Facebook Virus Removal (Remove : Koob Face Worm)

Remove Latest Facebook Virus : Koob Face Worm




Alright, so I know Facebook is huge now. If anyone here on Sodahead uses it, it looks like there’s some video viruses going around. One is of an Obama sex tape type video and the other one is an optical illusion video (This one is always popping up on my news feed). So if one of your “friends” sends it to you, don’t click on it!

New Facebook Viruses Can now Use your Account to Mass Private

message your friends to click on a link saying “WTF: This AMERICAN guy should be STONED to DEATH for doing this to his GIRLFRIEND: bit.ly/*****” or something like this “Hey, check out this girl, lol, she must be out of her mind for making that video!: bit.ly/hw****” Once You even Accidentally Click on the Provided Link, Infection on your computer will arise, your Documents will be HACKED, your Files Lost, and you will no longer have Privacy on your computer.

Also look out for Wall post on Facebook such as this :

Avert_Blog_Koobface_1-12-3-08Some even got a youtube like screen that has a caption of “obama sex tape scandal” and when you click the link it requires you to install something to access the video, and once link was clicked, Virus Attacks! and will take total CONTROL over your computer.




Save time by creating an Excel workbook workspace

If you’re like most of us, you probably work with the same few workbooks every day. You might work with them as a group or separately, but you open these files, individually, most every day and that’s inefficient.

You can save a bit of time by saving the files you use every day as a group as follows:

  1. Open all the workbooks you want to save as a group.
  2. Click the View tab.
  3. Click Save Workspace in the Window group.
  4. Enter a name for the group, and click Save.

To open the group (all the workbooks in the group), open the group as you would any other file.

Your workbooks are still separate files. You can open and close them individually, as you normally would. However, Excel also saves a reference to the workbooks as a group now, using the xlw extension. It’s a simple way to reduce a few keystrokes every day.

SkyDrive gets an update: better sharing, file management

A new post on the Inside Windows Live blog today brings us news of some new features for SkyDrive, including file upload and file management changes, expanded “right-click” functionality, HTML5 support for file uploads (meaning drag and drop file uploading for Firefox and Chrome), and support for viewing PDF and RAW files from within SkyDrive.

If you were expecting a full checklist of new features as outlined in last week’s SkyDrive post (and our own analysis of what that post means for the future of SkyDrive), it’s hard not to be at least a little disappointed.  No improvements, or even any mention, of Windows Live Mesh / SkyDrive syncing, no news on expanded free or even paid storage, and no ability to upload by folder (although file upload and file sharing has been enhanced).  Hopefully these will be coming soon, and SkyDrive, like Hotmail, appears to be shipping updates every 2 months or so.

But there are some improvements to get excited about.  The file sharing updates now allow you to set sharing on a per-file basis, allow or disallow file editing by the sharing recipient, and/or require a log-in to view the file.  SkyDrive now allows easy file sharing to Facebook, MySpace, and LinkedIn, too:

skydrive facebook share

However there doesn’t seem to be any kind of sharing management capabilities, so if you want to disable sharing for one person across all your files, you’re going to have to do it file by file, if you can even find all the files you previously shared.

Don’t get us wrong, these new features are great, and will make sharing single files not only possible but easy, provide easy file upload for browsers other than IE, and open up SkyDrive through new APIs for some hopefully interesting 3rd party scenarios.  Will it be enough to get more than 10% of college students using cloud storage to consider SkyDrive?  Somehow, we don’t thing Dropbox is shaking in their boots quite yet, but what do you think?

Next Generation Firewalls: It’s all about tuples

By Michael Kassner
November 28, 2011, 11:23 AM PST

Takeaway: Next-generation firewalls have been around for several years, but garnered little interest. That’s changing as first-generation firewalls aren’t keeping up.

IT professionals responsible for perimeter defenses are frustrated.

Case in point: Internet traffic of all shapes and sizes traverses port 80. Meaning, port 80 must remain open. Bad guys know this. So port 80 becomes their private malware highway. And trucks, full of malcode, drive right past the check point.

There is hope

I’d like to introduce Next Generation FireWalls (NGFW). Firewalls designed to filter packets based on applications. To continue my analogy, the trucks loaded with malcode can’t drive right past the check point, any more.

Other features incorporated in NGFWs:

  • Enforce company regulations: NGFWs are able to control user access to websites and online applications as required.
  • SSL Proxy: NGFWs are able to decrypt, inspect, and re-establish the encrypted SSL connection. This eliminates encryption as a method of hiding malware.
  • IDS/IPS: NGFWs have incorporated deep packet inspection-to the point where stand alone IDS/IPS devices are not required.
  • Active-Directory friendly: Many NGFWs are able to authorize application usage based upon individual user profiles or groups.
  • Malware filtering: NGFWs provide signature and reputation-based filtering to block malicious applications that have a bad reputation.

Click to enlarge


Palo Alto Networks was the first company to offer a NGFW. For information about NGFW requirements per Palo Alto Networks, please check out this white paper (above slide). Barracuda Networks, Juniper Networks, and WatchGuard also offer NGFW solutions.


Just about every blog post I’ve read about NGFWs mentioned tuples. I had no idea what they were. Hopefully, you do. If not, here’s what I found out.

N-tuple is a collection of attributes. And, in the case of firewalls, these attributes are used to define access requirements. N is a place holder representing the number of attributes in the list. For example, a 5-tuple “firewall allow rule” might include:

  • Source IP address
  • Source port (typically: any)
  • Destination IP address
  • Destination port (80 or 443)
  • Destination protocol (typically TCP)

So, if the packet being inspected has all of the correct attributes, the firewall will allow it to pass.

Widening the 5-tuple

I thought I was “good to go” after figuring out what a tuple was. Then I read something about “widening the 5-tuple”. Widen a tuple. Does that even make sense?

Let’s see if it does.

As mentioned earlier, a first-generation firewall rule employs a collection of 5 attributes or 5-tuple. That is sufficient to carry out stateful port and protocol inspection, Network Address Translation, and Virtual Private Network technology.

A 5-tuple rule set is not sufficient for NGFWs. Next Generation Firewalls need additional attributes such as application type and user identity in order to work as advertised. To understand why, consider the port 80 analogy, one last time.

If it’s discovered that the truck carrying malcode has an illegal license plate, the truck ain’t going anywhere. The same applies to malcode. If its license plate — “application type” attribute — is incorrect, the malcode is blocked from continuing on.

The additional attributes or tuples are “widening the 5-tuple”.

Confession time: I did not find a clear-cut explanation of how tuples relate to firewalls. But, article after article mentioned tuples. So, I jumped in. If my explanation is wrong, I hope firewall and database admins that better understand will bail me out.

Survey says

The Ponomen Institute just completed a survey of NGFWs for SourceFire, Inc. The infographic ( partially shown below) provides several interesting statistics, particularly what is driving interest in NGFWs and the percentage of respondents noticing performance degradation:

Final thoughts

The race toward sophistication between malware and antimalware continues. Stay tuned

Windows Live Service Status page gets an update, now tracking Live ID and Family Safety

As part of the latest SkyDrive update today, as we predicted earlier, the rest of Windows Live web services received an update too, up to Wave 5 M2 (version 16.2). As part of this update, Windows Live Service Status, the website that allow you to keep track of the current status of Windows Live services, received an updated too:

Windows Live Service Status

The update means that the service is now located at http://home.live.com/status, different from the previous status.live.com. Besides an URL change, the website itself also received some minor enhancements, now reporting real-time service status of Windows Live Family Safety and Windows Live ID as well. Given that Windows Live ID will become a core part of the upcoming Windows 8, it makes sense that this service needs to be monitored closely and provides the latest status info to its customers.

You can check out the new Windows Live Service Status website now at http://home.live.com/status.

NADRA Launches SMS Service for Pakistan Card Verification

NadraNational Database & Registration Authority (NADRA) has launched a mobile SMS service in collaboration with Pakistan Telecommunication Authority (PTA) and all operating telecom companies to determine a person’s existence in the beneficiary list for Pakistan Card project to facilitate the rain affected people in checking the status of their requests.

Deputy Chairman NADRA, Tariq Malik, stated this in a statement issued by NADRA.

He said out of 62 total 47 centers of National Database & Registration Authority (NADRA) are operational in six districts i.e. Badin, Tando Mohammad Khan, Shaheed Benazirabad Mirpurkhas, Tando Allahyar and Sanghar whereas other 15 centers on completing its task are now addressing the complaints from genuine beneficiaries, who were unable to get registration for Pakistan Cards.

He pointed out that throughout the process, NADRA ensured strong checks in the software so that only deserving families belonging to provincially notified calamity hit areas could obtain Pakistan Cards.

Tariq Malik informed that NADRA has so far issued 592,651 Pakistan Cards in totality to heads of the rain-affected families in Sindh. 105,455 Pakistan cards in Mirpurkhas, 240,227 in Badin, 79,946 in Tando Mohammad Khan and 156,324 in Shaheed Benazirabad (Nawabshah), 8011 in Tando Allahyar and 2684 in Sanghar have been issued to the heads of the families.

How to Verify Pakistan Card

Simply send CNIC number to 9777. In response, a text message will be sent from NADRA confirming CNIC existence in the beneficiary list.

NADRA, in addition to setting up centers, has also mobilized its mobile resources MRVs (Mobile Registration Vans) to process CNIC free of cost in all affected areas in coordination with the public representatives and district administrators, he added.

He said that NADRA has also issued 77,833 free of cost CNICs so far among the flood/ rain-hit victims.

Pakistan Blocks Thousands of Adult Websites

Pakistani internet service providers have started the process of blocking websites with adult and explicit content, told us multiple sources from the industry.

Earlier this month PTA, telecom regulatory authority of Pakistan, had decided to block the access of those websites in Pakistan that contain adult content.

As we reported earlier, PTA has plans of blocking 150,000 such websites in coming weeks, however, initial list of 1,000 websites has been sent out to all ISPs, mobile operators and international gateways to get them blocked.

ProPakistani has got the said list of 1,000 websites, which we aren’t publishing it here for obvious reasons. But we can tell you that they all are adult websites and few of them are ranked in top 100 Alexa list for Pakistani most visited websites. Local adult websites are also included.

ISPs are given 8-10 days to get the orders implemented. Most of the ISPs, including PTCL, have already blocked these websites, while others are making the necessary preparations for the blockade.

PTA is also planning to devise a way for general users to report adult websites to authority. After through review authority will keep adding such reported websites/URLs to the black list.

Internet Service Providers on other hands aren’t comfortable with the overheard involved in the blocking of websites. They say that blocking high number of websites may result into slow performance by routers and increased latency due to high number of filters over the network.

PTA decided to ban explicit websites after immense pressure from bloggers, hackers and activists. They, along with parents, are certainly rejoicing authority’s decision.

However there are users who are opposing the ban, few of them think that this way PTA will get the axe to cut any website under the cover of explicit material. But sources at head-office of PTA tell us that they will make this process of blocking websites very transparent and visible to everyone, so that no one fears the unlawful use of power.

Facebook Tracks You Even After You Log Out

Facebook has always topped the list of privacy invaders since it’s inception, however, a recent revelation has shocked security analysts and internet users alike.

According to information and proofs unveiled recently, Facebook cookies track you even after you logout, to make sure that they maintain a complete list of websites that you may visit even after logging out to build a comprehensive and sophisticated data about user behavior.

To experiment this yourself, create few fake Facebook accounts. After using them for some time, you will find that Facebook will suggest you your real account as a friend. This is a proof that Facebook knows that all accounts are coming from the same browser, even after you are logged out.

So apparently if you don’t want to be tracked then logging out of Facebook isn’t enough, you will need to clear all the browser cookies (relating to Facebook), or maintain a separate browser (other than your primary browser) to use Facebook, or don’t use Facebook at all.

Making it worse, it appears, Facebook isn’t bothered about this flaw. The guy who revealed the bug claims to have reported this to Facebook through their support and press emails, but of no avail. He says that the has all the emails that he has sent to Facebook over past one year regarding the said issue.

Just to mention, this user behavior or user tracking data is of extreme value for marketers and government agencies. They can pay anything for this data to be made available to them.

After going through the track record of Facebook, one might think that Onion’s this report of Facebook’s link with CIA was probably more than just a prank.

Free Windows utilities you should download right now

Everyone who works on a Windows computer has his or her favorite system utilities. But, there are a handful of must-have tools that no Windows user or IT support pro should be without. During this week’s episode of TR Dojo, I give you a list of free Windows utilities that you should download right now.

To keep things simple, I’ve divide the list into five separate categories. And while dozens of applications may fall into each category,

1. Cleaners: CCleaner

Five tips for using Ccleaner to degunk your system
How do I … remove unwanted files with Ccleaner in one click?
Product Spotlight: CCleaner

2. Uninstallers: Revo Uninstaller

Uninstall applications from Windows with Revo Uninstaller
How do I uninstall applications from Windows with Revo Uninstaller?

3. Defragmenters: (UltraDefrag, MyDefrag, Smart Defrag, and Defraggler)

Four free defragmentation tools for power users

4. Remote support tools: CrossLoop

Take control of any Windows PC on the Internet with CrossLoop
Quick and easy remote support with CrossLoop

5. Password recovery and reset utilities: Offline NT Password and Registry Editor

Reset Windows passwords with the Offline NT Password and Registry Editor
Reset lost Windows passwords with Offline Registry Editor

Free Hosting at Microsoft Office Web Host

Microsoft at Office Live offers free web hosting to small businesses that desire to have a website presence.

So Microsoft Office Live Small Business is for those who are looking to just host their domains which they have purchased for free server space.

For free hosting Microsoft offers up to 500 MB of free data storage and included in the pack are the following addons for free

* Free Web Design
* Free Domain Redirection
* Free Email Accounts
* Free Online Document Storage & Sharing
* Free Support
* Free Contact Manager
* Free Document Manager

Addioionally mroe than 500 MB you are charged with the following rates

* 1 GB $4.95 per month
* 2 GB $8.95 per month
* 5 GB $14.95 per month

Hosting Microsoft at Office Live doesn’t require knowledge of HTML and its easy to understand. So if you think that 500 MB is enough for your site then go with it.
Incoming search terms:

500 mb hosting form microsoft

Microsoft buys Skype for $8.5 billion; creates new business division

microsoft skype

The rumors were right. Microsoft announced on May 10 that it bought Skype, an Internet communications vendor, for $8.5 billion.

Instead of trying to mash Skype into an existing Microsoft business division, the company has decided to create a new, separate Skype business division, with Skype CEO Tony Bates as the newly minted President. Bates will report directly to Microsoft CEO Steve Ballmer.

In its press release announcing the deal, Microsoft played up the potential synergies between Skype and its own communications offerings, including its Lync VOIP platform, Outlook mail, Messenger instant-messaging, Hotmail Web mail and Xbox Live gaming service.

“Skype will support Microsoft devices like Xbox and Kinect, Windows Phone and a wide array of Windows devices, and Microsoft will connect Skype users with Lync, Outlook, Xbox Live and other communities. Microsoft will continue to invest in and support Skype clients on non-Microsoft platforms,”
said the release.

Microsoft offered no timetable or further details as to when and how it will make Skype available as part of any of its existing product offerings.

According to earlier reports, Microsoft was bidding against Google and Facebook for Skype. As my colleague Larry Dignan noted, the $8.5 billion Skype purchase price made for one expensive game of keepaway.

Today’s deal with Skype marks Microsoft’s largest acquisition (dollar-wise) in the history of the company. For the past couple of years, Microsoft execs seemingly had decided that Microsoft’s history of assimilating successfully its big acquisitions (aQuantive, Danger, AdECN, Bungie, etc.) was not so great, resulting in the company shying away from anything but relatively minor, targeted acquisitions

  • Xbox 360 Kinect + SkypeTV: There is already a video chat feature on the Kinect but a Skype-login and interface could encourage more people to make this a part of their Xbox experience. Skype is already on some televisions so integration with the Xbox seems to be a good fit.
  • Windows 7 OS + Nokia + Skype: This could be quite a powerful combination as more and more smartphones are equipped with front-facing cameras and make use of the 4G network, which means video calls will only become the norm on mobile devices. Plus, it gives the partners an edge against Apple’s proprietary Facetime application. Skype users are also able to send SMS messages from the Web to handsets so this could be a great bonus for future customers with Nokia phones running Windows 7.
  • MSN Messenger + Skype: Hopefully, Messenger will be replaced with Skype because IMing on Skype is a breeze but uninstalling Messenger from machines running Windows is a hassle. The combination of Messenger and Skype users will give G-Chat and Google Voice some competition (perhaps to finally roll out to more countries)
  • Outlook + Skype: By integrating your Skype contacts with your email address book to make voice and video calls, Microsoft is looking to the beefed up Outlook to better compete with Gmail/G-Chat/Google Voice.
    MS Lync, Xbox Live + Skype: These new groups will expand Skype’s user base, according to the press release.

Last night, AllThingsD reported that Microsoft dealmaker Charles Songhurst was key in helping Microsoft CEO Steve Ballmer broker the Skype deal. Interestingly, Songhurst also was credited with helping convince the Microsoft brass to call off the Yahoo acquisition.

Osama Bin Laden death may increase terror attacks (Fake Death, Fake Operation)

OsamaBinLadendeadOsama Bin Laden death may increase terror attacks
The recent death of Osama Bin Laden may be a psychological victory for America. However those in Al Queda and Hamas may use Osama’s death as a rallying cry against America, the west and Israel. Terror attacks could greatly increase in the coming days, weeks and months. With current Mideast instability in Iran, Iraq, Israel, Gaza and Libya the chances of extreme upheaval with renewed terror attacks directed at Israel and America Al Queda should be expected and prepared for



These are the real photos.
If you have not yet heard the president’s speech Osama Bin Laden was killed in a fire-fight. The M-16A2 bullet to the forehead is consistent with the damage of these bullets.
These bullets are designed to tumble and ricochet inside the body after penetration to cause more damage. All military personnel know this fact.

The photos above are an elaborate hoax. They were done by graphic professionals in 2006 during another hoax. My reason for posting them here is to highlight a serious hoax concerning Obama’s long form birth certificate just released a few days ago in April 2011. But before I give you the link to that post here lets talk about the Osama Bin Laden’s hoax death pictures. How do we know they are a hoax pictures?
First the obvious.
1.) Osama Bin Laden looks like he did nearly ten years ago except for the photo shop eye injuries. He has not aged.
2.) Death even on tanned skin begins to produce a non natural discoloration of the skin in just a few hours.
3.) The eye injury is consistent with a partial eye blow out from an M16-A2 bullet ricochet in the interior of the skull. However usually the eye will close with coagulated blood, not always but usually. Also if you look closely at the eyes you will see straight lined eye slits. This is possible because eyes when blown out will stretch the skin to produce this effect. In this case however the slits are just too straight and the whites of the eye are just too white. If you save the small picture of Obama and blow it up 100 percent, using the PAINT tool of windows then you will clearly see it has been photo shopped.
4.) Lastly is there a stock photo that exists with these features especially the mouth. Yes there is and you will see it just below.
Pakistan Quam ka saath Mazak…..


Additional by Search by JREF (MusT Watch…..)

Osama is dead. Now here is some new that may benefit you.


666 Calulator..


All Unverified SIMs To be Blocked by May 17: PTA

Un Verified SimCellular companies have been asked to block all unverified and un-authorized connections by May 17, 2011 if subscribers don’t register their SIMs on their computerized CNICs, reported Daily Times, citing a statement issued by PTA.

Paper said that PTA has directed cellular mobile operators to take all possible measures for the verifications of SIMS of their subscribers within specified time period through “SIM information System 668”.

In this regards, cellular operators are undergoing a massive campaign to rectify the inaccuracies in the data of mobile users’ antecedents as per instructions of telecom authority.

An awareness campaign through media and text SMSes to the subscribers is planned to be initiated in order to get their SIMs identities corrected through Customer Service Centers (CSC).

PTA had introduced “SIM information System 668” for the verification of mobile SIMs in October 2009. Accordingly, subscriber can send hisCNIC to 668 through SMS and in return he would receive detail of total SIMs against his CNIC along with name of the mobile company. In case there is any discrepancy, the user would visit CSC to get the data corrected.

The customers could also carry out SIM verification for quick proceeding through PTA website.

Now, the campaign has been set to re-launch after Minister of Interior Rahman Malik came in action against cellular operators last week and asked to block all unverified SIMs in 30 days.

PTA ordered all cellular operators to inform their subscribers about the registration of SIMs otherwise If he does not get his SIM cleared it would be blocked by May 17, 2011. “This is part of PTA efforts to block all illegal SIMs and clean the data of mobile users,” PTA statement added.

PTA and cellular phone operators in previous campaign against unnamed and unregistered SIMs and have blocked total 16.3 million unregistered SIMs during phase 1 and phase 2 in the last year.

Previously, PTA introduced “789 SIM Activation System” in February 2009 in order to register and verify subscribers’ identity with NADRA. Thereafter, non-activated SIMs are available in the market because SIMs are activated with Standard Operating Procedures prescribed by authority.

New SIMs are activated through this online verification system from NADRA after identification of legitimate users by asking secret questions such as place of birth etc.
The system had been designed to address security risks and preventing SIM misuse in the country.

There are 3.8 million SIM activation requests have so far been rejected on the basis of incorrect information by operators, the authority stated.

PTCL Starts Offering 50 Mbps Internet to Beta Testers

PTCL Starts Offering 50 Mbps Internet to Beta Testers

PTCL Starts Offering 50 Mbps Internet to Beta TestersSoon after PTCL’s press release regarding 50MB broadband connections for home users, people started tagging this thing as something from the far far future.

But the news is that PTCL has once again banged the industry by launching 50MB broadband connection for beta testers, with the name “UltraNet”.

For now, network deployment is under way, and during this company is offering test account (as part of network testing) to limited home and business users in Islamabad, Lahore and Karachi.

Moreover PTCL is conducting, kind of, survey on what people really think about this new launch and is collecting their feedback before the official launch of this plan.

During a joint press conference of PTCL and Alcatel-Lucent, held today, PTCL said that home users will be offered 50 Mbps for Rs. 10,000 per month, while corporate users will be charged Rs. 20,000 per month. PTCL announced that service will be commercially launched with-in 3 months from now.

PTCL says that this high speed network in Pakistan will be first commercial use of VDSL2 technology in the telecom industry globally.

PTCL said that it will be using VDSL2 Bonding technology to provide existing digital subscriber line (DSL) customers with speeds up to 50 Mbps. The project leverages Alcatel-Lucent’s VDSL2 Bonding expertise and will be completed by the end of the second quarter of 2011.

During the conference, while commenting on this achievement Walid Irshaid – President and CEO PTCL stated

“PTCL is the first service provider worldwide to deploy a commercial VDSL2 Bonding solution that aims at doubling the bandwidths provided to its existing customers.

We are thus setting the trend in international telecoms, and are taking the broadband experience in Pakistan to the next level. Alcatel-Lucent’s VDSL2 Bonding technology and comprehensive services and network integration expertise is helping us to keep pace with the increasing bandwidth requirements of our customers, while capitalizing on the existing copper infrastructure. This will enable us to quickly deliver high-quality, high-speed and high-availability business and residential services – even in areas where it was not possible before.”

Alcatel-Lucent is providing PTCL with its Intelligent Services Access Manager (ISAM) IP access platform – which is the first platform to commercially support VDSL2 Bonding. Alcatel-Lucent will also supply Bonding-ready customer premises equipment (CPE). Alcatel-Lucent serves as the project’s master network integrator, and is providing a range of professional services – including project management, installation and commissioning, integration and technical support.

“We understand that service providers need the right tools to bridge the gap until fiber deployments have become ubiquitous. VDSL2 Bonding is an ideal approach: service providers like PTCL can almost double the speeds supported by their DSL infrastructure or expand their network’s reach. This makes it a fast and cost-effective approach to bridging the digital divide,” said Aadil Rauf CEO Alcatel-Lucent. Pakistan Ltd,. “This commercial VDSL2 Bonding project with PTCL marks the beginning of VDSL2 Bonding deployments outside of the US – where the technology is typically used to expand the reach of the copper network.”

Alcatel-Lucent is the driving force behind the world’s most advanced VDSL2 roll-outs, with customers such as Belgacom, STC, Swisscom and Telekom Austria. Our VDSL2 solution has also been deployed by competitive operators, including M-net (Germany) and South Yorkshire Digital Region (UK).

Five Best Alternative File Copiers

Five Best Alternative File Copiers

If you do any serious file copying on a Windows system, you’ll quickly discover that there are substantial limitations to the default file copier. Ease your file copying frustrations with these five alternative copiers.

Photo by NathonFromDeVryEET.

Copying a few documents from your hard drive to your flash drive doesn’t stress out the default copier too much. If you’re dumping gigabytes of data from one drive to another, however, you’ll quickly find that the default copier is sluggish and unreliable. The pinnacle of frustration: When Microsoft’s default copier putters out while you’re transferring tons of files and you’re left with no indication what was copied and what wasn’t, leaving you to pick through the file lists on each end or starting from scratch to ensure a clean copy. The five excellent alternatives below all succeed at alleviating the many shortcomings of the default copier.

FastCopy (Windows, Free)

FastCopy isn’t pretty, but it is, as the name implies, quite speedy. FastCopy integrates with the system shell and is the only copier listed here which allows you to select which individual commands will appear on the right-click context menu. FastCopy allows you to specify actions based on a file’s age, size, and name, among others. You can also enable secure overwrite, where all moved files are securely deleted from the source directory upon completion of the move. FastCopy can be made portable by copying the FastCopy.exe and FastCopy.chm from the installation directory.

RichCopy (Windows, Free)

RichCopy has been around since 2001 but was only recently released to the public; prior to that it had been an internal Microsoft tool. RichCopy offers all the functionality of the popular command line file copier, RoboCopy, but it’s wrapped in a radically more user friendly GUI. RichCopy has a single but significant shortcoming: It lacks integration into the Windows shell. Despite functioning only as a stand alone tool, it earns its spot in the Hive Five by offering an enormous amount of granular control. You can apply dozens of variables control your file copying, including filtering files by name and extension and selectively applying file attributes. RichCopy is the only copier in the Hive that has profiles, a must for this app given how many variables it allows you to change. You can create a profile for every copying task you can think of.

SuperCopier (Windows, Free)

SuperCopier is a strong candidate for your flash drive. It’s the only alternative copier here that makes itself the default drag-and-drop handler while the program is active. You can turn SuperCopier into a portable application by going into the Advanced menu and changing the Settings Location to “.ini file”. SuperCopier, like RichCopy also allows you to specify if file attributes and security settings will be copied.

TeraCopy (Windows, Basic: Free / Pro: $21)

TeraCopy is one of the best known alternative file copiers, winning people over with an interface and functionality that one might call “just advanced enough”. TeraCopy integrates with the Windows shell for drag-and-drop support and includes a solidly laid out right-click menu. It doesn’t overwhelm you with a plethora of settings or options, but it provides enough advanced functionality to speed up file copying, notify you when files don’t copy correctly, and allow you to bulk approve overwriting, renaming, and skipping of duplicate files. TeraCopy is also available in a portable version. The $21 Pro version adds the ability to select files by extension and remove files from the queue without having to start over.

CopyHandler (Windows, Free)

CopyHandler is another candidate with a ton of customizable options. While RichCopy specializes in granular control over things like file names and attributes, CopyHandler allows you to get as picky as setting custom buffer sizes based on whether a file is being copied to the same physical disk, disk to disk, disk to optical drive, and so forth. You can integrate CopyHandler into the Windows shell and the right-click menu, and you can even instruct it to perform tasks like shutting down the system when the copying is done. CopyHandler is also the only alternative copier listed here which allows you to pause your queue transfer, shut down the computer, and then start the queue up again upon logging back in.

Now that you’ve had a chance to look over the contenders for best alternative file copier, it’s time to cast your vote:

Which Alternative File Copier is Best?(survey software)

This week’s honorable mention goes to RoboCopy a powerful command line utility originally offered as part of the Windows Resource Kit and now included in Windows Vista and Server 2008. Even with the GUI add-on it’s not pretty or remotely easy to use but it’s quite a powerhouse if you love the command line.

Whether it’s your first time trying out an alternative copier or you’ve long since swapped out the old and busted for the new and streamlined, we want to hear about it in the comments below.

Send an email to Jason Fitzpatrick, the author of this post, at jason@lifehacker.com.


Your version of Internet Explorer is not supported. Please upgrade to the most recent version in order to view comments.

Loading comments … -/|\\\\\" /></div>  	</div>    	<div class=

In order to view comments on lifehacker.com you need to enable JavaScript.
If you are using Firefox and NoScript addon, please mark lifehacker.com as trusted.

Adi recommends Teracopy..

Office 2013 details surface on the web

Hot on the heels of the official worldwide release of Office 2010 yesterday, details have surfaced on the next version of the award winning suite – Office 15, or its likely name, Office 2013.

Microsoft Kitchen is reporting that they located a PDF file hosted on a Microsoft-partner owned server, describing details regarding next version of Microsoft Office.

“By the time Office 2010 was released, some Microsoft Engineers had already begun work on the next version (code-named Office 15).”

Microsoft Kitchen also noted that a few Microsoft Employee’s have been writing information about products they are working on, into their LinkedIn profiles – Josh Leong has written on his LinkedIn profile that he is:

“Designing the new visual & interaction experience for Office 15.”

And Ben Gable’s profile says he has:

“Designed major new feature to be introduced in Office 15”

The post notes that there are other new changes that have been mentioned across the web, such as Office Mobile 15 being considered in the planning, that Collaboration is a key point in Office 15, and it should see an Improved Automation Framework. The UI change comes as quite odd, considering the effort Microsoft has put into the ribbon, and the integration they have built into Windows 7 and it’s built in applications, so it is very unknown how large the change could be.

It’s best to remember though, that these details can likely change, and this is very early in the lifecycle – considering Office 2010 was just released, it’s likely not many other details will emerge for a while.