How to Clean An Infected Computer. How to Harden Your Browser Against Malware and Privacy Concerns
I just had a call from one of my users at the office who told me they were contacted by a company to be acting on behalf of Microsoft and that their computer was infested with viruses and that they were instructed to help. The caller had my user do something in the DOS prompt, from what
So today I had a user get a MBR.Rootkit! After getting the dang thing removed I was, hit with an Error 1402. I was able to get this fixed by following the steps listed in the link below. How to fix ‘Error 1402. Could not open key: UNKNOWN…’.
When logging into a terminal server it brings up the “Your User Profile was not loaded correctly” You have been logged on with a temporary profile This could be caused by the following 1) If you are logging in using an active directory account, make sure the profile Tab in the Active Directory Settings under
A rootkit is a program or a program kit that hides the presence of malware in the system. A rootkit for Windows systems is a program that penetrates into the system and intercepts the system functions (Windows API). It can effectively hide its presence by intercepting and modifying low-level API functions. Moreover it can hide
How Do I Create an Apple-Touch-Icon? To create an Apple touch icon, you will likely need knowledge of a graphic editing software, such as Photoshop. Begin by creating a square graphic that is sized to 158 x 158 pixels, (you can also use 129 x 129 pixels) and then saving it in .png format. Also, when creating