Thursday, August 28, 2008

Microsoft offers tool to verify ‘genuine’ editions of Windows XP

Microsoft offers tool to verify ‘ GENUINE ’ editions of Windows XP


From Elizabeth Montalbano of IDG News Service:

Microsoft has updated software that verifies whether a copy of Windows is genuine in its Windows XP Professional edition, making it similar to the notification in Windows Vista and thus more persistently visible to users.

In a blog posting attributed to Alex Kochis, a Microsoft director of product marketing and management, the company said it made the changes to the Windows Genuine Notification (WGA) alerts for XP Pro because it is “the product edition that is most often stolen.”

Now when a version of Windows XP Pro is found to be pirated or counterfeit, the next time a user logs on to the system, the desktop screen background will be black, replacing whatever custom desktop may have been set by the user. This will reappear every 60 minutes, even if a user resets the screen’s background. Previously, this was not a part of the WGA notification for Windows XP Pro.

Another new feature of the alert system is to put the PC into “persistent desktop notification” mode, with a banner at the bottom of the screen informing the user that the copy of Windows is not genuine. The notification is translucent and users can interact with any objects underneath it; however, it will continue to appear on the screen until a user installs a genuine copy of Windows.

Microsoft said the update to WGA also simplifies the installation of the alert system on Windows XP Pro. In addition, the company has improved its ability to detect non-genuine copies of Windows.

Users have had mixed reactions to the WGA program, which Microsoft launched two years ago as part of an aggressive program to eliminate counterfeit and pirated versions of Windows. While some think it’s a good way for Microsoft to prevent use of non-genuine Windows software, others found the program irksome and an intrusion, particularly when it would peg systems they knew to be genuine as pirated or counterfeit.

The program even at one point was thought to be acting like spyware by sending information from people’s computers back to Microsoft. However, Microsoft said it only provides information about whether the copy of Windows is genuine, not any other information about the user or the PC.

Microsoft first distributed WGA only to users of Microsoft’s download services who wanted to install add-on software, excluding security releases, for Windows XP. Eventually, it became an automatic part of Microsoft’s update services and then was built directly into Windows Vista as the company developed that OS.

How To Get Back Missing Search Option At Your System Windows XP

This is a common tactic of today's malware to disable certain functions of Windows utility that can help get rid of these malicious programs. Some of the functions that are normally the disabled are the Task Manager, Registry Editor, Folder Options, show hidden files and folders, Run dialog from the Start menu and the search function of Windows. Today a friend of mine asked me to their search option was missing its Windows. I did a little research and discovered that usually takes care of malware to disable the search function. Here are some ways to get back the search option missing in Windows XP.


Using the Group Policy Editor :


1. Go to Start –> Run –> gpedit.msc

2. The group policy editor will open. Now go to the following key : User Configuration –> Administrative templates –> Start Menu and Task Bar. In the right hand pane, select “Remove Search menu from Start menu”

Most probably it will be set to enabled. Just disable it once, click Apply and then select “Not Configured” and again click Apply.


Usually the Search function is enabled instantaneously. If it is not enabled, go to Start –> Run –> cmd and issue the following command : C:\>gpupdate /force

This will force the settings to be applied instantaneously.



Using the command REG

Sometimes it is better to add record through command line rather than go through all the manual processes to open the Registry Editor, find the right key and change it. Therefore, I am giving the solution of command line to allow the search function of Windows. To enable the search function, simply go to Start -> Run and copy and paste the following command and press OK to continue.


Using commands automated registration

If you are unsure of all the above, I created this script that will allow the search function automatically without user intervention. Copy the script below and save as
repair.reg

When you run this program asks whether you want to add registration information. Please click Yes.

Save as below this script --> Repair.reg :




Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoFind"=dword:00000000
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoFind"=dword:00000000

Create 1-click shutdown for windows

This is really very easy one but very effective one. Enjoy it!

First, create a shortcut on your desktop by right-clicking on the desktop, choosing New, and then choosing Shortcut. The Create Shortcut Wizard appears. In the box asking for the location of the shortcut, type shutdown. After you create the shortcut, double-clicking on it will shut down your PC.

But you can do much more with a shutdown shortcut than merely shut down your PC. You can add any combination of several switches to do extra duty, like this:

shutdown -r -t 01 -c “Rebooting your PC”
Double-clicking on that shortcut will reboot your PC after a one-second delay and display the message “Rebooting your PC.” The shutdown command includes a variety of switches you can use to customize it. Table 1-3 lists all of them and describes their use.

I use this technique to create two shutdown shortcuts on my desktop—one for turning off my PC, and one for rebooting. Here are the ones I use:

shutdown -s -t 03 -c “Bye Bye m8!”
shutdown -r -t 03 -c “I ll be back m8 ;)!”

Switch
What it does

-s
Shuts down the PC.

-l
Logs off the current user.

-t nn
Indicates the duration of delay, in seconds, before performing the action.

-c “messagetext”
Displays a message in the System Shutdown window. A maximum of 127 characters can be used. The message must be enclosed in quotation marks.

-f
Forces any running applications to shut down.

-r
Reboots the PC.

Here is the best way to crack the BIOS Password

There are a lot ways to Crack the BIOS password. This is one of them but I would say that this one is more effective than the rest because the rest of the ways does not Guarantee you that it will Crack the BIOS password while in this case the Cracking is Guaranteed since in this we will remove the functionality of password protection of the BIOS.

Follow the steps below:

1) Boot up windows.
2) go to dos-prompt or go to command prompt directly from the windows start up menu.

3) type the command at the prompt: “debug” (without quotes ninja.gif )
4) type the following lines now exactly as given…….
o 70 10
o 71 20
quit
exit

4) exit from the dos prompt and restart the machine

password protection gone!!!!!!!!!!!!!

EnjoYYYYYYYYYY

PS: I tested this in Award Bios……..
There seems to be some issue regarding display drivers on some machines if this is used. Just reinstall the drivers, Everything will be fine………..

I have not found any other trouble if the codes are used.

To be on safe side, just back up your data……….

The use of this code is entirely at ur risk……….

It worked fine for me……….

Computer Virus Goes into Orbit

SAN FRANCISCO: NASA confirmed that a computer virus sneaked aboard the International Space Station only to be tossed into quarantine on July 25 by security software.

A “worm type” virus was found on laptop computers that astronauts use to send and receive email from the station by relaying messages through a mission control center in Texas, according to NASA spokesman Kelly Humphries on Wednesday.

The virus is reported to be malicious software that logs keystrokes in order to steal passwords or other sensitive data by sending the information to hackers via the Internet. The laptop computers are not linked to any of the space station’s control systems or the Internet. “The bottom line is it is a nuisance for us,” Humphries said. “The crew is working with teams on the ground to eradicate the virus and look for actions to prevent that from happening in the future.” The virus had no adverse effect on space station operations, according to Humphries.

The space station orbits Earth once every 90 minutes at an altitude of about 350 kilometers. NASA is reportedly looking into whether the virus got into the computers by hiding in a memory drive used to store music, video or other digital files. Humphries said this is not the first computer virus stowaway on the Space Station.

“This is not a frequent occurrence but it has happened before,” Humphries said

COMPUTER BACKUPS

COMPUTER BACKUPS
by: Jack Back
COMPUTERS AND HALLOWEEN, DO THEY MIX? Computer backup is so important to your computer that to ignore it is to risk its damnation. Computers require care and feeding. They require that you attend to their needs. If you don't, then they will most surely be sent to Hell.

Halloween means Hell. What! What do you mean that Halloween means Hell? Well, if your computer is given the option of trick or treat, which will it accept? Will it accept the trick or the treat? What do you think?

Halloween is the time that computers are subject to tricks or treats. Did you know that more computers fail on Halloween than any other day of the year? That’s right. It’s true (smile). Your computer is in danger! Protect it. Do your computer backups. Back to the Hell thing. Hell you say? Yep. Well, what do you mean by Hell?

Computer hell is the place for computers without computer backup. The failure to perform hard drive backup means that you are playing Russian Roulette with your data. Data needs your protection. Failure to protect your data may cause your home or business records to be sent to Hell. Hell in this instance is for the records and files that cannot be resurrected. Resurrected you say, what does that mean?

It means that without computer backup as a source of salvation then the files can safely enjoy eternal oblivion. Oblivion you say, what does that mean? That means they are eternally lost from computer resurrection. Is there any mercy for my precious files, you ask?

Why yes there is. Would like to know what the mercy for your files is? Yes! Yes! You say. OK boys and girls listen carefully. The salvation, mercy, resurrection and redemption of your files lies in regular and consistent and persistent computer backup.

If you backup your computer consistently and persistently your files will be resurrected and saved from accidental deletion, hard drive failure and those nasty things like fire, flood, theft, earthquake, hurricanes, tornados and the like! Computer backup is the key to your data's salvation! Do your computer backups boys and girls. Milk and cookies will be served in the pantry.

Trick or treat for your computer backup? About the author:Jack Back has been a working computer consultant company owner since 1991. He started in IT in 1983. Now get your FREE 2 part guide on how to save your precious computer data from loss at the

http://www.tweakspeed.com/Computer-Backup-1.htm website.

Update: Computer Virus Gammima Travels Into Space

It seems you can’t escape computer viruses not even on the International Space Station. NASA announced that several laptops that were carried to the ISS in July were infected with a virus known as Gammima.AG, and also admitted that such infections have happened before.

“This is not the first time we have had a worm or a virus,” NASA spokesman Kelly Humphries said. “It’s not a frequent occurrence, but this isn’t the first time.”

The virus, which copies itself onto computers in order to steal log-on information for online games, was first detected in August 2007. After stealing the private information, including usernames and passwords, the worm attempts to send it back to a central computer.

W32.Gammima.AG propagates by copying itself to removable media. According to Symantec, Gammima.AG, also known as Worm.Win32.AutoRun.bhx [Kaspersky], attempts to steal sensitive information for the following online games: ZhengTu, Wanmi Shijie or Perfect World, Dekaron Siwan Mojie, HuangYi Online, Rexue Jianghu, ROHAN, Seal Online, Maple Story, R2 (Reign of Revolution) and Talesweaver.

It affects all the Windows versions and Symantec noted that the number of known infections is in 0 to 49 range.

As the computers on the space station use a satellite data link to transmit information and e-mails, NASA officials said that there was no way that data on the laptops could be sent to hackers on Earth. NASA also told space news website SpaceRef that no command or control systems of the ISS were at risk from the malicious program.

NASA is currently working with partners on the ISS to find out how the virus found its way into the laptops. The space station’s computers reportedly do not have any anti-virus software installed on them to prevent infection with viruses.

One theory is that the virus was on a flash or USB drive that an astronaut owned and carried with him to the space station.

The space agency said it planned to put in place security systems that would prevent such incidents from happening in the future.

Computer viruses in outer space

SpaceRef.com reports that NASA has discovered a computer virus on one of the computers located on the International Space station.

The virus (well, technically classified as a worm) was identified as W32.Gammima.AG, and Symantec describes it as a relatively low-risk threat. Its purpose is to steal passwords to on-line games, and presumably sends them back to its author(s). It normally spreads via removable media, like memory cards or thumb drives. Other than being an annoyance, unless you play the games the worm targets, there really isn’t any damage done. NASA gets lucky this time (assuming the astronuats aren’t playing World of Warcraft up there!)

Just goes to show you still need to run anti-virus even when you’re 39,000 miles above the Earth.

10 Ways to Protect Against the Dreaded Computer Virus

You may already have had a bad experience with a computer viruses. If this is true then you may have been due to opening an email from some one you didn’t know, or from downloading a ton of different files off the internet. Either way, if you want to ensure this doesn’t happen again, the you should read this article to guard yourself against the annoying computer bugs.

Below are a list of tips that I have put together to help avoid contracting a nasty virus.

1. Get yourself some antivirus software from a respected company such as Norton Antivirus software. You should set it up to run automatically every time you turn your computer on.

2. Make sure to keep your antivirus software up to date by either using the automatic update feature that many come with or make it a habit to manually check at least once or twice a week for updates on your own.

3. The antivirus software can also scan for Macro Viruses. This type of virus is usually hidden in word processing documents that you may receive in an email.

4. Downloading software from the internet should not be done too often. It is very easy to get infected this way, even though there may be lots of great programs available This is very risky.

5. There are many ways to swap data between two different computers. I don’t recommend you do this unless it is unavoidable, and even then you must scan the storage device you are transfering from for viruses.

6. If using floppy disks to transfer data make sure to format them before using them for the first time.

7. When purchasing software, make sure to only buy from vendors that are well known and from ones you trust.

One of the most common ways of catching a virus is to install pirate software. This is illegal and should never be done.

9. If you must download programs from the internet ALWAYS scan them for viruses BEFORE opening them up to install on your computer.

10. Probably the most important and neglected method of disaster recovery are periodic backups of all important files found on your computer. Should a virus happen to get through your lines of defense you may need to replace the virus corrupted files with fresh ones that have been kept for such an occasion.

Following the steps I have laid out won’t guarantee that you will not be infected, but it will make you far less likely of becoming a victim of a dreaded computer virus.
About the Author:
Roberto Beiro is a dynamic writer on the web. You can search for more computer advice from him at his website Old boy articles. There are also 100’s of articles on other subjects like finance advice, and travel advice .

Students taught computer hacking

Computer user
Students will analyse computer systems for ways hackers can get in

Postgraduate students at a Scottish university are to be taught the art of computer hacking.

The MSc Ethical Hacking and Computer Security course at Abertay University will explore the methods criminals use to attack networks.

Students will learn how to test systems for vulnerabilities and come up with ways to protect them.

It is predicted that a couple of years after completing the course graduates could be earning about £55,000.

The university already runs an undergraduate course in Ethical Hacking and Countermeasures.

Head of Computing Lachlan MacKinnon said: "One of the assumptions that people make is that if they buy virus protecting software that will protect them from all known viruses.


We're very careful to make sure that the people who are coming through are doing it for the right reasons
Lachlan MacKinnon
Abertay University
"That may well be true but there's an awful lot out there that we don't know about.

"So designing more effective systems and designing security models to ensure that we don't have these problems is what the course is based around."

He added that big businesses and organisations should not be afraid of students turning "rogue" and using their skills for bad.

"In the industry we refer to people with white hats and black hats, which comes from the old Westerns," he said.

"But realistically we're very careful about the people we take onto the program.

"We have a strong vetting procedure - in the UK we use things like Disclosure Scotland to ensure that people that we're taking on aren't coming from a criminal background.

"We're very careful to make sure that the people who are coming through are doing it for the right reasons."