Skip to main content

Posts

Showing posts from April, 2010

How do you change your Yahoo Mail password?

 Login to Yahoo Mail. In the right-hand corner, click Options and then More Options. Click Accounts. Click Add or Edit an Account. Click Account Information. Verify your account password. Click Change Your Password. Enter your Current Password.        Choose a New Password. Confirm your New Password. Click Save. http://www.smartnetadmin.com

How do you prevent a Webmail Worm from sending email using your email address?

There are worms on the internet that use dictionary attacks in order to breach the security of a webmail account.  These webmail accounts are typically hosted by major search engine portals.  When the breach occurs, the worm routinely sends email to the user's webmail address book using the user's email address.  To resolve this issue, you must use a strong password for your webmail account.  Incidents that have occurred involve the use of a weak password.  You should never use a weak password to secure your personal information.  Additionally, you should never download email attachments that are sent to you from an unknown sender.  When you have experienced a malware incident, it is always prudent that you fully scan your computer for an infection and install the latest Windows Updates. http://www.smartnetadmin.com

How does your computer repair service compare with other service providers?

Following are a list of questions that you may wish to pose to our competitors in the industry.  In almost all instances, the answer to each of these questions is No - they do not perform this service.  This is an excellent method of determining the quality of your computer repair.  Each of these steps are key points not only in the resolution of a computer problem but also in the prevention of any future problem.  Additionally, these points emphasize the need to perform computer maintenance.  Simply put - when these key points are not addressed by our competitors, your computer repair is incomplete. Have all malware items on the computer been removed?  Have steps been taken within Microsoft Windows to help prevent these items from returning?  Have steps been taken to restore Microsoft Windows to Default Security Settings that may have been changed by the malware? If your computer is running Windows XP: Did you install Microsoft Windows XP Service P...

What is included in the Complete Virus and Spyware Removal service?

Complete Virus and Spyware Removal with System Optimization Using The Highest Rated Anti-Malware Tools In The Industry, $149. System Optimization includes: Virus, Trojan, Spyware, Malware, Rootkit Removal      Registry Repair Hard Disc Defragmentation Windows Service Pack Installation All Windows Updates Installation Printer Driver Repair .Net Framework Repair Temporary File Removal Start Up Repair Unwanted Program Removal Using proprietary tools, the following system components are reset to Microsoft recommended settings: Registry Permissions File Permissions Local Group Policy Local Security Policy Windows Security Center Internet Explorer Windows Firewall System Restore Task Scheduler Windows Desktop Windows Automatic Update Service Background Intelligent Transfer Service  Windows Management Instrumentation Service http://www.smartnetadmin.com

How do you run Malwarebytes Antimalware when programs with the .exe extension will not run?

Some malware will block the execution of programs using the .exe extension.  To work around this problem, please perform the following steps.  Once Malwarebytes has ran successfully using this work-around, the exe extension will be restored to its normal functionality  If the computer is running unusually slow, you may wish to perform these steps in Safe Mode. Double-click Ccleaner. Click the Run Cleaner button. Upon completion of the cleaning process, close the program. Click Tools. Click Folder options. Click the View tab. Uncheck Hide Extensions For Known File Types. Click OK. Browse to C:\Program Files\Malwarebytes Antimalware. Right-mouse click mbam.exe and select Copy. Right-mouse click the white space within the directory and select Paste. Right-mouse click the Copy of mbam.exe and select rename. Replace .exe with the .com extension. Hit the Enter Key. Double click the Copy of mbam.com. Click the Update tab. Continue to hit the Update button until Malwarebytes rep...

How do you obtain the RSS XML Feed for a Google Calendar?

You must first add the Calendar to your Google Calendar account.  You then perform the following steps on the newly added calendar: In the calendar list on the left side of the page, click the down-arrow button next to the appropriate calendar, then select Calendar settings. (Alternatively, click the Manage Calendars link at the bottom of the calendar list, then click the name of the appropriate calendar.) In the Calendar Address section, click the XML icon.  The address provided is the actual source address of the creator's calendar. http://www.smartnetadmin.com

What are the most common unique words contained within spam email?

Due to no fault of the company that created the product nor the government of a geographic location, the most common unique words contained within spam email are: abidjan aczmail avandia b2bdatagroup barelifts byki cabelas cardsdirect cialis cobrahealthplans codeine creditreport cres02 directbuy discounttravel folgers freerightasge1 gerahim gevalia hearingplanet hoveround hydrocodone inkline insweb lagos lasik leafbutter mailchimp manolo moneygram mypoints newcarsplus nigeria onlinestudentfinancialaid padailydraw paloalto paxil pchomecareer percocet petcarerx petzoom pfizer phentermin pornaccess prisonplanet prizeamerica razor2 realage realitykings rhyolite rxmedications rxmeds rxmedz schematicspl spamassassin surveymonkey telebrands viagra vicodin vioxx wkli xanax yasmin zoosk zynga http://www.smartnetadmin.com

Windows XP - Reset Registry Permissions & Reset NTFS Permissions

When repairing a computer after a virus, it is always wise to Reset Registry Permissions to factory defaults using the following process: Click Start - Run. Type: cmd Hit Enter. Type: secedit /configure /cfg %windir%\repair\secsetup.inf /db secsetup.sdb /verbose Hit Enter. Upon completion, reboot. On very rare occasions, this command may produce the error: "Extended error."  It will then direct you to review the log file located at: %windir%\security\logs\scesrv.log Upon review the log file, you may see an entry related to RemoteRegistry.  If you are working on a Windows XP Home computer, the RemoteRegistry Service is not included with this edition of Windows.  Therefore, this error can be ignored. But then you may see the following error within the log file: ----Configure File Security... Configure c:\. File Security configuration was completed with one or more errors. This may simple be the fact that there are directories in the root of C that cannot be enumerated by ...

How do you submit a form using a hyperlink instead of a button?

With advances in CSS and Javascript, you may be interested in submitting a form using a hyperlink rather than a button.  This can be easily accomplished using the following method: Keep Standard Form Tag: <form name="newUser" action="<?php echo $_SERVER['PHP_SELF'] ?>" method="post"> Remove Standard Input Tag/Submit Button: <input type="submit" name="submit" id="submit" value="Submit" /></form> Add Hyperlink Tag Which Submits Form Using Javascript: <a class="button" href="javascript:document.newUser.submit()"><span>Update Account</span></a></form> http://www.smartnetadmin.com

MSConfig Does Not Retain Normal Start Up Selection

The factory default configuration for Microsoft Windows is Normal Start Up. You may find that when you open MSConfig that your computer has been set to Selective Start Up. When you select Normal Start Up - hit OK and then Restart, the computer may on rare occasions revert back to Selective Start Up. This is an indication that the registry settings for MSConfig is out of synch with the actual selection being made within MSConfig. This has most likely been caused by Services or Start Up Items being manually disabled by a technical support agent or a virus. The computer can easily be forced to use the correct setting of Normal Start Up.  The following steps will clear the registry settings made within MSConfig which returns these settings to factory defaults: Click Start - Run. Type: regedit Click OK. Browse to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Shared Tools\MSConfig\state. Delete all sub-keys found within this folder. Browse to HKEY_LOCAL_MACHINE\SOFTWARE\Micros...

Eset Nod32 Antivirus & HP Officejet 6500 Printer Driver

If you have Eset Nod32 Antivirus installed on your computer, you may encounter the following message when installing the printer driver for an HP Officejet 6500.  This message is incomplete.  This message applies to Eset Smart Security which includes the Eset Personal Firewall.  Eset Nod32 Antivirus does not include a Personal Firewall. IMPORTANT: ESET firewall software has been detected on your computer system. Before continuing, perform the steps below to enable "Interactive Filtering Mode." Do this now (these steps apply for most ESET firewall versions): From the System Icon Tray, click on the ESET Smart Security icon and select "Open Window." Click on "Setup" located on the left side of the ESET screen. Click on "Toggle Advanced Mode." From the Toggle Advanced Mode screen, select "Yes." From the Setup screen, select "Personal Firewall." From the Personal Firewall screen, select "Switch to interactive filterin...

How do you identify where a virus/worm email is coming from?

You may be informed by someone that their computer is mass mailing Contacts in their Address Book using their Email Address.  The person reporting the problem believes the email is coming from their computer because the From field of the email displays their email address.  In fact, the problem may not be on their computer.  Anyone can send an email using a spoofed From field.  Many Internet Service Providers attempt to prevent this but it is typically very easy to accomplish.  There are a variety of computer worms that mass mail contacts from a harvested Address Book using a spoofed From field.  The Address Book may be your Microsoft Outlook Express/Microsoft Windows Address Book, Microsoft Outlook Address Book or it may be a Webmail Address Book such as a Yahoo Mail Address Book.  The first thing to do is to pay special attention to the To: field of the email being sent.  You will want to determine which address book is being utilized.  Thi...

How do you block spam using Microsoft Outlook?

Microsoft Outlook has an excellent feature called the Blocked Sender List.  There are two methods of blocking email by individual email address or by domain.  Often when you receive spam, it is being sent from a variety of email addresses at the same domain.  For example: noreply@luxor23.com, support@luxor23.com, etc.  In these instances, it is better to block the entire domain as opposed to blocking individual email addresses.  Any email from a blocked email address or domain is then automatically sent to your Junk Email Folder.  You can then optionally configure Outlook to automatically delete Junk Email. Blocking Individual Email Address Click the Microsoft Outlook Inbox so that your Inbox Email is displayed in a list. Right-mouse click the email that you wish to block. Select Junk Email. Select Add sender to Blocked Sender List. Blocking Entire Email Domain Click Tools. Click Options. Click the Junk Email button. Click the Blocked Senders tab. Click the...

The MCSTRM service failed to start due to the following error: The system cannot find the file specified.

This is an indication that the Real Networks Real Player needs to be uninstalled and then reinstalled. You can also stop the Service from attempting to load by performing the following: Click Start - Run. Type: regedit Click OK. Browse to HKEY_LOCAL_MACHINE\SYSTEM\CURRENT CONTROL SET\SERVICES and delete the MCSTRM key.