Web Toolbar by Wibiya
ComputerNexus1  Web Design
CN1 on Facebook Joey YoutubeGoogle+
Old Fasioned Personal Service
In a Digital World
(864) 387-6677

Free Software & Utilities


Another Source of great free software


You can find free software to edit your photos, write letters, create presentations, capture video and more.



The Microsoft Baseline Security Analyzer provides a streamlined method to identify missing security updates and common security misconfigurations.

The rootkit allows its creators to sell YOUR computer to cyber-criminals

If you have been connected to the pulse of the security world in the past few days, then you probably know that there's a new bad guy in town, called TDL4. This rootkit-based e-threat is not what you would expect from a regular piece of malware: it is encrypted using custom algorithms, and will stay absolutely hidden on the system after it has successfully infected your system.

More than that, given the fact that it features one of the most advanced rootkits on the market, chances are that most antiviruses will fail to accurately identify it, let alone to remove it. Once run, TDL4 infects the Master Boot Record (MBR), which allows it to load its code before Windows starts up. This approach allows the rootkit to intercept critical system functions. The rootkit can infect both 32- and 64-bit versions of Windows, which makes it particularly more dangerous than other pieces of malware based in accompanied by drivers.