Search My Blog

Thursday, June 30, 2011

The Story of Linux: Commemorating 20 Years of the Linux Operating System

What's all this stuff about Linux? (You ask)...

The Story of Linux

Celebrate the 20th Anniversary of Linux with us. Watch the Story of Linux to remember - or learn for the first time - how Linux has disrupted a market and has

Go there...

The Story of Linux: Commemorating 20 Years of the Linux Operating System

Video Link...

Sweden-based Designer Wins 20th Anniversary of Linux T-shirt Contest with Flying Penguin Design

Today we are very excited reveal that Kim Blanche is the winner of the 20th Anniversary of Linux T-shirt design contest with her simple, thoughtful "Flying Penguin" design.

Our panel of judges reviewed each of the final designs carefully and considered what illustration best celebrates Linux on its 20th anniversary. As Jon "maddog" Hall, one of the four judges, put it: "It is simple, colorful, a nice design."

Kim was born in India but moved to Sweden as a young child. She told us that just two years ago she left a career in nursing to pursue her lifelong dream of becoming an artist. 

"I started with digital art. Before that I worked on my spare time with basic oil, acrylic, coal and pencil. To draw and paint has been my biggest interest since childhood. Today I’m happy that I made my decision to aim for my longtime dream."

With an appreciation for Linux from her software developer fiance, and a head and heart for design, Kim describes the "Flying Penguins" as follows:


The Story of Linux: Commemorating 20 Years of the Linux Operating System
About Us | The Linux Foundation
YouTube - ‪The Story of Linux: Commemorating 20 Years of the Linux Operating System‬‏
Sweden-based Designer Wins 20th Anniversary of Linux T-shirt Contest with Flying Penguin Design |
YouTube - ‪TheLinuxFoundation's Channel‬‏
YouTube - ‪TheLinuxFoundation's Channel‬‏

Should the Internet be Taxed? | WebProNews

Should the Internet be Taxed?

Amazon Shuts Down California Affiliates, Following New Tax Law

On Friday, a new California state law goes into effect that will tax Internet sales through affiliate advertising. Rather than pay such taxes, online retailers like Amazon will instead shut down their affiliate programs in the state. For Amazon, that is said to come to 25,000 sites in California alone.

Was this a wise move by the California government? Tell us what you think.

Democrat Governor Jerry Brown has called it a “common sense idea,” according to one report from the LA Times. Though clearly many disagree with that notion, thinking that it will do more harm that good. Amazon CEO Jeff Bezos has said in the past that the company is protected in the U.S. constitution’s prohibition of state’s interference in interstate commerce:

And in the U.S., the Constitution prohibits states from interfering in interstate commerce. And there was a Supreme Court case decades ago that clarified that businesses — it was mail-order at that time because the Internet did not exist — that mail-order companies could not be required to collect sales tax in states where they didn’t have what’s called “nexus.”

So there’s that, but as my colleague Josh Wolford noted in a recent related article about Texas, more and more states are saying that Amazon affiliates count as physical presences and are enacting sales tax regulations already.

That’s why Amazon has been shutting down affiliate programs. Amazon has told affiliates in the past that they’d have to move to another state to continue earning commissions on referrals. has reportedly done that before too.

It’s worth noting that California’s sales tax rate in general will be dropping to 7.75%. Here is the bill that was signed into law (pdf).

Some groups representing brick and mortars feel the law should be extended on a national level, claiming the taxes take away competitive advantages from Internet retailers that don’t have a physical presence in a particular state. Consumers are able to avoid fees from purchasing from these retailers that they’d otherwise have to pay by buying in-state.

Affiliates have been informed of the termination of their contracts with Amazon. They have received a letter from Amazon saying:

(The bill) specifically imposes the collection of taxes from consumers on sales by online retailers – including but not limited to those referred by California-based marketing affiliates like you – even if those retailers have no physical presence in the state.

We oppose this bill because it is unconstitutional and counterproductive. It is supported by big-box retailers, most of which are based outside California, that seek to harm the affiliate advertising programs of their competitors. Similar legislation in other states has led to job and income losses, and little, if any, new tax revenue. We deeply regret that we must take this action.

Danny Sullivan, a California resident wrote Bezos an open letter “thanking him” on his personal blog Daggle. It begins:

“Thank you for your letter today, informing me that after seven years of being one of your affiliates — and having earned for you about $150,000 in that time — that you “deeply regret” unilaterally terminating my contract with Amazon to be an affiliate. I also especially appreciated the part where you reassured me that this action wouldn’t affect my ability to keep buying from your company. Nice touch.”

He goes on to add that while he is fortunate enough to have a successful day job, the loss of income will have a far greater impact on many other affiliates. He also makes a good point about how Amazon will continue to get paid from existing affiliate links without the actual affiliates getting paid.


I was an Internet Retailer for over 5 Years. I started in 1999, selling Pro Sound gear and Logos Bible Software. I could have never done this without the Internet. With the Cost of Renting a "Brick and Mortar" Building being out of my reach. Never mind actually Building one... The Tax issue has always been a big debate and a problem to deal with. I live in Texas and I had to charge Sales Tax on all Sales Shipped to a TX address. This was very hard to figure out and the Automated Tax and Shipping Systems for Web Sites were just being developed in the first 3 or so years. I had to figure my Tax and Shipping on a Per Customer Basis my self. This required direct contact with the Customer, either by e-mail or by Phone. Needless to say, the biggest majority of my Sales were to out of State Customers. With the "Big Box" Companies being able to Sell the same Products at about what I paid for them. Not to mention, the huge discounts that these "Big Box" Competitors get on Shipping Rates for Volume. So, Out of State Sales, with No Sales Tax was the only way I could Compete. After 5 years I finally gave up the Business. Because it took way more work and time than the money that it ever brought in. I think that California is making a Big Mistake. Taxing Internet Sales. Especially at this time, will hurt them and close down many Small Online Retailers in their State. Consumers will stop buying from Businesses Online in their Own State. And even worse, from Over Seas (more than we already do from "Big Box Retailers)!:O At a time when Sales are hard to come buy. The Big Guys have the Power to just Move On to a more "Cost Effective" State, and they will!


Using magnets to help prevent heart attacks

Using magnets to help prevent heart attacks

June 7, 2011

If a person's blood becomes too thick it can damage blood vessels and increase the risk of heart attacks. But a Temple University physicist has discovered that he can thin the human blood by subjecting it to a magnetic field.

Rongjia Tao, professor and chair of physics at Temple University, has pioneered the use of electric or magnetic fields to decrease the viscosity of oil in engines and pipelines. Now, he is using the same magnetic fields to thin human blood in the .

Because contain iron, Tao has been able to reduce a person's blood viscosity by 20-30 percent by subjecting it to a magnetic field of 1.3 Telsa (about the same as an MRI) for about one minute.

Tao and his collaborator tested numerous in a Temple lab and found that the magnetic field polarizes the red blood cells causing them to link together in short chains, streamlining the movement of the blood. Because these chains are larger than the single blood cells, they flow down the center, reducing the friction against the walls of the . The combined effects reduce the viscosity of the blood, helping it to flow more freely.

When the magnetic field was taken away, the blood's original viscosity state slowly returned, but over a period of several hours.

"By selecting a suitable and pulse duration, we will be able to control the size of the aggregated red-cell chains, hence to control the blood's viscosity," said Tao. "This method of magneto-rheology provides an effective way to control the blood viscosity within a selected range."


Interesting... I wonder if I could make one of those???


Neodymium Magnets

What is neodymium magnet?
The neodymium magnet is majorly composed of 3 elements, i.e. neodymium, iron and boron. So the neodymium magnet is also called NdFeB magnet. Another name of the neodymium magnet is rare earth magnet, which was used to referring to the SmCo magnet but today is majorly used for neodymium magnet since the neodymium magnet becomes more and more popular today. Among the 3 elements, neodymium is the rare earth element.

The neodymium magnets can be made sintered or bonded. The sintered magnet is normally stronger than bonded since the latter conatains rubber or plastic as bonding material. The neodymium magnet is about 8 times stronger than the ceramic magnet but has a lower working temperature. By default, all the sintered neodymium magnets have a working temperature of 80 degree celsius or 176 Fahrenheit.

Go there...

Researchers create rollerball-pen ink to draw circuits
New conductive ink allows circuit prototyping with a pen and paper - Hack a Day
Researchers create rollerball-pen ink to draw circuits
Pen-on-Paper Flexible Electronics - Russo - 2011 - Advanced Materials - Wiley Online Library - silver nanoparticles - viscosity - liquid metal
Pen-on-Paper Flexible Electronics - Russo - 2011 - Advanced Materials - Wiley Online Library
YouTube - ‪Largest neodymium magnet in the world? [HD]‬‏
YouTube - ‪Rodin coil + 120 vac = Flying magnets... separating neodymium magnets via Rodin coil (TEST12)‬‏

Researchers create rollerball-pen ink to draw circuits

Researchers create rollerball-pen ink to draw circuits

June 28, 2011 by Bob Yirka report University         professors create rollerball-pen ink to draw circuits


Image: Wiley

( -- Two professors from the University of Illinois; one specializing in materials science, the other in electrical engineering, have combined their talents to take the idea of printing circuits onto non-standard materials one step further by developing a conductive ink that can be used in a traditional rollerball ink pen to draw circuits by hand onto paper and other porous materials. In their paper published in Advanced Materials, team leads Jennifer Lewis, Jennifer Bernhard and colleagues describe how they were able to make a type of ink from silver nanoparticles that would remain a liquid while in the pen, but would dry like regular ink once applied. The pen could was then used to draw a functioning LCD display and an antenna.

To make the ink, the team produced by reducing a silver nitrate solution along with an acid to prevent the particles from growing too large. Afterwards the acid was removed and the of the ink modified using hydroxyethyl cellulose to get just the right consistency. The result is a sort of that dries on contact and which can be used to conduct electricity, hence its ability to be used in the creation of a circuit.

Silver pen           has the write stuff for flexible electronics

University of Illinois engineers developed a pen with conductive silver ink that can write electric circuits and interconnects directly on paper and other surfaces. Credit: Bok Yeop Ahn

Up till now, most research on printing circuits onto non-standard materials, such as paper, have been done using inkjet printers or even airbrushes. This new approach would allow circuits to be drawn quicker and much cheaper, or even on-the-fly, as no other hardware is needed. Such a low cost device might create a market for throwaway circuits or even super cheap batteries. Paper was used in the study because it is considered to be the most suitable non-standard material for printing circuits due to its wide availability, low cost, ability to be bent and shaped, and the fact that it is biodegradable.

Lewis noted that the paper used in study was folded after testing to see how the circuit would hold up, and discovered it took folding several thousand times before the ink pathways were broken. She also noted that other materials besides paper could be used, such as wood or ceramics.


Researchers create rollerball-pen ink to draw circuits
New conductive ink allows circuit prototyping with a pen and paper - Hack a Day
Researchers create rollerball-pen ink to draw circuits
Pen-on-Paper Flexible Electronics - Russo - 2011 - Advanced Materials - Wiley Online Library - silver nanoparticles - viscosity - liquid metal
Pen-on-Paper Flexible Electronics - Russo - 2011 - Advanced Materials - Wiley Online Library

Remember this Command, alsamixer

Remember this Command, for setting all Sound Settings in Fedora 13 and 14 in the Terminal - Command Line...  "alsamixer"

After you have finnished with your settings. You will need to save your changes or else you will loose them after the next reboot. Here's how it looks when I was done in the command line...

don@Fusion-14-BlueFIC ~]$ su
[root@Fusion-14-BlueFIC don]# alsamixer
[root@Fusion-14-BlueFIC don]# alsactl store
[root@Fusion-14-BlueFIC don]#

Notice that you need to have "root" privelages to save your work. I use "su" in Fedora. In other Distros you mane have to use "sudo". 


alsamixer save settings
alsamixer save settings - Google Search
Linux Blog » alsamixer and alsactl — adjust and save alsa mixer settings
DonsDeals: Remember this Command, alsamixer

Who Says You Can’t Make Money with Open Source? : Jim Zemlin

This week yet another major global IT vendor will launch a product based on Linux - the HP Touchpad, which looks quite promising from early reviews. Even so, it is ironic that I still hear the following comment from a number of investors and business people:

"Open source is great, but you can't make any money with it."

While for some reason this sentiment has existed as long as open source software has been in existence, the facts don't support it; in fact, the facts expose it to be a statement hovering between unbelievable and ridiculous. Red Hat will exceed $1 Billion dollars in revenue this year. Its investors have been richly rewarded over the past decade with more than an 8X return over the S&P 500.

Red Hat's CEO, Jim Whitehurst, expects the company's revenue to TRIPLE to three billion dollars in five years. This is a company whose only business is providing service and support for open source software.

IBM, on its 100th year in business, has been richly rewarded for its billion dollar investment in Linux with a market cap today that eclipsed Microsoft's back in May. I would argue that IBM has created so much shareholder wealth largely because they got open source and they got it early. They built services and products around open source instead of competing with open source.

Can't make money out of open source? Tell that to the investor who put $100k in Microsoft ten years ago. He would now have $69k. Compare that to the IBM investor who would be sitting on $143k made over the same period.

Even Apple, arguably the greatest corporate turn around in the history of computing, has depended on open source to create value for its share holders. Don't believe me? Go to the settings of your iPhone click on "general," then click on "about." Scroll all the way to the bottom and you will find a "legal" button. Click on that and you will find GPL licenses and names such as the Free Software Foundation, Eric Raymond, and more INSIDE YOUR IPHONE. These are hardly Apple fanboys, yet they are given appropriate credit for helping create the software that powers the iPhone.

So I've probably convinced you that open source heavy-weights like Red Hat and IBM make a lot of money with open source. Where the argument gets really interesting is when you widen the net — it is almost impossible to make money WITHOUT open source. With more than 75% of global exchanges relying on Linux for their trading platform, investors can't even make money off of Microsoft stock without trading it on a Linux platform. (Even though that is largely an academic example. As of today, its stock price is down 28% from a decade ago.)

Also consider how Google has used Linux to create a multi-billion dollar search platform.


Who Says You Can't Make Money with Open Source?
Who Says You Can't Make Money with Open Source? : Jim Zemlin
About Us | The Linux Foundation
YouTube - ‪The Story of Linux: Commemorating 20 Years of the Linux Operating System‬‏

Wednesday, June 29, 2011

TDL4 Root Kit Biggest Botnet - So Far... Are you in it!???

TDL4 – Top Bot

TDSS variants

The malware detected by Kaspersky Anti-Virus as TDSS is the most sophisticated threat today. TDSS uses a range of methods to evade signature, heuristic, and proactive detection, and uses encryption to facilitate communication between its bots and the botnet command and control center. TDSS also has a powerful rootkit component, which allows it to conceal the presence of any other types of malware in the system.

Its creator calls this program TDL. Since it first appeared in 2008, malware writers have been perfecting their creation little by little. By 2010, the latest version was TDL-3, which was discussed in depth in an article published in August 2010.

The creators of TDSS did not sell their program until the end of 2010. In December, when analyzing a TDSS sample, we discovered something odd: a TDL-3 encrypted disk contained modules of another malicious program, SHIZ.

TDL-3 encrypted disk with SHIZ modules

At that time, a new affiliate program specializing in search engine redirects had just emerged on the Internet; it belonged to the creators of SHIZ, but used TDL-3.

The changes that had been made to the TDL-3 configuration and the emergence of a new affiliate marketing program point to the sale of TDL-3 source code to cybercriminals who had previously been engaged in the development of SHIZ malware.

Why did the creators of TDL decide to sell source code of the third version of their program? The fact is that by this time, TDL-4 had already come out. The cybercriminals most likely considered the changes in version 4 to be significant enough that they wouldn't have to worry about competition from those who bought TDL-3.

In late 2010, Vyacheslav Rusakov wrote a piece on the latest version of the TDSS rootkit focusing on how it works within the operating system. This article will take a closer look at how TDL-4 communicates with the network and uploads data to the botnet, which numbered over 4.5 million infected computers at the time of writing.

Yet another affiliate program

Skipping on down...

Part of the code modified to work with the TDL-4 protocol.

Upon protocol initialization, a swap table is created for the bot's outgoing HTTP requests. This table is activated with two keys: the domain name of the botnet command and control server, and the bsh parameter. The source request is encrypted and then converted to base64. Random strings in base64 are prepended and appended to the received message. Once ready, the request is sent to the server using HTTPS.

The new protocol encryption algorithm for communications between the botnet control center and infected machines ensures that the botnet will run smoothly, while protecting infected computers from network traffic analysis, and blocking attempts of other cybercriminals to take control of the botnet.

An antivirus of its own

Just like Sinowal, TDL-4 is a bootkit, which means that it infects the MBR in order to launch itself, thus ensuring that malicious code will run prior to operating system start. This is a classic method used by downloaders which ensures a longer malware lifecycle and makes it less visible to most security programs.

TDL nimbly hides both itself and the malicious programs that it downloads from antivirus products. To prevent other malicious programs not associated with TDL from attracting the attention of users of the infected machine, TDL-4 can now delete them. Not all of them, of course, just the most common.

TDSS module code which searches the system registry for other malicious programs

TDSS contains code to remove approximately 20 malicious programs, including Gbot, ZeuS, Clishmic, Optima, etc. TDSS scans the registry, searches for specific file names, blacklists the addresses of the command and control centers of other botnets and prevents victim machines from contacting them.

This 'antivirus' actually helps TDSS; on the one hand, it fights cybercrime competition, while on the other hand it protects TDSS and associated malware against undesirable interactions that could be caused by other malware on the infected machine.

Which malicious programs does TDL-4 itself download? Since the beginning of this year, the botnet has installed nearly 30 additional malicious programs, including fake antivirus programs, adware, and the Pushdo spambot.

TDSS downloads

Notably, TDL-4 doesn't delete itself following installation of other malware, and can at any time use the r.dll module to delete malware it has downloaded.

Botnet access to the Kad network

One of the most outstanding new features of TDL-4 is the kad.dll module, which allows the TDSS botnet to access the Kad network. So what do the cybercriminals want with a publicly accessible file exchange network?

We have known about botnets controlled via P2P for some time now, although until now, these were closed protocol connections created by the cybercriminals themselves. In contrast, TDSS uses a public P2P network in order to transmit commands to all infected computers in the botnet. The initial steps of how TDSS makes use of Kad are given below:

  1. The cybercriminals make a file called ktzerules accessible on the Kad network. The file is encrypted and contains a list of commands for TDSS.
  2. Computers infected with TDSS receive the command to download and install the kad.dll module.
  3. Once installed, kad.dll downloads the file nodes.dat, which contains the publicly accessible list of IP addresses of Kad network servers and clients.
  4. The kad.dll module then sends a request to the Kad network to search for the ktzerules file.
  5. Once the ktzerules files has been downloaded and encrypted, kad.dll runs the commands which ktzerules contains.

Encrypted kad.dill updates found on the Kad network

Below is a list of commands from an encrypted ktzerules file.

  • SearchCfg – search Kad for a new ktzerules file
  • LoadExe – download and run the executable file
  • ConfigWrite – write to cfg.ini
  • Search – search Kad for a file
  • Publish – publish a file on Kad
  • Knock – upload a new nodes.dat file to the C&C which contains a list of Kad server and clients IP addresses, including those infected with TDSS.

The most interesting command is Knock. This command allows the cybercriminals to create their own Kad P2P, the clients of which are exclusively TDSS-infected computers.

How publicly accessible and closed KAD networks overlap

Skipping on down...


Oldest first
Threaded view

Christophe Brocas

2011 Jun 27, 13:49

TDLx detection DNS

Thank you for this analysis :)

In corporate environment, a http/https proxy is often (almost always) used. Proxies do the DNS name request and not individual desktops.

My question : does TDL4 malware try to do direct HTTPS access to its C C server first before eventualy try the corporate proxy ? If so, TLD4 infected PCs can be detected in corporate DNS server logs.

Every DNS request to resolv Internet domains coming from PCs and not corporate proxies can be interpreted as signals on infection on that PCs.

Am I right or totally wrong (I think I am wrong ... too simple solution to be the right one but I ask ...) ?

Thank you for your reading and answer :)


Sergey Golovanov

2011 Jun 27, 15:23

Re: TDLx detection DNS

Surprise! You are right) So you can detect tdl4 connections over proxy.

If you would like to comment on this article you must first


November 16, 2010, 11:02AM

TDL4 Rootkit Bypasses Windows Code-Signing Protection

TDL4In recent versions of Windows, specifically Vista and Windows 7, Microsoft has introduced a number of new security features designed to prevent malicious code from running. But attackers are continually finding new ways around those protections, and the latest example is a rootkit that can bypass the Windows driver-signing protection.

The functionality is contained in TDL4, which is the latest version of an older rootkit also known as TDSS and Alureon. TDSS has been causing serious trouble for users for more than two years now, and is an example of a particularly pernicious type of rootkit that infects the master boot record of a PC. This type of malware often is referred to as a bootkit and can be extremely difficult to remove once it's detected. The older versions of TDSS--TDL1, TDL2 and TDL3--are detected by most antimalware suites now, but it's TDL4 that's the most problematic right now.

TDL4 has a specific function that is designed to bypass a protection in Windows 7 and Windows Vista that requires kernel-level code loaded onto a machine to be signed. The Windows kernel-mode code signing policy is mainly applicable on 64-bit machines.

"Starting with Windows Vista, kernel-mode code signing enforcement is implemented by a component known as Code Integrity. Code Integrity is a feature that improves the security of the operating system by verifying the integrity of a file every time that the image of the file is loaded into memory. The function of Code Integrity is to detect if an unsigned driver is being loaded into kernel-mode, or if a system binary file has been modified by malicious code that may have been run by an administrator," Microsoft says in its explanation of the functionality.

The TDL4 rootkit has implemented a feature that evades this protection by changing the boot process on protected machines, according to an analysis of TDL4 by Sunbelt Software. The rootkit accomplishes this by going in and modifying which programs Windows will allow to load an unsigned driver.

"The boot option is changed in memory from the code executed by infected MBR. The boot option configures value of a config setting named 'LoadIntegrityCheckPolicy' that determines the level of validation on boot programs. The rootkit changes this config setting value to a low level of validation that effectively allows loading of an unsigned malicious rootkit dll file. The rootkit dll is kdcom.dll, which is an infected version normal kdcom.dll that ships with Windows," Sunbelt's Chandra Prakash wrote in the TDL4 analysis.


There are ways to Delete these types of Trojans. I routeenely Restore - Rewrite a corrupted MBR with any of many Live Linux Restore CD's like, Parted Magic or System Rescue CD. Super Grub Disk works great on Grub 1, but I haven't been sucessful with the new version for Grub 2 yet (as of 06-29-11). Or you can forget all of your Windows Worries by just by Installing one of my favorite Linux Distros, like Fedora, ArtistX, Mint or Debian!;) The Best Windows Boot CD that I have found, for fixing - repairing many Windows Problems is Hiren's BootCD. Check it out here...

And UBCD is great for DOS Apps for fixing many Hard Drive Related issues. Ultimate Boot CD is completely free for the download...

TDL-4 the name for both the bot Trojan
tdl-4 trojan - Google Search
tdl-4 - Google Search
Massive botnet 'indestructible,' say researchers - Computerworld
TDL4 Rootkit Bypasses Windows Code-Signing Protection | threatpost
TDSSkiller / TDL4 - Norton Community
TDSS. TDL-4 - Securelist
TDL4 – Top Bot - Securelist
Rootkit.Win32.TDSS.tdl4 that won't go away? - Malwarebytes Forum
TDL4 persistent. ComboFix found it 3 times and disinfected it 3 times! Hitman found MBR.exe. - Malwarebytes Forum
YouTube - ‪TDL4 rootkit removal using Warrior CD‬‏
YouTube - ‪UnHackMe detects and kills TDL3++ (or TDL4) rootkit under Windows Seven 64 bit‬‏
YouTube - ‪greatissoftware's Channel‬‏
greatissoftware - Google Search
Greatis Software - Software Publisher Profile - CNET Downloads
Products and Services - Greatis Software
RegRun Warrior - Removing rootkits is best done from the clean Windows - Greatis Software
RegRun Reanimator - free Trojan/Adware/Spyware removal tool - Greatis Software
bartpe - Google Search
Bootable CD's
Bart's Preinstalled Environment (BartPE) bootable live windows CD/DVD
bartpe - Google Search
bernards bootable cd - Google Search
hirens boot cd 11 - Google Search
Hiren's BootCD 12.0 - All in one Bootable CD »
DonsDeals: Rootkit infection requires Windows reinstall, says Microsoft - Computerworld
hirens boot cd 11 - Google Search
YouTube - ‪Hirens Boot CD v 13‬‏
YouTube - ‪Reset Password Windows XP/Vista/7 by Hiren's BootCD‬‏
ubcd - Google Search
YouTube - ‪Ultimate Boot CD‬‏
YouTube - ‪UBCD4Win - How I Use Ultimate Boot CD For Windows‬‏
YouTube - ‪Boot the Ultimate Boot CD as an ISO file from a USB flash pen drive‬‏
ubcd - Google Search
Ultimate Boot CD - Overview