April 28, 2006

Government-Funded Startup Blasts Rootkits

A startup funded by the U.S. government's Defense Advanced Research
Projects Agency is ready to emerge from stealth mode with hardware-
and software-based technologies to fight the rapid spread of malicious
rootkits.

Komoku, of College Park, Md., plans to ship a beta of Gamma, a new
rootkit detection tool that builds on a prototype used by several
sensitive U.S. government departments to find operating system
abnormalities that may be linked to malicious rootkit activity.

A rootkit modifies the flow of the kernel to hide the presence of an
attack or compromise on a machine. It gives a hacker remote user
access to a compromised system while avoiding detection from
anti-virus scanners.

The company's prototype, called CoPilot, is a high-assurance PCI card
capable of monitoring the host's memory and file system at the
hardware level. It is specifically geared towards high-security
servers and computers.

Gamma, meanwhile, is a separate, software-only clone of CoPilot that
will target businesses interested in a low-assurance tool for
protecting laptops and personal computers.

Komoku launched quietly in 2004 with about $2.5 million in funding and
rootkit detection contracts from DARPA, the Department of Homeland
Security and the U.S. Navy.

Full Article:
http://www.eweek.com/article2/0,1895,1951941,00.asp

Facebook Twitter LinkedIn Pinterest Instapaper Google+ Addthis

back to top ^

Microsoft Steps Up Windows XP Piracy Check For Counterfeit Software

Starting Tuesday, April 25, Microsoft has been pushing out a test tool that checks whether the copy of Windows a PC is using is properly licensed. It will be sent to millions of people in the United States, United Kingdom, Malaysia, Australia and New Zealand. It will extend its 'Windows Genuine Advantage' program to send alerts directly to users of pirated software, the company said yesterday.

Starting April 26, 2006, however, Windows XP users in the United States who have set up automatic security updates will receive the anti-piracy tool. After installation and reboot, they may find their computers popping up an alert that reads: 'This copy of Windows is not genuine; you may be a victim of software counterfeiting.' These popup notices will occur as they logon and while they are working with their computers. The popups will continue to occur until such time as the computer owner installs a valid license code, which may require a phone call to Microsoft support.

You can obtain a legal, license-able copy of Windows XP from Tiger Direct, or Newegg. at a much lower price than Microsoft charges for just a license.

At this time the new validation system is optional - you may choose to opt-out, but only if you have set Automatic Updates to notify only, not install without review, or if they perform manual Windows Updates, where there is a checkbox that can be unchecked to remove that item from the download items. It is expected that this will change to be non-optional after the pilot program has been tested for a short time.

From Microsoft:

"As part of the pilot program, some customers in the U.S. U.K., Malaysia, Australia and New Zealand will be invited to receive WGA Notifications through Automatic Updates (AU) to learn whether or not they are running genuine Windows. Customers who opt in to the pilot and learn they are using non-genuine versions of Windows will receive a message during logon that their copy of Windows appears to be non-genuine and will be directed to the WGA Web site to learn more. If they choose not to obtain a copy of genuine Windows at that time, the customer will receive reminders until they are running genuine Windows. While the pilot is presently opt-in, as it expands later in the year, AU and WU customers may be required to participate. Users who have not validated their machines as genuine through WGA will not be able to download IE 7 and Windows Defender among other downloads and updates. However, they will not be denied critical security updates."

"The pilot is opt-in, so all participants are given a choice about whether or not they wish to participate. The opt-in is via a License Terms dialog, and users can chose to accept or decline. Only users who accept will receive the software. Once installed, participants will have the option to suppress notifications for some length of time. Users will not have the option of uninstalling WGA Notifications. Customers [already] running genuine Windows Advantage will be unaffected by WGA notifications. Users running non-genuine Windows will see the notifications at boot time, login time, and periodically to via a system tray bubble notification. Messages are displayed until the system is running genuine Windows. Users can choose to suppress the notifier. The notifier will remind such users that they are not running genuine Windows and direct them to the WGA failure page, where they can learn more about the benefits of genuine software and take advantage of the Microsoft genuine Windows offers designed to help victims of counterfeit software. All users are able to receive High Priority Security & reliability updates regardless of their validation status. Users will not have the option of uninstalling WGA Notifications"

Microsoft also said it is planning to expand the anti-piracy pilot to Microsoft Office products.

Microsoft also released today an update to fix a Windows security patch (MS06-015) it issued a week ago that caused problems for some users of Hewlett-Packard hardware and software, as well as some Windows users who have certain Nvidia graphics cards installed.



Temporary Workaround to disable the popup notifications from WGA:

Run task manager and kill WgaTray.exe. Then, go to System32 folder and find WgaTray.exe and wgalogon.dll. Rename both files to something like WgaTray1.exe and wgalogon1.dll and do a restart. No more annoying messages from Microsoft If your XP isn't registered. This workaround is not expected to remain viable for too long. Microsoft will still find a way to install the legimacy tool and you will either have to deal with the notices that you are using pirated software, or register with a legally obtained license (see below).

Alternate and better solution:

Purchase a licensed copy of Windows XP matching the (unlicensed) version you already have installed, and either boot from the CD and reinstall Windows on top of itself, using the "R" repair option, or change the license code to the legitimate code, using the Windows Activation utility. Tiger Direct sells legal, never before licensed copies of most versions of Windows at a considerable discount, and very cheap shipping charges.

If you do purchase a legal copy try running the Windows Activation Wizard (Start > All Programs > Accessories > System Tools) with the phone option, then click on "Change Product Code", input your legal codes and submit it for approval. If you have trouble changing the registration codes using the Activation Wizard, you can try phoning Microsoft Activation Support using the numbers supplied for your country on the Activation Wizard. You must have the current registration codes displayed on the Wizard to get a new set of numbers, along with the product ID on the new XP sticker that you got with the CD.

Alternately, if there are no registration numbers displayed on the Activation Wizard screen, put the new XP CD in the CD tray and reboot. Be sure you have set your BIOS to boot from a bootable CD first. To enter your BIOS try pressing Delete, or F1, or F2 while the computer starts to reboot, right at the first boot screen, where the Bios information is displayed. There will be a tab for Boot Options. Make sure the first boot device is set to your primary CD drive.

If the BIOS has been set to boot from a CD first you will see a text message on-screen telling you to press any key if you want to boot from the CD. You only get a few seconds to decide, so watch for this message and press any key that you want. Windows Setup will begin. Eventually Setup will stop and tell you that it has found a current installation of Windows and show you the location. It will offer three options: Repair installation, Fresh Installation, or F3 to Exit Setup. Press R to repair your installation. This will preserve all of your programs and settings, although you may need to repair/reinstall your anti virus program or some other touchy applications. You will also have to download all Windows Updates after setup has completed.

Early in the Repair Installation process you will arrive at the Product ID input fields. Type in all of your new, legal codes and continue with Setup. Once Setup has completed you will get to your Welcome Screen. No matter which account you try to log into you will have to Activate Windows XP before entering the Desktop. If you are online on broadband, and your firewall doesn't block communications before the desktop appears, Activation should proceed instantly. If it doesn't, use the phone option, speaking or entering numbers into your phone, or ask to speak to a human ("Use other means"). This will take a few minutes, but you will be legally registered when you get off the phone.

Be sure to run Windows Updates ASAP, because the Repair Installation wipes out your previous updates.

This is really the best solution, since you won't have to worry about being denied any more updates, or deal with popup notices about running an unlicensed copy of Windows. You will no longer be a "victim of counterfeiting."

Facebook Twitter LinkedIn Pinterest Instapaper Google+ Addthis

back to top ^

April 24, 2006

Register New Domains At Dotster.com

The Happy Hour $2.00 Domain name sale has expired, at Dotster.com. I'll let you know when the next one is announced.

If you need to register a new or additional Domain name, I recommend Dotster, which is my Registrar. TLDs go for $14.95 /yr, and transfers are $8.95 with one additional year added to your expiration date, and they have a limited time sale on .info Domains, for only $2.99 for one year.

Use this link to go to the Dotster home page and search for your desired Domain name(s).

Dotster is my registrar for all of my Domains, and most of my Webmaster Services customers use them as well. Dotster is an ICAAN Accredited Registrar and has been around for quite a while now. I first learned about them from Leo LaPorte, on Tech TV. I have more details about their services on my Dotster web page, and on my web hosting page. Dotster accepts Domain registrations from people around the World.

I was there on the 26th and bought a new Domain name, www.computer-consulting-services.com and got a free .info with the same prefix. I'll be putting content on it over the next few weeks, but right now it is parked, waiting for my brain cells to wake up again. Watch my blog for details about this new Domain.

Facebook Twitter LinkedIn Pinterest Instapaper Google+ Addthis

back to top ^

April 21, 2006

Re-Release of MS06-015 on April 25, 2006

Source:
Microsoft Security Bulletin MS06-015: Vulnerability in Windows Explorer Could Allow Remote Code Execution (908531)

You've heard of issues with this security update. Does Microsoft plan to release a revised security update to address these issues?
Microsoft has completed its initial investigation into issues involving old third party software that customers may have experienced after the installation of this security update. On Tuesday, April 25, Microsoft will issue a targeted re-release of the MS06-015 update.

Note Customers who have already applied the MS06-015 update who are not experiencing the problem need take no action.

When released, what changes will the revised security update include?
The revised security update will contain no changes to the binaries included in the initial security update. The revised security update will place the following entries in the allow list as indicated in Microsoft Knowledgebase Article 918165.

HP Share-to-Web
• {A4DF5659-0801-4A60-96071C48695EFDA9}

NVIDIA Graphics Driver
• {1E9B04FB-F9E5-4718-997B-B8DA88302A47}
• {1E9B04FB-F9E5-4718-997B-B8DA88302A48}
• {1CDB2949-8F65-4355-8456-263E7C208A5D}

How do I deploy this revised update?
For customers who have already applied the update and are experiencing the problem related to the older Hewlett Packard Share-to-Web software, or older NVIDIA drivers prior to or including version 61.94, the revised update will be available through Windows Update and Microsoft Update. The targeted re-release will be automatically delivered to affected computers through Automatic Update if it has been enabled The re-release will not be distributed to non-affected computers.

Microsoft Baseline Security Analyzer (MBSA) 2.0 will also determine if one of the identified third-party COM controls has been installed and will offer the revised security update.

For Microsoft Baseline Security Analyzer (MBSA) 1.2.1, the detection logic has been updated to offer the revised package only to machines that do not have the initial security update installed. MBSA 1.2.1 cannot be used to determine if the identified third-party COM controls have been installed. In this situation, we recommend either a manual or Group Policy install of the revised security update.

What are the known issues that customers may experience when they install this security update?
Microsoft Knowledge Base Article 918165 documents the currently known issues that customers may experience when they install this security update. The article also documents recommended solutions for these issues. For more information, see Microsoft Knowledge Base Article 918165.

Facebook Twitter LinkedIn Pinterest Instapaper Google+ Addthis

back to top ^

April 19, 2006

Latest Microsoft Patch needs Patching

On April 11, 2006, Microsoft released a critical patch, MS06-015 (KB908531), to plug a vulnerability in how COM objects interact with the Windows Explorer Desktop. It was called a Desktop drag and drop vulnerability. Fine, it was exploitable and was patched. Well, not so fast!

I am the moderator of a computers forum and a lot of members who applied that patch as part of the April 11 Windows Updates are reporting all kinds of system instability and freeze-ups. It turns out that they aren't the only ones having trouble because of the COM patch. Forums all over the World are talking about problems people are experiencing after applying this patch, and various solutions have been put forth by individuals and by Microsoft.

Many people first became aware of the effects of the patch when their desktop applications began hanging, and when they used Task Manager to see what processes were running they all found a file named VERCLSID.EXE was running as a process, not an application. Terminating that process restores normal Windows Desktop operation. Verclsid.exe is part of the MS06-015 patch.

You can read about just some of the applications that are having problems because of this patch, in Microsoft Knowledgebase Article 918165. The list of affected products is growing all the time.

Some people have decided to rename or delete the file that is causing the problems - verclsid.exe, which is located in your %Windir\System32 directory. Others have uninstalled the Update via Control Panel > Add/Remove Programs. The Microsoft artlcle linked to above even suggests some solutions for certain 3rd party products.

If your computer is now suffering unexplainable hangs they might be due to bad interactions with this patch. You can rename the verclsid.exe file, uninstall the patch, or look for spyware on your computer. Why did I say that, you ask? Read my extended comments to find out what I learned last weekend...

Last Friday, April 14, I took in a computer for troubleshooting. It wouldn't enter the Desktop at all, from the Welcome screen. Hmmm.

After a bit of trial and error I decided to hit Ctrl + Alt +Del to bring up the Task Manager, from the blue Welcome Screen. When the TM opened, there near the top was a process named verclsid.exe, using most of the CPU cycles. I terminated the process and voila, Windows Desktop appeared! However, a very short time later I found that almost every Windows or properties sheet I opened was hanging and becoming unresponsive, and unclosable. Even the Start Menu would not close after I opened it. WHen I looked at the running processes again, in TM, I found that verclsid had re-appeared. I decided it was time to boot into Safe Mode and create a new Administrator level account.

When I created the new Admin level account and booted into it everything appeared to be functioning fairly normally. I was able to install, update and run anti virus and anti spyware scans and removed a lot of crap from the computer. When I was done I opened Task Manager and there was no verclsid showing in it. After defragging I decided it was time to log onto the customer's account and continue the spyware fight from there.

My troubles reappeared instantly upon entering the client's desktop. Windows were hanging, the mouse was slow, and verclsid was running in TM. There was also an unexplainable Notepad file open with no contents, titled "Desktop." I terminated verclsid but it re-appeared in a few seconds. I tried to close the empty Notepad file but it was hung up. I terminated it using TM. I was curious about why NotePad was launching and why it's title was Desktop. I had to set the Folder View options to display known extensions and display hidden files before I discovered a hidden executable in the customer's account Startup Directory (All Programs > Startup), named Desktop.exe. Note that when hidden files are made visible that there was also a file there named desktop.ini, which is a Windows System file.

I deleted Desktop.exe from the computer's startup folder, logged off, then back on. Notepad did not re-appear, and neither did verclsid.exe! None of the spyware tools detected that file in the startup folder, nor did AVG flag it as a virus. Nonetheless it is some form of Desktop infector, possibly associated with Nail.exe, which was also found on and removed from that computer, along with it's watcher, svcproc.exe. All applications continued to function normally, and verclsid never showed up again.

This showed me that verclsid was doing it's job and was fighting off a file that was embedding itself into Windows Explorer during Winlogon. The instability of the desktop and windows was the symptom, that otherwise would have gone unnoticed, while the Desktop.exe file did whatever dirty work it was programmed to do.

I hope this helps somebody else.

Wiz

Facebook Twitter LinkedIn Pinterest Instapaper Google+ Addthis

back to top ^

GRISOFT Acquires Anti-malware Expert Ewido Networks

Brno, Czech Republic and Millburn, N.J. - April 19, 2006 -

GRISOFT,
the maker of award-winning AVG Anti-Virus, today announced the acquisition of Ewido Networks, a leading provider of innovative
anti-malware solutions. This acquisition expands GRISOFT's AVG
antivirus and firewall offerings to include comprehensive malware
protection, and provide its customers with the highest level of
security against growing types of malicious software spreading across the Internet

Full Press-Release:
http://www.grisoft.com/doc/29396/lng/us/tpl/tpl01

Facebook Twitter LinkedIn Pinterest Instapaper Google+ Addthis

back to top ^

April 15, 2006

Spybot S&D definitions update

Subject: Spybot S&D definitions update

2006-04-14
Hijacker
+ C2.lop + Smitfraud-C. + ErrorSafe + CoolWWWSearch.Feat2Installer +
CoolWWWSearch.Service + CoolWWWSearch.Feat2DLL
Malware
+ SpyFalcon + Deskwizz + Command Service
PUPS
+ YazzleSudoku + Network Monitor + Freeze
Spyware
+ SpyBanker + Targetsaver + eXact Advertising.BargainsBuddy +
WhenU.SaveNow + KillSec + 007 Spy Software
Trojan
+ Innovagest2000.SpyDeface + Goldun + Jupilites + Haxdoor.gx +
Win32.Agent.pj + Win32.Tiny.ac + Win32.Swizzor.dd (2) + Vcodec +
SpywareQuake
Total: 316054 fingerprints in 39489 rules for 1921 products.

Full details and download links at www.safer-networking.org

Facebook Twitter LinkedIn Pinterest Instapaper Google+ Addthis

back to top ^

April 13, 2006

Disabling Windows Messenger on Windows XP Computers

If you're using MSN Messenger, or AIM, or Yahoo! or Trillian IM clients as your chat, IM or video conferencing tool, you may never use Windows Messenger and have tried to remove it from the startup group to keep it from appearing in your Systray. However, despite removing it from the Registry key that launches it you may have seen it return on occasion, and had to fight with it's icon and access denied messages while trying to shut it down.

The reason that Windows Messenger makes these unwanted re-appearances is that Outlook, Outlook Express and even some Microsoft Web pages can still make it load automatically. Fortunately, you can completely stop Windows Messenger from reappearing by making an alteration to the local group policy with the Group Policy Editor. You must be running with Administrator privileges to perform this action.

Here's what you should do:

For Windows XP Professional users:

1. Open the Run dialog box by pressing the keys - Windows + R, or click on Start > Run;

2. In the Open text box type Gpedit.msc and click OK to launch the Group Policy Editor.

3. Go to Computer Configuration | Administrative Templates | Windows Components | Windows Messenger.

4. Double-click the Do Not Allow Windows Messenger To Be Run setting.

5. In the resulting dialog box, select the Enabled option, and click OK

6. Close the Group Policy Editor.

How to disable Messenger in XP Home Edition

1: Solution #1 - Uninstall Messenger

2: Locate the file named SYSOC.INF in C:\Windows\Inf folder. NOTE: This folder and file are hidden by default.

3: Open SYSOC.INF with Notepad and locate this line: msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,hide,7

4: Remove the word "hide" from the line, then close the file, saving the changes.

5: You can now use the Add/Remove Programs icon in the Control Panel to remove this Windows Component.

Stopping Windows Messenger from reappearing with Outlook Express

Even after you go through the trouble of "uninstalling" the darn thing, Windows Messenger still may pop up whenever you run Outlook Express -- which some people do every time they start Windows. To stop Outlook Express from bringing Windows Messenger back onto your System tray, follow these steps:

1. Open Outlook Express.
2. Choose Options from the Tools menu.
3. Click the General tab.
4. Click to remove the checkmark from the box marked, "Automatically log on to Windows Messenger."
5. Click the OK button.
6. Choose Layout from the View menu.
7. Click to remove the checkmark from Contacts.
8. Click the OK button to close the Window.

See more solutions in the extended comments ...

Stopping Windows Messenger 4.0 on a Windows XP Home Edition

1) Start Windows Messenger.
2) Click Options on the Tools menu.
3) Click the Preferences tab, click to clear the "Run this program when Windows starts" check box, and then click OK.


Windows Messenger 4.5 or Later on Either Windows XP Home or Windows XP Professional

1) Click on Start, Run
2) Type REGEDIT and Press Enter
3) Click on the Pluses (+) next to the following items

* HKEY_LOCAL_MACHINE
* Software
* Policies
* Microsoft

4) If the folder Messenger is not listed, click on the Edit menu, point to New, click Key, and then type Messenger for the name of the new registry key
5) If the folder Client is not listed under Messenger, click on the Edit menu, point to New, click Key, and then type Client for the name of the new registry key
6) On the Edit Menu, point to New, click DWORD Value, and then type PreventRun for the name of the new DWORD value. Remember all of this is case sensitive.
7) Right-click the PreventRun value that you created, click Modify, type 1 in the Value data box, and then click OK.
8) Quit Registry Editor.


How to Stop Outlook or Outlook Express from Running Windows Messenger When They Are Opened

Outlook
1) Open Outlook
2) Click on Tools, Options
3) Click "Other" tab
4) Uncheck the box for Enable Instant Messaging in Microsoft Outlook
5) Click OK

Outlook Express
1) Open Outlook Express
2) Click Tools, Options
3) Click General tab
4) Uncheck the box for Automatically log on to Windows Messenger
5) Click OK

Lastly, Windows Messenger can be disabled by editing the IM options found in "Set Program Access And Defaults" which is found under Start > Programs > Set Program Access And Defaults. Note that you must be a member of the Administrators Group to use this utility.

Disabling Messenger via GPE Slowed Outlook 2002 To A Crawl
One commenters experience with one of these remedies

"Since I don't use Messenger, I opted to disable it with GPE using the "Do not allow Windows Messenger to be run" option under Computer Configuration. Just by chance, I happened to open Outlook immediately after completing the tweak and the splash screen took forever to disappear. Normally, Outlook is very fast on this box. I knew nothing else had been changed so I suspected disabling Messenger was related to the slowdown.

Sure enough, the setting in Outlook for "Enable Instant Messaging in Microsoft Outlook" was checked. Outlook was trying to start Messenger and having it disallowed in GPE was causing a huge slowdown. Removing the checkmark from the "Enable Instant Messaging in Microsoft Outlook" option returned Outlook to its normally snappy response. I suspect this same scenario may play out in other applications that have the ability to access Messenger automatically. Just something to keep in mind if you experience an unexpected slowdown."

Learn more about disabling Windows Messenger on this Microsoft article.

Facebook Twitter LinkedIn Pinterest Instapaper Google+ Addthis

back to top ^

April 11, 2006

Windows Updates Today - 4/11/06

Notice to all Windows users, Microsoft has released critical patches today for all supported versions of the Windows OS. At least 6 patches and hotfixes apply to Windows XP and 2000, and all of them require a hard reboot to completely install. If you run as an Administrator and have turned on Automatic Windows Updates, check the golden shield in your Systray to see if it contains an exclamation mark down the middle. If so you have downloaded the patches but need to reboot as soon as possible to install them.

If you downloaded and installed the eEye temporary patch for the CreateTextRange vulnerability, you should uninstall it (the patch will prompt you to uninstall it).

You must be running an Administrator level account to remove the patch or obtain any Windows Updates. If you run as a limited or power user you will have to either switch users to an Admin account, or log off, and log onto an Administrator level account to do these updates, then reboot into the same account, then log off and onto your daily browsing account.

To learn more about the differences between Limited Users, Power Users and Administrators, read my Privileges Explained web page on wizcrafts.net.

Once you understand how these accounts work, and how to switch between them, you will be able to run as a Limited User (in XP Home), or Power User (XP Pro and Windows 2000), for your daily Internet browsing, thus protecting your computer from installing almost all viruses, spyware and trojan horse threats. Virtually all malware programs require the infected account to have Administrator level permissions to install into system directories, and/or write to the registry on a system wide basis. This specifically applies to Rootkits.

Facebook Twitter LinkedIn Pinterest Instapaper Google+ Addthis

back to top ^

April 9, 2006

The MVPS HOSTS file was updated

Subject: The MVPS HOSTS file was updated [Updated 04-08-06]


http://www.mvps.org/winhelp2002/hosts.htm

Download: hosts.zip
http://www.mvps.org/winhelp2002/hosts.zip

How To: Download and Extract the HOSTS file
http://www.mvps.org/winhelp2002/hosts2.htm

HOSTS File - Frequently Asked Questions
http://www.mvps.org/winhelp2002/hostsfaq.htm

Note: the "text" version also makes a great resource
for determining culprit URLs ...
http://www.mvps.org/winhelp2002/hosts.txt

Update your hosts file with ease, use HostsMan
http://hostsman.abelhadigital.com


The Hosts file is a Windows networking element that is normally not used by most people. It is a text file without any extension (it is it's own grandpa!). HOSTS is normally located in your Windows\System32\drivers\etc directory. It can be opened and edited in Notepad.

Entries in the bottom section resemble this loopback to your own machine address:
127.0.0.1 localhost

If we want to block access to a nasty website that plants spyware or adware on your computer when you visit them, add the domain name to the hosts file, like this:

127.0.0.1 abetterinternet.com
127.0.0.1 stop-popup-ads-now.com

Spyware companies are know for hijacking the HOSTS file and adding their own redirects to their website, for searches and home pages. Viruses and Trojan writers modify HOSTS to keep you from going to Windows Updates or othersecurity websites.

If you run Spybot Search and Destroy (and some other anti malware programs) you can have it lock down your HOST file against hijackers. It can also be made read-only, by right-clicking on the file and choosing Properties, and checking the option - Read Only.

Facebook Twitter LinkedIn Pinterest Instapaper Google+ Addthis

back to top ^

April 7, 2006

Security News for April 2006

This blog covers computer and website security issues. It is updated as news becomes available that affects the security of computers users or webmasters.

As a webmaster myself I keep informed about vulnerabilities that might be exploited against my websites and will share them with you all.

As a computer user I believe that securing my PC is of paramount importance. I study various sources of security information and will post news here if I feel it will be of benefit to my friends, who know about this blog, and visitors who discover it in a search.

Thanks for visiting Wizcrafts Computer Services "Security Blog" and welcome!

You can read RSS Newsfeeds about current security and virus threats on my security page.

Webmasters,
learn about securing your FormMail scripts here
.

Visit Wizcrafts Computer Services Home Page

Facebook Twitter LinkedIn Pinterest Instapaper Google+ Addthis

back to top ^

Welcome to Wiz's Blog!

I'd like to welcome you to Wizcrafts Computer Services Blog!

This blog covers topics revolving around computer security issues and vulnerabilities, anti-virus, anti-phishing, anti-spam and anti-spyware products and updates, and other technical subjects I want to share with my readers. The blog entries are catagorized according to the topics being discussed, such as computer security alerts, news and program updates, website and domain issues, and technical articles about specific applications.

As the owner of Wizcrafts Computer Services I will be making entries on my blog as frequently as possible, when I feel that I have something important, or urgent to share with you. This means I will alert you about upcoming, or re-released, critical Windows updates and patches, or upgrades to browsers, or security programs, as they are released to the public.

After reading my blog entries that interest you I invite you to have a look around my website, using the links to my web pages, in the right sidebar. Wizcrafts Computer Services covers a lot of subjects and contains a lot of technical details about topics like computer and website security, upgrading RAM, frequently asked computer questions, spam solutions, website design and web hosting issues, and networking setup information.

My home page is at http://www.wizcrafts.net/ and
the site map is at http://www.wizcrafts.net/sitemap.html.

Comments and Trackbacks for this Blog have been turned off because of blog spammers trying to leave bullshit links to spamvertized websites.

Facebook Twitter LinkedIn Pinterest Instapaper Google+ Addthis

back to top ^

Blog Links

Sponsored Message

I recommend Malwarebytes to protect your computers and Android devices from malicious code attacks. Malwarebytes detects and blocks spyware, viruses and ransomware, as well as rootkits. It removes malware from an already infected device. Get an 18 month subscription to Malwarebytes here.

If you're a fan of Robert Jordan's novels, you can buy boxed sets of The Wheel Of Time, here.

As an Amazon and Google Associate, I earn commissions from qualifying purchases.


CIDR to IPv4 Address Range Utility Tool | IPAddressGuide
CIDR to IPv4 Conversion



About the author
Wiz FeinbergWiz's Blog is written by Bob "Wiz" Feinberg, an experienced freelance computer consultant, troubleshooter and webmaster. Wiz's specialty is in computer and website security. Wizcrafts Computer Services was established in 1996.

I produce this blog and website at my own expense. If you find this information valuable please consider making a donation via PayPal.

Follow @Wizcrafts on Twitter, where I post short updates on security issues, spam trends and things that just eat at my craw.

Follow Wizcrafts on Twitter


Malwarebytes' Anti-Malware is the most frequently recommended malware removal tool in malware removal forums, like Bleeping Computers. It is extremely effective for removing fake/rogue security alerts, Bots, Spyware and the most prevalent and current malware threats in the wild. Learn about Malwarebytes Anti-Malware.


MailWasher Pro is an effective spam filter that protects your desktop email client. Using a combination of blacklists and built-in and user configurable filters, MailWasher Pro recognizes and deletes spam before you download it. MailWasher Pro reveals the actual URL of any links in a message, which protects you from most Phishing scams. Try it free for 30 days.





Creative Commons License This weblog is licensed under a Creative Commons License.
The content on this blog may be reprinted provided you do not modify the content and that you give credit to Wizcrafts and provide a link back to the blog home page, or individual blog articles you wish to reprint. Commercial use, or derivative work requires written permission from the author.
Powered by Movable Type

back to top ^