The most common password used on the internet is “password”. And sad to say, people use the same password on several sites. You have access to one, you have access to all. This allows cybercriminals to build up a database on you and can lead to fraud.
So what is a good password? First, take a look at this list. Don’t use any of those passwords. Next, read Kaspersky Antivirus’s 6 bad ideas for a password. However, ignore Kaspersky’s rule for developing a good password. View full article »
This entry has been updated for the 10th time. Last update was 10/7/2014.
View full article »
I have seen a rather nasty virus lately: poweliks. Of the 4 times I have seen it in the past week, 2 were related to the Cryptowall malware. Poweliks is very hard to detect and once it is on your computer, it can actively hide from many antivirus and antimalware programs. Poweliks has the following tale-tell signs:
- Several legitimate Windows files will have high CPU usage. Some variants load several dllhost.exe files (most likely the 32-bit version). Some will constantly load other legitimate files.
- The registry will be modified so that certain keys are not accessible with the regedit.exe program or antivirus or antimalware software.
- There is no actual virus file. The file itself is stored in the registry and using a few tricks (and what I call design flaws of Windows), it loads the file straight from the registry. Sometimes the tricked used will make it impossible for anything except Windows to read the bad registry key.
View full article »
I received a message when attempting to uninstall a variation of the Conduit search protect. The message was You do not have sufficient permission to uninstall your program. Please contact your system administrator. Since this computer was not in a domain, that message should never appear.
To fix the issue we have to a manual uninstall. First open the registry error and find the hives:
In those keys, look for the name of the program you are attempting to uninstall in the many subhives. Once you find it, look for an entry that says UninstallString. Copy the contents of that key. Now open a command prompt as an Administrator and enter the uninstall command you copied.
If you get an Access Denied message, then you will have to edit the permissions and possible the ownership of the master folder for that program. This master folder is usually in \Program Files\ or \Program Files (x86)\ folder, although some dodgy program may be somewhere else. Set the master program folder’s permission so that Everyone has full access. If this fails, set the ownership of the folder to the current user (and not Administrators) and then edit the folder’s permissions again. Now enter try that uninstall command again.
I have been experimenting with Windows Server 2012 R2. This is, of course, the server version of Windows 8.1. From my limited experience, Server 2012 is far superior to previous releases with one exception: the touch screen UI doesn’t belong within 1 trillion miles of a server OS. It does not belong on a desktop/laptop OS either, but most especially on a server OS. Below is an on-going collection of notes and ideas I have learned or discovered while using Server 2012 R2, which I will just call “Server” from now on.
This is a collection of my notes and any part of the content may change over time.
After using Windows 8.1 for some time now, the second thing I hate the most is how tightly it is integrated with Microsoft’s online services. (The first thing I hate about it is the lack of Aero; Windows 1.0 was prettier. I am not exaggerating.) This is a very very very bad thing. The absolute last thing you need is purchase your programs through Microsoft instead of the way you want, to have Microsoft know when you log in and how much you use your computer, to have Bing anywhere closer than 1,000,000 miles of your computer, to have any of your files saved into the cloud (except copies), and to have your operating system be used to deliver you advertisements, any advertisements. It is already too creepy how much web companies track you to deliver more relevant ads, but you can thwart them with add-ons and a simple cookie delete. If your Windows is tracking you, you can thwart that.
These are the steps you need to take to stop this junk in its tracks.
I encountered a Windows 7 computer that would only boot to a black screen. The only thing I saw was a mouse arrow. At first I suspected the hard drive was corrupt, so I cloned the hard drive. But the problem still existed. With this computer I still had reason to believe the hard drive was bad. Next I scanned for a virus in Windows directory and the only that was discovered was one of those junk free programs that deliver pop-up ads.
It was at this point that I decided to try an easy solution. Since this was Windows 7 there would a good copy of the registry files at %windir%\system32\config\RegBack\. So after making a backup of the current registry files, I copied the good registry over the current ones. With this computer, some of the current registry files were twice as big as the good copies, which is why I think something was wrong with the old hard drive. After I did this, the computer booted fine.
Some other suggestions included running System Restore. I was lazy in this instance and didn’t try that. But I did increase the System Restore capacity once I got back into Windows. If you are still using Windows XP, you can always find the registry files under the \System Volume Information\ folder. Some other suggestions are that certain key folders have been corrupted or have corrupt permissions. Check the Windows folder, the Program Files folders, and the Recycle Bin folder.
I have experienced a rash of failing hard drives lately. It is important to always have a good backup because hard drive failures can happen suddenly. There are several types of hard drives failures and depending on what type it is will determine success or failure in recovering data. Hard drive failures can be divided into 4 main categories: head crash, bad sectors, defective controller, and write wearing. The last one only applies to solid-state hard drives (SSD’s). When a hard drive’s motor gets old it does slow down but as long as the motor spins fast enough the hard drive is still useable; that is not a failure.
View full article »
A lot of my customers are confused about the networking standards, especially the wireless ones. This post will explain in simplified detail about what the networking standards mean.
First, you must know the IEEE (Institute of Electrical and Electronics Engineers) is one of the many organizations that sets and defines standards. A lot of people call it “the I triple-E”. Even though the standards are set by the non-profit IEEE it does not mean the standards are patent free. Corporations are members of the IEEE and they give input into the standards. Businesses know it is in their financial interests to have standards and so they work together.
There are various committees of the IEEE. The 802 committee, which was coincidentally formed on February 1980, is responsible for all networking standards. Each committee is sub-divided into different working groups numbered in the order of creation. Some working groups were disbanded, some inactive (which means no new development but future development may occur), some are reserved for possible development, and some are still active. Each working group can define various standards which are denoted by either a letter or number. Examples: 802.15.1 is the Bluetooth standard and 802.11b is one of the many wireless networking standards.
View full article »
Many people ask me about my recommendations for printers. So, this blog post will help save time from now on. This is a guide to printers and with only one exception you will have to decide what printer to buy.
When it comes to printers you must always factor in the consumables: ink, toner, drums, and so on. As a general rule, cheap printer have more expensive consumables so that the manufacturer can recoup the cost of the printer. Not too long ago HP, Epson, and Lexmark were called an ink cartel because their high priced ink. Competition has forced them to lower costs.
Below are some guides to help you choose a printer. It is based on my opinion.
View full article »
Updated 8/18/2014: Adobe had a cloud outage which left users unable to use their program for 27 hours. I also updated some other information. Microsoft Azure also had a major outage.
I know I do not update this blog very often. The purpose of this blog is to catalog my repair notes to help me and my customers. I tell my customers all the time that I do not like the cloud. But it seems like the cloud is a new buzzword that companies are jumping to make money on. Especially annoying is Microsoft’s tight integration of their cloud service called OneDrive (because they lost a legal battle over the name SkyDrive in the UK).
It may surprise people that the cloud is just a fancy way of saying something that has existed since the internet began. All the cloud is data on another server.
Below are my reasons for wanting to stay away from the cloud.
View full article »
Now here is a dilly of a pickle (in the words of Ned Flanders). I happened upon a hard drive whose partition structure was damaged. Since this was a NTFS formatted partition, it gave Windows fits but not Linux. Try as I might, because of what was corrupted there simply was no to repair the NTFS partition. But all is not lost because the files themselves are undamaged. Here are the steps to recover the data.
- First, use a program such as Clonezilla to make a copy of the hard drive. Always work with the copy. Clonezilla will also copy the corruption to the NTFS partition data. But since it ignores the errors to the partition data and only cares about file data, the copy will be quick unless the hard drive has bad sectors.
- Next, use a program such as GParted to delete the damaged NTFS partition.
- You can also use GParted to create a new NTFS partition, but you might be better off using Windows. In any event, make sure a new NTFS partition is created. It cannot be FAT32 or exFAT or any other file system. (Side point, these steps would apply to the Mac HFS+ file system as well.)
- Whatever you do from now on, do not use the copied hard drive for anything until the files are recovered. Any action may cause old files to overwritten.
- Now, use a good undelete program to recover the files. Not a free undelete program. Save all the files to a 3rd hard drive. Once all the files are off, then you may safely move them to the copied hard drive.
You will have to reinstall Windows (or OS X). But at least the majority of the files, if not all of the files, are available. What I did was to put a copy of pictures into a separate folder, a copy of documents into another, and so on. This allowed the customer to more easily sort through recovered files to find the ones most important to him.