Wednesday, September 30, 2009

All Removal tools

Nortan: ftp://ftp.symantec.com/public/english_us_canada/removal_tools/Norton_Removal_Tool.exe

Mcfaee: http://download.mcafee.com/products/licensed/cust_support_patches/MCPR.exe

Avg: http://www.avg.com/filedir/util/avg_arm_sup_____.dir/avgremover.exe

Bit Defender 32 bit : http://www.bitdefender.com/files/KnowledgeBase/file/BitDefender_Uninstall_Tool.exe

Bit Defender 64 bit : http://www.bitdefender.com/files/KnowledgeBase/file/BitDefender_Uninstall_Tool_x64.exe

Kespersky: http://support.kaspersky.com/downloads/products2009/kavremover9.zip

ESET Nod 32 : http://www.nod32.nl/download/tool/nod32removal.exe

microsoft MSI cleanup utility : http://download.microsoft.com/download/e/9...1bd/msicuu2.exe

Panda 09 : http://www.pandasecurity.com/resources/sop/UNINSTALLER_09.exe

Panda 08 : http://www.pandasecurity.com/resources/sop/UNINSTALLER_08.exe

Microsoft Windows Live OneCare : http://download.microsoft.com/download/4/c/b/4cb845e7-1076-437b-852a-

Trend micro PC-Cillin : http://esupport.trendmicro.com/support/viewxml.do?ContentID=EN-1033129

F-Secure : ftp://ftp.f-secure.com/support/tools/uitool/UITool3-420.zip

Quick Heal : http://support.quickheal.com/esupport/index.php?_m=downloads&_a=view

avast! : http://files.avast.com/files/eng/aswclear.exe

avira : http://dl1.pro.antivir.de/down/windows/tool_en.exe

CA : https://remoteassist.ca.com/supportbridge/jsp/selfserve/processScriptRequestOwnWindow.jsp?

Thursday, September 24, 2009

ASSERT in LSP warning




1.Uninstall Google Desktop.

2.Re-install and try again.

Wednesday, September 23, 2009

Top 8 Tips for Wireless Home Network Security

1) Change Default Administrator Passwords (and Usernames)

Changing the default password is important because everyone that purchases the same Wireless access device, knows your password.

2) Turn on (Compatible) WPA / WEP Encryption

By default, your Wireless device comes without the encryption enables. WPA / WEP are security programs that forced your computer to provide an encrypted password before you are allowed access to the wireless access point.

3) Change the Default SSID

SSID is the network name of your wireless network; most people leave the default name, such as, Linksys or NetGear. By changing the name, intruders have a more difficult time identifying your system and use known vulnerabilities. (And of course, use the unchanged default password.) One mistake people make is naming their home network their family name and or address. When cruising a neighborhood of wireless devices, its always scary to see Smithfamily201Elm.

4) Disable SSID Broadcast

In Wi-Fi networking, the access point or router typically broadcasts the network name (SSID) over the air at regular intervals. This feature was designed for businesses and mobile hotspots where Wi-Fi clients may come and go. In the home, this feature is unnecessary, and it increases the likelihood an unwelcome neighbor or hacker will try to log in to your home network.

5) Assign Static IP Addresses to Devices

Most home networkers gravitate toward using dynamic IP addresses. This means that the IP Address, (the IP Address is needed to participate on a network.) is typically assigned automatically. A dynamic IP address on an unsecure system can also supply a hacker with a IP Address.

6) Enable MAC Address Filtering

Each piece of Wi-Fi gear possesses a unique identifier called the "physical address" or "MAC address." Access points and routers keep track of the MAC addresses of all devices that connect to them. Many such products offer the owner an option to key in the MAC addresses of their home equipment that restricts the network to only allow connections from those devices. Do this, but also know that the feature is not so powerful as it may seem. Hacker software programs can fake MAC addresses easily.

7) Turn Off the Network During Extended Periods of Non-Use

The ultimate in security measures for any wireless network is to shut down, or turn office your wireless access point when you are not using. You are the most vulnerable at work or asleep, and mischief minded people know it.

8) Position the Router or Access Point Safely

Wi-Fi signals normally reach to the exterior of a home. A small amount of "leakage" outdoors is not a problem, but the further this signal reaches, the easier it is for others to detect and exploit. Wi-Fi signals often reach across streets and through neighboring homes. When installing a wireless home network, the position of the access point or router determines it's reach. Try to position these devices near the center of the home rather than near windows to minimize this leakage.

How To Install VMware Server 2 On An Ubuntu 8.04 Desktop

How To Install VMware Server 2 On An Ubuntu 8.04 Desktop

Version 1.0
Author: Navneet Sital
Last edited 09/23/2009

VMwareThis tutorial provides step-by-step instructions on how to install VMware Server 2 on an Ubuntu 8.04 desktop system. With VMware Server you can create and run guest operating systems ("virtual machines") such as Linux, Windows, FreeBSD, etc. under a host operating system. This has the benefit that you can run multiple operating systems on the same hardware which saves a lot of money, and you can move virtual machines from one VMware Server to the next one (or to a system that has the VMware Player which is also free).

Also, with VMware Server you can let your old Windows desktop (that you previously converted into a VMware virtual machine with VMware Converter, as described in this tutorial: http://www.howtoforge.com/vmware_converter_windows_linux) run under your Ubuntu desktop. This can be useful if you depend on some applications that exist for Windows only, or if you want to switch to Linux slowly.

I want to say first that this is not the only way of setting up such a system. There are many ways of achieving this goal but this is the way I take. I do not issue any guarantee that this will work for you!

1 Preliminary Note

I'm using the user name falko with the home directory /home/falko here - please adjust this appropriately.

2 Installing VMware Server

To download VMware Server, go to http://www.vmware.com/products/server/ and click on Download Now:

On the next page, log in with your existing VMware account or create a new one:

Follow the on-screen instructions. At the end, you should receive an email with a link to your download page. On the download page, you should see two license numbers, one for Windows and one for Linux. Write down or save the one for Linux and scroll down.

Then download the VMware Server for Linux TAR image (not the RPM image!) to your desktop (e.g. to /home/falko/Desktop):

Then open a terminal (Applications > Accessories > Terminal):

Run the following command to install some necessary packages:

sudo apt-get install linux-headers-`uname -r` build-essential xinetd

Then go to the location where you saved the VMware Server .tar.gz file, e.g. /home/falko/Desktop (replace falko with your own username!):

cd /home/falko/Desktop

Unpack the VMware Server .tar.gz file and run the installer:

tar xvfz VMware-server-*.tar.gz
cd vmware-server-distrib
sudo ./vmware-install.pl

The installer will ask you a lot of questions. You can always accept the default values simply by hitting .

When the installer asks you

In which directory do you want to keep your virtual machine files?
[/var/lib/vmware/Virtual Machines]

you can either accept the default value or specify a location that has enough free space to store your virtual machines.

At the end of the installation, you will be asked to enter a serial number:

Please enter your 20-character serial number.

Type XXXXX-XXXXX-XXXXX-XXXXX or 'Enter' to cancel:

Fill in your serial number for VMware Server.

After the successful installation, you can delete the VMware Server download file and the installation directory:

cd /home/falko/Desktop
rm -f VMware-server*
rm -fr vmware-server-distrib/

If you have accepted all default values during the installation, root is now the VMware Server login name. On Ubuntu, root has no password by default, therefore we create a password now:

sudo passwd root

VMware Server 2 does not have a desktop application for managing virtual machines - this is now done through a browser (e.g. Firefox). You can access the management interface over HTTPS (https://:8333) or HTTP (http://:8222); the management interface can be accessed locally and also remotely. If you want to access it from the same machine, type https://127.0.0.1:8333 or http://127.0.0.1:8222 into the browser's address bar.

If you're using Firefox 3 and use HTTPS, Firefox will complain about the self-signed certificate, therefore you must tell Firefox to accept the certificate.

Afterwards, you will see the VMware Server login form. Type in root and the password you've just created:

This is how the VMware Server web interface looks. The structure is similar to the old VMware Server 1 desktop application, so the usage of the web interface is pretty straightforward.

Tuesday, September 1, 2009

Repair/Reset Winsock settings

Most of the Internet connectivity problems arise out of corrupt Winsock settings. Windows sockets settings may get corrupted due to the installation of a networking software, or perhaps due to Malware infestation. You will be able connect to the Internet, but the packets won't transfer back and forth. And errors such as Page cannot be displayed may occur when using Internet Explorer. This article lists the methods (with links to third-party websites) to reset/repair the Winsock configuration to defaults.

Tools

Microsoft Knowledgebase articles

Windows XP Service Pack 2 - New Winsock NETSH commands

Two new Netsh commands are available in Windows XP Service Pack 2.

netsh winsock reset catalog

This command resets the Winsock catalog to the default configuration. This can be useful if a malformed LSP is installed that results in loss of network connectivity. While use of this command can restore network connectivity, it should be used with care because any previously-installed LSPs will need to be re-installed.

netsh winsock show catalog

This command displays the list of Winsock LSPs that are installed on the computer.

To output the results to a file type this in Command Prompt (CMD.EXE)

netsh winsock show catalog >C:\lsp.txt

Click to view the sample file now - lsp.txt

See: Changes to Functionality in Microsoft Windows XP Service Pack 2: Network Protection Technologies

Lavasoft Ad-Aware SE LSP Explorer Add-on can generate more information than NETSH, and provides options to Backup, Restore the LSPs, export the details to a HTML / Plain text file. Using the report you can easily determine the third-party LSPs, the Product, Company name and the corresponding LSP provider file name.

  • Download / Install Ad-aware SE from Lavasoft

  • Visit their Plugins page and install the LSP Explorer Plugin for Ad-aware (pllspexplorer)

  • Launch Ad-aware and click the Add-ons button

  • Double-click LSP Explorer add-on and run it

Download a sample LSP HTML report (6kb Zip).

Note that resetting the Winsock using netsh winsock reset catalog command in SP2 removes all the third-party LSPs and restores Winsock to factory default setting. Existing programs that uses their own LSPs, need to be reinstalled again. Example.. Google Desktop Search.

How to manually open ports in Internet Connection Firewall in Windows XP

Programs may require ports to be manually opened so that the programs work correctly when ICF is in use either on the local computer or on the gateway computer. You may have to manually open a port if there is a service that is running on a computer that has ICF enabled that you want to make available to users on the Internet.

Note The actual port settings vary from program to program.

To manually open a port, follow these steps:
  1. Click Start, and then click My Network Places.
  2. Under Network Tasks, click View Network Connections. (Or, right-click My Network Places on the desktop, and then click Properties.)
  3. Right-click the connection that you use for the Internet, and then click Properties.
  4. Click the Advanced tab, and then click Settings.

    Note If the Settings button is unavailable, ICF is not enabled on this connection, and you do not have to open any ports (because they are all already open).
  5. Click Add to open a new port.
  6. In the Description box, type a friendly name. For example, type File Sharing : Port 445.
  7. In the Name or IP address of the computer hosting this service on your network box, type 127.0.0.1.

    Note You can specify the IP address of an internal computer. But you typically will use 127.0.0.1.
  8. In the External port and Internal port boxes, type the port number. Generally, this number is the same.
  9. Click either TCP or UDP, and then click OK.
  10. Repeat steps 1 through 9 for each port that you want to open.
For additional information, click the following article numbers to view the articles in the Microsoft Knowledge Base:
283673 (http://support.microsoft.com/kb/283673/ ) How to enable or disable the Personal Firewall feature in Windows XP
307554 (http://support.microsoft.com/kb/307554/ ) Programs require manual port configurations with Internet Connection Firewall