norton

Tue
17
Feb
Dennis Faas's picture

Verify Action Type for File Association

Infopackets Reader Berlin B. writes: " Dear Dennis, As part of my stringent preventive maintenance plan, I recently ran AdAware 6.0 and Norton AntiVirus software on my PC. Norton reported a number of 'at risk' files on my system. After I ran AdAware ... 6.0, the document files listed in the My Documents folder now show a .DOC extension with no associative icon. When I try to click these files, a window appears and asks me to select the appropriate file extension. It also warns me that if I select the wrong type, the file may become unusable. I was unsure what to do, so I ran System Restore ... (view more)

Wed
06
Nov
Dennis Faas's picture

Using a software firewall and hardware firewall in tandem

Almost a month ago we were knee-deep in discussion with respect to tracking down a hacker. In short, our ongoing discussion probed possibilities and known methods which might be used to track down a hacker, if one ever attempted to hack into *your* ... computer system. RE: Can I track down a Hacker?, Part 1 , and Can I track down a Hacker?, Part 2 . Shortly after Part 2 was released, I received an email from Dan Daily (editor / webmaster) of Danny's Daily . Dan's comments focused on a proposed supposition, which was sent in from John B. in Part 2 of our Discussion . To recap: John suggested to ... (view more)

Wed
09
Oct
Dennis Faas's picture

Can I track down a hacker?, Part 2

Yesterday's Visitor Feedback asked, " Can I track down a hacker ?" My answer to that question was a passive one -- mainly based on the fact it would take an inconceivable amount of time to prosecute each and every hacker who tries to wallow his way ... into your computer system. An algorithm for a typical Hacker might look something like this: Randomly select a computer to hack; Attempt to gain access to randomly selected computer; If access is granted, deliver a payload (send virus/trojan, delete files); If access is not granted, disconnect from this computer; Repeat process. With the ... (view more)

Tue
25
Jun
Dennis Faas's picture

MSConfig errata

Last week's issue of the Infopackets Gazette was about the importance of using msconfig. The article also reviewed some third-party msconfig replacements for Windows 2000 users. I received a lot of feedback regarding the issue since the last ... newsletter was mailed. If you were unclear about how msconfig works, be sure to check out the revisions made to the article online. I have provided a few extra steps and a screen capture for clarity. One more note: I received email with regards to msconfig and the Klez Virus. Denise R. writes: " Dear Dennis, In reference to the recent newsletter, ... (view more)

Pages

Subscribe to RSS - norton