Go Premium for a chance to win a PS4. Enter to Win

x

Windows XP

118K

Solutions

78K

Contributors

Microsoft Windows XP is the sixth release of the NT series of operating systems, and was the first to be marketed in a variety of editions: XP Home and XP Professional, designed for business and power users. The advanced features in XP Professional are generally disabled in Home Edition, but are there and can be activated. There were two 64-bit editions, an embedded edition and a tablet edition.

Share tech news, updates, or what's on your mind.

Sign up to Post

Patch Pic
This article provides a convenient collection of links to Microsoft provided Security Patches for operating systems that have reached their End of Life support cycle. Included operating systems covered by this article are Windows XP, Windows Server 2003 and 2008 - Both 32 and 64 Bit installs.
1
Free Tool: Port Scanner
LVL 11
Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Windows 10
When you start your Windows 10 PC and got an "Operating system not found" error or just saw "Auto repair for startup" or a blinking cursor with black screen. A loop for Auto repair will start but fix nothing. You will be panic as there are no backup of your document. How can you fix the problem?
1
 
LVL 1

Expert Comment

by:harry for
Comment Utility
well addressed !
0
 
LVL 1

Expert Comment

by:Littleman
Comment Utility
In addition, the first thing that you should do is chkdsk c: /r
and let that scan. Usually the damage is from windows shutting down incorrectly and corrupting the hard drive or files on the drive. The rest if that may not be necessary. If that fails, then proceed to the mbr repair.
0
For both online and offline retail, the cross-channel business is the most recent pattern in the B2C trade space.
1
Today, still in the boom of Apple, PC's and products, nearly 50% of the computer users use Windows as graphical operating systems. If you are among those users who love windows, but are grappling to keep the system's hard drive optimized, then you should read this article.
3
Operating system developers such as Microsoft and Apple have made incredible strides in virus protection over the past decade. Operating systems come packaged with built in defensive tools such as virus protection and a firewall. Is this built in protection enough to keep threats at bay?
 
Many people do not realize modern day virus threats come in many forms. The viruses themselves haven't changed much, but the methods by which they infect computers are constantly evolving. Virus developers spend most of their time discovering new ways to infect computers with viruses rather than developing new types of viruses.
 

So what is a computer virus?

computerVirus-TrueIT.jpgA virus is essentially a self replicating file stored on a computer system that was not authorized by the user to be there. The behavior of the file may have varying characteristics. It may be used to collect, destroy or manipulate user data without their consent.
 
Fairly often the news discusses some new hacking attempt on a major computer system. Hackers can often break into these systems by planting viruses on machines that are connected to them. These viruses can collect data or give them access to files necessary to get deeper into the systems.
 

Are these threats real?


Companies such as Kaspersky, Norton and McAfee regularly publish virus infections as they are discovered. Norton actually has a threat security…
3
 
LVL 1

Author Comment

by:Tom Price
Comment Utility
Hello there Jim,

I've tried uploading the article before with links and 1 of the editors did not approved it...should i put back the links?

I will add some headers and ad an image.

Please let me know when the article was approved and "went live" ok?

Many thanks!
Tom.
0
 

Expert Comment

by:Jame Griffin
Comment Utility
Some computer viruses are programmed to harm your computer by damaging programs, deleting files, or reformatting the hard drive. Others simply replicate themselves or flood a network with traffic, making it impossible to perform any internet activity. Even less harmful computer viruses can significantly disrupt your system’s performance, sapping computer memory and causing frequent computer crashes.
0
The Adobe PDF proprietary file format is recognized as secure and formulated. But these PDF files are also prone to corruption and any external threat like virus attacks, improper storage can hit PDF file integrity.This type of damages can make crucial PDF files inaccessible. Once the files are damaged, errors are thrown when users try to access such malfunctioned files. The section below will discuss about one of such errors, its causes and will let you know how to resolve PDF error “The file is damaged and could not be repaired”.


How is PDF File Corrupted?


Corruption cases can be different and such corruption can be caused due to distinct reasons depending upon the conditions. The level of corruption can vary from being minor to severe and the error messages are thrown accordingly. In order to resolve the issue, it is necessary to know the probable causes of PDF corruption. Some of the common reasons for the PDF corruption are;
  • System where PDF files are stored is affected by a virus or malware infection, which is causing internal issues in PDF files as well.
  • PDF files were stored on the network where it got infected. Or while downloading it got corrupted.
  • The file structure has been damaged and thus it is causing errors.
  • The PDF file was improperly handled like system was abruptly shut down while PDF was open.


How is This Error Generated?

3
AutoHotkey logo
AutoHotkey is an excellent, free, open source programming/scripting language for Windows. It started out as a keyboard/mouse macros product, but has expanded into a robust language. This article provides an introduction to it, with links to additional resources for EE members who want to learn more.
19
 
LVL 12

Expert Comment

by:Andrew Leniart
Comment Utility
Great article Joe. Very helpful.
Sidebar: If you're wondering how I captured the UAC dialog box, see my EE article, How to disable the secure desktop when User Account Control (UAC) prompts for elevation.
I cheat and do it by capturing the entire action in an Oracle Virtual Machine installation from the Host side. The other benefit to that method is that I need not concern myself about ever accidentally showing sensitive files and/or folders when zooming around in Internet explorer while creating video tutorials :-)

Cheers..
0
 
LVL 56

Author Comment

by:Joe Winograd, EE MVE 2015&2016
Comment Utility
Hi Andrew,
Thanks for the compliment — I appreciate it! Your idea sounds like a good one for folks who run virtual machines — thanks for the feedback. Regards, Joe
0
After the April 8, 2014 some Microsoft products are no longer supported; Windows XP, Server 2003, Exchange 2003, Office 2003 … It is estimated that 30% of desktop operating systems are Windows XP.


Why you should be concerned.

Here’s a possible scenario. Let’s say that Windows 7 shares some code with Windows XP and an exploit is discovered that effects both. The security patch will be released for Windows 7 but not the discontinued Windows XP. Attackers can reverse engineer the patch to discover the effected code and then test the exploit against Windows XP.


This is not as unlikely as it might sound. Have a read of : Microsoft Security Blog
Between July 2012 and July 2013 Windows XP was an affected product in 45 Microsoft security bulletins, of which 30 also affected Windows 7 and Windows 8

It’s not advisable to have these end of life products on your network after April 8. If attackers get into a vulnerable machine it makes it easier to exploit other machines on your network.

The worst possible scenario is having Windows XP machines running Office 2003 and using Server 2003 or Exchange 2003. That’s just asking for trouble.

Hopefully most folks are either upgrading or shutting down these machines after April 8. If you have to run any of these, I suggest that you isolate that machine.
3
April 8, 2014 Windows XP will lose support and be open to attacks. Now is the time to consider upgrading Windows XP to Windows 7 (Win 7). Windows 8 is not an upgrade path that most folks would want to consider.


Copy Files

The upgrade is relatively easy with Windows Easy Transfer. You will need an external drive but this is an essential peripheral these days. You need to find out if your PC is 32 or 64 bit (Start, right-click My Computer, and then click Properties) and download the appropriate version of Easy Transfer for Windows XP. Easy Transfer is included in Windows 7 so you won’t need to download anything else. This will transfer all your files on the XP PC to an external drive and then Windows 7. If you are replacing the XP PC with a different PC don’t bother with the tool since it only works on one PC.


Purchase DVD or Download

There are a number of ways to upgrade to Windows 7. While numerous OEM DVDs can be found on the Internet it is recommended that you purchase the retail version to fully comply with Microsoft licensing unless you are building new PC to sell.

With an upgrade version of the software you will need to do a clean install so backup up your …
2
 
LVL 63

Expert Comment

by:☠ MASQ ☠
Comment Utility
Strange the link is working here - maybe it's a regional thing?

Windows 7 was the last OS version the "hobbyist's clause" applied to, the Personal Use licence superceeds it but only from Win 8 forward.

Anyways here's the Win 7 version of the System Builder Guide which has a piece on hobbyist use tucked in right at the end.
0
 
LVL 30

Author Comment

by:Randy Downs
Comment Utility
Open in new tab via Chrome was the problem I ran into. It works fine if I just click it.

Open in new tab changes the link to a non working link
http://www.microsoft.com/oem/en/licensing/sblicensing/pages/licensing_for_hobbyists.aspx

http://www.microsoft.com/oem/en-gb/licensing/sblicensing/pages/licensing_for_hobbyists.aspx#fbid=zKmE5ap1y7Y

Thanks for the OEM links.
0
Strategies for Windows XP in 2014

On April 8, 2014, Microsoft will cease updating Windows XP.  This means no more support, no more bug fixes and, more prominently, no more security “patches” that plug security holes.  

See the Microsoft information on this at:

http://www.microsoft.com/en-us/windows/enterprise/end-of-support.aspx

This will make computers running Windows XP increasingly vulnerable to targeted security attacks.  After all, Windows XP will remain with a considerable fraction of the operating system landscape and, thus, a worthy target as it becomes more vulnerable to the rapidly-evolving threats.

You might ask: “Isn’t Windows XP just going to stay the same as it is now?  Perhaps no better but just the same? What will make Windows XP more vulnerable?”
-      Yes.  As of April 8, Windows XP will stay the same after that date but it won’t be supported.
-      In that sense, it will certainly be no better and it will worsen due to external forces.

The security landscape works like this:

Experts continue to seek out vulnerabilities.  These experts can be “black hats” or they can be “white hats” – depending on their motives.  Either way, the newly-found vulnerabilities are widely known throughout the computer community.  So, it’s the newest, most recent, threats that one needs to be the most concerned about.  Most of the parasites we remove are new ones.  The old ones have pretty much been covered by fixes and in the security software suites.  

6
 
LVL 26

Author Comment

by:Fred Marshall
Comment Utility
The ad was left over from a more localized message.  It's not needed.
0
 

Expert Comment

by:Jame Griffin
Comment Utility
1)The first thing is to make sure that you back up your computer’s files regularly, and periodically test you’re your backup strategy by restoring backups, preferably on a different computer, a few times a year. This helps ensure that in the event of a catastrophe, you will still have access to the information on your computer.
2)The next thing to do is to make sure that your copy of Windows XP is up-to-date.
3)In addition to the operating system and drivers, you should also make sure you have the latest versions of your application software on the computer
4)If the computer does not have to be connected to the Internet, disconnect or disable the connection so that the PC can only connect to other machines on the same non-Internet network. This will ensure that Internet-borne threats cannot directly attack your XP PC, and will make it harder for an attacker to steal data off the computer.
5)Make sure your security software is up-to-date, as well.
0
What does it mean to be "Always On"?
LVL 5
What does it mean to be "Always On"?

Is your cloud always on? With an Always On cloud you won't have to worry about downtime for maintenance or software application code updates, ensuring that your bottom line isn't affected.

If you have done a reformat of your hard drive and proceeded to do a successful Windows XP installation, you may notice that a choice between two operating systems when you start up the machine.

Here is how to get rid of this:
Click Start
Click Run
Type msconfig
Press Enter

At the top of the System Configuration Utility, choose Boot.ini
Next, click on "Check All Boot Paths"

Once you do that, a box will come up saying something is invalid and asks you if you would like to remove the invalid one.  

Choose to remove it

Press ok

Restart the machine...

Now, you will notice that you do not get prompted to choose an operating system.

Once Windows boots up, the system configuration utility window will come up.  Put a check in the box, and press ok.

That's all there is to it!

Why does this happen? Well, it's because of the Master Boot Record or MBR.

The Master Boot Record is the very first sector of your hard drive.  This sector has all of the boot information.  In other words, the MBR tells the computer how to boot.  Keep in mind, the Master Boot Record is in no way part of the main partition of the system.  So, when you do a complete reformat of your hard drive, whether you use NTFS or FAT32, you are not actually formatting the Master Boot Record.  So, since the Master Boot Record held information from a previous installation of Windows, it is telling the computer that the Operating System still exists when in fact it does…
2
 
LVL 11

Expert Comment

by:BillBondo
Comment Utility
I see this all the time. What I like to do is put movie quotes in place of the second OS choice and set the timer to 5 seconds before defaulting. Good for a laugh when I run across it...
0
Sometimes people don't understand why download speed shows differently for Windows than Linux.Specially, this article covers and shows the solution for throughput difference for Windows than a Linux machine.

For this, I arranged a test scenario.I used 2 routers, 4 computers (3 Windows and 1 Linux) and 2 switches.

Scenario:

   Network Scenario
***All the links are Fast Ethernet 100 Mbps link *****

From the figure we can see the BDR router is the internet gateway. The Mikrotik Router has NAT enabled and default gateway is BDR router's LAN IP.2 IP's are assigned into Mikrotik's LAN interface. One is private and another is public IP. Using private block IP (172.x.x.0/24) indicates NAT is using as a routing protocol. To know more about NAT please check the following link:

http://www.cisco.com/en/US/tech/tk648/tk361/technologies_tech_note09186a0080094831.shtml

Test Plan and Subnet Scenario :

172.x.x.0/24 is the LAN of Mikrotik.Gateway is 172.x.x.1. The Microtek router translates it's public IP (41.x.x.30) into 172.x.x.0/24
41.x.x.128/26 is also LAN of Mikrotik.Gateway is 41.x.x129. Default route is using for this subnet
41.x.x.0/27 is the WAN side of Mirotik Router. Default gateway of this subnet is: 41.x.x.1.

So, the difference between 172.x.x.0/24 and 41.x.x.128/26 is routing protocol.172.x.x.0/24 is using NAT and 41.x.x.128/26 is using default route.
41.x.x.0/27 is the subnet of Mikrotik's WAN. We used 2 different machines from …
2
Issue:

Unstable cursor in Windows XP and Windows runs extremely slow in that any click will bring up the Hour glass (sometimes for several seconds before giving you what you want) .

Troubleshooting Process and the FINAL FIX:

This issue seems to be dominant in Outlook and in Word. A further detailed description of the issue would be during typing a line of text the cursor would suddenly jump back to the beginning or the middle of the line and your text would be inserted at that point (almost impossible to complete a line of text in an Outlook Email message). I've run into this issue on two different occasions. The first time failing to resolve the issue after two days (which included running the Windows Task manager and unloading all the tasks in memory one by one). At this point I gave up and saved all my client's personal data to an external drive and restored the entire hard drive from a previously created Acronis image file, and copied the data back to where it belonged (there is absolutely nothing like a full image backup to save the day).

The Second time I ran into this issue (about a year later) I didn't plan on being very patient but I did go into Windows Services and one by one methodically disabled each service, reboot the computer, open Outlook, and test to see if the issue was still there. When I finally got to "Terminal Services" (near the bottom is the very long list of services) the issue disappeared. I ran multiple tests and the …
3
 
LVL 51

Expert Comment

by:Mark Wills
Comment Utility
Fantastic - thanks - fixed my old computer (which I still use from time to time).

Voted "Yes"
0
 
LVL 39

Expert Comment

by:BillDL
Comment Utility
Good and concise article.

The "Terminal Services" Service on Windows XP is required for Remote Desktop Connection (RDC - remotely connecting from one computer to another to access it as though you were sitting in front of it), and for the Remote Assistance functionality whereby a user can sent out a request for somebody to connect to their computer and access it as described above or to initiate the connection to another computer for the same purposes.

These areas can be seen as potential vulnerabilities as they leave ports open and can expose your system to unwelcome intrusion, so if these functions are never used it is a good idea to disable Terminal Services.

The "Fast User Switching" Service is dependent on the "Terminal Services" Service, but this is only a feature that does what the name implies, and allows quick swapping between different users while retaining access to running programs.  This function should never be needed on a home computer where users should be fully logging out between different user sessions and thereby terminating access to running processes.

So yes, good finding and hopefully will help others with the same hourglass issue on XP.

Bill
0
Can I legally transfer my OEM version of Windows to another PC?  (AKA - Can I put a new systemboard in my OEM PC?)

Few of us are both IT and legal experts but we all have our own views of Microsoft's licensing rules and how they apply.  There are frequently questions on this site about OEM versions of Windows and whether it is possible to either transfer the operating system of an OEM system to another machine or to continue to use the OEM system installed on a PC after significant hardware changes to the computer.

The purpose of this article is to allow the E-E community to reach a consensus view on Microsoft's intended interpretation of their OEM EULA's for operating systems.  That is, even if it is physically possible to move the system, is it legal to do so? Feel free to post your own views and links to supporting evidence.  I intend to update the body of the article regularly based on any comments added and then this article can be used to help support comments in threads in the Operating Systems Technical Areas.

Below are some pointers from Microsoft supporting the view that an OEM Windows installation cannot be transferred to another system or continue to be used if the system board has been replaced (unless the system board is replaced with a board supported by the OEM).

I've included links to the articles - as Microsoft relocates documents on a regular basis please post any dead links for updating.

I hope you find this helpful and …
22
 
LVL 26

Expert Comment

by:Fred Marshall
Comment Utility
cpaglee makes some very good points regarding what may be and may not be enforceable license terms.
(I avoid the use of the word "legal" because it carries too much weight in the eyes of many.  For example, if one violates license terms, is that "illegal"?  Often not.  It is surely and simply a violation of the license terms.  It takes action to determine what the consequences of this violation of terms might be.  So you may be prevented from "Authenticating" an OS as a consequence.  Or, you may be threatened into buying another license as a consequence (how many have?) .  Or, you may be taken to court and then the court will decide the consequences. And, in some far-out cases, there may be civil or criminal charges levied by some government agency because the actions were allegedly *illegal*.  Do you really think that some government is often going to jump on this?  On what basis?)

One is advised: "Don't ask your lawyer: "Is this legal?".  Rather ask: "Can I do this?"
The difference is in the practical application of the law through enforcement.
So, I can spit on the street with relative impunity even though it may be "illegal" on the books of the city or town.  That's because nobody is going to enforce that law.  
One can ask the same about licensing terms.
Don't ask your lawyer "Is this in violation of the license terms?"  Rather ask: "What might happen if I violate this term in the license?  Anything?"  Often the answer is "nothing".

Now only you can decide if an action is morally defensible......

Here is food for thought re: the semantics:
From above:
You cannot legally buy reinstallation disks from other manufacturers unless they are being sold with a PC
Huh?  Of course you can legally buy disks.  They aren't contraband nor some controlled substance.  The situation here really is that they come with an attached license.  The real issue is "Can you buy licenses along with a disk and subsequently use those licenses / i.e. use the disks for installation and subsequently have the installed OS BE LICENSED".  
Is it illegal to not be licensed?  Or is it simply a state of being NOT LICENSED?
Maybe a better question is: "Can you legally SELL disks and promise licenses as well?"  

I'm not a Microsoft basher. I have no intent to cheat them or pirate from them.  And, I prefer to not be inconvenienced by their unenforceable terms.  The best result in doing a repair is to end up with an Authenticated system that is indistinguishable from "what it should be".  Preconditions like having holograms in hand seem silly to me.  What is the end result?  When the machine is inspected thereafter, where is the hologram now?  Burned, lost, stolen ....??  How can it matter?
Thus the comment about "terms" is well made.

Now, I suppose that an argument can be made that users are protected from difficulty and time-consuming effort if they know up front what will assuredly work.  I think that's what Masqueraid's paper here is about.  It's a real service.

I'll still quibble about "legal" getting back to the original question:
Can I legally transfer my OEM version of Windows to another PC?
Maybe this should be reworded:
If I transfer my OEM version of Windows to another PC, am I breaking any laws?
And maybe even better, it should be:
If I transfer my OEM version of Windows to another PC, can I retain the license for it?

These are just my humble thoughts.  If you like 'em then you take your own chances.
0
 
LVL 70

Expert Comment

by:garycase
Comment Utility
None of those questions are the same as what the article addresses.

The article addresses the question, "... Can I legally transfer my OEM version of Windows to another PC? "     That is NOT the same as the title of the article, which reads "... Can I transfer my OEM version of Windows to another PC?" ... which may be why some expect a different discussion.

Note the missing word ... "legally"

Your question, "... If I transfer my OEM version of Windows to another PC, am I breaking any laws?" => is essentially the same question.

Your other question, "... If I transfer my OEM version of Windows to another PC, can I retain the license for it? " => certainly implies a legal issue (i.e. clearly you can "retain the license" ... so the implication is that you're asking if it's legal).

I think what many folks want to know is simply  "Will it work?"    i.e. will it install; activate; and authenticate okay?      Masqueraid already addressed this quite well in the article -- noting the distinction about whether it is "... physically possible to move the system ..." and if it is "...  legal to do so."

If one doesn't care about the legalities, you can always simply try it ... if it activates okay, it's clearly going to work => and I'd certainly agree with your comments r.e. enforcement.    It's rather unlikely that Microsoft is going to take legal action against an individual who installs an OEM license on a 2nd machine (i.e. a replacement motherboard) :-)    In theory, it shouldn't activate ... but if it does, then it's going to work - period.    It is, however, as the article makes clear, a violation of Microsoft's EULA to do so.
0
It is only natural that we all want our PCs to be in good working order, improved system performance, so that is exactly how programs are advertised to entice. They say things like:

           •      PC crashes? Get registry cleaner to repair it!
           •      Fix registry errors!
           •      Improve PC performance!
           •      Have your computer running like new!

These might sound really good but are not necessarily true. The scanners don't always deliver what they claim to do, at times quite the opposite.  I have seen reports where after using a reg cleaner the user could no longer open any files, Control Panel buttons are missing, browser is broken, errors pop up, and in some cases the system can no longer boot!

Despite that, in the Virus & Spyware zone I sometimes see posts suggesting a registry cleaner to fix PC crashes and registry errors, and techs/"experts" recommending the use of a registry cleaner as part of their virus cleanup routine.

Using a registry cleaner might be okay for an advanced user who knows exactly what he is doing. But for an inexperienced user who just like to scan and click the "Fix all" button without making sure that those entries being deleted are really redundant can have a disastrous result.

The risk of removing a critical entry is greater than the benefits you hoped to gain when using one of these tools. If you are not careful, a registry cleaner can mess up your registry big time, and a messed up registry is a broken Windows. …
38
 
LVL 47

Author Comment

by:rpggamergirl
Comment Utility
I still use CCleaner now and then but just for cleaning temp files not for cleaning my registry.

Also if your PC is infected make sure you don't run CCleaner(or any temp folder cleaners) just yet in case one of those rogues that move files to the temp folders is present in the system.

Windows XP/Vista Recovery - Desktop icons missing - Empty Programs files
http://www.experts-exchange.com/A_6209.html


Thank you guys for your comments and input.
0
 
LVL 37

Expert Comment

by:ValentinoV
Comment Utility
+1 for the Russinovich reference :)
0
We have adopted the strategy to use Computers in Student Labs as the bulletin boards. The same target can be achieved by using a Login Notice feature in Group policy but it’s not as attractive as graphical wallpapers with message which grabs the attention of the users. As said “A picture is worth a thousand words”.

Secondly, people treat the windows logon message as a regular notice and ignore it always. We cannot force them to read and it never displays or highlights the new message thus does not help in grabbing attention of the user. Further the network group policies do take some time in loading the policies and profiles so try to rely less on them for such small things.

The process is fairly simple and you do no need any third party software other than sharing a folder on your computer and group policy editor.

How it works:
Share a folder on your computer with permissions that everyone can view that folder and share the wallpaper you want to display on remote computers.

Manual Process:
Click Start - Goto Run
Type: gpedit.msc
Group Policy window will open
Goto User Configurations --- Administrative Templates -- Desktop -- Active Desktop
Click Active Desktop Wallpaper and Select Enable
Under Wallpaper name
Give full path to the shared wallpaper
e.g \\computername\wallpaperfolder\wallpaper.jpg
Press okay and exit group policy editor

If you are using imaging technique in your labs, just deploy the modified image and as soon as the …
0
Step by step guide to Clean and Sort your windows registry!


Introduction:

Always remember:
A Clean registry = Better performance = Save your invaluable time

In this article we're going to clear our registry manually! Yes, manually! The expert's way!
Some of the steps below and this article in general was inspired by the article : "How to Clean the Windows Registry by Hand"

Some might say cleaning registry manually is unsafe and may suggest using Third-party softwares. But I say when you do it yourself, you know what you're doing to your heart of windows! Plus that even famous registry cleaners may harm your windows or softwares in some situations (As I experienced it!).

Just take precautions and take backups before you begin! And read the Article (and links down the bottom) before you start and make sure you understand.

By reading this article not only you'll be able to clean the registry yourself but also you'll learn many places that windows uses to store it's data! In next steps I'll show you how to clean this areas of your registry:

1) Useless or old Software settings
2) Useless or old File extensions
3) Windows history list
4) Explorer history lists
5) Recent Office documents references
6) Nero history lists
7) Run command's most recently used list
8) Internet Explorer Address Bar History (Recently typed URLs)
9) Useless or unwanted Startup programs
10) Advanced cleanup


Precautions:
0
 
LVL 9

Expert Comment

by:Timothy McCartney
Comment Utility
Good point regarding your initial disclaimer. I failed to bring that into consideration when I first commented.

Again, great layout on your article. Very easy for a lesser-experienced user to follow and understand.

And thanks for the response on my comment!

Regards,
Tracer Fett
0
If your system is showing symptoms of browser hijacks or 'google search redirects' check out my other article first and run the tool TDSSKiller to get rid of the infection.

Once done, and if the PC seems to be clean but the redirect has not stopped, or in cases where you have just reformatted your system yet also showing the symptoms - then this article is for you, read on.


Router infections:

This infection has been doing its rounds for a while now; there were many PCs infected last year and currently it is still going as seen here. While it only needs to infect one PC in the network and affect all systems which share the same router; it's not surprising that a newly reformatted PC could also show the same symptom.


How does it get into the system:

Much like the Smitfraud family of infection, the Zlob/DNS changer trojans often trick the user by masquerading as a video codec to download. When they are in, these trojans check for wired and wireless hardware router. Once known that a router is being used, it guesses the router’s password by consulting a built-in list of routers with default username and password. Once it has access to the router it then changes the DNS settings, hence called DNS Changer trojans.

However, if the user had changed the default username and password for the router, these trojans will not be able to change DNS settings. That is why it is very important to create your own password and username when using one.
20
 
LVL 47

Author Comment

by:rpggamergirl
Comment Utility
@ Jsmply,

Your feedbacks on questions and continued support to my articles are what motivate me, and I am very grateful. :)
0
 

Expert Comment

by:Jsmply
Comment Utility
Glad to hear it, we have said many times that access to RPG alone is worth the price of EE!
0
cPanel is a Unix based web hosting control panel that provides a graphical interface and automation tools designed to simplify the process of hosting a web site. cPanel utilizes a 3 tier structure that provides functionality for administrators, resellers, and end-user website owners to control the various aspects of website and server administration through a standard web browser. cPanel is commonly accessed on port 2082, with an SSL-secured server operating on port 2083.

Access through cPanel:

Generally cPanel customers will not have direct access to generate their own CSR (certificate signing request) and install a Cheap SSL Certificate. One may have to check with the hosting provider as to how to go about generating a CSR for certificates.

WHM (Web Hosting Manager):

The control center of the CPanel package is the WebHost Manager. Accounts can be set up and managed through WebHost Manager. Use WHM to generate your CSR and install your issued certificate.

To generate a CSR Certificate:

•      Click on the “Generate an SSL certificate and Signing Request” link in the SSL/TLS menu.
•      Enter the email address to send the certificate.
•      Enter the domain that the SSL is being created for in the “Host to make cert. for” field.
•      Fill in the other administration details of the certificate in the Country, State, City, Company Name, Company Division, and Email fields.
•      Enter the password for the certificate in the Password field and click on …
0
Independent Software Vendors: We Want Your Opinion
Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Ok I have been working on this for some time having learned and gained certification in XenDesktop 4 along came version 5 which was released last month.

Since then I have been working to deploy XenDesktop 5 in a small environment with only 2 virtual machines, first thing was to learn the new concepts in XD5 to understand their relationship to XD4. I then began to deploy the required components and got it up and running internally however my main issue to tackle was providing external access which proved a hassle. The following is what I did to successfully implement external access.

Citrix Secure Gateway

Ok there are different ways of implementing external access notably for one of our clients we used NATing to achieve this, this is not the most ideal way as it required a lot of configuration and generally is more time consuming, find out how to do this here

NATing option basically maps the internal IP of the XD server to an external IP, the problem arises when launching an ICA session as it has to map to an internal virtual desktop which obviously does not carry a public IP.  This is overcome by using port forwarding to the internal IP of the desired desktop; port forwarding is done for all virtual machines and thus is not the best way to implement external access for a large environment. This is where CSG (Citrix Secure Gateway) comes into play.

Citrix have the Access Gateway appliance which is a hardware version of CSG this of course is the preferred way to…
1
Migration of Exchange mailbox can be done with the ExProfre.exe tool. But at times, when the ExProfre.exe tool migrates the Exchange Server user profile, it results in numerous synchronization problems. Synchronization error messages appear in the event log. In such pathetic situations, you face problems while converting OST file into PST file. To overcome these situations a third-party OST to PST converter is needed. With the help of a converter, you are able to convert OST to PST with much ease.

Let's discuss what kind of synchronization problems occur when you use Exprofre.exe (Exchange Profile Update Tool) to migrate a user profile of Microsoft Exchange Server:
Numerous synchronization errors appear on screen. You can see these errors in synchronization log.

Synchronization of organizational forms does not occur. As a result, messages requiring organizational form get displayed without form data.

Synchronization of security settings of MS-Outlook doesn't occur So, if new public folder applies new security settings, then these settings remain unavailable.

Synchronization of favorite folders of Public Folder cannot be done. All the Items that are contained in that folder remain unsynchronized.

Synchronization log contains the below events in it:
 
“12:03:52 Synchronizer Version 11.0.6352
12:03:52 Synchronizing Mailbox 'move six'
12:03:52 Synchronizing Hierarchy
12:03:52 Synchronizing server changes in folder 'Outlook 10 Security Settings'

Open in new window

1
 
LVL 74

Administrative Comment

by:Glen Knight
Comment Utility
exportostoutlook,
It is against Experts Exchange Terms of Use to solicit for business.

Please refrain from doing this in the future.

Thanks
demazter
Experts Exchange Zone Advisor & Page Editor
0
 
LVL 31

Expert Comment

by:Justin Owens
Comment Utility
jennylembert,

I am not sure I understand the value of this Article.  If you have sync problems after migrating from one information store to another, why not just delete the profile and recreate it.  I see no value in importing a converted PST, as that data would be stored in the Exchange server (else you would not have an OST).  If you are having to do such an import, you are assuming a complete migration failure, and if that is the case, then you would need to address the problem at the server level first.  You Article doesn't even mention server side troubleshooting for failed migrations.

It seems to me that it is basically an advertisement for software more than a "how to".

DrUltima
0
Can you find a fax from a vendor you saved a decade ago in seconds? Have you ever cursed your PC under your breath during an audit because you couldn’t find the requested statement or driver history?  If you answered no to the first question or yes to the second, file abbreviations could save you time and aggravation.

Many organizations do not have the expertise, funding or resources to implement an enterprise search engine.  Neatly organizing files in folders can help, however, users may move files to the incorrect location or need to combine them as a set for archiving or distribution.  In this case a file naming convention can ensure the correct files are found quickly.

The most important part of organization is implementing and using a system. Any system is better than none. A system of specific yet easily followed procedures gives consistent results.  If you don’t use file abbreviations as part of your file naming system, consider the benefits. If you do use them, consider enhancing them.

The concept of file abbreviations is not new. The FBI uses them as well as the Canadian CAIPS (Computer Assisted Immigration Processing System) as well as many workplaces, organizations and departments. Text messaging is rife with abbreviations.

Language is always changing. Have you read any Shakespeare lately? I expect our great-great-great grand children will speak in abbreviations and sound like the clickety-clack aliens from the movie District 9. Okay, maybe not …
6
Are you unable to synchronize your OST (Offline Storage Table) file with Microsoft Exchange Server? Is your OST file exceeding 2 GB size limit? In Microsoft Outlook 2002 and earlier versions, there is a 2 GB size limit for the OST file. If the file exceeds this size limit, it may get damaged or may not get synchronized with Exchange Server mailbox. Thus, it may not be possible for you to convert your OST file to a PST (Personal Storage Table) file. This prevents the OST file from being updated. To connect with Exchange Server in such a case, you need to manually Convert OST to PST.

When you attempt to synchronize the OST file, which is larger than 2 GB in size, with Exchange Server mailbox, the OST file will not accept more data and you encounter the below error message:

Errors in background synchronization. 
   In most cases, more information is available in a synchronization log in the
   Deleted Items folder.

Open in new window


Furthermore, the following entries are logged in the synchronization log of Microsoft Outlook Express, which is located in the Deleted Items folder:

15:19:28 Synchronizing Mailbox '<username>'
15:19:28 Synchronizing Folder 'Outlook Security Settings'
15:19:28 Error synchronizing folder
15:19:28 [8004060C-53F-0-550]
15:19:28 The OST has reached its maximum size.  To reduce the amount of data in this OST,
     start Outlook in offline mode, select some items that you no longer need, permanently
     (press SHIFT + DEL) delete them, then re-sync this folder.

Open in new window


After the above behavior of Microsoft Outlook, synchronization and OST to PST conversion processes are terminated.

Grounds of the problem:

The OST files are limited to 2 GB in size in Microsoft Outlook 2002 and earlier versions. When you attempt to add more data to the file, it may get damaged and become completely unusable.
 
Resolution
0
 
LVL 74

Expert Comment

by:Glen Knight
Comment Utility
An indication of how to upload the PST to Exchange would be useful here.  It's not automatic as has been suggested.

There is also the issue of why the OST is above 2GB.

As the OST file is a direct copy of the Exchange mailbox then unless the mailbox data is reduced the issue will re-occur.

In my opinion OST conversion unless for the purposes of data recovery when the original mailbox store is unavailable is a waste of time and money.  It does not resolve the issue it simply delays it short term.
0
 
LVL 51

Administrative Comment

by:Mark Wills
Comment Utility
Hi Jenny,

You can have a blog link in your profile. You can even have it in an Article.

When the content is your own product you need to take special care that it is not advertising just your product. I there is a scenario whereby your product is ideally suited to solve, then write about the problem, you can mention your product, but need to mention the choices as well without prejudice and without bias.

What we cannot do is allow the impression that this is the only solution (and therefore buy this product).

Your "resolution" suggests that the reader must go and buy your product if it cannot be repaired. That is both a little misleading and not absolutely dependant on a third-party solution. That section starts out fine, just finishes with one eye opened.

Also, you have a duty of disclosure to let all the readers know that you do work for the company. That way they are fully informed.

So, maybe take out the direct link to your product and mention it in terms of "When all else fails you might need to use a third-party product. One such product is ... " 

Then include some "Further reading from Microsoft : http://office.microsoft.com/en-us/outlook-help/scan-and-repair-corrupted-outlook-data-files-HA010075831.aspx and http://support.microsoft.com/kb/842284 ".

Then finish up with your disclaimer saying something like "I do work for a company (Stellar) that does provide third-party products for these types of situations  (such as the one mentioned above). For more discussion about these problems, you can read my blog at : ..."  You get kind of a link to your product site, but it is now no longer a direct link.

As for technical accuracy, I will leave that in the very very capable hands of alanhardisty. Even if you do follow some of the suggestions above, you will still need to satisfy Alan as to your Advertorial content and technical accuracy for this to be published. Alan is your Lead PE and also a Subject Matter Expert in this area. I am not.

My objective was to simply clarify matters regarding advertising for you (and suggest some strategies that have worked previously). This would also apply to your other Article. You last comment (in that other Article) helps position a scenario that makes it a slightly more compelling article. Again, Alan is your PE on that Article as well, so his guidance and advice will equally apply.

You should familiarise yourself with the Terms Of Use : http://www.experts-exchange.com/termsOfUse.jsp and the Article Guidelines : http://www.experts-exchange.com/articlesGuidelines.jsp

Regards,
Mark Wills
Page Editor
0
There are 2 things you must have in order to connect to the internet behind a router, The "Gateway IP" of the router, which is usually something like 192.168.xxx.1, I've seen routers with default values of: 192.168.0.1,
192.168.1.1,
192.168.11.1,
192.168.100.1, and others.

While it is POSSIBLE to use other combinations with some routers, (i.e. 127.0.0.1, or 192.255.255.1) I highly recommend against it unless you are hiding military secrets from the President of the Universe (please see: Hitchhikers Guide to the Galaxy) and want to spend extra time researching complex arrays of network submasking and network security. using 192.168.XXX.1 will save you a lot of time, and make your network more available to more users, much much more easily.

Don't be intimidated by the numbers, all its doing is using a certain "block" of IP addresses. I like to use 192.168.11.1, (I'm a fan of BUFFALO TECHNOLOGIES wireless products) so since I use that "11" in the 3rd place from the left as my Gateway IP, I will use:
192.168.11.2 as my "Static IP Address Assignment" in my Network Properties.

So in Summary,

1) Log into your routers configuration page via your web browser. In the address bar, type in http://192.168.11.1 (or whatever your Gateway IP Address is, usually its written on the box the router came in, or in the documentation for the router itself.

NOTE: Many times, a router (even with wireless capabilities) will require a "wired" or "hardline" connection with a Cat5 …
1
If you build your web application in Visual Studio you'll get at least a few binaries, or .DLL, files in your bin folder. However, there is more compiling to be done. Normally this would happen when an ASP.NET resource within the web site is requested for the first time after restart.   You can avoid this first-time-access compilation by deploying your web application in a precompiled state!

Precompile your web application before deployment

When you precompile your web application the following takes place:

All markup files (.aspx) are stripped of their content
All web service files (.asmx) are stripped of their content
All code-behind files (.cs) are removed
All user control files (.ascx) are removed

This means that you will be able to deploy your website entirely without readable markup or source code.

You still need all the markup files in the correct places, but they will no longer contain any actual markup.  So, in the future you won't have to worry about updating .aspx files - unless new ones have been added to the web application.

How to precompile your website

In order to precompile your web application you need to use a simple command prompt command. If you wanted you could add this command to a post-build event to automate the process.

The precompilation is carried out by the aspnet_compiler executable located in your .NET installation folder. If you …
0

Windows XP

118K

Solutions

78K

Contributors

Microsoft Windows XP is the sixth release of the NT series of operating systems, and was the first to be marketed in a variety of editions: XP Home and XP Professional, designed for business and power users. The advanced features in XP Professional are generally disabled in Home Edition, but are there and can be activated. There were two 64-bit editions, an embedded edition and a tablet edition.