Thursday, June 15, 2006

Removing Startup Items

Many of the bothersome issues that we have are caused by unwanted programs running at startup. Many applications would automatically configure itself to run whenever you turn on your system, and they are not just annoying, but they also take up memory that should be allocated somewhere else. Also, malware or spyware could also insert their own startup entry so that they could run together with your other startup items. Here are the ways to remove startup items in Windows.

1. Removing Programs in the Windows Startup Folder

Click on Start > All Programs > Startup Folder

Simply delete the items or programs that you want to prevent from starting up. You can also manually find the folder, just to be sure nothing is hidden. To open the folder, got to C: (or where your OS is installed) > Documents and Settings > All Users > Start Menu > Programs > Startup .

Look at the contents and delete what you know is unnecessary.

2. MSCONFIG

The Systems Configuration Utility is another place you need to visit make sure that the only programs running at startup are the ones you know acknowledge.

Again click on Start > Run. Type MSCONFIG at the Run box and press ENTER. The System Configuration Utility should open up. Select the STARTUP tab, and go throughout the list of Startup items. Uncheck those that you don't want to run at startup.

The entries in MSCONFIG may differ from the real names of applications. You might want to open windowsstartup.com and use their knowledgebase to search for the different startup items that you have.

Simply uncheck those unwanted entries and click on Apply and OK out of MSCONFIG. A restart would be asked for, if you're not doing anything else, just say Yes.

3. REGEDIT

The last resort would be to manually find the programs' entries on the registry. To access the Registry, just open another RUN box and type REGEDIT. On the Registry Editor, click on the plus (+) sign next to HKEY_LOCAL_MACHINE > SOFTWARE > MICROSOFT > WINDOWS > CURRENTVERSION > RUN. On the right panel, select the entry for the program and just delete it. Also look at the following location : HKEY_CURRENT_USER > SOFTWARE > MICROSOFT > WINDOWS > CURRENTVERSION > RUN.

Reminder: Be careful in editing or modifying the registy as it may cause you OS to be inoperable or other weird things to happen.

Happy Hunting!

Thursday, May 25, 2006

Trying out Microsoft Office 2007 beta 2

You can now beta test the next Office suite from Microsoft by downloading or ordering a beta copy of Microsoft Office 2007 which you can use up to Feb. 1, 2007 (Expiration date for the trial when afterwards functionality would be reduced) If you are planning to download and test the beta, make sure to check the system requirements, as your system may not be able to support the applications included. Download requires registration.

Links:
Download Microsoft Office 2007 beta 2
System requirements for Microsoft Office 2007

Sunday, April 02, 2006

Adding your most used folders to the Send To menu

Folders are the standards by which we categorize or group our files (I mean offline), and in my case, I have so many folders hidden inside main folders, hidden inside different partitions. Both for work or for personal use, using the Send To menu (of course accessible through the right-click of the mouse) is very useful because you can directly point files towards commonly used folders instead of going through the Windows Explorer and using the copy/cut-paste method to organize files. Here's a quick walkthrough to get your Send To menu as first option to transfer files:

  1. Look for the folder you want to include in the Send To menu. Right click on the folder and click on Send To and then Desktop(create shortcut). Now you have a shortcut on the desktop.
  2. Open My Computer and access the drive where you have your Windows installed. (most probably C:)
  3. Open the Documents and Settings folder and open the folder corresponding to your username.
  4. Open the Send To folder, where you can find the items that you see when you try to use the Send To menu. If you can't find this folder, then you need to go into Tools > Folder Options > View > Hidden Files and Folders > select Show hidden files and folders.
  5. Now, cut the shortcut that you've made on the desktop, and paste it inside the Send To folder.
  6. Do the same with whatever folder you want to include to the Send To menu.

Thursday, March 30, 2006

createTextRange vulnerability in IE: Disable Active scripting or use another browser

The flaw is caused by how Internet Explorer handles createTextRange tags, and could let malicious software run and install itself. Microsoft has not yet offered a patch, though it should be on the April 11 updates. Numerous websites have been identified that exploit the vulnerability. In a recent article from CNet it is reported that e-mail spams containing excerpts of BBC stories are being sent out, and readers are redirected to forged BBC webpages. Once the infected site is visited, a keylogger is pushed into the system, and user information like usernames and passwords are captured and collected.

Until the patch is released, users of Internet Explorer could do the following:

Disable active scripting:

  1. On the IE browser, click on Tools and select Internet Options
  2. .
  3. Click on the Security tab, click on Internet and then select Custom Level
  4. On the Security settings look for Scripting. Set Active Scripting to either Disable or Prompt. Click OK.
  5. Now back to the Internet Options, Click Local intranet, and then Custom Level. Repeat step no. 3.

Download and Use another browser :

Use Firefox or Opera as your browser.

Update:

Microsoft has released a cumulative patch for IE, which is found in the Microsoft Security Bulletin. Together with the April 11 IE updates are patches for MDAC, Outlook Express and Frontpage.

Wednesday, March 29, 2006

Stories and Reactions to the Windows Vista Delay

Microsoft's announcement of another delay in the release of Windows Vista definitely made it to the tech headlines, as many anticipated the appearance of a Windows XP replacement before the end of the year. The move makes Windows Vista available to businesses November of this year and to the general public come January 2007. Here are some of the news items centering on the Windows Vista delay:

  1. What's Really Behind the Windows Vista Delay? (from Microsoft Watch)
  2. Windows Vista delay: Good news for Apple? (from Computerworld)
  3. Understanding Windows Vista's Delay (Yes, Another) (from Microsoft Monitor Blog)
  4. Microsoft tumbles, but setback seen as temporary (from CNN Money)
  5. Windows Vista delayed on quality, security concerns (from Security Focus)
  6. 60% Of Windows Vista Code To Be Rewritten (from Smart House)
  7. Microsoft: No Vista Code Changes (from Beta News)
  8. Microsoft Shares Drop on Windows Delay (from Yahoo! News)
  9. Vista Slip to Boost Linux Says Red Hat (from Computer Wire)

Thursday, March 09, 2006

Truth be told, it is Writely Google!

Google just acquired Writely, the widely used web-based word processor, to the delight of both Writely and Google users. Why? Well it solidifies Writely as a web application and answers the question of until when they can offer the service for free. For Google fanatics, this gives validation for the GDrive "unlimited?" storage, and may progress into other services that provide web-based office productivity solutions. Of course they have e-mail and soon will be coming out with the calendar, but the killer suite would need to have a spreadsheet and a presentation program (like thinkfree?).

Resources:

  1. GoogleBlog Article
  2. Writeley Blog
  3. Writely.com
  4. Thinkfree Online Office
Disclaimer: Google and Writely logos where used only for the purpose of presenting the article.

Wednesday, March 08, 2006

Brontok e-mail worm

I recently had an encounter with an infected Windows XP Pro with SP2 machine which annoyingly restarted whenever a download was initiated and opened on the default browser the link about Brontok.A. The page that was appearing had the following text:

BRONTOK.A [ By: H[REMOVED]Community ]
-- Hentikan kebobrokan di negeri ini --
1. Adili Koruptor, Penyelundup, Tukang Suap, Penjudi, & Bandar NARKOBA
( Send to "NUSAKAMBANGAN")
2. Stop Free Sex, Absorsi, & Prostitusi
3. Stop (pencemaran laut & sungai), pembakaran hutan & perburuan liar.
4. SAY NO TO DRUGS !!!
-- KIAMAT SUDAH DEKAT --

This was my clue, so I searched for the brontok.a reference, and came up with the following aliases for the e-mail worm that had infected the system when the user opened a certain e-mail attachment.

A.K.A. : Email-Worm.Win32.Brontok.a (Kaspersky Lab) is also known as: W32/Rontokbro.gen@MM (McAfee), W32.Rontokbro@mm (Symantec), BackDoor.Generic.1138 (Doctor Web), W32/Korbo-B (Sophos), Worm/Brontok.a (H+BEDV), Win32.Brontok.A@mm (SOFTWIN), Worm.Mytob.GH (ClamAV), W32/Brontok.C.worm (Panda), Win32/Brontok.E (Eset)

An Anti-virus was present on the system, but was not updated (lesson no. 1 !!!), and scanning the system did not find anything. Apparently, upon infection the virus creates registry keys that enable it to run at startup, and edits and sets registry entries that disable the use of regedit, msconfig, folder options, etc. (More info from Sophos.)

On the Sophos website, there is an available removal tool, but running it did not remove the worm variant. Badly enough, there was no anti-spyware software on the system, and downloading was not an option as the system would restart at every attempt to download one. The Anti-virus software was also unable to do auto-update. I downloaded Spybot from a different machine, and was able to install it on the infected one. It found and reverted changes made to the registry by the virus. Now this allowed the Anti-virus software to update itself and on restart was able to clean the machine after scan.