Monday, December 21, 2009

Bitdefender AntiVirus 2009

BitDefender Antivirus 2009 offers advanced proactive protection against viruses, spyware, phishing attacks and identity theft. It doesn’t slow down your PC. With this antivirus you can confidently download, share and access data on Internet.

Bitdefender antivirus 2009 requirements are given below:

• Windows XP with Service Pack 2 (32/64 bit) or higher
• 800 MHz or higher processor
• 256 MB of RAM Memory (512 MB recommended)
• 170 MB available hard disk space (200 recommended)
• Windows Vista (32/64 bit) and Windows Vista SP1
• 800 MHz or higher processor
• 512 MB of RAM Memory (1 GB recommended)
• 170 MB available hard disk space (200 recommended)

Why Bitdefender?

BitDefender is complete package of easy-to-use, highly-effective antivirus and antispyware program that you will want in your PC.

BitDefender got the “eBLOG Gold Award” as the top antivirus software for its consistent great performance in defending PC, ease of use and installation. BitDefender is truly effective and offers tremendous value without making a dent in your pocketbook. If you are seeking best performance and optimum protection at optimum price, we suggest BitDefender Antirvirus 2009. It easily and smartly removes viruses from your PC.

Remember: Don’t’ install two antivirus packages on your system at a same time. After a successful installation don’t forget to scan the entire PC.

Follow the given instructions to install this antivirus program:

Step 1. Download and Install Bitdefender antivirus trial version.
Step 2. Now open the patch and select Bitdefender Antivirus 2009.
Step 3. Click on Yes.
Step 4. Reboot your system.
Step 5. Now enjoy this program and protect your system against multiple threats.

Sunday, October 25, 2009

Windows 7: 64 bit support

Microsoft’s upcoming Windows 7 with 64-bit version runs beautifully with 4GB of RAM, enabling you to manage tons of applications with zero slowdown. This new version of Windows 7 also makes your system more futureproof, allowing you to take your system to 8GB, 32GB or even a terabyte, before too long.64 bitHowever, hardware is the biggest issue. You cannot work with your 64-bit OS, if a gadget doesn’t have 64-bit drivers, as 32-bit drivers aren’t supported.

There are some software problems too. For example, sometimes Google’s Chrome may not operate efficiently with Windows 7 64-bit. Although Adobe Flash doesn’t run with 64-bit browsers, it can be operated with the regular 32-bit browser.

Using a 64 bit OS for a 64 bit processer can address far more than 4GB of memory, which is suitable for avid gamers, CAD, video editors and huge multi-taskers. While any 32 bit software will still be restricted to 4GB memory, a 64 bit CPU, OS and applications will take full advantage of the additional RAM.

However, if you possess a 64 bit capable CPU but use older hardware, then staying with a 32 bit version for the time being will be safer to ensure that you don’t require extra upgrades.

But if you have the latest hardware and drivers, it may be beneficial to step up to a 64 bit OS. For a user working regularly with 64 bit optimised resource hungry applications – like video editing, CAD and image packages – it would be especially advantageous to be able to work with more than 4GB of RAM along with the other improvements.64-bit computing will soon be a common standard, as all hardware from the last couple of years has been customized accordingly. However, there is still a strong case for some

users to stick with 32 bit Windows for the time being until a complete upgrade cycle has passed for the majority of users.
it's all about Windows 7 features .

Thursday, October 22, 2009

Boot Windows 7 in just under 10 seconds

Great success is achieved by Microsoft by reducing the boot timing for its latest operating system, Windows 7, to only 10 seconds.

This is amazing, considering the fact that the BIOS has to turn on everything in the system from the CPU to hard drive, before the

OS begins to load.

Windows 7 has achieved this feat of extremely low boot time by using a healthy hardware configuration. Moreover, most of the

hardware manufacturing firms are paying more attention on cutting the boot time.

For example the Lenovo Group Ltd is making some remarkable changes like:

* Helps to prevent the BIOS phase from the loading of driver.
* Fixing the drivers of on-board hardware components that were cumulatively causing massive delays.
* Avoiding the loading of unessential application being included in the Startup programs. Using msconfig to disable stuff that

runs on startup

Dell, Toshiba and HP are also on course to follow the same trend.

Windows 7 version works extremely good even in the case of multiple operating systems. If your hard disk has ample space then you

can create a partition and dual boot your system. When you will turn on your computer, it will ask you about the option of OS.

If you wish to improve the boot processing then Windows 7 offers you some ultimate tools as mentioned below:

* Defragmenter should be used frequently.
* Defragment your Windows page file and registry as well.
* Check your hard drive from the temporary files frequently.
* Load up Windows faster by using Startup Delayer a free program that will speed up the boot time of Windows by delaying the

startup of programs.
* MSCONFIG will help you keep a check on many of useless Startup programs.
* Use a program click memtest86 or Prime95 to check bad memories on your PC.
* Do check your BIOS version, if required update it.
* Run chkdisk to remove bad sectors in hard drive.

Thursday, August 20, 2009

Test your Computer Securit

computer security
Security concerns, including viruses, denial of service attacks, and spyware/malware, have made firewalls (both software and hardware) a critical part of having an internet connection today. Without testing it, how do you know that your firewall is doing its job? We will look at how to test your firewall.

Step 1 : If you have a firewall, hardware, software, or both, make sure that it is enabled.

Step 2 : Find a computer security test site. I use ShieldsUP! from grc.com and the QuickTest from PCFlank.com. Run the test and review the results.

Step 3 : The first results to review are the ports shielding or stealthing. This tests to see if the ports (different doors) to your computer's address are visible from the internet. Having them hidden, prevents your computer from being "found" by a computer or person that wants to take control of it.
If there are ports that are not hidden, but should be according to the test tool, then refer to the documentation for your hardware firewall (usually part of a router) or software firewall. Look for the section on port rules.
Add rules to hide the ports that should be, but aren't.

Step 4 : Test your new rules with the security test tool to make sure that the rules worked correctly and hid the ports. Also test to make sure that your internet connection still works correctly.

Step 5 : Another test run by these tools is to attempt to get information about your browser (e.g.- Internet Explorer or FireFox). If the test results show that you have a problem, refer to the documentation for your software firewall. Look for information on privacy.
Add or modify the rules to hide your browser information.

Step 6 : Again, retest with your new rules in place to ensure that they are working correctly and hiding your browser information. Also, make sure that you can still browse correctly.

Step 7 : Feel just a little bit safer when browsing the internet.

Monday, August 17, 2009

How can I remove adyieldmanager from my pc

This is server based adware/spyware.

virus removal
To remove ad.yieldmanager.com cookie with Internet Explorer 6, 5, 5.01, and 5.5 for Windows 95, Windows 98, Windows NT 4.0 and Windows 2000, follow the manual removal steps below:

1. Start Internet Explorer.

2. Go to Tools > Internet Options > General tab.

3. In the Temporary Internet Files, select Settings > View Files.

4. On the View, select Details.

5. Click the Internet Address column header, and search for the Internet addresses of the cookie file(s) below:

6. Right-click on the ad.yieldmanager.com cookie file, and then press Delete. If you are prompted to confirm that you wish to delete the ad.yieldmanager.com cookie file, click Yes. You can repeat this step for each cookie file you want to remove.

Wednesday, August 12, 2009

How to secure unsecured wireless network?

computer security
Step 1 : Open “Network Connections” on your PC or laptop. If you do not have an Icon or specific file for network connections, it can be located under the “Control Panel” in the main menu. If you are connected to a network already it will show if it is an “unsecured wireless network” or “security-enabled wireless network.”

Step 2 : Find your default username and password for your router. Access your router by entering the default IP address of 192.168.0.1 (or a similar IP address - this number varies depending on the manufacturer) in your browser. If you are having difficulty accessing your wireless network or settings verify that your firewall or other Internet Security settings are not blocking your attempts to secure your network.

Step 3 : Log into your wireless router. Click the link for “Security” or similar link to access the security settings for your wireless network connection.

Step 4 : Set the authentication type to WPA. (WPA stands for Wireless Protection Access.)

Step 5 : Change the password or “Key” from the default setting to your personal password setting. This will prevent others from accessing your wireless router and its settings with the default password. Write down the password and keep it somewhere safe since you will not be using it often.

Step 6 : Turn the “Remote Management” setting to “Off.” This way changes can only be made to your wireless network connection by a computer already in the network. This makes it more difficult for hackers to access your wireless settings and the computers attached to your wireless network.

Step 7 : Click “Save” or “Apply” to save the changes you made to the settings. Close the Network Connections window.

Step 8 : Reopen the “Network Connections” window. Your connection should display as a “security-enabled wireless network” if your changes were saved successfully.

Tuesday, July 14, 2009

McAfee and Norton Antivirus

McAfee and Norton are two Antivirus programs protect your computer against viruses. McAfee is one of the most famous fighter for the computer virus and is 5 euros cheaper than competitor Norton Antivirus. This article is about the two most Antivirus programs McAfee and Norton.

McAfee
What is McAfee?
Here are some steps that McAfee against viruses.

* Securing your computer against viruses, spyware and hackers, so you can surf safely on the Internet.
* Unsafe vermeiden websites with McAfee SiteAdvisor.
* Continuous updates free downloads so that the computer is equipped with the latest software.
* Standard features you can customize.

Security
The computer almost every day new software that it installs immediately. He searches the computer for viruses and blocks them so that they do not damage the computer can process. The computer is invisible on the Internet so that hackers can not be. Also, the system for so many days a system scan. By scanning all unnecessary files so your system is not full of stuff sitting. He removed the dangerous files automatically.

Site Advisor
McAfee Site Advisor is part of McAfee. It is free for download on the McAfee site. The SiteAdvisor site indicates whether a 'good' or 'bad' is. If a site is no viruses, etc., a green tick behind the site name to it. The site advisor is no antivirus, so you have your antivirus program is not discarded.

Free Scan
This program can be downloaded for free on the McAfee site. This program helps Antivirus smaller, sometimes almost impossible to find, virus to detect and remove. If the computer has been searched, a list of files containing such viruses.


Norton

Norton searches the computer for viruses. If he has found it immediately removed. All viruses come in via the Internet. Most e-mail or downloaded music. Limewire is an example of a free music download site where you as a user likely to have viruses. Viruses affect parts of programs in which files or even the whole program away. If these viruses are not addressed, it's likely that they jump to the next program to which to attack. For example, the whole computer crashing.
If Norton has the whole computer will be searched for viruses, check each file that the computer arrives. So keep your computer clean. If Norton for a while on your computer is it to spend so much time re-search all files for viruses.

Update
Once you've bought a Norton, it is not necessary for this each year. Each year you can download new updates so that the system cope with new types of viruses. Through the program on Internet Live Update, you can each year, the latest updates.

Remove
It is very difficult to remove Norton. You can not just simple un-install it. Here are some steps to NAV (Norton Anti Virus) removal.

* Remove first Norton via the normal way: via: Start-control panel software, select Norton and click remove.
* Click on A: Norton AV remover and then double-click Remove.exe.
* A window appears, choose no.
* There is still a window appears, select the version you are using and click Yes.
* There is still a window appears, choose Yes.
* There is still a window appears, choose Yes.
* Install the new version Anti Virus and it's done.

Wednesday, July 8, 2009

Make your computer faster and virus-free

It is common that computers slow. There are many different causes and the solutions it can read.

Why computers slow?
If you have many emailt, download and simply surf the Internet you can get many files inside. Sometimes viruses, trojan horses, worms and spyware disguised as an innocent music or an attachment to an email. The viruses can themselves unnoticed into your computer and if your computer is always slower. Many people are not well prepared for viruses. There are many unnecessary files stored on your PC making it slower.

Remove your viruses
The first thing you should do is make your computer clean of viruses etc. I have a few good programs in a row put.

AVG Anti-Virus
AVG Anti-virus is one of the best free anti-virussen.Klik Here to download.
Click run and install the program. If you have started the program you see a screen with: congratulations! Press next, check for updates, the internet and then update. The latest update is installed.

Press next and Low Priority. Then press Scan computer! Your computer is now gescant. Wait until it has finished scanning, this can be a time. If it does AVG daily scan for viruses, so your computer remains virus-free.

Ad-Aware
Ad-Aware is a good program to spyware and malware. Click Here to download. Press again, and follow the steps to install it. When they ask for a code: use Free.

If the program is running, close all programs and press the right in the middle of the scan now and then Full Scan. When the scan is finished, then with your right mouse button on the white box and select: Select all objects, then press Delete.
Put at least 1 time per week a full scan.

Remove unnecessary software
Press start> control panel> software. View the list and press the software that you never used and do not need. Then click Remove or Change / Remove. If there is a setup of the program that you should uninstall or delete key. Do this for all programs you want to leave and then restart your PC.

Clean your private data of Firefox. It is just are cookies.
Do this 1 x per week.
For Firefox users:
* Go to Tools> Options> Privacy
* Click "Clear" and new window will open.
* Check all boxes in "the following information now clear:"
* Click on "Clear Private Data Now"

For Internet Explorer users:
* In IE Tools> Internet Options> General tab
* Click the browser history on "Delete" and a new window will open.
* Check the following: Delete Files, Delete Cookies and Delete History. Then click ok.


Disk Cleanup
Enter 1 time every two weeks from a disk cleanup. Your disk is army and your PC is faster.

* Go to My Computer> The disk where you store all your files (usually C or D)> properties.
* Press the button on disk cleanup. The computer will analyze what it can remove.
* Check the following components: Temporary Internet Files, Recycle Bin, Temporary files and cataloging files for indexing.
* Click OK and then Yes.

Friday, July 3, 2009

Viruses and free AVG, Anti-Virus Free

Today there are more and more computer viruses that you'd rather not encounter on your computer. So here an article about what a virus is now and what you can do against. Of course you can buy expensive anti-virus software, but a free virus scanner like AVG Anti-Virus is also very safe.

What are viruses?
Very simply get a virus your entire computer by the war. It seems like you have nothing under control, the icons on your desktop can go jump back and forth or you get junk on anti-virus companies.

Worse still are the worms, also known as the Trojan horse called. These are small programs that unseen installed and after a few hours to a few days to activate Windows on your computer there may be.

Anti-virus programs

Of course you can protect yourself with known anti-virus programs. A very good program that is free to download via the Internet is AVG Anti-Virus Free. This program lets you download and install as follows on your computer;

1. Go to AVG Anti-Virus Free and download the file 'avg75free_446a965.exe,'
2. Then choose 'run' and wait until the file is downloaded,
3. Click 'run'. Now start the installation, the program is about 17 Mb,
4. If the program is installed you will see the Welcome screen, click here on 'next'
5. You will now see a License Agreement. Read this post and accept it,
6. Now go to the next screen, you can for a number of options that you just have to find themselves,
7. It may now be that you get the option to install AVG now, but if it is, this is already on the computer and there is another option, depending on your computer. Choose the option that suits you, in this case, that 'install' are
8. The program will now be launched and when it is ready you can 'finish' button. AVG is now installed,
9. Restart your computer if necessary, then start AVG also automatically.

AVG Anti-Virus use
AVG performs every day a full scan of your computer. This setting lets you change if you find this a bit redundant. AVG Anti-Virus starts off as your computer. You can also choose to have a scan to run while your computer is not on. These things can all change in the menu. Click on your start bar with your right mouse button on the AVG logo. Click on 'Launch AVG Test Center, "now brings you a menu where you can change everything.

What if the computer it infected?
If your computer is infected with a virus, you can go to an expensive expert, but you can also put the 'DIY' store. In forums on the Internet you can find useful tips here, you or even a computer and internet access from someone else needed .. Having problems? You can always still the expert to steps.

Monday, June 29, 2009

Fake Anti-Spyware & Anti-Virus Programs

In the past you have almost only protect your computer from viruses and worms. Could just as easy ... there are now many more enemies that lurk on your computer to disrupt and damage. The most worrying is that anti-virus and anti-spyware programs also could be falsified. This rogue scareware true or are becoming a pest.

Fake Anti-Virus and Anti Spyware Programs
It is sometimes known by everyone that there is suddenly a pop-up advertising will appear. This is usually not so bad and can be a pop-up blocker to be resolved. But if more sites can be visited or your virus scanner does not and your computer indicating that Windows has found spyware is something wrong.

The message you get is usually whether you want to remove spyware now. Of course you want this (so you can surf through good) and you press' Ok '. Fantastic: a good program (for example, 2010 or XP Antivirus Micro Antivirus 2009) download and install it. The titles of these programs give a reliable impression, but appearances are deceiving here.

Removing spyware and viruses represents scam
The programs work well and just after they've run, you see indeed that many adware, malware and spyware are found. With the click of a button "delete" opens a new web page which asks you to pay to remove the spyware. Do absolutely not! This is almost certainly a fake anti-spyware program and payment is the spyware is not removed. Perhaps so, since they the customer in a subsequent scan again able to pay.

A typical example of fraud in practice this is so. There are probably tens of millions of computers infected by such rogue true or scareware. There are always people who believe in this report, which highlight this practice is so lucrative, more and more programs on the market with the most innocent names. That the following list before.

List of fake anti-Virus and Spyware programs:

* Advanced Anti-Virus
* Many false
* Many false
* Advanced Privacy Guard
* Advanced Privacy Suite
* Andromeda AntiVirus
* AntiMalware 2009
* Did Antimalware
* AntiMalware Suite
* AntiSpyControl
* AntiSpyware Pro XP
* Antispyware XP 2008
* Antivir64
* Antivirus 2010
* Antivirus Lab 2009
* Antivirus Protection
* AntivirusDoc
* Cleaner2009
* Content Eraser
* EAntivirusPro
* Internet Antivirus
* Micro Antivirus 2009
* MS Antivirus (2008)
* PC Virus Less
* PersonalAntiSpy
* Power Antivirus 2009

Wednesday, June 17, 2009

Bay Underground Malware on the Internet

Malware, called all kinds of malware or causing troubles such as advertising software (adware), spyware (Trojan, spyware), type the code risk control and help control the computer remotely to the bad (the computer was brought into the system Zombie, botnet), type the code helps fraud (phishing) ... is becoming big danger. The Internet has more than half a million websites are showing Malware infection who surf the web.

One of the new weapon helps Malware is a rapidly developing social networks (social networks) such as MySpace to help Internet users can easily create websites for individuals as their blog. Social networking is a new concept appeared recently for the website only provided for the user environment to create personal blogs and connect with each other according to preference. Own social network protection is sure to create the blog can not be brought to Malware blog.

However, creating blogs can take on their path (link) to other sites with attractive introduction to deceive viewers. Just click this link to see the trap can order as it is the site contained Malware or provide free software with very useful but the shell peeled harmful Trojan is extremely dangerous .

According to the statistics of companies writing anti-spyware software Webroot, many sites on the personal social network like MySpace by creating a user with more information to different virtual trap John's web surfing. "Each like to see people under click always attractive, such as software, film and free hot cause you can not deny downloading your computer. Of course, gift with their product is free Trojan, spyware that the price people pay to surf the web for volatility is not your cheap little time.

Until this time, the specialists have Webroot's statistics list of sites containing 527,000 John Malware trap users, more than 100,000 pages over the same period last year. With the number of sites Malware much like the numbers the computer, as in most households, infected with one or more spyware in more than 30 spyware most popular today. Spyware is also quite common in business. Webroot has surveyed nearly 20,000 businesses in 71 countries and found a computer in the company also infected 19 different types of spyware.

Technical writing spyware is continuous improvement with the ability to automatically hide to avoid anti-spyware software to detect and destroy as well as record type keyboard (keylogger). Most recently, a Trojan called Zlob the use of dummy as software code resolution video update for the Microsoft. However, the link to download the program again this leads to a site that the hacker, a series of Malware is downloaded and installed to the computer's victims

Wednesday, June 3, 2009

Are all Antivirus softwares safe?

According to a report from Microsoft, fake security software is growing on the Net. The number of vulnerabilities it is down from 2007, except for its own applications. Each semester, Microsoft, like other publishers, publishes its report on information security. It must be said that the U.S. firm has an advantage in weight to take the temperature of Risk: the collection of information is based on 450 million computers worldwide.

First observation fake security software have proliferated on the Internet. These applications exploit the fear of the Internet, usually by displaying messages alerting an infection. Once the antivirus installed, it will attempt to extort money from the user. These fake security tools can also steal personal data and information as well.

Win32/Renos virus totaled 4.4 million infections in the recently past time. Microsoft has detected malware and family Win32/Spyware Secure 260 000 computers between July and December 2008. This represents an increase of 87.4% in six months. Win32/Renos, another one of these programs gave rise to 4.4 million infections worldwide over the period (+ 66.6%). The sources of threats largest number of infections in the second half are the various Trojans. Trojans (various, downloaders and injectors) account for more than 50% of infections.

The situations vary significantly between different countries of world. In Brazil, the threat most common (greater than 50%) consists of programs sniffer passwords and monitoring tools. In Korea, the worms that cause the most infections (28%). The Trojans (all categories) remain the most serious threat. Another finding of the report Microsoft application vulnerabilities continue to pose a major risk to security, even though the numbers tend to decrease. Between 2007 and 2008, the total number of vulnerabilities of high index (52% of all faults) fell by 16% compared to 2007.

This downward trend in the number of vulnerabilities appears forget Microsoft applications. Between the first and second half of 2008, the publisher notes an increase of 67.2% of faults for its products (42 security bulletins about vulnerabilities 97). From 2007 to 2008 it rose by 16.8% with a total of 78 security bulletins encompassing 155 vulnerabilities. On the Operating System, Microsoft said in its report noted a rate of infection correlated with the length of the OS. Plus an operating system is old and the more successful attacks increases. The infection rate for Windows Vista is much lower than its predecessor, Windows XP, regardless of the configuration; specifies the document. The rate of infection of Windows Vista SP1 is for example 60.6% lower than Windows XP SP3. A fact that Microsoft checks on both client OS on servers.

Thursday, May 28, 2009

Virus help

Now-a-days millions of viruses, Spyware, Woms, Malware etc. present, and new originating day-by-day continuously. Some kind of viruses type are:

Viruses - A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs).
E-mail viruses - An e-mail virus travels as an attachment to e-mail messages, and usually replicates itself by automatically mailing itself to dozens of people in the victim's e-mail address book. Some e-mail viruses don't even require a double-click -- they launch when you view the infected message in the preview pane of your e-mail software.

Trojan horses - A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk). Trojan horses have no way to replicate automatically.

Worms - A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.

Symptoms of virus infection on your computer:

> Programs take longer to load. Memory-intensive operations take a lot of time to start.

> A change in dates against the filenames in the directory. When the virus modifies a file the operating system changes the date stamp.

> Increased use of disk space and growth in file size-the virus attaches itself to many files.

> Strange characters appear in the directory listing of filenames.

> Strange graphic displays such as falling letters or a bouncing ball appear on screen.

> Abnormal write-protect errors. The virus trying to write to a protected disk.

> Programs may hang the computer or not work at all.

> Junk characters overwrite text in document or data files.

Best way to recovery your all virus infection is Install good antivius software and Scan your whole computer with it. Some good Antivirus are:

> Notron
> Macfee
> AVG
> BitDefender
> F-secure
> Trend Micro

Thursday, May 14, 2009

iYogi Acquires Clean Machine Inc.

Larry Gordon, Founder of Clean Machine appointed as President Global Channel Sales at iYogi


New York, NY, May 11th, 2009 : iYogi, a global direct to consumer and small business remote technical support provider, today announced it’s acquisition of Clean Machine Inc, a provider of remotely administered PC security and performance management services. Clean Machine will operate as a separate brand under the iYogi services umbrella along with the recently lunched Support Dock (www.supportdock.com) and its comprehensive range of 24/7 technical support services for computers, printers, MP3 players, digital camera, routers, servers and more than 100 software applications. Larry Gordon, Founder of Clean Machine is appointed as the President of Global Channel Sales for iYogi.

computer repair,help and support

iYogi will integrate technology and innovation that Clean Machine Inc. has developed for delivering an enhanced service experience by proactively managing the health and security for PC's and Apple Computers. This acquisition also broadens iYogi's access to key markets through Clean Machine's existing partnerships. Larry Gordon's past experience and successful track record will accelerate iYogi's expansion through his focus on global alliances.
Commenting on the acquisition of Clean Machine Inc., Uday Challu, CEO & Co-founder of iYogi, said,

"This acquisition will help iYogi to enhance our customer experience and extend our market reach to the millions of consumers that are challenged by the increasingly complex technology environment. Clean Machine's proactive maintenance and management of PCs in home and small business environment will be our launch platform for building the next generation of managed services for consumers."

"We are delighted to have Larry spearheading partnerships and global alliances for iYogi. His incredible experience in marketing, sales and building global alliances will help forge partnerships with retailers, multiple service operators, software publishers, original equipment manufacturers (OEM) and other such companies that are at the frontlines for managing tech support issues for consumers and small businesses",
added Challu.


With more than 20 years of experience, Larry Gordon has played a variety of strategic roles in marketing, sales and building alliances. Larry was the Executive Vice President at Capgemini and Kanbay. He was also VP of Global Marketing for Cognizant (Nasdaq: CTSH), a leader in global IT services and Director of Marketing for New York based Information Builders.

"I am excited to join a company that shares a common mission to Clean Machine in creating a global brand for delivering the best technical support to consumers and small businesses. We also share a common approach of utilizing highly skilled talent with leading edge tools, thereby delivering services at incredible price-points, with high margins for our partners",
said Larry Gordon, the newly appointed President of Global Channel Sales at iYogi.

ABOUT IYOGI


Headquartered in Gurgaon, India with offices in New York, USA, iYogi provides personalized computer support for consumers and small businesses in United States, United Kingdom, Canada and Australia. IYogi's 24/7 phone and remote technical assistance, spans across a comprehensive range of technologies we use every day from a wide range of vendors. Utilizing its proprietary technology iMantra , and highly qualified technicians, iYogi delivers amongst the highest benchmarks for resolution and customer satisfaction. iYogi is privately held and funded by SAP Ventures, Canaan Partners, and SVB India Capital Partners. iYogi was recently awarded the Red Herring Global 100 Award, recognizing it as one of the 100 most innovative private companies driving the future of technology. For more information on iYogi and a detailed list of technologies supported, visit: www.iyogi.net.

ABOUT CLEAN MACHINE


Clean Machine Inc. is a NJ-based and incorporated company that helps consumers and small business owners easily manage and protect their computing environments safely and cost effectively. The company is has a unique, powerful and inexpensive PC concierge service. Specifically, each customer is assigned a highly-trained tech concierge who remotely examines their computer system on a scheduled and very secure basis. The PC concierge will immediately fix software-based problems and prevent new threats to the customer's computing environment including offensive pop-ups, browser redirects and slow performance, and then provides a detailed report. Clean Machine's proprietary Radar(TM) technology (Remote Access Detection Audit and Repair) allows its expert technicians to remotely resolve any problems, eliminating the need for customers to go through the frustrating process of speaking with a tech support expert, and still having to do the work themselves. In other words, the Clean Machine PC concierges do it all. For more information on Clean Machine please visit www.pccleanmachine.com.