Depending how you look at it Vistaâ€™s User Access Protection (UAP) is on it its best or worst features. In short every time you want to do anything that could possibly threaten the PCâ€™s security or change Windows settings a message box pops up onto the screen demanding to know if you really mean it, or it asks you for a password or change your account status. For most users it is unnecessarily, annoying and a touch nannyish. If you are the only one using your PC, and you reckon you know what you are doing one of the first things you will probably want to do is switch it off. More »
Deep inside Windows XP there’s all sorts of forgotten tools and utilities, some of which were carried over from earlier versions of Windows, or left behind by the developers. Here is a few for you to be getting on with and all you have to do is type the name in Run on the Start menu (without the quotes of course). Most of them are undocumented, though a few of them have some Help files which might help you figure them out but as always you use and try them at your own risk More »
If you are a regular visitor to these pages you should know all about the current epidemic of zombification. For those of you that missed it, this is when a PC is hijacked and used with other PCs to spread Spam and viruses. Some experts reckon that as much as 80 percent of Spam could be coming from zombie PCs, working together in so-called botnets.
Some of these infections, which often hide in downloaded software called a rootkit, are extremely devious and may not show up on a routine anti-virus scan, so how can you tell if you have been infected?
It is not easy but if you know your way around Windows a built-in utility called Netstat can help, by displaying all of the attempts to use your PC is network and Internet connections. To fire it up go to Run on the Start menu and type (without the quotes) and this opens a DOS-like window, at the flashing prompt type netstat (again no quotes and the list of connections. It probably mean much to you but check the list of IP addresses, as this is where the rootkit infection will show its hand. More »