Friday, May 25, 2012

Now Remove New folder.exe or regsvr.exe or autorun.inf virus

I want to tell you a story, two days back i got affected by this virus very badly as it eat up all my empty hard disk space of around 700 MB .

I was surprised that my most reliable friend Avast, for the first time failed me in this war against viruses but then again avg and bitdiffender also failed against it. This virus is know popularly as regsvr.exe virus, or as new folder.exe virus and most people identify this one by seeing autorun.inf file on their pen drives, But trend micro identified it as WORM_DELF.FKZ. It is spreading mostly using pen drives as the medium.

Well, so here is the story of how i was able to kill the monster and reclaim my hard disk space.

Manual Process of removal

I prefer manual process simply because it gives me option to learn new things in the process.

So let’s start the process off reclaiming the turf that virus took over from us.

1. Cut The Supply Line

a. Search for autorun.inf file. It is a read only file so you will have to change it to normal by right clicking the file , selecting the properties and un-check the read only option
b. Open the file in notepad and delete everything and save the file.
c. Now change the file status back to read only mode so that the virus could not get access again.
d.
e. Click start->run and type msconfig and click ok
f. Go to startup tab look for regsvr and uncheck the option click OK.
g. Click on Exit without Restart, cause there are still few things we need to do before we can restart the PC.
h. Now go to control panel -> scheduled tasks, and delete the At1 task listed their.

2. Open The Gates Of Castle
a. Click on start -> run and type gpedit.msc and click Ok.
b.
c. If you are Windows XP Home Edition user you might not have gpedit.msc in that case download and install it from Windows XP Home Edition: gpedit.msc and then follow these steps.

d. Go to users configuration->Administrative templates->system
e. Find “prevent access to registry editing tools” and change the option to disable.
f.
g. Once you do this you have registry access back.
3. Launch The Attack At Heart Of Castle
a. Click on start->run and type regedit and click ok
b. Go to edit->find and start the search for regsvr.exe,
c.
d. Delete all the occurrence of regsvr.exe; remember to take a backup before deleting. KEEP IN MIND regsvr32.exe is not to be deleted. Delete regsvr.exe occurrences only.
e. At one ore two places you will find it after explorer.exe in theses cases only delete the regsvr.exe part and not the whole part. E.g. Shell = “Explorer.exe regsvr.exe” the just delete the regsvr.exe and leave the explorer.exe

4. Seek And Destroy the enemy soldiers, no one should be left behind
a. Click on start->search->for files and folders.
b. Their click all files and folders
c. Type “*.exe” as filename to search for
d. Click on ‘when was it modified ‘ option and select the specify date option
e. Type from date as 1/31/2008 and also type To date as 1/31/2008
f.
g. Now hit search and wait for all the exe’s to show up.
h. Once search is over select all the exe files and shift+delete the files, caution must be taken so that you don’t delete the legitimate exe file that you have installed on 31st January.
i. Also selecting lot of files together might make your computer unresponsive so delete them in small bunches.
j. Also find and delete regsvr.exe, svchost .exe( notice an extra space between the svchost and .exe)

5. Time For Celebrations
1. Now do a cold reboot (ie press the reboot button instead) and you are done.
I hope this information helps you win your own battle against this virus. Soon all antivirus programs will be able to automatically detect and clean this virus. Also i hope Avast finds a way to solve this issues.
As a side note i have found a little back dog( winpatrol ) that used to work perfectly on my old system. It was not their in my new PC, I have installed it again , as I want to stay ahead by forever closing the supply line of these virus. You can download it form Winpatrol website.

Pakistan Launched Its First Search Engine "Raftaar"


 Pakistan’s first local search Engine “Raftaar Pakistan” has been launched in the country with the aim to facilitate internet users to explore filtered and Pakistan-based content rapidly.


Pakistan Telecommunication Authority (PTA) has designed this online search engine (www.pakistan.pk/search) that will entertain a particular search string by fetching the relevant information from websites registered under .pk ccTLD.

Raftaar Pakistan is expected to catch the attraction of broadband internet service providers in order to encourage and promote local search facility.

PTA would welcome to work with Broadband services providers to host Raftaar. Besides, PTA launched various application services on its online national rabta portal (www.pakistan.pk). The primary focus behind the launch is to assist local Internet users in retrieving various information specific to Internet resource information and content of the country.

National Whois application will help the user to access ownership and management information of an IP address of Pakistan. The Whois service is linked up with APNIC (Asia Pacific Network Information Center) database.

ICT rabta pages service will assist a user to retrieve contact and general information about ICT industry of the country whereas educational portal service will help the students and general community to access information regarding public & private educational institutes, scholarships and skill development programs available in the country.

FTP and SFTP

FTP (File Transfer Protocol) is an older protocol for moving files back and forth over the Internet and other networks. All modern web browsers still speak FTP, which was sometimes used as a substitute for HTTP in the early days of the web. FTP is still used often as a means of downloading large files.

Many web hosts still offer FTP as the preferred way of uploading new web pages to a website. However, because there is no encryption of your password, FTP is not the best choice for this purpose. And since there is no encryption of the files being moved, FTP is a poor choice indeed for more sensitive information.

SFTP (Secure FTP) is a popular replacement. Built on SSL, SFTP is just as secure as HTTPS. And most modern FTP clients, such as the free, high-quality FileZilla program for Windows, support both FTP and SFTP. SFTP offers a set of features quite similar to FTP and will be immediately familiar to FTP users, although it works quite differently "under the hood."

Every Windows, MacOS X and Linux system comes standard with a simple command line FTP client program. And MacOS X and Linux also have command line SFTP clients as standard equipment. In addition, MacOS X supports connections to FTP servers in a user-friendly way, right out of the box (you can find a great tutorial on creativemac.com).
Binary Mode and ASCII Mode in FTP
"Classic," non-secure FTP can move files in two major ways: "binary mode" and "ASCII mode." Binary mode just moves the file down the wire without modifying anything... and this is, almost always, what we want today.

"ASCII mode" is sometimes used for plain-text (usually, .txt) files. ASCII mode, named for the American Standard Code for Information Interchange which determines what byte stands for each letter, number or other character in text, corrects for differences in the way line endings are stored in text files. Windows traditionally uses a carriage return (represented by an ASCII value of 13) followed by a line feed (represented by 10). Unix typically expects just the line feed. And MacOS, at least prior to MacOS X, preferred a carriage return only.

Today, though, most text-editing and viewing programs can view text files that follow any of these three conventions (including Microsoft Word, and the free WordPad program that comes with Windows, but excluding a few annoying holdovers like Windows Notepad). So ASCII mode doesn't do us much good. These days ASCII mode is mostly an annoyance, something people accidentally leave on in a very old fashioned command-line FTP program, or accidentally turn on in a newer one. And when you're moving a program, an image or anything else with an exact file format that must not be modified, that means you get garbage instead of the file you wanted.

The norm today is for FTP to simply ship files unchanged in binary mode.

Once upon a time there was also something called "TENEX mode," to move files between computers that didn't even use the same number of bits to represent a byte. Yes, FTP has been around that long! But TENEX mode doesn't come up as an issue these days, and we're all happier for it.

Preparing to Move Hard Drive to Another Computer


To remove the devices from device manager when taking a HD from one computer to another,simply:

Run Regedit
Go to HKEY_LOCAL_MACHINE\ and delete the Enum section

This removes all of the hardware specific settings

Allowing Network Access with Blank Passwords (XP and Vista)

Although you can log in locally without a password, by default, WindowsXP Pro does not allow network users to access the computer without a password. Typically you will receive an Unknown error 31 if this is the case.
To change this setting:

Run gpedit.msc

Go to Computer Configuration / Windows Settings / Security Settings / Local Policies / Security Options

Double click on Accounts: Limit local account use of blank passwords to console login only
Disable this option

====> Differences of GSM, GPRS, UMTS and HSDPA <====

1. GSM: 2G Europian standard and the first digital mobile system. It offers only
circuit-switched traffic (i.e voice calls,
SMS...etc) and data transfer at very low
bitrates 9.6kbps.

2. GPRS: also reffered to as phase 2+. It offered packet-switched traffic with
new network components integrated
over the existant GSM core network.
This allowed data bitrates to increase
to 171kbps. It is also considered as the
first step towards 3G networks.

3. EDGE: It was made to cover the delay of delivery of 3G/UMTS network.
It supported data rates upto 384kbps.

4. UMTS: the first 3G Europian standard network. It is the optimal solution for
GSM operators to support 3G services.
The Air interface technique used for
this network is WCDMA. This technique
allowed data rates to reach 2Mbps.

5. HSDPA: It is actually a software upgrade to the UMTS network using
the same air interface technique used
in UMTS (WCDMA) and supporting data
rates upto 10Mbps.

Q: Why is my internet connection intermittent despite full HSDPA signal?
A: The service that you receive on your connection depends partly on how
busy the network is. Voice and text
users take priority over dongle (data)
users, so when the network is
particularly busy, data speeds may be
slow even though signal strength is high. Conversely when the network is
not busy, you may get fast data speeds
although you barely have a signal.
Unfortunately you can only influence
this aspect of service by connecting at
less sociable hours.

Difference Between Core i3, Core i5, Core i7

Difference Between Core i3, Core i5, Core i7

Difference between Core i3, Core i5 and Core i7

Intel will stop selling Core 2 Duo and Core 2 Quad in 2010. Core is the new range of Intel processors.

Core i3:
* Entry level processor.
* 2-4 Cores
* 4 Threads
* Hyper-Threading (efficient use of processor resources)
* 3-4 MB Catche
* 32 nm Silicon (less heat and energy)

Core i5:
* Mid range processor.
* 2-4 Cores
* 4 Threads
* Turbo Mode (turn off core if not used)
* Hyper-Threading (efficient use of processor resources)
* 3-8 MB Catche
* 32-45 nm Silicon (less heat and energy)


Core i7:
* High end processor.
* 4 Cores
* 8 Threads
* Turbo Mode (turn off core if not used)
* Hyper-Threading (efficient use of processor resources)
* 4-8 MB Catche
* 32-45 nm Silicon (less heat and energy)