RSS feed for this section

Archive | Knowledgebase

Uploading files to a secure FTP server (sFTP)

 Upload Files to Secure FTP Server (sFTP)

This guide contains a simplified description of uploading files to a sFTP server with WinSCP.
Before starting you should:

Have WinSCP or similar FTP client installed;

Connect to your account on FTP server.

Uploading
Once you are connected to your account of FTP/SFTP server, you will see content of default remote directory (typically a home directory of your account) on remote file panel.

If you want to upload the files to different directory, navigate there first.

Now you can simply drag the local files and drop them on remote file panel. By default transfer settings dialog will appear. Typically you do not want to change any settings, so just press Copy.

Uploading will proceed. Once it finishes, you will see uploaded file in remote file panel.

 

LASTPASS: THE BEST WAY TO MANAGE PASSWORDS

STOP FORGETTING YOUR PASSWORDS!

In today’s digital world, it’s imperative to constantly set unique, and complex passwords for every website that requires a login. Setting the password is the easy part, remembering them is the hard part!

Lucky for you there is an APP for that. The premium password manager, LastPass. Create a LastPass account where you can store all of your passwords, automatically retrieve them, and improve your security. See what we mean and try it out for 1 month FREE!

Passwords Manager Software Application LastPass

SAVE YOUR PASSWORDS AND KEEP THEM ORGANIZED IN YOUR LASTPASS VAULT

  • Store Your Password in a Secure Vault
    All of your passwords and notes are stored safely in a vault. Easy-to-use, searchable, and organized the way you like.
  • Auto Fill every Password
    Save passwords as you browse, and LastPass will autofill the login for you next time you sign into that account.
  • One Account or Many
    Have multiple email accounts? Save unlimited logins for websites, and easily switch between them.
  • Convenient Access
    Get started on any device, free. Your LastPass vault is backed up and synced automatically where you need it.

BETTER PASSWORD, BETTER SECURITY

LastPass has the tools to help you follow best security practices, with a unique, strong password for every account.

MANAGE MORE THAN PASSWORDS

LastPass does more than remember your passwords. Keep track of other important information & simplify your online life.

lastpass secure notes

  • Keep Digital Records with Secure Notes
    Store insurance cards, memberships, prescriptions, WiFi logins and more, so your information is backed up and encrypted.
  • Profiles for Online Shopping
    Create a profile for every credit card and address, so making a purchase is just a few clicks – no typing required.
  • Share Passwords, Securely
    Pay bills with a spouse? Send encrypted passwords to others, easily sync changes & remove access when they’re done.

THE BROWSER OF YOUR CHOICE

Your passwords are always there, with extensions for Firefox, Chrome, Safari, IE and Opera, on every major platform.

passwords-lasspass-features

 

Click Here For Your Free Trial

 

 

Apple TV port forwarding settings on router

Apple TV port forwarding settings on router

For a Linksys/Cisco router:

Click on “Applications and Gaming” tab
Select “Port Range Forward”
Enter 3689 in Start and End (External -Internal) also try instead UDP port 5353
Protocol should be both
IP Address should be AppTV
Enable
Save Settings and reboot

Outlook 2010 vcard multiple import script

Sub OpenSaveVCard()

Dim objWSHShell As IWshRuntimeLibrary.IWshShell
Dim objOL As Outlook.Application
Dim colInsp As Outlook.Inspectors
Dim strVCName As String
Dim fso As Scripting.FileSystemObject
Dim fsDir As Scripting.Folder
Dim fsFile As Scripting.File
Dim vCounter As Integer

Set fso = New Scripting.FileSystemObject
Set fsDir = fso.GetFolder(“C:\VCARDS”)

For Each fsFile In fsDir.Files

strVCName = “C:\VCARDS\” & fsFile.Name
Set objOL = CreateObject(“Outlook.Application”)
Set colInsp = objOL.Inspectors
If colInsp.Count = 0 Then
Set objWSHShell = CreateObject(“WScript.Shell”)
objWSHShell.Run strVCName
Set colInsp = objOL.Inspectors
If Err = 0 Then
Do Until colInsp.Count = 1
DoEvents
Loop
colInsp.Item(1).CurrentItem.Save
colInsp.Item(1).Close olDiscard
Set colInsp = Nothing
Set objOL = Nothing
Set objWSHShell = Nothing
End If
End If

Next

End Sub

How do I uninstall Droping Savings?

If you installed the Chrome Extension (CRX):

Step 1: Open Chrome, click on the Settings icon, and navigate to Tools -> Extensions.

Step 2: Select the DropinSavings plugin from the list of extensions, and click Uninstall.

** That’s it, DropinSavings plug-in is now uninstalled!

If you installed the Firefox Addon (XPI):

Step 1: Open Firefox, and navigate to Tools -> Add-ons.

Step 2: Select the DropinSavings plugin from the list of add-ons, and click Uninstall.

** That’s it, DropinSavings plug-in is now uninstalled!

If you installed the plugin for other browsers:

Step 1: Click Start, and navigate to: Control Panel.

Step 2: Select “Add/Remove Programs” from the Control Panel. For Windows Vista/7 users, this will be called “Programs/Features”.

Step 3: Select the DropinSavings plugin from the list of software, and click Uninstall/Remove.

** That’s it, DropinSavings plug-in is now uninstalled!

 

How do I uninstall Drop Down Deals?

If there’s a single piece of functionality you no longer want, but still want to use others, consider disabling the specific Layers App individually.

Uninstall from Internet Explorer, Firefox or Google Chrome (PC): Go to the Windows Start Menu and then to Control Panel > Add/Remove(“Programs & Features” in Vista/Windows 7) and click “Remove” next to ‘Yontoo Layers’.

Uninstall from Firefox or Google Chrome (Mac): In the top menu, go to Tools > Add-ons. Select the Yontoo Layers logo and then click Uninstall. Note: You cannot uninstall from PC with these steps, see instructions above for PC.

 

 

DNSChanger removal instructions

 Is my computer Infected with DNSChanger?

The best way to determine if your computer or SOHO router has been affected by DNSChanger is to have them evaluated by the Boot Networks computer professionals.  

To determine if a computer is using rogue DNS servers, it is necessary to check the DNS server settings on the computer. If the computer is connected to a wireless access point or router, the settings on those devices should be checked as well.

Checking the Computer:

If you are using a Windows computer:

Open a command prompt.

This can be done by selecting Run from the Start Menu and entering cmd.exe or starting the command prompt application, typically located in the Accessories folder within Programs on your Start Menu.

At the command prompt, enter:

ipconfig /all

Look for the entry that reads “DNS Servers……….”

The numbers on this line and the line(s) below it are the IP addresses for your DNS servers. These numbers are in the format of nnn.nnn.nnn.nnn, where nnn is a number in the range of 0 to 255. Make note of the IP addresses for the DNS servers and compare them to the table of known rogue DNS servers listed later in this document. If the IP addresses of your DNS server appear in the table below, then the computer is using rogue DNS.

You can also look for your DNS servers without using the command prompt.

For windows XP machines, click on Start and select My Network Places. Then select Network Connections. In this example, the wireless connection is used.

Click on the connection that is active. This will bring up the Network Connection Status screen. Click on Support and then Details. Check for the values that correspond to the DNS servers.

If you are using an Apple computer, click on the Apple in the top left corner and choose System Preferences. Then, from the Apple System Preferences window, choose Network.

The Apple Network pane will show a number of possible connections on the left side. Choose the one that is active for you and click on the advanced button in the right lower corner. Then choose DNS from the options to show the DNS servers you are using.

Compare whether your computer has DNS servers listed in the number ranges listed below.

Rogue DNS Servers

85.255.112.0 through 85.255.127.255

To make the comparison between the computer’s DNS servers and this table easier, start by comparing the first number before the first dot. For example, if your DNS servers do not start with 85, 67, 93, 77, 213, or 64, you can move on to the next step. If your servers start with any of those numbers, continue the comparison.

67.210.0.0 through 67.210.15.255

93.188.160.0 through 93.188.167.255

77.67.83.0 through 77.67.83.255

213.109.64.0 through 213.109.79.255

64.28.176.0 through 64.28.191.255

If your computer is configured to use one or more of the rogue DNS servers, it may be infected with DNSChanger malware.

Home computers with high-speed Internet connections and office computers typically obtain their IP settings via DHCP from a device on the network. In these cases, the computers are provided with an IP address, default gateway, and DNS server settings. The IP addresses usually fall into one of three ranges of private addresses—192.168.0.0 to 192.168.255.255; 172.16.0.0 to 172.31.255.255; and 10.0.0.0 to 10.255.255.255. In most homes, computers are assigned an IP address in the range 192.168.1.2 to 192.168.1.254, and the default gateway and DNS servers are set to 192.168.1.1. To determine if your computer is utilizing the rogue DNS servers, read the next section, Checking the Router.

If you are unable to locate your DNS server settings, obtain assistance from Boot Networks or a trusted professional.

Checking the Router

Small office/home office routers connect your network of computers and devices to your Internet service provider. The SOHO router may have been purchased and installed by you or installed by your ISP. Linksys, D-Link, Netgear, and Cisco are common SOHO router brands, but there are many others.

The DNSChanger malware is capable of changing the DNS server settings within SOHO routers that have the default username and password provided by the manufacturer. If you did not change the default password at the time the SOHO router was installed, you must check the SOHO router settings.

The procedure to access your SOHO router setting varies by manufacturer, so consult your product documentation. Once you have access to the SOHO router configuration, compare the DNS servers listed to those in the rogue DNS servers table above. If your SOHO router is configured to use one or more of the rogue DNS servers, a computer on your network may be infected with DNSChanger malware.

What Should I Do?

In addition to directing your computer to utilize rogue DNS servers, the DNSChanger malware may have prevented your computer from obtaining operating system and anti-malware updates, both critical to protecting your computer from online threats. This behavior increases the likelihood of your computer being infected by additional malware. The criminals who conspired to infect computers with this malware utilized various methods to spread the infections.

Individuals who do not have a recent back-up of their important documents, photos, music, and other files should complete a back-up before attempting to clean the malware or utilize the restore procedures that may have been packaged with your computer.

What Does DNSChanger Do to My Computer?

DNSChanger malware causes a computer to use rogue DNS servers in one of two ways. First, it changes the computer’s DNS server settings to replace the ISP’s good DNS servers with rogue DNS servers operated by the criminal. Second, it attempts to access devices on the victim’s small office/home office (SOHO) network that run a dynamic host configuration protocol (DHCP) server (eg. a router or home gateway). The malware attempts to access these devices using common default usernames and passwords and, if successful, changes the DNS servers these devices use from the ISP’s good DNS servers to rogue DNS servers operated by the criminals. This is a change that may impact all computers on the SOHO network, even if those computers are not infected with the malware.

Subnet Masks and Subnets

Subnet Masks and Subnets:

notation resulting subnet
netmask shorthand number of addresses
255.255.255.0 /24 [8-bit] 28 = 256 = 254 hosts + 1 bcast + 1 net base
255.255.255.128 /25 [7-bit] 27 = 128 = 126 hosts + 1 bcast + 1 net base
255.255.255.192 /26 [6-bit] 26 = 64 = 62 hosts + 1 bcast + 1 net base
255.255.255.224 /27 [5-bit] 25 = 32 = 30 hosts + 1 bcast + 1 net base
255.255.255.240 /28 [4-bit] 24 = 16 = 14 hosts + 1 bcast + 1 net base
255.255.255.248 /29 [3-bit] 23 = 8 = 6 hosts + 1 bcast + 1 net base
255.255.255.252 /30 [2-bit] 22 = 4 = 2 hosts + 1 bcast + 1 net base
255.255.255.254 /31 [1-bit] 21 = Invalid (no possible hosts)
255.255.255.255 /32 [0-bit] 20 = 1 Host Route

Email Signature in Outlook 2003

 

Create an Email Signature in Outlook 2003

 

To set up an email signature in Outlook:

 

  1. Select Tools | Options… from the menu in Outlook
  2. Go to the Mail Format tab
  3. Click Signatures… under Signatures
  4. Click New or select an existing one

Security Advisory: Fake DHL Emails Distribute New Trojan

A potential threat to email users in the form of a new spam campaign that masquerades as a shipping notification from DHL. Currently, none of the major anti-virus providers are capable of catching and quarantining this message. As such, this scam has the potential to be successful and can have serious consequences. We have manually updated our virus definitions to stop future incoming messages and are working with our providers to ensure protection against this virus.

We recommend that you take the following action: • Notify all your email users about this threat • Caution your users not to open any attachments from DHL or any unknown sender • Be aware that this is a rapidly-changing virus. Even if your anti-virus provider lists it as covered, you may still be at risk.

More information about this threat: The messages have their “From” field spoofed to appear as originating from an DHL email address. The subject is “DHL Tracking Number ########” (where # stands for a random letter or digit) and unlike most spam, the content of these emails is relatively well-spelled. The message, signed by DHL Delivery Services, reads: “Hello! The courier company was not able to deliver your parcel by your address. You may pickup the parcel at our post office personally. The shipping label is attached to this email. Please print this label to get this package at our post office. The attached archives are called DHL_INVOICE23.zip and contain a trojan installer. “The file in the ZIP archive uses a double file extension in the form of DHL_INVOICE_23.xls______________<plenty of underscores>______.exe,” the Avira researchers explain. This naming scheme as well as the file Excel document icon, have the purpose of deceiving the users into believing that they are actually opening a document. The series of underscores pushes the .exe extension out of the view when the archive file is opened in an unpacking program. At the same time the .exe part will not be visible in Windows Explorer either, since file extensions are hidden by default.



Solution: wv4_disp.dll blue screen error problem

wv4_disp.dll blue screen error problem solution

Nvidia Video card fan had failed.  Replaced video card and problem was solved.