I am puzzled. I have no trouble with this in Windows 7 Professional 64-bit. I just tried it again. Went into safe mode and uninstalled a program. The msiserver was already running. Here is the REG file exported from my Registry:
----------------------------------------------
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MSIServer]
@="Service"
----------------------------------------------
I don't have an enterprise system to check. Are you in an environment where there might be a policy setting? Or maybe you are using safe mode with network? If you are using the safe mode with network, there is another Registry key: HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\MSIServer
Both keys can coexist in the Registry, Because there seems to be interest in safe mode with networking, I have added the registry edit to the tip.
Can't you run SFC in safe mode? Just use the command prompt with elevated privileges.
There is the obvious suggestion that maybe you accidentally clicked the wrong thing.Take a look at your flags again. If anybody has any other possible ideas, let us know.
Disk cleanup is not supposed to remove files you might need. As I understand it, only older update files that have been superseded by newer update files are removed. Updates from the most recent batch should still be there. If you go into Control Panel you can find a list of updates that have been installed together with an option to uninstall them.
One way or the other, I think everyone with any Google account should check their account settings after Nov. 11 to make sure what it is they are agreeing to.
It looks like anytime you are logged in to any Google account, Gmail or otherwise, your +1 endorsements can be used unless you follow the opt-out procedure given in the tip. Be sure to check the settings in your account on November 11.
There are several points to make.
First, before any upgrade, you should always make a backup of the whole system. So I would hope you already have a backup. However, if you have plenty of disk space, there is no particular need to delete the file. People with an SSD or a small C: partition are the ones most likely to need the space.
As to copying the file to another location, it is a hidden system file and copying such files and then reading them, if necessary, can be tricky. I have not tried doing that. If anybody has experience with that, let us know.
I have also had times when a non-responsive mouse or keyboard could be fixed by disconnecting and reconnecting but this has not always worked. Then I had to restart to get it to work.
I guess you'll have to balance the possibility that .NET might have security problems unknown to Microsoft against the protection that EMET provides. There are, of course, a variety of approaches to security. For example, many alternatives are discussed at http://www.techsupportalert.com/content/how-stay-safe-while-online.htm-0
The system has a record of the path to the refresh image. If you put the image on a removable external drive, be sure that the drive assignment is the same if you plug the drive back in to use the image. Or you can use the command line to reset the default refresh image to a new location. Personally, I maintain a variety of backups with several on external removable drives but I have kept this particular refresh image on a second internal drive with a copy of the image file CustomRefresh.wim on an external drive.
I would add that some malware infections will seek out any connected external drives and could possibly infect your backups. That is why I keep a backup drive that I disconnect except when backing up. Some people even keep a backup in a distinct geographical location in case of fire or other disaster. I even have a friend who takes a backup drive to his bank vault.
The image can be pretty big, depending on what you have on your computer. I do not recommend placing the new image on your main hard drive. Put it on an external drive. As the tip says, create a folder to hold it. Also, as the tip says, make sure you have room on the drive where you are putting it. The recovery partition on most PCs is really only big enough to hold the original image. Once you start adding your own programs and files it is going to be too small.
The command is "recimg" whch I presume comes from "recovery image".
The PC users group I went to back in those days had a lending library of shareware on 360 KB 5 1/4" floppy disks. Those were the days when people really knew how to code and you could get a surprising number of programs even in such a small capacity. Of course, DOS itself only had 512 KB of memory to work with.
Although there is some overlap between the freemium and crippleware categories, they differ in how useful the free software is. The free software in the freemium model provides substantial value and is sometimes almost the same as the paid version. Crippleware is generally not all that useful and often has the best features missing.
The developer's download link says, "Current Version: 1.6.1, Released: 05/12/2010". That is over three and a half years ago. The date you give seems to refer to when the web page was updated. Note that the phrase "Universal Extractor" is all the way on the left side of the page and "Last Modified: Fri, 10/25/2013 - 08:57" is all the way on the right side of the page. The two phrases are not written together as you indicate.
Hackers do not always lock the legitimate owner out of a compromised account. That warns the owner that something is wrong. The hacker may prefer to quietly use the account and keep the legitimate owner unaware.
Thanks for your advice to look into Control Panel. All I can say is that it is usually thought that Mobility Center is disabled on desktops. It was missing on my Windows 7 Pro 64-bit system and several other desktops that I took a quick look at. Microsoft says "Windows Mobility Center—included on laptops running the Home Premium, Professional, Enterprise, and Ultimate editions of Windows 7—puts commonly used laptop settings in one spot so you can access them easily on the go." (http://windows.microsoft.com/en-us/windows7/products/features/windows-mo...)
Several of the Nirsoft utilities are known to trigger false positives from antimalware programs. However, these programs are perfectly safe. The ones you mention are password revealers and some antivirus programs see password activity as malware. Just skip the flagged utilities if you prefer.
I am afraid I am not sure exactly what you are describing. Do you mean that you scanned three different exe files from other programs with this utility and it indicated they were trojans? Or do you mean you sent the files to VirusTotal using PeStudio and got a trojan report? PeStudio itself does not report trojans per se.
As indicated in the article, PeStudio has an option to send files to VirusTotal that can be turned on or off. If a file is flagged by VirusTotal, you have to look further to see if it is a false indication by a few of the many programs that VirusTotal uses or a real indication. See this article for more information: http://www.techsupportalert.com/content/how-tell-if-file-malicious.htm
You have hit on one of the problems with any malware detection method. All detection schemes have grey areas. This software provides warnings but not decisions. There will always be times when additional information, judgment, and experience is required. This program is only one security tool and has to be used in conjunction with others. I wish there were a black and white procedure but security isn't that simple. Maybe this reference will help:
http://www.techsupportalert.com/content/how-tell-if-file-malicious.htm
You could also go to one of the security forums like Wilder's and ask for help in interpreting the kind of warnings you got: http://www.wilderssecurity.com/index.php
There are several ways to make use of File History. On all my laptops I have a slot for an SD flash card. There are 32 GB SD flash cards for sale for less than $20. If you aren't backing up videos or thousands of pictures, an inexpensive SD card or USB flash drive can be used. Also, you don't have to always have the backup device connected. The File History function detects when you attach a drive.
If you mean doing a clean install of Windows 7 on an existing Windows XP setup, that is not what this tool is for. It is for transferring settings and files from an XP machine to a separate Windows 7 machine.
What hard links are you referring to? As far as I know, none of the items in the article involves hard links. Windows uses "junctions" for some things but these are not hard links and anyway are not involved in this article's discussion. See http://windows7tips.com/symlinks-definition.html
You are right that Windows does not always report hard links correctly. Perhaps you are thinking about the WinSxS directory, which does use hard links.
I am sorry but there has been a misunderstanding. I have not "advocated" changing passwords at infected sites. Let that be plain. With that made clear, let us call an end to this thread.
I did not miss your point. The problem with unpatched sites is discussed in references given in my first reply above. Also, if you read the referenced Mashable article that is the basis for the present article, you would see that the sites that are listed as needing a password change are sites that have patches for the bug already in place.
True discussion is always welcome. Incorrect statements, however, are a different issue. My way of responding to your original point about unpatched sites was to provide information by means of some references. To my way of thinking, that answered your comment. However, if you feel an explicit acknowledgement of your point is necessary, I am happy to say that you had a valid point about those sites that are still unfixed. However, the article's focus was specifically about changing passwords for sites that had patched the problem, as a reading of the Mashable article that was cited would have made clear. You responded with the unfair statement, "Your article advocates updating passwords at infected sites". This is simply not true.
Yes, it would be good if everybody had some idea what OpenSSL was and what the bug entails but I wonder if it might not be rather too technical for many people. In any event, I hoped that the FAQ http://heartbleed.com/ given in the previous tip http://www.techsupportalert.com/content/how-check-if-website-has-been-af... might be helpful to those wishing to know more about the problem.
If you would like to write an article about what you think people should know, we always welcome new material.
What to do about sites that have not yet been patched is a dilemma. I do not personally see a clear-cut solution or easy answers. I think your suggestions are as good as any but it's a personal choice.
I looked at some sites with the Firefox extension and got no red. I don't know why you are seeing all these red ones. Anybody else have this result?
At this time, I do not have a link for a test site. Anybody have one to suggest?
You can go to https://gist.github.com/dberkholz/10169691 and find sites that test as vulnerable in the list given there. However, I do not know what else is on these sites so you are on your own if you want to try them. I tried one in Firefox and the extension duly turned red.
Thanks for telling us your experience. Others have also found that you have to reload. I haven't seen this problem in my own tests and I don't know what particular browser configuration or combination of add-ons causes what you experience.
You are right that there is considerable confusion about http vs. https sites.
As to the Akamai patch, I am no expert in this area, but I believe they have said that the original bug has been rectified and they have reissued SSL certificates. Whether the update has been applied by everybody I don't know. Also, while Akamai is a major service in this area, there are others.
Whether the various tests for the Heartbleed bug are 100% effective, I don't know. This whole situation continues to be a big mess.
Yes, "Home" takes you to the first icon in the top row. My icons are not always arranged all that orderly and I can get "End" to take me to different icons with slightly different arrangements. People who are tidier than I am probably don't have this problem.
Crombierob, you aren't the only one confused by the way Microsoft has decided to name things. There are two versions of Windows 8.1 - the original Windows 8.1 and the newer Windows 8.1 Update. It would certainly have been clearer if Windows 8.1 Update had been called Windows 8.2 or 8.1.1 or something like that. In any event, Windows 8.1 Update is different from Windows 8.1.
Another unusual thing Microsoft is doing is to give only a limited time for Windows 8.1 to be upgraded to Windows 8.1 Update. For example, see this link: http://www.computerworld.com/s/article/9247520/Microsoft_requires_migrat...
MikeR amd mjt328, you ask a good question. Personally, I think Google has not made it completely clear what the difference is between a plain Gmail account and a Google account. On this page (https://support.google.com/accounts/answer/76194?hl=en&ref_topic=2373943) Google says, "Here's how Gmail and Google Accounts are related.
If you use Gmail, you already have a Google Account, and you can access:
Free Google products, including Calendar, Google Groups, Picasa, Web History, and more."
On the other hand, if you don't set up a public profile, there seems to be no privacy setting available. It appears that you need a Google+ account to get the privacy setting. Presumably, the type of endorsement that Google may use in ads comes from Google+ members actively clicking the G+ button on items or leaving comments.
One reason it is hard to get a handle on what information Google collects and uses is that there are different types of tracking that Google uses. Gmail users have ads that are tailored to them and using Google search may let Google use your search history to tailor ads (discussed in this tip - http://www.techsupportalert.com/content/how-stop-google-keeping-record-e...). But ad-tracking is one thing and quoting you in an ad together with your picture is another.
FWIW, here is the Google privacy policy - http://www.google.com/intl/en/policies/privacy/
I stand ready to be corrected but I think users of Gmail alone will not find themselves quoted in Google ads.
Various different .NET Framework versions are used by many applications. Usage varies widely from system to system. Unless you have a specific problem with a particular version, it is probably best to just leave things alone.
As the article says, this is for one-time use to clean an infected system. If it finds ransomware, it removes it and decrypts any encrypted files. If it finds nothing wrong, then it gives a message to uninstall it. As the article says it isn't for preventing infection but for removing an infection and there is another app for prevention. Why you can't just leave it installed, I don't know.
This is a list of the most recently posted comments on the site sorted so that the most recent comments appear first.
You can however sort the list on Article title by clicking on the column heading. To see actual comments click the + sign.
Pages