Andy_veal

Members
  • Content Count

    39
  • Joined

  • Last visited

Posts posted by Andy_veal

  1. You are receiving that Ad-aware is finding that object, in fault.

    What Ad-aware is finding, is a F/P (False Positive). I believed the F/P had been fixed, but it currently hasn't

    This F/P is to do with ActiveDesktop. Many of SpywareNo / SpySherrif's downloaders (and other rogues) mess around with the desktop settings... especially the background ("Your computer is infected with blah blah blah") so this key has been flagged, although it should be flagging for those only infected with SpySherrif / SpywareNo. This should only affect users who have ActiveDesktop enabled. We will adjust our definitions accordingly... thanks guys!

    Quote from LS SteveJ at DSLReports.com , who is a Lavasoft employee.

    So.... You have no reason to concern about what Ad-aware is finding....

    If you were infected, you would see this item:

    O4 - HKCU\..\Run: [spywareNo] C:\Program Files\SpywareNo\SpywareNo.exe

    This object should disappear with the next update. Otherwise, you can just add it to your ignore list:

    1. Run a scan with Ad-Aware

    2. Select the objects you want to add to the ignore list in the Scan Summary, Critical Objects, or Negligible Objects lists on the Scanning Results screen.

    3. Right click and select "Add selected to ignore list"

    4. A pop-up window showing the number of objects that will be added to the ignore list opens. Click "OK" to continue.

    The object is now added to the Ignore List

    Any other problems?

    Regards,

    Andy

    (Thanks to Corrine and winchester73 :) )

  2. Logmein is a good program....

    RealVNC, which i use, but i only use it inside my network, because unless you pay, it is not encrypted.... I think.

    Logmein is easy to set up, it is straight forward, and it is fast. :)

    Now as to mstsc:

    You should make sure that it is enabled on your "home" computer, then if you have firewall (which you should :P) you should make an exception and allow the port/program access.....

    Then you should find out your IP address and type that in.... I think that should make it work. :blush:

  3. Start, Run, type in "mstsc" (without the quote marks)

    That will open Microsoft Terminal Services Client, which if you enter a valid address, you can connect to that computer....

    Make sure it is enabled on both computers, by right-clicking, My Computer, selecting Properties. This should then open System Properties, on the Remote Tab, make sure that your computer accepts Remote connections (that is if you want to share this computer)

    In case you dont know :D

  4. A stable and safe removal tool was included as part of last weeks windows update in the malicious software removal tool.

    http://support.microsoft.com/?kbid=890830

    Scroll to the list of nasties it removes , it is the last listed.

    http://www.microsoft.com/security/encyclop...NT%2fF4IRootkit

    WinNT/F4IRootkit is a kernel-mode rootkit used for copy protection on certain Sony BMG audio CDs. There are several versions of this rootkit. The rootkit hides certain Windows system resources, including files, processes, and registry settings. The rootkit can be used by attackers to hide malicious content on the computer.

    So what should the average computer user do? Sign up to be a beta tester or run windows update ?

    I think that in this case, windows update wins the race.

    A great point..... the average user will indeed support Windows Updates..... or at least I will :lol:

  5. "We are pleased to announce the launch of the ARIES Rootkit Remover BETA to help remove the Sony Rootkit for good! As you know, in 2005 Sony included rootkit style content protection software to approximately 4.7 million CDs of over 50 artists worldwide exposing consumer PCs to security holes. The DRM (Digital Rights Management) software called XCP, developed by First4Internet, was placed. According to Sony, about six million CDs currently have this software.

    Lavasoft answers the challenge by giving you the Beta of the ARIES Rootkit Remover (Sony Rootkit). Currently a standalone tool, this application provides a reliable, trustworthy, and safe way of removing the root-kit, unlike Sony’s own root-kit remover that has been known to cause blue screens.

    Key Features

    Our application is a stand alone application from an independent software company. The ARIES Rootkit Remover is developed by our competent team within Lavasoft Research & Development lab to help protect consumers rid of the rootkit once and for all by removing the ability to run once more after reboot. To access the application, register first as a Beta tester at Lavasoft Beta Application Testing Registration.

    Qualifications of Testers

    There are no special qualifications for testers. Both users that are infected with the root-kit and uninfected testers are encouraged to test the application. However, the testers need to run 2000 through 2003 (or even Vista) and should report back their OS version upon encountering problems.

    For more information, see http://www.lavasoftresearch.com/betaprogram/rootkit.php

    We value your experience and feedback

    If you have suggestions for additional features or changes to existing features, let us know in your reports or by contacting us directly via [email protected]. "

    Quoted from LS Research email :mellow:

  6. The free version can not transfer files, I am not sure about the paid versions, but i am guessing that you can.

    I currently have created a shared folder on my computer and I transfer any files I need upto this pc.

    But of course, that will only work on an local intranet.

    :) Depends how your using VNC and for what environment.

    Good luck :thumbsup:

  7. XP Home edition can not join a domain so you can't take advantage of acitve directory or anything that relies on it (which is just about everything).  From a workgroup though you can still access shares on from a domain.  This may have changed in 2003 (it was true of 2000) - 2003 got a lot tighter on restrictions.  Windows 2003 Server's non-domain related services like the web server, FTP server, CA, etc. will still be available to you. 

    <{POST_SNAPBACK}>

    Correcto :thumbsup: