Tuesday, April 22, 2008

Tips for Passing The CISA exam

EFFECTIVE APPROACH FOR SUCCESS IN CISA EXAM

CISA Exam consists of 200 questions from 7 domains as detailed in the Candidates Guide to the CISA Exam. The CISA Exam tests minimum level of competence for conducting Information Systems Audit.
Understanding of IT
CISA Candidates are expected to have working knowledge of Information Technology. The basic understanding of Information Technology should cover key concepts of various components of Information Technology in their practical deployment. The IT knowledge should encompass overall understanding of IT Infrastructure, IT Facilities, various types of Computer hardware, Systems Software (Operating System, Database, Networking, Multimedia, etc), Business Application software, Office Automation Software and Audit Software. Further, candidates are expected to know concepts and practice of Management as relevant to IT deployment in enterprises.
CRM – only theoretical training
The CISA Review Technical Information Manual (CRM) is not meant for teaching the fundamental concepts of Information Technology. However, IT components are explained only to the extent required. The candidates guide to CISA exam provides the broad range of topics covered and CRM provides the details of concepts of practice of IS Audit as per IS Auditors’ Tasks and Knowledge requirements. Candidates are advised to use the CRM as the basic guide for learning and use additional material as required based on their assessment of gaps and individual competency areas.
IT – Practical Training
Candidates who are not well conversant with IT are advised to do a practical course on IT covering hardware, systems software, office automation, business applications and audit software.
Getting CISA Perspective – practical approach
The overall understanding of a CISA candidate is expected to cover the related domains as per the objectives, tasks and knowledge statements given in the Candidates Guide to CISA Exam. Primarily it encompasses three major disciplines - Information Technology, Management and Auditing. The CISA candidates may follow the following approach for getting the perspective of a CISA:
• Obtain overall understanding of Information Technology – concepts and practice
• Understand the Risks of deployment of relevant IT Component
• Know the features and functionalities of Security and controls of IT Component
• Understand how controls could be implemented using the security features and functionalities so as to mitigate the risks in the relevant IT Component
• Learn how to identify the risks, review the related security, evaluate the implemented controls and identify areas of weaknesses.

Conceptual Clarity
CISA Candidates need to have conceptual clarity in the following key areas:
The inherent risks of Implementing Information Technology
Appropriate risk management strategy for mitigating these risks.
Security and controls, which need to be implanted for, risk mitigation.
Practical Tips for CISA Exam
Exam details

1. The exam is objective (multiple-choice). The answer is available in the choices. Hence, the approach to studies should not be from the perspective of remembering but more from perspective of understanding.

2. The CISA Exam Questions could be broadly categorized into 2 categories:
• Based on Facts – technology, auditing standards
• Based on Analysis – context and decision oriented

3. There are 200 questions to be answered in four hours. This would mean that approx. 70 seconds per question. Some of the questions may be answerable within 30 seconds and some may take more time. Further, in some cases, if you get lost in too much thinking, you may lose track of time and may not have time to answer all questions. Hence, it is essential to manage based on a slot of one hour or for a block of 50 questions. Depending on the progress, you can increase or decrease the pace as required.

4. As there is no negative marking, you must answer all questions. Even in case of questions, where you are not sure of right answer, you may guess intelligently.

5. Do not attempt to read through the question paper fully. You may lose time and may not have time to answer all the questions. The ideal method is to take up one question at a time and answer them one by one.



6. You may decide on which order you want to answer the questions. Some tend to start from question no. 50 or 100 as it gives them confidence they are progressing and come back. However, the ideal approach is to answer sequentially one at a time.

7. There may be questions for which you may not be able to strike the right answer straight away. You may skip, but mark it in the questions paper so that it is identifiable and come back to it later. However, the best approach is to take a DECISION and answer it then and there. You may not have time to come back to the question again. Further, there may always be lurking feeling that you have
left some questions unanswered. This will be at the back of your mind always. However, if you do have to change, please ensure that you erase the previous answer carefully and fully.

8. Please do not think of coming back to the answers for corrections later on. You may change if and only if you are additional insights or data, which necessitates that your previous answer was incorrect.

9. If you have to modify your answers for any reason, please ensure that you erase the previous choice properly so that there is no trace of marking else it may be construed as multiple marking and your answer ignored for valuation.

10. You need to compartmentalize your mind and take one question at a time. Think and decide on the right answer. Once you have answered, forget it and go ahead and tackle the next one and so on. Don’t carry your doubts of the previous question to the next.

11. You may mark the answers in your question paper and transfer it periodically or mark your answer for every question directly in the answer sheet.

12. Get the fundamentals very clearly. Read the IS Auditing standards and guidelines and COBIT Control objectives to get the thinking of an IS Auditor. Put on the cap of the global IS Auditor. Don’t bring in your personal experience and answer questions from your past data unless it is in line with ISACA’s thinking. The questions will not be technology specific or industry specific. Hence, don’t think what is practiced in your technology platform or industry as the most relevant or applicable. It may not be.

13. Take one question at a time. Read it fully and carefully. Identify the stem, the key concept that is being tested. Underline the core concept, which is being tested. Read all the choices even if you have think you have the right answer in the first or second or third choice.

14. You may encounter some questions, which are familiar to you, which you have answered in the CISA review manual or in the test questions. Don’t be prejudiced by your past answers. Read the question fully, understand it, and look at the choices and then answer. It may be possible that the questions may have been rephrased or re-worded and may have a different answer to what you have seen in the tests or the choices may be re-arranged or rephrased.

15. In the choices, when there are two choices which are similar. Pick the one which is more macro and bigger in nature. Remember the context of the situation as given in the question and the available choices have to be considered to arrive at the best choice.

16. For choosing the right answer, you may be able to identify the right answer straight away. You may also adapt the process of elimination by ruling out the apparently incorrect choices one by one so as to narrow down your choices and pick up the right choice.

17. Every question will have one of the choices framed as a distracter. The distracter may attract those with incomplete knowledge or attempting to answer the question with just common sense. It is essential to be able to eliminate the distracter.

18. You may need probably of all of four hours to answer 200 questions. Hence, it is essential that you practice sitting at one place and practicing answering the mock tests so that you get practice of sitting for four to five hours at a stretch.
19. Your concentration level may come down after an hour or so. It is important that you have a little break by having a sip of water and looking away from the question paper and get back your concentration before you start answering again. Take a few deep breaths, stretch yourself if required and then get back to the task. Consistent concentration is important.

20. If you have any medical problems, which hinder your sitting for long stretch of time, or you need regular medication, inform the proctor in advance and take necessary precaution.

21. Don’t stress yourself physically before or during the exam. You need to be fully relaxed so as to have maximum concentration. Avoid last minute reading and late night reading before the exam day. It may not really help.

22. The Questions and choices are straightforward and simple. They are meant for testing your understanding of concepts and practice of IS Audit. They are not meant to test your grammar or proficiency in English. Hence, do not try to analyse the question and answers too much. Don’t try to read between the lines and find hidden meaning. There may not be any.

23. The pass % is normally about 55% globally and varies from centre to centre. However, passing the exam is primarily dependent on your ability to concentrate during your exams and picking up the right choice. Our Analysis reveals that most of the students who fail tend to get around 70% which means that another 5 to 10 questions answered correctly would have got them through. Hence, it is very important that you are able to devote proper time for each of the question and concentrate throughout the exam.

24. The exam consists of one paper, which has all 200 questions. The questions are not in a particular order of domains or chapters but are usually mixed up at random. It is not worthwhile trying to figure out to which domain a questions belongs. What is most important is how well you are able to answer the questions in the exam.

25. Practice the questions and get the reasoning and choice correctly. Remember, the exam is not expected to test your memory but your understanding. Hence, there is no need to cram any definitions or concepts except the most fundamental ones and that too for understanding.

26. Don’t sit up late day before the exam trying to read and catch up on lost time. Remember, the principle of farming, you need to sow in time and take care on
regular basis so as to reap in time. Last minute preparations may result in lack of concentration on the exam day.

27. The questions are not directly picked up from any text book or reading material but are prepared by Practicing CISAs and are aimed to test your understanding of the concepts and practice of IS Audit.
28. Practice, practice and practice questions available with you. But remember the standard of the questions in the exam is much higher than what you have practiced. Be mentally prepared. If you have conceptual clarity and apply your thinking as an IS Auditor, you should be able to pick up the right answer.

29. The exam is based on percentile. The lowest score among all the candidates is converted to 25 percentile and the highest score is converted to 99 percentile. Your raw score is then converted accordingly to a percentile. Hence, depending on the overall performance of the candidates, the number of questions you have to get right to get 75 percentile is dependent on overall performance of all the candidates. However, it is preferable not to worry too much about the percentile but focus on getting the maximum questions right.

30. Ensure that you are marking the answers exactly. Cross-check regularly to ensure this. You have to be extra careful if have skipped any questions to be answered later. It is important to ensure that you skip marking the answers for that question. You may use a ruler for ensuring you are marking the required choice for the appropriate question.

31. As part of preparation, do discuss the questions and answers with an open mind. If you are auditor, get the technology perspective and if you are from IT, get the Audit perspective. Remember as an IS Auditor, you are expected to be auditing Technology as deployed in the organization.

32. The key ideas to be remembered as an IS Auditor are IS Risks, IS Security, IS Control and IS Audit. You need to be well versed with these concepts. The questions may require you to grade the risks in terms of highest or lowest. In terms of security and controls, you may be required to pick up the best or least effective controls in the context of the question. An IS Audit question may require your judgement in terms of concepts, practical procedures or risk ranking or presenting the findings to the management. There may be few questions, which tests your understanding of core technology. For example, encryption, EDI, Internet Security, Telecommunications control, etc.

33. Familiarize yourself with the test. Know the tasks, knowledge and scope of the subject, the type of questions and proposed answers.

34. The Exam is not Technology or platform specific. Hence, do not get too engrossed with technology details and reading of technology.

35. Make a time plan of what you need to read and prioritize. Deal with unread materials concisely. Formulate a reading strategy in advance with a time table and study plan.

36. Form a small study group or e-group for studies and discussions. Review your preparation actively alone and also with group on a regular basis. Review and discuss with group your logic and reasoning and get other perspective also.

37. Prepare yourself emotionally and physically to take the exam.

38. Take your family and friends into confidence so that you are able to sacrifice your social commitments and focus on the exam.

39. Motivation is an important aspect of preparation for the exam. Motivation will help you concentrate and be focused on the task on hand. Self Motivation is the best motivation. Remember, you are taking a prestigious and global recognized exam, which will make a significant difference to your career, earnings and your self-esteem.

40. Visualize receiving the Congratulations letter from ISACA and CISA Certification. See yourself being congratulated by your peers and colleagues.
Exam Venue
41. Visit the venue in advance before the exam and know the route, parking facility and exact place of exam. Reach the exam half an hour before the scheduled time so that you are not running to the venue in a hurry. Do come to the exam to the venue before time and use the time for relaxing.

42. Carry your identification cards, admission tickets, 3-4 pencils sharpened, 2-3 erasers, water bottle. Don’t carry any books. You may not get time to read and it may not be worthwhile trying to read in the last minute. Remember the questions don’t test your memory but are more a test of your judgemental ability as an IS Auditor.

43. The admission ticket is expected to be received by the candidate 2-3 weeks before the exam. It is sent both by email and by post. You can bring printout of email copy to the exam if you don’t receive the hard copy by post. However, if you don’t receive hard copy also, you may contact the chapter office to confirm your name is in the candidates list. The chapter gets a copy of all the candidates writing exam from the test centre. They are authorized to identify candidates who have not received the admission ticket. Hence, please don’t panic if you don’t receive the admission ticket but contact the chapter president or CISA Coordinator of your test centre who would have the complete list of candidates taking the exam from that test centre.

44. The proctor will start reading instructions of the exam 30 minutes before the exam time. You are expected to be in the hall before proctor commences reading the instructions. Proctor may not allow you inside once he starts reading the instructions.

45. The instructions relate to signing of forms and filling up your registration particulars. Clarify your doubts about any procedures you have. Follow the proctor’s instructions carefully and write down the details as per instructions. You
can use pen or pencil for writing the registration no. and other details. However, answers are to be marked only in pencil.

46. The proctor will not answer any questions pertaining to the questions or answers.

47. You can go out of the exam hall for answering nature’s call with permission of proctor. You have to hand over your questions and answer paper before going out of the hall and collect it back on arrival.

48. No additional papers or sheets will be provided. You may use the question papers or its back side for making any rough notes. It is advisable not to make any notes or marking on the answer sheet except for marking the circles for the right choice.

49. The CISA Exam is a closed Exam which means neither the question paper or answer papers are released. You are not expected to discuss the questions or answers with anyone.

50. After completing the exam, leave the venue silently. Don’t discuss your answers with the other candidates to confirm the answers. You may only get confused.

Thursday, April 10, 2008

how to Auto DELETE temporary folder ?

what we used to prefer is, type "%temp% " {without quotes} in Start -> Run.
This opens your temporary folder and then you can erase it easily, but still try dis one too..



First go into gpedit.msc
Next select -> Computer Configuration/Administrative Templates/Windows Components/Terminal Services/Temporary Folder
Then right click "Do Not Delete Temp Folder Upon Exit"
Go to properties and hit disable. Now next time Windows puts a temp file in that folder it will automatically delete it when its done!
Note : Remember, GPEDIT (Group Policy Editor) is only available in XP Pro.

what is a spyware ?

Do you know what is running on your computer? What it is doing? Who put it there? Why did they put it there? and do they have the right to put it there?
First seen on
October 16th 1995
; spyware exploits your computer for commercial gain. Nine out of ten computers that have internet use are affected by spyware. So what exactly is this spyware?

Spyware is often downloaded onto your PC when you download other free software.
Most spyware does not collect information about you; it is not stealing your name, credit cards or other personal information, however spyware has the ability to do this. The term spyware suggests your behaviour is being monitored but spyware often goes beyond forwarding information about your browsing and spending habits. Spyware can collect various types of information and interfere with user’s control of the computer in other ways such as; installing addit software, redirecting your homepage and messing with your web browser activity. Spyware can cause harmful viruses and even change your computer settings creating a slow connection and loss of internet as well as other programmes.
Internet cookies can also be considered spyware. If a web site stores information about you in a cookie that you didn’t know about; this could be classed as spyware. Also some music CD’s allow you to get extra content if you put the CD in your computer and download extra features. This is great but what you don’t realise is that you could also be downloading spyware. Although the desirable software itself may do no harm, the bundled spyware does.
You should always read license agreements when downloading software to minimise your risk of downloading harmful spyware. It is also advised to get an anti-spyware programme on your computer as you probably already have spyware present.

How to ShutDown system Quickly

To shut down immediatly

open task manager (Ctr+Alt+Del),

Select shut down tab. and press ' Ctrl ' key while select Turn Off from dis tab.

wow!!!.... U r window will rapidly shut down.

enjoy....

How to reduce your BOOT time

IMPROVE BOOT TIMES

A great new feature in Microsoft Windows XP is the ability to do a boot defragment. This places all boot files next to each other on the disk to allow for faster booting. By default this option in enables but on some builds it is not so below is how to turn it on.

Go to Start Menu and Click Run
Type in "Regedit" then click ok
Find "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Dfrg\BootOpt imizeFunction"
Select "Enable" from the list on the right
Right on it and select "Modify"
Change the value to "Y to enable"
Reboot

How to hide 'User Accounts' from users

Go to Start/Run, and type:

GPEDIT.MSC

Open the path

User Config > Admin Templates > Control Panel

doubleclick "Hide specified Control Panel applets"

put a dot in 'enabled', then click 'Show"

click Add button,

type "nusrmgt.cpl" into the add box

How to measure computer performance

One of the most overlooked IT disciplines is that of computer measurement and testing. How can you compare different parts of your IT infrastructure if you’re not using a sound testing methodology to ensure that you’re truly comparing apples to apples?

That’s where an organisation like the Computer Measurement Group (CMG) enters the picture. In their own words, the CMG is a “not for profit, worldwide organization of data processing professionals committed to the measurement and management of computer systems.” CMG was founded in 1974, and has been active in advancing knowledge of computer measurement tools and techniques ever since.

According to Director Dr. Michael Salsburg, the organization and its members has been primarily concerned with performance evaluation of existing systems in an effort to maximise performance and optimise capacity management. “We currently have a strong interest in measuring server virtualisation, and also in exploring the advantages of the ITIL standard,” says Salsburg. “I think the adoption of ITIL really does have a payback for the organizations that adopt it.”

Another area that the CMG is exploring is the realm of business performance management (BPM) and how effective standards and measurement criteria can help define that growing segment of the IT infrastructure.

According to CMG spokesperson Lana Torres, the CMG will also be holding their 33rd Computer Measurement Group 2007 annual conference on December 2 -7 in San Diego, CA. The conference will cover load and stress testing, benchmarking, performance optimisation, software performance engineering, resource management, capacity analysis, simulation and analytic modeling and cost management.

Salsburg explains that the conference would be a good fit for anyone who is tasked with the responsibility of acquiring computer equipment. “We have some people who’ve come to this conference year in and year out,” says Salsburg. “Many of them work at some of the world’s largest IT infrastructures, places where performance testing and capacity planning are vitally important.”

Locking computers

To lock a computer in XP, as you probably know, you press "L" while holding down "Windows Logo" key on your keyboard.
However, if you would like to lock a computer remotely, for example via "Remote Administrator", you don't have this ability. What you can do instead, is to create a shortcut on remote computer's desktop where Target %windir%\System32\rundll32.exe user32.dll,LockWorkStation Start In %windir%

how to display message on start-up ?

Start regedit, if you are unfamiliar with regedit please see our FAQ.Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinlogonModify the key legalnoticecaption with what you want to name the window.Modify the key legalnoticetext with what you want the window to say. Restart.

How to make your Desktop Icons Transparent?

Go to control Panel > System, > Advanced > Performance area > Settings button Visual Effects tab "Use drop shadows for icon labels on the Desktop"

What is Malware ?

Malware is software designed to infiltrate or damage a computer system without the owner's informed consent. Many normal computer users are however still unfamiliar with the term, and most never use it. Instead, "computer virus" is used in common parlance and often in the general media to describe all kinds of malware, though not all malware are viruses. The most costly form of malware in terms of time and money spent in recovery has been the broad category known as spy ware. Spy ware programs are commercially produced for the purpose of gathering information about computer users, showing them pop-up ads, or altering web-browser behavior for the financial benefit of the spy ware creator. For instance, some spy ware programs redirect search engine results to paid advertisements.

How to de-crypt the encrypted files on XP

1. Login as Administrator

2. Go to Start/Run and type in cmd and click OK.At the prompt type cipher /r:Eagent and press enterThis prompt will then display:Please type in the password to protect your .PFX file:Type in your Administrator passwordRe-confirm your Administrator passwordThe prompt will then displayYour .CER file was created successfully.Your .PFX file was created successfully.The Eagent.cer and Eagent.pfx files will be saved in the current directory that is shown at the command prompt. Example: The command prompt displaysC:\Documents and Settings\admin> the two files are saved in the admin folder. (For security concerns, you should house the two files in your Administrator folder or on a floppy disk).

3. Go to Start/Run and type in certmgr.msc and click OK. This will launch the Certificates Manager. Navigate to Personal and right click on the folder and select All Tasks/Import. The Certificate Import Wizard will appear. Click Next. Browse to the C:\Documents and Settings\admin folder. In the Open dialog box, change the Files of Type (at the bottom) to personal Information Exchange (*.pfx,*.P12). Select the file Eagent.pfx and click Open. Click Next. Type in your Administrator password (leave the two checkboxes blank) and click Next. Make sure the Radio button is active for the first option (Automatically select the certificate store based on the type of certifcate). Click Next. Click Finish. (You'll receive a message that the import was successful). To confirm the import, close Certificates Manager and re-open it. Expand the Personal folder and you will see a new subfolder labeled Certificates. Expand that folder and you will see the new entry in the right side column. Close Certificate Manager.

4. Go to Start/Run and type in secpol.msc and click OK. This will launch the Local Security Policy. Expand the Public Key Policies folder and then right click on the Encrypted File System subfolder and select Add Data Recovery Agent... The Wizard will then display. Click Next. Click the Browse Folders... button. Browse to the C:\Documents and Settings\admin folder. Select the Eagent.cer file and click Open. (The wizard will display the status User_Unknown. That's ok). Click Next. Click Finish. You will see a new entry in the right side column. Close the Local Security Policy.You, the Administrator are now configured as the default Recovery Agent for All Encrypted files on the Local Machine.To Recover Encrypted files: Scenario #1If you have completed the above steps BEFORE an existing user encrypted his/her files, you can log in to your Administrator account and navigate to the encrypted file(s). Double click on the file(s) to view the contents.Scenario #2If you have completed the above steps AFTER an existing user has already encrypted his/her files, you must login to the applicable User's User Account and then immediately logout. Next, login to your Administrator account and navigate to the encrypted file(s). Double click on the file(s) to view the contents.*Warning Do not Delete or Rename a User's account from which will want to Recover the Encrypted Files. You will not be able to de-crypt the files using the steps outlined above.

Win RAR crystal 2008

WinRAR is a 32-bit Windows version of RAR Archiver, an archiver and archive manager. RAR files can usually compress content by 8 percent to 15 percent more than ZIP files can. WinRAR's main features include strong general and multimedia compression, the ability to process non-RAR archive formats, ZIP compression and decompression, support for long filenames, programmable self-extracting archives (SFX), repair of damaged archives, authenticity verification, embedded file comments, and encryption. Unicode is supported in archive filenames, allowing non-English filenames to be handled painlessly. You can manipulate the parameters of many archives at once and view a volume sequence as a single archive. WinRAR can convert other archive formats to RAR and search for specified text and files in archives.

Download Link:
http://www.4shared.com/file/35857692/f683942/WinRARCrystal.html?s=1

Thursday, April 3, 2008

Disable Error reporting in your Computer

Many times we get message like "Do you want to send this error report to Microsoft?" and we usually give NO. To disable this follow the steps given below..
1.Right click My Computer and select Properties .
2.Select the advance tab from Properties.
3.Click on Error reporting Button at the last and select Disable option there

Have your PC on track

Do these regularly to make pc fast
follow these things step by step and restart your system after each step

1. Use Add/Remove Programs and uninstall useless software’s loaded in your system

2. In the current Windows drive make 15% minimum free space.

3. Use Disk Cleanup to remove temporary and useless files and use Scan
Disk to manage your allocation table

4.i.Defragment your system when needed
Click 'start' and go to 'run' and type 'msconfig' (without quotes), in
there click on the startup tab and check out any programs which you
think u dont need them to start at ur windows startup, for e.g. MSN,
Yahoo Messenger, ICQ.... but be careful dont uncheck those important
files and the files which you dont understand otherwise ur windows
wont work properly.

ii.Secondly turn off your hibernation...to do this go to:
Control Panel>Power Options>Hibernate Tab>uncheck Enable Hibernation

This thing will save alot of your hard disk space.
take the above mentioned steps whenever necessary and put your PC on Track.

Shortcut to Safely Remove Hardware

To create a new shortcut


1. Right click on your desktop and select New->Shortcut


2.In the location of the item paste
RunDll32.exe shell32.dll,Control_RunDLL hotplug.dll. and click next and then
give a Name to your shortcut and click finish.

You are done with a new shortcut in your desktop now :)

Enabling Remote Desktop in Windows XP

To enable Remote Desktop Connections in Windows XP just follow the below steps..

1. Click on Start button in your desktop.
2. Right-click on "My Computer" and select Properties.
3. Click on the "Remote" tab.
4. Under "Remote Desktop" (the bottom section), check the box labeled "Allow users to connect remotely to this computer".

If you are running Windows XP Service Pack 2, you will need to make sure Remote Desktop isn't being blocked by Windows Firewall:

1. Go to the Start button and then type control in run command box.
2. Open the "Windows Firewall" control panel. If you don't see Windows Firewall listed, make sure that you're looking at the control panels in "Classic View".
3. On the "Exceptions" tab, make sure "Remote Desktop" is checked.
4. On the "Advanced" tab, select "Local Area Connection" and press the Settings button.
5. In the new window that opens ("Advanced Settings"), make sure that the Remote Desktop is checked.

Wednesday, April 2, 2008

PROXY WEBSITE

http://www.samair.ru/
http://www.freeproxy.ru/
http://ecomstudio.net/proxy/
http://www.proxytopsite.com/
http://www.xanproxy.be/
http://ieproxy.com/
http://www.spysurfing.com/
http://www.myfreeproxy.be/
http://worldwideproxy.com/
http://www.proxytastic.com/
http://www.nomorelimits.net/
http://www.proxifree.com/
http://browseatwork.com/
http://www.netsack.net/
http://www.afreeproxy.com/
http://cgi-proxy.net/
http://www.easyproxy.org/
http://www.privatizer.net/
http://www.secure-tunnel.com/
http://www.spiderproxy.com/
http://thestrongestlinks.com/
http://www.unipeak.com/
http://betaproxy.com/
http://proxy7.com/
http://webwarper.net/
http://www.chronicpulse.net/
http://www.proxyking.net/
http://w3privacy.com/
http://freeproxy.us/
http://www.goproxing.com/
http://greenrabbit.org/
http://hujiko.com/
http://poxy.us.to/
http://hidemyass.com
https://proxify.com/
http://projectbypass.com/
http://www.proxymouse.com/
http://letsproxy.com
http://www.the-cloak.com/login.html

Free Web Hosting

http://www.justfreespace.com
http://www.i6networks.com
http://www.addyour.net
http://www.275mb.com
http://www.puzzlehosting.com
http://www.thehostcity.com
http://www.ctrlalthost.com
http://www.30mb.com
http://www.synced.org
http://www.sphosting.com
http://www.freehostia.com
http://www.myhostisfree.com
http://www.sites.canoop.com
http://www.serverheaven.net
http://www.wcoasthosting.com
http://www.rnetwork.org
http://www.225mb.com
http://www.athost.net
http://www.saveitfree.com
http://www.webmastershock.com
http://www.zendurl.com
http://www.bestwebperiod.com
http://www.qupis.com
http://www.100webspace.com
http://www.freesites.com
http://www.suprhost.com
http://www.90megs.com
http://www.juztalk.com
http://www.3-hosting.net

Increasing Menu Show Delay

Start menu/RUN/regedit

HKEY_CURRENT_USER/CONTOL PANEL/DESKTOP/MenuShowDelay

change the value to zero "0"

and than Restart your Computer,
Try click on the Desktop "How Fast when you Click at menu?"
Google