Wednesday, July 15, 2009
Turn on Internet Connection Firewall in Win XP
To turn on Internet Connection Firewall:
1.Point to Control Panel, double-click Network and Internet Connections, and then click Set up or change your home or small office network.
2.Follow the steps in the Network Setup Wizard to turn on the Internet Connection Firewall.
When you choose a configuration in the wizard that indicates that your computer is connected directly to the Internet, the Internet Connection Firewall is turned on.
Windows XP Service Pack 2 (SP2) and Windows Vista come with Windows Firewall automatically turned on
What is Malware and How Do I Know if I My Computer Is Infected?
Various symptoms can be associated with malware, so any one (or a combination) of the following symptoms could be good indicators of malware infection.
Browser Redirects, Popups, Homepage Changes: The browser may suddenly redirect to an unknown website, or a previously set homepage may change without warning or input.
Slow Computer Response: The computer may seem to "lock up" or run slow during regular use. It is also not uncommon to experience delays in the operating system loading to the desktop.
Processor Utilization at 100% in Task Manager: The processor seems to be working overtime and/or slowly. To check the processor utilization or the Kernel Memory status, press the "ctrl"+"alt" +"del" keys at the same time. Then click the Performance tab. Processor utilization is indicated by the CPU Usage gauge.
Virtual Memory Low Message: This message will keep appearing no matter what changes are made to resolve the issue.
For detailed information on Malware, refer to the Wikipedia entry on Malware: http://www.wikipedia.org/wiki/Malware
Restore Previous Backup in Windows XP
When prompted to select which computer, select New computer, and click Next.
When prompted about the Windows XP CD, select the last choice, I don't need the Wizard Disk. I have already collected my files and settings from my old computer, and then click Next.
When prompted to select the location of the files and settings, insert the disk (CD, DVD, floppy) into the appropriate drive, or connect the storage medium (USB disk/drive) on which your saved your last backup.
Click to select Other, and then click Browse.
The Browse For Folder window appears.
Browse to the location of your previously created backup image, and then click OK.
Click Next to start the transfer.
After the wizard completes, the files and settings backed up previously should now be present on your system.
Back Up Files and Settings in Win XP
To use the Files and Settings Transfer Wizard as a backup utility:
On the Start menu, click Programs, point to Accessories, System Tools, Files and Settings Transfer Wizard.
Click Next.
Because you are collecting data, select Old Computer (even if this is your primary system) and then click Next.
A Please Wait screen displays as the Wizard collects the locations of some files. This screen may remain for several minutes; if the hard drive activity light is visible, it is still running.
On the next screen, select Other. Save the wizard's data file to your storage medium of choice.
At this point, you can save the data file to a temporary location on the hard drive (for example, the Desktop), and then copy or move it to the backup storage medium of your choice at a later time. Backup storage includes external hard drives, CDs/DVDs, and USB memory keys.
Click Next.
Under What do you want to transfer?, select the appropriate option. The Settings only option requires very little space, whereas the Both files and settings option requires however much space all the files take up. This can be a significant amount of data.
The Let me select a custom list of files and settings when I click Next option is for advanced users who know where additional file folders they want to keep are located. If you want to add additional files to the backup, select this option.
Click Next. If any programs require special procedures, they are mentioned now and instructions are provided.
The file collection process begins.
You may now save the .DAT file generated by the Files and Settings Transfer Wizard to the storage medium of your choice (mentioned in Step 5), as long as you selected the appropriate option in the steps above
Repair Tools for the Conficker Family of Viruses
http://www.confickerworkinggroup.org/wiki/pmwiki.php?n=ANY.RepairTools
Monday, July 13, 2009
How to use Multiple Yahoo Messenger in a single computer
2. Click Run
3. Type “regedit” without the quotes, press Enter
4. Navigate to and expand the following in the said order: HKEY_CURRENT_USER> Software> Yahoo> pager >Test
5. Right-click on Test and create a new DWORD value (32 bit).
6. Rename that value as “Plural” without the quotes.
7. Set the value of “Plural” to 1.
After that close that window and click to yahoo messenger. And then enjoy it.
Sunday, July 12, 2009
Conficker worm - Beware!!!
What does the Conficker worm do?The Conficker worm has created secure infrastructure for cybercrime. The worm allows its creators to remotely install software on infected machines. What will that software do? We don’t know. Most likely the worm will be used to create a botnet that will be rented out to criminals who want to send SPAM, steal IDs and direct users to online scams and phishing sites.
The Conficker worm mostly spreads across networks. If it finds a vulnerable computer, it turns off the automatic backup service, deletes previous restore points, disables many security services, blocks access to a number of security web sites and opens infected machines to receive additional programs from the malware’s creator. The worm then tries to spread itself to other computers on the same network.
If you have a computer that is infected, you will need to use an uninfected computer to download a specialized Conficker removal tool from. The tool is available here:
http://www.symantec.com/security_response/writeup.jsp?docid=2009-011316-0247-99
Or, you can restore access to security web sites on an infected machine by taking the following steps:
Click Start > Run. In the Run box, type the following: cmd Click OK. Type the following and then press Enter. cd.. Repeat the previous step until you get to the root level, or C:\>. Note that if your root drive is not C, the letter will be different. At C:\> type the following: net stop dnscache Press Enter. This disables the domain blocking feature of Conficker and you should now be able to reach security Web sites including ours.
Advice to Stay Safe from the Downadup Worm:Run a good security suite (we are partial to Norton Internet Security 2009 and Norton 360 Version 3.0). Keep your computer updated with the latest patches. If you don’t know how to do this, have someone help you set your system to update itself. Don’t use “free” security scans that pop up on many web sites. All too often these are fake, using scare tactics to try to get you to purchase their “full” service. In many cases these are actually infecting you while they run. There is reason to believe that the creators of the Conficker worm are associated with some of these fake security products. Turn off the “autorun” feature that will automatically run programs found on memory sticks and other USB devices. Be smart with your passwords. This includes Change your passwords periodically Use complex passwords – no simple names or words, use special characters and numbers Using a separate, longer password for each site that has sensitive personal information or access to your bank accounts or credit cards. Use a passwords management system such as Identity Safe (included in Norton Internet Security 2009 and Norton 360 Version 3.0) to track your passwords and to fill out forms automatically.