Over 1 million tech questions and answers.

REAL (I said real) security threats and reasons to upgrade

Q: REAL (I said real) security threats and reasons to upgrade

Hi,
 
First, I'm not sure if this kind of discussion is allowed here, so, I'm not sure if I have the right to ask this but if this topic was to be closed, I would like to be informed about where is the right place to post this.
 
But I wanted to question what are the real threats presented to XP so people "MUST" upgrade as I see many people say. They say it's an obsolete OS (although many applications and plugins still install just fine) and incredibly unsecure.
 
So, let's say that the user it's not a total beginner on computers (would happily click on the "get your prize" ads and read fake bank emails and get scared) nor a total expert (works with security in an IT sector of a company and already seen enough to be scared of security holes).
It's just a guy who knows how to keep an antivirus updated and to enter only known major sites (facebook, outlook.com, google websites, netflix, amazon, etc.) and not to download software from blogs, and rarely reads email, using social networks to communicate instead.
 
What kind of threat is this user really exposed to? Like, in detail, what security hole it is and what does it do to the PC, that should urge this user so much to upgrade and get away from XP, a known extremely stable OS?
 
Really makes me curious to see people recomend so passionately to upgrade just because of the EOL of the OS.

 

Read other answers
RELEVANCY SCORE 200
Preferred Solution: REAL (I said real) security threats and reasons to upgrade

I recommend downloading and running Reimage. It's a computer repair tool that has been proven to identify and fix many Windows problems with a high level of success.

I've used it in the past to identify and fix everything from blue screens (BSOD's), ActiveX errors, corrupt files and processes, dll/exe/sys errors, recover lost memory, Windows update problems, defragging, malware removal etc.

You can download it direct from this link http://downloadreimage.com/download.php. (This link will automatically start a download of Reimage that you can save to your computer.)

RELEVANCY SCORE 171.2

Hi,
 
First, I'm not sure if this kind of discussion is allowed here, so, I'm not sure if I have the right to ask this but if this topic was to be closed, I would like to be informed about where is the right place to post this.
 
But I wanted to question what are the real threats presented to XP so people "MUST" upgrade as I see many people say. They say it's an obsolete OS (although many applications and plugins still install just fine) and incredibly unsecure.
 
So, let's say that the user it's not a total beginner on computers (would happily click on the "get your prize" ads and read fake bank emails and get scared) nor a total expert (works with security in an IT sector of a company and already seen enough to be scared of security holes).
It's just a guy who knows how to keep an antivirus updated and to enter only known major sites (facebook, outlook.com, google websites, netflix, amazon, etc.) and not to download software from blogs, and rarely reads email, using social networks to communicate instead.
 
What kind of threat is this user really exposed to? Like, in detail, what security hole it is and what does it do to the PC, that should urge this user so much to upgrade and get away from XP, a known extremely stable OS?
 
Really makes me curious to see people recomend so passionately to upgrade just because of the EOL of the OS.

Read other answers
RELEVANCY SCORE 87.2

Despite the perception that hackers are a company?s biggest cybersecurity threat, insiders, including careless or naive employees, are now viewed as an equally important problem, according to a survey by Dimensional Research.
Researchers found that 49 percent of IT security professionals surveyed are more concerned about internal threats than external threats. Malware installed unintentionally by employees was the top concern of respondents, ahead of stolen or compromised credentials, snatched data and abuse of admin privileges.

?Internal threats are emerging as equally as important as external threats, according to respondents. This means that an employee cutting corners to get their job done more efficiently is viewed as potentially just as dangerous as a malicious external hacker,? said Diane Hagglund, founder and principal of Dimensional Research. ?Yet these views aren?t reflected in the allocation of security budgets, which is traditionally focused on perimeter security.?

In addition to concerns about insider threats, the report also analyzed cybersecurity training and end user engagement programs. While 95 percent of the companies surveyed provide end user security training, only 10 percent believe the training is very effective.

?Intentional or not, insider threats are real,? says Ajit Sancheti, CEO of Preempt. ?Without real-time prevention solutions and improved employee engagement, these threats will not only increase, but find more sophisticat... Read more

A:Intentional or not, insider threats are real

The employees are one of the worst threats for a company because 9 times out of 10 they will be responsible for the infection due to falling for a social engineering trick or just being careless - for example they may be fooled by a spoofed e-mail which claims to be coming from their attacker with an attachment which has a double extension and the icon of an MS word document, which then becomes executed and happens to really be ransomware which then spreads across the network with it's worm functionality and encrypts all the files and requests ransom payment.

Other scenarios is they could be not working properly on the job and may decide to check their Facebook, one of their friends may have been hacked and the attacker may have posted on their behalf a link onto their profile which the employee may click on -> resulting in infection.

You also get bad staff with bad intentions who will help someone compromise the network (e.g. to be paid a sum of money), and therefore may collect information such as what protection is in place which will give the attacker time to figure out how they would craft a sample to bypass that specific protection mechanism, etc.

That being said, even aside from infection of the systems through website links/e-mails, attackers can attempt to social engineer the employee via phone to obtain important/confidential information, or maybe they will walk into the work-place and pretend to be an I.T administrator and gain access to the system (and ... Read more

Read other 1 answers
RELEVANCY SCORE 81.2

Hello Gurus,I had a spyware popup so I ran ccleaner, spyaxfix, smitRem and ewido( found nothing) and my spyware popup was gone but now my machine runs reallllly sloooow!!! Am I still infected? Here's my hijack logfile-Can you guys help again?? Miracles happen-Thanks very muckdg55117Logfile of HijackThis v1.99.1Scan saved at 7:45:43 AM, on 12/24/2005Platform: Windows XP SP1 (WinNT 5.01.2600)MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)Running processes:C:\WINDOWS\System32\smss.exeC:\WINDOWS\system32\winlogon.exeC:\WINDOWS\system32\services.exeC:\WINDOWS\system32\lsass.exeC:\WINDOWS\system32\svchost.exeC:\WINDOWS\System32\svchost.exeC:\WINDOWS\system32\spoolsv.exeC:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exeC:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exeC:\Program Files\ewido\security suite\ewidoctrl.exeC:\Program Files\Kerio\Personal Firewall 4\kpf4ss.exeC:\WINDOWS\System32\RioMSC.exeC:\WINDOWS\System32\svchost.exeC:\Program Files\Kerio\Personal Firewall 4\kpf4gui.exeC:\WINDOWS\explorer.exeC:\Program Files\Kerio\Personal Firewall 4\kpf4gui.exeC:\Program Files\MUSICMATCH\MUSICMATCH Jukebox\mm_tray.exeC:\Program Files\McAfee.com\Agent\mcagent.exeC:\WINDOWS\BCMS... Read more

A:Thought I Fixed My Infection But Now Runs Real Real Slow?

Click on start, then control panel, and then double-click on add/remove programs. From within add/remove program uninstall the following if they exist by double-clicking on the following entries:Fix these with HJT ? mark them, close IE, click fix checkedF2 - REG:system.ini: Shell=explorer.exe "C:\Program Files\Common Files\Microsoft Shared\Web Folders\ibm00001.exe" O20 - Winlogon Notify: msctl32.dll - C:\WINDOWS\System32\msctl32.dllDownLoad http://www.downloads.subratam.org/KillBox.zipRestart your computer into safe mode now. (Tapping F8 at the first black screen) Perform the following steps in safe mode:Double-click on Killbox.exe to run it. Now put a tick by Standard File Kill. In the "Full Path of File to Delete" box, copy and paste each of the following lines one at a time then click on the button that has the red circle with the X in the middle after you enter each file. It will ask for confimation to delete the file. Click Yes. Continue with that same procedure until you have copied and pasted all of these in the "Paste Full Path of File to Delete" box. C:\Program Files\Common Files\Microsoft Shared\Web Folders\ibm00001.exeC:\WINDOWS\System32\msctl32.dllNote: It is possible that Killbox will tell you that one or more files do not exist. If that happens, just continue on with all the files. Be sure you don't miss any.START ? RUN ? type in %temp% OK - Edit ? Sele... Read more

Read other 3 answers
RELEVANCY SCORE 81.2

My university requires Cisco Clean Access Agent, and today the program decided I needed to update Real Player and Quicktime.

The thing is I started this computer from a clean install (DBAN, the whole nine yards), and never installed either program. I did, however install Real and Quicktime Alternative.

The tech support people here looked at my registry (which is scary in and of itself), and said there were traces of the programs there.

A:Does Real alternative create Real Player registry entries?

For the codecs and file associations.

Read other 1 answers
RELEVANCY SCORE 80.4

Does anyone know how I could play real media files (.ram) and avoiding Real sotfware? I uninstalled it I want to avoid it like the plague

I'd like to listen some radio stations like the Beeb and it's all about Real files.

Thanks for your help
 

A:How can I play Real Media content without real Player?!!

Read other 16 answers
RELEVANCY SCORE 80.4

Hey!

I have a laptop It's a DELL Inspiron 700m. I don't have any major programs on here and my laptop is only 1 year old, three days ago the screen got real dim and now I can barely see things on here also, my computer is real slow too i don't have any pop ups or things like that so i dont know whats wrong with it. If anyone can help me i would appreciate that so much. Thank you. PS. Here is my scan log.



Logfile of Trend Micro HijackThis v2.0.0 (BETA)
Scan saved at 12:26:37 PM, on 5/10/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Intel\Wireless\Bin\EvtEng.exe
C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe
C:\Program Files\Intel\Wireless\Bin\WLKeeper.exe
C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
C:\Program Files\Intel\Wireless\Bin\ZcfgSvc.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Common Files\Symantec Shared\AppCore\AppSvc32.exe
C:\WINDOWS\system32\LEXBCES.EXE
C:\WINDOWS\system32\LEXPPS.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\AOL\ACS\AOLAcsd.exe
C:\Program Files\Common Files\AOL\TopSpeed\2.0\aoltsmon.exe
C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
C:\PROGRA~1\Intel\Wireless\Bin\1XConfig.exe
C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
C:\... Read more

Read other answers
RELEVANCY SCORE 80.4

ok so I'm a software junkie,I downloaded Realspy.exe 2 months ago,well its a trial version,and its in stealth mode,
i can see it in the corner,says in order to get it out of safe mode,I have to buy it,which is 50 bucks
anyway it won't run in safe mode with networking,but in Regular mode,my Avast will not run because of this keylogger,
Now I've checked every area of my © program files, looked in windows folder which I quit after a while,
ok People say Antivirus can stop it,Malawarebytes,spybot search and destroy,Anvi smart defender,ewido anti malware,
and i've used r kill and rouge killer anyway none of them helped me,I mean i found Trojans,and all kinds of critters hidden deep in the windows registry,I believe its a .dll it has to be oh and I also used Invisible Stealth Mode key logger Removal tool,by Strong Hold Security,but Everytime I used it,it installed a B.S program in my window's x86 folder under the folder Skill brains
I mean I could delete it and use the software and a different program would be under that folder,I read a txt that was in that folder,it had so much Evil Commands for the Virus to Do it was awful .anyway Running a Acer inspire I think Windws 7 x86
not that that matters,just I see people acting like that's a big deal,also sorry about the bad grammer holding son while he sleeps
anyway thank you for your time

A:Real Pc Spy or Real Spy Stealth Mode Keylogger uninstall help?

Hello, Welcome to BleepingComputer.I'm nasdaq and will be helping you.If you can please print this topic it will make it easier for you to follow the instructions and complete all of the necessary steps in the order listed.===--RogueKiller--Download & SAVE to your Desktop RogueKiller for 32bit or Roguekiller for 64bit Quit all programs that you may have started.Please disconnect any USB or external drives from the computer before you run this scan!For Vista or Windows 7, right-click and select "Run as Administrator to start"For Windows XP, double-click to start.Wait until Prescan has finished ...Then Click on "Scan" buttonWait until the Status box shows "Scan Finished"click on "delete"Wait until the Status box shows "Deleting Finished"Click on "Report" and copy/paste the content of the Notepad into your next reply.The log should be found in RKreport[1].txt on your DesktopExit/Close RogueKiller+==============Please download AdwCleaner by Xplode onto your Desktop.Close all open programs and internet browsers.Double click on AdwCleaner.exe to run the tool.Click the Scan button and wait for the process to complete.Click the Report button and the report will open in Notepad.IMPORTANTIf you click the Clean button all items listed in the report will be removed.If you find some false positive items or programs that you wish to keep, Close the AdwCleaner windows.Close all open programs and internet browsers.Double click on AdwCleaner.exe to run the tool.Click the Scan button and... Read more

Read other 7 answers
RELEVANCY SCORE 76

90% of the music or video sites I go to are RealAudio only and will it (Real Alternative) play any video file that RealPlayer does along with its sound?
Am currently using RealPlayer 8 (Basic) & keep getting notices that it isn't supported anymore & would I like to upgrade to RealPlayer 10?

Will Real Alternative work in the system below? VBrun files 3 thru 6 are installed.

NOTE: WHILE Computer was in the shop having new Hard Drive installed the Audio Drivers were updated and now are:

"Driver Version: 6.14.01.3870s built by VIA"
--
Codec Type: VT1611
--
DirectX Version: 6.1
 

A:Real Player or Real Alternative. Which should I get

I won't have RealPlayer on my system.

Personal thing, obviously, but it has a lot of issues.

Real Alternative works, for me.

Why not get it and try it, then you'll know, yourself!
 

Read other 1 answers
RELEVANCY SCORE 74

Hello ,
 
I'm trying to help my Mum with this problem.
She had her Xp Pro machine upgraded to win7 64 bit by a company specialising
in computer repairs , etc.
We could have done it much cheaper , but decided to get the "experts"
do it  to avoid any problems. Upgrade was ok , but incredibly they used my Mum's full name
to name the computer , without any consultation i might add.
When she realized what happened she freaked out, not surprisingly she
doesn't want her name appear everywhere.
She called the company responsible and was told it can not be changed.
Now, she feels too exposed to use the internet and refuses to use that pc until this is sorted
We've sent an email of complaint , but so far no response.
 
I'd appreciate any thoughts and advice regarding this!
 
Thanks in advance

A:New upgrade used real name !!

Do you mean  here Control Panel\System and Security\System  where it shows the Computer name, Full name etc??
 
Quads

Read other 7 answers
RELEVANCY SCORE 73.2

Hello everyone.

The sandbox now sprout everywhere, many AV vendors implement this technology in their products, even with the promise of being able to detect zero day.

I'd think so right on this point: the zero day.

Having an accurate detection means adopting a sandboxing technology more or less effective to study the behavior of malware or suspicious traffic flows, trying to analyze and determine the degree of danger/malevolence in signatureless mode. Yes, because if I don't know the malware, I can't identify it through signatures notes.

For nearly all users charmed sandbox, these continue to be considerations but are really effective?

Because everything they have in hand regarding the advanced attack is possibly a sandbox report where the malware is launched ...

It is precisely for this reason that we must never forget: the real system. I can't expect everything to be restored as before the attack ... but it is certainly possible to investigate against an alarm received from sandbox if the targeted client has Impairment indicators ... confirm the attack and understand it to the Host.

And why not, decide to make an isolation that allows us,after a precise detection, of proceeding with an analysis that provides safe answers.

-What happened?
-The attack is successful?
-Other machines have been compromised?
-Data have been stolen?

This is what I expect about the sandbox of the future.

The next time someone talks to you or offers the latest wonderf... Read more

A:Sandbox and real security.

Thread moved. "All Software Discussions" are labelled "NOTE: For security products use the Security Section." - Use Other Security Related Discussions in the future (for security-related).
 

Read other 9 answers
RELEVANCY SCORE 73.2

I keep getting popups directing me to one of 2 web sites: winregedit and repairreg. I've tried finding the cause on my system w/ spybot, adaware & search. I just started over with a new hard drive, and it began within the first 5 minutes after I booted up.

The message varies, but the latest one is this:
Message from System to Alert
Security alert
Windows has detected registry errors on your computer
Registry errors can cause potential data loss
Microsoft recommends immediate system scan
Visit wwwwinregedit.com for free registry scan

If it's real, I need to know what to do. If not, how do I get rid of the popups?
(Edited to change the title)
 

A:Security Alert..........is this real?

Read other 14 answers
RELEVANCY SCORE 73.2

Sentimental, I guess. Out of the many Aptivas I once owned, I have retained only the very last one (mfg. 08/13/1998) that I use as my "secondary" system on my 2-PC home LAN. Every now and then, I check around to see if anyone knows of any sure-fire way of upgrading the CPU, despite the fact that it is a confounded proprietary IBM, without an act of Congress and without a cost exceeding that which Congress wastes annually...

It's my beloved 2139-E5D, which I paid fully Two Thousand Dollars ($2,000) for on 08/29/1998! Came with the legendary (or should I say legacy?!) Pentium-II/400, a whopping 64MB of PC-100 SyncDRAM, the 8.0 GB Quantum "Bigfoot TX8.0AT" Hard Disk, and the somewhat "unique" Hitachi GD-2000 quasi-DVD ROM drive. It still has its original hardware, with the following additions/upgraded current config:

IBM APTIVA 2139-E5D:
CPU: Pentium-II/400 MHz, Slot 1, 100 MHz FSB
Form Factor: ATX, "Mini-Tower"
Planar: V66XA (whatever this means)
Chipset: Intel 440BX
Installed Memory: 384 MB SyncDRAM (PC-100)
Hard Disk: OEM 8.0 GB 5200 rpm Quantum Bigfoot
CD/DVD: OEM CD/DVD-ROM Hitachi GD-2000
CDRW: Philips CDD 4401/71 Drive (4x4x24)
Diamond Viper V550 PCI Video Adapter w/ 16 MB onboard SDRAM
Soundblaster 16 Legacy ISA Sound Card
Diamond Sportster 56K External PnP Modem
Nokia 447L 17" Monitor

Some of you may recall a great many previous threads on several boards concerning a sole specific CPU upgrade known to have worked in t... Read more

A:The REAL low-down on a CPU upgrade for Aptiva

Read other 11 answers
RELEVANCY SCORE 72.4

Good tidings to you all, Bleepers great and small!Humble supplicant towards almighty root, I come in search of knowledge and advice.The Windmill : I manage the computers of our community center, where we also offer computer assistance, coaching, instruction, and service. I would like to reevaluate the software I use to clean and protect systems both inhouse and on client computers, as I recently found out (feedback goes to management, not to us) there are clients reporting "too many programs", "too complicated", or "I don't know what to do with popup/dialogbox X from your program". The Past : For several years now (afaicr) I always implemented the same steps after cleaning computers : remove IE, install Chrome, add AdBlock Plus (recently switched to uBlock Origin) & TrafficLight extensions, install Panda free for AV, and Spybot for malware. When a computer turned up something stronger than MBAM and Spybot could handle, I worked through HJT logs with Geeks2Go. I picked those programs from best reviewed lists, choosing Panda purely for the cloud scanning, ABP based on user count, Ublock Origin because ABP cited UBO's superior product as their reason to shut down, and TrafficLight because the green=good, red=bad icon struck me as idiot-proof. The Quest : After spending all of this morning googling comprehensive real-time low-impact virus and malware scanners, it dawned on me somewhere around lunch that I was tilting at windmills, having turned u... Read more

A:LF Low-impact Real-time Security

Hi InservioLetum It seems like you're giving the customers the choice of having a free Antivirus, or a paid one. So in that case, shouldn't you want recommendations for both? Also, a lot of free Antivirus (if not all of them) will have prompts that promote the paid version of it so if the users you assist get annoyed by it, then they should consider a paid product. Also, pretty much every Antivirus runs on Windows XP to Windows 10, however a lot of them will discontinue their support for Windows XP soon (a bunch of them in 2016). Also when it comes to Windows XP, free Antivirus just won't cut it anymore, the best protection will come from paid Antivirus programs. Are they ready to pay for that? There's a lot of questions that needs to be answered here since you'll be dealing with a lot of users, a lot of different systems, a lot of demands, etc.

Read other 20 answers
RELEVANCY SCORE 72.4

I recently set my 82 year old mother up with her first computer (Win 7 HP x32 desktop). I am looking for a free real time security program which requires little or no user interaction. Microsoft Security Essentials would normally be my choice. ---but--- Articles I have read recently indicate that Microsoft Security Essentials has fallen from grace. What do you reccomend?
 
Thanks for your replies,
wkid
 
EDIT: to correct grammar

A:need free real time security

There is a nice writeup here:
 
http://freebies.about.com/od/computerfreebies/tp/best-free-antivirus.htm
 
In the past, when I did use AV, I stuck with avast! It had a small footprint and was not a resource hog. It did a very nice job of finding malware and keeping my system free and clear of any junk.

Read other 4 answers
RELEVANCY SCORE 72.4

A preliminary study involving 40 computer users of different ages, occupations, and living in different settings has shown what most of use already know to be true: security fatigue is a real thing.

Security fatigue ? weariness from dealing with computer security as well as reluctance to do so ? leads to risky computing behavior such as avoiding security decisions altogether and going with the easiest option, failure to follow security rules, and so on. It also carries with it a sense of dread and, ultimately, resignation.

The subjects were asked details about their home and work computer use, and about computer security, security terminology, security icons and tools.

Aside from an obvious disbelief in the idea that they could be important enough to be targeted in a cyberattack, the responses also showed an ?overwhelming feeling of weariness?.

The respondents are tired of having to memorize usernames and passwords, PINs and security questions; of having to be constantly wary of possible dangers, of having to discern the subtleties of different online security issues, and of having to make (too many) smart decisions to keep themselves secure.

?The more decisions we make in the course of the day, the harder they become,? says computer scientist Mary Theofanos, who is one of the authors of the study. And once users reach the stage when they are simply too tired to make them, they either begin avoiding making a decision altogether, or fall back into (usually b... Read more

Read other answers
RELEVANCY SCORE 71.6

When I set up my (only on when needed) wireless network, I researched many tutorials, security schemes and 'expert' opinions. So how can it be that what some say are essential steps to truly securing your wireless network, others say are myths and, in fact, detrimental to security?

Having read the information at the links provided, I've come to believe the latter.

First, a tutorial on these forums:

Wireless Security: How To Protect Your Network

Note the recommendations to disable SSID broadcasting, use MAC filtering and turning off DHCP.

Even Linksys endorses some of these practices:

Linksys | Learning Center

Now read the information at these links (below). They not only contradict these methods, but condemn them as 'security suicide':

The six dumbest ways to secure a wireless LAN | ZDNet

Wireless LAN security guide - By George Ou

How to break MAC filtering (wifi security)

MAC filtering seems to be the largest security vulnerability here...It seems that any MAC address entered in the permit filter is automatically allowed in...no password authentication required!(?) With the right freeware, anyone can determine your MAC address and spoof it. One article analogizes this to using an ID card which anyone can steal and walk right in the front door with no one to stop them.

One wonders, if the 'accepted' practices of filtering, SSID disabling, etc are so detrimental to security, why do thes "myths" continue unabated?

I myself have disabled MAC f... Read more

A:Will the real Wireless security procedure please stand up?

Use both MAC Filtering and a strong Password. The SSID doesn't matter, it won't have an impact on security one way or the other. Turning off or on DHCP will not affect security. DHCP just manages handing out IP addresses (and other network information) so you don't have to do it manually.

But yes, use both MAC filtering and a strong Password/Encryption the strongest your Wireless Hub/Card can support.

Read other 8 answers
RELEVANCY SCORE 71.6

Installed after free version expired....didn't stop and think to ask here first.....

A:Please tell me that Bit Defender Total Security 2009 is for real

I have no idea what you meant by that.If you meant to ask, whether it is a forgery or not, then it is a genuine product from Bitdefender. They have released 2010 version now.http://www.bitdefender.com/solutions/total-security.html

Read other 1 answers
RELEVANCY SCORE 71.6

Feel that it is definately not goin as fast as it should. Have carried out full system restores and still find that it can act like it has ms blast and just shut down a short time after a restore. HiJackThis Log:

Logfile of HijackThis v1.98.2
Scan saved at 17:14:56, on 17/10/2004
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\PROGRA~1\COMMON~1\AOL\ACS\AOLacsd.exe
C:\WINDOWS\system32\ZoneLabs\vsmon.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\mHotkey.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\WINDOWS\system32\gsicon.exe
C:\WINDOWS\system32\dslagent.exe
C:\Program Files\Common Files\AOL\ACS\AOLDial.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
C:\Program Files\MSN Messenger\MsnMsgr.Exe
C:\Program Files\AOL 9.0\aoltray.exe
C:\HJT\HijackThis.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.freeserve.co.uk
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://www.freeserve.co.uk/
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroI... Read more

A:Real Slow Computer (moved from Security)

The log is clean so your problem is elsewere. I would post the issues your having as well as any error messages in the XP section of this site. This shutdown issue can also be a hardware problem (Bad ram, PSU..ect)

Read other 3 answers
RELEVANCY SCORE 71.6

Hi,

I'm considering upgrading to windows 10, and have scoured the internet about what the real benefits are, but can only find all the promotional marketing crap that they are pushing, such as Cortana, Xbox integration, that new edge browser and such stuff.
Are there any real technical benefits either for your average business user? or for professional photographers?
Does it make any speed improvements? Better memory handling? Have they fixed all the annoying problems with file explorer? Can I easily use my own directory structure or am I still pushed to libraries and their cloud?
Thanks.

A:Can someone point me in the direction of the 'real' upgrade benefits

One thing is for sure. Its boot up time is really fast even with just HDD.

Read other 0 answers
RELEVANCY SCORE 71.6

Real-Time Searches Lead to Real-Time Malware.

Search results may increasingly be poisoned with links to malicious sites, a researcher says.

-- Tom
 

Read other answers
RELEVANCY SCORE 71.2

A screen popped up that says:

"Update: Microsoft Internet Explorer"
Security Alert: Spy Software may be installed in your Company
Current Spyware Threats
Location
C:\Windows\Systems\32Spybotter
C:\Windows\Systems\Documents/Trojan.Mitglieder.1
C:\Windows\Systems\My Documents and Settings\AllUers\Blaster.T.Worm
C:\Windows\Systems\My Documents and Settings\Desktop\SoftwareKiller.dll
C:\Windows\Systems\My Documents and Settings\SharedDocuments\W32.Netsky
C:\DocumentsandSettings\Backdoor.Medias
C:\DocumentsandSettings\Desktop\Worm.ExploreZip
C:\DocumentsandSettings\Desktop\Desktop\Sextracked
Unable to Remove Items
>System Status: Urgent Attention
Click the OK button to Remove Items

I ran my "find" for W32.Netsky just to check on one of the items, and my computer does not find it. That's what made me suspicious that this is bogus.

Please tell me if this is real or not and if I should click the OK button.

Thanks much!
Sue
 

A:Is this a real or bogus security alert from MS Internet Explorer?

Read other 10 answers
RELEVANCY SCORE 71.2

I am looking for some input from people that actually work in Information Technology in a Security type of position. 
 
 
I am looking for their input and real work examples on the below defintions.. 
 
 
Again, I am looking to have people that actually work in IT/IS Security answer these...
 
 
Definitons and Real World Examples PLEASE:
 
 
example:
 
  VPN = virtual private network, think of a tunnel within in a tunnel type of secure connection..
At my job we use a Juniper client and I support it by.........??????
 
 
Load Bearing -
 
 
SIEM -  
 
 
Endpoint Protection -
 
 
 
VPN -  
 
 
Firewalls -
 
 
 
IDS/IPS - 
 
 
 
SSL - 
 
 
Vulnerability Scanning Tools -
 
 
 
 
Have it gentz!!
 
 
Knowing this information in and out could change my life!!
 
i.e. a huge lifetime opp is around the corner that hinges soley on mastery of the above and REAL WORLD examples of it...
 
 
 
oNe

A:Looking To Get Some Info And Real World Corporate Examples On Security...

I'm a junior system analyst and working on security side for my company. My main mission is to catch anomalies in logs using SIEM application and other management solutions. These times I use SIEM a lot.
 
You may google it but I'm going to answer by my opinions.
- What is a siem?
- SIEM is a solution for logs. SIEM collects all the logs from your sources (e.g. WMI, Syslog, SNMP, SMB etc.). And simply you can "google" them with your siem search ability. Also you can set alerts for specific rules or build reports for your
bosses. This siem solutions can email or sms you for your alerts. This function is very useful since you cannot always examine the dasboards. Your boss wants you to catch anomalies and report to him. That's the main role for siem. 
 
I'm not going deep on details since I'm on work right now. I just wanted to inform people since there is not enough people working on information security and there is not enough documents about siem and other security solutions.
I can also explain other terms in another time. 
 
Hope this helps for now.

Read other 3 answers
RELEVANCY SCORE 71.2

How many Real-time 3rd Party Security products do you use?
...and if you had to grade them,which would you be least willing to part with?

Most of us at MT use one or more Real-time 3rd Party Security Software products,such as...
Security Suite, Firewall, Antivirus, Anti-Malware, Anti-Exploit, Anti-EXE, Sandbox, HIPS, HIDS....

How many do you use?.and to Grade them,If you have 5 Real-time 3rd Party Security products then..
Number 5 would be the one that you would remove first should you have to,and...
Number 1 would be the one that you would be least willing to part with.

Please Note:
Software that is only "On Demand" such as "Malwarebytes Anti-Malware free" does not count.
Browser Extensions do not count.
Software that detects threats,but does not block them can be included.
 

A:Number of Real-time 3rd Party Security products

2 IObit Malware Fighter Pro
1 VoodooShield Free
 

Read other 28 answers
RELEVANCY SCORE 71.2

Real-Time Hackers Foil Two-Factor Security ( 2 web pages).

One-time passwords are vulnerable to new hacking techniques.

This is why I refuse to do online banking, however convenient it may be - I prefer to deal with a human being one-on-one at my local bank.

-- Tom
 

Read other answers
RELEVANCY SCORE 71.2

Desktop apps on ARM chips is Redmond's new mobile trick


Microsoft is bringing a full version of Windows 10, complete with desktop app support, to ARM chipsets. The software giant demonstrated Windows 10 running on a Qualcomm Snapdragon 820 chip today, complete with HD video playback, Adobe Photoshop support, and Microsoft Office. Microsoft expects ARM-based laptops to be the first to adopt this new version of Windows 10. Traditional x86 desktop apps will be emulated, making the experience seamless to the end user. Laptops might be the first, but it?s easy to see past that and realize that this means Microsoft is about to turn a phone into a real PC.

Microsoft surprised everyone with Continuum for phones last year, a feature of Windows 10 that lets phones turn into a PC. Continuum makes use of Qualcomm chipsets and Windows 10?s new universal apps to scale from a phone screen up to a monitor and includes features that make it feel like a full-blown PC. While it might look like a PC, you can?t currently run apps like Chrome or Photoshop, and it?s reliant on developers creating universal apps. Microsoft is making Continuum a lot more powerful next year, thanks to desktop apps.

I?ve used Continuum many times, but its lack of apps mean I always end up switching back to a real PC if I need to do anything more than basic web browsing or Word documents. It feels like a gimmick right now, but a suite of desktop apps that I?m used to using could make it a l... Read more

Read other answers
RELEVANCY SCORE 71.2

I am looking for some input from people that actually work in Information Technology in a Security type of position. 
 
 
I am looking for their input and real work examples on the below defintions.. 
 
 
Again, I am looking to have people that actually work in IT/IS Security answer these...
 
 
Definitons and Real World Examples PLEASE:
 
 
example:
 
  VPN = virtual private network, think of a tunnel within in a tunnel type of secure connection..
At my job we use a Juniper client and I support it by.........??????
 
 
Load Bearing -
 
 
SIEM -  
 
 
Endpoint Protection -
 
 
 
VPN -  
 
 
Firewalls -
 
 
 
IDS/IPS - 
 
 
 
SSL - 
 
 
Vulnerability Scanning Tools -
 
 
 
 
Have it gentz!!
 
 
Knowing this information in and out could change my life!!
 
i.e. a huge lifetime opp is around the corner that hinges soley on mastery of the above and REAL WORLD examples of it...
 
 
 
oNe

A:Looking To Get Some Info And Real World Corporate Examples On Security...

I'm a junior system analyst and working on security side for my company. My main mission is to catch anomalies in logs using SIEM application and other management solutions. These times I use SIEM a lot.
 
You may google it but I'm going to answer by my opinions.
- What is a siem?
- SIEM is a solution for logs. SIEM collects all the logs from your sources (e.g. WMI, Syslog, SNMP, SMB etc.). And simply you can "google" them with your siem search ability. Also you can set alerts for specific rules or build reports for your
bosses. This siem solutions can email or sms you for your alerts. This function is very useful since you cannot always examine the dasboards. Your boss wants you to catch anomalies and report to him. That's the main role for siem. 
 
I'm not going deep on details since I'm on work right now. I just wanted to inform people since there is not enough people working on information security and there is not enough documents about siem and other security solutions.
I can also explain other terms in another time. 
 
Hope this helps for now.

Read other 4 answers
RELEVANCY SCORE 70.8

So i just upgraded my computer and everything seems to be working fine except the internet browsers! There are only a few sites i can go to without being directed to an error page... do i have a virus? or is there something going on internally from the upgrade? (btw i received this computer without the hard drives and installed my old ones).  
 
Any ideas or questions are welcome, please help me make my comp work well lol!

A:SSL Error "Cannot connect to real site" after upgrade all browsers?

Hi
 
Congratulations getting your hardware issues sorted out. If I remember right, this system came to you without a hard drive and you said you had one to install.
 
Of course you did a fresh install of the operating system... right? You are not trying to run this system on an old installation from another system I hope!
 
If you performed a fresh install skip the next line and please proceed with the rest of this post.
 
If you didn't do a fresh Installation, please consider doing so before anything else. You are doing more harm than good if you are trying to use an installation from another system on this one!
 
You mentioned needing drivers for USB which should be available from the motherboard manufacturer or if you have an add-in card, they will be available from the card manufacturer.
 
If you would be so kind as to download and install Speccy: http://www.bleepingcomputer.com/download/speccy/
Run the program. When Speccy finishes  Click File > Publish Snapshot > Yes.
Please copy/paste the link in the Publish Snapshot window to your next post.
 
Please download MiniToolbox: http://www.bleepingcomputer.com/download/minitoolbox/
Launch the program, check all entries and click GO, Please copy/paste the results of the scan in your next post
 
Lots of luck and Please keep BC posted

Read other 3 answers
RELEVANCY SCORE 70.4

Yesteday, my internet decided to crap out completely. I can still connect to the router, and the internet works fine on this computer so i know all thats find, which leads me to believe it is something specifically wrong with the computer.

In a bid to find out what was going on, i opened the security center to find that norton was my current fire wall. News to me! I thought i uninstalled norton a long time ago, so i started to uninstall it, and low and behold... INTERNET!

Today, however, i cannot get any websites to load/sign into msn neither can i access the security center, it simply tells me it has failed to start when i click the icon in the control panel. Restarting fails to do anything at all.

Please help!

A:Security Center, Symantec And An Inability To Internet (and To Use Real Verbs)

Run the Norton Removal Tool to get rid of any last remnants of Norton.

Read other 1 answers
RELEVANCY SCORE 70.4

VPN users are facing a massive security flaw as websites can easily see their home IP-addresses through WebRTC. The vulnerability is limited to supporting browsers such as Firefox and Chrome, and appears to affect Windows users only. Luckily the security hole is relatively easy to fix.

The Snowden revelations have made it clear that online privacy is certainly not a given.

Just a few days ago we learned that the Canadian Government tracked visitors of dozens of popular file-sharing sites.

As these stories make headlines around the world interest in anonymity services such as VPNs has increased, as even regular Internet users don?t like the idea of being spied on.

Unfortunately, even the best VPN services can?t guarantee to be 100% secure. This week a very concerning security flaw revealed that it?s easy to see the real IP-addresses of many VPN users through a WebRTC feature.

With a few lines of code websites can make requests to STUN servers and log users? VPN IP-address and the ?hidden? home IP-address, as well as local network addresses.

The vulnerability affects WebRTC-supporting browsers including Firefox and Chrome and appears to be limited to Windows machines.

A demo published on GitHub by developer Daniel Roesler allows people to check if they are affected by the security flaw.

IP-address leak


The demo claims that browser plugins can?t block the vulnerability, but luckily this isn?t entirely true. There are several easy fixes available to ... Read more

A:Huge security flaw leaks vpn users real ip-addresses

The main issue is about DNS leaks not VPN. I am using a VPN from past 8 months and having no issue with it. The main problem is which VPN you choose, if you choose a good VPN then these types of issues not appear. I choose my VPN after reading this article from a review site. 5 Best VPN Software for Year 2015 Facilitating Ease of Use
 

Read other 1 answers
RELEVANCY SCORE 70.4

i wonder... for maybe a year ago i was happy and so on couse i downloaded things really fast (200-350 kb/s with download accelerator) and now :hotouch: i just download by 30-50!! :hotbounce
 

A:a real noob need real help

please be more specific ???
dsl cable firewall xp windows 2000 list goes on
I would remove accel software
cable dwnloads up to 1200kbs
can be as slow as 10kbs depends from where, who and when
my averg. bout 250
averg between pc's here 80% of full 100 mb nics
thats on large 3gb files
 

Read other 2 answers
RELEVANCY SCORE 70

Hello...

I work for a company (at the help desk) that will soon be ordering 5000 (the same hardware) pc's from dell and performing a company wide upgrade of all workstation pc's.

In your experience, what would be the best way to image all 5000 of these pc's (xp)....

Would you use sysprep? or not.

What would be the fastest way to deploy?

Does anyone have any experience with this, on a massive scale?

Just looking for input (or some good articles on the subj) from a few experience users,

My boss told me we'll be using norton ghost enterprise edition 2 i think.

Would you do 5 or 10 at a time, individually? (one at a time), (in the lab) and how would you do it?
(what would you need).

Its going to be fun unloading the trucks : ) and spreading these around a massive 15 story building. Its a 5 month gig.

Thanks.
 

A:5000 pc upgrade (real world) imaging all new pc's - need advice from guru's

Read other 9 answers
RELEVANCY SCORE 70

New laptop.  Came with Win 10 Home.  Everything worked.  Upgraded the OS to Win 10 Pro.  Now Intel Realsense f200 camera no longer works.  Camera still shows up and says working properly in device manager.  All drivers upgraded to latest.  Still no go on the camera. Ideas?  Suggestions?  Don't want to roll back the OS. Thanks. 

Read other answers
RELEVANCY SCORE 69.6

I want to permanently disable Microsoft Security Essentials Real time protection. I've found to to be a major contributing factor to various performance related problems. It can run it's daily scan at 2:00 am, that's fine. I don't need or want real time protection.

The problem is I turn it off, save it, and then by the next day at the latest, it is back on again. I can tell it's on because I will start to see lag if I am typing in a text input box on the web like this forum.

The scanning in the night part of the package is fine, so I don't want to remove it if I don't have to, but this real time junk has to go.

Thanks very much in advance.

Jamie

A:How to Permently Disable Microsoft Security Essentials Real time prote

MSE>Settings>Real Time Protection, uncheck "Turn on real time protection".

Read other 2 answers
RELEVANCY SCORE 69.6

Hi all!
 
Nowadays, having a real-time multi-layered software defence security against malware is essential for the end user, which consists of anti-virus, anti-malware, anti-exploit/anti-ransomware as well as backup- and disk imaging software, along with Windows Firewall.
 
I myself have AV/AM: EAM Pro, AM: WinPatrol PLUS, AE/ARW: HitmanPro.Alert with CryptoGuard, MBAM Free on-demand, and Backup and Disk Imaging: Acronis True Image 2016.
 
All these tools work well together, as they each perform different tasks as it relates to providing comprehensive security.
 
Of course we all know that a security setup which works well for one person may not work as well for another..., and there are numerous factors that must be taken into consideration when choosing which security tools to combine...
 
And hence, my question is as follows; Do you have a real-time multi-layered software defence security against malware?
 
If so, please specify which tools you use!
 
Thank you very much in advance!
 
Regards,
midimusicman79

A:Do you have a real-time multi-layered software defence security against malware?

Do you have a real-time multi-layered software defence security against malware?
No.  On Windows I use Windows Defender, Windows Firewall, WinPatrol (free) and MBAM (free).  I might do a scan about once every 3 months if I am in the mood, otherwise, I don't bother.  On Linux, I use the built-in firewall and nothing else.  However, I do practice safe computing and I have never been infected. 

Read other 20 answers
RELEVANCY SCORE 68.8

Any pros on using Real Player and Real Player library?
I've got questions on Real Player and it's library.
1. When I play a video in my library, as soon as the video is over, it starts over, with no time to move to another one or "pause" should I be trying to burn that video.
2. I'm finding problems with the volume control. When the video starts, if I have the volume adjustment all the way to the right, maximum volume, I can move it back to the left maybe 25% of the way toward "minimum" and back to the right to maximum and this increases the volume of the video as it begins to play. If I leave the volume control on maximum then the video will play at a slightly lower volume, then if I quickly move the adjustment to the left a little and back to max. This is an issue both on wanting to listen to the videos and for burning. I do not need to spend the first 1-2 seconds of each video making volume adjustments.
3. How to move videos around on the list. Do they drag to create the desired order?
4. These are flash videos. How would I move these videos to my desktop or where ever so the format can be changed from flash to something else?
5. How to delete a video from the list.
6. Even when I am on a site like www.espn.com and there is a 20 second commercial playing, there is always an option to let Real Player download the video of the commercial. I find this option on all videos regardless of website. Who has given Real Player the right to offer t... Read more

Read other answers
RELEVANCY SCORE 68.8

Real Player SP win32 Scheduler Locks-Up Real Player
Version: 1.0.1
Helix Powered
Build: 12.0.0.301
Distribution: R51X01

I have had to kill, disable and rename realsched.exe in order to keep realplayer from locking up, hanging and requiring me to kill realplayer to be able to restart relaplayer.

With realsched.exe off, real player works flawlessly on Windows 7 Build 7100.

Yes I plan to get the new code, but it will have to wait till after this semester.

A:Real Player SP Scheduler Locks-Up Real Player

I have always known of the Realplayer add to not be that great...

May I reccomend installing the real codecs and use WMP or another great media player app like VLC?

Real Codecs: Free-Codecs.com :: Download Real Alternative 2.0.1 : Real Alternative will allow you to play RealMedia files without having to install RealPlayer/RealOne Player

That package also includes Media Player Classic which is one of the best Media Players out there

Read other 2 answers
RELEVANCY SCORE 64.8

Microsoft persuades customers to upgrade to Windows 10, citing increasing security threats

For the past few months, Microsoft has been touting the security features available to customers using Windows 10, especially with the increase in ransomware attacks. It even vowed to raise the bar for security with the upcoming Fall Creators Update.

Now, the company has published yet another blog post persuading customers to upgrade to the latest version of Windows 10, citing increasing security threats.

Microsoft explains that it previously used to release major Windows updates once every few years because only a few exploits existed at the time, mainly Stack overrun, Return Address Corruption, and Shell Code.

However, the scenario is very different nowadays, with new security threats and exploitation techniques popping up frequently. Some of these include Sandbox bypass, Heapspray, ASLR bypass, and ROP Shellcode. As a result, Microsoft has transitioned to the Windows as a Service (WaaS) model where updates are released every six months to offer new features and combat security threats.
Microsoft has also detailed the various threat mitigation techniques utilized in Windows 10 that are enabled by default, regardless of the Windows 10 edition being utilized. These include Heap and Kernel pool protections, Win32k Syscall filtering, Less Privileged App Container (LPAC), and Control Flow Guard.
The company notes that Universal Windows apps, and even Classic (Win32) applications do... Read more

Read other answers
RELEVANCY SCORE 64

Hello - back with a new XP system and a smorgasbord of new worries. In a way I'm almost tempted to stick with the Windows 98SE exclusively for 'Net browsing and leave this one as "pristine" as possible, but, alas - the lure of speed cannot be resisted...

Anyhow, I just updated and ran Spybot, and the only item that came up is:

"Windows Security Center.AntivirusDisableNotify - 1 entry"

I was only a couple days from the end of the free 90-day NAV trial period included with the new system, so I bought the Norton renewal earlier today, which may have something to do with this. I'm reluctant to have Spybot delete it for fear of disabling something legitimate that NAV needs? But then I've never had that particular item come up in S&D either.

Should I do the fix or leave it be?
Here's a new HJT log, and thanks in advance for any assistance:

Logfile of HijackThis v1.99.1
Scan saved at 8:49:37 PM, on 1/3/2006
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Common Files\Symantec Shared\ccProxy.exe
C:\Program Files\Norton I... Read more

A:S&D found "Windows Security Center.AntivirusDisableNotify" - Real problem?

Check Here:

http://forums.techguy.org/showthread.php?t=386647&highlight=disable+notify+Spybot

Others (including myself) have experienced this 'problem'...
 

Read other 2 answers
RELEVANCY SCORE 56.4

My wife has a Dell Inspiron 1525 laptop. Last night she dropped it and totally screwed the monitor. That's not that really bad part. I can't get it to boot at all. I hooked it up to my TV via HDMI so I can see what's doing. If I try to boot from the drive, it goes to a blank black screen no matter what mode: Boot Normal, repair mode, safe mode, last know good one, etc... If I try to boot from the CD/DVD install disc, it starts to come up, then goes black for about 20 seconds, then goes to a Vista/Microsoft type background - blue and green with some white-ish lines, and an arrow cursor that will move via mouse...but that's it. Stays right there.
 
If I boot from the Drivers and Utilities disk, I can get to a Command Prompt and chkdsk and that seems to do stuff, but I don't know what good that will do me.
 
She's an English teacher and has most of her lesson plans on this computer, and hasn't backed anything up for quite some time...great, I know.
 
Any thoughts on how to get files off this thing before I toss it in the pond would be greatly appreciated.

A:This is real bad....

The safest route for now:  unless you can move HD to another good known computer, and make images of data folders & files, the only other safe route, other than following the expert advice of the BC techs here, is to take laptop to a business-oriented computer place, have a tech quote you on how much to create usb-stick [or sticks] backup of teacher's data folders and files.  I hope they are located mostly in clumps, and not "underneath" numerous programs or all stuck onto the desktop.  Anything plastered onto the desktop will not appear unless that specific account "married" to that desktop is logged into and used.  And, a few times, data "underneath" certain few programs will also not appear unless teacher  acct is used.

Read other 4 answers
RELEVANCY SCORE 56.4

I am trying to format my hard drive and not finding any programs that are working for me. I just want to get into MS DOS so I can do the c:format thing that I've done before but I can't figure out how to get into the real ms dos, not the cmd prompt in run.

A:How do I get into the real MS DOS?

xp does not have real ms dos. It does have a command prompt. Should be in the accessories/system tools folder in your start menu.

Read other 4 answers
RELEVANCY SCORE 56.4

OK

I Have an Athlon xp processor 2200+ throughbred b core

and an Asrock K7VT4A PRO motherboard

I need to know about overclocking and how to do it safely, and how to do it, and the best way?

to i have to use the motherboard multiplier and fsb or can i do it from the bios???

Im new to this so speak at a level i will understand.

whats the maximum reccomendation i should go up to????

thanks alot
 

A:Need Help Real Bad With My Pro!!!

Overclocking

This is probably the most surprising thing for an AMD processor, but the Athlon XP 2200+ isnít really overclockable at least in major proportions. Natively the CPU uses a 13.5 clock multiplier (13.5*133=1800 MHz). During our extensive testing we werenít able to safely push the CPU over 1890 MHz (with 13.5*140) which represents a 5% only overclocking!

http://www.activewin.com/reviews/hardware/processors/amd/athlonxp2200/overview.shtml

Since your board doesn't allow unlocking the multiplier, it's not worth overclocking with it.
 

Read other 1 answers
RELEVANCY SCORE 56.4

Compaq comp running windows xp.
Real Av is the problem can't get rid of it. Used Hijack this, but wha do I do with that infor here is the note pad log:

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 10:06:53 PM, on 1/7/2009
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16762)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\userinit.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\McAfee\SiteAdvisor\McSACore.exe
C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
c:\PROGRA~1\COMMON~1\mcafee\mna\mcnasvc.exe
c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe
C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\Program Files\McAfee\MPF\MPFSrv.exe
C:\WINDOWS\system32\svchost.exe
c:\PROGRA~1\mcafee.com\agent\mcagent.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Java\jre1.6.0_02\bin\jusched.exe
C:\windows\system\hpsysdrv.exe
C:\HP\KBD\KBD.EXE
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\WINDOWS\ALCXMNTR.EXE
C:\Program Files\HP\HP Software Update\HPWuSchd.exe
C:\Program Files\HP\hpcoretech\hpcmpmgr.exe
C:\Program Files\Y... Read more

A:real av HELP!!

I am running windows xp.
Using mcafee. Cleans up everything but this darn real av. It is killing my computer!!! PLEASE PLEASE HELP... I have run hijack this and the notepad log is posted below. If anyone can help me get this off my computer I would be reall appriciative!!! THANKS !!!!
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 10:06:53 PM, on 1/7/2009
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16762)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\userinit.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\McAfee\SiteAdvisor\McSACore.exe
C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
c:\PROGRA~1\COMMON~1\mcafee\mna\mcnasvc.exe
c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe
C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\Program Files\McAfee\MPF\MPFSrv.exe
C:\WINDOWS\system32\svchost.exe
c:\PROGRA~1\mcafee.com\agent\mcagent.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Java\jre1.6.0_02\bin\jusched.exe
C:\windows\system\hpsysdrv.exe
C:\HP\KBD\KBD.EXE
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\WINDOW... Read more

Read other 3 answers
RELEVANCY SCORE 56.4

I am hearing Homeland Security issued an alert and is recommending Java be uninstalled until the threat can be contained.

Really? Or is this just a joke?

Thanks,
FP

A:Is this real ?

...hmmmmmmm...
http://www.zdnet.com/homeland-security-warns-to-disable-java-amid-zero-day-flaw-7000009713/

http://www.chicagotribune.com/business/technology/chi-homeland-security-urges-computer-users-to-disable-java-20130111,0,5686660.story

http://kdvr.com/2013/01/11/homeland-security-warns-to-disable-java-amid-hacker-threat/

http://www.npr.org/blogs/thetwo-way/2013/01/11/169156325/computer-users-should-disable-java-7-due-to-security-flaw-experts-say

...guess so...

Read other 6 answers
RELEVANCY SCORE 56.4

Is this thing real?: http://eatliver.com/img/funny/2005/54-722-ghz-overclocking.html

I have 3 Ghz pentium... So i can double it just like that?
 

A:3.8 Ghz -> 7.22 Ghz Is it real?

Read other 7 answers
RELEVANCY SCORE 56.4

Program advertised is called Turbo Your PC. I have seen it on it News programs !

Is it the real thing , or is it a scam ? B T W it is also FREE !

A:Is this for real ?

Snake oil. All those programs like that are.

Hardware will turbo your pc, not software.

That is a free download, not completely free at all.

Read other 3 answers