Username: Passwort:
Neue User - Registrierung
Moderator: toedder 
 Computers

Have computer questions, hints, or tips?

BBW's Tips on how to speed up page load the brainking site
Computers (BIG BAD WOLF, 2007-03-12 20:16:01)


Nachrichten pro Seite:

Was gibt es neues über MP3 players?
Liste der Diskussionsforen
Es ist Dir nicht erlaubt, Nachrichten in diesem Forum zu schreiben. Man muss dazu mindestens den Mitgliedsrang Brain Läufer haben!
Modus: Jeder kann schreiben
In Postings suchen:  

<< <   74 75 76 77 78 79 80 81 82 83   > >>
23. März 2004, 11:45:17
Badinage 
Hey Lolly Farm :o)

Its a nerds paradise i fink (explains why im going lol). It all about wireless networks etc, and also has some very impressive displays and trials. Like hackers vs security experts etc

21. März 2004, 12:34:19
MadMonkey 
coreftp, is a file transfer program for building / designing web pages lilac :o)

21. März 2004, 11:20:25
lilac fairy 
Thema: Re:
What is coreftp.com then MM tell tell

No I don't think I can make it Angorina darling, what is it about then sweet?

18. März 2004, 14:21:09
Badinage 
Anyone going to the Wireless Conference on 6th and 7th April 2004 @ Earls Court, London?

14. März 2004, 13:31:50
MadMonkey 
I am even getting used to coreftp.com - seems idiot proof just for me lol

14. März 2004, 13:07:13
kitti 
Bernice, yes, there's nothing wrong with the spyhunter link. But the second, now edited/removed link definitely wasn't freeware :)


And yes, ftp has nothing to do with spyware removal. I just got confused, the removed filename just sounded like a ftp client (BulletproofFTP) to me. I still think SmartFTP is a excellent choice :)

13. März 2004, 08:02:38
Lythande 
Thema: Re: Spyhunter
File transfer protocol, yes (part of the tcp/ip suite). Web-page constructor, no. Though it is often used to -upload- 'pages' (or files), so I suppose you could say it aids in the construction of sites. It's simply a means of (gasp!) transfering files from one machine to another. :)

13. März 2004, 00:46:36
Bernice 
Thema: Spyhunter
I dont think spyhunter is pirated soft ware kitti :) if you do a search on the reliable google it appears to be a free download, so Aragon has not done that as such, or even at all.(or is it a 30 day free trial) I must admit i didnt look.
all he did really was to make it easier for you to down load this ??freebie?? by placing it on his site. It could save you searching and trying to find which is the best site to download from.
I might be wrong here and if so I will stand corrected :)

And i agreet with Lythande...fpt has nothing to do with spyware or the remove of.

ftp = file transfer protocol from memory and is used in the construction of web pages :)

12. März 2004, 20:14:29
Lythande 
What has ftp clients to do with spyware or the removal thereof?

12. März 2004, 09:55:37
kitti 
Thema: Re: Better but Bigger
I don't think its appropriate to give links to pirated software on public boards. It could mean trouble for BK.

Also there are excellent freeware ftp-programs, like SmartFTP ( www.smartftp.com ). Its as good as any commercial product and free for personal use.

12. März 2004, 09:21:29
Badinage 
Thema: Better but Bigger
*edited* email me for a link (email is on my website)

This one is 6.4mb in size. Although is much better and allows full access to the removal functions. It also disables 80% of web pop-ups when left running while surfing.

11. März 2004, 15:51:32
Badinage 
Got HotBar? Want shot of it? Or indeed any other annoyance that seems to appear each time you boot or start email / web??

Download and install Spyhunter. It will identify Trojans, Spyware, Addware etc and tell ya how to remove it (sometimes will even give you the opportunity to tick a box and BANG! Its gone.

http://www.dk-aragon.com/Spyhunter.exe

I stuck it on my site for easy download.

8. März 2004, 18:52:55
mangue 
good tip from BBW: do NOT share !

8. März 2004, 17:57:26
vitalik 
I am with you on that too, Aragon, i personally use it only to get european movies that are not published in US.

8. März 2004, 17:35:50
Badinage 
Although for those that dont share my views:

http://www.zeropaid.com/

LMAO

8. März 2004, 17:33:23
Badinage 
They are all very dodgy if ya ask me. Im with BBW if ya like a song so much, go buy it :o))

8. März 2004, 17:29:37
vitalik 
Use eMule, it's open source, so i doubt there is any spyware built it.

8. März 2004, 17:05:17
MadMonkey 
I know all about that stuff. When i first had broadband a few years ago Napster was up & running. It's still there now, but you have to pay for everything.

8. März 2004, 17:03:50
coan.net 
If you are going to use a peer-to-peer, I use Kazaa Lite which includes no spyware. (I was looking for it recently and could not find it, so I'm not sure if it is still out there somewhere or not.) But it works with the Kazaa "network".

Tip - Don't share - so far they have only went after users who also share their downloaded music with others. (NOTE: Other users don't like this, and some will not share with you if you also don't share)

One thing I download are live concerts and other acoustical song - songs that usually CAN NOT be found on a CD at any local music store. (My own rules is if I can go to the store and buy it, I should not download it.) Many artist are OK with people trading "live" non-album music.

8. März 2004, 16:52:26
mangue 
Thema: lol@madmonkey
I hope you won't mind my sarcastic answer...

I guess you know peer-to-peer programs which lets you download millions of title from the net!

If you like spyware, slow pc, popups and more wonderful annoyances, just download kazaa. You will then be able to download the whole internet for free :-)

If you prefer downloading from a website, just type something like "MP3" in your search engine...

Be sure you know how to survive delicacies like Dialers, Virus, Spywares !

Legally, the disk industry, which is losing a lot of money because of internet, is very agressive against people putting some music on their website. You can even go to jail ! This is certainly not what you are looking for.

It will take at least a few more years until you can all your music directly downloaded to your PC for a reasonable price. Sorry!

PS: one last word : do NOT believe that you are anonymous when you use kazaa. You are identified by your IP and therefore by your Internet Provider!

8. März 2004, 16:43:42
Jason 
ive been told winamp ,but havent had the chance to try it myself yet

8. März 2004, 15:57:38
MadMonkey 
Does anyone know of a good site for downloading music from (preferably for nothing lol)?.

7. März 2004, 14:41:27
lilac fairy 
Thema: Re:
Oh thank you BBW, I've downloaded that it is great. I also make good use of that other programme you told us about too Spybot, I find it so useful. Any more little useful numbers you come across tip us the wink. ;0)

3. März 2004, 14:17:23
Rose 
BBW That is so awesome! it even shows you your serial #s of all installed programs! How kool is that? Thanks!!!

3. März 2004, 10:00:30
Fencer 
Wow! That's a great utility :-) Thanks.

2. März 2004, 17:23:28
coan.net 
Have a windows computer? (95,98,me,2000,xp)

Every wanted to know EVERYTHING about it plus more?

Well check out THIS PROGRAM

It is called AIDA32, it is a freeware program (with no "extra" junk as far as I can tell). Bascily, once installed, you can run reports and it will give you 80+ pages of information about your computer... WAY more then you will every use (or probable understand), but some information may come in handy.

I've been using the Enterprise version (also free) with great success at where I work. (Which has a lot of older and donated comptuers - so it is nice to know more about each of those.)

Anyway, thought I would share this information.

29. Feburar 2004, 17:22:19
Antje 
just got this email from my ISP--thought someone else might need it!!
__________________

Dear Comcast Customer,

This is a letter from Comcast High-Speed Internet - with important
recommendations on how to protect your computer from malicious
attack.

Recently, Microsoft identified a critical flaw in its operating system that
could allow an attacker to gain remote access to users' computers. To
help protect against such attacks, Microsoft has developed a patch
and made it available.

Because your protection is of paramount importance to us, Comcast
wants to make sure all of our customers are aware of the availability of
this patch. We strongly recommend that you download the Microsoft
patch to protect your computer from malicious attack.

To access patch:
Click on the following link to the Security section of the Microsoft Web
site:
http://www.microsoft.com/security/security_bulletins/20040210
_windows.asp

Please take the time to follow the outlined steps to help ensure
your computer's safety from this latest threat and uninterrupted
Internet access.

For more information and additional security updates, please visit the
Service Center of our portal at:
http://www.comcast.net/memberservices/index.jsp

29. Feburar 2004, 10:25:08
sandra... 
I am having a problem to log on to MSN explorer and MSN messenger, not just my account, all of them on this computer.. it is telling me that either they have a problem with their service or I am not connected to the net.. obviously I am conncted cos I am here!!! as for them having a problem, would they have a problem for 3 days? and i know other people have been using it ok..
Can anyone guide me in what to do.

28. Feburar 2004, 15:52:23
lilac fairy 
Thema: Re:
Lmbo indeed. hahahahahhahaaa

27. Feburar 2004, 13:59:18
Badinage 
Your welcome Lolly Fart :o))

27. Feburar 2004, 13:57:00
lilac fairy 
Thema: Re:
Oh I'll have a go at that then, thanks Angora darling.

27. Feburar 2004, 13:48:58
Badinage 
Yeah but i bet you bought it before XP was out!! So if you go onto their website they should have XP drivers available to download :o))

27. Feburar 2004, 13:47:49
lilac fairy 
Thema: Re:
Oh I see, the scanner is a Packard Bell, it did have a driver with it.

27. Feburar 2004, 13:29:23
Badinage 
Who makes your scanner? You need to go to thier site and download specific XP drivers (they are so different from 98 or ME) and the scanner will work fine :o))

27. Feburar 2004, 13:26:48
lilac fairy 
Thema: Re:
No I didn't do that, do you mean from the computer site?

27. Feburar 2004, 12:38:40
Badinage 
Well did ya try to download the XP drivers for the scanner from the manufacture's web site??

27. Feburar 2004, 12:10:29
lilac fairy 
Thema: Re:
Well I do have a scanner, but it won't work on my XP computer, it does work on my ME one, but it only scans once on it, then it won't work until I have closed it all down and booted up again.
It has a USB connection, it doesn't say whether it is a USB2 fast connection or not.

27. Feburar 2004, 12:01:28
Badinage 
If you already have a printer why bother? Just buy a cheap scanner. It is my experience that home users only ever use a scanner about 1% of all PC usage time. So why spend big money on one if your not gonna get the use (like a DTP, or Web Designer would?).

To answer your question though, yes they are good for many reasons. They save space, one unit only.

You get a Printer, Scanner, Photocopier, Fax (providing you have the software) and the quality and price these days is great.

27. Feburar 2004, 11:55:05
lilac fairy 
Thema: Scanners
What is the opinion on all in one printer and scanners? I need a new scanner, I already have a printer. Are they worth having the all in one version's I mean?

26. Feburar 2004, 10:51:09
Lythande 
I dont'use quicken (or have it installed), so I've no idea what the .exe is named. I wondered about that myself, but didn't check. I will say this, again, though. Do not open _any_ attachment unless you know exactly what it is, and if it's a pif, dll, exe, bat, com, vb (and a slew of other application type files), use a -good- antivirus to scan it with -first-. Always be aware that even your best friend could be affected by a worm propogating itself without their awareness. And if you -don't- run an antivirus program and you run windows, the same goes for you. There are more ways to contract unfavorable code than just opening the wrong email attachment. And the further we advance, more 'methods' are discovered every day.

26. Feburar 2004, 10:48:44
Badinage 
Thema: UG! PW STEAL
Solution 1
To remove this Trojan, most of the steps are performed in Safe mode. Please follow the instructions in each section.

NOTE: The following procedure instructs you to delete files, file entries, and registry values. In some cases, they may have already been removed by NAV, or they were never added by the Trojan. If you do not find a particular file or entry, make sure that you followed the instructions exactly. If the file or entry does not exist, then proceed to the next step or section.

Enable show all files
Follow these steps to configure Windows to show all files:
Start Windows Explorer.
Click View (Windows 95/98) or Tools (Windows Me), and click Options or Folder Options.
Click the View tab, and uncheck "Hide file extensions for known file types" if it is checked.
Click Show all files, and click OK.

Restart the computer in Safe mode
If you are running Windows 95:
Exit all programs, and then shut down the computer. If the computer will not shut down normally, then proceed to the next step.
Turn off the computer, and wait 30 seconds. You must turn off the computer to remove the virus from memory. Do not use the reset button.
Turn on the computer. When you see the "Starting Windows 95" message, press F8.
Press the number for Safe mode, and then press Enter.
If you are running Windows 98:
Click Start, and click Run.
Type msconfig and click OK. The System Configuration Utility dialog box appears.
Click the General tab, and click Advanced.
Check Enable Startup Menu, click OK, and then click OK again.
Exit all programs, and then shut down the computer. If the computer will not shut down normally, proceed to the next step.
Turn off the computer, and wait 30 seconds. You must turn off the computer to remove the virus from memory. Do not use the reset button.
Turn on the computer, and wait for the menu to appear.
Press the number for Safe mode, and then press Enter.

Find and delete files
Follow these steps to locate and delete the files that were placed on your hard disk by the Trojan:
Click Start, point to Find or Search, and then click Files or Folders.
Make sure that "Look in" is set to (C:) and that "Include subfolders" is checked.
In the Named box, type (or copy and paste) the following file names:

msdos98.exe uninstallms.exe mine.exe mi*.zip readme.txt

Click Find Now.

CAUTIONS:
The next step is to delete these files from your computer. Make sure that you delete only the files listed, and if you typed the file names, that they were typed exactly as shown. Deleting the wrong file could prevent your system from starting. (The entry mi*.zip may result in several files being found, such as Mi29.zip, or Mine.zip. All such files should be deleted.)
If you are running Windows Me, the search may find the Winmine.exe file. This is the executable for the Windows Minesweeper game, and it is not necessary to delete this file.
This search will almost certainly find several files named Readme.txt. Each will be in a different location. Make sure that you delete only the one in the C:\Windows\System folder.

Delete each file in the Results pane; click Yes to confirm each deletion.

NOTE: If you see a message saying that the file is in use when you try to delete the Msdos98.exe file, then you cannot remove it at this point. Complete as many of the Solution 1 instructions as possible, and then proceed to Solution 2. Follow the instructions in the first two sections of that solution. You only need to enter the first two commands in the section Remove infected files. When the Msdos98.exe file has been deleted, restart the computer.

Right-click the Recycle Bin icon on your desktop, and click Empty Recycle Bin.
Click New Search, and then go on to the next section.

Find and change a file
Make sure that "Look in" is set to (C:) and that "Include subfolders" is checked.
Type win.ini in the Named box, and then press Enter.
Right-click the Win.ini file in the results pane, and click Properties.

NOTE: If you find more than one Win.ini file, make all changes to the one that is located in the folder in which Windows is installed; for example, C:\Windows.

Uncheck Read-only, and then click OK.
Double-click the Win.ini file to open it in Notepad.
Locate the entry that begins with run=. It should look similar to this:

run= C:\Windows\uninstallms.exe

NOTE: There is a large space between run= and the C:\Windows\uninstallms.exe entry. If you cannot locate the C:\Windows\uninstallms.exe entry, then click the Search menu and click Find. Type uninstallms.exe and then click Find next.

Place the cursor after run= , and then press Shift+End to select the rest of the line. Repeat this until the entire line is selected. You may have to press Shift+End four or five times.
Press Delete.

NOTE: A new variant of this Trojan has been found that does not add the text C:\Windows\uninstallms.exe.

Underneath run= , look for an entry that begins with RUNRESTORE=. It should look similar to this:

RUNRESTORE=C:\Windows\uninstallms.exe

If you find this entry, move the cursor to the beginning of the line, press Shift+End to select the entire line, and then press Delete.
To make sure that none of these entries remains, click the Search menu and click Find. Type uninstallms.exe and then click Find next. Remove any entries that refer to this file.
Click the File menu, and click Save.
Exit Notepad.

Remove an entry from the registry

CAUTION: We strongly recommend that you back up the system registry before making any changes. Incorrect changes to the registry could result in permanent data loss or corrupted files. Please make sure you modify only the keys specified. See the document How to back up the Windows registry before proceeding.

Click Start, and click Run. The Run dialog box appears.
Type regedit and then click OK. The Registry Editor opens.
Navigate to the following key:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Run

Look for the following String value in the right pane:

Windows "C:\Msdos98.exe"

If it exists, select it, press Delete, and then click Yes to confirm the deletion.
Navigate to the following key:

NOTE: This will not exist on all systems.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Run-

Look for the following String value in the right pane:

Windows "C:\Msdos98.exe"

Exit the Registry editor.

The Trojan is now removed from your system. Restart the computer.

26. Feburar 2004, 10:45:15
Badinage 
Thema: UG!!
<Try running your scanner while in Safe Mode (press & hold F5 or shift at Windows start-up).

If this fails, jot down the names and locations of all the files that are backdoor programs. (e.g. C:\Windows\system\quicken.exe).

Reboot. Press F8 just after the BIOS screen disappears (you can repeatedly tap F8 to make sure you get it). You'll see the Windows boot menu. Choose "safe mode command prompt only". You will be placed at the C:\> prompt.

Delete each file ("del filename") by navigating to its folder (using "cd foldername" and "cd .." to go up a level). If DOS says it can't find it or it's locked, then you will need to change the file's attributes. Just do "attrib -s -h -r filename" to remove the System, Hidden, and Read Only tags all in one shot. You should then be able to delete the file.

When are all deleted, reboot. Windows may complain that files it's supposed to run at startup are missing. Use msconfig to edit the bootup system and remove the virus files from the "start these when loading" list.

26. Feburar 2004, 10:33:46
Badinage 
These trojans / viruses try and use filenames that seem likely to be on systems. That way when you scan a PC and see Quicken.exe you would think that it is really the executable for the program. In truth the EXE file will be in Program Files under a directory for Quicken.

It is a coy way for them to hide a virus longer and let it gather info or infect other files, PCs or network resources.

Simple rules for virus protection?

DO NOT OPEN ATTACHMENTS if they are from people you dont know, or people you do know but are not expecting an attachment.

By wary of all .exe / .com / .pif / .zip

A new way they send them is to give a double extension (seemingly) Ie the new Netsky.B virus is sent like this: part2.zip.htm.exe

and when you see the attachement on Outlook it displays as Part2.zip (its not a zip file, it ends with EXE)

I have never used a virus program and never got infected cos im sensible at what i open. Just be careful.

26. Feburar 2004, 05:33:40
coan.net 
Microsoft just sent me this link, and it might help others.

Ways to reduce Spam

25. Feburar 2004, 14:45:32
vitalik 
I am a little surprised that Quicken and EditPad are installed in WINNT directory. And most of the latest versions of quicken are called qw.exe

25. Feburar 2004, 12:18:39
Jason 
i would suggest a firewall at the router to protect all your machines from hackers if you havent already got one ;)

25. Feburar 2004, 12:03:33
Lythande 
Thema: Re: Lythande
What happens with the stolen passwords depends on what the theif wants to do with them, if anything. :/ The other 'check' was probably testing your ports. Password stealers can be some type of keystroke capture program which sends it's data to a particular place (ftp/http location, email address, irc channel, whatever). Passwords can be located in a variety of different files (cookies, pwl files 'wallet' files, etc. They're supposed to be encrypted, but windows encryption is notoriously inept.

The fact that your machines share a router does not necessarily mean they're all corrupted, but they could be, especially if you share files or programs between them. All of them should be checked, and disinfected if necessary.

If by 'wipe out everything and start from scratch' you mean a low-level format of all drives and re-installation of everything from CD, you should be safe. Just be sure when you re-load you include an up-to-date antivirus program. :)

25. Feburar 2004, 12:01:39
Jason 
try doing a scan at trend micro , it will scan your machine for you and you will be able to click on any virus for information to remove or solve it ,http://uk.trendmicro-europe.com/index_consumer.php look under house call and then scan .
http://www.safer-networking.org/ is a programme that will stop alot of the unusaull stuff happening home page changing ect .

<< <   74 75 76 77 78 79 80 81 82 83   > >>
Datum und Zeit
Freunde Online
Abonnierte Foren
Vereine
Tip des Tages
Copyright © 2002 - 2024 Filip Rachunek, all rights reserved.
Zurück nach oben