Tampilkan postingan dengan label windows. Tampilkan semua postingan
Tampilkan postingan dengan label windows. Tampilkan semua postingan

Fresh Complaints for Windows 7

Windows 7Windows Vista was the "new big thing" for Microsoft and while people liked it, it still had its fair share of complaints. That is why Microsoft developed Windows 7, the newest OS for the company. Windows 7, which was released in late October, opened to much fanfare. However, like all other previous Windows upgrades, bug complaints have already started coming in.

Overall, a total of 31% of people using Windows 7 have reported problems with the upgrading process. This number comes from a recent survey of over 100,000 Windows 7 customers by consumer helpdesk firm iYogi. In a statement from iYogi co-founder Vishal Dhar, "Most of the problems that customers have with Windows 7 have to do with installation or application and data migration." Dhar goes on to say that "these are all fixable problems. but theyre annoyances and theyre time consuming."

A major problem with nearly 9% of users is that the installation process, which takes anywhere from 30 to 60 minuets, reaches the "62% completed" mark and then freezes. Microsoft is, however, aware of this problem and says that it can be fixed by rebooting your PC, going into advanced settings and typing in a code that instructs the computer to ignore plug-ins.

Issues do not stop with the upgrade process though. A lot of users still experience glitches even after Windows 7 is installed successfully. A common complaint is that the basic "applet" programs, programs like Mail, Movie Maker and Photo Gallery were missing. The reason for the missing programs is because Windows 7 deletes them and requires users to download them from the Windows Live essential web site. According to iYogi, nearly 26% of users were confused about the extra step.

8% of users complained that the DVD drives could not be found and another 2% said that they could not sync their iPhones with Windows 7. 1 out of every 7 people reported that the new "Aero" theme does not work but almost 14% of users who experienced problems with "Aero" do not have the graphics capabilities on their PCs to run it.

Among some other common complaints were that there are too many "mini-dumps", an inability to view file extensions, problems with the "Aero snap" feature, changes to custom icons and even problems with the new taskbar. Microsoft thus far has declined any request for comments.

Although there is a brighter side to all of this. Once users have worked out all the bugs, the experience has been relatively hassle-free and those who have bought a computer with Windows 7 preloaded onto it have seen the fewest problems. Dhar comments on this saying, "Customers who finally get it up and running love Windows 7. We havent had a lot of people calling for usability issues because its a much more intuitive interface than Windows XP."

But Windows 7 is far from perfect. According to an analyst with Yankee Group, one of the biggest annoyances people have with Windows 7 is that the ribbon menus located on the top of programs have been completely redesigned which means they have to be completely relearned.

Microsoft also got rid of a lot of applications that seemed to be favorites with customers, applications which included Windows Movie Maker. But despite all the complaints about Windows 7, they still do not seem as bad as the ones associated with Windows Vista. Vista was plagued with bugs, software incompatibilities and even sluggish and annoying security alerts. Principle analyst with ITIC Laura DiDio states that "While there are a few bugs, I havent seen or heard any show-stoppers. In fact, just the opposite. Some Vista users cant wait to upgrade. So far this has been a home run for Microsoft."

The sooner the bugs can be fixed the better but regardless, Windows 7 seems to be a vast improvement over the near disaster that was Windows Vista.




Looking for Computer / PC Rental information? Visit the www.rentacomputer.com PC Rental page for your short term business PC needs. Or see this link for a complete line of Personal Computer Rentals.
Read More..

How to Remove Windows Risk Eliminator Uninstall Guide

Windows Risk Eliminator is a malicious program that uses a number of misleading techniques to make a hefty profit out of unsuspecting victims. This program is classified as a rogue security tool because it pretends to scan your computer for malware and reports system threats which do not even exist. Cyber-criminals spread their malware through the use of Trojan Downloader and fake online scanners. Victims are typically tricked into paying for additional tools or services. This rogue costs almost $80 with a lifetime support. You can get perfectly legitimate anti-malware software for about $40. Windows Risk Eliminator gives a false sense of security. It displays fake security alerts and notifications saying that your computer is infected with some sort of malware. Furthermore, Windows Risk Eliminator claims that you can make your computer run faster if you pay for a additional tools that will fix numerous system/registry errors. Please do not fall victim to this scam and remove Windows Risk Eliminator from your computer as soon as possible. What is more, this scareware blocks other programs on the victims computer. It blocks web browsers, task manager, registry editor and of course anti-malware software. Thankfully, weve got the step-by-step removal instructions to help you to remove Windows Risk Eliminator malware. Last, but not least, if you have purchased this bogus program, please contact your credit card company and dispute the charges. If you need help removing Windows Risk Eliminator, please leave comment. You can post additional information about this rogue too. Good luck and be safe online!

Windows Risk Eliminator is from the same family as Windows Universal Tool, Windows Utility Tool, and Windows Security & Control.



Fake Windows Risk Eliminator scan results:


Fake security alert saying that taskmgr.exe is a key-logger:


A web form where you can purchase Windows Risk Eliminator:



Windows Risk Eliminator removal instructions:

1. Rename the main executable of Windows Risk Eliminator:

In Windows XP:
C:Documents and Settings[UserName]Application Data[SET OF RANDOM CHARACTERS].exe

In Windows Vista/7:
C:Users[UserName]AppDataRoaming[SET OF RANDOM CHARACTERS].exe



Look for htwlfy or similar file and rename it to malware. Then restart your computer. This should disable Windows Risk Eliminator. After reboot, please continue with the rest of the removal process. NOTE: By default, Application Data folder is hidden. If you can find it, please read Show Hidden Files and Folders in Windows.

OR you can download Process Explorer and end Windows Risk Eliminator process.

2. Download shell-fix.reg. Double-click to run it. Click "Yes" when it asks if you want to add the information to the registry. This file will fix the Windows Shell entry.
3. Download free anti-malware software from the list below and run a full system scan.
NOTE: in some cases the rogue program may block anti-malware software. Before saving the selected program onto your computer, you may have to rename the installer to iexplore.exe or winlogon.exe With all of these tools, if running Windows 7 or Vista they MUST be run as administrator. Launch the program and follow the prompts. Dont forget to update the installed program before scanning.

4. New threats appear every day. In order to protect your PC from such (new) infections we strongly recommend you to use ESET NOD32 Antivirus.


Alternate Windows Risk Eliminator removal instructions (in Safe Mode with Networking):

1. Reboot your computer is "Safe Mode with Networking". As the computer is booting tap the "F8 key" continuously which should bring up the "Windows Advanced Options Menu" as shown below. Use your arrow keys to move to "Safe Mode with Networking" and press Enter key. Read more detailed instructions here: http://www.computerhope.com/issues/chsafe.htm


NOTE: Login as the same user you were previously logged in with in the normal Windows mode.

2. Download free anti-malware software from the list below and run a full system scan.
NOTE: in some cases the rogue program may block anti-malware software. Before saving the selected program onto your computer, you may have to rename the installer to iexplore.exe or winlogon.exe With all of these tools, if running Windows 7 or Vista they MUST be run as administrator. Launch the program and follow the prompts. Dont forget to update the installed program before scanning.

3. New threats appear every day. In order to protect your PC from such (new) infections we strongly recommend you to use ESET NOD32 Antivirus.


Associated Windows Risk Eliminator files and registry values:

Files:

In Windows XP:
  • C:Documents and Settings[UserName]Application Data[SET OF RANDOM CHARACTERS].exe
In Windows Vista/7:
  • C:Users[UserName]AppDataRoaming[SET OF RANDOM CHARACTERS].exe
Registry values:
  • HKEY_CURRENT_USERSoftwareMicrosoftWindows NTCurrentVersionWinlogon "Shell" = "%UserProfile%Application Data[SET OF RANDOM CHARACTERS]"
Share this information with other people:
Read More..

Windows Smart Warden Removal

Windows Smart Warden is a rogue anti-malware program that gains access to a system mostly by means of fake online virus scanners and hacked websites. More specifically speaking its a Trojan horse disguised itself as anti-malware software. The most common goal of Windows Smart Warden is to steal personal information: name, credit card number, etc. Once installed, this rogue anti-malware program will state your computer is badly infected and that found malware can be only removed if the full version of the rogue software is purchased. It can be very difficult to properly remove Windows Smart Warden. Especially, if it comes bundled with rootkits and spyware modules. Detailed manual instructions on removing this rogue anti-malware software can be found by clicking here (this removal guide was written for the same malware, although it is being distributed with a different name now).

Windows Smart Warden GUI and some fake security alerts:



Fake error notification



Another error message claiming that your computer is infected with spyware



Warning! Virus detected Trojan-SMS



Tell your friends:
Read More..

Remove Windows Protection Master Uninstall Guide

Windows Protection Master is a rogue anti-virus program. It claims that your computer is infected with spyware, Trojan-Spy, NetTool, PSWTool and other malicious software to trick you into purchasing a fully licensed version of the bogus product. Rogue security programs usually have either very misleading or catchy names. Windows Protection Master is a catchy one (or maybe funny?). Either way, it provides false sense of computer protection and reports false security threats/infections. The graphical user interface is not so bad and was probably designed to look like an official Microsoft product. Its evident that cyber crooks aim at the unaware Windows users but Im sure that most of you guys knew (hopefully) it was fake right away. Windows Protection Master is a real bear to remove. Should you try to remove it manually? No, not really. Windows Protection Master is one of many rogue security programs that comes bundled with sophisticated malware. So, to properly remove Windows Protection Master, please follow the removal instructions below.



Windows Protection Master runs every time you turn on your computer and blocks legit anti-virus programs. To cap it all, this pesky virus disables Task Manager, Registry Editor and some other very useful Windows system utilities. You cant really run any malware removal tools in Normal Mode because the virus will block them producing pop-up warnings "Application is infected", and promoting you to purchase the rogue program in order to remove non-existent infections. We have to admit that some of the fake security alerts and notifications are very creative.

Warning! Identity theft attempt detected. Someone is apparently gathering your bank account details which is impossible unless Windows Protection Master comes bundled with spyware and youve logged on to your banks online banking system while your PC is infected. That would be a shame.

Error Keylogger activity detected. Once again, cyber crooks want to scare you into thinking that every key stroke you make is recorded.



Torrent Alert. Torrent link detected! Have you ever heard about SOPA? Get anonymous connection. Thats right. They suggest you to act against the rules of SOPA. It goes without saying that legit anti-virus product wouldnt recommend such things.



As you can see, Windows Protection Master is truly rogue and useless anti-virus program. Having anti-virus protection and doing frequent scans for threats is a good idea. But not with this rogue security product. If you are one of those unlucky people who purchased Windows Protection Master, you should contact your credit card company immediately and dispute the charges. Then, please follow the removal instructions below to remove Windows Protection Master and associated malware from your computer. If you have any questions, please leave a comment. Good luck and be safe online!


Windows Protection Master removal instructions:

1. Reboot your computer is "Safe Mode with Networking". As the computer is booting tap the "F8 key" continuously which should bring up the "Windows Advanced Options Menu" as shown below. Use your arrow keys to move to "Safe Mode with Networking" and press Enter key.


NOTE: Login as the same user you were previously logged in with in the normal Windows mode.

2. Launch Internet Explorer. In Internet Explorer go to: ToolsInternet OptionsConnections tab. Click Lan Settings button and uncheck the checkbox labeled Use a proxy server for your LAN. Click OK. You may have to repeat steps 1-2 if you will have problems downloading malware removal programs.



3. Download and run TDSSKiller. Wait for the scan and disinfection process to be over.

4. Download recommended anti-malware software (Spyware Doctor) and run a full system scan to remove Security Scanner from your computer.

5. To reset the Hosts file back to the default automatically, download and run Fix it and follow the steps in the Fix it wizard.


Associated Windows Protection Master files and registry values:

Files:

Windows XP:
  • C:Documents and Settings[User Name]Application DataInspector-[3 RANDOM CHARACTERS].exe
  • C:Documents and Settings[User Name]Application DataNPSWF32.dll
  • C:Documents and Settings[User Name]Application Data esult.db
  • C:Documents and Settings[User Name]DesktopWindows Protection Master.lnk
Windows Vista/7:
  • C:Users[User Name]AppDataRoamingInspector-[3 RANDOM CHARACTERS].exe
  • C:Users[User Name]AppDataRoamingNPSWF32.dll
  • C:Users[User Name]AppDataRoaming esult.db
  • C:Users[User Name]DesktopWindows Protection Master.lnk
Registry values:
  • HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun "Inspector"
  • HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionInternet Settings "WarnOnHTTPSToHTTPRedirect" = 0
  • HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesSystem "DisableRegedit" = 0
  • HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesSystem "DisableRegistryTools" = 0
  • HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesSystem "DisableTaskMgr" = 0
Tell your friends:
Read More..

Remove Windows XP Repair Uninstall Guide

Windows XP Repair is a fake system optimization and repair tool that tries to trick users into paying for a version of the program to fix fictitious registry errors and non-existent hard drive problems. Its a rebranded version of Windows XP Restore and Windows XP Recovery scareware. And its also worth mentioning that if you have a computer running Windows XP then the rogue program will install itself as Windows XP Repair. But if you are running Windows Vista or Windows 7 then the rogue program will install itself as Windows Vista Repair or Windows 7 Repair. In other words, this fake application can change its name and graphical user interface depending on the version of Windows that is running.



There are a number of ways that Windows XP Repair gets on your computer, but probably the most common is through fake online virus scanners and infected websites. Usually, fake virus scanners attempt to scare users into downloading fake malware removal tools to remove non-existent viruses. However, it may enter your computer without your knowledge when you visit a compromised website. Drive-by-downloads are very popular and cyber crooks try to use this method of malware distribution as often as they can.

If you suspect or confirm that your computer is infected with Windows XP Repair then you should remove it as soon as possible. To remove Windows XP Repair and related malware from your computer, please follow the steps in the removal guide below. Or you can contact the guys from KitRx Tech Services Blog to troubleshoot and fix problems caused by this malware. Please note that the following instructions are for users of Windows XP but they should work for those of you who use Windows Vista or Windows 7 too.

While running, Windows XP Repair will pretend to scan your computer for registry and hard drive errors. It will also display fake error warnings claiming that your RAM memory usage is critically high and that there is a critical hard drive failure which may cause data loss.





Windows XP Repair will block the Task Manager and hide your desktop icons, certain files and folders to make you think that your computer has some really serious problems. It doesnt delete your files!



You can remove Windows XP Repair manually but honestly this is not something that novice computer users may be able to deal with on their own. Instead of that, you should scan your computer with anti-malware software. Additionally, you can activate the rogue program by entering this registration code 8475082234984902023718742058948 and any email as shown in the image below.



Once this is done, you are free to install anti-malware software and remove the rogue anti-virus program from your computer properly. If you think you have accidentally installed Windows XP Repair, please follow the removal instructions below. And if you have any further questions, please leave a comment below. Good luck and be safe online!


Windows XP Repair removal instructions:

1. First of all, you need to unhide the files and folders. Select Run... from the Start Menu or just hit the key combination CTRL+R on your keyboard. In the Open: field, enter cmd and hit Enter or click OK.



At the command prompt, enter attrib -h /s /d and hit Enter. Now, you should see all your files and folders. NOTE: you may have to repeat this step because the malware may hide your files again.



If you still cant see any of your files, Select Run... from the Start Menu or just hit the key combination CTRL+R on your keyboard. In the Open: field, enter explorer and hit Enter or click OK.



2. Open Internet Explorer. Select Run... from the Start Menu or just hit the key combination CTRL+R on your keyboard. In the Open: field, enter iexplore.exe and hit Enter or click OK.

Download free anti-malware software from the list below and run a full system scan.
NOTE: in some cases the rogue program may block anti-malware software. Before saving the selected program onto your computer, you may have to rename the installer to iexplore.exe or winlogon.exe With all of these tools, if running Windows 7 or Vista they MUST be run as administrator. Launch the program and follow the prompts. Dont forget to update the installed program before scanning.

3. New threats appear every day. In order to protect your PC from such (new) infections we strongly recommend you to use ESET Smart Security.


Alertane Windows XP Repair removal instructions:

1. First of all, you need to unhide the files and folders. Select Run... from the Start Menu or just hit the key combination CTRL+R on your keyboard. In the Open: field, enter cmd and hit Enter or click OK.



At the command prompt, enter attrib -h /s /d and hit Enter. Now, you should see all your files and folders. NOTE: you may have to repeat this step because the malware may hide your files again.



2. The rogue application places an icon or your desktop. Right click on the icon, click Properties in the drop-down menu, then click the Shortcut tab.



The location of the malware is in the Target box.



On computers running Windows XP, malware hides in:
C:Documents and SettingsAll UsersApplication Data

NOTE: by default, Application Data folder is hidden. Malware files are hidden as well. To see hidden files and folders, please read Show Hidden Files and Folders in Windows.

Under the Hidden files and folders section, click Show hidden files and folders, and remove the checkmark from the checkbox labeled:

- Hide extensions for known file types
- Hide protected operating system files

Click OK to save the changes. Now you will be able to see all files and folders in the Application Data directory.

On computers running Windows Vista/7, malware hides in:
C:ProgramData

3. Look for suspect ".exe" files in the given directories depending on the Windows version you have.

Example Windows XP:
C:Documents and SettingsAll UsersApplication Data24436516.exe
C:Documents and SettingsAll UsersApplication DatajTNIGvyiwfxUlB.exe

Example Windows Vista/7:
C:ProgramData24436516.exe
C:ProgramDatajTNIGvyiwfxUlB.exe

Basically, there will be a couple of ".exe" file named with a series of numbers or letters.



Rename those files to 24436516.vir, jTNIGvyiwfxUlB.vir etc. For example:



It should be: C:Documents and SettingsAll UsersApplication Data24436516.vir

Instead of: C:Documents and SettingsAll UsersApplication Data24436516.exe

4. Restart your computer. The malware should be inactive after the restart.

5. Open Internet Explorer and download TDSSKiller. This malware usually (but not always) comes bundled with TDSS rootkit. Removing this rootkit from your computer is very important (if exists). Run TDSSKiller and remove the rootkit.



6. Download free anti-malware software from the list below and run a full system scan.
NOTE: in some cases the rogue program may block anti-malware software. Before saving the selected program onto your computer, you may have to rename the installer to iexplore.exe or winlogon.exe With all of these tools, if running Windows 7 or Vista they MUST be run as administrator. Launch the program and follow the prompts. Dont forget to update the installed program before scanning.

7. New threats appear every day. In order to protect your PC from such (new) infections we strongly recommend you to use ESET Smart Security.


Associated Windows XP Repair files and registry values:

Files:

Windows XP:
  • %AllUsersProfile%Application Data[SET OF RANDOM CHARACTERS]
  • %AllUsersProfile%Application Data~[SET OF RANDOM CHARACTERS]
  • %UsersProfile%Local SettingsApplication Data[SET OF RANDOM CHARACTERS].lic
  • %AllUsersProfile%Application Data[SET OF RANDOM CHARACTERS].dll
  • %AllUsersProfile%Application Data[SET OF RANDOM CHARACTERS].exe
  • %UsersProfile%DesktopWindows XP Repair.lnk
  • %UsersProfile%Start MenuProgramsWindows XP Repair
  • %UsersProfile%Start MenuProgramsWindows XP RepairWindows XP Repair.lnk
  • %UsersProfile%Start MenuProgramsWindows XP RepairUninstall Windows XP Repair.lnk
%AllUsersProfile% refers to: C:Documents and SettingsAll Users
%UserProfile% refers to: C:Documents and Settings[User Name]

Windows Vista/7:
  • %AllUsersProfile%[SET OF RANDOM CHARACTERS]
  • %AllUsersProfile%~[SET OF RANDOM CHARACTERS]
  • %AllUsersProfile%[SET OF RANDOM CHARACTERS].lic
  • %AllUsersProfile%[SET OF RANDOM CHARACTERS].dll
  • %AllUsersProfile%[SET OF RANDOM CHARACTERS].exe
  • %UsersProfile%DesktopWindows XP Repair.lnk
  • %UsersProfile%Start MenuProgramsWindows XP Repair
  • %UsersProfile%Start MenuProgramsWindows XP RepairWindows XP Repair.lnk
  • %UsersProfile%Start MenuProgramsWindows XP RepairUninstall Windows XP Repair.lnk
%AllUsersProfile% refers to: C:ProgramData
%UserProfile% refers to: C:Users[User Name]

Registry values:
  • HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun "[SET OF RANDOM CHARACTERS].exe"
  • HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun "[SET OF RANDOM CHARACTERS]"
  • HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesAssociations "LowRiskFileTypes" = /{hq:/s`s:/ogn:/uyu:/dyd:/c`u:/bnl:/ble:/sdf:/lrh:/iul:/iulm:/fhg:/clq:/kqf:/`wh:/lqf:/lqdf:/lnw:/lq2:/l2t:/v`w:/rbs:
  • HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesAttachments "SaveZoneInformation" = 1
  • HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerDownload "CheckExeSignatures" = no
  • HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerMain "Use FormSuggest" = yes
Share this information with other people:
Read More..