Support Alert
                       Supporters' Edition

                 "Gizmo's top picks of the best
                  Tech resources and utilities"

                 Issue 117 - 20th January, 2005

    Support Alert is a registered online serial publication
                         ISSN 1448-7020.


0.   EDITORIAL: Intrusion Detection Software Explained

1.1  How to Speed Up FireFox
1.2  Free Book Explains Knoppix to Windows Users
1.3  BitTorrent Sites Master List
1.4  Windows XP Resources
1.5  Open Office with FireFox
1.6  Blended Phishing Difficult to Pick
1.7  How to Set Up a Virtual Machine on Your PC (SE Edition)
1.9  FireFox Tips and Tricks (SE Edition)
1.10 Cleaning Master Boot Record Viruses (SE Edition)
1.11 Spyware Exploits: How They Work
2.1  Time to Replace Outlook Express
2.2  Find Out whatís Taking Up Your Disk Space
2.3  New Free Desktop Search is Best in Class
2.4  The Best Free Download Accelerator
2.5  New Version of CWShredder Now Removes HomeSearch
2.6  Access Outlook Data Without Booting (SE Edition)
2.7  Free Utility Tests Intrusion Prevention Systems (SE Edition)
2.8  Free Image Processing Program (SE Edition)
2.9  Free Email Program Ideal for Travelers (SE Edition)

3.1  Microsoft Security
3.2  Flaw in Java Affects Internet Explorer and FireFox
3.3  Flaw in Kerio Firewall
3.4  Spyware Takes New Twist
3.5  Top Intrusion Detection at a Modest Price

4.1  Tiny USB Wireless Adaptor
4.2  Free Online Malware Scan Worth Bookmarking
4.3  Control PC Access
4.4  Computer Help for Absolute Beginners
4.5  Integrating VoIP With Normal Phone Systems
4.6  50 Strategies for Making Yourself Work
4.7  Simple Way to Send Secure Email (SE Edition)
4.8  How to Test that Java is Working Correctly (SE Edition)
4.9  Free Web Development Resources (SE Edition)
4.10 Control Sound Volume with your Mouse Wheel (SE Edition)
4.11 How to Back Up Your DVD Movies Using Freeware Utilities (SE)
5.1  Installing Adobe Acrobat Reader V7

6.1  Microsoft's Free Spyware Scanner
6.2  700MB of Free Games


These days I strongly recommend that all serious internet users
have some form of intrusion detection software (IDS) on their

This is one of the reasons why last month I awarded the IDS
product Prevx, my annual "Freeware Product of the Year."

However judging from the email that I've been getting from
subscribers it seems folks are a little confused about how this
software fits in with their other security software such as
their anti-virus scanner, spyware scanner and firewall.

Let me clarify the situation:

IDS software is not intended to be a substitute for your other
security products.  It should be used in addition to those

Its purpose is to provide another layer of protection for your
computer. It's there to catch intruders that might have been
missed by your anti-virus scanner and other security products.

Yes, your anti-virus scanner can miss malware products. So can
your Spyware scanner. No security product is perfect. Most are
pretty good but perfect, no.

Defending your computer is very like defending a medieval
castle. Castles were defended by moats, drawbridges, fortified
walls, armed guards on patrol, fortified inner keeps and more.

Castles had layered defenses; they didn't rely on one form of
protection but used many. The same principle should be applied
to defending your computer.

ID software plays a similar role on your computer to armed
guards patrolling the castle walls.  Its role is to stop any bad
guys who may have breached your computer's primary defenses.

Can you imagine a castle surviving in the long run without
guards to man the walls? Ditto for your personal computer
without ID software.

Maintaining armed guards is not free. Nor is running ID
software. Even if, like Prevx, the software itself is free, it
will still cost you processing power to run the software and it
will cost again by inconveniencing you with false alarms.

And the cost is not trivial. Some ID software consumes so much
CPU power that it will really slow down all but the fastest PC's.

False alarms, too, are common. Just like the guards on your
castle walls shouting "The Visigoths are coming!" when it's
really the castle's daily beer delivery, so too will your IDS
regularly alarm you of an invader when in reality it's only some
harmless activity such as one of your software products checking
for an update.

IDS products vary widely in the amount of CPU power they consume
and their propensity to sound false alarm.  They also differ
greatly in the protection they provide.

Selecting the right product is not easy. It involves trading off
the degree of protection provided against the resources used.

To help you I've prepared a short guide to choosing the right
IDS software product for your PC. Several of the products listed
are freeware.

The guide is available right now for free from the Tech Support
Alert web site at http://www.techsupportalert.com/intrusion-detection.htm

Don't leave your castle walls undefended. If you are a serious
internet user and are comfortable installing security software I
suggest you check out the guide and seriously consider
installing an IDS product appropriate to your needs.

See you next month.



1.1 How to Speed Up FireFox
There's been a lot talk on the forums over the last few weeks
about different ways to speed up FireFox when using a broadband
connection. Some folks have reported spectacular improvements
while others, me included, have achieved more modest but still
useful gains. Most of these tweaks involve manually editing
networks settings. An easier and safer way to do this is to use
a free FireFox Extension called, oddly enough, "Tweak Network
Settings."  The extension comes with 2 high performance presets
which you can try, or you can play around with the individual
parameters yourself. More importantly, it allows you to reset
all values back to the defaults if the tweaking does not work
out. Dedicated tweakers may want to check out the last two links
below which address the subject in depth. Tip: check out whether
Flash is working before you decide to permanently adopt a
particular set of network parameters.

1.2 Free Book Explains Knoppix to Windows Users
The easiest way to play with Linux without messing up your
Windows installation is to use the free CD-based Knoppix distro
(distro?). All you need do is boot from the CD and within a
minute or so you'll have a full working version of Linux. Pull
out the CD and you can boot into your normal Windows system.
Discover more from the free downloadable 134-page book, "Knowing
Knoppix.  It includes a very useful section on how to use
Knoppix for Windows disaster recovery.

1.3 BitTorrent Sites Master List
One of the best ways to download large files like Knoppix is
through BitTorrent. Unfortunately, several of the best
BitTorrent index sites including suprnova.org have been shutdown
recently by the dudes from the MPA. I have no problem with
copyright holders protecting their assets but when my access to
legal files is affected I feel distinctly peeved. Luckily there
are many alternative sites. You'll find a good list here:

1.4 Windows XP Resources
Thanks to subscriber Hans-Peter Dollhopf for letting me know
about the Windows XP A to Z site that offers a comprehensive set
of XP tips, tricks and resources.  It's not the largest site
I've seen but still well worth visiting.  Make sure you check
out the "Performance" section.

1.5 Open Office With FireFox
Thinking of dropping Microsoft Office? Then check out this CD
that combines the latest version of OpenOffice with the latest
version of FireFox. There are full implementations for Windows,
Linux and Mac. That's a lot of great software for $29.95.

1.6 Blended Phishing Difficult to Pick
Here's the scam. You get an email from your bank telling you
about a new feature or offer. You click a link and go to the
bank site, whose authenticity you naturally check.  It looks
fine. Indeed you ARE at the real site.  Now the scam begins: a
popup window appears saying to sign-in to see details of the
banks new feature or offer. Innocently you type in your password
and another popup window appears with details of the offer. At
the bottom of the window it suggests to log out for your
security, which you naturally do.  It all looks very normal but
by now your password is on a hacker's PC in North Korea or
wherever. Nasty eh?  These phishing things are getting too
sophisticated to easily pick. I think users should start
treating all email from financial institutions as fakes unless
you verify otherwise by phone. Think you can't be fooled? Try
picking these:

** Additional Items in the SE Edition **

1.7 How to Set Up a Virtual Machine on Your PC
I've spoken with enthusiasm about using VMWare WorkStation and
similar products to create a secure sandbox test PC or simply to
run multiple operating systems on one PC. The system is ideal
for evaluating programs and patches or for testing products
across multiple operating systems in a secure and controlled
environment. If you need more assurance, check out the first
link below which is a review of VMWare WorkStation from the
folks at Extreme Tech. If the review fires your enthusiasm, use
the second link to get a 30-day trial from VMWare.
Alternatively, use the third link to download a 45-day trial
version of Microsoft's virtual machine product called VPC.
Cheapskate techies may want to use the last link which takes you
to a free, open source CPU emulator that can be used for VM
application. It works but it runs rather slowly and is a lot
more hassle than the slick commercial offerings.

1.9 FireFox Tips and Tricks
The Mozilla site has a whole section dedicated to FireFox
tweaks. Itís not suited to raw beginners but all others will
find much of interest.

1.10 Cleaning Master Boot Record Viruses
A number of malware products evade detection by taking over the
MBR on your hard drive. Cleaning them out is not all that
difficult - just follow the instructions outlined here:

1.11 Spyware Exploits: How They Work
This multi-part report from a SANS security worker illustrates
with a specific example exactly what can take place when a PC
gets infected with spyware. In this instance, a single visit on
an unpatched PC to a malevolent web site resulted in 15
executable files downloaded giving the attacker complete control
of the infected PC. The owner of the PC would have been totally
unaware of what had happened.  If you have a technical interest
in PCs, I strongly suggest you read this article. It will give
you a realistic appreciation of the complexity and
sophistication of the current crop of exploits.

Got some top sites to suggest? Send them to


2.1 Time to Replace Outlook Express
Thunderbird, the free open source POP and IMAP email client, has
been finally released after a long period of gestation.  It was
developed by Mozilla.org, the same folks who brought you
FireFox. Iíve been using it for one of my email accounts for
about a month now and I can say that it is stable, fast and easy
to use.  Feature-wise it sits somewhere between Outlook Express
and Outlook which means that it offers an upgrade to Express
users and a downgrade to those who use the more advanced PIM
features of Outlook. Iíve seen enough for me to say that all
Outlook Express users should seriously consider switching.
Youíll be rewarded with a more advanced product including built-
in spam filtering, built-in RSS reader, better security, Hotmail
access, message color coding, fast email search and the ability
to view your mail in conversational threads. On top of that, the
product is more secure than OE and, unlike the latter, is still
being actively developed. The transition is made easier by the
fact that Thunderbird looks and works similar to OE.  Tools
within Thunderbird also allow you to easily import OE account
settings and stored email.  Outlook users who donít use
calendaring, Microsoft Exchange or arenít reliant on Outlook
plug-ins could also consider switching.  Freeware, 5.8MB.

2.2 Find Out What's Taking Up Your Disk Space
Spacemonger is a free utility that displays the amount of space
taken up by all the different folders and files in your system.
It does this via a graphic display where the screen size of each
folder is proportional to the space it takes on disk. At first
look it seems rather ungainly, but it is actually extremely
effective.  Better still, the program does not need to be
installed; all you have to do is run the executable file. This
suits me fine as I only occasionally have need for this kind of
utility - so why have it cluttering your Registry when you don't
need it?  Freeware, all Windows versions, 103KB.

2.3 New Free Desktop Search is Best in Class
Yahoo has released a public beta of their new free desktop
search utility. It's powered by the well established X1 local
search engine and can index 200 different file types including
Word, Excel, PowerPoint, PDF, Outlook, Outlook Express, HTML,
text, ZIP and Adobe PhotoShop. At the moment it will only handle
email files from Outlook and Outlook Express and, although it
will index html files, it can't index your web browsing
history.  First impressions were highly favorable. The search is
very similar to X1 which is good news. The X1 display format for
search results allows you to locate the information you want
really quickly. It's not the prettiest display format but
definitely the most effective I've used. Nice, too, is the "find
as you type" feature, though admittedly this could be a pain on
a slow PC. The search functions can be accessed via a desktop
icon, through the system tray or through a toolbar within
Outlook.  Search time is virtually instantaneous, a huge
improvement on Windows cumbersome search or the normal email
search offered by Outlook. There are a few downsides. First,
real time indexing can slow your PC so I suggest you set it up
to index overnight or another time you are not using your PC.
Second, the program sends some information back to Yahoo so read
the licensing agreement carefully before installing. Third,
those who use Win9x/ME or Eudora and other non-Outlook email
clients are out of luck. Finally, you'll have to download the
product using Internet Explorer as the web install uses ActiveX.
All up though, it's still probably the best free desktop
indexing program yet. In effect, it offers most of the benefits
of the full $75 X1 Search product for zip.

2.4 The Best Free Download Accelerator
For some time I've been recommending Star Downloader but the
freeware version has been effectively frozen at version 1.44
with future with enhancements restricted to the shareware
version. After trying half a dozen other products, I've settled
on "Free Downloader" as my new selection. It's fast, stable and
integrates well into both Internet Explorer and FireFox.
Furthermore, there is no embedded adware or nag screen. After
using it for a couple of weeks, I've decided that it's actually
better than Star Downloader. Freeware, 1.31MB.

2.5 New Version of CWShredder Now Removes HomeSearch
The free cleaning utility CWShredder has acquired a substantial
reputation for its ability to remove the multiple variants of
CoolWWWSearch, a widely distributed and notoriously difficult to
remove spyware product. The latest version of CWShredder now
also removes HomeSearch, a recent variant that has driven tech
support staff to distraction by its propensity to return even
after multiple cycles of removal. Freeware, 454KB.

** Additional Items in the SE Edition **

2.6 Access Outlook Data Without Booting
How many times have you quickly wanted a phone number from
Outlook but squirmed when you realized your laptop was turned
off? FirstWare assistant from the BIOS maker Phoenix solves the
problem by allowing you to access all your Outlook data
immediately without booting simply by holding down the keyboard
'F' key.  The program works by monitoring the key even when the
PC is turned off. When pressed, it accesses a copy of your
Outlook data made when your PC was last booted. There is tiny
battery drain penalty as well as extra disk space taken to store
a duplicate copy of your data.  That's a small price to pay to
convert your laptop into a PDA. Shareware, Win2K/XP, Outlook 2K
or later, $29.95,

2.7 Free Utility Tests Intrusion Prevention Systems
OK, so your company has just put in a lot of time and money into
a new IPS. Wouldn't it be nice to find out if it actually works?
Test it out in full using this free open source utility from IPS
vendor TippingPoint. Somehow I get the feeling that
TippingPoint's own products arenít going to score very well. Tut-
tut Gizmo, such cynicism.

2.8 Free Image Processing Program
My long time free recommendation of OíBrienís Enhancer is now
shareware. Thanks to Claro Quesi for letting me know about
Paint, a free program out of Washington State University that
looks to be an excellent replacement. It's got a lot of useful
features including the ability to handle layers and is quite
easy to use. Although the current version is not quite as
powerful as the open source program "The Gimp", the upcoming
V2.2 release looks like it will close the gap.  If The Gimp just
doesn't do it for you then do yourself a favor and check out
Paint. It really is a nice piece of work. You'll need the .NET
framework installed, though.  Freeware, Win2K or later, 7.7MB

2.9 Free Email Program Ideal for Travelers
Pimmy is a small but feature rich email program that fits on a
single floppy disk. It doesn't need to be installed so it can be
run directly from compact disk or any removable media. Once
you've saved your account settings, you can easily access your
POP mail from any PC that will accept removable media. These
features have combined to make Pimmy the email client of choice
for travelers and other public internet terminal users. Note
that, although Pimmy offers a bit more security than using the
software provided on a public terminal, it won't save you from a
keylogger that may be installed. As ever, show appropriate
prudence when using a public system. Freeware, all Windows
versions, 612KB.

Got some favorite utilities to suggest? Send them to


NOTE: From this issue onwards I won't be listing item-by-item
details of individual Microsoft patches released via the
Microsoft Windows Update service. Rather, I'll discuss the
important patches and give links to the Microsoft Security
Bulletins covering the patches. I'm doing this as I see no point
in duplicating information that is readily available.

3.1 Microsoft Security
When Windows XP SP2 was released last year, there was an
expectation that the number of Windows Security flaws would
decrease. This not happened; indeed, in the last month we have
seen a spate of new post-SP2 flaws, some of which appear to be
exceptionally serious.

To Microsoft's credit, they have reacted more quickly than
normal to some of these exploits. A number, however, remain
unpatched and remain a source of concern. Secunia currently
lists 19 unpatched flaws for Windows Explorer including some
flaws rated "Highly Critical." http://secunia.com/product/11/.
Also available at the site are some tests that allow you to
check the vulnerability of your version of Internet Explorer.

One of the flaws that has been patched involves an ActiveX flaw
in the Windows Help system.  Several malware products exploiting
this flaw in Internet Explorer were already circulating on the
Web when Microsoft released a fix via the Windows Update site.

Two other "Critical" rated patches were released at the same
time, full details of which can be found in the January Bulletin
at: http://www.microsoft.com/technet/security/current.aspx.

If you haven't updated your PC with these patches please do so
now by visiting the Windows Update site at

3.2 Flaw in Java Affects Internet Explorer and FireFox
A defect in Sun's widely used Java Runtime Environment could
allow an attacker to take control of a user's computer. Java is
used for many applications including web site applets that run
within most popular browsers.  Java has to date been singularly
free of security problems, but the recently discovered flaw has
been deemed "critical." Sun has acknowledged the problem and
advises all users to download the latest version of Java Runtime
Environment, V1.4.2_06, which fixes the problem.
http://jouko.iki.fi/adv/javaplugin.html <= advisory
http://java.sun.com/j2se/1.4.2/download.html <= 14.9MB download

3.3 Flaw in Kerio Firewall
Secunia has issued an advisory about vulnerability in Kerio
Personal Firewall that, if exploited, could cause the system to
stop responding. "The vulnerability is caused due to an error in
ďFWDRV.SYSĒ when performing low-level processing of TCP, UDP,
and ICMP packets. This can be exploited to consume all available
CPU resources by sending a specially-crafted packet containing
an IP option followed by a length field with the value of
ď0x00.Ē Successful exploitation causes the system to stop
responding and requires the system to be restarted. The
vulnerability affects versions 4.0.0 through 4.1.1." A patch is
available from Kerio.

3.4 Spyware Takes New Twist
It looks like a new, subtler form of spyware is emerging in the
form of apparently legitimate applications which have the
spyware function deeply embedded within the program. Such
products have always existed but usually as "enhanced" real
products such as KaZaa, rather than as custom built applications
designed specifically to be used as spyware. This concern was
generated when it was discovered that a popular free internet
accelerator called Marketscore appeared to have the capacity to
intercept and crack secure SSL traffic channeled through its
servers.  Indeed, Marketscore works like legitimate commercial
accelerator services such as Propel by channeling traffic
through an intermediate proxy server operated by the company.
The problem is that it uses its own trusted certificate to
intercept and decrypt SSL traffic before re-encrypting it and
passing it through to the destination server. In the process,
all sensitive user information is accessible to Marketscore and
the user would be totally unaware of the exposure. Caveat

3.5 Top Intrusion Detection at a Modest Price
PC Magazine is carrying a rave review of Astaro, a software
based IDS for small to medium size organizations. This is a
Linux based system which will run on modestly configured
hardware and provides Kaspersky antivirus, antispam protection,
content filtering, firewall and intrusion protection, as well as
a VPN gateway. With a price of $1495 for a ten user system it
looks to be a cost-effective solution for many organizations.


4.1 Tiny USB Wireless Adaptor
The AirStation USB Keychain Adapter is a tiny 802.11g flash
drive size device that can wirelessly enable any PC or notebook
with a spare USB slot. The setup and divers are all on the
adaptor so no installation CD is needed. With a street price of
just over $50, it's an attractive way to upgrade older machines
to the latest wireless standard.

4.2 Free Online Malware Scan Worth Bookmarking
Subscriber Stan Latta from IBM has made some great suggestions
in recent months. Here's another: "Hi Gizmo, I happened upon
this excellent site. Using its services I was finally able to
remove a particularly persistent worm."  Nice find, Stan. This
site is less well known than some of the other online scan
services but I agree with you: it's among the best. However,
you'll need Internet Explorer 4 or above as the scan utilizes

4.3 Control PC Access
ControlKey is a small USB device that you can plug into a spare
USB slot on a PC to prevent or control access to the PC itself
or just the internet. Primarily intended for parents who want to
control their children's access to web sites, chat rooms and
instant messaging applications, it is equally useful to anyone
who wants to secure access to their PCs or laptops. The street
price is around $45.

4.4 Computer Help for Absolute Beginners
I recently received an email that read, "helpmeeee w/download n
all of every thing i know nothing!thankyou  from,prissy crissy"
(Sic). Well, it's easy to ignore such pleas for help because you
don't even know where to start. But I feel sorry for such folks
Ė heck, we were all beginners once. So I did some research and
was able redirect crissy to these sites designed for true
absolute beginners. Good to bookmark for the next time one of
your relatives calls. If you know any similar sites, write in
and I'll pass the information on.

4.5 Integrating VoIP With Normal Phone Systems
Subscriber Jack Decker writes, "Gizmo, I don't know if you are
aware of this page already, but for those who are taking the
plunge into VoIP, this is a great page that tells how to hook up
your existing phone wiring to your VoIP adapter. Your readers
may also be interested in the second link which shows how to
distribute VoIP throughout a home."  Nice find Jack, thanks for
writing in.

4.6 50 Strategies for Making Yourself Work
Although pitched to writers, this practical and at times funny
guide contains inspiration for all.

** Bonus Items for Supporters **

4.7 Simple Way to Send Secure Email
Subscriber Jennifer White recently asked me if I knew a simple
way of sending secure email to her clients, most of whom had
only basic computer skills. I offered a number of suggestions
but Jenny decided that ZixMail was the right choice for her
consultancy business. ZixMail is a subscription email service
that allows users to send secure mail to any email address
without the recipient having to install special software.
ZizMail costs $50 per year. A free trial is available.

4.8 How to Test that Java is Working Correctly
Here's a useful page to bookmark. It identifies whether Java is
working correctly from your browser and also identifies the Java
vendor, version and build.

4.9 Free Web Development Resources
This site offers an excellent collection of tools for the Web
developer, including an impressive set of free JavaScipts.

4.10 Control Sound Volume with your Mouse Wheel
This is such a simple and logical idea it's amazing no-one has
thought of it before. This free utility turns your mouse scroll
bar into a volume control. All you do is hold down the Alt key
while scrolling. Freeware, 73KB

4.11 How to Back Up Your DVD Movies Using Freeware Utilities
As the web site says, "This tutorial will show you how to backup
any DVD using nothing but fully functional free software and
achieve the same results as using commercial software. You will
be able to backup the entire DVD or just the main movie only. It
will show you how to burn to a single DVD or a dual-layer DVD,
assuming you have a DVD burner and media capable of using the
dual-layer method"



5.1 Installing Adobe Acrobat Reader V7

A few issues back, I gave you a few tips on how to reduce the
load time for Acrobat Reader. The good news is that the latest
version V7 loads dramatically faster - so much faster that it's
hard to believe it's the same product. I strongly recommend all
V6 users upgrade at first chance.

However, installing V7 has a few tricks involved:

- Go to http://www.adobe.com/products/acrobat/readstep1.html and
enter your operating system and internet connection speed.

- You should now be taken to page 2. If you are using the
default options, you'll end up with a massive 26.8MB download
which includes the full, bloated version of the reader, the
Yahoo search toolbar and Adobe Photoshop Album. Presuming you
don't want all this stuff, uncheck the first three boxes.  The
download will now have reduced to 12.6 MB.  I suggest you check
the "Do not use the Adobe Download Manager" box as well. It just
adds an unnecessary step to the download process.

- Once you've installed the Reader, you'll find that Adobe has
inserted a small banner ad in the top right hand side of the
toolbar.  You can zap the ad by starting the Reader (Start/All
Programs/Adobe Reader), then going to Edit/Preferences/Startup
and deselecting the item "Show messages and automatically

- You'll also find that the Reader application is loaded
automatically when Windows starts. This makes your PC slower to
boot and it's quite unnecessary as the Reader will load when
needed. To stop it from loading, use a startup manager or go to
Start/All Programs/Startup and delete "Adobe Reader Speed

I've noticed a couple of forum threads where some FireFox users
have reported a Java plug-in problem after installing Adobe
Reader V7 that prevents them from being able to run FireFox. I
haven't had this problem but if you do there's a simple fix. Go
to c:\program files\java and change the Java folder name.  After
rebooting, FireFox should start.  Go to a site that uses Java
like http://www.upshot.com/login/javatest/logo/javavmtest.html
and install the Java plug-in when prompted. You can then delete
the Java folder you renamed.


6.1 Microsoft's Free Spyware Scanner
Most readers will be aware that in December 2004 Microsoft
bought the company that makes the Giant Antispyware scanner.  It
was a good choice. Their product, though little known, was one
of the best on the market. In my experience, it offered just
about the highest level of spyware detection of any single
product I've tested and additionally had outstanding active
protection against new infection. I know because Iíd been using
the Giant product for two months and was about to write a rave
review when Microsoft announced the surprise acquisition.  To
its credit, Microsoft has acted quickly and re-released the
Giant product under its own moniker in the form of a free beta.
As far as I can see, itís pretty much the same product so I can
give it the highest possible recommendation. Some downsides: the
active protection will eat up a few percent of your CPU
resources, itís a bit prone to false positives, the beta expires
in July and itís for Win2K and later only. That said, I was more
than happy to pay $29.95 for the Giant product so you should be
delighted to get essentially the same product for free.
However, like all security products, its detection is not
perfect so don't throw away SpyBot or Ad-aware just yet. Tip:
the active protection is better than that in SpyBot S&D so you
might as well disable that feature in SpyBot and save a few CPU
cycles. (6.4MB)
** Bonus Freebie for Supporters **

6.2 700MB of Free Games
If you enjoy games you really should grab this. The University
of Kaiserlautern is offering a full Knoppix distribution with
700MB of free games complete with ATI, NVIDIA and Intel Extreme
support. No need to install Linux, just boot from the CD using
your normal Windows system. The games include Castle-Combat,
Globulation 2, Hatman, Kobodeluxe, Miniracer, Pingus, Rafkill,
Boson, Bsdgames, Crimson Fields, Dosbox (Emulator), Empire,
Konquest, Mangoquest, Pysol, Tuxcart, Zsnes (Emulator), Ace-of-
penguin, Battle for Wesnoth, Bzflag, Bzflag-Server, Clanbomber,
Crossfire, Enigma, Foobillard, Freeciv, Freeciv-server, Freesci,
Gltron, Gnuchess, Jump'n'Bump, Ksokoban, Lbreakout2, Lgeneral,
Miniracer, Nethack, Netpanzer, Neverball, Tuxracer, Xgalaga,
XMame, XMess, Xpilot and more.

Got some top sites and services to suggest? Send them in to


You'll find all back issues, a downloadable archive of every
issue ever published, plus a growing list of resources
exclusively available to Supporters.

The area is protected.  Use the security information sent to you
when you first subscribed or in subsequent update messages.


If you no longer wish to receive this newsletter, send me an
email at supporters@techsupportalert.com. Remember to state the
email address at which you are currently subscribed.

To change your delivery email address, go the Supporters' area
of the website. There you can manage your subscription on-

Receiving duplicate issues?  If you are receiving an unwanted
copy of the standard edition of this newsletter, you can cancel
that subscription by going to
http://www.webelists.com/cgi/lyris.pl?enter=support.alert. Enter
your email address. No password is needed. You can then cancel
your free subscription.

Thanks to subscriber A. Belile for proofreading this issue.

You can contact this newsletter by snail mail at:
Support Alert
PO Box 243
Comstock Park, MI  49321-0243

Content of this newsletter is (c) Copyright
TechSupportAlert.com, 2005

See you next issue.