June 3, 2010 1:49 PM
Posted by: Ed Tittel
, home network goes on vacation
, Windows networking
When I got up on Monday morning, Memorial Day, my wife Dina let me know she couldn’t access the Internet. “No big deal” I thought to myself: “Either I’ll reset the cable modem or the router and all will be well.” Not only was that wrong, wrong, wrong, but unbeknownst to me, I was about to embark on a network troubleshooting adventure of epic proportions. In fact, this adventure is still underway, and will continue later this morning, when Daryl Giles of Austin Advance Technology shows up with his cable testing gear and some replacement parts ranging from in-wall Cat 6 UTP cable to new swap-ins for my punchdown block and network interface patch panel. Sigh.
I did the easy stuff right away — reset the cable modem and the router — and fully expected my problems to be resolved. Not so. “Great!” I figured: “Let’s see what’s up with the network clients.” A quick look at the network status on my primary desktop showed that the network interface was trying to use an APIPA (Automatic Private Internet Protocol Addressing) IPv4 address, which from long experience I know means that the client can’t access a DHCP server. That server runs on the router, so my first thought was that the router had gone south. Jump in the car, drive to Fry’s (thank goodness we have one within 15 miles of my house — where else can you buy an 802.11n/router/firewall box on Memorial Day?), pick up a replacement router, drive back home.
After bringing up a new router, I *still* couldn’t get a DHCP address from the router. My next thought was: “Drat! The cable modem has failed.” Nothing I could do to fix my problem until early the next morning when I could visit my nearby Time Warner service office (just over 3 miles from my house) and swap out my 4-year-old Scientific Atlanta WebSTAR for the now-Cisco-branded 2203C cable modem with phone jack that has replaced the older unit in the interim. After taking the box home, and spending some time on the phone with Time Warner tech support to get everything properly provisioned and working correctly, I was forcibly struck with the realization that some element within my in-home cabling was causing the problem.
Here’s how I finally figured this out: To follow the installation instructions for the router, I had to haul a notebook PC into the master bedroom closet where our wiring center is installed, then cable the PC directly up to the cable modem to launch the router install software (It requires an active connection to the Internet to work properly). I simply ran a 1.5m RJ-45 Cat6 cable from the router to the notebook to do this (you can’t use wireless until the wireless network is setup and configured, of course). This worked fine, after I used the netsh winsock reset command to clear out the detritus of the APIPA setting and restarted the notebook so those changes would take. I happily spent the next 20 minutes or so getting the wired and wireless sides of my home network reconfigured, fully convinced that my troubles were over. No joy!
On the other end of my in-wall wiring, none of the machines attached to the RJ-45 wall plates could access the router to obtain a DHCP address, so they were effectively knocked off the wireless network. I switched some key machines (an HP notebook that Dina is now using for her regular daily computing tasks, and my primary desktop which has an Airlink 101 USB Wireless N 150 network interface filling in for the usual GbE RealTek PCI interface I normally use for network access on that machine) over to wireless so I could get back to work, and called a network consulting company to bring in a cabling technician to check out my home wiring plant.
Right now, I am also using a 100 foot Cat5e cable to hook up my other notebook — my traveling machine, a Dell D620 that’s still running Vista Business because I haven’t gone through the uninstall/reinstall process to move Adobe Premiere from that machine to the newer HP notebook that Dina is using right now. I can’t establish a DHCP connection from scratch using that cable (GbE at 350MHz won’t work beyond 80 feet or so), but because I simply unhooked the 1.5m cable from the Dell while it was in my closet, then attached the hundred footer to its RJ45 port, it can use the DHCP address it already has assigned. Ironically, this machine is 802.11g only, and I don’t want to sacrifice bandwidth by running the router in dual-band mode, so it’s the only machine that currently has full-speed Internet access in the house.
I have to believe that because the punchdown block and network patch panel are the only network components in common among the 4 RJ-45 wallplates in the house, none of which will now resolve DHCP, that the problem has to lie somewhere inside or between those devices. When Daryl gets here later this morning, we’ll figure it out. It’s enough to make a guy like me think more seriously about plopping down the $1K or so it would cost to buy a Fluke Ethernet cable tester. I know it’s got to be an attenuation problem somewhere along the way, but until we can check all the cables and connections (including the patch panel and punchdown block) there’s just no way to figure out what has to be fixed or replaced to get things working again. What I can’t understand is why it just popped up out of nowhere, 4 years after I installed this network which had worked flawlessly until Monday morning, without positing a failure of some kind in one of those components. The cable guy thinks it’s a lightning-induced problem (we had a major thunderstorm on Sunday night) and the networking guy thinks it’s bad cabling. I want to find out for sure what it is, and fix it!
I’ll follow up — hopefully, tomorrow — to report on what we learn and how we fix my situation. Stay tuned!
May 27, 2010 3:47 PM
Posted by: Ed Tittel
replacing 64-bit Java Runtime Environment
, Secunia CSI
, Secunia PSI
, Updating 64-bit Windows from JRE 6 update 15 to JRE 6 update 20
If you read this blog, you know I not only think highly of the various Secunia software monitoring products available — I use Secunia Personal Software Inspector (PSI) for my personal machines, and recommend the Secunia Corporate Software Inspector (CSI) for workplace use — I also use and work with them at least weekly. That’s how often I auto-scan my HP server, and the four desktops and four notebook PCs I have at my disposal right now.
This morning, when I ran my weekly scan, Secunia informed me that the Java Runtime Environment 6.15… was now out of date, so I went off to download the latest version. Out of habit I used Revo Uninstaller to remove the JRE from my machines knowing that manual uninstall is required to get old versions of Java out of the way so that new ones can be installed in a pristine setting. Out of habit I reached for my favorite uninstaller, Revo Uninstaller. It worked fine on my 32-bit Windows 7 systems, but I hit a snag on my 64-bit systems (Revo Uninstaller does not provide access to the 64-bit JRE, though it is happy to work with the 32-bit version on either 64- or 32-bit systems).
I did a hurry-up manual uninstall (removed the Java direcotory in the Program Files directory, and a quick purge of Java related Registry settings). But when I downloaded and installed a new 6.20… JRE, though the 32-bit version installed without a hitch, the 64-bit version threw error 1327 “Unable to find a necessary DLL.” After trying a restore point and researching various possible fixes on the Internet (of which there are plenty, but alas none of which worked for me), I took advantage of my nightly backup to restore the Java directory I’d trashed as part of my hurry-up manual uninstall manuevers, then tried to install the new 64-bit JRE 6.20… This time, I was successful, to my great relief.
It reminds me that you have to make sure your tools are 64-bit savvy when working on 64-bit systems. As a little additional investigation showed me quickly and directly, had I simply chosen to use the Programs and Features item in Control Panel to extirpate the original 6.15… JRE, I would have been able to install the 6.20… version without difficulty. That’s why it’s always important to remember what you’re doing, and what tools you’re working with when adding or removing software from a Windows machine. Hopefully, you can learn from this (minor) foul-up on my part!
May 25, 2010 1:32 PM
Posted by: Ed Tittel
great price-perfromance from Nitro PDF products
, new Nitro PDF Pro
, new Nitro PDF Reader
, Nitro PDF products fast compact secure
How often does life hand you an opportunity you’d jump on hard, with both feet, if given the opportunity to do so? For me—and I suspect for most of us–the answer to that question has to be “Not very often.” That’s why I found myself at first pleasantly surprised last week, then completely blown away, when asked to look at a forthcoming new software release. I’m talking about the Nitro PDF product family, especially their free Nitro PDF reader and their bargain-priced Nitro PDF Professional products, from Melbourne- and San Francisco-based Nitro PDF Software. I’ve been aware of the Nitro PDF products for years, because that company has offered the major alternative to Adobe Acrobat since 2005. I’d also been frustrated with security and stability issues related to Acrobat elements for some time now, and hoping to find a more compact, faster, and reliable alternative. So how cool is it to be invited to check out something that I’d wanted to dig into anyway, even if it was only for my own good? Answer: Pretty cool, indeed.
Thanks to an offer from the PR agency that handles Nitro PDF, I was invited to check out their latest software release, and to take both 32- and 64-bit versions of their software for a spin. At first, the biggest draw for me was the extremely low frequency of entries in the Mitre Common Vulnerabilities and Exposures (CVE) database for Nitro PDF products vis-à-vis entries for Acrobat: zero references to Nitro PDF, versus 59 direct references for Adobe Acrobat, as of 5/24/2010. Of course, I’ve probably also become too inured to Acrobat Reader’s size to really notice it any more: 203 MB of disk storage for my Reader 9.0 folder on a 32-bit Windows 7 system, versus 53 MB of disk storage for the full-blown Nitro Reader application on that same system (78 MB for Nitro PDF Pro vs. 400+ MB for Adobe Acrobat Pro). What I’ve never become inured to is Adobe Acrobat’s and Adobe Reader’s speed and responsiveness, so I can only observe that for every operation I tried out, the Nitro PDF product was noticeably faster and more responsive than its Adobe counterpart.
But wait: it gets better. The Adobe Reader counterpart program, Nitro PDF Reader, is free just like Adobe Reader. But it’s much faster, more compact, and less intrusive on your system. In fact, Nitro Reader uses no special purpose downloader to grab and install the program, and it involves no start-up monitoring or independent update checking tools, unlike those from Adobe. You can pick up and move licenses from one machine to another, without having to run a special “reclaim license” program on the original host machine as with Acrobat. The Nitro PDF license information menu includes a Deactivate button that you must click before uninstalling the program on one PC, before installing that software on a new host machine instead. If you need to edit or manipulate PDF documents, you pay a list price of $99 for the Nitro PDF Professional program (I was able to find a coupon that dropped my cost to $69 to license the program with a quick search on “Nitro PDF Pro coupons” in Bing and Google) instead of the $299 you must pay for a full-blown copy of Adobe Acrobat (the best discount price I could find for Adobe Acrobat Professional was around $179, and most etailers sell if for over $235).
Then there’s the functionality: frankly Nitro PDF Professional deserves the “Professional” moniker, while there are many ways in which Adobe Acrobat Professional fails to live up to the cognomen.
My favorite feature has to be the Nitro Reader Signature stamp: a handy-dandy way to associate one or more scanned-in signatures with a digital stamp that you can affix to any PDF document wherever you like (in a contract’s signature block, most likely) by positioning your mouse cursor and clicking an interface button. Then, too, Nitro Reader will let you drop text in wherever you like on a PDF document, whether or not the document was designed to accommodate input fields where you want that text to go (try that, Adobe!). No more printing files out so you can save your data input (one of Adobe Reader’s favorite gotchas is to allow you to enter text input into designated input fields, only to inform you that you can’t save that input—none of that from Nitro Reader, thank you very much), or hand-write input fields, signatures, and so forth.
It’s very seldom I get the chance to work with a software product that makes me want to get down on my knees and thank my lucky stars for being allowed to use its many, varied, and secure capabilities. Nitro PDF is not only one of the select few products that evokes this response from me, it’s right at the very head of that short list.
Visit www.nitroreader.com today, and grab yourself a copy of Nitro PDF Reader for free, or take the 30-day trial of Nitro PDF Pro for a spin at www.nitropdf.com. I predict that, if you like me need PDF editing and annotation capabilities, you’ll end up happy to spring for the $99 (or $69 if you get your discount coupon) it will cost you to buy Nitro PDF Pro, and glad of the resulting price-performance-capability ratio!
May 24, 2010 10:49 PM
Posted by: Ed Tittel
importance of physical security
, Infosec tripod
, Kensington security locks
, Kensington security slot
, Trusted Platform Module
, whole drive encryption software
Information security experts like to talk about a metaphorical three-legged security model called the security tripod, or more simply, the tripod. In this model, one leg comes from perimeter security, which addresses the barrier and safeguards used to protect the boundary between internal and external networks, or between individual systems and the Internet. Another leg comes from software security, which addresses the needs to maintain confidentiality, integrity, and accountability for data and services that software and systems provide. The final, and too often overlooked leg hinges on physical security, or controlling physical access to systems and machines.
As I spoke to Rob Humphrey, the Director of Security Products at the Kensington Computer Products Group by phone last week, I was forcibly reminded of the vital importance of this third leg in maintaining security for systems and networks alike. It’s a truism that if a bad guy can take possession of, or gain access to, just about any kind of system, that he (or she) can usually compromise the other two kinds of security quickly and convincingly in most cases, provided that the person who takes possession of or gains access to a system knows what they’re doing.
Case in point: when my colleague James Michael Stewart and I used to teach Windows security courses for Interop in the late 1990s and early 2000s, we would ask a volunteer to let us borrow one of their notebook PCs in the class. In 9 cases out of 10, we could break into that system in under 5 minutes live in the classroom using readily available administrative hacking tools for Windows PCs. The notion that somebody who takes possession of a system can soon also take possession of its contents is one worth pondering, and reacting to, especially for companies or organizations that permit employees to work off-site, or take sensitive information with them off the premises as they travel for business or pleasure.
Simple thought it seems, the Kensington cable locks that the majority of notebook and laptop PCs support (around 99% of all notebooks, according to Mr. Humphrey, come with built-in Kensington Security Slots that accommodate such locks) can provide a powerful deterrent against theft and loss of systems and the information they contain. By making it more difficult and time-consuming to take possession of a notebook PC, Kensington decreases the likelihood that an unauthorized and possibly malefic third party will take it into his possession, and gain access to the information it contains.
Humphrey also shared some scary and wonderful statistics about the impact of theft and loss on companies and organizations. Right now, an average of 20,000 PCs are lost or stolen every week in the US. Estimates of the value of the information on those machines hovers near $75,000 per computer. This is not a huge number, but the product of the number of systems and the value of the information they contain comes up to a whopping $1.5B in losses in the US every week! That’s $78B per year in losses, for machines that get lost or stolen. This might seem highly unlikely, until you remember the tens of thousands of veteran’s identity data lost owing to the theft of a notebook belonging to a VA employee in 2006 (26.5 million records), or large scale losses of credit card information at various card processing operations in the past few years (over 40 million records in the aggregate).
The best combination of physical protections for a modern-day notebook looks something like this:
1. A physical lock-and-key-plus cable to keep the notebook where it’s left
2. Whole drive encryption that requires a password to access a hard disk, and any of the data it contains
3. Use of the boot/hardware password protection that the hardware-based trusted platform module (TPM) provides to suitably-equipped notebooks and laptop PCs. Without the right login/boot-up password, the computer simply won’t boot, and this low-level protective circuitry cannot be sidestepped or worked around
4. Built-in tracking software like LoJack that causes a system to report its IP address and other information whenever it’s started up, so that legitimate owners and service operators can track down and recover lost or stolen machines.
Today, Kensington has a relationship with Absolute Software that lets buyers of their security cables, purchase a bundle or obtain a discount on that company’s LoJack for Laptops. I suggested to Humphries that he look into similar synergies with makers of whole-drive encryption tools and TPM technologies. Seems like an appropriate collection of countermeasures to ensure that notebooks and the data they contain remain safe from unauthorized access or use.
May 20, 2010 5:00 PM
Posted by: Ed Tittel
Dual Boot Pro BCD tool
, Windows 7 BCD editor
It’s been well over a year now since I started grabbing various Windows 7 release candidates, and most of my machines got their initial RTM installs in August, 2009, when MSDN made the RTM available two full months before the official release of Windows 7 in late October. I’ve recently noticed with increasing irritation that my Windows 7 boot screen still includes references to various RC (Release Candidate) versions even on PCs that have long since had those entries removed from the hard disks present in those machines.
For Windows Vista, I turned to a freeware product called EasyBCD that made it much easier to rework the Boot Configuration Data (which is what BCD stands for in modern Windows OSes). But alas, that product is no longer available, and besides it’s not warranted to work with Windows 7. And if there’s anything you DON’T want to muck around with on a Windows Vista, 7, or Server 2008 machine it’s the boot configuration data. This led me on a search for a replacement tool, and what I came up with is called Dual Boot Pro a capable, usable, and cheap ($9.95) tool that works like a champ on PCs that include BCD based Windows OSes among their OS lineups.
Let’s take a guided tour of installing and using Dual Boot Pro, because it will show you everything you need to know as I demonstrate how to remove offending items from the boot menu and manage various boot settings as well.
Installing Dual Boot Pro
After you pay for then download the software from the vistabootpro.org Web pages, you will obtain a Windows installer (.msi) file that you must double-click to launch the installer process. Installation takes you through a total of two basic screens, and took under a minute on my test PC.
The initial install screen shows a progress bar as installation proceeds
When the (brief) install process completes, click a button to finish things up.
Running/Using Dual Boot Pro
The first time you run the program, you will be warned that it detects no backup of the BCD data for your system, and guided to create such a backup. On subsequent uses of the program, it’s up to you to remember that backing up BCD data before making any changes is a really, really good idea, and to use the Care Center tab to create (or restore) such backups as needed.
When no BCD backup is detected, you are asked to create one.
This throws you into the Care Center tab in the program where you can browse to a directory of your choosing in which to keep BCD backups. I keep mine in the Documents folder, and use the ANSI/ISO date at the end of the filename, as shown here:
When the backup is saved, the program tells you if the save is valid or otherwise.
Viewing Current BCD Info & Listings
Click on the Boot Information tab to view the current BCD information and name information (it’s what shows up on the Windows 7 boot screen as the OS is starting up). Notice that in the next screen cap, Windows 7 x64 RC still shows up (even though it’s no longer resident on this PC).
There are two entries in the BCD, even though one is now MIA!
Removing the Old/Obsolete RC BCD Entry
To edit BCD data, click the Operating Systems tab in Dual Boot Pro. Then, you can select any individual entry and either alter its data (through the controls below the listing pane), or click the Red X (Delete) control to the right of the listing pane. That’s what I’ll do to get rid of the obsolete RC entry.
Before: highlight the entry you wish to delete, then click the Red X.
As you might hope, Dual Boot Pro asks you to confirm any entry deletions.
Edit BCD Entry Name Info
On this same screen you can also edit existing entries to provide a different, more descriptive name. I like to know what version and word-length attaches to the Windows Versions I have running on my machines, so I usually add that info to the name to help me remember (hint: you must always highlight an entry in the entries pane at top center before you can add or apply data related to that entry in the controls and buttons below).
Highlight an entry, make your changes, then click
Once the change is applied, the new name data shows up in the entry pane.
Concluding Thoughts and Admonitions
There’s a lot to like about this useful little program. If you spend some time getting to know the software, you’ll come to appreciate its capabilities. Business licenses are available, and cost $24.99 per license (which may be used on up to five computers). Commercial and Corporate licenses start at $4.99 per seat and go down in price as the number of licenses go up ($3.95 for 101-500 licenses, $2.95 for 501 licenses and up).
May 17, 2010 2:46 PM
Posted by: Ed Tittel
MS 2010 beta still available
, MS 2010 RTM now available on MSDN
, MS Office 2010 release date set
Look around the technology news landscape these days, and you’ll see much of it in the clouds — or rather, making much of the importance, dominance, or < insert your own superlative here > for cloud computing of some kind. Even the mainstay of individual work in the enterprise, the productivity suite, is touted as a cloud-compatible toolset, as Google and others tout their cloud-based offerings in this arena. Don’t believe it: Microsoft Office still rules this niche in the workplace, and has maintained a staggering 94 percent market share in office productivity software (and seats) for the past three years.
That’s what makes the immanent release of a new Office suite, Microsoft Office 2010, big news. As of last week (May 15) Microsoft indicated that the latest version of MS Office will be available for retail purchase online and in stores on June 15. Various 32- and 64-bit RTM versions of Office 2010 have been available on MSDN for a while now, with the latest batch uploaded on May 10, 2010.
But with the official release date of Office 2010 still almost a month in the offing, interested IT professionals may want to hop over to the Microsoft Office 2010 pages, where they can still grab a 60-day trial copy of the beta version of the Professional Plus edition. Note that you must remove prior Office versions before you can install the RTM version on a test machine, and that MS recommends against installing this beta package “on a PC that will require an activated copy of Office after the 60-day trial period is over.” Nevertheless, it’s a great way to prep for the coming onslaught, and to get familiar with what is bound to become a fixture in many enterprise IT operations over the next year or two.
May 14, 2010 4:45 PM
Posted by: Ed Tittel
benefits of Microsoft Software Assurance and Volume Licensing
, downgrade Windows 7 to XP
, Windows 7 SP1
, Windows 7 XP Mode
Sources that include TechARP and InfoWorld have been among the sites that continue to cover news on the forthcoming Service Pack 1 (SP1) for Windows 7, but it’s still not clear when it will be released for public consumption. That said, beta code for SP1 has been floating around since March, so it’s pretty likely that the final version will be released some time in 2010, perhaps even before the fourth quarter of this year.
But there’s one “very interesting” implication to SP1 release that may interest OEMs and customers alike. That is, so-called downgrade rights to Windows XP for Windows 7 end either 18 months after the introduction of Windows 7 (April 2011) or when SP1 goes public, whichever comes first. Only big-time enterprise customers are exempt from this — namely, those companies that subscribe to Microsoft Software Assurance or that purchase Windows through volume licensing agreements (those buyers retain rights to run versions of Windows all the way back to Windows 95!)
Now that SP1 is at least rumored if not actually poised for release up to 8 months prior to April, 2011, this is something that system vendors and enterprise users must consider carefully. Even though an official release date (or even month) stil remains to be determined and announced, organizations that remain committed to Windows XP may find themselves forced to re-think that relationship in the light of coming events and software releases.
Once SP1 does ship, the only way that organizations can keep using XP-specific applications is to use Windows XP Mode inside Windows 7. And that, in turn, requires adoption of Windows 7 Professional, Ultimate, or Enterprise because only these three editions support that capability (which also requires grabbing the necessary code and licensing information from the Microsoft Website). Put that in your pipe and smoke it, as you plan your next client platform refresh cycles!
May 13, 2010 2:45 PM
Posted by: Ed Tittel
, AVG AntiVirus Free Edition
, Avira AntiVir Personal
, Norton Internet Security 2010
, PC Tools Internet Security
, PC Tools Spyware Doctor
, VB100 April 2010 ratings
, Webroot Internet Security Essentials
, Webroot Spy Sweeper
Over the past 5 years. since the publication of my 2005 book The PC Magazine Guide to Fighting Spyware, Viruses, and Malware, I’ve been following the rise and fall of numerous anti-virus and anti-spyware software packages with great interest and attention. In that period I’ve worked with numerous suites and anti-virus/-spyware packages from a great many vendors, including (in alphabetical order) AVG, Avira, BitDefender, Frisk, F-Secure, Kaspersky, Norton/Symantec, PC Tools, Sunbelt Software, and Webroot.
Out of that collection of tools, I’ve consistently stuck with this subset of offerings for use on my own or family member’s machines:
- AVG Anti-Virus Free Edition: I have *LOTS* of test machines, and a free product is pretty helpful for the many that so often come and go in my lab
- Norton Internet Security: I abandoned this product in the mid 2000′s as its resource requirements mushroomed and it turned into a bona fide system hog. But the newer, leaner and meaner 2009 and 2010 versions have earned their way back onto numerous desktops in my house.
- Webroot: Spy Sweeper was the first hot-dog antispyware product that I got to know while writing my book, and it has remained a popular and effective tool ever since
- PC Tools: Spyware Doctor is another hot-dog antispyware product that continues to earn accolades and special status as a leading antispyware package. The company’s combo offering (with PC Tools AntiVirus) and Internet Security suite also work very well.
Though I’ve occasionally strugged with components of the PC Tools environment — see my September 2008 blog for ViztaView.com “Best-of-Breed Apps Aren’t Always Best for Vista” — by and large their products have done me and my desktop and notebook PCs more right than wrong. This is born out in recent results from the latest round of VB100 testing from Virus Bulletin in April, 2010. Though products from a surprising group of vendors that include eEye, Frisk, Norman, and even Microsoft (Security Essentials) failed to earn the once-coveted but now obligatory VB100 rating for Windows XP SP3 platforms in this latest round of testing, the PC Tools products (and those from the other vendors I mention in my preceding favorites lists) continued their ongoing streak of VB100 status.
In talking with members of the PC Tools development team to understand how they’ve kept up, especially in light of recent changes to the Virus Bulletin wild list and other testing changes and shake-ups I learned that the company maintains a dedicated team of researchers and testers to keep up with (and help to guide) the composition and execution of its testing operations. And of course, as is customary for most major anti-malware operations these days, this group also monitors reports from its own customers and various shared security and vulnerability reporting resources (like the Mitre database of common vulnerabilities and exposures known as the CVE), so that it knows when to begin work on the various signatures, heuristics, and other detection, avoidance and repair tools that drive daily efforts in such organizations. In fact, heuristics- and behavior-based detection and avoidance is an area where the PC Tools products really shine, thanks in large part to the development efforts behind its ThreatFire module, which observes and blocks suspect system behavior and potentially dangerous file system access and activity.
If you’re looking for a solid and reliable anti-malware solution for Windows PCs, any of the items on the list at the head of this blog will do the job, but I recommend the PC Tools products as a particularly good value for the money you’ll have to shell out to install most of them on one or more PCs. The PC Tools Internet Security suite, in fact, offers comprehensive and capable all-around security coverage and protection for up to 3 Windows 7 PCs for about US$50 per year (or less, if you search for discount codes online, such as this 25% off offer available from Offers.com)
May 12, 2010 3:16 PM
Posted by: Ed Tittel
be careful when using TDSS rootkit cleanup tool
, eSage TDSS rootkit remover
, TDSS rootkit remover clobbers Windows license key and activation info
In the latest (May 2010) issue of Virus Bulletin, I read Alisa Shevchencko’s story “TDSS Infections – Quarterly Report” with some interest and a lively appreciation of the TDSS rootkit malware and infections over the past year. Upon learning that a detection and repair tool for this rootkit (which is extraordinarily difficult to detect, even for rootkit-specific tools) was available from Shevchenko’s employers Website (eSage Lab) I decided to give it a shot. This program, simply called remover.exe scans systems to look for hidden driver files so that its users can remove them if and when they’re found. This tool comes with an undocumented catch, however, as I learned by electing to remove two hidden items that the program discovered on my system.
If you’re lucky, when you run this tool on your system, you’ll get a display that looks like this:
The best outcome is when no hidden driver files are detected
Alas, it turned out that the two hidden items that this program found on my system were hidden by Microsoft, not by any rootkit. When I removed them, I was removing my Windows 7 license key and activation data, so that when I rebooted my machine after the fix, I got the “black screen” background and a warning that my copy of Windows was not genuine. This was easy to fix, simply by re-entering my (valid) license key, and then re-activating Windows, but it did come as something of a surprise.
The two items that the progam discovered were:
Should you decide to run this program and it discovers exactly two hidden drivers, but no other signs of infection, you may want to check to make sure they don’t match this information. On the other hand, the fix is pretty easy if you do trash them and lose your license status and info, so you can go either way in deciding whether or not to allow the program to delete these questionable but benign items.