How to Fix Missing Metro IE in Windows 8

If you installed other Internet browsers in your Windows 8 and set it as default browser, your Windows 8 will automatically replaces Internet Explorer Metro with the desktop version of Internet Explorer 10 in your Start Screen. To fix this issue, you just simply need to set Internet Explorer as your default browser in your Windows 8.


  1. In your Metro, press the Windows key on your keyboard to go to Desktop or click Desktop in Metro
  2. Launch your Internet Explorer 
  3. Select Tools then Internet Options 
  4. Click on the Programs tab and click on Set associations button
  5. Check the Select All option then click on the Save button
If the above steps did not fix your Metro IE, then you just need to set Internet Explorer as your default web browser.

  1. Press your Windows key and X then select Control Panel 
  2. Select Default Programs then Set program access and computer defaults

"The message has a digital signature, but it was not validated" Error Message in OWA

Outlook Web App (OWA) does not provide support for digital certificates because it does not include support for S/MIME. If you received an email message that included digital signature, you may see "The message has a digital signature, but it was not validated" error.

To resolve this problem, you can follow these steps:


 1. Click Start, click Run, type Regedit, and then click OK.

2. Locate and then click the following registry subkey:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MSExchangeWEB\OWA

3. On the Edit menu, point to New, and then click DWORD Value.

4. Type CheckEmbeddedSmime, and then press ENTER.

5. Right-click CheckEmbeddedSmime, and then click Modify.

6. In the Edit DWORD Value dialog box, under Base, click Decimal.

7. In the Value data box, type 1, and then click OK.

8. Exit Registry Editor.

"This operation has been cancelled due to restrictions in effect" When Click Link in Outlook Solution #2

The following is another alternative solution when you're receiving error of "This operation has been cancelled due to restriction in effect on this computer" upon clicking hyperlink in your Outlook.


  1. Close your Outlook and any opened browsers in your desktop
  2. Go to elevated Command Prompt (right click "Run as Administrator")
  3. Type in the following Registry Keys in your Command Prompt
REG ADD HKEY_CURRENT_USER\Software\Classes\.htm /ve /d htmlfile /f
REG ADD HKEY_CURRENT_USER\Software\Classes\.html /ve /d htmlfile /f
REG ADD HKEY_CURRENT_USER\Software\Classes\.shtml /ve /d htmlfile /f
REG ADD HKEY_CURRENT_USER\Software\Classes\.xht /ve /d htmlfile /f
REG ADD HKEY_CURRENT_USER\Software\Classes\.xhtml /ve /d htmlfile /f


  4. Launch your Outlook then try to click on the hyperlink

Microsoft Surface Pricing Available Today

Pricing and pre-order of the new Microsoft Surface tablet will be available today. The new Microsoft Surface will be priced in line with Apple's iPad starting at $499. It comes with 32 GB of storage with expansion slot and it's running Windows RT. Surface is pre-loaded Microsoft Office 2013.  Microsoft Surface is also available bundled with Touch Cover accessory for $599 with 32 GB of storage or for $699 for 64 GB version. A version with full running Windows 8 Professional will be available early next year.


McAffee Launched New Data Center Security Suites

McAffee announced four new data center security suites to help secure servers and databases in the data center. The suites offer a unique combination of whitelisting, blacklisting and virtualization technologies for protecting servers and virtual desktops. These solutions provide optimal security for servers and databases in physical, virtualized and cloud-based data centers, with minimal impact on server resources which is a key demand for data centers.
 
The suites offer customers the ability to protect their physical and virtual servers and virtual desktops with a unique combination of technologies in a single solution.

  • McAfee Data Center Security Suite for Server provides a
    complete set of blacklisting, whitelisting, and optimized
    virtualization support capabilities for basic security on servers of
    all types
  • McAfee Data Center Security Suite for Server–Hypervisor Edition
    provides a complete set of blacklisting, whitelisting, and optimized
    virtualization support capabilities for basic security on servers of
    all types and is licensed per Hypervisor
  • McAfee Data Center Security Suite for Virtual Desktop
    Infrastructure
    provides comprehensive security for virtual desktop
    deployments without compromising performance or the user experience
  • McAfee Database Server Protection provides data base activity
    monitoring and vulnerability assessment in a single suite, for all
    major database servers in the data center

Microsoft Sets Windows 8 Upgrade Pricing

Microsoft sets the price for an upgrade to the full version of Windows 8 operating system at $70 for a DVD pack. End users can also have the option to download Windows 8 in digital format on launching date, October 26th, for $40. This offer will expire at the end of January 2013. Computers running Windows XP, Vista and Windows 7 will be able to upgrade to Windows 8. Microsoft has yet to announce the price for full version of Windows 8.

Windows 8 Find Applications Shortcut

To find all your applications in Windows 8, you either,

1. Right click anywhere Start Screen and select All Apps

or

2. Press Windows key and Q at the same time



Windows 8 Start Menu Short Cut

Basic Start Menu in Windows 8 can be accessed by hovering your mouse to the bottom left corner of your screen in Desktop menu and then right click. It can also be accessed by swiping form the rights side of a touch screen.

The shortcut for basic Start Menu is by pressing your Windows key and X key at the same time.


How to Reset Symantec Endpoint Protection Manager Password

You can reset your Symantec Endpoint Protection Manager password by using its resetpass.bat located in your installation directory. The tools is provided with the installation package. If you are unable to find resetpass.bat, your Symantec Endpoint Protection maybe installed on another drive.

To reset the password follow these steps:

  1. On the server where your installed Symantec Endpoint Protection, open the following directory C:\Program Files\Symantec\Symantec Endpoint Protection Manager\Tools or C:\Program Files (86)\Symantec\Symantec Endpoint Protection Manager\Tools
  2.  Double click resetpass.bat and the password will be reset to default credential
  3. Open your Symantec Endpoint Protection Manager
  4. Logon using Admin for both username and password
  5. Be sure to change the password after your successfully login
 Please note: if your account is locked, you may have to wait 15 to 60 minutes before you can try to use resetpass.bat.

Microsoft Announces Windows Server 2012

Microsoft recently has announced the general availability of the next generation of its server operating system, Windows Server 2012. According to Microsoft, Windows Server 2012 is the new world of continuous cloud services, connected devices and big data. The OS is built to deliver Cloud OS. Windows Server 2012 adds new advancements in virtualization, storage, networking and automation. Hundreds of new features can help customers achieve a transformational leap in the speed, scale and power of their data centers and applications.

How to Search Email Address in Active Directory

Once in a while when you try to assign a new email address to a user account, you encountered a specific email address you would like to assign has been taken. In a small Active Directory environment, the task to find an email address is easy, but if what if your environment consisted of thousands of accounts?

Here is the simplest way to find an email address that has already been assigned to a user account.

1. Go to Active Directory User Computer
2. Right click your Domain and select Find
3. Under the drop down menu of Find, select Custom Search
4. Under the drop down menu of In, select Entire Directory
5. Click on the Advanced tab, then type

proxyaddresses=smtp:emailaddress@yourcompany.com 

Note: change 'emailaddress' with email address you'd try to search and replace 'yourcompany.com' with your domain.


Microsoft Offers Free Windows 8 RTM

Two weeks ago Microsoft announced that Windows 8 has reached Release to Manufacture milestone. As promised, Microsoft released the finale version to MSDN and TechNet subscribers. However, 90-day evaluation copy of Windows 8 RTM is also available for everyone to download.

Unlike the versions distributed via TechNet and MSDN to paying subscribers, the evaluation expires after 90 days of use. At that time, Windows 8 blackens the desktop background, displays a persistent notice that the OS is not genuine. Then, Windows 8 shuts down the PC every hour without giving the user a chance to save works in progress. When the evaluation period expires, users will have to replace it with a purchased copy or another operating system, and reinstall all applications, other software and files.

Microsoft Drops "Metro Style" Description

Microsoft has decided to drop the term "Metro Style" or "Microsoft Metro" for its tiled interface of the upcoming official release of Windows 8. The now familiar colorful layout and built for touch-interface will remain, but without a branded name. 

Here’s Microsoft’s official statement:
"We have used Metro style as a code name during the product development cycle across many of our product lines. As we get closer to launch and transition from industry dialog to a broad consumer dialog we will use our commercial names."

Rumor has it  to the reason of sudden description changed is the possibility of legal threats by German retail company, Metro AG. Due to this sudden description change, Microsoft has not had the time to announce a new name. For now it's simply "Windows 8-sytle UI".

Office 2013 Consumer Preview Released

Microsoft's CEO, Steve Balmer, unveiled the next generation of Office suite during a press conference in San Francisco, California. Office 2013 is available for testing in a public Consumer Preview for users of Windows 7 and Windows 8. Office 2013 will be available for both tablet PC and traditional computers.

How to Add Internet Search in Windows 7 Start Menu

In Windows 7 you can enable default Internet search function of your default browser in Start Menu.

1. Run GPEDIT.MSC from Search programs and files box
2. Go to User Configuration then select Administrative Templates
3. Double click Start Menu and Taskbar
4. On the right pane, edit Add Search Internet link to Start Menu
5. Select Enable then click Apply


How to Fix Incorrect Time in Windows 2008 Domain Controller

Here is the command line to fix computer time synchronizing problem in Windows 2008 Server.

1. Go to Command Line with Administrator privilege
2. Type the following command w32tm /config /syncfromflags:manual /manualpeerlist:pool.ntp.org
3. Then w32tm /config /reliable:yes
4. w32tm /config /update
5. w32tm /resync
6. net stop w32time
7. net start w32time

"This operation has been cancelled due to restrictions in effect" When Click Link in Outlook

When clicking on a hyperlink in Outlook, you get this message : "This operation has been cancelled due to restrictions in effect on this computer." and your Windows 7 or Vista computer has just uninstalled Google Chrome. Uninstalling Google Chrome does not remove the registry value of HTM/HTML association key. The following steps will fix the error.



STEP 1: Set Internet Explorer as your default program

1. Go to Default Programs from your Menu
2. Select Set your default programs
3. Click on Internet Explorer on the left hand side
4. Then click on Set this program as default

STEP 2: Restoring HTM/HTML registry key

1. Type Regedit in Search programs and files
2. Expand HKEY_CURRENT_USER\Software\Classes\.html
3. Right click on the value of the .html and select Modify
4. Change the value from ChromeHTML to htmlfile
5. Click OK to accept it.

How to Disable or Enable UAC with Command Line

There is a quick way to disable Windows 7 or Windows Vista UAC by using command line.

To Disable UAC:

C:\Windows\System32\cmd.exe /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f

To Enable UAC:

C:\Windows\System32\cmd.exe /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 1 /f


Microsoft Adds Photo Sharing Feature in SkyDrive

SkyDrive users can now access the Photo application in Windows 8 and fetch images stored in any PC with SkyDrive installed. Updates for SkyDrive for Windows will be rolled out automatically in the Windows 8 Release Preview. Microsoft also increased the limit on the total number of files that can be stored in a SkyDrive folder from 150,000 to 10 million.

Microsoft Launches So.cl

So.cl is now open to public. The experimental research project developed by Microsoft’s FUSE Labs was designed to help students study by “exploring the possibilities of social search for the purpose of learning.” Pronounced Social, the site shows friends' searches and interests. Videos can be watched with friends and profiles can be edited. Socl currently has no way to upload photos, but Microsoft says that's coming.

How to Remove Thumb.db File in Windows XP

Thumb.db file is created by Windows for folders that contain pictures. It caches a thumbnail version of the pictures within the folder in order to view the thumbnail images faster each time the folder is opened. To remove thumb.db from being created, follow these steps:

1. Open the image folder
2. Select View then Folder Options from the menu
3. Click the View tab
4. Check the Do not cache thumbnails option
5. Click Apply to All Folders and close the window.


How to Fix Show Hidden Files and Folders

If you encountered a problem to display hidden files and folders after you enabled it, you need to edit your registry settings below. You need to back up your registry setting before re-editing it.

1. Go to Run (Windows XP) or Search programs and files for Windows 7
2. Type regedit
3. Go to HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Explorer\Advanced
4. Replace the Hidden Reg_DWORD key to 1

Microsoft Renames Azure Services

Microsoft recently announced a name change for its Windows Azure Services. Here are the list of the upcoming name changes.

  • Windows Azure Compute  - Cloud Services
  • Windows Azure Platform - All Services
  • Windows Azure CDN - CDN
  • Windows Azure Storage  - Storage 
  •  Windows Azure Traffic Manager  - Traffic Manager 
  •  Windows Azure Virtual Network Virtual Network 
  • AppFabric Cache - Cache 
  •  AppFabric Service Bus - Service Bus 
  •  AppFabric Access Control - Access Control 
  •  SQL Azure - SQL Database 
  •  SQL Azure Reporting Service -  SQL Reporting 
It basically states that Microsoft will drop the Azure name from the product line, again simplifying the product line in the progress. 

Windows 8 Drops DVD Playback Option

According to Windows engineering team, the upcoming Windows 8 will not have the optical discs playback support. The new OS will still have Windows Media Player, however end users will not be able to playback DVD movies with it. Windows 8 will allow end users the option to install a Windows Media Center upgrade to allow DVD playback at extra cost, though Microsoft is not saying exactly how high that cost will be. 

How to Reset Foundry FastIron Edge X448 to Factory Default

The following are the steps to reset your Foundry FastIron Edge X448 to its factory default settings.

1. You need to unplug the power cords from switch.
2. Plug the power cords back and immediately type "b" key on your console. This will pause the boot process of the switch.
3. Type the following command:

FESX448> no password
FESX448> boot system flash primary

4. Your Foundry FastIron Edge X448 switch will reboot without prompting for a password. At the opening CLI prompt, enter the following enable command:

FESX448> enable

5. After enabling, you need to enter the following command, which it will erasing all of your Foundry FastIron Edge X448 configuration. 

FESX448# erase start
FESX448# reload

How to Set Management Privilege Password for Foundry FastIron Edge X448

You can setup a single password for each of the management level of Foundry FastIron Edge X448 switch. The following are the management privilege levels:

Super User level – Allows complete read-and-write access to the system. This is generally for system administrators and is the only management privilege level that allows you to configure passwords.
Port Configuration level – Allows read-and-write access for specific ports but not for global (system-wide) parameters.
Read Only level – Allows access to the Privileged EXEC mode and CONFIG mode of the CLI but only with read access.

You must use the CLI to assign a password for management privilege levels. You cannot assign a password using the Web management interface. The following steps are to configure passwords for management privilege levels:

1. At the opening CLI prompt, enter the following enable command:

FESX448> enable

2. Access the configuration level of the CLI by entering the following command:

FESX448# configure terminal
FESX448(config)#

3. Enter the following command to set the Super User level password:

FESX448# enable super-user-password (type your password here)

4. Enter the following command to set the Port Configuration and Read Only level passwords:
  
FESX448# enable port-config-password (type your password here)
FESX448# enable read-only-password (type your password here)

5. Enter the following command to save it:

FESX448(config)# write mem

How to Allow Local User Accessing Foundry FastIron Edge X448 Web Interface

After you created a unique IP address for your Foundry FastIron Edge X448 switch, you may want to allow local users to access its Web Interface for GUI management. You can follow these simple steps to configure it.

1. At the opening CLI prompt, enter the following enable command:

FESX448> enable

2. Access the configuration level of the CLI by entering the following command:

FESX448# configure terminal
FESX448(config)#

3. Add these two command lines to grant access for local users to Foundry FastIron Edge X448 Web Interface:

FESX448(config)# aaa authentication web-server default local

FESX448(config)# aaa authentication login default local

4. Save the configuration changes to the device's flash memory:

FESX448(config)# write mem 

How to Create Local User Account For Foundry FastIron Edge X448

In order to create local user account for your Foundry FastIron Edge X448 switch, you must logged on with super-user access.

1. At the opening CLI prompt, enter the following enable command:

FESX448> enable

2. Access the configuration level of the CLI by entering the following command:

FESX448# configure terminal
FESX448(config)#

3. To create local user account, enter the following command:

FESX448(config)# username john privilege 0 password j4n3d03


In this example, username john will have full access to all configuration and display features. His password will automatically be encrypted unlike the previous software version whereas you have a choice.

FESX448(config)# username bob privilege 5 password b1gb0y


In this example, username bob will have read-only level to all configuration and display features. Bob can look for the information but cannot make configuration changes.

FESX448(config)# username jack nopassword


In this example, username jack will have a super user account with no password. Jack will have full access to all configuration and display features.

The privilege parameter specifies the following:

  • 0 - Full Access (super-user)
  • 4 - Port-configuration access
  • 5 - Read-only access
The default privilege level is 0. If you want to assign Super User level access to the account, you can enter the command without privilege 0.

4. Save the configuration changes to the device's flash memory:

FESX448(config)# write mem

How to Configure Foundry FastIron Edge X448 IP Address

The default IP address on Foundry FastIron Edge X448 is 209.157.22.254/24 (209.157.22.254 255.255.255.0). It is configured on port 1 of the switch and applies globally to the entire switch. To change this address:

1. At the opening CLI prompt, enter the following enable command:

FESX448>enable

2.  Access the configuration level of the CLI by entering the following command:

FESX448# configure terminal
FESX448(config)#

3.  Enter a show run command to look for the IP address in the display.

FESX448(config)#  show run

4.  Delete the factory default IP address from the switch by entering the following command:

FESX448(config)#  no ip address 209.157.22.254 255.255.255.0

5. Configure the IP address and mask address for the switch. For example, to set the address and mask to 192.168.1.100 255.255.255.0, enter the following command: 

FESX448(config)# ip address 192.168.1.100 255.255.255.0

6. Set a default gateway address for the switch. For example, to set the gateway to 192.168.1.245, enter the following command:

FESX448(config)# ip default-gateway 192.168.1.245 

7. Save the configuration changes to the device's flash memory:

FESX448(config)# write mem 

Norton Power Eraser

Norton Power Eraser is a free virus and malware removal tool from Symantec. It's a very aggressive detection tool that traditional virus scanning could not remove. Norton Power Eraser can also be used for an initial cleanup if malware on an infected system prevents normal installation of your security software. The tool uses more aggressive techniques than your Norton security product, hence there is a risk that it will flag legitimate programs for removal. You should carefully review the scan results page before removing any files.

Windows 8 Release Preview Available in June

Microsoft announced Windows 8 Release Preview will be available in the first week of June. Microsoft President Steven Sinofsky made the announcement during an on-stage appearance at Japan's Windows 8 Dev Days. The release preview follows a beta and is the last stage before a product's final version. Windows 8 aims to unify desktop operating system and tablet. Windows 8 is geared to run on on ARM chips as well as so-called x86 chips that power traditional PCs.

Microsoft Deployment Toolkit Utility

Microsoft Deployment Toolkit 2012 (MDT) is now available for download. The toolkit can be used to monitor and roll out to large numbers of end user products like Windows 7, Office 2010, Office 365, Windows Server 2008 R2, Windows Vista, Windows Server 2008, Windows Server 2003, and Windows XP. MDT 2012 can also be used to deploy in test environments the beta versions of Windows 8 and of Windows Server 2012. The utility can let end users initiate and customize software installs on their computers using System Center Configuration Manager 2012. The product can also be integrated with the Microsoft Security Compliance Manager for added deployment security.

Microsoft Touted Windows to Go

Windows 8 Enterprise, one of three editions of the upcoming Windows 8 OS, it's only limited to corporate customers. Windows 8 Enterprise will be available only to businesses that have signed Software Assurance deals with Microsoft. Windows to Go is one of the limited features available only to Windows 8 Enterprise. Windows to Go will run on PCs or other devices powered by Windows 7 or Windows 8. Microsoft touted the feature as a secure way for out-of-office workers to access corporate resources from personal or shared devices, and as a solution to the "bring your own PC" problem of people using their own machines, which may be less secure and more likely to be malware infected, to connect with the company's network.

Microsoft Officially Named Windows Server 2012

Microsoft has reworked its naming convention for its server edition of Windows, after it officially named the next edition as Windows Server 2012. At the Microsoft Management Summit 2012 (MMS) in Las Vegas on 17 April, Microsoft corporate vice president Brad Anderson talked about how Microsoft’s private cloud offering will become even more powerful with Windows Server 8 and announced that the operating system will officially be named Windows Server 2012. Anderson also discussed how IT professionals can evolve their roles with cloud computing to help their businesses be more competitive.

Microsoft Unveiled Windows 8 Versions

Microsoft has unveiled the various editions of the soon to be released Windows 8 operating system. Windows 8 and Windows 8 Pro will be available for x86-powered PCs and tablet devices. The Pro version comes with encryption, visualization, PC management and domain connectivity features not included in the basic consumer package. Microsoft said the Pro version was targeted at technically savvy users and businesses. However, enterprises with Software Assurance agreements would still be able to get their hands on a special enterprise version of the operating system. For specifically designed ARM processor based system, Microsoft will release Windows RT (Real Time). Windows RT comes packaged with "touch-optimized" versions of Word, Excel, PowerPoint and OneNote. None of the desktop packages come bundled with Microsoft's productivity suite. In addition, Windows RT comes with device encryption technology.

How to Manually Check Google Chrome Plugin Update

More and more malicious websites can be found in the Internet. Your system can be attacked through outdated Google Chrome plugin in which it exploited security flaw on the code. You can manually check whether your installed plugins in your Google Chrome are updated. Simply visit http://secbrowsing.appspot.com/ and the site will display a summary of your installed plugins in Google Chrome. You can install SecBrowing plugin in your Google Chrome by clicking Chrome Extension.

How to Disable Autorun.inf in Windows 7

Autorun function when you insert CD/DVD media can be a great security risk for your system. There are viruses which make utilize of this default Windows behavior to infect your computer. Below are the steps to disable this default Windows 7 feature for Autorun.

1. Type gpedit.msc in the Search programs and files dialog of your Windows 7
2. In the Local Group Policy Editor, navigate to User Configuration then selects Administrative Templates 
3. Choose Windows Components then selects Windows Explorer
4. Scroll down the list on the right side pane and find Default behavior for AutoRun 
5. Double click on Default behavior for AutoRun and choose Enabled
6. From the drop down list choose Do not execute any autorun commands
7. Click OK to accept the settings

How to Change Default Listening Port of RDP

In light of the most recent Microsoft's critical update MS12-020 released last March, those computers facing the Internet with Remote Desktop Protocol enabled should re-configure its default listening port other than port 3389 as a workaround. MS12-020 is labeled as critical because it could allow intruders to obtain LocalSystem control on a computer with RDP enabled.

 To change the port that Remote Desktop Protocol listens, you need to follow these steps,

  1. Start Registry Editor.
  2. Locate and then click the following registry subkey:
    HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\TerminalServer\WinStations\RDP-Tcp\PortNumber
  3. On the Edit menu, click Modify, and then click Decimal.
  4. Type the new port number, and then click OK.
  5. Quit Registry Editor.
  6. Restart the computer.

Kaspersky Lab Confirms 600,000 Flashfake Botnet is Mostly Macintosh

Kaspersky Lab researchers announced that analysis of the Flashfake botnet confirms the size of the malicious network and that it consists mostly of Mac OS X machines. they were able to reverse engineer the domain generation algorithm used by the botnet, then set up a fake domain that collected requests from infected bots. The logs collected by the researchers confirm that the botnet includes more than 600,000 unique systems , more than 50% located in the U.S. In addition, analysis of the traffic collected by Kaspersky suggests that most of the infected machines are, in fact, running Apple's Macintosh OS X operating system. The botnet, Flashback, is the largest malicious network of Mac machines, and an unwelcome wake-up call for Mac users that malware - once the province of Windows systems - is a growing problem on Macs, as well.

How to Repair Corrupt System Files in Windows 7

Here is the command line to repair Windows 7 system file.

  1. Type CMD in Search programs and files then right click to run as Administrator 
  2. In the command prompt type SFC /SCANNOW
  3. The SFC tool will scan your system files and show the status report. If it found any corrupted files, it will repair them automatically

How to Disable System Restore in Windows 7

There will be a time when you need to disable Windows 7 System Restore like prior performing virus removal. You can follow the instructions below. But note that if you disable System Restore, you will not be able to perform a system restore when needed.

  1. Click on Start Menu, then right click on Computer and select Properties
  2. In the System Properties window that opens, click on Advanced system settings on the left side
  3. In the Advanced system properties window, select the System Protection tab by clicking on it. Select a partition for which Protection status is ON and then click on Configure
  4. In the window that pops up, select Turn off system protection, then click on OK
  5. You would see a confirmation dialog box, click Yes to confirm
  6. Repeat steps 3, 4 and 5 for all partitions for which the Protection status is ON

How to Flush DNS in Windows OS

There will be a time where you would need to flush your DNS cache in your PC. Here is the steps to flush DNS in your Windows system.

1. Close all open web browsers and applications on your computer
2. Go to Run and type CMD. Please not you need to run as Administrator to perform this step.
3. At the command prompt, type upconfig /flushdns then press Enter
4. View the DNS resolver cache by typing ipconfig /displaydns at the command prompt then press Enter
5. Your computer DNS caching should all be cleared in your command prompt

How to Optimize USB or SD Drive in Windows 7

You can configure your USB or SD drive in Windows 7 to experience a performance boost for read or write.

Here is how you can change the setting:

1. Insert your USB or SD drive to your Windows 7 computer
2. Go to Run and type devmgmt.msc to launch Device Manager
3. In the Device Manager, expand the Disk Drives category and your USB or SD drive should be listed there. Double click on the removable drive that you just inserted and it would launch the Properties windows.

4. Select Policies tab in the Properties window. Then you need to select the option labeled Better Performance in the policies settings.


5. Then click the OK button to save the settings.

Please note that once you configured your USB or SD drive for better performance, you need to use Safely Remove Hardware notification to remove it.


How to Fix Insert Page Number Issue in Word 2010

Office Word 2010 references a file called Building Blocks.dotx to create the page number.

On Windows XP installation the file is located at,

C:\Documents and Settings\username\Application Data\Microsoft\Document Building Blocks\1033

On Windows 7 or Vista installation the files is located at,

C:\Users\username\AppData\Roaming\Microsoft\Document Building Blocks\1033

You will need a working Building Blocks.dotx file from another computer with Word 2010 installed and copy it to replace the file on the computer that's having the issue.

How to Manually Remove Trojan.Sirefef.BV

Hundreds of particular cases have been reported so far for Trojan.Sirefef.BV infection and they are still hundreds are to be discovered, according to experts’ expectations. Malware registered under the above detection code is a tiny program, might be less than 10 KB long. It swiftly enters computer system. This might be an illegal migration of HTTP cookies file. Naturally an infection of such small size cannot be capable of executing multiple tasks. Therefore the detection is a single-task malware. Below are the steps to manually remove Trojan.Sirefef.BV.

Remove the following files:
  • %System%\drivers\[RANDOM CHARACTERS].sys
  • %Temp%\[random]
  • C:\WINDOWS\system32\[random name].dll
Remove the following Registry entries:
  • HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main “Use FormSuggest” = ‘Yes’
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings “CertificateRevocation” = ’0′
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings “WarnonBadCertRecving” = ’0′
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop “NoChangingWallPaper” = ’1′
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations “LowRiskFileTypes” = ‘.zip;.rar;.nfo;.txt;.exe;.bat;.com;.cmd;.reg;.msi;.htm;.html;.gif;.bmp;.jpg;.avi;.mpg;.mpeg;.mov;.mp3;.m3u;.wav;.scr;’
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments “SaveZoneInformation” = ’1′
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer “NoDesktop” = ’1′
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System “DisableTaskMgr” = ’1′
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “[random].exe”
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “[random]”
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system “DisableTaskMgr” = ’1′
  • HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Download “CheckExeSignatures” = ‘no’
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced “Hidden” = ’0′
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced “ShowSuperHidden” = ’0′

How to Disable or Re-enable Hibernation

To disable hibernation on your Windows machine, you need to follow these steps,
  1. Click Start, and then type cmd in the Start Search box.
  2. In the search results list, right-click Command Prompt, and then click Run as Administrator.
  3. When you are prompted by User Account Control, click Continue.
  4. At the command prompt, type powercfg.exe /hibernate off, and then press ENTER.
  5. Type exit and then press ENTER to close the Command Prompt window.
To re-enable hibernation, follow these steps,
  1. Click Start, and then type cmd in the Start Search box.
  2. In the search results list, right-click Command Prompt, and then click Run as Administrator.
  3. When you are prompted by User Account Control, click Continue.
  4. At the command prompt, type powercfg.exe /hibernate on, and then press ENTER.
  5. Type exit and then press ENTER to close the Command Prompt window. 

Windows 8 Will Launch in October 2012

According to Bloomberg report, Microsoft will wrap up Windows 8 beta testing this summer. The Windows 8 operating system will come in two flavors: Windows 8 for traditional PCs and business-grade slates and tablets, and Windows on ARM, or WOA, for tablets targeting consumers. Analysts have expected that Microsoft is shooting for a release of Windows 8 this fall, possibly in October, to follow in Windows 7's successful footsteps and avoid a repeat of Windows Vista, which missed 2006's holiday selling season when it fell behind schedule and shipped in January 2007.

Windows Time Servers

You can use any of these fast time servers listed below that located the nearest to you.

LocationServer
Worldwidepool.ntp.org
Asiaasia.pool.ntp.org
Europeeurope.pool.ntp.org
North Americanorth-america.pool.ntp.org
South Americasouth-america.pool.ntp.org
Oceaniaoceania.pool.ntp.org

Malware Distributed by Spammers via Dropbox

According to Symantec researchers, they have found 1200 Dropbox URL in use by spammers in the span of 48 hours period to spread malware. The malware is distributed using image links to Dropbox accounts to redirect to Canadian's pharmaceuticals scam websites. The folder of these questionable Dropbox accounts contained infected sites disguised as image file names used by digital cameras.

How to Manually Remove Trojan:Win32/Bamital!dat

Trojan:Win32/Bamita!dat is a browser hijacker. Upon infection, it can disabling the host current antivirus software. The fake dat file above is typically carried by dropper element of the trojan. The dropper stores it into a folder in Windows directory. Here are the steps to manually remove Trojan:Win32/Bamita!dat.

Remove Trojan:Win32/Bamita!dat files:

  • %System%\drivers\[RANDOM CHARACTERS].sys
  • %Temp%\[random]
  • C:\WINDOWS\system32\[random name].dll

Remove  Trojan:Win32/Bamita!dat registry settings:

  • HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main “Use FormSuggest” = ‘Yes’
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings “CertificateRevocation” = ’0′
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings “WarnonBadCertRecving” = ’0′
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop “NoChangingWallPaper” = ’1′
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations “LowRiskFileTypes” = ‘.zip;.rar;.nfo;.txt;.exe;.bat;.com;.cmd;.reg;.msi;.htm;.html;.gif;.bmp;.jpg;.avi;.mpg;.mpeg;.mov;.mp3;.m3u;.wav;.scr;’
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments “SaveZoneInformation” = ’1′
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer “NoDesktop” = ’1′
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System “DisableTaskMgr” = ’1′
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “[random].exe”
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “[random]”
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system “DisableTaskMgr” = ’1′
  • HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Download “CheckExeSignatures” = ‘no’
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced “Hidden” = ’0′
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced “ShowSuperHidden” = ’0′

Android Malware Through Twitter

According the Symantec's security researchers, they have identified an increase of Twitter messages carrying links to malicious malware for Android mobile devices in recent weeks. It was reported that malware messages was sent over 130,000 tweets from 100 accounts. Symantec said they are working with Twitter to disable accounts that are sending out malicious links. Ever since the inception of shortened URLs, there have been countless of spam campaigns to exploit the service.

How to View 2 Excel 2007 Sheets Side by Side

You will need to edit your registry settings. Like always before editing your system registry settings, you will need to back it up first.

  1. Start Run, and type regedit
  2. Go to HKEY_CLASSES_ROOT/Excel.Sheet.8/shell/Open/commend:
  3. You will need to edit the Default by double clicking it
  4. Replace the entry with "C:\Program Files\Microsoft Office\Office12\EXCEL.EXE" /e "%1"
  5. Right click on Command and select Rename then rename it to commend2
  6. Go to  HKEY_CLASSES_ROOT/Excel.Sheet.8/shell/Open/ddeexec:
  7. Right click on ddeexec and select Rename then rename it to ddeexec2
  8. Go to HKEY_CLASSES_ROOT/Excel.Sheet.12/shell/Open/commend:
  9. You will need to edit the Default by double clicking it
  10. Replace the entry with  "C:\Program Files\Microsoft Office\Office12\EXCEL.EXE" /e "%1"
  11. Right click on Command and select Rename then rename it to commend2
  12. Close the registry editor and you should be able to view 2 separate Excel 2007 sheet side by side

Microsoft Exchange 2007 & 2010 Maximum Databases

For Exchange 2007 Standard Edition a mailbox server can only hold 5 databases (public folder or mailbox).

For Exchange 2007 Enterprise Edition a mailbox server can hold 50 databases (public folder or mailbox).

For Exchange 2010 Standard Edition a mailbox server can only hold 5 databases (public folder or mailbox).

For Exchange 2010 Enterprise Edition a mailbox server can hold 100 databases (public folder or mailbox).

Avira Antivir Personal Edition

Avira Antivir Personal Edition is high quality free antivirus software. It is a top notch antivirus scanner with outstanding detection rates of malware. The only downside is that Avira AntiVir does not include web or email scanning capabilities, which only available in the paid version. Despite the lacking of web or email scanner, Avira AntiVir is still a good choice for a free antivirus scanner, particularly for high risk users. However, it does not mean you won't be protected if you opened an infected email. Avira AntiVir will still spring into action to remove the infected email.

Ad-Aware Free Internet Security

As with some of the other top antivirus software, Lavasoft offers a cut-down version of their professional package. But despite its slim down version, it has very good capabilities as antivirus and detecting in addition to removing spyware while keeping a low profile. The GUI is very simple using only three main icons and installation is very quick. The program includes basic real-time protection abilities. As with all free products, technical support is limited.


Resetting Linksys Router

  Here is a simple step-by-step, which will help you to reset your Linksys router to factory default settings.

  1. Turn off your Internet modem (cable/DSL modem)
  2. Locate a small button (that you can only press with a pin or a pen tip) Reset at the back of your Linksys router.
  3. With the Linksys router on, press and hold on to the Reset button for at least 30 seconds.
  4. Wait for the Power and WLAN to light up on the router and a sign on your computer showing that a connection has been made to the router.
  5. When the lights are all on, turn your Internet modem back on.
  6. Open your web browser and type 192.168.1.1 to re-configure your ISP settings.
  7. The default user name and password are admin.

Kelihos Botnet Makes A Come Back

Microsoft recently acknowledged that a new variant of Kelihos botnet is being reassembled. Spam from the botnet underlines that taking down its DNS server alone is not effective in killing off botnets. Security experts suggest that only patching infected machines or taking botnet controllers out of circulation would be truly effective. At its peak, Kelihos spewed out as many as 4 billion junk mail messages, spamming unlicensed pharmaceuticals, stock scams and other from around 45,000 malware-infected zombie PCs

Windows 8 Consumer Preview Hits 1 Million Downloads

Microsoft Windows 8 development team announced that Windows 8 Consumer Preview reached 1 million downloads within the first 24 hours of its release. This shows that people are interested with next generation of Microsoft OS. You should know that Consumer Preview is not an official stable release. The number of downloads is much better than the previous Windows 7 Consumer Preview did back in 2009.

OWA Error - A problem Occurred While Trying to Use Your Mailbox"

We recently ran across a problem where users trying to log on to Microsoft Office Outlook Web Access in Exchange Server 2007 would receive the following error message:

"A problem occurred while trying to use your mailbox. Please contact technical support for your organization."

According to KB941146, this behavior is caused by an attribute – msExchVersion being 0 for the affected user. To fix this error you need to run the following command from Exchange PowerShell.

1. Get-Mailbox <user name>  | format-list ExchangeVersion

2. If the output is less than 1.0 then you need to run

 Set-Mailbox <user name> –ApplyMandatoryProperties

3. Then go to your Active Directory Users and Computers

4. On the View menu, select Advanced Features

5. Then select the user account who is experiencing the issue and click on Properties

6. Click on the Security tab and select Advanced

7. Make sure you check the box on 'Include inheritable permissions from this object's parent'

Windows 7 Check Disk With Chkntfs Command

In Windows 7 when your computer is shutdown in an improper way, the next time you turn it on, the Windows checkdisk will start to check your disk(s) for errors. The chkntfs command lets you manage the dirty flag property for all the hard disks and other parameters for bootup checkdisk in Windows 7. You will need to run as Administrator to run chkntfs command.

Find if a disk drive is dirty : You can find if the dirty flag for a drive letter is turned on at the present time, by giving command chkntfs X:, where the X: is the drive letter you want to check for the dirty flag. 

Find the autocheck time countdown : You can find out the AUTOCHK timer countdown shown at Windows boot up when checking a disk for errors. The default time is 10 seconds. The command line switch is chkntfs /T


Set the autocheck timer countdown : You can change the AUTOCHK timer countdown shown at Windows boot up. The default time is 10 seconds. The command line is chkntfs /T:time where time is the time in seconds. 


Schedule a drive to be checked on next reboot : You can manually set a drive to be checked at the Windows boot up. The command line is chkntfs /C X: where X: is the drive letter of the drive you want to schedule to be checked. 


Restore all settings to default : You can restore all the settings to their default. The command line is chkntfs /D.

Fake Chat Screen Malware

A new malware in the form of fake chat screen is attacking online banking customers to deceive in verifying bogus transactions.  The attack waits until the unsuspecting online banking customers login before telling them that “security checks” need to be performed. On a chat screen operating through a mix of HTML injections and Javascript, the victims will think they are speaking to customer support. In reality they are chatting with a cyber criminal that is attempting to get them to provide names, passwords and other banking credentials. At the same time, Klein claims attackers have meshed Man in the Browser techniques with phishing abilities and the Shylock malware platform to hijack accounts in real time. By asking users to sign off on fake transactions in the background, customers are duped without even knowing it.



How to Manually Remove Security Shield 2012

Security Shield 2012 is the latest version of fake security software malware. An infected PC may damaged its system registry setting and it will install additional malware. Security Shield 2012 will also redirect infected PC search result, slow down PC performance and displaying various amount of popups of fake system notification alerts.



Security Shield 2012 manual removal instructions:


1. Remove all the files in the following directories,

    %AppData%MicrosoftInternet ExplorerQuick LaunchSecurityShield 2012 2011.lnk

    %AppData%SecurityShield 2012 2011

    %AppData%SecurityShield 2012 2011IcoActivate.ico

    %Temp%

    %UserProfile%Start MenuProgramsSecurityShield 2012 2011.lnk

    %StartMenu%ProgramsSecurityShield 2012 2011

    %StartMenu%ProgramsSecurityShield 2012 2011Activate SecurityShield 2012 2011.lnk

    %StartMenu%ProgramsSecurityShield 2012 2011Help SecurityShield 2012 2011.lnk

    %StartMenu%ProgramsSecurityShield 2012 2011How to Activate SecurityShield 2012 2011.lnk

    %StartMenu%ProgramsSecurityShield 2012 2011SecurityShield 2012 2011.lnk

2. Remove all the registry settings from the following,

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\SecurityShield 20122011
HKEY_CURRENT_USER\Software\SecurityShield 20122011
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run“[random]”
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run“SecurityManager”
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run“SecurityShield 20122011?
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\SecurityShield 20122011
HKEY_CURRENT_USER\Software\SecurityShield 20122011
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\InternetSettingsUserAgentPostPlatform”(Default)”=”
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run”SecurityShield 20122011″
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run”SecurityShield 20122011Security”

Ninite: Update Essential Application

Managing desktop applications in the Workgroup or Active Directory environment can be a daunted task. Ninite can help you to automate the process by selecting all the applications that you need to install or update. Then, Ninite will allow you to install it without any user intervention.

Ninite downloads the apps you have selected and installs them into the target computer. If the computer already has that program, it will check for updates to that program and it will automatically update it.


Exchange 2010 Deployment Assistant

Microsoft released Exchange Deployment Assistant to provide step by step instructions on how to perform the migration or fresh installation of exchange 2010. It’s an online wizard that asks a series of questions about your current environment and in the end produces a customized check list with instructions for each step you need to take in your migration. It can help with On-premise, Cloud, or Exchange Hybrid deployments.

Schedule Task Error 0x800700005

Error: 0x800700005 access denied when creating a new task

The cause for this error is because Administrator user account does not have permission to the task scheduler folder. 

To fix this error:

  1. Open a command prompt
  2. Run “Net Use T: \\%computername%\C$\Windows\Tasks /Persistent:No”
  3. Open Explorer, right-click Tasks
  4. Go to Properties and click the Security tab. In security permissions grant Administrators and System Full Control if they do not already have it, and then click Apply. 
  5. Then click Advanced, check Replace permission entries on all child objects, and click Ok
  6. Restart the Task Scheduler service and give it another try.

How to Enable Network Level Authentication on Windows XP with SP3

Windows XP with SP3 supports Network Level Authentication within Windows 2008 Active Directory for connecting to devices running it. Network Level Authentication is a more secure method for remote desktop. If your Windows XP with SP3 tried to connect a computer running NLA, you will receive this error:



You will need to configure your Windows XP with SP3 registry to enable NLA,

  1. Click Start, click Run, type regedit, and then press ENTER.
  2.  In the navigation pane, locate and then click the following registry subkey: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa
     
  3. In the details pane, right-click Security Packages, and then click Modify.
     
  4. In the Value data box, type tspkg. Leave any data that is specific to other SSPs, and then click OK.
     
  5. In the navigation pane, locate and then click the following registry subkey: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders
     
  6. In the details pane, right-click SecurityProviders, and then click Modify.
     
  7. In the Value data box, type credssp.dll. Leave any data that is specific to other SSPs, and then click OK.
     
  8. Exit Registry Editor.
     
  9. Restart the computer.

How to Remotely Enable RDP

In case you want to remote access a Windows computer, you can enable the Remote Desktop Protocol via registry.

1. Using your administrator credentials and start Registry Editor by Start, Run, then regedit
2. Select the Connect Network Registry option under the File menu.

3. This opens the Select Computer search box. Either browse Active Directory to locate the remote computer, or type the name of the computer




4. Click OK and the computer you selected will be displayed in Registry Editor for the remote machine

5. Browse the registry to HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server
  
6. Under the Terminal Server key, you'll find a REG_DWORD value named fDenyTSConnection. Double-click on that value to open the Edit DWORD Value box and change the value data from 1 (Remote Desktop disabled) to 0 (Remote Desktop enabled)

7. The remote computer needs to be rebooted for the change to take effect. You need to open a command prompt and type shutdown -m \\(the name of the computer) -r

Outlook Error the Item Cannot Be Displayed in the Reading Pane

Outlook won’t display your email messages and  “The item cannot be displayed in the reading pane” error is also showing.

To fix this issue,

SOLUTION 1: Clear/Delete the Forms Cache 
  1. On the Tools menu, click Options.
  2. Click the Other tab, and then click Advanced Options.
  3. Click Custom Forms.
  4. Click Manage Forms.
  5. Click Clear Cache.
  6. Close all open windows, and then restart Outlook.
If the above does not work, try the following.

Deleting the Forms Cache File:

The Frmcache.dat file is the primary file to delete. The Frmcache.dat file serves as an index of the individual forms that have been cached on the computer. Use the following steps to manually delete the Frmcache.dat file. In addition, these steps delete all of the cached forms on your computer, which are stored in subfolders of the Forms folder.
  1. Quit Outlook.
  2. Search the Hard drive to locate the Frmcache.dat file.  (Be sure to check to display HIDDEN files)
  3. Delete all that are found from the FIND window.
  4. Open Outlook.
When you restart Outlook, and use a form, the forms cache is re-created.

SOLUTION 2: Check Add-Ins

Start Outlook in safe mode to disable add-ins to see if they are causing the issues.
  • In Windows XP - Start then select Run, type outlook.exe /safe and hit enter.
  • In Windows 7 or Vista - Start then type outlook.exe /safe and hit enter in "Search programs and files"
SOLUTION 3: Corrupted Mailbox
  1. Open Control Panel and double click the Mail icon. 
  2. Click Data Files
  3. Rename or delete the OST or PST.
  4. Start Outlook.  If you are using Exchange the OST will be recreated.  
  5. If you are using POP/PST,  Outlook will not be able to find the PST file so you will need to recreate it yourself.
SOLUTION 4: Rebuild Profile


An Outlook profile contains specific information about your email account.  Since the profile is a container holding data, it’s always possible that data got corrupted in one way or another.  Profiles aren’t controlled from within Outlook. Instead, they’re set and changed from within the Mail control panel.
  1. Click Start>Settings>Control Panel (or Start>Control Panel)
  2. Double-click the Mail control panel icon
  3. Click the Show Profiles button.
  4. Delete your old profile, we recommend creating a new one by clicking the Add button and then following the wizard. 


Remote Desktop to Windows 2003 Server SP2 error Domain Controller is Unavailable

A Windows Server 2003 SP2 server prevents a workstation from connecting via Remote Desktop unless the server can contact the domain-- even if the server has cached credentials available for the domain account the client is trying to use.  This domain-disconnected case is probably common a scenario, where workstation occasionally connects to the domain but generally log in via cached credentials.

The error you'll get in the Remote Desktop client is this:
    The system cannot log you on due to the following error:
    The specified domain either does not exist or cannot be contacted






The easiest fix to go to Microsoft site and download HotFix KB902336. Or you may try to fix it manually by connect to Registry Editor remotely.

  1. Locate the following registry subkey:
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server
  2. Click Edit, point to New, and then click DWORD Value.
  3. In the New Value #1 box, type IgnoreRegUserConfigErrors, and then press ENTER.
  4. Right-click IgnoreRegUserConfigErrors, and then click Modify.
  5. In the Value data box, type 1, click Decimal, and then click OK.
  6. Quit Registry Editor.

Internet Security Malware Removal

Internet Security is just one of many fake antivirus applications. The malware display on your desktop that your PC is infected with fake viruses, and prevent you from doing anything to remove them (pop ups). Here is the step to remove it manually.



1. Reboot your system and go to Safe Mode (press F8 during reboot)
2. Type %CommonAppData%\isecurity.exe on Run command and delete the file
3. Type %Desktop%\Internet Security.lnk on Run command and delete the link
4. Go to Registry Editor, type regedit on Run command
5. Delete the key on HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “Internet Security”

New SendSpace Trojan

Trend Micro researchers are warning of a new Trojan that uploads Word and Excel files from victims' computers to the file hosting site SendSpace. If you browse SendSpace, there's a chance you might come across Microsoft Word and Excel files stolen directly from victims' computers and put up for grabs. The new SendSpace Trojan first targets potential victims with an infected file labeled "Fedex_Invoice.exe," designed to pass as a FedEx shipment notification. Once downloaded, the fake FedEx file triggers SendSpace, which scans the system for Microsoft Word and Excel files.

Windows 7 Sticky Notes

Tired of those yellow post it notes all over your monitor?You can use Windows 7 Sticky Notes to move them around your desktop where you can organize them or color code them.

To use Sticky Notes:

  1. Click Start
  2. Go to All Programs then select Accessories
  3. Select Sticky Notes
  4. Move the notes where you want and start typing

How to Clear Hard Drive Space in Windows 7

To start clearing away at some of the unwanted files currently on your hard drive, you don't need to look any farther than Windows 7’s Disk Cleanup tool. For a built-in feature, Disk Cleanup is simple and powerful program for freeing up of unnecessary files. It removes temporary files, empties the Recycle Bin, and removes a variety of system files and other items that you no longer need. Depending on how often you run Disk Cleanup, this operation can regain a lot of disk space for you.

  1. Open Disk Cleanup by clicking the Start button , clicking All Programs, clicking Accessories, clicking System Tools, and then clicking Disk Cleanup.
  2. In the Disk Cleanup Options dialog box, choose whether you want to clean up your own files only or all of the files on the computer.  If you are prompted for an administrator password or confirmation, type the password or provide confirmation.
  3. If the Disk Cleanup: Drive Selection dialog box appears, select the hard disk drive that you want to clean up, and then click OK.
  4. Click the Disk Cleanup tab, and then select the check boxes for the files you want to delete.
  5. When you finish selecting the files you want to delete, click OK, and then click Delete files to confirm the operation. Disk Cleanup proceeds to remove all unnecessary files from your computer. 



Easy Locking Down Your Windows 7

Protecting your PC's physical access is as important as having firewall and antivirus protection. The 2 easiest  methods you should lock down your Windows 7 are:

1. Get a Strong Password. If long password with alpha numeric is hard to remember for you, then the easiest way is to add a SPACE in your password. It's that simple. You can use a normal words, like "your house" or "this blog". It would take somewhere between an hour to 200 years for the example password to crack.

2. Disable Automatic Login.

  • Click Start and type in netplwiz in the search box
  • Check off the box that says “Users must enter a username and password to use this computer.” 
  • Click Apply 





How to Clear Run History in Windows 7


 In order to clear your entire Run history in Windows 7, you need to do the following:
  1. Right click on the taskbar, go to Properties.
  2. Select Start Menu.
  3. Uncheck the property, “Store and display recently opened programs in the Start menu.”
  4. Apply the changes and select OK.


If you need to have the run history again, you just need to check the property, “Store and display recently opened programs in the Start menu.”

How to Change Windows 7 Login Background Image

You can change the login screen background quite easily in Windows 7. Here are the steps:

1. Prepare image (JPEG) you would like to use no more than 256 KB in size

2. Type regedit in the Search program and files  and press Enter to open the Registry Editor.

3. Located the following registry key:


HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\Background

 

4. Double click on OEMBackground and set the value as 1


5.  Copy your image file which you are going to use as the login background to the following location:

%windir%\System32\oobe\info\backgrounds

6.   Rename the image file in %windir%\System32\oobe\info\backgrounds as backgroundDefault.jpg

7.  Press Ctrl + Alt + Del to check your background image

McAfee Stinger

One of virus or malware removal tools you need to add into your utility arsenal is McAfee Stinger. The tool is not a replacement for your standard antivirus care for your PC. It does remove most of known fake antivirus malware infection.

Stinger is pretty simple to use and comes with a list of malware that it can remove without too much effort. It sports basic options to tweak sensitivity, including what and where to scan. Windows XP, Vista, and Windows 7 users may have to disable System Restore to use it.


McAfee Stinger is available as a free download for Windows only.

How to Hide User's Account Information on Locked Desktop

You can hide the user's account information on a locked desktop via registry hack or in a Windows Domain environment, you can use Group Policy Object (GPO) setting. In a way this setting protect your unattended PC to some extend.

Windows Domain Environment:

1. Locate Interactive Logon: Display user Information when the session is locked by searching in GPO container: Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options


2. Then select User display name, domain and user names with registry value of 1


3. Select User display name only with registry value of 2

4. Select Do not display user information with registry value of 3


Standalone PC:

1. Run Regedit

2. Locate HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System for DontDisplayLockedUserID (Reg_DWORD) and set Computer Locked dialog box to registry value of 3

Users now will have to retype their user accounts and passwords each time they need to logon to their locked desktop.

Europe Will Run Out of IPv4 Addresses

According to RIPE (Réseaux IP Européens) or the European regional Internet registry, they are expected to run out of IPv4 addresses in 2012. It is estimated that RIPE will run out its remaining IPv4 addresses on July 22nd. Last year in April, Asia depleted all their IPv4 addresses with the exception of a few remaining reserve for start-up network operators. For ARIN, they are expected to deplete the remaining of their IPv4 by 2013. These depletion of IPv4 has put pressure for various regions to transition their network to IPv6.

Best Configuration for Outlook in Virtual Desktop to Office 365

Typically, it's recommended to use Outlook's Cached Exchanged Mode when connectivity to Exchange Server is not on the same local network. However, if your company have virtual desktop environment and use Office 365, then it's best to keep all data small with no local cache and in its Online mode. You can read more about it here.

Command Line for Enable or Disable Windows Hybernate

To Disable Hybernate

  • Open an elevated command prompt, ie. one with admin previlages (Start > cmd > right-click and “Run as administrator”).
  • In command prompt, key in powercfg -h off and hit Enter.
  • Close the elevated command prompt.

To Enable Hybernate

  • Open an elevated command prompt, ie. one with admin previlages (Start > cmd > right-click and “Run as administrator”).
  • In command prompt, key in powercfg -h on and hit Enter.
  • Close the elevated command prompt.

3 Tips For Securing Passwords

End users need better understanding of the real damage when their passwords are compromised. Here are 3 tips for securing passwords.
  1. Use long paraphrases to recall passwords without writing them down. 
  2. Don't use any words listed on dictionary and avoid keyboard sequences (qwerty, 12345, etc)
  3. Hashed passwords to increase difficulty.

Microsoft Security Essentials

Microsoft Security Essentials is a free system protection software to give protection against viruses, malware. trojans, worms and spyware. It provides real-time protection for your home or small business workstations.  

It is available for small businesses with up to 10 workstations. Microsoft Security Essentials runs quietly in the background. You’ll only be alerted when there are specific actions to take.

Microsoft Security Essentials helps keep your PCs safe without getting in your way or making you worry:

  • Real-time protection
  • System scanning
  • System cleaning
  • Windows Firewall integration
  • Dynamic signature service
  • Rootkit protection
  • Protection against real threats, not good software
  • Network inspection system
 As of October 2011, Microsoft announced a beta version of Microsoft Security Essentials 2012 and delivered to participants. The company plans to include the following enhancements with the update:
  • Enhanced protection through automatic malware remediation - The Beta will clean high-impact malware infections automatically, with no required user interaction.
  • Enhanced performance - The Beta includes many performance improvements to make sure your PC performance isn’t negatively impacted.
  • Simplified UI - Simplified UI makes Microsoft Security Essentials Beta easier to use.
  • New and improved protection engine - The updated engine offers enhanced detection and cleanup capabilities.

Microsoft Safety Scanner

Early 2011, Microsoft released a downloadable on-demand personal desktop security scanner to help end-users deal with malware/virus outbreaks. The tool is a small 70 Mb of self-contained security scanner package that you download and run. It's called Microsoft Safety Scanner


Microsoft Safety Scanner is not an anti-virus program. It does not replace your real time anti-virus client such as Microsoft Security Essentials. It is a tool that you can use to remove malware/virus on computers that don't have anti-virus software or where the regular anti-virus software was disabled by the malware/virus.