<< < 1 2 3 4 5 6 >   Sort: Date

What are the common mistakes that are made when administrators set up DNS on network that contains a single Windows 2000 or Wind
What are the common mistakes that are made when administrators set up DNS on network that contains a single Windows 2000 or Windows Server 2003 domain controller? The most common mistakes are: The domain controller is not pointing to itself for DNS resolution on all network interfaces. The "." zone ...
2009-06-23, 5631🔥, 0💬

Understanding security and safe computing - Use a standard user account
Windows Vista Security basics - Understanding security and safe computing - Use a standard user account When you log on to your computer, Windows grants you a certain level of rights and privileges depending on what kind of user account you have. There are three different types of user accounts: sta...
2009-07-14, 5628🔥, 0💬

Finding and Removing vtsts.dll Manually
Finding and Removing vtsts.dll Manually the following steps to remove vtsts.dll: 1. Copy of the above suspicious files into a ZIP file, vundo_200611.zip. 2. Try to delete vtsts.dll with File Explorer. But I got a "File in use" error. 3. Try to delete vtsts.dll with HijackThis: Run HijackThis Do a sy...
2009-01-20, 5622🔥, 0💬

Adding Directories to a New ZIP File
Adding Directories to a New ZIP File 1. Run WinZip and select menu File > New Archive. The "New Archive" dialog box shows up. 2. Enter test2.zip as the file name for the new ZIP file in c:\temp directory. 3. Click the OK button. The "Add" dialog box shows up. 4. Make the "Include subfolders" option ...
2008-08-12, 5598🔥, 0💬

Configuring "Analog" to Process Log Files
Configuring "Analog" to Process Log Files Configuring "Analog" to Process Log Files 1. Reading "analog" documentation at c:\local\analog\docs\indx.html .2. Setting up and running "analog" to run
2008-11-04, 5595🔥, 0💬

FTP Command Line Client Program
FTP Command Line Client Program Here are some useful used FTP commands: * open "host_name" - Establishes a connect to the FTP server at the specified host. * disconnect - Stops the current connect. * user "user_name" - Provides user name and password to pass the access authentication. * quit - Quits...
2008-10-14, 5578🔥, 0💬

How to convert the file format GIF to JPG of graphics files using 'Paint' program
How to convert the file format GIF to JPG of graphics files using 'Paint' program 1. Run Paint. 2. Open the graphics file in GIF format. 4. Select menu "File &gt; Save as". The "Save As" dialog box shows up. 5. Select "JPEG" in the "Save as type" field, enter a new file name, and click the Save
2008-07-22, 5554🔥, 0💬

Adding Files to a New ZIP File
Adding Files to a New ZIP File 1. Run WinZip and select menu File > New Archive. The "New Archive" dialog box shows up. 2. Enter test1.zip as the file name for the new ZIP file in c:\temp directory. 3. Click the OK button. The "Add" dialog box shows up. 4. Select the files that you want to add to th...
2008-08-05, 5536🔥, 0💬

Using anti-malware software to help protect your computer - Which edition of Windows Vista am I using?
Windows Vista Security basics - Using anti-malware software to help protect your computer - Which edition of Windows Vista am I using? Malicious software, also known as malware, is software designed to deliberately harm your computer. For example, viruses, worms, and Trojan horses are malicious soft...
2009-07-21, 5526🔥, 0💬

Do I need to back up my certificates?
Do I need to back up my certificates? Most certificates don't need to be backed up. However, if you encrypt files with Encrypting File System (EFS), you should back up your EFS certificates so you don't lose your data. For more information about how to back up your EFS certificates, see Back up Encr...
2009-02-25, 5493🔥, 0💬

Trojan and Malware "Puper" Removal
Trojan and Malware "Puper" Removal While looking at the c:\windows\system32, I noticed 3 strange suspicious files: >dir C:\WINDOWS\system32 07/21/2006 09:43 PM 17,750 vqfupqnr.exe 07/24/2006 12:22 AM 17,750 opuryycl.exe 07/24/2006 09:51 PM 17,750 uceysmkw.exe Zipped all 3 suspicious files into a zip...
2009-02-10, 5481🔥, 0💬

Installing "Analog" - Web Log File Analysis Tool
Installing "Analog" - Web Log File Analysis Tool Installing "Analog" - Web Log File Analysis Tool One of the most popular Web log file tool is called "analog". Here is its home page: http://www.analog.cx/. Here how downloaded and installed "analog" on Windows system. 1. Go to http://www.analog.cs/ a...
2008-11-04, 5481🔥, 0💬

To choose advanced scanning options
To choose advanced scanning options To choose advanced scanning options When scanning your computer, you can choose from four additional options: • Scan the contents of archived files and folders for potential threats. Scanning these locations might increase the time required to complete a scan, but...
2009-03-31, 5471🔥, 0💬

Processing Apache Log Files with "Analog"
Processing Apache Log Files with "Analog" 1. Downloading log files to run with "analog". 2. Configuring "analog" 3. Adding referrer report:
2008-11-11, 5414🔥, 0💬

Understanding security and safe computing - Check your security status with Windows Security Center
Windows Vista Security basics - Understanding security and safe computing - Check your security status with Windows Security Center Windows Security Center is your headquarters for computer security. It shows your computer's current security status and recommends anything that you should do to help ...
2009-06-16, 5404🔥, 0💬

Partial Removal of Trojan Vundo
Partial Removal of Trojan Vundo 1. Looked at C:\WINDOWS\system32, and found the following suspicious files: &gt;dir C:\WINDOWS\system32 10/02/2006 10:42 PM 86,068 fcissfvg.dll 10/03/2006 10:31 PM 86,036 lyssmlnb.dll 10/12/2006 09:52 PM 98,324 yjsallam.dll 2. Looked at IE &gt; Internet Option...
2008-12-30, 5403🔥, 0💬

HijackThis - Report Entry Types
"HijackThis" Report Entry Types If you look at the "HijackThis" report included in the previous section, you will see that the report is divided into two sections. The first part of the log files tells you what are the processes currently running on the system. You should review them to see if there...
2008-11-18, 5395🔥, 0💬

How to Change the Speed of your Mouse Pointer in Windows XP
How to Change the Speed of your Mouse Pointer in Windows XP Click your Start button at the bottom of your screen. When the menu pops up, click on the Control Panel link. The Control Panel folder will open and you will see different icons in the folder. If you can't see the icons, do this. Go to the ...
2008-07-08, 5373🔥, 0💬

When I take a bunch of vacation photos, I usually copy them to ....
When I take a bunch of vacation photos, I usually copy them to a CD or DVD and I send it to my parents. After all, CDs and DVDs are the way we tend to share things with people these days. To show you how to burn files to CD and DVD. It's actually really easy...all you need is a blank disc and a comp...
2009-04-14, 5362🔥, 0💬

Spyware and Browser Hijacker Detector
Spyware and Browser Hijacker Detector HijackThis is probably the most popular spyware detection tools available on the Internet. So I downloaded HijackThis v1.99.0 from the Web site: http://www.merijn.org/. Here is a basic tour of how to use HijackThis: 1. Run HijackThis, it will offer you a couple ...
2008-11-18, 5353🔥, 0💬

Understanding security and safe computing - What are security alerts?
Windows Vista Security basics - Understanding security and safe computing - What are security alerts? If Windows detects that your computer might need enhanced security in any one of the security areas—firewall, automatic updating, malware protection, or other security settings—you will see a notifi...
2009-06-16, 5350🔥, 0💬

Creating a ZIP File on Multiple Diskettes
Creating a ZIP File on Multiple Diskettes Its file size is 4713 KB. Here are the steps to compress it onto multiple diskettes: 0. Insert a formatted blank diskette into the computer. 1. Run WinZip and select menu File > New Archive. The "New Archive" dialog box shows up. 2. Enter a:\my_music.zip as ...
2008-08-26, 5336🔥, 0💬

To scan specific areas of your computer only (Custom Scan)
To scan specific areas of your computer only (Custom Scan) You can select specific locations on your computer for Windows Defender to scan. However, if spyware or other potentially unwanted software is detected, Windows Defender will then run a quick scan so the detected items can be removed from ot...
2009-03-31, 5327🔥, 0💬

Using Windows Security Center - Malicious software protection
Windows Vista Security basics - Using Windows Security Center - Malicious software protection Malicious software (malware) protection can help protect your computer against viruses, spyware, and other security threats. Security Center checks if your computer is using up-to-date antispyware and antiv...
2009-06-02, 5326🔥, 0💬

<< < 1 2 3 4 5 6 >   Sort: Date