Test your firewall using the LeakOut tool

Even if you have a firewall software installed, it can allow some information to be leaked without your confirmation. The LeakOut tool checks if your firewall is configured in such a way as to leak any information easily. LeakOut is a simple tool to demonstrate how it is possible, in certain circumstances, to circumvent the outbound control/filtering systems of personal firewalls. So why not test the configuration of your firewall?

Read more

Rebuild icon cache in Windows 7

If you are seeing mixed up or misplaced icons in your Windows Explorer – for example, Notepad icon for picture files, Internet Explorer icon for text files etc. – then it may be a case of corrupt icons cache. Sometimes Windows’ icons cache gets corrupted and you see mixed up icons in Windows Explorer for different kind of files. The icon cache can be rebuilt using the following process.

Read more

Reset Windows HOSTS file back to default

The Windows HOSTS file can be used to redirect a domain name to a different IP address. This technique is often used by malware programs to redirect users of infected computers to phishing websites or to infected websites. You can always reset the HOSTS file back to the default – restoring its contents to the same state as they were when you installed Windows.

Read more