Tuesday, November 8, 2011

4 tips for safely conducting research on the web


Surprisingly, basic safety is often ignored by people using the web to research information quickly and efficiently. If you use the Internet for research of any kind, you could be exposing yourself and your company to hidden dangers such as the unauthorized transfer of confidential information. And no one wants to be the person responsible for a companywide computer network shutdown.
Whatever your reason for using the web, there is a smart way to conduct research on it: with an alert eye and a vigilant approach. Use these four tips to help protect yourself and your company from prying eyes and malicious programs.

1. Update, update, update!

Microsoft continually provides enhancements and security updates to all its products, including Internet Explorer. No program is completely safe from harm but as threats are discovered, Microsoft makes fixes, upgrades, and service packs for its products available. To maintain the highest level of security on your computer, you or your IT department must make sure to apply all service packs.
Before you venture onto the web, make sure you are using the latest version of Internet Explorer. At the time of this writing, the latest version is Internet Explorer 8.0.7. To see what version you are using, follow these steps:
  1. In Internet Explorer, on the Help menu, click About Internet Explorer. There are three items you should notice in the window that is displayed:
    • Version: Internet Explorer 8.0.7 is the latest version.
    • Cipher Strength: This is the level of encryption that the browser can support. If you are going to be sending any confidential information over the Internet, you must make sure the cipher strength is 128-bit. If it is less than this value, it will be possible for a hacker to crack the encryption code and view confidential information.
    • Update Versions: Keep your version updated to ensure the balance between security and functionality is correct.
    Use latest version of Internet Explorer Use latest version of Internet Explorer
  2. Click OK to close the window.
If your browser needs updating, go to the Microsoft Update website, where you can download the latest version of Internet Explorer.

2. Get into the zone

By setting up Internet zones to meet your personal needs, your computer can help protect you as you surf the web. A zone is a logical region or grouping of websites, based on where they are physically located and how well you trust the source. These default zones are available in Internet Explorer 8.0.7:
  • Local Intranet — Websites located on your local network. These sites do not have to communicate over the Internet to be accessed.
  • Trusted Sites — A list of websites that you trust not to harm your computer, such as sites you have identified as properly encrypted.
  • Restricted Sites — A list of websites that are known or suspected to be harmful to your computer.
  • Internet — All other sites that don't fall under the other three categories.
You can indicate how Internet Explorer should behave when it accesses a website within each of these zones. In Internet Explorer, on the Tools menu, click Internet Options. In the Internet Options dialog box, click the Security tab.
Internet zones can help protect you. Internet zones can help protect you
When you select a web content zone, you can change the security levels. For all but the Internet zone, you can add specific sites to a zone based on your personal requirements. And Custom Level allows you to enable or disable a variety of options based on personal preference. For example, you may want to allow automatic logons only to websites that are located in your Intranet zone instead of everywhere on the Internet. The User Authentication section of the Custom Level zone allows you to set that preference. Or, you may want to ensure your Pop-up Blocker is enabled. Custom Level is where you can ensure your security settings allow your blocker to operate.
Follow the prompts in the Internet Options dialog box in the zone you want to customize by either clicking Sites or Custom Level.

3. Limit your intake of cookies

Cookies are small files stored on your computer that contain information needed on certain websites. A cookie can be used to store user ID, password, preferences, personalization, or other information that is helpful to enhance your experience on that site. For example, suppose you visit a website that allows you to select a preferred language. So you don't have to choose the language preference each time you enter the site, a text file on the site stores language preference directly on your computer as a file, or cookie.
Here's the catch: you don't know what the cookie has been programmed to collect. You don't know if the cookie is malicious or not. If it's malicious, you could quickly end up with a spiteful little program stored directly on your hard drive. A malicious cookie can collect and store almost any information that you may not want it to, such as your name, credit card information, address, or more. Cookies make it possible for unwanted information to be stored and accessed repeatedly when you visit a website.
By default in Internet Explorer, cookies are allowed for all zones except the Restricted Sites zone. However, if you want to limit cookies for a particular zone, here's how you do it:
  1. In Internet Explorer, on the Tools menu, click Internet Options. In the Internet Options dialog box, click the Privacy tab.
  2. In the Settings section, move the slider up or down to adjust the settings.
    Select settings for Internet Zones Select settings for Internet Zones
    Moving the slider up incrementally increases the Internet security on your computer, so that cookies are not accepted. Moving the slider down incrementally decreases the security, so that cookies are accepted. Check with the IT department for your organization if you are not sure which settings are appropriate to use.
  3. Also in the Settings section, click Sites to explicitly set a cookie policy for individual websites. Here, you can specify which sites you want to allow or not allow to use cookies. Enter the desired website address in the Address of website text box. Click the Block button to block all cookies for the entered site, or the Allow button to allow all cookies for the entered site.
  4. Continue entering settings for each specific website for which you want to set a cookie policy.
  5. Click OK to return to the Internet Options dialog box. Click OK.
If you are concerned that you may already have cookies on your computer that contain personal information, you can delete cookies and other temporary Internet files by following these steps:
  1. In Internet Explorer, on the Tools menu, click Internet Options.
  2. Make sure the General tab is selected. (This is the default.)
  3. In the Temporary Internet files section, click the Delete button. You will be prompted for confirmation before continuing.
  4. The Temporary Internet files that you can delete are listed and selected for deletion by default, including Cookies. Clear the check box beside any temporary Internet file types that you do not want to delete.
  5. Click OK.
Delete Browsing History Delete Browsing History


4. Check for encryption before entering information on a site

While surfing the Internet is less dangerous than finding an abandoned bag in an airport, security should still be taken seriously. Encryption is a method that website owners use to help protect sensitive information, such as user names, passwords, addresses, phone numbers, and credit card numbers. If a website you visit does not use encryption, any sensitive information you place on it is easily accessible to hackers who want that information for unsavory purposes.
There are two ways to ensure you are viewing an encrypted site.
  • Make sure you are using the latest version of Internet Explorer as outlined in Tip 1 ("Update, update, update!") above.
  • Make sure that a website uses encryption when you are entering or viewing sensitive information. There are two ways to see whether a site uses encryption. One is a small yellow "lock" icon on the status bar of Internet Explorer. The other is in the web address itself. If it begins with https:// (note the "s"), then the site is secure. If you ever visit a website without either of these encryption indicators, do not click a Submit, Save, or OK button, because sensitive information will be transmitted without being encrypted.  

Monday, November 7, 2011

How to tell if the computer is infected by Win32.Ramnit-G malware

The symptoms of Win32.Ramnit-G vary wildly, ranging from slow PC performance to loss of important data. If you are experiencing any of the symptoms listed below, chances are you have Win32.Ramnit-G or another risky unwanted programs installed on your computer:

Sudden slow PC performance

Win32.Ramnit-G can use a lot of your system resources to track your computer activities or deliver pop-up ads that may greatly slow down the computer or even make it crash randomly. If you are recently getting a lot of system crashes, the computer is running much slower than usual or you cannot access your hard properly, then your computer must be infected and should be took care of.


E-mail problemse

Win32.Ramnit-G can collect and send your email address book to an email spammer and send unexpected email messages from your computer without your knowledge. If you get a lot of bounced back emails or notice that thousands of emails were sent without your permission, then it is possible that your computer is infected.


Constant unwanted adse

Win32.Ramnit-G will interrupt you with annoying pop-up ads for adult or other objectionable web sites. If it is controlled by hackers, this can make your computer completely useless once you visit the website in which malicious programming or code is planted.


Unexpected desktop icons, Toolbars or homepagese

Win32.Ramnit-G or other threats may record and reset your account settings or change your default homepage to a different one, which sometimes cannot be changed back. Also, it can also add new desktop items or toolbars to Internet Explorer without letting you know.

Warming tips: No matter whether your computer has been infected by Win32.Ramnit-G or not, we strongly recommended that you should download and run a free spyware scan with PC Safe Doctor right now. It helps to not only detect the threats infecting your PC now, but also prevent such or other malicious threats any time!

How to remove Win32.Ramnit-G manually

1. Boot your computer into safe mode to close all running processes.

2. Remember to back up your system before making any changes for future restore job when necessary.

3. Remove these Win32.Ramnit-G files:


%UserProfile%\Local Settings\Temp\kjkkklklj.bat
%Documents and Settings%\[UserName]\Desktop\Protection Center Support.lnk
4. Open Registry Editor to delete the following registry entries:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run 'tmp'
HKEY_LOCAL_MACHINE\SOFTWARE\Paladin Antivirus
HKEY_CLASSES_ROOT\CLSID\{5E2121EE-0300-11D4-8D3B-444553540000}
HKEY_CURRENT_USER\Software\Paladin Antivirus
HKEY_CURRENT_USER\Software\Paladin Antivirus
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run '[random string]'
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations 'LowRiskFileTypes' = '.exe'

5. It is possibly for Win32.Ramnit-G to load by hiding within the system WIN.INI file and the strings "run=" and "load=". So you must check carefully in order to thoroughly remove it from your computer.

6 It is necessary for you t clean the IE temporary files where the original carrier may store.

Friday, November 4, 2011

Fix STOP 0x000000ED UNMOUNTABLE_BOOT_VOLUME error message

When you first restart your computer during the upgrade to Windows XP, or when you start Windows XP, you may receive the following error message:

STOP 0x000000ED (0xaaaaaaaa,0xbbbbbbbb,0xcccccccc,0xdddddddd)
UNMOUNTABLE_BOOT_VOLUME


Advanced troubleshooting
These methods are intended for advanced computer users. If you are not comfortable with advanced troubleshooting, you might want to ask someone for help, use the Microsoft Customer Support Services Web site to find other solutions, or contact Support. See the "Next steps" section for more information about the Microsoft Customer Support Services Web site.

Begin by reading the "Technical information about the error" section to understand why the error might be generated and the purpose of the message. Otherwise, you can skip this information and begin with "Method 1: Check the error message" to help you resolve the issue.
Technical information about the error
This section provides some technical background about the cause of this error message and why it might be generated.

This behavior can occur if either of the following conditions is true:
Your computer uses an Ultra Direct Memory Access (UDMA) hard disk controller, and the following conditions are true:
You use a standard 40-wire connector cable to connect the UDMA drive to the controller instead of the required 80-wire, 40-pin cable.
The basic input/output system (BIOS) settings are configured to force the faster UDMA modes.
The file system is damaged and cannot be mounted.
The purpose of this error message is to prevent the following two things:
Potential data loss caused by using an incorrect IDE cable for the faster UDMA modes. An IDE cable is a kind of cable used to connect storage devices, such as hard disks, inside a computer.
Continued access to a drive on which the file system is damaged

Method 1: Repair the volume
Note the second parameter (0xbbbbbbbb) in the error message. You might have to regenerate the error in order to write it down.

If the second parameter (0xbbbbbbbb) of the Stop error is 0xC0000032, the cause of the error is that the file system is damaged. You can try to repair the volume to see whether this resolves the error. If the second parameter is not 0xC0000032, see "Method 2: Check the IDE cable and load Fail-Safe settings" for help.
Some things that you should know before you try this solution

If the file system is damaged, you can use chkdsk /r command to repair the volume. However, if you use the chkdsk /r command, you may lose some data.

You will need the Windows startup disks or the Windows installation disk. If you do not have them, contact the computer manufacturer for help in obtaining the disks.

You will need the administrator password to complete the steps.

To repair the volume, follow these steps:

Start your computer by inserting the Windows startup disks or the Windows installation disk if your computer can start from the CD drive.

When the Welcome to Setup screen appears, press R to select the repair option.

If you have a dual-boot or multiple-boot computer, select the Windows installation that you want to access from the Recovery Console.

Type the administrator password when you are prompted to do this.

Note If no administrator password exists, press ENTER.

At the command prompt, on the drive where Windows is installed, type chkdsk /r, and then press ENTER.

At the command prompt, type exit, and then press ENTER to restart your computer.

After you repair the volume, check your hardware to isolate the cause of the file system damage.

If this procedure does not work, repeat it, but type fixboot instead of chkdsk /r in step 5.

If you are still unable to resolve the issue, please see the "Next steps" section for help.

Method 2: Check the IDE cable and load Fail-Safe settings

If your computer uses a UDMA hard disk controller, try these steps. If your computer does not use a UDMA hard disk controller, see the "Next steps" section for help.

If your UDMA hard disk is connected to the controller with a 40-wire UDMA cable, replace the cable with an 80-wire cable.

In the BIOS settings for your computer, load the 'Fail-Safe' default settings, and then reactivate the most frequently used options, such as USB Support.

Thursday, November 3, 2011

Fix Error 9036 CA Product Installation failure


This error causes because of internal error in creating a list of trusted applications for CA personal Firewall

The solution to the problem follow the instructions to fix the error "9036 ca product installation failed creating applications for ca firewall" :

Step 1 :Go to ‘Start’ then Click ‘Run’. 
Step 2 :Type “msconfig” and Press ‘Enter’. 
Step 3 :Click on the Startups tab. 
Step 4 :Click 'Disable All button'. 
Step 5 :Click ‘Apply’ and then click ‘OK’. 
Step 6 :Restart your computer. 
Step 7 :Uninstall All the old CA Software.

Wednesday, November 2, 2011

Chkdsk tool automatically starts scanning

Chkdsk tool automatically starts scanning a disk when you start a computer

The reason behind this problem can be that the disk check option has been configured to run automatically as soon as the user starts the computer.
 
The solution to the problemfollow the instructions to resolve the problem of chkdsk running automatic disk scan:
 
Step1:
Click ‘Start’ and then click on ‘Run’ 
 
Step2:
Type ‘CMD’ and click on ‘OK’
 
Step3:
If you want to disable check disk on C: drive, use the following command on command prompt. 
 
Step4:
‘chkntfs /X C:’ If you want to disable check disk on two or more drives, just keep on adding the drives: ‘chkntfs /X C: D: E:’
 
Step5:
If you want to restore what you have done, that is, enable automatic disk checking on all the drives again, just run the following command: 
 
‘chkntfs /D’

Tuesday, November 1, 2011

Enable Hibernate in Windows 7 using the command prompt


Follow the simple steps below:

- Click Start >> Run

- Type cmd in the Run dialog box and click OK (If you don't see Run then click here to learn how to enable it in your Start Menu in Windows 7)

- In the command prompt window, type the following command:

    powercfg /hibernate on

- Once you have enabled Hibernate, you will see the following when you click the, arrow next to Shut Down on your Start Menu (see picture below)


NOTE: If you don't see the option for Hibernate, then follow these steps:

- Click Start and type Power Options in the search box and then select Power Options (see picture below)




- In the Power Options window, click Change when the computer sleeps

- Now click Change advanced power settings

- Expand Sleep and set Allow hybrid sleep, to OFF (see picture below)

- That should solve the issue. You will now see the hibernate option when click the arrow next to shutdown.

Related Posts Plugin for WordPress, Blogger...

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More