- Watch the installationStay alert during the installation. If you have the option, always opt for the custom installation. You'll probably have a choice of where the program plants its icons. Besides avoiding system tray litter, you can also stop programs from adding icons to the Start menu and desktop.
- Protect your system trayWinPatrol is a free early-warning system that stops unsavory programs, such as Trojans, phone dialers, and spyware, from doing damage to your system or reporting your surfing habits to others. WinPatrol watches for anything that adds itself to the Startup group or Windows Registry, flags suspicious items, and offers to remove nasty programs. In order to remove or disinfect the offending program, you'll still need a spyware removal tool, such as Spybot, and an antivirus program.
- When WinPatrol starts yelling about an unwelcome entry, you can allow the program into your Startup group if it's legit; if you say no, and the program tries again, WinPatrol blocks subsequent attempts. That's especially handy for notoriously insistent programs such as QuickTime, RealPlayer, and MSN Messenger.
- WinPatrol also lets you see a list of Active Tasks, cookies, and Win XP's running Services, and it works with all versions of Windows. In most cases, you can also gain some insight into the applet's source and purpose. For $13, WinPatrol Pro provides an extensive database to further identify what's trying to get into your system tray. The program is available at http://www.oreilly.com/pcannoyances.
- Make a clean sweepStart by hovering the pointer over the icon to identify the application it belongs to -- then decide if the icon needs to be in the system tray. (Most don't. Programs such as RealOne Player, RealPlayer Jukebox, ATI's Video Manager, and AOL's Instant Messenger are typical culprits.) Select Start > Programs ("All Programs" in XP) > Startup to see what's in your Startup group, and you'll probably find a few programs you can dump.
- To dig deeper, use Windows msconfig (select Start > Run, type msconfig, and press Enter) or use Startup Control Panel, a free utility that lets you examine and remove programs that are loaded at startup (get it at http://www.oreilly.com/pcannoyances).
Sunday, June 17, 2007
PROTECT YOUR SYSTEM FROM DUMB INSTALLATIONS!!!
Thursday, June 14, 2007
PROTECT YOUR PASSWORDS FROM HACKERS!!!!!!!!
- A lot, and I mean a lot of people are infected with Magic PS. Especially with Magic PS 1.5 Second Edition. If you don't know what is Magic PS. Magic PS is a trojan, simply a program that steal your Yahoo! Messenger 5 or 6 user name and password to the sender. Magic PS 1.5 SE no longer show itself in the Message Archive, so checking there won't help.
- If the sender is stupid enough, he/she would sent you the file "sender.exe", DO NOT accept it because it is the default name for a MPS created file.
- Check your computer for certain files such as these:
- regsvr.exe in c:\Winnt or c:\Windows ; depends on version of Windows.
- MsAgent32.exe in c:\*Win installed folder*\system 32
- Perflib-Perfdata in c:\*Win installed folder*\System32
- PIF in c:\*Win installed folder*.NTMSJRLN in c:\*Win installed folder*\system32\NtmsData(Sender.exe)
- MPSmmtask0.exe in c:\Documents settings\*User Name*\Local settings\Temp
- The sender.exe (can be any name) file may also contain a text string "UPX-Scrambler RC1.x -> ?OnT?oL". You can see this by using a hex editor, etc.
- MPS 1.5 SE hides the (sender/hacker) Yahoo! ID in the sender.exe file, it is scrambled so even with a hex-editor, you still cannot view it. To reveal the (sender/hacker) Y! ID, simply reverse-engineer the sender.exe file.
- Solution :: Do not receive any executable files from a unknown person on chat.
2: BY using fake login screens.
They ask you to have a look at their picture by sending a link to yahoo fake login screen. It exactly look like mail.yahoo.com page or photos.yahoo.com page.It will ask you to enter your ID & password to login. If you enter your details those login details directly goes into hackers inbox. So be careful of these kind of attacks.
3: Cracking passwords By using Yahoo Password Cracker.
There are many Password crackers out for cracking Yahoo passwords.If you are using a dictionary based password like ? something, 12345, abcdef, Attitude, etc? It takes hardly 3 hours for a good cracker to crack the password.
Solution : Never use dictionary based passwords. Use a password like this..Example : (Sec*)Pass+) . This kind of passwords are impossible to crack
Friday, June 8, 2007
HOW TO REPAIR XP AND AVOID A FULL REINSTALL!!!!!!!!!!!
- While this may seem like very little comfort when compared to XP's many shortcomings, these tips can often keep a bad day from getting a lot worse, if you know what I mean.
- Let's start by looking at some tips and utilities for dealing with XP issues before jumping into a XP reinstall.
- Last known good config: Always the easiest to try first before settling for a reinstallation of Windows XP. Reboot the PC and tap F8 while you wait for boot options to be displayed for you. Once there, choose "Last known good configuration."
- System restore: In some cases, a reinstallation can be avoided by using system restore. If you are unable to get system restore to work from within safe mode, you can try to access it from within a command prompt. You do not need to leave safe mode to do this, just follow these instructions closely:
- Reboot into safe mode with a command prompt.
- Get to an administrator account so that you have the needed permissions to get things done.
- At the command prompt, type: %systemroot%\system32 restore strui.exe
- Follow the instructions to restore your PC to an earlier state of operation.
- Recovery console: The XP recovery console can be a very useful utility when employed with care. There are a variety of situations where having access to it can be really handy. In fact, you need to get access to it before we go any further.
- Reboot from the Windows XP CD. Once you arrive at the welcome screen, choose "R" for recovery.
- You will be asked which Windows installation you wish to access. Choose the appropriate number.
- Now a prompt for your administrator password will appear. Enter it and continue (if no password, press enter).
- Now we are ready to roll up our sleeves and get to work. While at the console, you can type help for a list of available commands that are at your disposal. For example, you can repair a messed up boot sector by typing FIXBOOT and then typing enter afterward. If you are having difficulty booting up because of a messed up ntldr file, however, then you might need to replace it by typing:
- COPY E:\i386\NTLDR C:(Keep in mind this is assuming that E: is the correct drive letter for your CD ROM drive). Once you have repaired what you have needed to from the recovery console, simply type EXIT at the prompt to leave and restart Windows.
Boot from your XP installation CD.
- At the welcome screen, choose enter.
- Once at the license agreement, press F8.
- At the next screen, choose to repair the selected Windows XP installation by pressing R.
- The files will begin to install and then your PC will reboot. During the reboot you will be presented with option of booting from the CD again by pressing any key. Don't press anything. Allow it to finish the install without booting from the CD again.
- Full reinstallation of Windows XP: If all else fails and you are ready to completely delete everything on your hard drive, then you are ready to do a full reinstallation.
- You will be erasing everything, so make sure you already have a backup of any important data before you continue. Follow the instructions above 'til you arrive at step 4. At that point, choose to continue installing a fresh copy of XP on your system and NOT the repair option. Black Viper has a great walkthrough that will take you step by step through the nuances of setting up your partitions, formatting, etc.
Sunday, June 3, 2007
CONVERT CASSETTE TAPES TO CD!!!!!!!!!!
HARDWARE:"Cassette Deck ,Computer With Sufficient Harddisk (to store the .wav files) and RAM (to edit and process the files), CD Writer, Soundcard Interconnect cables for connection between the cassette deck and the soundcard, SOFTWARE"
Noise Reduction Software or Plug-in (Optional)
CD Authoring Software
CONNECTIONS & PROCEDURES:
- Connect the LINE OUT of the Cassette deck to the LINE IN of the Computer Soundcard
- Select the soundcard as the prefered recording device (under control panel - multimedia icon)
- Ensure the LINE IN Fader on the audio mixer of the computer is not muted
- Launch the audio recording software
- Depending on the software used, activate and check all the settings to allow recording
- If possible, monitor the incoming signal from the cassette deck using the audio software to ensure the incoming signal is not clipping (Too Hot; Levels Too High)
- Set the appropriate levels for recording and rewind the cassette tape.
- Activate the recording on the computer and playback the cassette tape
- Once the material on the cassette tape has been recorded into the computer, save the material as .WAV format and edit the wave files accordingly.(Break them up and save them into the individual tracks; process the files with the noise reduction software; edit out the unwanted parts; etc.)
- When all editing have been completed, the number of .wav files should correspond to the number of songs on the cassette, unless some songs have been omitted.
- Next, close the audio recording software (Be sure to save all your work) and launch the CD authoring software.
- Select for audio CD writing and import the .wav files and arrange them according to the sequence required (Exact procedure of import would be dependent on the software used)
- Load in a blank CDR disc and write to the disc using disc-at-once mode and finalized as a CD-DA format (Exact procedure of writing would be dependent on the software used)the computer, audio recording software and noise reduction software, your editing skills, etc.
Chose a good CDR disc to ensure durability and intergity of the disc.
Try with different brands to see which works well with your CD writer and can playback on your CD Player.
Remember that the limit for a regular CDR is 74mins of audio or 650M byte of data.
If you use a 80mins CDR disc, make sure both the CD writer and CD authoring software supports it.
There are many software out there, some are specifically for recording or CD authoring while others are an all-in-one solution.
Pick one that is most suitable to your needs, applications and budget.
Ultimately, the quality of your end result will depend on several things such as the inital sonic quality of the cassette, the quality of the soundcard used, the power and flexibility of
Saturday, June 2, 2007
WHAT CAUSED MY BLUE SCREEN OF DEATH(BSoD)!!!!!!!!!!!
- Firstly, when your system crashes, by default it saves a file to your hard drive with quite a bit of information. Those files are called Dump Files and they are located in the C:\windows\minidump folder. The files are created using either of these two naming conventions:
- Minixxxxxx-0x.dmp where xxxxxx is the date the system cashed and -0x corresponds to the number of times the system crashed that day. The higher the -0x number the more recent the crash.
- Dumpxxxxxx-0x.dmp where xxxxxx is the date the system cashed and -0x corresponds to the number of times the system crashed that day. The higher the -0x number the more recent the crash.
Let's start decrypting the info found in the dump file.
- First, we need to download and install the Microsoft Debugging Tools from here: U WANT TO BE MICROSOFT DEBUGGING TOOLS : Post Your Mail ID to following this Link http://www.blogger.com/email-post.g?blogID=838102387059097317&postID=5696605637935079135
- After installing we open the Debugging Tools by going to the Start menu > Programs > Debugging Tools for Windows > windbg . When the Debugging Tools for Windows program opens click on File then Symbol file path. Put this in the text box: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
- Now click the OK button. Now we open the dump file by clicking File then Open Crash Dump. We browse to the C:\windows\minidump folder and choose the dump file we would like to look at. When it's done loading you'll see the words "BUG CHECK ANALYSIS" in an * box.
- In the text box below (to the right of kd>) type in !analyze -v to get a word-for-word output of the error. Once it is completed look for the section the text right after "BUG CHECK ANALYSIS". There you will have some words with underscores in between each word. Sort of like IRQL_NOT_LESS_OR EQUAL. That will help you find a solution to your problem. Also, scroll to the section IMAGE NAME: . The words after that will tell you what file caused the error.
RECOVER DELETED FILES!!!!!!!!!!!
- The first step is to make absolutely sure that it has been deleted. Open your Windows Recycle Bin and double-check. Is it in there? If so, simply right-click on the file and choose Restore.
- If you have emptied your recycle bin since deleting the file or folder you need, you still have an option, though. Restoration is a free utility that can search your computer for deleted files. Recovering them is a snap. And you don't even have to install the program - it can run from anywhere, including thumbdrives or CD-ROMs.
U WANT TO BE DOWNLOAD THE RECOVER DELETED S/W: Post Your Mail ID to following this Link http://www.blogger.com/email-post.g?blogID=838102387059097317&postID=215922876132193471
- After you have downloaded the file, double-click the icon and it will extract itself into a folder. Open the folder (it will probably be called something like REST.Zip) and double-click the icon that says Restoration. You should see a screen similar to this one:
- Now, you can click the Search Deleted Files button, and it will display every file on your PC that was deleted and might be recoverable.
- Note: Files removed from your recycle bin MAY NOT have the same name as when you deleted it. For instance, if I delete the file "Firefox Setup.exe", it may appear in Restoration as "DC411.exe". The trick is to look for files that are in a folder called C:\RECYCLER\ or something similar in the Restoration screen.
- The best way to find a file by far is to sort by deletion date. If you know that you deleted the file today, it can go a LONG way towards finding the correct file to restore.
- Once you find the file, just click on the Restore by Copying button, and you will be prompted to save the file somewhere. It's always a good idea to save the file to a different drive than the one you are recovering it from
- We hope this helps you recover your deleted files!
MY COMPUTER IS SLOWING DOWN,"WHAT CAN I DO"!!!!!!!!!
- How much free space do you have on your hard drive? Between 15% and 20% is ideal. XP and the other programs you have, not only require RAM memory to work, but also use your Hard Drive (Virtual Memory, which allows a computer program to behave as though the computer's memory is larger than the actual physical RAM. The excess is stored on hard disk and copied to RAM as needed.) Many large or data intensive programs and games these days require a lot of memory to operate seamlessly (no stalls or freezing).
- One thing you can do to save space is go to Control Panel >System >System Restore Tab >make sure the box 'turn off System Restore on all drives' is NOT checked >move the slide bar to 4% to 6%, (this will give you more than enough restore points and free up 6% to 8% of your HD. (That's 6 to 8 gigs on a 100 gig drive) >OK.
- Another thing you can do is clean up your personal files and to save the important ones to disk/CD, delete the garbage files and only keep the important current files. Also, uninstall programs you are no longer using (either use the program's uninstall process or the Add/Remove Programs in the Control Panel). Remember, you're aiming for 15% to 20% free HD space.
- If you need all the programs and data files, think about installing a slave hard drive and saving your files to that .. programs too (other than operating system).
- In Internet Explorer go to - Tools >Internet Options >General Tab >Delete Files while there, Delete Cookies also. Note: This does not delete your Favorites, but login information to your favorite sites will be deleted. If you don't have a printed list of login names and passwords, now is a good time to make one before deleting cookies. (For security purposes, you should never keep your passwords on your PC). However, a program such as Webroots 'Window Washer' will do all this for you while protecting the login information from being deleted. If you are using other browsers, ask in a post for instructions.
- Have you run chkdisk? This will check your C: drive (or which ever drive you have your operating system on) for errors, and repair any damaged or changed Windows files. You do this by going to Start > My Computer > right click C: drive >Properties >Tool >under Error Checking >Check Now > check both boxes >Start. It may say that chkdsk will run when you next reboot .. Reboot/restart now and let chkdsk do its thing. Note, if you have tweaked the registry to change some of the windows features, they will return to their default settings.
- Defragment your Hard Drive. As time goes on, the information on your Hard Drive becomes displaced and scattered. Your HD has to work harder finding this data and putting it together when you need it. Defragmenting pulls the data all together, making retrieval faster and working the HD less. To defragment go to Start >Programs >Accessories >System Tools >Disk Defragment. (You can also defragment from the same window as you used when you checkdisked). You should try to do this a least once a month, more if you're a heavy user. If you haven't done this at all or for quite some time, this process can take awhile to complete. Let this be the last thing you do at night or if your not going to need the computer for an extended period. Regular defraging will not take so long in the future. Defraging is best done in 'Safe Mode', this way there are minimal programs working in the background which slow down the process.
- Have only one anti virus program running. More than one running can cause conflicts and slow you down.
- Before doing any of the following steps, make sure System Restore is turned on (it should be if you have adjusted the setting to 4% to 6% above) you create a new Restore Point. Start > Help & Support > select 'undo changes to your computer with System Restore >click the radio button 'Create a Restore Point' >Next >type in a name that you'll remember should you need to restore .. something like Good Restore Point .. >Create ..a restore point will now be created and you can go on to the next steps.
- Other areas that can cause slowdowns are the programs that run in the background. There are 2 built in utilities in XP that manage these. The first is msconfig .. go to Start >Run >type in msconfig >OK >Startup tab. Here you will see a listing of programs, the ones with a check mark in the box are running the second you turn on your computer. Most software companies feel that their program is so important, that you'll want it available in a split second. Most of these programs are taking up valuable RAM memory and slowing down the bootup process as well as your programs in general. With the exception of security software and a few others, most do not need to be running. You can uncheck the boxes of the ones you want stopped and click Apply >OK. It will then ask if you want to restart your computer for the changes to take effect >select to restart. When Windows starts up again, a configuration window will open. Just click the box saying not to show this notice again >OK. Your done. Should you want easy access to a particular program, you either go to Start >All Programs, or create a shortcut on your desktop (this does not take up memory). Note: by stopping the program from running, you are not deleting it, nor are you stopping access to it. You can always go back in and check the box again. If you have any questions on these startup programs. Feel free to ask the advice of our members in your post.
- The other utility is Services. You can open this utility by either Start >Run > type in services.msc >OK or by going to Control Panel >Administrative Tools >Services. Here you can have various services selected to be in automatic (running), manual (only runs when you activate the program) or disabled (not running and not available to be run manually). If you are knowledgeable in what these services do, change the settings by double clicking the line and changing the drop-down to the desired action. If you are not sure ... DO NOT CHANGE!! You can really mess things up. Again, if you have any questions about the various services ask our members in the Q&A forum.
- Another area to cleanup is the Registry. As programs are opened and shut, added and removed and settings are changed, registry keys are created. These keys tell Windows what to do. When you uninstall a program for example, registry keys are deleted, but not all. After awhile, your Registry will contain keys that no longer do anything .. they just sit there and start to take up space. There are third party Registry cleaners that will cleanup and dump these keys. One such cleaner is CCleaner (aka Crap Cleaner), it's a free program, the link can be found on our recommended software page. As mentioned above in cookie cleaning, this little utility will also clean up cookies and has an option to leave the cookies you don't want deleted.
- Here's a brief description on its use, after downloading and installing Ccleaner:
- Go to Start > programs > Ccleaner >Make sure the "windows" tab is selected >Under "internet explorer" tick the following boxes ...Temporary internet files - Cookies - History - Recently typed URL's (leave this unticked if you DON'T want to clear the drop down list in the address window of IE) and Delete index.dat files.
- Next under "Windows explorer" > All boxes ticked except 'Other explorer MRU's' (leave this unticked if you DON'T want to clear lists such as the start un list)
- Under "System" - Empty recycle bin - Temporary files - Memory Dumps - Chkdsk File Fragments - Old Prefetch data
- If there are any cookies you want to keep (if you remove the cookie for a site you require a password for, you will need to re-enter your password when you next visit that site) ... click options > cookies > then keep the cookies you want. You may of course check any or all boxes as you wish, but these are the main ones we suggest.
- Click the Analyze button and Ccleaner will scan the Registry for the 'orphaned' keys. When it's finished, click the Run Cleaner. You will get a popup window stating that 'The process will permanently delete files from your system' click OK . A message in the upper window will now state the 'Cleaning is Complete' , you may now shut down the program. It is suggested to do this about once a week or when doing your general maintenance with the other cleanup steps.
- Finally, the key to having a smooth running computer is having a good maintenance routine and to be protected with a firewall, anti virus and anti spam programs. We have articles on these subjects and have a recommended utility programs page (free and retail), so please check this out. You can get to all of these articles and utility programs from the Home page.
Friday, June 1, 2007
7 STEPS FOR PREVENTING LAPTOP THEFT!!!!!!!!!
3. Purchase Insurance coverage for your laptop. If it is company property, be certain under what conditions a theft is covered. If the laptop is your property, check with your insurance agent and determine if it is covered under your homeowners or renters insurance. Also what theft situations are covered, such as on business or pleasure travel. If coverage is not provided, obtain additional coverage as a rider to your policy.
4. Utilize a laptop security cable. We get numerous reports of laptop theft when the owner leaves his or her office or cubicle for just a moment to go down the hall or to get a drink of water. Another time to be cautious is during meetings, laptops are used, a quick break is called and when everyone returns, some of the laptops are missing. Remember thieves have better access than you might think and are very quick.
5. Be certain to back up all important data daily. Remember the hardest thing to replace when a laptop is stolen is the lost data.
6. Encrypt the most important data. The most valuable part of a stolen laptop is the data. Many groups have cash bounties out for particular information that can be resold for identity theft or competitive use.
7. Protect the data and access of the computer with strong password and or a hardware key device. Hardware key products include fingerprint identification devices or other access control devices that plug into the USB port.
We can all learn to be more attentive to the people and our surroundings, so that we can protect our property and our lives.
2. Realize that you are the prospective PREY or VICTIM.
3. Always keep your belongings in your sight and preferably in direct contact with your body or a tether device.
4. Be suspicious of unusual activity and keep your property closer to you until this activity is over and any threat has diminished.
5. The use of laptop security cables to lock down your property or lock it together will significantly reduce the risk of theft.
6. Put a label or tape your business card to the top of your laptop. Too many business travelers are using the same brand and model of laptops leading to confusion and in some cases the picking up of someone else’s laptop when going through security. The business card or label provides identification quickly when retrieving your laptop or trying to prove ownership in a mix up or attempted theft.
REMOVING VIRUS FROM THE SYSTEM VOLUME INFORMATION FOLDER!!!!!!!!!!
"You may not even be able to see the folder at all"
- The second method allows you to save your restore points but remove the virus.
- This method requires playing around with system files so if you are not comfortable doing that, then use the method above.
- First, note the location where the Virus Scanner located the virus. Often you will find this information in the scanner's log file. In this case the location will be a series of numbers. (it will look like BB33ED9C-9125-42AF-92C0-EA614B1F488E:RP45:A01197455)
1. Click On My Computer and choose Tools then Folder Options then click on the View tab. Scroll down till you see Hidden Files and Folders and check the "Show Hidden Files and Folders". Now scroll down to "Hide Protected Operating System Files" and uncheck it then down to "Use Simple File Sharing Sharing" and uncheck it as well.Close the dialog box.
2. Now navigate to the System Volume Information folder, right click on it and choose Properties then Click on the "Security" Tab . Click ADD and add the name of the user that is currently logged on. An incorrect name will not be accepted. Check all the boxes on the left column. Click OK and Ok again.
3. You can now open the System Volume Information folder.
4. Locate the number (it will look like _restore{BB33ED9C-9125-42AF-92C0-EA614B1F488E}) and open the folder. Look for the second part of the number (it will begin with RP). Open it, then look for the last part of the number your anti virus scanner showed (it will look like A01197455.ini_ ) and delete it.
5. Close down everything then reverse the above steps in order from step 4 to step 1.
Thursday, May 31, 2007
LAPTOP CARE!!!!!!!
Laptops should be transported in their protective carrying cases at all times.
- Laptops should be protected from temperature extremes, precipitation (rain, snow, sleet, and ice) and dampness.
- Staff members should refrain from placing drinks or food near laptops and in places where spills could cause damage to the laptop.
- Staff members should note that insurance coverage has been purchased for the office’s laptops. However, the coverage provides only reduced, or no coverage in the following instances:
- Theft,vandalism, or pilferage of a laptop left in an unattended automobile;
- Disappearance of a laptop (i.e., a laptop turns up missing during the performance of a physical inventory, or vanishes without any signs of a break in);
- Damage caused by insects, vermin, corrosion, rust, dampness, dryness, freezing or extremes of temperature;
- Damage caused by exposure to rain, snow, sleet, or ice; and Damage caused by rough handling
- The laptops are provided with all the necessary software. Do not download any software to the laptop, or install any software to the laptop without the approval of the Network Administrator. Laptop Security, In the Office
- Laptops should be secured when not in use and overnight. Doors to offices with laptops should be locked over the lunch hours.
- A designated staff person will be responsible for the safeguarding of, and accountability for, any laptops not assigned to a particular staff member.