Tuesday, November 22, 2011

Task Manager Bar - missing tabs?

If your tabs on your task manager are missing here is the fix....normally it is due to GUI from something else running on your computer that is limiting the view...
READY?

Control>ALT>Shift
Open Task Manager from Desktop toolbar on bottom of the screen
Right Click..... "start task manager"


now you view should be restored....

Monday, November 14, 2011

Router Firmware Upgrades

There seems to be alot of issues out there when updating your firmware versions to the latest via the manufacturers website....

The biggest issue is make sure you are upgrading using the computer with the ETHERNET connection only and not from one that is using a wireless connection.

And of course make sure it is the right firmware version for your unit or you could end up with a paperweight....

Monday, November 7, 2011

More security issues with Windows- Please Read

While a security update for the Critical zero-day vulnerability in Windows kernel exploited by the Duqu malware is not yet available, Microsoft has reacted quite fast to enable customers to at least deploy a temporary solution until it releases an official patch.

The automatic fix currently being offered to all Windows users comes to introduce a workaround capable of blocking Duqu from exploiting the TrueType Font Parsing Vulnerability (CVE-2011-3402).

The security hole resides in the Win32k TrueType font parsing engine, and is caused when a Windows kernel-mode driver handles the TrueType font type improperly, Microsoft explained.

“An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. The attacker could then install programs; view, change, or delete data; or create new accounts with full user rights,” the software giant said.

“We are aware of targeted attacks that try to use the reported vulnerability; overall, we see low customer impact at this time. This vulnerability is related to the Duqu malware.”

The Microsoft Security Advisory (2639658) and KB 2639658 have been published on November 3, 2011 to provide additional information to customers, guidance on how to protect themselves against potential attacks and the workaround the Redmond company put together.

“To make it easy for customers to install, we have released a Fix it that will allow one-click installation of the workaround and an easy way for enterprises to deploy,” the software giant said.

Customers looking to render Duqu incapable of exploiting the Critical 0-day TrueType Font Parsing vulnerability need to install Microsoft Fix it 50792.

“When you run the Enable fix it solution, the workaround denies the system access to the T2embed.dll file,” the company informs.

The software giant is also supplying Microsoft Fix it 50793 to disable the changes introduced by Microsoft Fix it 50792.

The Fix it automatic solution is a viable workaround that can be deployed until Microsoft patches the TrueType Font Parsing security issue. According to the company, a security update won’t be released next week with the rest of its monthly patches for November.

“Given our ability to detect exploit attempts for this issue, we are able to closely monitor the threat landscape and will notify customers if we see any indication of increased risk,” revealed Jerry Bryant, group manager, Response Communications Trustworthy Computing Group.

“As previously stated, the risk for customers remains low. However, that is subject to change so we encourage customers to either apply the workaround or ensure their anti-malware vendor has added new signatures based on the information we’ve provided them to ensure protections are in place for this issue.”

Windows Live - More Scam- Please Read

Microsoft has warned customers using its web properties, including services associated with Windows Live such as Hotmail, of a new phishing attack designed to steal their sensitive data.

The scam involves a social engineering technique in order to trick users into handing over their account information.


The unsolicited email message claims to be coming from Windows Live Customer Care, although the email is signed by the Windows Live Hotmail Team.

It’s this, and other discrepancies, that should alert users that there’s something seriously dodgy with the email in their inbox.

Attacks resort to attempting to scare Windows Live customers, bogusly threatening them with shutting down their accounts, unless they confirm them.

“This Email is from Windows Live Customer Care and we are sending it to every Windows Live MSN Email Accounts Owner for safety. we(!) are having congestions due to the anonymous registration of Windows Live MSDN accounts so we are shutting down some Windows Live MSN accounts and your account was among those to be deleted,” reads an excerpt from the spam email used in the phishing attack.

“We are sending this email to you so that you can verify and let us know if you still want to use this account.”

Users are ill-advised to hand over all sorts of sensitive data, including username, password, date of birth and the country or territory they reside in.

Phishing spam
Enlarge picture
The spam sports a number of evident typos, as such emails often do, and this should be enough to make recipients suspicious as to the email’s legitimacy.

“The bogus email claims to come from Microsoft and asks the recipient to respond to the email with their user name and password to avoid permanent cancellation of their account. This is a scam. Microsoft never asks for user names and passwords in an email,” reveals Microsoft’s Chris Stetkiewicz.

Users should never reply to such messages, and they should never, under any circumstances hand over sensitive info such as the username and password for their accounts.

Wednesday, November 2, 2011