Online PC Support

OPS Technical Solutions : +1(833)-522-1003

Welcome

Smartphones can contribute to spread of viruses in 2011

Smartphones are getting very popular and with its advantages, there are some disadvantages also. These devices are vulnerable to cyber threats. Antivirus makers are speculating that smartphones will contribute to the spread of viruses in 2011. Keeping these threats in mind, one of the antivirus companies, Trend Micro, said cyber crimes will increase as smartphones become more widespread in 2011. They also mentioned that mainly Windows XP and Windows 2000 users will be more vulnerable to these threats.

Trend Micro conducted a research and officials said that a new cyber threat is created every 1.5 seconds. It’s very threatening because the cyber crime world has already registered a higher turnover than drug traffickers. At a press conference, Trend Micro Turkey General Manager said that 2010 was a preparation and restructuring year for them, but despite that, the company registered a 55 percent growth in turnover. Trend Micro targets 50 percent growth in 2011. He also mentioned that with the diversification of operating systems together with the increase in mobile device use, 2011 seems to be a very fruitful year for cyber criminals. He added that cyber criminals would add a new chain to social engineering with malware attacks and e-mails carrying malware they developed.

During the research Trend Micro also found that 80 percent of malware attacks with the highest rates of circulation reached user systems via the web and the number of attacks is surely going to increase in 2011. Trend Micro executives predicted that cloud security needs to be tightened in 2011 as it will receive more advanced attacks.

Trend Micro research evaluated both the public sector and private sector individually and the research revealed that private sector is slightly better than the public sector in terms of cyber, crimes but private sector is suffering from serious threats.

Microsoft’s anti-Zeus tool cleans quarter-million PCs

Microsoft has always been concerned about security for its user groups and has always been providing security updated to its users in order to safeguard against online threats and hackers.

MSRT (Malicious Software Removal Tool) is one of the greatest efforts started by Microsoft. MSRT is a free tool provided by Microsoft which performs a complete scan and checks for infections on system running on Windows 2000, Windows XP, Windows Vista, Windows 7 and Windows 2003 Server operating systems.

It specifically scans the system to find and remove malicious software like Sasser, Mydoom, and Blaster infections.

Once the scan and removal of malicious software is completed, it also shows the complete report containing the information of detection and removal.

This tool is regularly updated on Microsoft’s website and it is always advisable to have such tools on your computer as it may not appear that the system is infected with such infection until such a anti-malware program detects and notifies you.

Recently, Microsoft has detected and removed the  Zeus malware from over the 275,000 computers running on Windows operating system. This malware was known to steal financial information from a OC.
Zeus can also be termed as Zbot, which is a type of Trojan. It is secretly installed on your computer using a spyware or keylogger program. Once installed, it steals secure information, like user names, passwords, financial data, from your computer. Hackers mostly use these malwares to trap the user behaviors from the system as and can collect financial information like credit card information and online banking credential. The information can further cab be used to withdraw amount from user’s accounts and misuse the credit card information.

This time Zeus malware had targeted Charles Schwab investment accounts.  They were projecting a fake from during the financial session to collate the personal information from the company’s website. They were intended to use this personal information to make illegal transactions in future.

This scan could only be possible when Microsoft added a new update for Zeus/Zbot updated to its MSRT on last Tuesday. The moment this update was launched and installed, it started detecting this bot on Windows based machines and it this MSRT tool has already detected and removed 281,491 instances of Zeus malware from 274,873 system in all over the world. It was also announced on Microsoft’s official blog on last Sunday.

The Zeus malware first came into notice in the year of 2007 when almost 100 gang memers were arrested in UK, US and Ukraine.

This group reportedly stole almost $200 from the online bank customers and small business owners.

Such event brought the concern of security in Microsoft security teams and they started developing protections for Zeus and Zbot malware.

The MSRT tool is available free of cost on Microsoft’s website and can be installed manually as well. The updates are done automatically if the automatic update services are turned on in your computer.

How to Remove the Authentium AntiVirus

Authentium antivirus is a popular antivirus mainly used in corporate settings. It is also used for personal protection as well as enterprise sector. The client versions available are CSAV for Windows Vista for Client Only, 32-Bit 4.95.0, CSAV for Windows XP/2000/2003 4.95 and CSAV for Windows Legacy (NT 4.0/98/95) with full updates and legacy support.

The main enterprise versions are Galileo Central Management Console for Management Server, Galileo Command Central Snap-in and CSAV Client for Enterprise for Windows XP/2000/2003. Some times it takes more time to launch or you want to upgrade the existing version, in that case you have to remove it from the computer. It is very difficult to uninstall this Authentium suite normally, so you have to remove it manually from the system.

You can do it with ease by following the instructions given below for Authentium Antivrus removal:

Step1:

The first step is to download and install the Microsoft Cleanup utility. This utility is very helpful to give assistant to uninstall any program. By using this application you can completely delete any program.

Step2:

Now you just have to launch the CleanUp utility and select the “Command Anti-Virus” software. In that window click the “Remove” button. It will complete the remove application and restart the computer. Now during the reboot keepPressing “F8” to launch the computer in Safe Mode.  Now in the safe mode, go to “My Computer,” select the “C” drive and click on “Show hidden files.” In the C drive locate the “AK” folder and delete it, after that open the “Program files” directory and delete the “Command Software” and “Authentium” folders. Now you have to open the “Common Files” directory and in that directory delete the “Command” and “Authentium” files.

Step3:

Now open the run dialogue box and press the “Windows” and “R” keys simultaneously. Now in the run dialogue bix type cmd and press enter. Now a black screen appears, Type the following commands:
sc delete dvpapi
sc delete avinitnt
sc delete schscnt”

To complete the removal process, exit from the command prompt and restart the computer. Now you have removed the Authentium antivirus from the system.

You can also try the traditional method to remove this antivirus. Go to control panel by clicking the start button on the bottom left side of the computer screen. In control panel window locate and click add or remove programs. Now you can see a list of all the programs installed in the system, just locate the Authentium antivirus and click remove. Now go in the flow with on screen commands and it will remove the antivbirus from the system. You may have to restart the computer to finish the process. We recommend you to install a good antivirus after removal of this antivirus otherwise the system will be unprotected from the potential threats. If the computer is running slow after installing an antivirus then check for the compatibility and get a light application to protect the computer.

Study: Older OS at Greater Risk of Security

Recently, people are having troubles regarding expired support system of an Operating Software. It has been reported that many users having an expired support system of their OS have been targeted by  malicious software and viruses .

Although we say that this are expired operating system that must be replaced, issues arise regarding the difficulty of replacing them.

What is an operating system?

Operating system is used as a piece of medium for application software and computer hard disk. It regulates and functions over application software usage to the computer’s system. It also helps the users gain control on its own computer of laptop.

One of the examples of an operating system is the Microsoft Operating system Windows 2000.

Windows 2000

Windows 200 is an operating system created by the Microsoft Company for business use and for company’s series of system. It is intended mostly for some business marketers and other big series of operating computers like those of local government and services.

Issues on Windows 2000

With the current report, the Windows 2000 service support has already been expired. With this, it has been stated that malware attacks have been into progress of attacking it due to its current status.

With almost all business transaction companies and local governments with some residents who are using still the Operating system, it would be difficult for them to upgrade their system especially on those big working companies. Aside from the disturbance of the working service and functions, it will cost a lot of money when you are using a large number of computers.

Malicious software threat

Attacks on the expired support system of the Windows 2000 have grown in progress. With the business companies and local governments who are at risk, a threat to a possible wide spread of private information to the internet will likely to happen.

With regards to that, it will be a great threat to all consumers and residents about exposing personal data and information that might be used for further damage.

Resolution

Microsoft Corporation has said that it would be best to just upgrade and change the old system to the new ones. But business corporation’s owners and some local governments said that it would cost a lot of money to aid the said solution. It might affect the revenue or the budget itself.

Some consumers demand of lowering the upgrade price to be able to somehow reach the budget, but the Microsoft Corporation said that the given support system period would have been enough for them to prepare for its expiration. They could no longer do further action with that.

The consumers and business users have decided to still continue on the use of the operating system and are making its cautious move not to be able to attack by those reported malwares.

A bit of hard situation on their part, but they have to stick with it in order to avoid the expense it might caused them.

Microsoft Takes a Potentially Risky Move

Thanks to Microsoft’s Government Security Program (GSP), the software giant has offered the Russian Federal Security Service (FSB) a look at the inside source code of Microsoft Windows Server 2008 R2, Microsoft Office 2010 and Microsoft SQL Server.

This is not the first time the company has taken such a step. Earlier in 2002, Microsoft has shared source code with FSB for Windows XP, Windows 2000 and Windows Server 2000. They have also made similar deals with China in 2003 as well as in 2010.

Who Stands To Benefit

In the wake of the ongoing cyber warfare, GSP’s main benefit of “providing insight and a deeper understanding of Microsoft products“, may easily turn into a great opportunity for discovering security flaws in the system. The program’s restriction states that “governments may read and reference the source code but may not modify it.” This contains a glaring loophole as governments who access the source code may not only view it, but can also influence modifications in the code, although this may be done so indirectly. Powerful DIY source code analysis tools and the managed services offered by different companies are just some of the many possible ways a government has at its disposal to execute this process and take advantage of any source code it has access to.

Taking into consideration all the geopolitical factors on an international scale, if either Russia or China manage to find a security flaw by having access to the source code offered to them by Microsoft for “national security reasons”, there’s very, very little probability that they will go public with it, as the cut-throat advantage from a cyber warfare/cyber intelligence point of view is unquestionable.

Expert analysts seem to agree on this. Although the sharing of source code doesn’t automatically result in the eradication flaws, it may offer vital pieces for the puzzle that a particular country has already started building, putting it in the driver’s seat to find security flaws within Microsoft’s products, for defensive and of course, offensive purposes.

Where Does Microsoft Go From Here

From a business point of view, nothing is more valuable than a government contract. This applies to Microsoft. They cannot afford to turn down a commercial deal with large, rapidly developing nations. But in order for this government contract to ever come to fruition, sometimes a company loses sight of the bigger picture – the geopolitical one, citing commercial gains, or plain simple market sector growth strategies and opportunities.

Microsoft, should not just offer a glance at the source code, but should demand and legally oblige those who have access to it for national security reasons, to share back data on important bugs and potential security flaws, so that it becomes a win-win situation. But can Microsoft make such a deal come into effect? It can legally reserve the right to exclude countries who have been purposely fed insecure source code, and opt not to report it. Maybe Microsoft does know what it is doing, and everyone sincerely hopes that it’s for the best.

How to Reset Internet Protocol (TCP/IP)

What is TCP/IP?

TCP/IP is a protocol which is used for communication over the network by Windows and is one of the most essential components of Windows.  At time this protocol might get corrupt or damaged and since it is a core component you cannot uninstall and reinstall it, but you can repair/rest it. Repair/Reset is done by the NetShell utility. This utility has several tasks and each task can be performed by writing the command netsh followed by the task you want to perform.

Problems caused by corrupt TCP/IP stack

If the TCP/IP stack goes corrupt you may be unable to establish a connection to the server, unable to load a web page, unable to browse and surf the Internet, even though network connection to broadband router or wireless router seems to be OK.If you facing network connectivity issues or are unable to access or connect to Internet or network problem in Windows Vista, Windows 2003 and Windows XP, and all the other troubleshooting has not helped you then you may try resetting the TCP/IP stack. This can be done by running the netsh command. NetShell utility is a command-line scripting interface for the configuring and monitoring of Windows XP, 2003 and Vista networking service.

Steps for Resetting TCP/IP

To reinstall and reset the TCP/IP stack to its original state as same as when the operating system was installed in Windows XP and Windows 2003 use the following command in command prompt shell. It would be good if you run the command prompt with Admin privileges. A log file name must be specified where actions taken by netsh will be recorded on newly created or appended if the file already exists.

Command

1. Start -> Run -> cmdOn Vista and Windows7 operating systems, click on the Start button and type Command, when it gets listed in the bar press ctrl+shift+enter. This combination allows the program to run with Admin privileges. Accept the elevation if prompted,

2. When you get the command prompt open execute the following command:netsh int ip reset c:\log.txt(Specifying the location and name of the log file is optional but if you want to see the details of the command execution then specify the same)

3. Restart the computer.On running this command the following two registry keys gets deleted so that they can be re-written the next time computer starts:

1.SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\

2. SYSTEM\CurrentControlSet\Services\DHCP\Parameters\

Let Microsoft fix it for you

If instead of running this command you want a tool to do all for you, then go to any computer which has a working internet connection and download a “Fixing Utility” from the following link: http://go.microsoft.com/?linkid=9664547. Bring this utility on to your computer and execute it by double clicking it. This Wizard is available on Microsoft and is available in English only.

More about the netsh command

The netsh.exe command is one of the external command’s present in C:\Winnt\System32 directory and is available in the following Microsoft operating systems: Windows 2000, Windows XP, Windows Vista, and Windows 7.

Call Now: +1 833-522-1003
Call Now: +1 833-522-1003
Call Now: +1 833-522-1003