Windows 7 is Microsoft's Best Windows Yet

Microsoft’s loyal customers are finally getting the operating system they deserve with Windows 7, and it was well worth the wait.

Avid Studio 1.1.0.2887 Multilingual

Avid company represents a unique combination of highly professional audio and video technology to work with video files in your home.

Windows 7 OEM 48 in 1 For Laptop 2011 - DVD - ISO

In the disk has all 48 versions of Microsoft Windows 7. Perfect copies of the OEM - or any activation, cracks and amendments. All versions of English (ENG), updates are available. You get a virgin system, each of which can recreate in their what specifically needed.

Thursday, November 3

Combofix



Combofix is a freeware, portable application designed to scan a computer for known malware and, if found, attempt to remove it. I personally use this application very frequently in conjunction with SmitFraudFix to remove Win Antivirus 2008 and its variants. In addition to removing many different rogueware products, it also shows you a log of files that were created or modified in the last month to help you locate potential malware it didnt detect. For example, if there is a randomly named .dll file in the system32 folder that was created on the day of the infection but all other files are dated years ago when Windows was installed, its probably something to do with the virus.

This one is essential for any computer technician who does malware removal work.

credits to Bryce Whitty

Download Link:

http://download.bleepingcomputer.com/sUBs/ComboFix.exe

XP_Fileassoc.bat & XP_EXE_Fix.reg

I have been seeing the Facebook Password Reset Virus on a lot of computers lately and one of the things that this virus does is disables the EXE association with the computer. Basically what this means is that you cannot open .EXE files and since most of your software repair tools are going to be executable files, it makes the virus difficult to remove

To get around this, I have been using two scripts that restore all of the file associations in Windows XP back to default. Once it has been run, I can then use my other virus removal applications like Process Explorer.

The .EXE association can be damaged in a few ways. One way is when the extension association “.exe” doesn’t point to “exefile”. Another way is when the registry for opening .exe files has an incorrect value.

One of the tools is a BAT file and the other one is a .REG file. The problem is sometimes the .REG file association is damaged too so I have to use the BAT file first to fix the .REG association, and then the .REG file to fix the registry.

In any case, the two work well together.

I haven’t tried these two scripts on any other operating system other than Windows XP, so you do so at your own risk.

credits to Bryce Whitty of TECHNIBLE

Download Links:

XP_Fileassoc.bat
XP_EXE_Fix.reg

Sunday, October 30

License Crawler


When reinstalling an operating system you have to search around for all the product keys for your software; a neat way to get it all in once place is with the License Crawler tool. Instead of manually searching through CD cases, emails, and instruction manuals for those keys, License Crawler searches the registry looking for anything that could be a product key. Any keys that are registered in there should be found, including the Windows key and keys for programs like Office, Nero, and VMWare.

License Crawler finds keys pretty quickly, my computer has a lot of programs installed and it finished searching in 1-2 minutes. All Windows versions from 95 to 7 are supported. License Crawler is totally free, small and very portable. It doesn’t require an installation and it can scan a remote hard drive.

This can be especially handy in the computer repair shop because asking clients for product keys can be frustrating and time-consuming which slows down the repair process.

credits to Rebecca

Download Link:

http://klinzmann.name/licensecrawler.htm#DOWNLOAD

SafeMSI.exe


SafeMSI.exe is a tiny, portable, freeware application designed to let you uninstall programs in safe mode. When the computer is in safe mode, the Windows Installer service isn’t started so most programs can’t be uninstalled. Since technicians do a lot of work in safe mode and being unable to uninstall is a huge bother. It is also not possible to start the service manually, an error message will come up saying “Could not start the Windows Installer service on Local Computer. Error 1084: This service cannot be started in Safe Mode”. This tool will do a registry tweak so that Windows Installer is made a safe service and it will launch the Windows Installer service. The tool is meant to be used after you are already in safe mode, it is a tiny .exe that just needs to be double-clicked or run and it runs very quickly.

The website mentions that the tool is compatible with Windows NT, 2000, XP and Server 2000. Although it doesn’t mention it, it is also compatible with newer versions including Windows 7.

credits to Rebecca


Download Link:

http://www.windowsitpro.com/article/tips/jsi-tip-9233-safemsi-exe-freeware-starts-windows-installer-in-safe-mode-.aspx

Saturday, October 29

How to Remove a Rootkit from a Windows System

How to Remove a Rootkit from a Windows System

What is a Rootkit?
A rootkit is a software program that enables attackers to gain administrator access to a system. On Unix/Linux system, this is called “root” access. Rootkits contain tools and code that help attackers hide their presence as well as give the attacker full control of the server or client machine continuously without being noticed. Sometimes they even cause typical malware type problems. I had a case where a browser hijack was being caused by a particular rootkit installed on the system. In this article, I will show you one way to remove a Rootkit from a Windows system.
“Rootkits are usually installed on systems when they have been successfully compromised and the highest level of access has been given (usually root) Some rootkits refuse to be installed until the attacker has root access, due to read and write permission to certain files. Once the system has been successfully compromised and the attacker has root, he\she may then install the rootkit, allowing them to cover their tracks and wipe the log files.”
A typical rootkit consists of the following utilities:
  • Backdoor Programs – login backdoors, telnetd etc
  • Packet Sniffers – Sniff network traffic such as FTP, TELNET,POP3
  • Log-Wiping Utilities – Bash the logs to cover tracks
  • DDoS Programs – Turn the box into a DDoS client (Remember trinoo?)
  • IRC\Bots – Bots used to take over IRC channels (Lame and annoying)
  • Miscellaneous programs – May contain exploit, log editor
Types of Rootkit
  • Persistent Rootkits
  • A persistent rootkit activates each time the system boots. Normally these types of Rootkits are stored in the system registry.
  • Memory-Based or non-Persistent Rootkits
  • Memory-based rootkits will not automatically run after a reboot; they are stored in memory and lost when the computer reboots.
  • User-mode Rootkits
  • User-mode rootkits operate at the application layer and filter calls going from the system API (Application programming interface) to the kernel. These rootkits normally change the system binary files to malicious code that redirects control of the computer to the creator of the rootkit.
  • Kernel-mode Rootkits
  • Kernel-mode rootkits hook to the system’s kernel API’s and modify data structure within the kernel itself. These are the most effective and dangerous types of rootkits. Kernal-mode rootkits are very difficult to detect and can hide on a system without any indication of being active.
  • Bootkits
  • Bootkits are variations of kernel-mode rootkits that infect the Master Boot Record (MBR). The malicious code can be executed before the computer actually boots.
  • FirmWare
  • A firmware rootkit infects a device or piece of hardware where code resides, such as a network card or the system BIOS. Mebromi firmware rootkit http://blog.webroot.com/2011/09/13/mebromi-the-first-bios-rootkit-in-the-wild/
  • Hypervisor
  • These are newer types of rootkits that are infecting the hypervisor layer of a virtual machine setup. The hypervisor is basically the layer between physical hardware (host systems) and the virtual system (guest), although a type II hypervisor can be installed on top of an OS in order to present a virtual layer to the virtual system. These rootkits can intercept hardware “calls” going to the original operating systems.

How to remove the Rootkit

This is where it gets fun! There are different approaches and really no single full-proof method, neither is it guaranteed that the rootkit will be fully removed. As a matter of fact, there are some computer security experts who simply recommend formatting the drive and completely re-installing the operating system.
The Manual Method
This may or may not be more time consuming than trying to search using an automatic tool. If you are familiar with legitimate Windows services and programs and can pick out suspicious files, then this could be the way to go. Many times, rootkit scanners will not detect rootkit infections, especially if they are new, so this may be the way to go if you don’t want to go straight to the nuke-and-pave solution.
Tools:
Here is a process for locating a rootkit via msconfig:
    1. Open msconfig and enable bootlog. In XP, goto Start then Run. Type in “msconfig” (without quotes). Goto the “boot.ini” tab and tick “Boot log” In Vista and Windows 7, goto Start, type in “msconfig” (without quotes). Goto the “Boot” tab and tick “Boot log”2. Restart the Computer 3. Open C:WINDOWS or C:WINNT and open ntbtlog and search for malicious files. You can start by searching this short list from Computersight.com for the files starting with the following names. It may contain some random characters after it.
  • rot
  • gas
  • gaopdx
  • seneka
  • win32k.sys
  • uacd
  • tdss
  • kungsf
  • gxvxc
  • ovsfth
  • msqp
  • ndisp
  • msivx
  • skynet
  • Get the path of the file name: \SystemRoot\system32\drivers\BadRootkit.sys For an exhaustive list of rootkits that you can search for, check out this Rootkit List from Bleeping Computer. 4) Open up a command prompt and disable file permission using either the CACLS or ICACLS command. For e.g., type cmd in the Run box (XP) or search box (Vista/7) with Admin privileges (in Vista and Windows 7 Hit Ctrl-Shift-Enter to enter the command prompt as an Admin) and type cacls C:WINDOWS\system32\drivers\BadRootkit.SYS /d everyone or Icacls C:WINDOWS\system32\drivers\BadRootkit.SYS /deny S-1-1-0:FMRXRW (cacls /d everyone denies permission to the files for all users, Icacls /deny Sid:permission can deny Simple or Specific rights) 5) Restart the computer 6) Search for the file in the following location and remove it C:\WINDOWS or C:WINNT C:\WINDOWS\system32 C:\WINDOWS\system32\drivers Registry Clear the temp, %temp% and prefetch folders The Automatic/ Semi-Automatic method
You can check out a list of rootkit removal tools here.
I would first fire up TDSSKiller from Kaspersky. It runs a fairly quick scan and TDSS variants are popular, so it may catch something on the first attempt.
If the TDSSKiller comes up empty then try out GMER, which is a powerful and exhaustive rootkit scanner.
From there I like to use AVG’s Rootkit Scanner. This tool has actually found quite a bit of rootkits for me. It’s also good to run it after you have removed the rootkit to be thorough, although you could do that with any of these tools. Another program worth mentioning at this point is the new Microsoft Standalone System Sweeper Beta. There has been some buzz that this tool has been fairly successful at finding hidden rootkits.
If these rootkit scanners are not finding anything, or they do find something but can’t delete it, then you may have to move to the manual method. You can also keep trying other tools but there does come a point when you have to evaluate if the time and effort is worth it or you should either try a manual method, or perform a full re-installation of the operating system. 

credits to Chuck Romano

Thursday, October 27

Offline NT Password & Registry Editor


Offline NT Password & Registry Editor is a freeware utility that allows you to change or blank the password of any user that has a valid account on a local NT/2000/XP/2003/Server 2008/Vista 32 & 64bit system. You do not need to know the old password to set a new one which makes this ideal for use with clients who have forgotten their password or were locked out by someone else. Unlocking locked or disabled accounts is also supported.

This tool comes in the form as a bootable CD ISO or Floppy disk ISO but can also be made to boot from a USB drive. The application is Linux based and it asks you questions about which drive and Windows install you would like to work with. Most questions can be answered just by pressing Enter since the best option is already chosen.

Warning: If used on user accounts that make use of EFS encrypted files, all encrypted files will become unreadable unless you remember the old password again. This is a serious technician tool and shouldn’t be used by people who don’t know what they are doing.

Download Links:

http://home.eunet.no/pnordahl/ntpasswd/cd080802.zip
http://home.eunet.no/pnordahl/ntpasswd/bd080526.zip