Undelete (from Diskeeper) can recover files and data

I’ve been trying some products from Diskeeper Corporation. If you delete files that are needed later…or, if someone else does…Undelete could be a savior.
Undelete uses “InvisiTasking”. It runs in the background, and does not degrade the performance of a computer.
It includes Emergency Undelete, which can recover files that were deleted before Undelete was installed…if they have not been overwritten. Emergency Undelete can also be run from a CD, and USB drive.
Search Disk
You can search by file name, extension, location, locate deleted files by the date they were created or deleted, and track the owner or users who deleted the file.
Version Recovery
Undelete allows instant recovery of older (“saved over”) versions of Microsoft Word, Excel and PowerPoint files. Version Recovery is integrated with Windows Explorer: just right-click on a file to recover earlier versions. Undelete will present all of the versions that are available, and allow you to open files to preview them (before you try to recover them).
SecureDelete erases files using a methodology developed for the National Security Agency and the Department of Defense. The Wipe Free Space feature overwrites free space so files can never be recovered, and there is an option to do so automatically.
Undelete replaces the Windows recycle bin with a Recovery Bin™. The Recovery Bin intercepts all deleted files, no matter how they were deleted. It has a Windows Explorer-like interface so you can navigate to files, right-click on them, and select Recover. The size of the Recovery Bin can be automatically adjusted: depending on the settings, it will purge files the Recovery Bin when it fills up on a First-In First-Out basis. If the size of a drive or volume becomes critically low, Undelete can reduce the Recovery Bin size. If more space is available, Undelete can expand the Recovery Bin to protect more files.
=============================
Undelete 2009 Home Edition works with 32-bit verisons of Windows 2000, XP, and Vista only…it is not compatible with Windows Vista Business and Enterprise. NTFS and 16/32-bit FAT file systems can be accessed, but the 12-bit FAT file system is not supported. Primary partitions, extended partitions, logical drives, volume sets, mirror sets, RAID arrays, removable disks, and memory cards can be used with Undelete.
===============================
Undelete Professional Edition is recommeneded for computers that are used for business, where data is stored locally and on network file servers. Administrators that are using an edition of Undelete Server can connect to computers that are running Undelete Professional Edition 2009 to access the Recovery Bins, and remotely browse and recover deleted files on those clients.
In addition to features noted in the home version, Undelete 2009 Professional Edition maintains Windows NTFS security so users can only access files for which they have permission.
Undelete 2009 Professional Edition works with 32-bit and 64-bit versions of Windows 2000, XP, Vista, and Server 2003 and 2008.

free video converter until November 30th

TechtalkRadio has been informed that, until November 30, Fast Video Converter PRO is free!
“Fast Video Converter PRO is an all-in-one video converter for converting videos of all popular formats like AVI, ASF, AVC, DIVX, FLV, H264, MP4, MOV, MPEG1/2, OGG, RM, RMVB, VOB, WMV, XVID, 3GP, 3G2, etc., and creating fascinating photos from video files. It is able to facilitate getting the specific video format watched on TV, played on portable media players, loaded to mobile phones, or put on websites.
“Fast Video Converter PRO has a very friendly interface with simple operation…Advanced users have the option of tweaking video and audio settings, like bit rate and resolution…”
Key Features:
* Converts Videos between all Popular Video Formats
* Has the Fastest Speed to Convert Video
* Supports Batch Conversion
* Extracts Audio From Video
You can use it on up to five personal computers with one free license. Fast Video Converter PRO works on Windows 7/ Vista/ XP/ 2000 (32bit or 64bit).

Beatles Limited Edition Stereo USB

Apple Corps Ltd. and EMI Music will release only 30,000 Beatles Stereo USB apples on December 7 (December 8 in North America).
The apple-shaped USB drive is loaded with the re-mastered audio for The Beatles’ 14 stereo titles, as well as all of the re-mastered CDs’ visual elements, including 13 mini-documentary films about the studio albums, replicated original UK album art, rare photos and expanded liner notes.
A specially designed Flash interface has been installed, and the 16GB USB’s audio contents will be provided in FLAC 44.1 Khz 24 bit and MP3 320 Kbps formats, fully compatible with PC and Mac.
You can pre-order your copy in the official Beatles store

HACKING EXPOSED: Network Security Secrets & Solutions

HACKING EXPOSED: Network Security Secrets & Solutions, 6th Edition” is 720 pages, and over two pounds, full of information. And I found, as stated in the forward: “…Its goal is education…”

It is full of all kinds of knowledge.
Table of contents
Part I: Casing the Establishment
Chapter 1. Footprinting
Chapter 2. Scanning
Chapter 3. Enumeration
Part II: System Hacking
Chapter 4. Hacking Windows
Chapter 5. Hacking Unix
Part III: Infrastructure Hacking
Chapter 6. Remote Connectivity and VoIP Hacking
Chapter 7. Network Devices
Chapter 8. Wireless Hacking
Chapter 9. Hacking Hardware
Part IV: Application and Data Hacking
Chapter 10. Hacking Code
Chapter 11. Web Hacking
Chapter 12. Hacking the Internet User
Part V: Appendixes
Appendix A. Ports
Appendix B. Top 14 Security Vulnerabilities
Appendix C. Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks

Some of the new material includes:
the “Hacking Hardware” chapter (about physical locks, access cards, RFID, laptop security, USB, U3, Bluetooth, firmware, hard drives)…
Windows hacks (covering Terminal Services, Kerberos sniffing, man-in-the-middle attacks, Metasploit, device driver exploits, new password cracking tools)…
and UNIX hacks (such as THC Hydra, Solaris input validation attacks, dangling pointer attacks, DNS cache poisoning, UNIX Trojans, and kernel rootkits).
Some of the tactics and strategies that attackers use to gather information to prepare targets for attacks are noted, like: culling IP addresses, wardialing (it can still be effective), and spoofing e-mail messages (pretending to be support and administrative personnel).
To defend against attacks, you must understand the enemy. Preparing against access is better than trying to make repairs after a system has been. (Once someone has been inside you don’t know what was left in the system, and where it was left at.) Instructions on how to perform network reconnaissance show how a network, and connected devices(firewalls/routers/etcetera), can be diagrammed. And there is a section regarding how to identify potential probing activities, and attacks.
This book can be used as a checklist of things that can sometimes be unintentionally available, but are: (web) cameras, and remote administration services…and the Microsoft Windows Remote Desktop Web Connection. Misconfigurations exist, and so do exploits that target them.
In Chapter 4, “Hacking Windows”, there’s a great reminder about proper password management. I’ve noticed that people seem to be better at it, but it’s good to review best practices.
In the book the authors point towards many other sources of information and reference. There are suggestions of other books to enlighten and educate about how some prepare to access a network. And other websites and software that will allow you to test the openess of a network (hardware and services) and website.
(After going through the book, I remembered how there are instances where administrators and content managers are given more consideration than support and security managers and personnel…until there’s a problem.)
If you are responsible in any way for a network or website, get this book. If there is anyone that works for you that is responsible for a network or website, get this book for their library!
The website of the book is http://www.hackingexposed.com

book about witty Twitter posts


I received “Twitter Wit: Brilliance in 140 Characters or Less” from the publisher, HarperCollins. It’s “edited” by Nick Douglas and contains posts from Twitter.

Some of those posts are from celebrities: Ashton Kutcher, Jimmy Fallon, Stephen Colbert, Neil Gaiman, Margaret Cho, Stephen Fry, Rainn Wilson, Penn Jillette, Diablo Cody, Michael Ian Black, Paula Poundstone, Eugene Mirman, Russell Brand, Aziz Ansari, Lisa Lampanelli, John Hodgman, Sarah Silverman, Susan Orlean, and more. (To my surprise, I didn’t notice any from Shaquille O’Neal…)

The first “tweet” in the book got it off to a good start for me: “What’s the deal with deaf people? Like, HELLO?” (Get it? As in, “Hello…and now we begin the book”?…) After that, I thumbed through it to see if any other posts might jump-out at me. What I found is that I would rather not reveal any more quotes, because I think the book is best experienced through your own browsing.

I intend to keep it accessible and available for those times when I’m trying to kill time. It’s available in paperback. And, as an e-book (Sony, Kindle, eReader, and PDF formats). I suggest you put it in your purse, backpack, or portfolio for when you want (or need) to have something to do. The greatest thing about the book is that you can start reading it, and stop without feeling that you invested effort to either action.

Douglas (http://twitter.com/nick, http://toomuchnick.com) should be working on a follow-up. With more pages.

I wish I had thought of doing this book…(heel of palm to forehead)