WinPatrol 10
I'm pleased today to release the newest, and most exciting, WinPatrol version 10!
  Hidden Files
   Hidden Files
Scotty can now be set to monitor Hidden files in critical system areas. A new list of Hidden Files is available to help you clean up your machine. Almost all new infiltration and/or root kits will attempt hiding their files but Scotty can detect them in real-time before any serious danger can be done. While many hidden files are normal system files, the introduction of new hidden files should be questioned. Now it can be.  The ability to delete hidden files will allow proper system cleanup. Right-click on the hidden file to view or delete.  Date & Time Program First Detected
   Date & Time Program First Detected
Ever wonder when a new file was first introduced to your system?
WinPatrol 10 detects and records the introduction of new program files and malware infiltrations. This new feature will allow you to detect files which have all infiltrated your system at the same time. Even if they have random file names or file names matching legitimate files you can sort files by Date Detected and Kill them all at once.  Lock File Type Associations
   Lock File Type Associations
This checkbox on the Options tab will allow you to keep your desired File Type associations settings without being annoyed by persistent programs.  Scotty will automatically restore your original settings.  More Secret Startup Locations including WinLogon/Notify
   More Secret Startup Locations including WinLogon/Notify
WinPatrol PLUS now monitors even more non-tradition Startup locations found in the registry. Disable unwanted programs including the Windows Genuine Advantage.  HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify
Examples:WGALogon(Windows Genuine Advantage), GoToMyPC,Adware.Look2Me (O20) 
Even more information available at http://www.winpatrol.com/upgrade.html
To download the newest WinPatrol, go to http://www.winpatrol.com/download.html
 Bits from Bill
                 
	               Bits from Bill 
	               











 The addition of a 802.11 wireless router (WiFi) was the next step in making my home computing a joy. It was also the next step in having zero security protection for my data.   A research engineer and student have found a way to hack into systems by sending a barrage of wireless packets that cause an overflow in wireless cards device driver.  (
    The addition of a 802.11 wireless router (WiFi) was the next step in making my home computing a joy. It was also the next step in having zero security protection for my data.   A research engineer and student have found a way to hack into systems by sending a barrage of wireless packets that cause an overflow in wireless cards device driver.  ( 


 I’ve been honored by the hard work of folks who have taken their own time and effort to support additional languages for our WinPatrol program.  Just this week, thanks to the volunteer efforts of Besmir Godole, we now have a
 I’ve been honored by the hard work of folks who have taken their own time and effort to support additional languages for our WinPatrol program.  Just this week, thanks to the volunteer efforts of Besmir Godole, we now have a