphone for evaluation only to learn that the earlier user was sophisticated technology journalist who had direct attention of popular technology industry leaders.



Many such incidents occur in tech journalism and there are a lot of instances where personal devices are used, evaluated and sent back without purging personal information. Moreover, these devices are not even wiped or purged by the vendor. This is nothing but complete carelessness.

Jason believes that this is an epidemic issue. However, it looks to be more of a systemic issue which is inbuilt in our personalities. People normally do not think about the safety of their personal information until and unless they deliberately focus on the issue. Humans still believe that all they need is food, shelter and protection from predators.

However, in today’s world, predators are no more interested in eating your carcass. All they want is your personal data.  Internet is full of articles related to accidental data leaks that include celebrities losing their mobile phone containing some personal pictures, government employees misplacing their laptops etc.

Email accounts of various political candidates get hacked as they make use of simple, easy-to-guess passwords.  Some malicious users hack databases of commercial websites in turn revealing critical financial data of their clients that is finally sold to some black market group overseas.

This issue related to information leaks is not going to end until and unless people start protecting their personal information in the same manner as they protect their money, families and homes. Jason Perlow has suggested a lot of ways of protecting personal data present on your Smartphone. You need to simply wipe the information on the device as well as the storage card before you give it to others.

Enhance your phone with remote admin capabilities so that you can wipe out your personal data from the device even in case you lose it. Always make use of a screen lock password or PIN as well as SIM lock password if possible. Most phones allow you to dial the local emergency number even if your phone is locked so that you do not have to waste time in unlocking it while trying to dial the emergency number.

However, the issue related to information leaks is not just confined to your Smartphone. You must be having critical data at various other places like your home, at work and on websites.

The major mistake that most people make is using the same password everywhere. Your passwords are the main thing that can strengthen the security of your critical data. Rather than using one password, you need to have around six of them. Create your passwords in such a way that they are difficult to crack.

An ideal password should contain not less than 8 characters. It should have at least 1 number, 1 capital letter and 1 special character like %,!, $, @, #,etc. Your password should not contain an actual word or should not have anything related to your life. Remember to change or rotate your password regularly. Keeping the password unchanged for over 90 days is not wise.

Allowing others to access or use your personal devices or computer is another thing that can lead to information leaks. Many people like carrying their phones with them. A number of times they leave their phones at their desk at the workplaces and disappear for sometimes only to realize that in their absence, their battery contacts have been taped over.

If you need to walk away from your seat leaving your cell phone behind, you need to make sure that you lock the screen of your phone with a screen lock password. In case you have a laptop or other portable computer hardware and there are visitors who walk in directly without any interception by the security, it is wise to keep it locked in your desk when you are not around.

You need to also secure or protect your cloud data when you check your emails. You must be having email accounts with Gmail, Hotmail, Yahoo! or any other email clients which generally use cloud storage. You do not have to worry if you access your email using your home PC.

However, if you access your emails from Internet cafes or Libraries, you need to be very careful. Computers at such places may have keylogger or even if they don’t, you might not be very sure that you can purge all the saved passwords from these systems. You need to avoid accessing any personal/ financial data on the computers that you do not completely trust. 

Some people do not understand the seriousness of information leaks until they unexpectedly realize that somebody has bought something expensive using their credit card details.

Nevertheless, taking care of small things like choosing proper passwords and preventing others from physically accessing your PC or devices can certainly make a difference. Data thieves are often seen following easy targets. In case you do not offer an easy target, they are bound to change their route.

Also, it is very important that you keep your anti-malware and anti-virus software up-to-date on your system.