Wednesday, April 30, 2008

How to beat spyware and viruses, 2008 edition

The last time I wrote a piece on how to remove spyware from your computer was in 2006. Time for an update, I think. Here's my perennial "How to Beat Spyware" howto, revised and updated for 2008 (and combined into a single file instead of two parts).

Here's what to do if you suspect an infection on your Windows PC. (Please note these steps apply to both Windows XP and Vista.)

1) Are you sure it's spyware or a virus? Windows pop-ups and alerts can often seem invasive enough to be viruses, especially with Vista. Try searching the web for the exact text you see on the screen to make sure you aren't dealing with an aggressive Windows message. (Many of these can be turned off, so try whatever instructions you find.) On the other hand, some viruses masquerade as Windows alerts, so tread lightly.

2) Boot in safe mode. If you have a virus, first step is to try booting in safe mode. You can get to safe mode (a simplified version of Windows that disables a lot of extra gunk, possibly including some spyware apps) by restarting your PC and tapping F8 during boot. Soon you'll get a menu of options. Select "Safe Mode" (it's at the top of the menu) and wait for the machine to fully boot. The system will look funny (with a black background and larger icons, probably), but don't worry about it. This is only temporary. (Also note that many spyware applications can disable safe mode, so if you find this doesn't work, just boot normally.)

3) Run your antivirus application. This is of course assuming you have an antivirus application. (Need one? Check here.) You're in safe mode now, so run a full scan of your PC at maximum security levels (include the option to scan within compressed files, for example). This will probably take an hour or more, so be patient. Fix any problems the virus scan turns up. Then reboot into safe mode again using the procedure in step 2.

4) Run one or two anti-spyware applications. I used to recommend running multiple anti-spyware apps, but virtually all antivirus apps now do a pretty good job at getting rid of spyware too, so you don't need an army of additional applications just for spyware. Also, I now recommend starting with AdAware (which is free) and moving on to Spyware Doctor (free as part of the Google Pack) if you feel you need additional help. (Please note that recent versions of Spyware Doctor and Norton Antivirus have some trouble with each other.) You can try other apps too, but the once-recommended SpyBot Search & Destroy is no longer very effective, sadly. (Neither is Microsoft's own Windows Defender.) Of course, fix anything and everything these apps find.

5) Reboot normally. (Not in safe mode.) Now take stock. Still got spyware? It's time to move along to my more advanced techniques for removing the nasties.

6) Run HijackThis. HijackThis is a free software tool that scans your computer to find malware that other apps might miss. Scroll down to "Official downloads" to download the tool. Next, simply open the ZIP file you downloaded, extract the application, and run the tool (you don't need to install it). Click the "Do a system scan and save a logfile" button. You'll receive a large text file as well as a dialog box which gives you a list of active software processes, which you can then choose to delete. Unfortunately, this list includes both helpful and unhelpful software, so don't just start deleting items. Continue in step 7 to figure out how to fix your spyware infection.

7) Post your log file online. Visit this page, which offers a list of forums staffed by volunteers who can help you interpret your HijackThis log. The SWI Forums are especially busy, but most of the forums on the list are equally apt. Go to SWI and visit the "Malware Removal" forum which has over 50,000 topics listed: Those are all people like you who are seeking help getting rid of spyware. Register for an account, read the FAQ, then visit that Malware Removal forum, and post a new topic. Paste the content of the text file you created in step 5 into this topic and (politely) ask for help. You will get a response from a volunteer helper, typically within 3 days. You'll be given specific advice on what entries to remove with the HijackThis tool, and you might be pointed to additional software to run to help remove common spyware infections. Follow all the instructions and keep working with the forum helpers until either you or they give up. (And no, don't send your log file to me or post it here. I am not nearly the spyware removal expert that these guys are.)

7a) Alternately: Paste your log file into an automated tool. Don't have three days? Try simply pasting your HijackThis log file into this form. It does a pretty good job at auto-analyzing what's wrong with your machine, with no waiting. As well, if that doesn't work, you can search for the items you find in the HijackThis log by name to see what they are and how to remove them, if they're spyware. This can be quite time consuming, though.

8) Try System Restore. If that doesn't work, you might try running Windows System Restore to roll back your OS to a time before the infection happened. This isn't foolproof: You might not have System Restore turned on, or the spyware might have shut System Restore off, as well. But it's worth a shot. With either XP or Vista, System Restore can be found under Start > All Programs > Accessories > System Tools > System Restore.

9) Give up and wipe your hard drive. At this point, you've exhausted all the options I know of. You might try again at steps 6/7 to make sure you've done everything you can to salvage the PC. Forum helpers will often work with you for weeks to help fight a spyware infection, but there are tens of thousands of possible variants out there, with new ones cropping up every day. It's just not possible to clean them all, every time. Sometimes the only thing you can do is call it quits, reformat your hard drive, and reinstall your OS. Again, make sure you have your backups ready and verified. Once you're up and running, reinstall your antivirus and anti-spyware applications, and stay vigilant against infection. Good luck.

Thursday, September 14, 2006

Windows Internet Explorer (ie) Okay? --> Which Browser is better?


Much criticism towards Internet Explorer is related to concerns about security:

Much of the spyware, adware, and computer viruses across the Internet are made possible by exploitable bugs and flaws in the security architecture of Internet Explorer, sometimes requiring nothing more than viewing of a malicious web page in order to install themselves, this is known as a Drive-By Download, some attempt to trick the user into installing them by mis-representing the software's true purpose in the description section of the ActiveX security alert.

While Internet Explorer is not alone in having exploitable vulnerabilities, its ubiquity has resulted in many more affected computers when vulnerabilities are found. Microsoft has not responded as quickly as competitors in fixing security holes and making patches available. Not only are there more security holes discovered in Internet Explorer, but these vulnerabilities tend to remain unpatched for a much longer time, in some cases giving malicious web site operators months to exploit them before Microsoft releases a patch.

Several companies maintain databases of known security vulnerabilities that exist in Internet Explorer, for which no fixes have been published by Microsoft. As of May 28, 2006, Secunia reports 104 vulnerabilities in Internet Explorer, 18 of which are unpatched, some of which are rated moderately critical in severity[17]. In contrast, Mozilla Firefox, the main competitor to Internet Explorer, is reported to have only 34 security vulnerabilities, of which 3 remain unpatched and rated less critical[18]. Opera, another competitor to Internet Explorer, has 15 vulnerabilities and none of them remain unpatched.

In May 2006, PC World rated Internet Explorer 6 the eighth worst tech product of all time.

Simply installing and using another browser does not prevent third party programs and core operating system components from using IE libraries. Thus, a user who does not use IE to browse the Web can still be targeted by attacks against vulnerabilities in these libraries—for instance, via Outlook Express or the Windows Help subsystem. However, removing the IE libraries will cause these programs, and other software which depends upon them, to cease functioning or even to crash the system.

Main article: Removal of Internet Explorer
Further information: Usage share of web browsers
Windows Internet Explorer: http://www.internetexplorer.com/

Comments:
I have been using IE for years and the performance is under my expectation. Furthermore, many problems like Pop-up advertisements, Spyware..... have been started to attack my PC. One of the main factor of crashing my PC recently was due to IE.

When IE problem occurred, I have decided to use other Website Browser like Netscape and Mozilla FireFox. I learned that, other browser didn't cause me the same problems like Pop-up...so and so. So what is Microsoft doing? What should we do? Continue using IE or Stop?

I think there are many reasons of people attacking IE, one of the main reason is its popularity. When you have planned to attack someone make sure the "bom" hit the important areas right? Other reasons, maybe IE is part of Windows, where Windows will not working or instable if IE dead.

So, My recommendation to you is not to use IE for browsing the internet. The award-winning, free Web browser is better than ever. Browse the Web with confidence - Firefox protects you from viruses, spyware and pop-ups. Enjoy improvements to performance, ease of use and privacy. It's easy to import your favorites and settings and get started. Please try to install Third part Netbrowser as follows:

Mozilla FireFox: http://www.mozilla.com/firefox/

Netscape: http://browser.netscape.com/ns8/

Opera: http://www.opera.com/index.dml

Wednesday, September 13, 2006

What is Computer Virus?

In computer security, computer virus is a self-replicating computer program that spreads by inserting copies of itself into other executable code or documents. A computer virus behaves in a way similar to a biological virus, which spreads by inserting itself into living cells. Extending the analogy, the insertion of a virus into the program is termed as an "infection", and the infected file, or executable code that is not part of a file, is called a "host". Viruses are one of the several types of malicious software or malware. In common parlance, the term virus is often extended to refer to worms, trojan horses and other sorts of malware; viruses in the narrow sense of the word are less common than they used to be, compared to other forms of malware.

While viruses can be intentionally destructive, for example, by destroying data, many other viruses are fairly benign or merely annoying. Some viruses have a delayed payload, which is sometimes called a bomb. For example, a virus might display a message on a specific day or wait until it has infected a certain number of hosts. A time bomb occurs during a particular date or time, and a logic bomb occurs when the user of a computer takes an action that triggers the bomb. The predominant negative effect of viruses is their uncontrolled self-reproduction, which wastes or overwhelms computer resources.

Today, viruses are somewhat less common than network-borne worms, due to the popularity of the Internet. Anti-virus software, originally designed to protect computers from viruses, has in turn expanded to cover worms and other threats such as spyware, identity theft and adware. Included in the many types of viruses are:

Trojan horses
A Trojan horse is just a computer program. The program pretends to do one thing (like claim to be a picture) but actually does damage when one starts it (it can completely erase one's files). Trojan horses cannot replicate automatically.

Worms
A worm is a piece of software that uses computer networks and security flaws to create copies of itself. A copy of the worm will scan the network for any other machine that has a specific security flaw. It replicates itself to the new machine using the security flaw, and then begins scanning and replicating anew.

E-mail viruses
An e-mail virus will use an e-mail message as a mode of transport, and usually will copy itself by automatically mailing itself to hundreds of people in the victim's address book.

Read more click here: http://en.wikipedia.org/wiki/Computer_virus
"Why people write computer viruses", BBC News, date.

Comments:
As long as you don't open a file from unknown source and attached file from Email, you should be safe or free from infection? Not at all, Beware of opening attached file with exe, doc, xls, they can be hided .EXE files for you. As I told you before, most of the ANTIVIRUS Software will not clean your PC completely. There is no ending of infection as long as your PC has installed one of those Antivirus software.

Reminder: All AntiVirus, AntiSpyware, AntiAdware.........are all Rubbishware, DON'T BE FOOLED by them!!!

Also, Antivirus software doesn't removed the program (TROJAN or WORMS) in your PC they just rename the EXE or stop the program by modifying the active file. Therefore it is still recommend you to Reformat the hardisk and reinstalled Windows XP. I believed it is the Cheapest and Clean method. So, please get ready your backup data and prepare for reformat anytime from now.

What is Spyware?


In the field of computing, the term spyware refers to a broad category of malicious software designed to intercept or take partial control of a computer's operation without the informed consent of that machine's owner or legitimate user. While the term taken literally suggests software that surreptitiously monitors the user, it has come to refer more broadly to software that subverts the computer's operation for the benefit of a third party.

In simpler terms, spyware is a type of program that watches what users do with their computer and then sends that information over the internet. Spyware can collect many different types of information about a user. More benign programs can attempt to track what types of websites a user visits and send this information to an advertisement agency. More malicious versions can try to record what a user types to try to intercept passwords or credit card numbers. Yet other versions simply launch popup advertisements.

Find out more click here: http://en.wikipedia.org/wiki/Spyware

Comments:
I have experienced many Popup Advertisement and Warning looks windows. Please remember your PC has no problems and don't select YES or NO but Click only the Upper Right Corner X to close it.

Also, There are many Free Trial AntiSpyware offered on internet. I have tried some in the past and they are all LIAR. After I have installed those softwares on my PC, it become worst than before. I strongly believed that these so-called ANTISpyware or AntiVirus company are actually Spyware or Virus creator. I think this kind of business is worst than a ROBBER.

Finally, I chose to reformat my Hardisk and end the problems.

How to disable or uninstall Windows Messenger

The windows messenger will not appears in the "Add/Remove programs" menu, it's hidden. To unhide the windows messenger please do the next steps:

1. Open the file C:\WINDOWS\INF\SYSOC.INF in the any text editor, such as Notepad.

2. Find the line: msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,hide,7

3. Delete hide,, result should be: msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,7

4. Save this file ( with the same name ).

Now you can uninstall Windows messenger from an Add/Remove programs.

If you have difficulties with this advanced operations, just download this file uninstall-windows-messenger.cmd and double click on it to execute. The windows messenger will be removed.

To install the Windows messenger again, you should download it from an Microsoft website and install it.

Windows XP: How to Backup data?

Case 1: Use Backup to Protect Data

The Backup utility in Windows® XP Professional helps you protect your files and information if your computer fails. For example, you can use Backup to copy the data on your hard drive and archive it on another hard drive, a disk, a CD, a DVD, or another computer. If your hard drive is erased or damaged, you can easily restore the data from the archived copy.

To start the Backup Utility in Windows XP Professional:

1. Open Backup. (Click Start, point to All Programs, point to Accessories, point to System Tools, and then click Backup.)

2. The Backup or Restore Wizard starts by default, unless you disabled it. If the Backup or Restore Wizard does not start by default, you can still use it to back up files by clicking the Tools menu, and then clicking Backup Wizard.

3. Click the Next.

4. In the Window that asks What do you want to do? click the circle next to Back up files and settings. Then click Next.
Choosing what to back up
For most people, the My documents and settings option is a better choice. This selection preserves your data files (including e-mail messages and address books) and your personal settings.
Choose where to store your backup
Under Choose a place to save your backup the default choice is drive A, which is usually your floppy drive (if you have one.) You probably won't be able to backup everything you need to on a floppy. You're best bet would be to click Browse and choose any of the following locations:

  • Your computer's hard disk. The ideal backup location is a separate partition from the one you're backing up. If your hard disk is partitioned into drive C and drive D and your data is on drive C, you can safely back up to drive D.
  • An external hard disk drive. These drives are no longer as expensive as they once were and work well as an external backup device.

To learn more about the Windows XP Backup Utility read Backup Made Easy.

Case 2: Copy and Paste to external backup device or CD or DVD
You can always make backup data by simple way, just copy and paste the files, photos, folders,....even the whole programs.

Back Up and Recover Your Information

Comments:
For me, I prefer case 2. I used to copy my important documents and photos to an External storage or Hardisk or CD. Because PC can be damaged by accident or having Hardware problems. It makes me feel comfortable when the copies are the same as my PC. So, make it a habit and you should start backup files now. Making partitions on Hardisk is Highly recommended to prevent any data lost due to Computer VIRUS or Trojans.

Palm: Recover Palm® Desktop software for Windows

In case of your Original Setup CD from Palm has been lost or damaged, you can still recovery your Palm Desktop Software as follow: (Just reinstall this software and safe it at the same Folder or location before)



Installing Palm Outlook Conduits if you do not have the CD that came with your device:
Versions of Palm Desktop available for downloadAt the time of writing there are two basic versions of Palm Desktop on our website:

- Palm Desktop and HotSync Manager 4.1.4: does not include Palm Outlook Conduits.
- Palm Desktop and HotSync Manager 4.1.4E: includes Palm Outlook Conduits. The "E" stands for Extended, meaning that this version of Palm Desktop is intended for devices that have the extended PIM applications.

Help! I need the Outlook Conduits and I don't have the CD.
There are two options for users who don't have the CD that came with their Palm devices.

But the follwoing way is recommended:
Install version 4.1.4E of Palm Desktop with cautionVersion 4.1.4E was designed for devices with extended fields. For example, you can store up to three addresses for a person with the extended PIM fields; on previous devices, you could store only one address. If you install this version of Palm Desktop on an older device, you will only be able to sync with the fields on your Palm device. In this example, although you can store three addresses for a person in Palm Desktop, only the first address will be synchronized with your older device. The extended PIM fields will not sync with the older device.

Examples of extended fields not available on older devices (these may appear in Palm Desktop 4.1.4E but will not sync with older devices):
1) Contacts (Address Book): Picture, Birthday, IM address, Website, more than one address.
2) Calendar (Date Book): Location, Category
3) Tasks (To Do List): Repeating tasks, completion date, timed alarms
4) Memos (Memo Pad): More than 4,000 characters in a memo item

If you install the 4.1.4E version and then uninstall and go back to version 4.1.4, your Palm Desktop user files will no longer be compatible with the older version. These files will need to be regenerated from your device's data.

If you're comfortable with this option, download version 4.1.4E from this site.

Only for reference:
Software Downloads and Updates - For example: Tungsten E
Palm Desktop and HotSync Manager for Tungsten E
Read This -->
Download Palm Desktop for Windows
Please select Handheld/Smartphone model (Tunsten E) and Operating System version (Windows XP) and click Go!
http://www.palm.com/us/support/downloads/windesk414.html
Palm Desktop and HotSync Manager 4.1.4 for Windows DOWNLOAD

Ready to download? Begin here. (42MB file)


The next page will be the End User License Agreement. When you click "I Agree," a file named PalmDesktopWin414E.zip will begin to download.
Download time: Please note, this file is 42MB. On dial-up connections with a 28.8 modem, expect to spend about 30 minutes downloading the software.
Palm Desktop for Windows FAQ


Comments:
I noticed that, after my Windows XP was reinstalled on my PC, my Palm Desktop and HotSync Manager was not working anymore. In my case, I have made a backup data on other partition (Drive: F) just before reinstalling the Windows XP. This problem is due to Windows Setup to Existing Palm desktop software has mismatched, therefore you must resetup the Palm Desktop software again.

There are Two way to do so:
First way:
If you have the Original CD of Palm Desktop (Usually came with the Palm hardware), please insert the CD and Setup or reinstall again (by double click Autorun.exe if it doesn't run automoatically). Follow the rest of the steps until Finish.

Secound way:
In case you don't have the CD. Please download it from Palm official website. If your Palm Handheld is Tungsten E, please click this download version 4.1.4E But, please make sure you have read the above information for confirmation.

Usually, the data which stored in your Handheld Palm hardware should be protected. But for safety issue, it is recommended to make backup data on PC.

After setup your Palm Desktop software on your PC, please restart it and you should do the next step.

Last but not least, please connect your Palm Handheld USB port to your PC and start HotSync for updating the data from your Palm to PC. If the Link is failed, then you should reconfirm the HotSync Setup (Right Click of icon or open Palm Desktop and search for Tool) , click on the port option: COM1 or COM3 or else. My case is COM3 works fine.

Once the HotSync working as usual your plam setup is completed. Don't forget to make a backup or update your backup data.

Handbooks
1) Read This First(PDF: 467KB / 18 pages)
2) Tungsten E Handbook(PDF: 4.1MB / 318 pages)
3) Photos, Music, and Videos Setup Guide(PDF: 361KB / 12 pages)
4) Palm Reader(PDF: 442KB / 34 pages)

Tuesday, September 12, 2006

Windows XP: How to reformat your Hardisk?

How to restore your Windows XP if you buy the Notebook or PC from OEM?
Please confirm the OEM click here: http://oem.windowsreinstall.com/

Example A Compaq Notebook: Compaq Recovery Disk
In case of Compaq with Windows XP Home edition.

Startup your Computer and Press the F10 key during boot at the beginning
or from the Start menu select:


Start > All Programs > Compaq > Compaq PC Tools > Compaq
System Recovery or
Start > All Programs > Compaq > Compaq Presario
PC Tools > Compaq System Recovery or
Start > All Programs > PC Help & Tools > Compaq System Recovery.

Windows® XP will restart (a reminder to use System Restore might appear - click Yes to continue the restart).

The PC will load the Compaq System Recovery. In the recovery program there are 2 methods which can be used to recover the PC:
1) Non-Destructive System Recovery. This should restore the system without affecting the user's data. Please note that the stored user data may not be immediately visible and may be stored in a separate folder on the hard disk within the Documents & Settings folder after recovery. This occurs normally when User Accounts have been used and modified.

Press Next. The user is prompted to try System Restore first. Press Yes. Recovery will now begin.

2) Destructive System Recovery. This method will format the hard drive and remove any personal data and applications. This will use a Quick Format only.

Click Advanced Options from the first recovery screen shown. Press Next to begin.

On starting either recovery method there will be a reminder to use System Restore if possible, click Yes to continue. The Destructive System Recovery will have a final warning about data loss, click Yes.

Recovery Version 1

FULL RESTORE (Reformat your Hardisk and reinstall Windows XP)

Set your Bios so that the first boot device is the DVD

Place your restore disc one in your DVD drive. (Disk from OEM, when you purchase your Notebook)
Restart or start up your computer.
Select Option 4 – Factory Restore
Warning screen will appear, read this and press enter to continue.

System will now restore. When finished you will be prompted to reboot, remove the restore CD and press enter.


OEM - Short for Original Equipment Manufacturer, which is a misleading term for a company that has a special relationship with computer producers. OEMs buy computers in bulk and customize them for a particular application. They then sell the customized computer under their own name. The term is really a misnomer because OEMs are not the original manufacturers -- they are the customizes. (Taken from http://www.webopedia.com/)

WARNING : BEFORE DOING SYSTEM RESTORES, RELOADS, REINSTALLS, ETC, ETC, ALWAYS BACKUP FIRST

Comments:
When you found your PC/Notebook was infected viruses seriously where no ANTIVIRUS softwares can really heal it. I think the only choice you have now is to reformat the Hardisk and reinstall Windows XP. Of course this should be your last move to recover your Notebook or PC.

At this moment, you must be looking for Windows XP or Diskket that might be necessary to reformat and reinstall XP. Unfortunately, you don't find those CD. What should you do?

Auctually, when you purchase the Notebook from OEM (Compaq), they don't provide any Original Windows XP CD for you. Why? Because they use a special CD or programme from Windows and download to your Notebook which provided by Microsoft. Therefore, the only disk that they have provided to you is the System Recovery Disk and it is the same of Windows OS software.

Next, nowadays you don't have to make any Floppy Disk for reformat the hardisk and you can use CD.

There are two cases to reformat your Hardisk and reinstall your Windows XP:
Case 1: You have the Original Windows XP CD (from Microsoft)
Set your Bios so that the first boot device is the DVD (If your Notebook has 2 slots)
Insert the CD --> Reboot/Restart your PC --> Windows XP setup Menu appear --> Select the options (Read it) --> Please keep your Partitions as before (if you already have partitions previous, don't reformat them. Reformat Only C drive is Okay) --> Follow the steps --> Key in the Code 16 units --> Re-register--> Name --> Password --> Until finish. (It will propably takes you about 45 minutes to complete it)

Case 2: Use System Recovery Disk from OEM (Compaq)
Set your Bios so that the first boot device is the DVD (If your Notebook has 2 slots)
Insert the CD --> Reboot/Restart your PC --> Select Option 4 – Factory Restore Warning screen will appear, read this and press enter to continue. (Reformat the hardisk and reinstall Windows XP)


Therefore please keep your System Recovery Disk Safely because you might need it someday. Maybe you should make few copies of CD for backup.

Windows XP: Safe Mode

In safe mode, you have access to only basic files and drivers (mouse, monitor, keyboard, mass storage, base video, default system services, and no network connections). You can choose the Safe Mode with Networking option, which loads all of the above files and drivers and the essential services and drivers to start networking, or you can choose the Safe Mode with Command Prompt option, which is exactly the same as safe mode except that a command prompt is started instead of the graphical user interface. You can also choose Last Known Good Configuration, which starts your computer using the registry information that was saved at the last shutdown.

To start the computer in safe mode

1. You should print these instructions before continuing. They will not be available after you shut your computer down in step 2.

2. Click Start and then click Shut Down.

3. In the drop-down list of the Shut Down Windows dialog box, click Restart, and then click OK.

4. As your computer restarts but before Windows launches, press F8.
On a computer that is configured for booting to multiple operating systems, you can press F8 when the boot menu appears.

5. Use the arrow keys to highlight the appropriate safe mode option, and then press ENTER.

6. If you have a dual-boot or multiple-boot system, choose the installation that you need to access using the arrow keys, and then press ENTER.

Safe mode helps you diagnose problems. If a symptom does not reappear when you start in safe mode, you can eliminate the default settings and minimum device drivers as possible causes. If a newly added device or a changed driver is causing problems, you can use safe mode to remove the device or reverse the change.

There are circumstances where safe mode will not be able to help you, such as when Windows system files that are required to start the system are corrupted or damaged. In this case, the Recovery Console may help you.

Repair overview

Comments:
When your PC infected Viruses or problems occurred, how to protect your important files and photos inside your Hardisk? If you have backup data before then you should be fined, but if you don't, what should you do?

Yes you are right, by using Safe mode. During Safe mode on you can copy the data out and store it somewhere. I am recommending you to have an external storage (Stand alone hardisk) or Removable Disk or to a different Computer for backup your data. It is important to avoid any data lost during Windows restore or setup or further damages caused by those viruses.

Windows XP: System Restore


System Restore works a lot like the Undo command in Microsoft Word. You can use System Restore to remove any system changes that were made since the last time you remember your computer working correctly. System Restore does not affect your personal data files (such as Microsoft Word documents, browsing history, drawings, favorites, or e–mail) so you won't lose changes made to these files.

There are two ways to access System Restore through Help and Support or through your All Programs folder.

Through Help and Support:

1. Click Start, and then click Help and Support.

2. Under Pick a Task, click Undo changes to your computer with System Restore.

3. Follow the instructions on the wizard.


Through the All Programs menu:

1. Click Start.

2. Point to All Programs.

3. Point to Accessories.

4. Point to System Tools.

5. Click System Restore.

6. Follow the instructions on the wizard.

System Restore: frequently asked questions

In order to install and run, System Restore requires at least 200 MB of available space on your hard disk (or on the partition where your operating system folder is located). If you do not have sufficient space available when the operating system is installed, System Restore is installed, but it is not activated. System Restore cannot be turned on until you make at least 200 MB of disk space available. Read more -> Disk Space Issues

Note System Restore does not replace the process of uninstalling a program. To completely remove the files installed by a program, you must remove the program using Add or Remove Programs in Control Panel or the program's own uninstall program. To open Add or Remove Programs, click Start, click Control Panel, and then click Add or Remove Programs.

Comments:
Before install or doing any setting changes, it is recommended to create a Restore point first. When things goes wrong we can always UNDO setting changes by System Restore. Apparently, if your system is clean from any viruses and you have created a Restore point from the beginning then System Restore area should be already protected from any Viruses.

When your PC having problems, you should first try to restore it from System Restore until the problem gone. Select from the recent restore point until the one stable the system. But, if the system failed to restore the previous point, then you might have to TURN OFF System Restore. TURN OFF means Delete all the restore points.

How to TURN ON again check here -> TURN ON To open System Properties, click Start, click Control Panel, click Performance and Maintenance, and then click System. In the System Properties dialog box, click the System Restore tab.

Or To turn on System Restore (Right click My Computer icon)
1.Open System Properties
2.Ensure that the Turn off System Restore check box is cleared

Note: You are not allow to Turn On System Restore during Safe Mode.



Monday, September 11, 2006

First post: Why create this blog?

Hi, thank you for visiting my blog.

I think the first question might come out from you is "Why create this blog?". Actually, My PC was just recovered from problems today (Sept, 11 Y2006), because recently my PC was out of controlled due to Trojan Virus, Spyware, Virus, Adware........

I have tried many kinds of ANTIVIRUS, ANTISPYWARE, ANTI..........but all useless. My PC still having problems after all.

Therefore I wish to record the problems and solutions for the problems on this BLOG, just hope that it will never ever happen to me again.

For your information, I am not an expert on computer either Software nor Hardware. Therefore, I felt helpless while facing such problems. Thanks to my friends who supporting me and had given me some guildeline to solve my PC problems. During the fights of viruses, I have found some websites and downloaded some useful softwares from the internet.

Don't worry I will explain how its happened and how I did to fight with those Viruses.
If you have a better solutions for problems, found a good websites, softwares, or Hardwares and wish to introduce me, please feel free to leave any comments on this blog.

Thank you,

Best regards,
Nelson Loo
(11th-Sept-2006)