Help Support my Blog!

Virgin Mobile USA
Glasses USA
Amazon
Newegg
VPN4ALL
Netflix
Hulu
CafePress

 

Subscribe to Paul’s Tech Talk Affiliate Marketing Blog

Subscribe to Paul’s Tech Talk Science Fiction Blog

Subscribe to Paul’s Tech Talk Scams Blog

  • Acer 11.6
    Acer 11.6" Laptop 2GB 16GB | C710-2856
    Acer

    Currently  in process review this Acer Chrome book and boy is it nice!

Navigation
Sponsors

Entries in XP (69)

Tuesday
Mar102009

Thinking back to PIFTS.EXE.

Thinking to this very incident looks to something out of the movie "Lemony Snicket's A Series of Unfortunate Events".  I won't go into much detail but here is what I want answers to about the PIFTS.EXE.  You see after I have read a great article talking in detail about this, I have also come to the conclusion something isn't right.

[ad#cricket-right-ez]The blog owner known as Anshar in the forums on the Symantec points out some key events. He wanted to point out that the users who were posting were not violating the TOS and was posting questions that look to asking about this file. See screen capture of what I took. This one picture doesn't prove his theory in whole, but does bring up some suspicions. This actually might be them trying to find a 'scapegoat' so to speak. He also talks about what others are asking? What is PIFTS.EXE? People seem to still have not be answered that question.

Although, in Norton's defense there seems to be a lot of information that they have to sort through. I'll admit this information people are asking should be really simple to find in the Symantec Databases somewhere. I will not say they are hiding anything major but I do think something is going on that we are not aware of. Here's some other thoughts to considers? If Norton needed to find out who was using Windows 7, couldn't they of asked or even made a simple site redirect to find that information, after all anytime you visit a site you have that information sent to the stats. I could in theory find out how many visitors are visiting from Macs and how many are on older systems. That would be very easy to do with Google Analytics.

Now with that said let's talk about Why it took almost a whole day for them to release a public statement about what happened.  I might be wrong but if I was a stockholder, I'd of demanded them to send that out ASAP instead of waiting 20 to 24 hours.  Although I'm not trying to make any more conspiracy theories, I do think the Streisand effect came into effect and people are feeling like Norton did something they shouldn't have.  In which case, Norton probably made "A fail whale" attempt of making it better when they started to delete the post.

I've been watching the Norton forums trying to make sense of all this, and I do know that Norton have lost people's faith in them and people are removing their product off there systems if Norton doesn't start answering questions that need to be answered.

Norton has released the information of PIFTS.EXE and what it does. Although I am sure people are going to argue about what it does or doesn't. I wanted to post this for people to check out and consider for yourself.
Monday
Mar092009

Conspiracy theories run rampent due to PIFTS.EXE

(Looks like some of this was a 4chan gag, check my other post about it)



All of the sudden people around the World are seeing PIFTS.EXE popping up. Norton Antivirus is asking users if they want to accept it. Here what I do know:
Here's some information I pulled from my Zone Alarm Logs. Does this make sense to anyone?
[ad#cricket-right-ez]2009/03/09 18:26:44 -- New Program -- PIFTS.exe -- Destination IP: 67.134.208.160:80 -- outgoing -- blocked -- Destination: ping.lifecycle.norton.com

2009/03/09 18:47:52 -- Program Access -- PIFTS.exe -- Destination IP: -- outgoing -- blocked -- Destination:

2009/03/09 18:48:28 -- Changed Program -- Windows Explorer -- 207.46.248.249.80 -- outgoing -- blocked -- Destination: sa.windows.com
[Via The Symatec Forums]

This indicates that the program tried to change tactics to go out on the net.  I look a look for this and it is SwapDrive.  So this must be an update to Swapdrive but I am unsure as to why it pops up that way.  The other ip is in Africa or at least take the .80 out of the equation and it points to an Africa IP.  (It looks to my mistake in that little part, "to error is human" Check out this  post about it)  Although just recently Norton Decides to Delete that thread and people are really worried about why?  Is this a cover up of some sort because there is a exploit in the Wild that we don't know about?  These are good questions that need to be answered.   Here is what one posted about this just after they deleted the forum thread:

Norton Coverup?  Do you suppose


As you can see people are taking this deletion on the community forum thread very seriously, they know something is not right in Denmark.  I also want to point out this one:


Proof there was a thread



I don't know what Norton is up to but this is making me uneasy.  If they are worried about something that they can't explain or don't want to explain then they have made a mistake.  Some users are really worried now because Norton isn't saying anything at all.  I love this post:

A Conspiracy I see!!

As you can see people see this and are worried, I didn't want these to be taken offline like the first post so I make physical copies to put on my blog.  I want to prove to people that these actually existed.  I would advise people to run Hijackthis to see if you can figure out where this is coming from.  I don't know why they would hide the truth, it will bite them in the end.  Anyone want to comment on this, I am quiet curious??

*UPDATE 12:01 am 03/10/09*

Seems Norton Deleted all post about PIFTS.EXe so I don't know what happened but This will have to come out in the open sooner or later.  I just hope it isn't going to be to late.

Update 12:15am 03/10/09*

Seems people have decided to go to the Zonealarm forums to discuss this:

People are clearing wanting to know why?

You can visit there forums here.  I am getting more curious about this little situation and now tempted to stay up all night watching this!!

[ad#digg-right]I also found this forum thread from BuckeyePlanet.  I am seeing more and more people blogging about this.  So this must be something REALLY big.  Keep sending me comments if you find anything else.  Don't forget to add me on Twitter.

This looks interesting:
[ad#cricket-1]
Even more interestingly now, after posting a single post asking about PIFTS.exe, which was deleted, and a subsequent post to another forum asking about the deleted posts, which got deleted, I've now been blocked from creating new posts or replies on the Norton forums. They really don't want to talk about whatever this was.

And doubly interesting -- or perhaps not, who knows -- not sure if this is standard practice at Symantic or what, but opening the PIFTS.exe in a hex editor shows a large section of the end of the file consists only of "PADDINGXX" repeated over and over. I've got some background in programming and can't think of a good reason why you would need padding like that on a legitimate executable. However, if an executable in an update has been compromised it may require padding such as that to match the original executable's file size or something. But that's just pointless conspiracy theorizing that likely has no basis. It would be nice though to hear from Norton about what the **bleep** this thing is.
[Via Zonealarm Forum]

I don't know but I suspecting an update went wrong at least from all the indications I'm seeing.

I will say you have several options available to you:

  • You could get a Free Anti-virus Software

  • You could run without An Anti-virus (Not a great option, wouldn't suggest it)

  • You could do nothing and wait. (My recommendation until I find out the the full story!!)


Please let's not start a pandemic over this, I am however worried because Norton has yet to release any public information about this?  I will update as needed but please people let's not go to OVERBOARD on this!!

Google Get's rid of the Trend "PIFTS.EXE, no long there.  It was there last night.  Hmm even more questions and answers? (Click image to view it!!)

Proof it was there!!



On a side note, I do not have access to this file. I've had a friend who told me about this and I started to investigate it and as soon as I did that Norton started to kill the messages. That when I knew it was something big. That is why I blogged about it. I do not have the program. I just know that it is being searched really hard because I've had more people coming to my site than usual. So please don't ask about samples, you can comment on this or ask questions. I provide this for the community to let them know!!

(Looks like some of this was a 4chan gag, check my other post about it)

Monday
Mar092009

Fake Emails about Windows Support spam!

According to Trend Micro, Some malicious software is being sent to unsuspecting users about Windows SP1 andSP2 having a error that could damage software or even hardware.  See Trends blog with the photos of the fake spam.

[ad#ad2-right]Although from time to time Microsoft does send out security information to Technet subscribers people have also used this in the past to get people to install Viruses and Malware, like this one that installs TSPY_BANKER.MCL. TSPY_BANKER.MCL monitors the affected user’s online transactions and steals banking related information




Microsoft sends e-mail messages to subscribers of our security communications when we release information about a security software update or security incident. Unfortunately, malicious individuals can and have sent fake security communications that appear to be from Microsoft.


[Via Microsoft]



So if you get an email from Microsoft you'll probably want to delete it.  Any Microsoft communications will be sent from the Update center.  You should never install software that is from an untrusted website.    If you are concerned you should check the web and find out what people are saying about the situation and see if it is a scam or true!!  Remember only you can prevent a virus or Malware!

Saturday
Mar072009

How do you like your Cricket USB Modem?

Lately I talked about the A600 USB 3G modem and Now I want to hear from the Readers?  You see I can't do my best reviewing these with comments from the readers, that being you.

techlinkblog[AT]gmail.comClick the picture to send me email, just remember to replace "AT" with "@".



So I want to hear what you think about either the USB UM100 Modem or the A600 USB 3g Modem?  Here a re a few things to answer when you write your email.

Something will go to the people who email me?  I want to publish some of these comments on my blog for all to read.  I want to hear if what I am publishing helps you?  I will even give your credit as  to who wrote it.  If you have a site or something you want to promote by all means add that to your testimonial.  Here's the basic questions that should be talked about:

  • Which one did you buy? (Cricket USB A600 or Cricket USB UM100)

  • Did you Upgrade from the Cricket USB UM100 to the Cricket USB A600?

  • Are you using it for travel or Primary internet?

  • Is it for business or Pleasure?

  • Are you happy with your choice?

  • Do you recommend the Modem to friends and family?

  • Any Situation you can think of where this has been helpful?


I am going to be asking for comments from Cricket about this also and I will be publishing this later on this month but before I do that you will have your chance to tell the company what you think of their Broadband solution.  Please keep these comments family friendly, if you cuss and I publish it, be advised I will edit the cussing to be family friendly.
Friday
Mar062009

Getting to the A600 Program Files

So you want to see this screen when you plug in the A600 Broadband Card:
cricketa600softwarecricketdrive1

[ad]But doesn't pop up! I found out why. If you installed it one time or another and had a problem with the installation and it won't pop up with that screen. You'll need to take this first step:

Uninstall THE USB DRIVERS for A600
C:\Program Files\Cricket\USB DRIVERS\Uninstall.EXE

Once you do that you will see need to reboot and then try to insert the A600 Modem into the USB slot. It should pop up with t hat screen or you should see the drive become available.



I've also took the drive and copied the program files into a sub Directory of the 4 Gig drive installed in the A600 and I decided to help everyone else out by uploading the self-extracting program to rapid share:

Cricket-A600-Program.exe Bit torrent file

This is the file I created on Memory card for when I need it.  If you are uncomfortable downloading this because your worried about virus, then follow the directions on how to uninstall the software to get to your Cricket software for the A600.  I did this to make it easier later on to re-install the software without having to uninstall software.  Let me know if this helps. You should consider downloading Free Anti-virus Software and free Firewalls to protect your system if you haven't already!!
Thursday
Mar052009

Reviewing the 3G A600 Cricket Modem

So I got the Modem and wanted to test out the speed being stationary, So I go to my usual site Speedtest.net look at the speed, check below for speed.
As you can see this went fairly well. It does depend on your Cricket Coverage area. So you want to hear all about it.

First thing if you are upgrading from the UM100 Broadband Card, You'll want to uninstall the Quicklink Software.  To do that you can uninstall it by going to:

Computer > C: Drive > Program Files > Cricket > Quicklink > UNWISE.EXE

(This will uninstall the Quicklink software, I'd suggest after you uninstall it you reboot.)

a600cricketspeed

How does the USB Modem work?


Once you do that you can then insert the A600 Modem into your USB.  The Nice thing about this is the software for the Modem is on the Modem itself, so you don't loose the CD for the modem.  It currently only supports Windows and MAC OSX operating system but I have seen there is a work around to use the A600 Modem with Linux if your wondering.Once you insert it into the USB you'll find you have a new Drive.  It will say a Cricket CD Drive with 24 megs used.  You'll want to run that program on the Cricket CD and that will install the software.

The Connection


A600Connection

As you can see this is the provided application to connect to the Cricket Network and the speed and signal strength can differ from location to location due to coverage areas. This application can do several different functions:

  • Connecting to Cricket

  • Text Messaging (Free with broadband connection)

  • Bandwidth Monitor (Helps makes sure you don't use to much Bandwidth, they do have a soft cap of 5 gig's but haven't affected me yet.)

  • Statistics, this is good for those who want to try to get the most out of the modem.

  • Logs, Also good for those who want to keep track on how much they used the modem. It however only logs activity on the system it is connected to.

  • Activation -- Seems to help get updated tower positions when your traveling and can be done as long as you can get a signal


Pro's to this EVDO MODEM:



  • [intlink id="3174" type="post"]Memory Slot[/intlink] to have backups on files in case the worst case scenario happens (1 to 4 Gigbyte Capabilities)

  • Speed and Bandwidth (See above for speed test)

  • No loosing CD -- I have the [intlink id="3067" type="post"]program files[/intlink] online if you need them.

  • Independent card reader without having to install the Modem Software.

  • Able to take the modem with you as you go. (There is a clip slot for you to carry it anywhere you go.)

  • Found out there is an External antenna connector and will be looking at Antenna's for it in the future.

  • Swivel USB port, You can swivel it up or down 90 degrees or side to side 180 degrees. (X and Y Axis)


Cons:



  • If you use it primarily internet you'll expect some slow downs from time to time during HIGH Peak Zones.

  • This has a dormant signal feature that I will have to figure out how to disable but easily fixed by reconnecting to the tower. You can get out of dormant mode by web surfing, just load up your browser and the dormant mode will go away.


Twitter Comments:


@Laforge129 I sure am trying out the Cricket broadband.!I just started it last week and so far it never ceases to amaze me! (Via Twitter)

Conclusion







I and others would recommend the Cricket Broadband Modem a600 to anyone who wants an inexpensive and portable internet connection for $40 dollars and no contracts. Though with all the things you can do with this modem makes it an invaluable extra incentive in buying this modem. You should always check the Coverage area for Cricket and make sure you are able to use this modem in the first place. I'll have another update on this later on but I'm really impressed with all the features of this modem.


Clicker here to buy it now.

Check out my Extended Review of the A600 and All the programs that I added to my 4 gig MicroSD Card.

If you want to comment on the A600 just twitter me and tell me what you think. Maybe you'll twitter will be on my review site.

[gsom-optin]
Thursday
Mar052009

I hate Snopes Spam

As you know Snopes is used to find out about urban Legend and Rumors:

I received a Virus alert from my RSS feed about Email virus warning.  It even adds a Snope URL.  The Author just copies and pasted the virus warning into the blog without even going to Snopes.
[ad#ad2-right]
According to Snopes and I'll quote:
Although the Postcard virus is real, it isn't a "BIG VIRUS COMING" (it's already been around in multiple forms for a long time now), it will not "burn the whole hard disc" of your computer, CNN didn't classify it as the "worst virus" ever, and it doesn't arrive in messages bearing a subject line of 'Invitation.'

[Via Snopes]

Now as you can tell the link described in the blog post was "http://www.snopes.com/computer/virus/postcard.asp". If you went there, you'd have seen this as a not really true and some parts of this might be but that part about burning your Hard drive or even consider the Worst virus isn't true.

Some things you need to consider before forwarding anything is:

  • Is it completely True?

  • Is it Legitimate?  (True blown warning about something like a product recall  or something important like that)

  • Does it Say to Forward? (if so it is probably not wise)

  • is it from a Friend (If so you might want to remind the friend nicely that it isn't nice to send spam)


If you follow some of these suggestions you'll be making the Internet a far better place for everyone.  Remember if you don't know, it's time to learn.  if you do know, it is time to teach.  These are the fundamental aspects of using the internet the right way.  Also if it is a fake virus warning you should tell them to get a Free Anti-virus and Firewall to better protect them.  Also  remind them that if they keep their system updated then they shouldn't be too worried.  Remember only you can prevent a Computer Virus and it's up to you keep your system up to date.
Wednesday
Mar042009

Microsoft Releases the Patch Information for March

Microsoft Has Released the Patch information For march and This is what is expected to be patch on March 11, 2009:

  • Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (Kb949029) -- This security update resolves several privately reported and publicly reported vulnerabilities in Microsoft Office Excel that could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.  (affected System : Microsoft Office)

  • [ad#ad2-right]
  • Vulnerability in Microsoft Outlook Could Allow Remote Code Execution (Kb949031) -- This security update resolves a privately reported vulnerability in Microsoft Office Outlook. The vulnerability could allow remote code execution if Outlook is passed a specially crafted mailto URI. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. This vulnerability is not exploitable by simply viewing an e-mail through the Outlook preview pane. (affected System : Microsoft Office)

  • Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (Kb949030) -- This security update resolves two privately reported vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a malformed Office file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. (affected System : Microsoft Office)

  • Vulnerabilities in Microsoft Office Web Components Could Allow Remote Code Execution (Kb933103) -- This critical update resolves two privately reported vulnerabilities in Microsoft Office Web Components. These vulnerabilities could allow remote code execution if a user viewed a specially crafted Web page. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.  (affected System : Microsoft Office)


These Four are all Critical and should be applied the week of March 11, 2009.  Their are Seven Patches coming out, but these are the main focus.   According to Microsoft they have released MS08-014, MS08-015, MS08-016 and MS08-017 to better help you find out which ones are affected.

Now is the time to get AutoPatcher ready and make sure it is up to date on any patches that might of came out this month that you didn't know about.  Also consider downloading the new version of Anti-virus and Firewall software while you are it.  In case you come accross a rogue virus and need to disinfect it!!  Some of these patches for this month is due to the EXCEL vulnerability that is out right now and is in the wild, so that should be your top priority once Tuesday come around.  Remember hackers will start exploiting these patches on Wensday and you will be racing against the clock.   One last bit of information for the Mac Users you should also apply these patches they are vulnerable to according to Microsoft.  I'll update as more information becomes available!!
Tuesday
Mar032009

Cracking and Warez sites are Host of Trouble!!

It is nothing to laugh at and should be understood that gamers have no freedom right now.   That said this new Variant to Virux Trojan is in regards to Win32/Vitro Trojan.  It seems tobe infecting .exe and .Scr files just like this.

According to Trend Micro:
[ad#ad2-right]
The downloaded malware include variants under the FAKEAV, TDSS, and VUNDO families. Infection chains, however, are notable for the presence of VIRUT and VIRUX malware. VIRUX and VIRUT attacks were initially about the volume of infected PCs. The numbers are massive enough to worry Web users and security researchers: around 20,000 PCs are infected per day
Read more: "Crack Sites Distribute VIRUX and FakeAV"

Now it seems to be more and more sites with getting computer infected. It also seems the Malware writers are using these servers for helping infect essentially gamers computers. So for the time being, if you have a favorite game and you want to:

  • No-CD Crack (This is good for those who want to play the game without the CD)

  • Key Gen Cracks (This is used for pirated version of a game)

  • Update Cracks (This is used to prevent CD checking or Also prevent Version Checking)

  • Game Cheats (This is usually a small program like a bot or some other way for the gamer to cheat)


And should not be Downloaded or USED!! I don't say that lightly, because Gamers feel they should be able to play any game they want. Although this post will probably make the Gamer developers happy, I do this to tell people that these virus writers are using the gamers to distribute the Virus.   I encourage all the gamers out there, that don't want to loose their games to not download any more of these types of cracks.  It seems the virus writers are wanting to infect systems and slow you down.  You don't want to slowed down do you?  Please consider getting a Firewall and a Free Anti-virus software to better protect your system.
Sunday
Mar012009

Facebook Goes Phishing again

In one of my Previous articles about the Koobface Worm, I talked about the way they were infecting the systems and what you need not do.

It seems that Trend Micro has seen an even more rise in people downloading the WORM_KOOBFACE.AZ and Seems to be on the RISE. This is all done with a Social engineering and Has had some attempts before with this little worm on Facebook.

[ad#ad2-right]After your Infected with this new Variant, it searches for cookies and Sends out a message to people from:
* facebook.com
* hi5.com
* friendster.com
* myyearbook.com
* myspace.com
* bebo.com
* tagged.com
* netlog.com
* fubar.com
* livejournal.com

This seems to be a social engineering Nightmare for these websites and as yet are unsure what else it does but it says the same thing it did before by saying "This is a Video of You on the Street." Which is bogus but none the less people click and think they have to download a codec or update their Flash. Social Engineering is on the rise and will be taken seriously. You should read the full report from Trend on what it does but you also should have an anti-virus and Firewall installed to prevent this from happening in the first place. The only true way of preventing this is not to be fooled, you should NEVER Download from a site you don't know or trust. See all the Facebook articles for more information.
Sunday
Mar012009

A Sneak Peak at the A600 3G Broadband Cricket Card

So I was doing a little research and found this nugget from my Affiliates Network:

Features:


Removable Memory Format:  microSD
Storage Capacity External memory up to 4GB
Text Messaging Yes
Contact Directory Yes
Language English/Spanish

Wireless Capabilities:


Technology CDMA
Mode Tri-Band
Data Transfer Speed 3G (EVDO Rev 0, Rev A) and 1x
USB Broadband Modem (A600) Looks interesting, and I am thinking this will be the next thing the company will start Advertising for. Right now though, it cost 119$ with a 50$ Mail in Rebate and you spend 69$. With a CDMA only USB Card like the UM100, you know the speed of that. Now According to Wikipedia for 3G and I'll quote:
Thus users sold 3G service may not be able to point to a standard and say that the speeds it specifies are not being met. While stating in commentary that "it is expected that IMT-2000 will provide higher transmission rates: a minimum speed of 2Mbit/s and maximum of 14.4Mbit/s for stationary users, and 348 kbit/s in a moving vehicle,"

Now this is a much improved speed and I will be testing this in the future but for right now it is untested. I'll have another article in the coming months about this. I also like the look of this but haven't seen it first hand. The other thing I like is the the 4 Gigabytes of MicroSD memory. [intlink id="3171" type="post"]I can see a whole range of useful programs you can install on the USB and make it Portable to a point[/intlink]. I'll improve on that later on once I play around with what you can have on the card and what you have to have to use the USB modem. The Modem supports Windows 2000 through Windows Vista 64 Bit, also Supports Macintosh.

More to Come!!  (Check out the UM100 Review)

[ad#text-broadband1]
Friday
Feb272009

Rogue Fake Codecs on the Rise

Panda Labs has been talking about Adware/VideoPlay and they are seeing a lot of variants on this.   They even play a game, find the difference in the installation screen:



Now as you can see this look to be the same agreement in all those difference installation.  Some things to consider Never install any software from a website that you don't know Nothing about about.

Panda Labs also talks about these new variants in regards to what they do:

This file spreads by making copies of itself in the removable drives and it also creates an autorun.inf in order to be run when they are accessed. This file collects the data stored in the browsers, such as cookies, passwords, profiles, email accounts, etc, and connects to a remote address to send the information.
[Via Panda Labs Blog]

[ad#ad2-right]As you can see this makes you have very little security with your system.  I talk about Identity theft, and why you should always worry about your identity.   This however will make your passwords less secure and maybe even compromise you system to the point of having a data breach.   You need to be careful when you come by this, some fake codecs have been know to be scareware.  In which, the fake codecs installs a Trojan to tell you have a virus and try to make you buy a fake program to get rid of the Virus.  In one of my recent posts about Codecs and Facebook, I talked about the K-Lite Mega Codec Pack and how that will prevent you from installing these sociable links from friends and family.  The nice thing about this pack is it install all the really good codecs that you might come across on the web.  If you have this installed and there's a website that says you need a special codec, you'd know that it is either a fake codec or the author who made the video doesn't standardize.   In which case you will be more willing to leave that site without installing that codec.

If you follow these steps and also consider installing an Anti-virus and Firewall, you will be in a much better shape then when you first started out. Remember only you can prevent from getting a virus. You should also consider doing the registry edit that will prevent Autorun. As you can tell these new variants also are spread through USB and other removable media. This is the other way these programs are using to infect other systems.
Thursday
Jan082009

Microsoft Keynote CES 2009



[ad#ad2-right]

Some Key topics talk about in this Keynotes are:


Windows 7 -- Lighter, Faster, and Reliability. Windows 7 Should boot quicker and faster, and enables cool new interface touch.

Windows 7 -- Beta will be available Worldwide on January 9, 2009 and will be available for download on MSDN and Technet.  Also it will be available at : http://www.microsoft.com/windows/windows-7 For those who want to download it from Microsoft directly.

Windows Live Essentials -- Windows live Messenger, Mail, and Photo Gallery works with Windows XP, VISTA, and Windows 7. It is available for download worldwide. Dell will also be putting this on their consumer and small business computers.

Windows Mobile -- 11 Different Mobile phones.

Verizon Mobile --  Windows Live Search will be available through Verizon and it's a partnership with Microsoft.

Demo of Windows 7, Live, and Mobile:


Windows 7 will have Windows touch and be able to use net books with Windows 7.

Windows 7 has been designed with the Touch DNA in mind.

Windows Mobile demo with an Panoramic display.

Windows Live Demo --  Various things they discuss here including Photo's and Silver light.

Windows XBOX:

[ad#ad2-left]Halo Wars -- Strategy game and will Available February 28, 2009. The Bungie Will have a demo version February 5, 2009 and will be available for download.

Halo 3 ODST -- Will be available in the Fall of 2009. New Characters, new events and will be like Halo 3.

Various stuff about Xbox Live 360

These were just the main things that I thought was important to let people know what was mainly the important highlights of this keynote. I will recommend everyone to go and watch it for yourself, I am sure I've missed something that someone would consider very important and understand that. This however is a personal and will be different in everyone. I watched this and am excited and can't wait for windows 7 to be released so I can get my hands on this and see how it fairs with a Vista CPU and GPU. So only time will tell. I hope you enjoyed this little run down. Please feel free to leave a comment and talk about this or anything else in the Disqus community.
Saturday
Dec202008

Disaster preparation -- 103 Hidden Partition

What is an OEM?


Many laptops or Desktops now a days have this hidden partition that is used for OEMS.  An OEM or original equipment manufacturer for those who don't know is a company that sells a system with it's own branding or services.  It varies from company to company just what they sell to the consumer.   Having Said that, let's talk about this Hidden Partition.

Why do I have a Hidden Partition on my drive?


[ad]To simply put it, most likely it is there for a emergency backup for your Operating System.   It can be accessed through your boot up.  Most of the time if you press f11 or f12, some key combination to go to this hidden partition and restore the system to the  factory settings.   Now I tell you this to warn you that you don't ever want to delete this partition because you need it to verify that in case you need a driver it might be there.     Now a days, most laptop and desktop sellers don't want to include a backup CD or DVD in the box so they expect you do make one.   This is where the hidden partition comes to play.   This also used to make DVD or CD of operating system.

How big is the Partition?


That isn't a simple question because most OEM's like to vary partition to prevent them from being used in other OEM systems.   Now not saying it is hard to find out.  There are several tools used to backup this hidden partition but can cost to get to it.  Like my system, it takes up around 8 gigabytes of space on mine.   Others, I've seen, only take up 4 gigabytes.   It varies from branding to branding.   Also keep in mind that you want to backup this important partition just in case there is a problem with the Hard Drive.   This is really IMPORTANT: the Hidden Partition is only good for the hardware you have right now so it can only be used with that particular system.   Should you try it on another system, may have trouble or not work at all.

How do I back up this Hidden Partition or Even transfer it to another Hard drive?


If you wanted to change out your old laptop or desktop hard drive and put in a bigger and better hard drive.  You'd need to copy the old partition of the drive first to put in the new drive.    How do you do that?   Most laptops only have room for one Hard Drive so you might need to buy a cable for that laptop.   It's call a USB to Sata Adapter and it allows you to hook up a second hard drive so you can copy from the original source.   This one I am showing you is good for both Laptop and Desktop it's got all you need to make a back up or even copy the data off.

What software do I need to copy this Hidden partition?


There are several programs that will help you do this.   Each of them have there own look and feel to them.   These companies will support people who are wanting to backup there important Operating system.   Yes the operating system is important if you didn't have that the hardware would just sit there.   Although there are free operating systems they do come with there own problems and solutions.  So let's begin talking about the commercial backup software:

  • Acronis True Image -- Backup your entire PC: Acronis True Image includes our patented disk-imaging backup technology. You can copy your entire PC, including the operating system, applications, user settings, and all data. In the event of a system or disk crash, virus attack, or other fatal failures, you can restore the entire disk contents in minutes--no reinstallations required!

  • Norton Ghost 14.0 -- Protects your computer with advanced backup and recovery: creates full system and file backups, restore from system failures, and back up based on schedules and events

  • Paragon Partition Manager 9.0 Personal -- Partitioning, Manage disk partitions, Optimization and Defragmentation, Boot Manager, and Simple Backup Wizard


[ad#ad2-right]I will add more to my store when I find others that work well with doing the hidden partition.   You will also not that these are are the best to use when you want copy the hidden partition because they know about the hidden partition.  Other software might only copy the visible partition and ignore the hidden.  So that is why I talk about commercial software because there's a person on the other end who could help you out.

These are just a few that will work for you, if you want to go find the free software by all means but I must warn you the free software doesn't come with any warranties or someone who could help most of the time.  It is a pot shot with free software, some work well and others just make a mess.  There are some free back up software but most of the time they only copy the visible and not the hidden, so if you must go looking.  Go looking for the ones who say they can copy the hidden partition.   These are the ones you need use to back up your operating system.
Friday
Dec192008

Inside Generic Pup.Z

[ad#ad2-left]

Infection Methods:


Potentially unwanted programs do not self-replicate. They spread manually, often under the premise that they are beneficial or wanted. They can either be stand alone applications, or come bundled along with other PUPs, Trojans or Rootkits.

Installation methods involve system or security exploitation, and unsuspecting users manually executing unknown programs.

Distribution channels include email, malicious or hacked web pages, Internet Relay Chat (IRC), peer-to-peer networks, etc.

Ways to prevent Infection:


In order to prevent these types of infections you need to understand that most of the time it is something you thought was useful but yet has a virus hidden inside of it.   Some of the things you can do to remove the virus is:

You need to remember about security and how to counter any virus installation by having a firewall and Anti-virus.  I have also put an e-store to better make use of anything I see on Amazon that might help you out.  If you want to visit it, click here.
Sunday
Dec072008

Upcoming Patch Tuesday

[ad#ad2-right]I wanted to get prepared for the updates for this Tuesday and I thought I'd go through them and list what Microsoft said about each.   These are what's been said on Technet and I am sure there will be more.   Each one of these don't look to serious but I will post Tuesday if there is anything I've missed on this post.   As you might know this is not set in stone but just the direction of Microsoft for this Months Release.


KB955839

Update for Windows Server 2008, Windows Vista, Windows Server 2003, and Windows XP

Install this update to resolve an issue that is caused by revised daylight saving time laws in many countries. This update enables your computer to automatically adjust the computer clock on the correct date in 2008. After you install this item, you may have to restart your computer. This update is provided to you and licensed under the Windows Server 2008 License Terms.

[ad#ad2-left]KB957388

Update for Windows Server 2008 and Windows Vista

Install this update to resolve a set of known application compatibility issues with Windows Server 2008. After you install this item, you may have to restart your computer.

KB890830

Windows Malicious Software Removal Tool

Microsoft released the Microsoft Windows Malicious Software Removal Tool to help remove specific prevalent malicious software from computers that are running Windows Vista, Windows Server 2003, Windows XP, or Windows 2000. After you download the Microsoft Malicious Software Removal Tool, it runs one time to check your computer for inflection by specific prevalent malicious software (including Blaster, Sasser, and Mydoom) and helps remove any infection it finds. Microsoft releases a new version of the tool every month.

[ad#ad2-right]KB905866

Update for Windows Mail Junk E-mail Filter [November 2008] (KB905866)
Install this update for Windows Mail to revise the definition files that are used to detect e-mail messages that should be considered junk e-mail or that may contain phishing content. After you install this item, you may have to restart your computer. This update is provided to you and licensed under the Windows Vista License Terms.


I am sure there are going to be others but right now this looks like the normal things Microsoft sends out.  I am sure they are keeping a tight lid on the really serious stuff until last second so I'll have to report the really important stuff Tuesday.
Wednesday
Dec032008

Adobe Lays off 600 people

Adobe might also hire new workers within Europe, he said. The cuts will be formally announced on Dec. 15 when the company releases its fourth-quarter financial report.



[via Infoworld]



[ad#ad2-right]This is another technology company to lay off people, there are some talks that it would be around 600 workers on some blogs. Others are just talking about the Management shakedown, and some workers are going to be moved around. I don't know who is going to be laid off, or if there will be a tremendous amount of people who will need to start looking for a job. I do know that Adobe is looking for ways to cut cost, and I expect they are having problems just because of the Recession.  If you want to check out other jobs that have laid people off, just click this link.



[ad#ad2-left]

Adobe also announced the implementation of a restructuring program, and has taken steps to reduce its headcount by approximately 600 full-time positions globally. The restructuring will result in anticipated pre-tax charges totaling approximately $44 million to $50 million. The Company expects approximately $28 million to $30 million of the restructuring charges to be recorded in the fourth quarter of fiscal year 2008.


[Via Adobe Blog]


This the press release for Adobe and I wanted to share with you what they said. So it is confirmed they want to get rid of 600 people. Sad to hear, but that isn't the only layoffs in the industry. If I find out anything else I'll let you know!!
Monday
Dec012008

Vista To release Service Pack 2 in April 2009



[ad#digg-right] Some sources are reporting that Vista SP2 will be out in April.   According to Engadget they claim TechARP is a bunch of Malaysian Kids that like to boast about how they broke the Vista SP1 and XP SP3 release schedules to the world.  They claim though that Vista Release candidate is to be out around February.Microsoft has indicated that this SP3 will include Windows Search 4, Bluetooth 2.1 wireless support, faster resume from sleep when a wireless connection has been broken and support for Blu-ray.   I personally think it will include some of Windows 7 features to better get people accustomed to Windows 7 when they come out.

[ad#ad2-left]Although this is speculation and no hard evidence I think it has some merit due to the fact that Microsoft has admitted in the past that Vista was a big Letdown.  I don't think they can any more to damage than they have already done.   If anything Windows 7 will be a easy Success if they pull it off in the right way!!!  Although with WIndows 7 be leaked online there is no telling what will happen. I am sure what ever happens will be interesting to say the least!!!
Tuesday
Nov252008

Some program Vulnebilities Detected!!

Just got done looking at some of my security sites and according to SecuriTeam there are are several programs that have vulnerabilities. here are the Ones that I've found:
Google chrome is vulnerable to URI Obfuscation vulnerability.
An attacker can easily perform malicious redirection by manipulating the browser functionality. The link can not be traversed properly in status address bar.This could facilitate the impersonation of legitimate web sites in order to steal sensitive information from unsuspecting users. The URI specified with @ character with or without NULL character causes the vulnerability.


[ad#ad2-right]iPhone Configuration Web Utility for Windows Directory Traversal
iPhone Configuration Web Utility lets "you easily create, sign and distribute configuration profiles using a web browser". A vulnerability in iPhone Configuration Web Utility allows remote attackers to access files that reside outside the bounding root directory of the program's files folder.


Streamripper Multiple Buffer Overflows
Streamripper "records Shoutcast and Live365 MP3 streams to a hard disk, creating separate files for each track. Runs under Unix and Windows." Secunia Research has discovered some vulnerabilities in Streamripper, which can be exploited by malicious people to compromise a user's system.


Amaya URL Bar Stack Overflow Vulnerability
A vulnerability in Amaya browser allows remote attackers to cause it to overflow an internal buffer which in turn can be leveraged to execute arbitrary code.

These are the ones that I found and wanted to let you know about these so you can make your system even more secure.   if I find any others I'll let you know!!!
Tuesday
Nov252008

Microsoft kills a fake antivirus tool from 994,061 computers!

According to Arstechnica and I'll quote:

[ad#ad2-left]Win32/FakeSecSen has gone by various names, including Micro Antivirus 2009, MS Antivirus, Spyware Preventer, Vista Antivirus 2008, Advanced Antivirus, System Antivirus 2008, Ultimate Antivirus 2008, Windows Antivirus, XPert Antivirus, Power Antivirus, and Ultra Antivirus 2009. Furthermore, it is skinnable, so each of these variants has a different GUI, although the basic functionality is the same: bother users with warnings of malware until they pay up.

The Microsoft Malware Protection Center recently released some data on how the removal tool performed this month: FakeSecSen was removed from 994,061 machines. That number isn't the highest Microsoft has recorded before, and the number of removals depends on which malware Microsoft adds each month and how widespread it is.

[via Arstechnica]

This seemed to of happened this month with the usual Windows update.  If you haven't updated your system just yet you should.   This troublesome fake virus seems to have been killed  from several systems.  This could effectively make it harder for these guys who ever designed this program to make money.  I hope microsoft does even more virus removals in next month.  If you still want to try to get rid of these viruses don't forget to check out my tips on Virus removal.