Skip to main content

Posts

Showing posts from January, 2012

About Author

My photo
Alex George
Alex George has Engineering graduation in Computer Science and an MBA in Finance. He had been working as a senior Network Engineer for ten years. His specialization is in Cisco products. Traveling is one of his hobbies and visited various places as part of his onsite work. He visited different places as part of his onsite work like New York, Dubai, London, etc. Right now Alex is a director of one of the leading career development firms in India, which trains students for UPSC, SSC, and PSC examinations. He guides a lot of students to get selection for various prestigious institutions like CBI, Income Tax Department, etc. Alex George is a stock market investor and a very active intraday trader. Engineering Background: He has a B.Tech in Computer Science and Engineering and passed different network and security courses like CCNA, CCNP (Security), CEH, and various Microsoft certifications. Finance Background: Alex has an MBA in Finance. He is an active intraday trader and a Share Market Investor. Webmaster Skills: Alex is a blogger since 2004. He has a working knowledge of HTML, CSS, PHP, and JavaScrip.

Get Noticed When Istalled Applications Change Windows Settings

After purchasing my Windows 7 laptop, the first thing I got irritated was the sudden dim of the desktop while doing some works on it. The same effect can be seen while you are changing the major settings of an installed application and your PC will ask you to continue the operation. Once you click any of the buttons, your desktop will go back to normal. This effect is because of the default Operating System settings which dim the desktop while any programs installed attempting to make changes on the computer. It is one of the security measures from Microsoft to protect users from the undercover working of hidden applications or any malicious programs which make changes on the system without the knowledge of the user.


Noticing the Actions of Hidden Applications
Though this function irritates us sometimes, it has certain benefits. Let us consider a scenario where one malicious application somehow got installed on a computer and tries to perform certain actions without the permission fro…