Sunday, April 19, 2009

Make A Autorun File For your CD

Make A Autorun File For your CD

If you wanna make a autorun file for that CD you are ready to burn just read this...

1) You open notepad

2) now you writ: [autorun]

Now save it but not as a .txt file but as a .inf file.

But remember! The "Setup_filename.EXE" MUST be replaced with the name of the setup file. And you also need to rember that it is not all of the setup files there are called '.exe but some are called '.msi

3) Now burn your CD with the autorun .inf file included.

4) Now set the CD in you CD drive and wait for the autorun to begin or if nothing happens just double-click on the CD drive in "This Computer"

Remove Linux From Your Pc Safely

Remove Linux From Your Pc Safely, ...and restoring your MBR

First of all you need to know where your Linux OS is installed to. that is what drive it is currently living on. Bear in mind that Linux formats the drive as HFS rather than Fat/Fat32 or NTFS. ( These are the file systems used by various Operating Systems).

So HFS Partitions are not seen by windows, so its hidden.

To remove the partitions of Linux in WindowsXP go to your 'Control panel' > Admistrative Tools > Computer Managment

Open 'Disk Management' and you will see your Linux drives recognised as 'Unknown Partition' plus the status of the drive. Bearing in mind you know what partition and disk you installed to it will be easier to recognise as the drive/partition where you had installed it to.

Once you have identifed the drives, 'right-Click' on the drive/partiton and select 'Delete Logical Drive'

Once you have followed this through, you will now have free space.

This next part is very important. Once you have formatted the drive, re format it as your required file system type. either Fat32 or NTFS. Now the important part is coming up !

Fixing your Master Boot Record to make Windows Bootable again.

Have a Windows Boot disk with all the basic DOS Commands loaded on to the disk. A standard Windows 98/Me Boot Disk will work too.

Type in the DOS command :

e.g, from your C:\

fdisk /mbr

Or use your Windows XP run the recovery console, pick which xp install you would like to boot in to (usually you will pick #1)

then type: fixmbr. Answer Y to the dialoge.

Your master boot record will now be restored and Windows XP will be bootable once again. Your System will be restored with your original boot loader that you got with Windows XP.

How to Increase Internet Speed

Windows uses 20% of your bandwidth Here's how to Get it back

A nice little tweak for XP. Microsoft reserve 20% of your available bandwidth for their own purposes (suspect for updates and interrogating your machine etc..)

Here's how to get it back:

Click Start-->Run-->type "gpedit.msc" without the "

This opens the group policy editor. Then go to:

Local Computer Policy-->Computer Configuration-->Administrative Templates-->Network-->QOS Packet Scheduler-->Limit Reservable Bandwidth

Double click on Limit Reservable bandwidth. It will say it is not configured, but the truth is under the 'Explain' tab :

"By default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection, but you can use this setting to override the default."

So the trick is to ENABLE reservable bandwidth, then set it to ZERO.

This will allow the system to reserve nothing, rather than the default 20%.

User's guide to avoiding virus infections

User's guide to avoiding virus infections Keeping an eye out for viruses

Computer viruses are everywhere! This guide will show you how to stay alert and how to avoid getting infections on your computer. Having an updated virus scanner is only a small part of this, there are many ways that you can prevent having viruses other than a virus scanner, as it will not always save you.

Types of viruses
There are many type of viruses. Typical viruses are simply programs or scripts that will do various damage to your computer, such as corrupting files, copying itself into files, slowly deleting all your hard drive etc. This depends on the virus. Most viruses also mail themselves to other people in the address book. This way they spread really fast and appear at others' inboxes as too many people still fall for these. Most viruses will try to convince you to open the attachment, but I have never got one that tricked me. In fact, I found myself emailing people just to make sure they really did send me something. It does not hurt to be safe.

Worms are different type of viruses, but the same idea, but they are usually designed to copy themselves a lot over a network and usually try to eat up as much bandwidth as possible by sending commands to servers to try to get in. The code red worm is a good example of this. This worm breaks in a security hole in Microsoft IIS (Internet Information Server) in which is a badly coded http server that, despite the security risks, a lot of people use it. When the worm successfully gets in, it will try to go into other servers from there. When IceTeks was run on a dedicated server at my house, there was about 10 or so attempts per day, but because we ran Apache, the attempts did not do anything but waste bandwidth and not much as I had it fixed a special way. Some worms such as the SQL slammer will simply send themselves over and over so many times that they will clog up networks, and sometimes all of the internet. Worms usually affect servers more than home users, but again, this depends on what worm it is. It is suspected that most worms are efforts from the RIAA to try to stop piracy, so they try to clog up networks that could contain files. Unfortunately, the RIAA have the authority to do these damages and even if caught, nothing can be done.

Trojans are another type of virus. They are simply like a server in which enables hackers to get into and control the computer. A trojan such as Subseven can enable a hacker to do various things such as control the mouse, eject the cd-rom drive, delete/download/upload files and much more.

MBR virues
Boot sector viruses are another type, they are similar to file viruses, but instead they go in the boot sector and can cause serious damage when the computer is booted, some can easily format your drive simply by booting your computer. These are hard to remove.

Most viruses have various characteristics. For example, a worm can also be a trojan and also infect the boot sector. It all depends on how the virus is written and what it is designed to do. That's why there are not really strong structured categories, as they can easily mix one in the other.

Know the potentially dangerous files
Like any other files, viruses must be opened in order to do something. Most viruses come through e-mail as an attachment. Some will make it look like it's someone you know, and it will try to convince you to open an attachment. Never open attachments at any cost! Some viruses will infect files in programs, so opening a program will actually open the virus, maybe the same one, or another part of it.

All files have what is called an extension; This is the 3 last letters after the last period. For example, setup.exe has a file extension of .exe.

Extensions to watch out for are .exe .com .bat .scr .pif .vbs and others, but these are the most seen. .exe .com .bat .pif and .scr are valid extensions for executables. A virus writer will simply rename it to one of these and it will work the same way. .pif is a shortcut to an ms-dos program and will have the ms dos icon, but will still execute whatever code is in it, so an .exe can be renamed to .pif and be run the same way. .bat is a batch file, which can contain instructions to do various file activities, but again, a .exe can be renamed to .bat and it will execute it! .vbs is a visual basic script. For some reason, Microsoft provides this scripting language along with the scripting host to make it more convenient to design and write viruses quickly and easily, I've never seen another use for this scripting language other than for writing viruses. There are programs that are written with that language, but it is compiled into an exe. Exe is the usual extension for programs, you would not have a software CD install a bunch of vbs files all over!

Bottom line is, if you don't know what a file is just don't open it. Some viruses will sometimes be named a way as to mask the real file extension to make it look like a harmless file such as a image file. This is easily noticed, but can still be missed. Simply don't open unexpected files.

If you get something that appears like something legit, just ask the person it came from if they sent it. Most viruses use a friend's address to make it look like it comes from them. The virus does this by using the person's address when sending itself to the address book contacts.

Email is not the only way to get viruses; P2P (file sharing programs such as kazaa, winmx, direct connect etc) is also another way to get viruses.

When downloading programs, the main thing to watch out for is the file size. If you are downloading a program that you expect to be rather large such as a game, don't grab a file that is 10KB, since it's most likely a virus. However, I've been caught with a virus even with large files, so file size is not the only thing to watch, as an exe is still valid even if junk is added at the end, so a 64KB virus will still function even if it is turned into 650MB.

Icons are something to look for too, fortunately, virus writers don't take time to put icons. If your download should be a setup file, you should see the icon of a setup file. If it's just the blank icon that typical plain or corrupted exes have, don't open it.

Another thing to do, which should be obvious, is to scan the file for viruses using updated virus definitions. But don't rely on only your virus scanner, as they are not perfect, and if the virus has not been reported to them yet, they won't know to create a definition for it!

Changing settings to stay safe
If you do open a virus, you want to avoid it going to all your friends. The simplest thing to do is to NOT use the windows address book. It is easy for viruses to get through and Microsoft is not doing anything about it. Just don't use it. Put them in spreadsheet or even better write them down somewhere. Don't use the address book.

Another "feature" to avoid is the auto preview. Some viruses can attempt to open themselves just by opening the email. There are security holes in Microsoft mail programs that allow this. In Microsoft Outlook, click on the view menu and remove auto preview. You need to do this for every folder, but the inbox is most important. In Outlook Express, click on the view menu and go to layout. In the dialog box, you will see a check box for show preview pane. Uncheck it and click ok.

Another thing you should change, especially if you download a lot, is the option that allows you to view the file extension. In Win98, go in any folder, click on view then folder options and choose the view tab and where it says hide file extension for known types, uncheck it. In win2k, it is the same process, but instead, go in the control panel and open the folder options icon.

Avoiding server worms
Some viruses, mostly worms, can exploit through servers and affect other servers from servers that have been infected. A good example is the SQL slammer. This was a worm that affected SQL servers run by Microsoft IIS and Microsoft SQL Server. Once the worm gets in, that particular server starts trying to find more exploitable driving internet connections to a halt in the process. Servers running Apache were unaffected by that, except for the many hits to try to get in. IceTeks received about 100 hits per day when it was run on a dedicated home server. Most hits came from major ISPs and other big websites that had no clue they were still affected.

The simple solution to avoid these types of viruses is to NOT use Microsoft based server software for your server, especially if it is a public server. The operating system is also crucial, but the actual server software is much more. Apache, which is free, is much more secure than Microsoft based server programs such as IIS. IIS may be easier to understand and administer, but it saves a lot of hassle to learn how to use Apache. IIS has a large number of vulnerabilities, such as the ability to gain access to cmd.exe and basically delete the whole drive by doing a ../ request in the address bar. These don't require viruses, but simply commands, but there are worms written to automatically make these commands. The code red does this.

Removing a virus
The best way to do this is to do a clean install. However, depending on how bad the virus is, a simple clean install won't remove it. So to be extra sure, you'll want to do a low level format. This is especially true of you got a boot sector virus, as even repartitioning and formatting won't quite remove it, but sometimes you can get away with an fdisk /mbr, but not all the time. here are various removal tools for viruses, it is good to use them and see if they work, but proceeding with the clean install is recommended. You never know if the virus is completely removed by deleting files you suspect are infected. Some viruses such as the Bugbear will close anti virus programs and other programs to make it hard and annoying to figure out what to do. A clean install is the best way to ensure that it's gone for good.

Viruses are out there, don't be one of the many infected ones! Stay alert and stay safe! Don't open unexpected files, regularly update your virus definitions and scan downloaded files!

I hope this article was useful for you!.

How to create a Bootable Windows XP SP1 CD

How to create a Bootable Windows XP SP1 CD (Nero):

Step 1
Create 3 folders - C:\WINXPSP1, C:\SP1106 and C:\XPBOOT

Step 2
Copy the entire Windows XP CD into folder C:\WINXPSP1

Step 3
You will have to download the SP1 Update, which is 133MB.
Rename the Service Pack file to XP-SP1.EXE
Extract the Service Pack from the Run Dialog using the command:
C:\XP-SP1.EXE -U -X:C:\SP1106

Step 4
Open Start/Run... and type the command:
C:\SP1106\update\update.exe -s:C:\WINXPSP1
Click OK
Folder C:\WINXPSP1 contains: Windows XP SP1

How to Create a Windows XP SP1 CD Bootable
Step 1
( no download manager !! )
Extract file (xpboot.bin) in to the folder C:\XPBOOT

Step 2
Start Nero - Burning Rom.
Select File > New... from the menu.
1.) Select CD-ROM (Boot)
2.) Select Image file from Source of boot image data
3.) Set Kind of emulation: to No Emulation
4.) Set Load segment of sectors (hex!): to 07C0
5.) Set Number of loaded sectors: to 4
6.) Press the Browse... button

Step 3
Select All Files (*.*) from File of type:
Locate boot.bin in the folder C:\XPBOOT

Step 4
Click ISO tab
Set File-/Directory length to ISO Level 1 (Max. of 11 = 8 + 3 chars)
Set Format to Mode 1
Set Character Set to ISO 9660
Check all Relax ISO Restrictions

Step 5
Click Label Tab
Select ISO9660 from the drop down box.
Enter the Volume Label as WB2PFRE_EN
Enter the System Identifier as WB2PFRE_EN
Enter the Volume Set as WB2PFRE_EN
Enter the Publisher as MICROSOFT CORPORATION
Enter the Data Preparer as MICROSOFT CORPORATION
Enter the Application as WB2PFRE_EN
* For Windows XP Professional OEM substitute WB2PFRE_EN with WXPOEM_EN
* For Windows XP Home OEM substitute WB2PFRE_EN with WXHOEM_EN

Step 6
Click Burn tab
Check Write
Check Finalize CD (No further writing possible!)
Set Write Method to Disk-At-Once
Press New button

Step 7
Locate the folder C:\WINXPSP1
Select everything in the folder and drag it to the ISO compilation panel.
Click the Write CD Dialog button.

Press Write

How to delete auto run virus

How to delete auto run virus

1. Go to Start -->Run, Then type cmd
2.type cd\
3. type attrib -s -h auto run.* press enter
4. open your C drive and delete auto run.txt file
5. follow the 3 & 4 steps for remaining drives

How to see hidden files

How to see hidden files
Due to some viruses we not able to see hidden files
to solve this problem follow the below steps

1. Go to Start --> Run, then type regedit
2. Navigate to the registry folder HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\
3. Find a key called CheckedValue.
4. Double Click CheckedValue key and modify it to 1. This is to show all the hidden files.

Now you should be able to view all the hidden files, and also to alter its status from folder options.

Hide your folders in a different ways

Hide your folders in a different ways

1)Right Click on the desktop.Make a new folder
2)Now rename the folder with a space(U have to hold ALT key and type 0160).
3)Now u have a folder with out a name.
4)Right click on the folder>properties>customize. Click on change icon.
5)Scroll a bit, u should find some empty spaces, Click on any one of ok
Thats it, now u can store ur personal data without any 3rd party tools.

U can also hide ur folder by dis method:-
open Start>Run>CMD
now type attrib +s +h C:/name of d folder u want to hide
Now even in the folder option Show all Hide folders is slected still u will get dis folder hide...
And to unhide type same command just put "-" instead of "+"

extend or reset trial period of Softwares

How to extend or reset trial period of Softwares

Method 1
Reinstall the program. This is the easiest method, but highly likely that it won’t work mostly on current modern software, as the expiry check algorithm getting sophisticated by keeping the expiry information on started using date and days allowed for try use plus days left in the trial in the registry or in a randomly named file.

Method 2
Adjusting the clock (date and time) of your computer system before starting installation of trial software to future data, or adjusting the clock to past date after expired trial period. Again, this method most likely won’t work.

Method 3
Use a application installation monitoring software or uninstaller software such as Norton Cleansweep, Your Uninstaller! 2006 and Advanced Uninstaller PRO 2006 to keep track and monitor every changes to the system during installation, and then uninstall and revert the shareware completely to remove all traces of trial expiry data.

Method 4
Backup the registry before installation of software, and restore the registry after trial period passed. Only works on those shareware that store protection information in registry, and you will lose some important registry changes by Windows or other applications. Alternatively, use Regmon to monitor registry activity in real-time to identify possible candidates for trial expiry reg keys, and then delete those keys.

Method 5
Reinstall windows, and you can be sure that you can use all trial demo shareware again, as all dummy registry entries and dummy files that store trial information are wiped off.

Method 6
Find a crack, with the help of cracks search engine such as Astalavista. But this is not extending the trial period of software.

Method 7
Search with various search engines such as Google and Yahoo! for application-specific known workarounds.

How to Enable Task Manager

Enabling task manage

1)Click Start, Run and type Regedit.exe
* Navigate to the following branch:

HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies\ System

* In the right-pane, delete the value named DisableTaskMgr
* Close Regedit.exe

02) * Click Start, Run, type gpedit.msc and click OK.
* Navigate to this branch:

User Configuration / Administrative Templates / System / Ctrl+Alt+Delete Options / Remove Task Manager

* Double-click the Remove Task Manager option.
* Set the policy to Not Configured.

UST Scandal avi.exe Virus

How to remove Funny UST Scandal avi.Exe Virus

Funny UST Virus Activities:
First of all this virus is not funny at all, either it may put yourself in state of embarrassment when it sends some senseless message to your friends in your yahoo messenger buddies.
It creates following files:
Killer.exe in c:\windows\
lsass.exe in c:\documents and settings\all users\start menu\programs\startup
xmss.exe in the root drive of all partitions and also in c:\windows
autorun.inf in all the partitions.
the main file Funny UST Scandal.avi.exe in all the partitions and
Funny UST Scandal.exe in c:\Windows.
Not only this, it also creates the following entries:

HKLM\Software\Microsoft\WindowNT\CurrentVersion\Winlogon\shell HKCU\Software\Microsoft\windows\Currentversion\Run\Runonce

You will find all these or some of these files if your system is infected by this virus.
1. Firstly you need to end process running by the virus, for this download process explorer.
killer.exe ,b.lsass.exe ,c.smss.exe
Note: close all those processes that have the same icon of Funny UST Sandal.avi.exe
2. Open Start >> Run and type “cmd” (without quotes) and press enter.
3. Above command will open up command prompt, type “cd\” (without quotes)
4. Type “attrib -h -s smss.exe” (without quotes)
5. Type “attrib -h -s autorun.inf” (without quotes)
6. Repeat step 4 and 5 for all the drives through command prompt (on the root folder)
7. Now open all your drives one by one by typing C: ,D: and so on in the address bar at the top, delete smss.exe,autorun.inf,Funny UST Scandal.avi.exe
8. Open command prompt again by following step 2.
9. Type “cd c:\windows” (without quotes)
10. Type “attrib -h -s smss.exe” (without quotes)and press enter. Type “delete smss.exe” and press enter also type “delete lsass.exe” and press enter.
11. Now Open Start >> Run and type regedit and press enter.
12. Locate these paths one by one in the registry.

At these paths, locate the keys which have values as (killer.exe) and (c:\windows\smss.exe). Delete these registry keys.


W32.hitapop Virus

How to remove W32.Hitapop virus


It is basically a worm / virus also called hitapop virus/worm. It embeds itself with the userinit action at the startup of the computer and runs certain malicious code as soon as a user logs into the system. This causes downloading of virus like contents and damages to computer software

Follow the procedure below:
1. Go to Start > Run, type regedit in the in the Run dialogue box and press enter. This will open the registry editor. To be able to open registry editor you need to have administrator rights, if you don’t have administrator rights, see this post. Even then if the registry editor is not opening,
2. Once you have opened the Registry editor, navigate to the location HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
3. At this path there is a key called userinit. The key is usually set to a value which tells what is to be executed at every time a user logs in. If your computer is infected with some virus, then the value should be something like “Userinit” = “C:\WINDOWS\System32\userinit.exe,rundll32.exe %System%\winsys16_[RANDOM DIGITS].dll start” Note down the above [RANDOM DIGITS] on a piece of paper, we will use it in step 8 to remove virus files.
4. Change it to a value “Userinit” = “C:\WINDOWS\System32\userinit.exe“
5. Exit Registry editor.
6. Go to Start > Run , type cmd and press enter, this will open a command prompt window.
7. On command prompt, type ” attrib -s -r -h c:\windows\system32\winsys16_[RANDOM DIGITS].dll” and press enter. Note that this random number is the number you get in step 3 above.
8.Now type Type “Del c:\windows\system32\winsys16_[RANDOM DIGITS].dll” and press enter. This is also the same random number as in step 3.

ntdetec1.exe Virus

How to remove ntdetec1.exe virus

Most Common Symptoms Of Ntdetect1.exe Virus are:
1. Task Manager doesn’t open or it is blocked.
2. Regedit or registry editing has been disabled.
3. Folder Options are not visible under File Menu >> Tools

Let us see how we can delete ntdetect1.exe virus.

NTdetec1.exe executes itself with the following name list process.

Removal Procedure For Ntdetec1.exe
1. Open Start >> Run and type cmd and press enter.
2. Type the following commands :
taskkill /im cmrss.exe
taskkill /im ntdetec1.exe
taskkill /im shell32.exe
Note: Make sure you are in the operating system drive at your command prompt
run the following command.

attrib ntdetec1 -s -h /s /d

3. Locate the folder ntdetec1 in your operating system root directory and delete it permanently.
But you will need to delete the registry key associated with the virus (if it is present). For this go to Start > Run. Type regedit in run window and press enter. This will open registry editor. Locate the key as shown below and delete it.

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\policies\Explorer\ Run\"winlogon" = "C:\ntdetec1\run.exe"

newfolder.exe virus

How to remove Newfolder.exe virus

New Folder.exe virus disables task manager, disables registry editor, disables folder options, and disables run option from start menu. Virus creates exe files like the icon of folders with the same name as the name of the folder, it also consumes more than 50 % of your processor usage so slows down your computer.

In order to remove the newfolder.exe virus you can use two types of tools, again there is a manual procedure also but the tools mentioned below are much better:

Tools to remove Newfolder.exe virus

1. Newfolder virus removal tool by Muhammad Abdullah. Download

2. Newfolder Virus removal tool by Albin. Download

Both of these are executable files, download any one of them and run the file by double-clicking on it, it will clean the virus.

How to Enable Regedit

Go to Run --> type gpedit.msc --->User Configuration ---> Administrative Templates --> system ----> double click on "" prevent access to registry editing tools ""
Either it may be 'Enabled' or 'Not Configured'...
if it is in Not Configured state just turn it to Disabled state..
If it is in enabled state turn it to Not Configured/Disable state....
Apply ... Ok

Monday, April 6, 2009

Virus Information

Viruses have been a thorn in the side of PC users since the late 1980's. The first computer virus was discovered in 1981 and was believed to have been spawned at Texas A&M. It is hard to estimate the number of viruses in the wild because new viruses are being created constantly. It is safe to say there are thousands of viruses currently active. Prior to the popularity of the Internet most viruses were spread on floppy disks.
Virus Types
There are many different types of viruses. As new tools are developed to combat viruses, virus writers come up with new ways to spread their creations. Some of the most common virus types are:

Basic - A basic virus is software created to attack computers via email or the Internet. Once a machine is infected it begins to infect other machines across the Internet. It may also attach itself to files stored on the computer's hard drive.

Trojan Horse - A trojan horse allows the creator to access your PC and steal data or use your PC for other activities. This is done by opening a 'back door' on your computer which the virus creator knows how to access. Trojan horses may or may not attach themselves to files on your hard drive.

Worm - A worm is similar to a basic virus in that it infects computers across a network or the Internet. Where worms differ is their ability to constantly spread. Worms can infect a computer without the user receiving an email or browsing the Internet. The best protection against worms is a firewall.

Combination - Beginning in the summer of 2003 viruses started to appear with all the characteristics of the above virus types. The 'SoBig' virus infected 1 out of every 2 emails sent at its height.

Worms and combination are currently the most rampant viruses on the

How to remove virus

Caught A Virus?

If you've let your guard down--or even if you haven't--it can be hard to tell if your PC is infected. Here's what to do if you suspect the worst.

Heard this one before? You must run antivirus software and keep it up to date or else your PC will get infected, you'll lose all your data, and you'll incur the wrath of every e-mail buddy you unknowingly infect because of your carelessness.

You know they're right. Yet for one reason or another, you're not running antivirus software, or you are but it's not up to date. Maybe you turned off your virus scanner because it conflicted with another program. Maybe you got tired of upgrading after you bought Norton Antivirus 2001, 2002, and 2003. Or maybe your annual subscription of virus definitions recently expired, and you've put off renewing.

It happens. It's nothing to be ashamed of. But chances are, either you're infected right now, as we speak, or you will be very soon.

For a few days in late January, the Netsky.p worm was infecting about 2,500 PCs a day. Meanwhile the MySQL bot infected approximately 100 systems a minute (albeit not necessarily desktop PCs). As David Perry, global director of education for security software provider Trend Micro, puts it, "an unprotected [Windows] computer will become owned by a bot within 14 minutes."

Today's viruses, worms, and so-called bots--which turn your PC into a zombie that does the hacker's bidding (such as mass-mailing spam)--aren't going to announce their presence. Real viruses aren't like the ones in Hollywood movies that melt down whole networks in seconds and destroy alien spacecraft. They operate in the background, quietly altering data, stealing private operations, or using your PC for their own illegal ends. This makes them hard to spot if you're not well protected.

Is Your PC "Owned?"

I should start by saying that not every system oddity is due to a virus, worm, or bot. Is your system slowing down? Is your hard drive filling up rapidly? Are programs crashing without warning? These symptoms are more likely caused by Windows, or badly written legitimate programs, rather than malware. After all, people who write malware want to hide their program's presence. People who write commercial software put icons all over your desktop. Who's going to work harder to go unnoticed?

Other indicators that may, in fact, indicate that there's nothing that you need to worry about, include:

* An automated e-mail telling you that you're sending out infected mail. E-mail viruses and worms typically come from faked addresses.
* A frantic note from a friend saying they've been infected, and therefore so have you. This is likely a hoax. It's especially suspicious if the note tells you the virus can't be detected but you can get rid of it by deleting one simple file. Don't be fooled--and don't delete that file.

I'm not saying that you should ignore such warnings. Copy the subject line or a snippet from the body of the e-mail and plug it into your favorite search engine to see if other people have received the same note. A security site may have already pegged it as a hoax.

Sniffing Out an Infection

There are signs that indicate that your PC is actually infected. A lot of network activity coming from your system (when you're not actually using Internet) can be a good indicator that something is amiss. A good software firewall, such as ZoneAlarm, will ask your permission before letting anything leave your PC, and will give you enough information to help you judge if the outgoing data is legitimate. By the way, the firewall that comes with Windows, even the improved version in XP Service Pack 2, lacks this capability.

To put a network status light in your system tray, follow these steps: In Windows XP, choose Start, Control Panel, Network Connections, right-click the network connection you want to monitor, choose Properties, check "Show icon in notification area when connected," and click OK.

If you're interested in being a PC detective, you can sniff around further for malware. By hitting Ctrl-Alt-Delete in Windows, you'll bring up the Task Manager, which will show you the various processes your system is running. Most, if not all, are legit, but if you see a file name that looks suspicious, type it into a search engine and find out what it is.

Want another place to look? In Windows XP, click Start, Run, type "services.msc" in the box, and press Enter. You'll see detailed descriptions of the services Windows is running. Something look weird? Check with your search engine.

Finally, you can do more detective work by selecting Start, Run, and typing "msconfig" in the box. With this tool you not only see the services running, but also the programs that your system is launching at startup. Again, check for anything weird.

If any of these tools won't run--or if your security software won't run--that in itself is a good sign your computer is infected. Some viruses intentionally disable such programs as a way to protect themselves.

What to Do Next

Once you're fairly sure your system is infected, don't panic. There are steps you can take to assess the damage, depending on your current level of protection.

* If you don't have any antivirus software on your system (shame on you), or if the software has stopped working, stay online and go for a free scan at one of several Web sites. There's McAfee FreeScan, Symantec Security Check, and Trend Micro's HouseCall. If one doesn't find anything, try two. In fact, running a free online virus scan is a good way to double-check the work of your own local antivirus program. When you're done, buy or download a real antivirus program.
* If you have antivirus software, but it isn't active, get offline, unplug wires-- whatever it takes to stop your computer from communicating via the Internet. Then, promptly perform a scan with the installed software.
* If nothing seems to be working, do more research on the Web. There are several online virus libraries where you can find out about known viruses. These sites often provide instructions for removing viruses--if manual removal is possible--or a free removal tool if it isn't. Check out GriSOFT's Virus Encyclopedia, Eset's Virus Descriptions, McAffee's Virus Glossary, Symantec's Virus Encyclopedia, or Trend Micro's Virus Encyclopedia.

A Microgram of Prevention

Assuming your system is now clean, you need to make sure it stays that way. Preventing a breach of your computer's security is far more effective than cleaning up the mess afterwards. Start with a good security program, such Trend Micro's PC-Cillin, which you can buy for $50.

Don't want to shell out any money? You can cobble together security through free downloads, such as AVG Anti-Virus Free Edition, ZoneAlarm (a personal firewall), and Ad-Aware SE (an antispyware tool).

Just make sure you keep all security software up to date. The bad guys constantly try out new ways to fool security programs. Any security tool without regular, easy (if not automatic) updates isn't worth your money or your time.

Speaking of updating, the same goes for Windows. Use Windows Update (it's right there on your Start Menu) to make sure you're getting all of the high priority updates. If you run Windows XP, make sure to get the Service Pack 2 update. To find out if you already have it, right-click My Computer, and select Properties. Under the General tab, under System, it should say "Service Pack 2."

Here are a few more pointers for a virus-free life:

* Be careful with e-mail. Set your e-mail software security settings to high. Don't open messages with generic-sounding subjects that don't apply specifically to you from people you don't know. Don't open an attachment unless you're expecting it.
* If you have broadband Internet access, such as DSL or cable, get a router, even if you only have one PC. A router adds an extra layer of protection because your PC is not connecting directly with the Internet.
* Check your Internet ports. These doorways between your computer and the Internet can be open, in which case your PC is very vulnerable; closed, but still somewhat vulnerable; or stealthed (or hidden), which is safest. Visit Gibson Research's Web site and run the free ShieldsUP test to see your ports' status. If some ports show up as closed--or worse yet, open--check your router's documentation to find out how to hide them.

Wednesday, April 1, 2009

Computer Problems and Solutions

21 Tips for increasing XP performance.

1] Your Pc Must have 256MB RAM , 512 MB Cache , Intel Pentium 4 Processor, 40 GB HDD. These are the minimum requirements.

2] If you see a 'virtual memory low' message then increase its virtual memory. To increase virtual memory,
Go to My Computer->Properties->Advanced->Performance Settings->Advanced->Virtual Memory->Change->Select the appropriate drive->Custom size->set appropriate level(our it is 600(min.) & 700(max.)->Ok.

3] Increase 'Visual Performance'. Go to My Computer->Properties->Advanced->Performance Settings->Visual Settings->Custom->Select only the following options.
a)Slide taskbar buttons.
b)Smooth edges of screen fonts.
c)Smooth-scroll list boxes.
d)Use a background image for each folder type.
e)Use visual style on windows and buttons.

4] Don't keep unwanted/extra fonts. To remove extra fonts, Go to Start->Settings->Control Panel->Fonts.

5] Your Desktop Wallpaper & Screensaver consume a large amount of disk space. Select the 'None' option for both wallpapers & Screensavers.

6] Avoid keeping DEMO Games.

7] Uninstall the unwanted Softwares.

8] Use Registry Cleaner to keep your registry clean(without errors).

9] Try to keep Music and pictures files in the folder specified by windows itself.

10]Use Hybernating Option for Quick windows start. To active Hybernating follow the following steps.
Desktop->Properties->Screensaver->Power->Hybernating->Enable Hybernating->Ok.

11] Keep your Dektop clean with unwanted icons.

12] Use Intel Application Accelerator to speed up your disk access,

13] Memory management (at least 512MB RAM Required). This allow XP to keep data in Memory instead of paging section of RAM.
Go to->Start->Run->regedit->HKEY_LOCAL_MACHINE->SYSTEM->CurrentControlSet->Control->Session Manager->Memory Management->Double click it->DisablePageingExecutive->Double Clik it->Set value to 1.

14] Disable Yahoo Messenger, Google Talk, and other unwanted programs from startup. (You can use registry editior
16] For Windows XP, You must use NTFS partition. FAT partition is less supportive for Windows XP.

17] In BIOS, Select first booting device as your HDD.

18] Setting Priority High for a particular program.
Open Task Manager->Processes->Select the desired Program->Right Click->Set Priority->High->Ok.
This Priority set if for current session. Once you restart your system then its priority will again be Normal.

19] Keep deleting your Temporary Internet Files in regular intervals.
Go to Windows Drive (c: or d:)->Select the User->Local Settings->Temporary Internet Files

20] Empty your browser's cache in regular intervals.

21] Avoid keeping Movies in your PC.

To disable the stupid feature in WinXP which tries to send a report to microsoft every time a program crashes you will have to do this:


Open Control Panel
Click on Preformance and Maintenance.
Click on System.
Then click on the Advanced tab
Click on the error reporting button on the bottom of the windows.
Select Disable error reporting.
Click OK
Click OK


Windows Xp: Speed Up Your, Speed Up Your Network and Internet Access

I have a dial up connection and it improve my speeds about 25% in surfing the internet. give it a try. Im IT , only do it if you feel comfortable with changing registry.

Increasing network browsing speed

Does your computer slow down when you browse your local area network and connect to other computers that are sharing data? One of the most common causes of this slowdown is a feature of Windows Explorer that looks for scheduled tasks on remote computers. This effort can take some time on some computers and can really slow down your browsing. The window with which you are browsing the network may appear to freeze momentarily, as the system is waiting for a response from the remote computer.

Windows XP: Speeding Disk Access

Although this problem is a complex one, the solution is very simple. Instead of having to wait for the remote scheduled tasks, which is useless information to anyone who is not a system administrator remotely configuring scheduled tasks, you can disable this feature.

In order to do this, you will have to change the System Registry and delete a reference to a key so that this feature will not be loaded. To do this, follow these steps:

1. Open up the Registry Editor by clicking the Start Menu and selecting Run. Then type regedit in the text box and click the OK button.

2. Once the Registry Editor has loaded, expand the HKEY_LOCAL_MACHINE key.

3. Next, expand Software and then Microsoft.

4. Locate Windows and expand that as well.

5. You will want to be editing the main system files, so expand CurrentVersion.

6. Because this feature is a feature of the Windows component known as Explorer, expand the Explorer key.

7. Next, you will want to modify the remote computer settings, so expand the RemoteComputer key and then expand the NameSpace key to show all of the features that are enabled when you browse to a remote computer.

8. In the NameSpace folder you will find two entries. One is "{2227A280-3AEA-1069-A2DE-08002B30309D}" which tells Explorer to show printers shared on the remote machine. The other, "{D6277990-4C6A-11CF-8D87-00AA0060F5BF}," tells Explorer to show remote scheduled tasks. This is the one that you should delete. This can be done by right-clicking the name of the key and selecting Delete.

If you have no use for viewing remote shared printers and are really only interested in shared files, consider deleting the printers key, "{2227A280-3AEA-1069-A2DE-08002B30309D}", as well. This will also boost your browsing speed.

Once you have deleted the key, you just need to restart and the changes will be in effect. Now your network computer browsing will be without needless delays.

Want To Download Torrent File By Using Google

Simple way...just type:

*ur file name* filetype:torrent
You must not write ( * ) when you search....
ANTIVIRUS KASPERSKY filetype:torrent