Posted on 4 Comments

Get rid of viruses, spyware, malware and other nasties

One of the things I do that often helps with cash flow is cleaning PCs. That doesn’t mean dusting (although I do that) but means removing viruses, trojans, worms, spyware, malware, popups, and other things that slow down your machine and generally cause you to curse a lot. Busy Mom has found herself in a position to have to clean a machine. It usually takes me 5 hours and I charge $95 but am going to start charging $135 per machine. That is comparable price to BestBuy’s Geek Squad which gives the machine a couple of hours then declares it needing a reformat (which turns their job into a non-labor intensive automated process) removing all your photos, data, banking information, document and other things you probably have not backed up ever and will never see again. I also do not do upsales since that is not my business but I do love your referrals for web applications (web pages, business automation processes, and such).

This was my comment to BusyMom:

More and more of late I have had people ask me to clean their machines. It usually takes me 5 hours to make the machine presentable enough that I feel confident the viruses/malware/spyware and other garbage won’t return in a week.

Here are my trade secrets.
1) Go to http://www.ultimatebootcd.com/ and make a CD from the iso. (I prefer the windows version http://www.ubcd4win.com/ and often use both).
2) Make sure the bios is set to boot from the CD first.
3) Boot to the ultimate boot cd (I’ll assume you chose to use the windows version) and enable networking
4) Run all the virus scanners. When they prompt to update, do so! Not all will work. Skip the rootkit detector.
5) Run Adaware and Spybot.
6) Run EZPCFix, load the hives, delete temporary files, remove downloaded program files, update winsock/winsock2, and very important clear all pending file rename operations.
7) Reboot making sure to remove the UBCD from the cd drive.
8) Within Windows, go to http://housecall.trendmicro.com/ and start a virus scan from your browser.
9) Go to http://safer-networking.org/ and make sure you have the latest SpyBot Search N Destroy. Be wary of anything that is not SpyBot SND, Lavasoft’s Adaware, or Microsoft’s Defender (all 3 do similar things and overlap but one might catch something another missed).
10) Go to http://lavasoft.com/ and make sure you have the latest Adaware. Also get the VX2 cleaner from the addons.
11) Search google for “Microsoft antispy” and get the latest Defender (I hate this thing and often uninstall it when I’m done).
12) Get CWShredder http://www.trendmicro.com/cwshredder/ and run a scan.
13) Get HiJackThis http://www.spywareinfo.com/~merijn/downloads.html When you run it, simply google EVERYTHING that it returns and be certain you understand its purpose before removing something. When in doubt, probably best to leave it and rely on a detection and removal tool.
14) Start->Run->regedit Go to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run and remove any suspicious items. Google and use caution. Do this also for RunOnce, RunOnceEx, RunServices, and RunServicesOnce.
15) Repeat 14 for HKEY_CURRENT_USER
16) Update the virus definitions for whatever virus software you use. Although Norton and McAfee used to be the top dogs, I no longer recommend them because they bog systems down too much with their “good intentions.” I advise people toward Grisoft’s AVG http://www.grisoft.com/ and AVAST http://avast.com/ (free). Run a full, intensive virus scan.
17) Run Windows Update and get all the latest security patches. It amazes me how many people have never run Windows Update or Microsoft Update.

I’m sure I have left some things out. Good luck!

An update was necessary after another user advised BusyMom to remove Adaware and Spybot and to reformat.

Sara’s comment “Oh and Adaware and Spy Bot add lag time as well as blocking certain sites.” is inaccurate.

There are two types of protection. Passive and Active. Active protection is a program that runs in the background all the time. Since it is running, active protection can cause performance issues. This would be akin to a doorman letting people (programs) into a night club. It would be faster if the doorman wasn’t there and just let everyone through but then you get the riff raff. Active protection checks everything as it goes.

Passive protection works only when you tell it to. With active protection you have no doorman at the club and people come and go. Perhaps some riff raff come in and vandalize a bit, steal some information, and when you start to notice the disturbances you run your passive protection. You turn off the music, make everyone stand still, and have the doorman and security sweep the place removing the riff raff.

Adaware and Spybot are passive protection. Adaware Plus (the paid version) has a wonderful piece of active protection called Ad-watch which I run all the time. Ad-watch does some blocking but mostly warns you if something is trying to make an unauthorized change to the registry.

Adaware and Spybot are not blocking applications. They do not block sites. They are scanners that look for and correct problems. They are the most valuable tools in your arsenal against malware. Ad-watch does some popup blocking but it is not a firewall and does not filter sites.

Reformatting to recover a computer is almost NEVER necessary. Sometimes it is easier and it is nice to start fresh but not required. I used to reformat and start a new every 6 months to a year but then again I had regular backups of my data.

Two other topics of consideration are virus protection and firewalls. Using our night club analogy, virus protection can also be active or passive. Software like McAfee, Norton Antivirus, AVG, and Avast are active. They reside in the computer’s memory and run all the time. They are the doormen that stick a tongue depresser into everyone’s mouth as they enter the club and make sure no sickness gets in. The online scanners at Trendmicro (http://housecall.trendmicro.com/) and Symantec (http://sarc.com/) and other are passive. They scan when you tell them to and it would be the equivalent of calling in the doctors after you notice your guests falling ill. I few Norton and McAfee as doctors that have gotten carried away and give everyone an anal exam even if they just came in for a splinter. Norton and McAfee both come with large staffs that consume a lot resources (ie. their Security Centers)

A firewall is like a guest list. That’s the big ugly bouncer who turns people away at the door. When a person tries to enter the club that isn’t on the approved list, the bouncer sends them packing. Some firewalls have VIP lists which are the programs that can run even if they appear on bad lists (this would be called your “exception” list). The firewall might trust most programs (depending on the instructions you’ve given it). These programs are called white listed. And might absolutely refuse some guests based on a blacklist typically maintained by not for profit organizations and the company from which you purchased your bouncer…er, firewall.

Btw, I see your header fine in Firefox.

And lastly:

One final tidbit, I forgot to meantion that you should go to the control panel->add/remove programs and confirm that each program is supposed to be there. There are some nasties out there that install themselves to your system and give names that sound appropriate. By searching google on each program name you will find out its purpose and may be surprised by some that should be removed.

Now you all know my secrets to cleaning a machine! Well, a lot of them.

Posted on 3 Comments

Captain Kirk Would Be Proud

Sony via Make (rss) is taking questions on their Reader (PRS-500) ebook reading device. Wow that’s pretty! Looks like it is right off the bridge of the Enterprise. Here’s hoping that DRM does not kill this device.

I know that if buy a paperback book that I can pass that book onto my children’s children. I also know that tomorrow when I wake up that the book will still be on my bookshelf instead of a note that the book has expired and must be repurchased. I hope that they choose to model the real world in their e-reader. Of course, in the real world my book can get destroyed or worn out. I do have books that have been purchased multiple times. An argument for a repurchaseable ebook can be made but I think their efforts would be better spent selling me quantity of content rather than repeating the same purchase.

Posted on 3 Comments

Blogathon starts in 13 hours and 45 minutes! Please sponsor.

Blogathon food

I am turning on the heat. We have this week ONLY to find sponsors for Blogathon 2006! I have joined forces with Barry, Jay, and Cathy to help raise a contribution to Farm Aid by blogging every thirty minutes starting at 9am EST on this Saturday July 29 and continuing for 24 hours.

The mission of Farm Aid is to keep family farmers on their land. Family farmers are our only guarantee for fresh, local food. Our goal is to bring together family farmers and citizens to restore family farm-centered agriculture. Family farmers ensure safe, healthful food, protect natural resources, and strengthen local economies. [Source]

I once thought Farm Aid was just something Willie, Neil, John, and others sang songs about after Band Aid sales went down. I have since learned about Farm Aid and corporate farming. I feel the family farm is important to our culture, the quality of our food, and local economics. I believe in Farm Aid’s mission and ask that you support me during Blogathon 2006 with a donation to our cause.

blogathon banner

Thank you Michael Silence for the announcement!

Posted on 3 Comments

I was warned…Ze Frank is coming!

First there was Amanda Congdon at Rocketboom. When she parted company with RB, I pondered, "could a guy pull off what a female host can?" Several weeks ago an online friend gave me an electronic nudge and said, "Yes!" Ze Frank is undeniably the next video blogging hit. Of course, there still is Ask a Ninja but he’s…uh..you know…a cubby ninja. Be warned Ze Frank uses language that many of us pretend we don’t hear daily.

Posted on 1 Comment

The US House of Representatives Is Run By Predators

“Social networking sites such as MySpace and chat rooms have allowed sexual predators to sneak into homes and solicit kids,” … [Source]

NO! It is NOT the social networking sites and chat rooms that have allowed the sexual predators to sneak into homes…It is the parents! The parents the parents the parents! You cannot legislate parenting or morals.

Secondly, does anyone fact check anymore! (ironically, I am not going to fact check my next statement) I bet that the above quote is sensationalism and that if you measure the actual rate of incidents concerning sexual predators that you will find it to coincide with the real world. People naively continue to think of the Internet as a game or a book. It is not a game. It is not a book. The Internet is a reflection of the real world! If your 13 year old daughter said, "I’m going to go hang out at a bar near the college." would you give her your credit card and shrug her off in a taxi so that you could focus on all that busy stuff you need to attend to? Of course not! Then why are you doing the same thing with the Internet? Do not allow the greatest technology, the convergence of world knowledge, be crippled by some scared, power hungry technology ignorant people manipulating your vote with hype.

A free society remains free because of the unhindered exchange of information. Burning the books is how to control knowledge and remove freedoms. Filtering software does not work. It filters the wrong information, allows for unfair competition, and is often easily circumvented by those seeking to ignore the filtering.

We have real world predators attacking you right now. Those predators are your senators, lawyers, your president, and other people in government seeking to remove your freedoms and change America forever in the name of leveraging their own beliefs and powers. A government of the people and for the people is only of and for as long as the people keep the government in check and the moment people become too busy to worry about it and being taking sensationalism and generalizations as fact is the moment that the foundation of our society begins to crumb. We are at that moment now!

Contact your representative and ask them just what they were thinking!

Thank you Tom for the link!

Posted on 6 Comments

If you can believe the stats

According to the statistics provided by my web host, Cathy had 1,144 unique visitors to Domestic Psychology on Monday. I had 1,143 to Reality Me. Alright, who is that one person who reads Cathy and ignores me!

Oh, frankly I don’t believe those numbers. I am more inclined to think that both blogs are somewhere between 50 and 200 visits a day but I don’t have anything to prove it one way or another.

I do highly recommend 1and1 for inexpensive web hosting for anyone looking to switch from Blogger to WordPress (remember, I’ll help you set it up for free!).

Posted on 5 Comments

Are you cleaning up with AJAX?

AJAX bugs me because a bunch of developers that used to say "we can’t do that because we would limit our market" jumped on a bandwagon that potentially limits their market (ie. browsers that don’t support javascript or have javascript disabled don’t support AJAX). Try using Google’s calendar with javascript disabled or change your user agent to an unknown browser.

Regardless, all developers worth their salt should do some dabbling in AJAX. Here is a nice list of 126 examples.