twesbutler's posterous http://twesbutler.posterous.com Most recent posts at twesbutler's posterous posterous.com Mon, 16 Aug 2010 00:12:21 -0700 Try Out Emsisoft's Free Anti-Malware Emergency Kit http://twesbutler.posterous.com/try-out-emsisofts-free-anti-malware-emergency http://twesbutler.posterous.com/try-out-emsisofts-free-anti-malware-emergency The first anti-malware emergency kit that I shared a few days ago was Vipre PC Scan.  

I found another company's product that you may be interested in, Emsisoft.   I like their slogan, "Antivirus was yesterday, AntiMalware is tomorrow".  I would only add to that that I believe anti-malware is today!

Anyway, Emsisoft offers a Emsisoft Free Emergency Kit 1.0 that you can download directly to your computer and work with especially if you have to clean an infected computer NOW.

Here is their advertisement...

Freeware! Contains a collection of portable programs to scan and clean infected PCs: Emsisoft Emergency Kit Scanner, Emsisoft Commandline Scanner, Emsisoft HiJackFree and Emsisoft BlitzBlank. Unpack the zip file e.g. to a USB stick to get a useful tool to search and remove malware.

This file is always up-to-date with the latest program and signature files. 

Version 1.0.0.11 - 8/10/2010 - for Windows XP, 2003/2008 Server, Vista and 7, full functionality on x64, 102 MB, changelog, update log. No installation required!

NOTE:  This is not a program to run from your computer on a daily basis.  This is a one-time kit to clean your computer and get it back to proper operation.  

For daily use, I would recommend trying Emsisoft's free trial of their paid anti-malware product.  

I have not reviewed their claims to being the top rated anti-malware product available.

See you soon,

Todd 

Permalink | Leave a comment  »

]]>
http://files.posterous.com/user_profile_pics/685306/me.jpg http://posterous.com/users/4wjK2B6iUf4d Todd Butler top-rated-anti-malware Todd Butler
Sat, 14 Aug 2010 21:29:14 -0700 Web Content Filtering is Easy with OpenDNS http://twesbutler.posterous.com/web-content-filtering-is-easy-with-opendns http://twesbutler.posterous.com/web-content-filtering-is-easy-with-opendns

One more top-rated anti-malware strategy to use to secure your home computer network.

Todd
:)

Permalink | Leave a comment  »

]]>
http://files.posterous.com/user_profile_pics/685306/me.jpg http://posterous.com/users/4wjK2B6iUf4d Todd Butler top-rated-anti-malware Todd Butler
Sat, 14 Aug 2010 00:19:00 -0700 You should use OpenDNS Web Content Filtering http://twesbutler.posterous.com/you-should-use-opendns-web-content-filtering http://twesbutler.posterous.com/you-should-use-opendns-web-content-filtering

If you're not yet using OpenDNS Web content filtering, take it from me - you should.

OpenDNS, chosen by Fortune 100 companies and more than 25,000 schools, provides the most efficient yet powerful Web content filtering available. The cloud-based service takes just minutes to set up and gives you 55 categories of Web content, all of which are constantly updated. On top of Web content filtering, OpenDNS provides anti-phishing and top rated anti-malware protection.

It will also make your network faster and more reliable, and give you tools to easily see which Web sites are most visited on your network. If you see problem Web sites in your network stats, you can easily block them.

Get started now: 

Permalink | Leave a comment  »

]]>
http://files.posterous.com/user_profile_pics/685306/me.jpg http://posterous.com/users/4wjK2B6iUf4d Todd Butler top-rated-anti-malware Todd Butler
Fri, 13 Aug 2010 20:20:17 -0700 Vipre PC Scan saves the day... http://twesbutler.posterous.com/vipre-pc-scan-saves-the-day http://twesbutler.posterous.com/vipre-pc-scan-saves-the-day
Just used Vipre PC Scan last night to scan my computer in a test emergency.  It worked great!  For more expert tips and best practices for cleaning malware  using top-rated anti-malware, visit http://www.topratedantimalware.com.

Permalink | Leave a comment  »

]]>
http://files.posterous.com/user_profile_pics/685306/me.jpg http://posterous.com/users/4wjK2B6iUf4d Todd Butler top-rated-anti-malware Todd Butler
Thu, 12 Aug 2010 19:19:55 -0700 Viper PC To The Rescue http://twesbutler.posterous.com/viper-pc-to-the-rescue http://twesbutler.posterous.com/viper-pc-to-the-rescue I just ran across a handy little tool for you to automatically scan your computer for traces of threats.  It's called "Vipre PC Rescue" created by Sunbelt Software and can be downloaded from here.

Ok, I admit that I didn't currently have traces of spyware and malware on my system but I ran the tool just in case.  There were the results:

Scan completed.
Scan time: 00:41:51
Rootkits: 5367 scanned, 0 found
Processes: 47 scanned, 0 found
Modules: 2315 scanned, 0 found
Folders: 4975 scanned, 0 found
Files: 45863 scanned, 0 found
Registry: 24033 scanned, 0 found
Total: 82600 scanned, 0 found
No threat traces detected.

This tool is updated regularly and is freely available for consumer use.  If you do not have a top rated anti-malware product installed at this time or are not pleased with what you do have, then give this program a try.

I like things that are easy and free.  This is both.  Vipre PC Rescue ran in a command prompt and I was able to minimize the window and go about my business.  The program did not bog down the computer one bit nor interfered with any other program.

This software is designed to do just what it says, to rescue an infected pc.  The program is updated every few days and is intended to be downloaded to the infected pc or downloaded to a portable usb drive then copied to the infected computer.

If you decide to use this program on a normal basis make sure to download a fresh copy from the site above and run your scan.  If you keep running the one you use today you will not have the updated definitions until you download and run the program again.

Although this tool is offered freely for consumer use it is not designed for normal perpetual use because of its inability to update itself.  For normal use I would recommend purchasing the single copy or home copy license which if you can afford the investment, it's a good thing to do.  The full version of the product has won many awards and received uber-positive ratings from consumers.  Believe me, this program is one of the hottest newcomers in the world of top rated anti-malware.

For more information about best practices and expert tips about top rated anti-malware software, visit http://www.topratedantimalware.com

Later,

Todd

Permalink | Leave a comment  »

]]>
http://files.posterous.com/user_profile_pics/685306/me.jpg http://posterous.com/users/4wjK2B6iUf4d Todd Butler top-rated-anti-malware Todd Butler
Thu, 12 Aug 2010 08:36:27 -0700 My First Blog Post http://twesbutler.posterous.com/my-first-blog-post http://twesbutler.posterous.com/my-first-blog-post Hi!  How are you doing?  Welcome to my posterous! :)

Permalink | Leave a comment  »

]]>
http://files.posterous.com/user_profile_pics/685306/me.jpg http://posterous.com/users/4wjK2B6iUf4d Todd Butler top-rated-anti-malware Todd Butler
Wed, 14 Jul 2010 19:02:55 -0700 Windows 7 - "No Internet Access" errors... fixed! http://twesbutler.posterous.com/2010/07/14/windows-7-no-internet-access-errors-fixed http://twesbutler.posterous.com/2010/07/14/windows-7-no-internet-access-errors-fixed No internet access or Additional log on information may be required in Windows 7 x64 LAN and Wi-Fi If your Windows 7 computer (x64) keeps displaying or popping up the message saying No internet access or Additional log on information may be required, then this article will demonstrate some possible reasons and solutions. Introduction Windows 7 comes bundled with some really cool new features which make our lives much easier, particularly when it comes to understanding why we can't connect to the internet via Wi-Fi or why we can't communicate to network resources on a LAN. The messages in Windows 7 (including x64) are much more intuitive and you're more likely to fix your No internet access problem without any special tools or expert advice. Firstly though, let's take a look at some of the features that Windows 7 introduces which enable us to diagnose internet access if not repair it. Network Diagnostic Tool in Windows 7 This section will introduce two network troubleshooting tools found in Windows 7, the Troubleshooting Wizard and the Network Mapping utility. Troubleshooting Wizard in Windows 7 One of the handiest new tools in Windows 7 when diagnosing problems is the Troubleshooting wizard. It allows the user to troubleshoot and automatically resolve networking problems without having to have any technical knowledge. The Wizard works for both Wi-Fi and LAN connections. If you are getting the No internet access error or popup message you can try to use the troubleshooting wizard to fix the problems for you. To use the troubleshooting wizard, simply do the following: Right click on the network icon in your task bar and select Troubleshoot problems. You can also get to the Troubleshooting wizard from the Network & Sharing Centre in Control Panel. Windows will now pop up a dialog saying that it’s trying to detect problems. Here Windows 7 is trying to figure out what might be the issue associated with Wi-Fi or LAN related problems and why you may not have Internet access or connectivity. On the Windows Network Diagnostics dialog, select I'm trying to reach a specific website or folder on a network, if that is what your problem is. Otherwise, select I'm having a different problem. For this example we will select I’m trying to reach a specific website or folder on a network. In the address bar, type address of the website you’re having problems with and click Next. We will use a fictitious address which we know will fail, http://capitalhead.com/temporary.html Windows will try to figure out why you may not have access to a particular website or connectivity to the internet, and will attempt to suggest actions which will correct the problem. In our case, the internet was working fine, however the website was down and not responding. You can click on ether of the above options, these will expose you to more actions Windows 7 can perform in order to diagnose the No internet access problem. Network Map Another handy tool, which was also available in Windows Vista, is the Network Map. Network Map allows you to quickly understand the layout of the Wi-Fi or LAN, including routers, switches and connected devices, such as printers or other computers. In order to map your network using Network Map, you will need to ensure that the network you are connected to is set to either a Work network or Home network in Network and Sharing Center. Please note, that you should not change the network type to Work or Home if you’re connected to a public network. There may be serious security implications for your computer. You use this at your own risk. Generally though, it should be possible to map out your network and understand why your computer may not have access. To launch the Network Map follow these instructions: Click Start > Control Panel > Network and Sharing Center On the Network and Sharing Center dialog click See full map The network should be discovered and a graphical representation shown as below: Fixing the No internet access error message The No internet access message is simply telling you that you have no internet access. It may be due to any number of reasons, however the diagnosis of these is outside the scope of this article. What I will cover, are ways in which you can let Windows 7 do all the hard work for you. Earlier in the article I introduced the Network Troubleshooting Wizard. To resolve the No internet access error, we can launch the Wizard to help us diagnose the problem. It will make helpful suggestions from its detailed error scenario database; all of which should be sufficient for you to diagnose the problem without having to bother the support people. Additional log on information may be required The name in this error should tell you everything you need to know. The message that pops up says that Additional log on information may be required, which usually means that you have connected to the ISP’s connection, however there are additional steps required in order to connect to the internet. These additional steps might include accepting the usage policy or typing in a username and password, or even paying for the connection with your credit card. It really all depends on whose Wi-Fi or LAN connection you’re accessing. The easiest way to find out what is required is to start your browser. If you have a homepage configured in your browser, then your computer will try to reach it when you start the browser. Otherwise, type something like http://capitalhead.com into your browser and see what comes back. Generally speaking, the ISP will redirect the request to their own page which will ask for these additional pieces of information. Read the page and all the instructions – fill in the required fields and if you need to, pay for the connection. This should remove the Additional log on information may be required error message from the screen. If you experience any other problems, try using the Network Troubleshooting Wizard and see if that helps. Conclusion This article introduced you to new Wi-Fi and LAN troubleshooting tools in Windows 7. We also discussed the reasons behind the No internet access error message and Additional log on information may be required error message, as well as suggested ways in using the new troubleshooting tools in order to fix the errors. References Windows 7 Home Page http://www.microsoft.com/windows7

Permalink | Leave a comment  »

]]>
http://files.posterous.com/user_profile_pics/685306/me.jpg http://posterous.com/users/4wjK2B6iUf4d Todd Butler top-rated-anti-malware Todd Butler
Wed, 07 Jul 2010 21:25:57 -0700 Symantec Endpoint Protection 10 or 11 Uninstall Script http://twesbutler.posterous.com/2010/07/07/symantec-endpoint-protection-10-or-11-uninstall-script http://twesbutler.posterous.com/2010/07/07/symantec-endpoint-protection-10-or-11-uninstall-script Here is a script you can use to uninstall Symantec Endpoint Protection 10 or 11 client from your computer. The script stops and removes Symantec services and uninstalls the program without rebooting your computer. ************************* First, the script... [script begins] @echo off title DO NOT CLOSE THIS BOX echo DO NOT CLOSE THIS WINDOW echo Administrative task in progress..... please wait! echo\ :: software GUID = set "SEP11={3C1AE512-3C37-44FA-BA42-ABB721EC5B1D}" :: if Symantec Endpoint Protection 11 is installed :: then Uninstall the software Set "RegKEY=HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" :: Disable Symantec Require Uninstall Password Set "RegKEY2=HKLM\SOFTWARE\INTEL\LANDesk\VirusProtect6\CurrentVersion\Administrator Only\Security" >nul 2>&1 Reg Query "%RegKEY%\%SEP11%" &&( >nul 2>&1 Reg Query "%RegKEY2%" /v "LockUnloadServices" &&( Reg ADD "%RegKEY2%" /v "LockUnloadServices" /t REG_DWORD /d 0x0 /f) >nul 2>&1 Reg Query "%RegKEY2%" /v "UseVPUninstallPassword" &&( Reg ADD "%RegKEY2%" /v "UseVPUninstallPassword" /t REG_DWORD /d 0x0 /f) rem NET.exe STOP "Symantec AntiVirus" start ""/wait msiexec.exe /norestart /X%SEP11% /qn REMOVE=ALL ) ||(echo Symantec Endpoint Protection 11 is NOT Installed) [script ends] *********************** Second, a little explanation. 1. Go to the line that starts with "set "SEP11={... long string of numbers...}" This long string of numbers is the GUID that Microsoft uses to identify the client. To identify yours, open regedit.exe and navigate to "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall". On the left panel you will see the string of GUID's and on the right panel will be the corresponding application. You want to identify the one for your product (i.e. Symantec Endpoint Protection ...). In my case I am using Symantec Endpoint Protection 11, so my GUID is {3C1AE512-3C37-44FA-BA42-ABB721EC5B1D}. If you are using SEPM 10 you will have a different GUID. If so, then copy that GUID from your regedit session (right click the GUID in the left panel and select "Copy Key Name") then paste this into the script. ******************************* Finally, you can copy the above text and save it in notepad with the filename "symantec-uninstall.bat" then double-click it to run it. If there is an error the script will let you know. If not, then you will be on your way to uninstalling Symantec Endpoint Protection from your computer. Good luck!

Permalink | Leave a comment  »

]]>
http://files.posterous.com/user_profile_pics/685306/me.jpg http://posterous.com/users/4wjK2B6iUf4d Todd Butler top-rated-anti-malware Todd Butler
Wed, 30 Dec 2009 21:24:22 -0800 The First Step to Maximizing Your Desktop Computer Security http://twesbutler.posterous.com/2009/12/30/the-first-step-to-maximizing-your-desktop-computer-security http://twesbutler.posterous.com/2009/12/30/the-first-step-to-maximizing-your-desktop-computer-security In 2004, Microsoft estimated that 50% of all PC crashes are a result of spyware! It doesn't take too much time on the 'Net to see that virus, trojans, worms, spyware, malware, etc are an always-present and ever-growing problem for home users and corporations. No one who travels on the 'Net is immune from these dangers, regardless of age, race, or position. Every computer user who works or plays on the Internet needs some type of desktop computer security program installed. So what about you? Do you have an antivirus and/or antispyware security product installed on your computer? If so, then good for you! You are already on the road to maximizing your desktop computer security. If you don't have an updated antivirus and antispyware software program then you need one! You know the story. It can happen to the best of persons. We get busy and forget, or intentionally forget and hope the problem will go away or auto-magically fix itself. In fact, I have trained hundreds of adult college students how to disinfect and keep their systems spotless clean and spyware-free by using FREE SOFTWARE! And not only getting their systems clean but keeping them clean and even more secure than by simply installing a purchased version and letting it do its thing! So what do you do first? First, you need to locate a solid and reputable and freely available antivirus and antispyware program. I am NOT asking you to whip out your credit card and purchase a year subscription for another year's updates for every computer security product you have installed! There is a better way - FREE! Expert Recommendation: "The Best Free Desktop Computer Security Products for 2010". 1. AVG Antivirus Free Edition 9.0 2. Malwarebytes 3. Comodo Internet Security How To Install: 1. Download and install AVG Antivirus Free Edition 9.0. (See link above) 2. Download and install Malwarebytes Anti-Malware (See link above) 3. Download and install Comodo Internet Security with Personal Firewall option only. Caveat: Do not install 2 antivirus products on your computer at the same time, for example AVG Antivirus and COMODO Antivirus. When you install the Comodo product just install the personal firewall only. If you do install two antivirus engines on the same system they may fight for position to the extent that they drag your computer down to a halt! To Summarize: 1. Download the software using the link I shared above... 2. On the website locate the free software download link... 3. Install the software by double-clicking the file that you downloaded. 4. When you install, accept the default settings that are recommended for you. Please, please, please do not surf the 'net without having some form of virus and spyware protection that you keep updated on a regular basis. If you are traveling the 'net without protection you are doing yourself a disservice and putting other computers in your home computer network at risk. Surf safely!

Permalink | Leave a comment  »

]]>
http://files.posterous.com/user_profile_pics/685306/me.jpg http://posterous.com/users/4wjK2B6iUf4d Todd Butler top-rated-anti-malware Todd Butler
Wed, 23 Dec 2009 22:52:16 -0800 How To Set Static IP DNS Entries via Batch File http://twesbutler.posterous.com/2009/12/23/how-to-set-static-ip-dns-entries-via-batch-file http://twesbutler.posterous.com/2009/12/23/how-to-set-static-ip-dns-entries-via-batch-file netsh interface ip set address name="Local Area Connection" static 10.31.2.110 255.255.255.0 10.31.2.1 netsh interface ip set dns "Local Area Connection" static 10.30.2.20 netsh interface ip add dns "Local Area Connection" static 10.30.2.22

Permalink | Leave a comment  »

]]>
http://files.posterous.com/user_profile_pics/685306/me.jpg http://posterous.com/users/4wjK2B6iUf4d Todd Butler top-rated-anti-malware Todd Butler
Wed, 23 Dec 2009 15:59:15 -0800 Windows 2003 Server Sync Time With Domain Controller http://twesbutler.posterous.com/2009/12/23/windows-2003-server-sync-time-with-domain-controller http://twesbutler.posterous.com/2009/12/23/windows-2003-server-sync-time-with-domain-controller ran "w32tm /config /syncfromflags:domhier /update" command to force server to sync with domain. ************************* Restarted time service with "net stop w32time && net start w32time". Resync with "w32tm /resync /rediscover"

Permalink | Leave a comment  »

]]>
http://files.posterous.com/user_profile_pics/685306/me.jpg http://posterous.com/users/4wjK2B6iUf4d Todd Butler top-rated-anti-malware Todd Butler
Tue, 22 Dec 2009 16:01:37 -0800 Easily Check Uptime Windows 2003 Server http://twesbutler.posterous.com/2009/12/22/easily-check-uptime-windows-2003-server http://twesbutler.posterous.com/2009/12/22/easily-check-uptime-windows-2003-server 1. Go to "Start" -> "Run". 2. Write "CMD" and press on "Enter" key. 3. Write the command "net statistics server" and press on "Enter" key. 4. The line that start with "Statistics since …" provides the time that the server was up from. The command "net stats srv" can be use instead.

Permalink | Leave a comment  »

]]>
http://files.posterous.com/user_profile_pics/685306/me.jpg http://posterous.com/users/4wjK2B6iUf4d Todd Butler top-rated-anti-malware Todd Butler
Fri, 18 Dec 2009 21:51:20 -0800 How to Start Apache on Red Hat 9 http://twesbutler.posterous.com/2009/12/18/how-to-start-apache-on-red-hat-9 http://twesbutler.posterous.com/2009/12/18/how-to-start-apache-on-red-hat-9 Redhat 9 comes with Apache webserver. This is installed by default, but does not run at boot up.
  1. To run Apache type the following at the command prompt: /etc/init.d/httpd start
  2. To test it type: /etc/init.d/httpd status
  3. If apache is running you should see something like the following: httpd (pid 1844 1843 1842 1841 1840 1839 1838 1837 1828) is running...
  4. There are several ways to run Apache at bootup, and here is one of the simple ones. To run Apache at bootup type: vi /etc/rc.local
  5. This will open rc.local in the text editor "vi". Arrow down to the bottom of the text (there may not be any yet, in which case it will be the first line) and add: /etc/init.d/httpd start

Permalink | Leave a comment  »

]]>
http://files.posterous.com/user_profile_pics/685306/me.jpg http://posterous.com/users/4wjK2B6iUf4d Todd Butler top-rated-anti-malware Todd Butler
Mon, 14 Dec 2009 00:40:04 -0800 Free "Online Security Scan” Could Cost You... http://twesbutler.posterous.com/2009/12/13/free-online-security-scan%e2%80%9d-could-cost-you http://twesbutler.posterous.com/2009/12/13/free-online-security-scan%e2%80%9d-could-cost-you When you get a warning message that you to update the security software for your computer you read a little further.  “Why not?” you think because of all of the pop-ups, email warnings, and threats of malicious software lurking on the ‘net, you proceed and click “Scan”   Five minutes later you wish you could “undo” what has just happened. The free scan claims to discover a variety of issues, and within a matter of seconds, you’re getting a host of other warnings to purchase this security software.  After shelling out about $35 or more for the software, the software claims that your issues are fixed.  The reality:  nothing was wrong in the first place.  The worst news, however, is that the program now installed on your computer could be destructive. According to the FTC attorneys, scammers have found unethical ways to create realistic but phony “security alerts” that look like they’re being generated by your computer, but they actually are created by a con artist and sent through your Internet browser.  These, by the way, are not specific to Internet Explorer, Mozilla Firefox, Opera, or Safari.  No browser is immune.

How To Identify These Scammers!

The new term is “Scareware”.  These types of programs take advantage of a person’s fear of online malicious software.  The scam has many variations, but here are some more common symptoms.  For example:
  • you may get ads that promise to “delete viruses or spyware,” “protect privacy,” “improve computer function,” “remove harmful files,” or “clean your registry;”
  • you may get “alerts” about “malicious software” or “illegal pornography on your computer;”
  • you may be invited to download free software for a security scan or to improve your system;
  • you could get pop-ups that claim your security software is out-of-date and your computer is in immediate danger;
  • you may suddenly encounter an unfamiliar website that claims to have performed a security scan and prompts you to download new software.
Purveyors of this fine software go to great lengths to help convince people that their product is valid.  For example, if you buy the software, you may get an email receipt with a customer service phone number.  If you call, you’re likely to be connected to someone, but that alone does not mean the company is legitimate.  These scammers are very intellingent and have spent many hours organizing these well-designed and profitable schemes designed to steal people’s money and leave them stranded with no recourse but to cry “HELP!”

How Do these Con-Artists Do It?

First, these individuals buy ad space on trusted, popular websites. These advertisements may look legitimate and helpful to the user, but they actually redirect the unsuspecting user to a fraudulent website that performs a bogus security scan. The site then causes a barrage of urgent pop-up messages that pressure users into downloading worthless software. One visit to a website promoting AdawareAlert took me to a flashy, attractive site but following the links to customer support… the links were not there.  Not only that but my malware software called “Malwarebytes” detected this communication into my computer via browser was malicious.

What to Do?

If you’re faced with any of the warning signs of a scareware scam or suspect a problem, shut down your browser. Don’t click “No” or “Cancel,” or even the “x” at the top right corner of the screen.  Some scareware is designed so that any of those buttons can activate the program.  One sign that you might want to leave the session is if you try to click your “back” button trying to escape by going back in history, you find that the software will not let you but wants you to “stay for a little infection session”. In this case, force yourself out of your browser by clicking “Alt-F4”, no matter what browser you use. If you get an offer, check out the program by entering the name in a search engine. The results can help you determine if the program is on the up-and-up.  But beware, many articles exist that promote said software as being “reputable” but in reality it is not.  Do your homework! The last resort is to visit the FTC.gov website or call by phone at 1-877-FTC-HELP to report fraudulent acts.  Investigators would need to know details about the purchase and on what website on which it was purchased.  .

Good Security Practices!

Check that your security software is active and current: at a minimum, your computer should have anti-virus and anti-spyware software, and a firewall.  A program called “Malwarebytes” is a comprehensive free tool that you can use which is very popular and highly rated.  You can buy stand-alone programs for each element — or a security suite that includes these programs — from a variety of sources, including commercial vendors and your Internet Service Provider.  There are also many reputable free versions of security software that you may use as well. For a free mini-course that will help you protect your home computer network from malicious software visit  http://nospyware4me.com.

Permalink | Leave a comment  »

]]>
http://files.posterous.com/user_profile_pics/685306/me.jpg http://posterous.com/users/4wjK2B6iUf4d Todd Butler top-rated-anti-malware Todd Butler
Mon, 14 Dec 2009 00:32:55 -0800 It's Easy To Block and Unblock Internet Sites (For Free!) http://twesbutler.posterous.com/2009/12/13/its-easy-to-block-and-unblock-internet-sites-for-free http://twesbutler.posterous.com/2009/12/13/its-easy-to-block-and-unblock-internet-sites-for-free Even the best antivirus and antispyware products cannot help users block or unblock offensive or unwanted websites. The solutions that exist that may help users to block unwanted or offensive websites usually cost or require an annual subscription to be purchased. For many users this is not an option. This article will help you learn that it is easy to block and unblock websites without purchasing annual subscriptions or additional software. Some of the best protection comes from free computer security software. This method involves a file that already exists on your computer. It is called the "hosts" file. The "hosts" file actually resides on almost every operating system including Windows, Macintosh, Linux, Unix, and Solaris. The "hosts" file has existed on computers since the early days of the Internet. It was used to direct users to other computers using more user friendly names than the address of the other computer. Now, the "hosts" file is seldom used for those purposes, however many users are using the hosts file to prohibit or block users from being able to access unwanted or offensive sites. For Windows XP systems and newer, the "hosts" file is located at C:\Windows\system32\drivers\etc\hosts. Windows NT/2000 systems use C:\WINNT\system32\drivers\etc. Windows 95/98/ME users use C:\Windows. Now open "My Computer", C: drive, Windows directory, and drill down to where the hosts file is located. Double-click the file and Windows will ask you how you want to open the file. Choose "Notepad" and proceed with opening the file. (Some operating systems and computer virus protection products block these types of files from being changed without an administrator's permission, so you may have to get the administrator's permission before moving on.) When you open the "hosts" file you will notice the line at the bottom: 127.0.0.1 localhost. 127.0.0.1 is the internal IP address of your computer. "Localhost" is another name for your computer. Do not change this entry! Let's say for example you want to block www.google.com. Now with the "hosts" file still open in Notepad enter this right below the 127.0.0.1 line: 127.0.0.1 www.google.com Now save the file. Windows will ask you what name to save the file and in the "File Name" box make sure it says "hosts" without quotes and no other text. In the "File Type" field make sure you choose "All Files", then click "Save". Windows should warn you that the hosts file already exists, Do You Want To Replace It?. Click "Yes". Now you can close the file. Make sure the file is not saved as "hosts.txt", this will not work. The file must be named "hosts" and in the directory C:\Windows\System32\Drivers\Etc. Next, you have to make these changes effective. If you have Windows 2000, XP, 2003 Server, 2008 Server, Vista, or 7, then go to "Start, [All] Programs, Accessories, Right-click "Command Prompt" and select "Run as administrator". Then your command line should display. At the command prompt type (without quotes or comma) tskill explorer, then Enter. You will notice your desktop icons will flash off and back on, but this is just your desktop resetting itself. Now you can close your command line. Now open your browser (Internet Explorer, Mozilla Firefox, Opera, or Safari) and type in the address bar www.google.com. What to you see? You shouldn't see google. Before we proceed, let's reverse the changes we made earlier so that we don't forget. To reverse these changes, go back to your "hosts" file in Notepad. "File", "Open", C:\windows\system32\drivers\hosts, make sure file type is selected to "All files" or you will not see the "hosts" file, "Open". Now that you have the "hosts" file open then edit out the last line 127.0.0.1 www.google.com, and save the file. Make sure that the file is saved as "hosts" and NOT saved as "hosts.txt"! You may want to block other types of sites such as tracking sites, trojan downloaders and dialers, annoying pop-ups, spyware, etc. Fortunately, there have been others who have compiled their own lists of offensive sites and made their lists available to download for free. Some of these are www.mvps.org/winhelp2002/hosts.htm, http://someonewhocares.org/hosts/, and http://www.hosts-file.net/?s=Download. If you are interested in decreasing the chance you will get infected by unwanted or malicious software, then you will want to check out these sites to download the hosts file of your choice. Beware that many of these sites listed in those hosts files WILL INFECT your computer if you visit them without this populated hosts file installed first! The hosts file can block sites but can also provide that extra layer of protection in case your antivirus software expires or becomes disabled. Here is one example where the hosts file cannot stop the intrusion from coming in but can stop or slow down the malicious software from going out. For example, if a trojan comes through and does land on a system, and if the returning site is listed in the hosts file, then the trojan or spyware in question will not have the damaging power it would have had because it is actually reporting "nowhere" (127.0.0.1). This is the way that unwanted or malicious software is stopped in its tracks. Please understand that the populated hosts file is not meant to replace your computer virus protection product, but it is meant to work to complement your software. This article has given you a free and easy way to block unwanted and even malicious Internet sites. Even the best computer virus protection products are 100% foolproof, therefore installing a populated "hosts" file would be an additional, wise, and free level of protection to help defend against unwanted websites and malicious software. Visit http://nospyware4me.com for a free mini-course "5 Steps to Maximum Desktop Computer Security Using Free Tools".

Permalink | Leave a comment  »

]]>
http://files.posterous.com/user_profile_pics/685306/me.jpg http://posterous.com/users/4wjK2B6iUf4d Todd Butler top-rated-anti-malware Todd Butler
Wed, 02 Dec 2009 02:35:40 -0800 How Can You Protect Yourself From Malicious Software? http://twesbutler.posterous.com/2009/12/01/how-can-you-protect-yourself-from-malicious-software http://twesbutler.posterous.com/2009/12/01/how-can-you-protect-yourself-from-malicious-software Are you frustrated because last year you paid a computer professional repair shop WAY TOO MUCH MONEY over the course of the year to clean your computer from being attacked by malicious software? Are you worried because you estimate for this next year that you may have to spend the same amount as last year, perhaps more, to keep your computer optimized to it's maximum potential with minimal downtime?   If you answered "yes" to either of these questions then you are not alone. One way the common family can cut back on expenses is by taking a more proactive approach to protecting their own home computer network. This measure alone could easily save on the bottom line in a number of ways and provide a greater peace of mind for every end user in your family. Of course, some computer repair professionals would like you to believe that you are not capable of such a task. Most computer repair professionals truly care about the end-user, but many simply care more about running a personal antivirus program, collecting the service fee, and betting on when you will be back in the future. There are professionals galore who do just enough to clean, repair, and optimize your computer and (maybe) bring your computer back to a usable state ... but not enough to help protect you to a greater degree in the future. My name is Todd Butler and I teach families how to protect themselves from malicious software on the 'net, preferably using free tools. Remember the adage, "Give a man a fish and feed him for a day. Teach a man to fish and feed him for a lifetime"? Let's apply this to you as you pro-actively protect your home computer network. "Give a family clean data and clean operating systems and let them travel the 'net safely and securely for a day. Teach a family to protect themselves, their data and computers free from malware and let them travel the 'net safely and securely for a lifetime." I developed a multi-layered approach to protecting home computers as I was engaged as a Computer Technology instructor and IT professional over the last 10 years. Some of these concepts are well known strategies but a few of these concepts are virtually unknown to home computer network end-users. What I have found is that by practicing a multi-layered approach to home networking the amount of time I spend with the "home computer repair man" hat at home is next to nil. Right now I help family members and friends (and their friends) with cleaning their computers after a malware attack, and I find that having implementing these simple steps they have (1) saved their money from having to pay me or another computer professional to clean their computer, (2) saved huge amounts of time by not having to wear the "home computer repair man" hat to keep their computers free from malware, and (3) saved tons of stress from having accomplished the first two steps. Of course, there are some things that only the professionals can do like replacing faulty hardware, etc. But there are many basic techniques the end-user can do for themselves using FREE tools, specifically installing and maintaining a free personal antivirus program. What better way to protect yourself from malicious software than by using FREE Software and FREE tools? I have a special FREE mini-ecourse that goes into depth about how to use these free tools in the multi-layered approach. To enroll in the FREE mini-ecourse, visit http://nospyware4me.com.

Permalink | Leave a comment  »

]]>
http://files.posterous.com/user_profile_pics/685306/me.jpg http://posterous.com/users/4wjK2B6iUf4d Todd Butler top-rated-anti-malware Todd Butler
Wed, 02 Dec 2009 02:09:25 -0800 The Best Computer Virus Protection Products For Free http://twesbutler.posterous.com/2009/12/01/the-best-computer-virus-protection-products-for-free http://twesbutler.posterous.com/2009/12/01/the-best-computer-virus-protection-products-for-free More families are wading into the personal computer world using their computers for work and play. For many the home computer is not an exception or luxury but a vital part of family income, leisure, and everything in between. Since most if not all of these families are on networked through the Internet, by nature these families have a home computer network to maintain and supervise. On top of that consider all of the destructive malware that threatens the most casual users. Protecting your home computer network is a new phenomenon that parents and children have to be concerned with. Malware has caused much home computer network downtime that has contributed to much headache, lost time, increased expense, and much frustration for the average family. However, protecting your home computer network does not have to be a chore or headache like it used to be. Too much time and money and energy has been wasted by hard-working parents and their children trying to disinfect and clean their home computers from damage due to malware infection. People are fed up with trying to trying to fight this war alone. Antivirus and Antimalware companies would like you to use and purchase their computer virus protection products. Computer repair professionals would like you to hire them to disinfect your home computer network. Purchasing the top rated computer virus protection should help. Purchasing the best virus and spyware protection service for your home computer network should help as well. However, the best home computer network defense lies not in the products per se, but rather in the strategy you use to protect your entire network. A solid home computer network strategy can be developed using the best free internet antivirus and anti-spyware products and free tools. This saves both time, energy, and pain for the end-user. My name is Todd Butler and I teach families how to protect themselves from malicious software on the 'net. There are simple strategies that the end-user can easily learn and apply to their home computer network that will save them time, money, and headache in the future. Familes can not only teach themselves these strategies but are encouraged to help others do the same. I developed a multi-layered approach to home computer network security after implementing it via trial and error while teaching Computer Technology classes at a local college over a 9 year span. Since then I have seen a massive amount of end-users truly frustrated after spending hard-earned money for the latest and greatest computer antivirus protection products only to find that they have bloated thier operating system so much that computer preformance is horrible. No one wants to trade high security for high performance. Some people will pay for both, but in reality the end-user can get high security without sacrificing performance. I have developed a FREE mini-ecourse that begins to uncover some of these strategies and helps the end-user learn to improve the performance and the security of their home computer network at the same time. You can protect yourself from malicious software by using FREE Software and FREE tools! To sign up for the FREE mini-ecourse, please visit my website at http://nospyware4me.com.

Permalink | Leave a comment  »

]]>
http://files.posterous.com/user_profile_pics/685306/me.jpg http://posterous.com/users/4wjK2B6iUf4d Todd Butler top-rated-anti-malware Todd Butler
Wed, 02 Dec 2009 02:05:33 -0800 Free Home Network Computer Virus Protection http://twesbutler.posterous.com/2009/12/01/free-home-network-computer-virus-protection http://twesbutler.posterous.com/2009/12/01/free-home-network-computer-virus-protection Are you upset over having to spend SO MUCH MONEY to keep your home network of computers clean and optimized and free of malware? Are you struggling to find a way to maximize your network's uptime and minimize downtime for as little investment as possible using some of the best free internet antivirus and anti-spyware? Who wouldn't want a safer home comptuer network while spending less money, saving more time, and leaving the stress behind! The first step outlined by Stephen Covey in "The Seven Habits of Highly Effective People" is "Be Proactive". What if this were applied to you and your family in your home computer network? Yes, but who has time time? Good question! What if you were to learn some proven and tested principles that you could apply to your home computer network using the best free internet antivirus and anti-spyware programs and FREE tools that would actually save you time and money and stress in the long run? Would you be interested? My name is Todd Butler and I teach families how to protect themselves from malicious software on the 'net. The old adage, "Give a man a fish and feed him for a day. Teach a man to fish and feed him for a lifetime" can be adapted and applied to your home computer network. "Give a family a clean home computer network and let them travel safely on the 'net for a day. Teach the family how to keep their home computer network clean and let them travel safely on the 'net for a lifetime." Over the last 10 years, as a former Computer Technology instructor and current IT professional, I developed a multi-layered appraoch to home computer network security that has proven to save time, money, and stress for those who use it. In the early days I searched for the best computer virus protection products that would do it all for me, so I could "set it and forget it" and go on my merry way. Well, I learned that this was not possible. As much as antivirus and antimalware companies want you to believe that, it simply is not true. The more software that a company integrates into a total antivirus and antimalware solution, the more it bogs the computer down and starts to immediately become an annoying and regretful experience for the end-user. What makes my technique so practical is that it is simple, yet comprehensive, and everything is accomplished by using FREE software and FREE tools. But just because you use free computer virus protection products does not automatically keep you safe. You have to plan your strategy so that if one tool or program fails to detect a malicious piece of software then another tool on another layer will help stop the malicious activity. I have developed a FREE mini-ecourse that begins to cover some of these strategies and helps the end-user practice being proactive with their home computer network. Yes you can protect yourself from malicious software by using FREE Software and FREE tools! To sign up for the FREE mini-ecourse, please visit my website at http://nospyware4me.com.

Permalink | Leave a comment  »

]]>
http://files.posterous.com/user_profile_pics/685306/me.jpg http://posterous.com/users/4wjK2B6iUf4d Todd Butler top-rated-anti-malware Todd Butler
Sat, 28 Nov 2009 03:51:53 -0800 Converting Cisco PCF's into vpnc on Ubuntu 9.04 http://twesbutler.posterous.com/2009/11/28/converting-cisco-pcfs-into-vpnc-on-ubuntu-9-04 http://twesbutler.posterous.com/2009/11/28/converting-cisco-pcfs-into-vpnc-on-ubuntu-9-04 Convert Cisco pcf file to conf file for vpnc on Linux Ubuntu 9.04 Works on Ubuntu 9.04 From the terminal. wget http://www.debuntu.org/files/cisco-decrypt.c sudo apt-get install libgcrypt11-dev gcc -Wall -o cisco-decrypt cisco-decrypt.c $(libgcrypt-config –libs –cflags) chmod +x cisco-decrypt sudo cp cisco-decrypt /usr/bin wget http://svn.unix-ag.uni-kl.de/vpnc/trunk/pcf2vpnc chmod +x pcf2vpnc sudo cp pcf2vpnc /usr/bin pcf2vpnc sample.pcf > sample.conf (Note:replace above sample.pcf with your own .pcf file.) sudo cp cisco.conf /etc/vpnc/ sudo apt-get install vpnc resolvconf sudo vpnc cisco –local-port 0 (You may not have to use the –local-port 0 option) If you want to disconnect, ’sudo vpnc-disconnect’

Permalink | Leave a comment  »

]]>
http://files.posterous.com/user_profile_pics/685306/me.jpg http://posterous.com/users/4wjK2B6iUf4d Todd Butler top-rated-anti-malware Todd Butler