From Security Standpoint, You May Want To Forget a Windows 10 Upgrade

From Security Standpoint, You May Want To Forget a Windows 10 Upgrade

Hello all, Blogmaster here – who also has run a Community Free help site for malware removal and information etc since around 2005. Here and there, more and more seeing many writings about the new Windows 10 from a security standpoint – well for me it is forget it. I will probably never buy one and certainly will not upgrade. I would rather switch to Linux forever than go through what they have going on now.

There is a circumvention of security with a more or less full blown allowance to third party ad network type activities. A lot like downloading software with adware and spyware bundled secretly inside and installs. It is a thumbing of the nose at the public for dollar$ gained through this type of harvesting. When this began around 2001-2002 and 2003, all laws and softwares were created to make it illegal as well as block and detect and remove it from any PC. This is when and where adware and spyware were discovered.

One hand washes or shakes the other on the internet as far as trying to get money to pay bills through ads etc. Most of the innocent are actually welcomed across the board – an ad here there – but sometimes irritating. Depends if you are surfing or studying. The infection by adware creates the continual intermittent pop up annoying ads and can as well be leaking personal information to third parties. This is how legally antispyware companies were legally allowed to create antispyware and as well, publicly declare these as adware infections without libel suit.

So the whole point here is basically that with Windows 10 – the world wide web is returning to those days of allowance and naivete to those days immediately preceding the spyware category of threats being discovered. (I have noticed some security products do not block browser leaks as much as you would think.) They’re sticking it to the newbies again, in a reverse manner of trying to help with UAC being released in Vista forward and much else to make security as automatic as possible for novices (newbies). If you were around for those “XP Years” when this was the day, you’ll see and get this feel all over again in reading this great blogpost below describing security and Windows 10. (Emsisoft Antimalware is all I have recommended as top product for several years now – which indeed blocks any attempt of a browser leak with user choices as you can plainly see in a free trial).

Of course for veteran users who tweak security settings across the board in Windows – there is going to be a lot to turn off and block anywhere possible which may be the cure. Some services will obviously be forget it -don’t use it, just use Windows as it was still 7 or 8. But read this blog for sure, if new or experienced user, and get a good eye full of what Windows 10 is doing to computing security. I won’t doubt there may even be lawsuits for data breach causing ID Theft long the near future.

The truth about Windows 10 spying on almost everything you do
http://blog.emsisoft.com/2015/09/02/the-truth-about-windows-10-spying-on-almost-everything-you-do/
In Security Knowledge
by Carla September 2, 2015 |

You have probably heard the news by now: Microsoft has updated a controversial service agreement that lays out in scary detail how your personal data is being used and abused – at least, that’s what the major tech blogs are saying. But the reality is, even if you read the 12,000 word service agreement, it’s still confusing and vague at best. ….

…..”Cortana is your voice-activated personal assistant, much like Siri and Google Now. But in order for her to operate, Windows 10 collects your personal information to better serve you. This includes calendar events, contact information, alarm settings, what you view and purchase, your browsing history, emails and text messages… “and more”.” …..

….. “OneDrive is Microsoft’s cloud storage system, and it comes with the Windows 10 territory. You might think it’s great because there is no additional sign up or installment required and you can access it from any of your Microsoft devices. But this new convenience comes with a price.
Every time you are signed into your machine with your Microsoft account, your operating system immediately syncs your settings and other data to company’s servers. This includes browser behavior and history, as well as mobile hotspot and Wi-Fi network passwords.” …..

READ IN FULL:
http://blog.emsisoft.com/2015/09/02/the-truth-about-windows-10-spying-on-almost-everything-you-do/

REMEDY / FIX …..

O&O ShutUp10
Free antispy tool for Windows 10
O&O ShutUp10 means you have full control over which comfort functions under Windows 10 you wish to use, and you decide when the passing on of your data goes too far.
Using a very simple interface, you decide how Windows 10 should respect your privacy by deciding which unwanted functions should be deactivated.
O&O ShutUp10 is entirely free and does not have to be installed – it can be simply run directly and immediately on your PC. And it will not install or download retrospectively unwanted or unnecessary software, like so many other programs do these days!

IN FULL AND DOWNLOAD LINK…..
HAS BEEN RECOMMENDED HERE:
http://blog.emsisoft.com/2015/09/02/the-truth-about-windows-10-spying-on-almost-everything-you-do/
https://bluecollarpcwebs.wordpress.com/2015/09/09/from-security-standpoint-you-may-want-to-forget-a-windows-10-upgrade/

O&O ShutUp10
The telemetry components of Windows 10 and the way they affect the user’s privacy is a controversial topic ever since the release of the most recent iteration of Microsoft’s operating system. While many options can be tampered with during setup, there are applications out there specifically tailored to allow the manual tweaking of Windows 10’s security settings. One of them is O&O ShutUp10.
Various range of tweaks for Windows 10
Requiring no installation, O&O ShutUp10 provides users with a simple means of customizing the privacy options in Windows 10 and thus decide which data collection options will stay enabled and which should be blocked.
http://www.softpedia.com/get/Tweak/System-Tweak/O-O-ShutUp10.shtml


SENDER: gerald309 —
Have A Safe Computing Day!
Webmaster: Malware Removal/Amateur Forensics
HOME http://bluecollarpc.us/
Alternate https://sites.google.com/site/pcsecurityhelper/
HELP http://tech.groups.yahoo.com/group/BlueCollarPCSecurity/
Membership/Join List:
Subscribe: BlueCollarPCSecurity-subscribe@yahoogroups.com
Free Malware Removal Help / A Community Website Since 2005
MOBILES: http://pdamobilecafe.wordpress.com/
Alerts: pdamobilecafemobilealertlist-subscribe@yahoogroups.com
RSS: https://groups.google.com/forum/feed/pdamobilecafe-mobilealerts/msgs/rss.xml?num=15

Advertisements

How Secure is the Windows Clipboard? Clipboard Hijacking

How Secure is the Windows Clipboard?
It is always a good idea to be concerned about the security of your data, especially when it comes to your login credentials for websites. With that in mind, just how secure is the Windows Clipboard? Today’s SuperUser Q&A post has the answer to a worried reader’s question.
Read This Article →
http://www.howtogeek.com/226207/how-secure-is-the-windows-clipboard/

Definition
clipboard hijack attack
http://whatis.techtarget.com/definition/clipboard-hijack-attack

FROM BLUECOLLARPC…..

REVIEW OUR HELP ARCHIVE – CLIPBOARD HIJACKED….
BLOG: Remember Clipboard Hijacking – Archived Help
June 21, 2011 — bluecollarpc
https://bluecollarpcwebs.wordpress.com/2011/06/21/remeber-clipboard-hijacking-archived-help/

CCLEANER CLEANS THE CLIPBOARD DATA…..
THE MOST POPULAR USED FREEWARE JUNK FILE CLEAN UP IS CCLEANER…
(CLICK CLIPBOARD BOX CHECKBOX IN THE SETTINGS)
CCleaner – (Recommended: very popular, safe, Genuine Freeware/donate, used by millions) CCleaner supports the cleaning of temporary and unneeded files from … http://en.wikipedia.org/wiki/CCleaner
Get – CCleaner http://www.ccleaner.com/

BLOG:
Recommended Settings and use of CCleaner – Temporary Internet Files Clean Up Browsers, Applications
bluecollarpc
https://bluecollarpcwebs.wordpress.com/2012/01/14/recommended-settings-and-use-of-ccleaner-temparary-internet-files-clean-up-browsers-applications/

-- 
SENDER: gerald309 -- 
Have A Safe Computing Day!
Webmaster: Malware Removal/Amateur Forensics
HOME http://bluecollarpc.us/
Alternate https://sites.google.com/site/pcsecurityhelper/
HELP http://tech.groups.yahoo.com/group/BlueCollarPCSecurity/
Membership/Join List:
Subscribe: BlueCollarPCSecurity-subscribe@yahoogroups.com
Free Malware Removal Help / A Community Website Since 2005 
 MOBILES: http://pdamobilecafe.wordpress.com/ 
Alerts: pdamobilecafemobilealertlist-subscribe@yahoogroups.com 
RSS: https://groups.google.com/forum/feed/pdamobilecafe-mobilealerts/msgs/rss.xml?num=15

False Claims: Using a Registry Cleaner Will Not Speed Up Your PC (Actually Does)

False Claims: Why Using a Registry Cleaner Will Not Speed Up Your PC …
WE TOTALLY DISAGREE WITH THE FOLLOWING ARTICLE, AND IF AS STATED THAT REGISTRY CLEANERS WERE SNAKE OIL (WORTHLESS, FALSE ADVERTISEMENT AND CLAIM) THERE WOULD BE PLENTY OF COMPLAINTS AND SUITS AND LEGAL ACTION BY CONSUMERS AND GROUPS AND THE LAW BROUGHT AGAINST THEM IN ALL THESE YEARS FOR SUIT AND CEASE AND DESIST TYPE ORDERS FROM A COURT WITH PENALTIES/FINES FOR FALSE ADVERTISING. ……
THIS IS IRRESPONSIBLE AND UNINFORMED AND AS THEY ARE NOT EXPERTS AND PROFESSIONALS PRODUCING PRODUCTS FOR THE WINDOWS PC.
HOWTOGEEK.COM IS RARELY WRONG BUT ATE A BIG FOOT IN THE MOUTH ON THIS ONE. WRITE ONLY ABOUT WHAT YOU KNOW – OLD AXIM.
ARTICLE:
Why Using a Registry Cleaner Won’t Speed Up Your PC or Fix Crashes
We’ve said it again and again: Registry cleaners don’t speed up your PC. At best, they’re a waste of time — and often money. At worst, they can cause problems by removing registry entries they shouldn’t.
READ THEIR ARTICLE AND RETURN HERE AND READ OUR BLOG POSTS ON THE SUBJECT AND CHECK OUT OUR WEBPAGE AT OUR SITE FOR THE WINDOWS REGISTRY HELP…  http://bluecollarpc.us/windows-registry-help/
NO BENCHMARK TESTS?
QUOTE: http://www.howtogeek.com/171633/why-using-a-registry-cleaner-wont-speed-up-your-pc-or-fix-crashes/ “…No legitimate benchmarks showing a performance increase as a result of a registry cleaner have ever been released. If a registry cleaner offered boosted performance, we would have some benchmarks by now.”
BENCHMARK RESULTS…
New jv16 PowerTools 2014 software delivers over 20% improved benchmark
scores and Windows startup times.
The new 2014 edition improves performance and cleans errors from
Windows-based systems with ease. The 2014 version was released alongside a
benchmark study which shows that this latest edition can deliver over 20%
improvement to system benchmark scores and Windows startup times.
For more information, please see:
BLUECOLLARPC.US BLOGPOST
Restricted Sites Utilities Softwares Fraud,Potentially Damaging Windows Registry
By bluecollarpcLast updated: Sunday, May 23, 2010 – Save & ShareLeave a Comment
About Software Utilities Adding Restricted Sites lists to the Registry

THIS IS ABOUT USING RESTRICTED SITES UTILTITIES FOR “BROWSER IMMUNIZATION” OR “BLOCKS POTENTIALLY UNWANTED SPYWARE AND OTHER UNWANTED SOFTWARES” etc.

THIS EXPLAINS WHY THEY ARE A SCAM AND DAMAGING TO COMPUTERS AS WILL EVENTUALLY DESTROY THE COMPUTER SYSTEM RENDERING IT INOPERABLE

ASIDE FROM THE FACT THAT THIS BROWSER SOFTWARE SETTING ENTERS A REGISTRY KEY FOR EVERY WEBPAGE OR SITE BLOCKED AND HAS BEEN CIRCUMVENTED BY MALWARE – WE WILL START HERE WITH THE FACTS THAT CONTINUAL ENTRIES INTO THE WINDOWS REGISTRY WILL DESTROY THE SYSTEM MAKING IT INOPERATIVE…..

YOU MOST LIKELY THINK THEY ARE SOME MAGIC WAND OF PROTECTION — HERE IS ALL THEY DO AS “IMMUNIZATION” OR “PROTECTION” FOR DONATION MONEY…….
How to use security zones in Internet Explorer
http://support.microsoft.com/kb/174360
Restricted Sites Zone
“This zone contains Web sites that you do not trust. When you add a Web site to the Restricted Sites zone, you believe that files that you download or run from the Web site may damage your computer or your data. By default, there are no Web sites that are assigned to the Restricted Sites zone, and the security level is set to High.”
Generally the registry value added is “4″ from 0-4 SEE:   HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionInternet SettingsLockDown_zones4
SO THAT ONE KEY WILL BE ENTERED BY THEM FOR EACH BAD SITE THEY ADD TO UPDATE DEFINTIONS…..EXAMPLE:

EACH SITE ADDRESS MUST BE ENTERED HERE AS A “RETRICTED SITE” …..
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionInternet
SettingsZoneMapDomains

EXAMPLE…. We are placing “adult.com” in Restricted Sites to show the key made immediately and written into the Windows Registry (adult.com as example here to block underage users on same PC – not saying it is a bad site at all)
HERE IS THE KEY IMMEDIATELY WRITTEN INTO THE REGISTRY TO BLOCK BROWSER ….
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionInternet SettingsZoneMapDomainsadult.com

What Professionals and Experts say…..

You will see below a Professional explanation and why registry cleaners are used to prevent damage to Windows and/or softwares. Whereby certain utilities may add lists of sites and domains – this can be an exact example of “incremental entries” by softwares, or manually, into the Registry constantly per “definitions” Updates (lists of ‘bad’ domains added)….

Product Incrementation of Windows Registry –
Windows Registry Size Limits
http://www.liutilities.com/products/registrybooster/faq/registrycleaner/

“Fragmentation is a serious problem and occurs when application processes modify the registry continually and incrementally .
Eventually registry file sizes may exceed the Registry Size Limits imposed by Windows. This causes subsequent modifications to the registry to fail. Most registry repair software allow you to defrag your registry ensuring that such issues do not occur. This is true prevention.”

…..the constant inordinate or unusual ‘incrementation’ of constantly adding Restricted Sites and domain entries in great mass volume offers no real protection – as malware circumvents the Restricted Sites feature of any browser anyway – and as explained will lead to failure of software running processes and application design as well as the Windows Operating System.

The Windows Registry has an imposed size limit. When this is approached and to succession – Windows will fail to operate as well as other software that relies on normal incremental changes such as definition updates to antivirus and critical Windows Updates as prime example.

What is bottom line is, actually Windows can cease to function at some point of additions to the Windows Registry just like regular hard drive memory runs out at some point of continual downloads of files, media, etc.

SEE: Microsoft – Windows Registry Size Limits Imposed
Below are the Experts and creators of Windows facts….

Windows Registry Size Limits Imposed / Microsoft…
http://msdn.microsoft.com/msdnmag/issues/01/12/XPKernel/
There is a limit on the size of the System hive (the file that stores the HKEY_LOCAL_MACHINESystem key and its descendants) of 200MB, because of restrictions placed on the operating system boot loader by the environment in which it runs (the boot loader reads the System hive into memory very early in the boot process), but the limit for the System hive was just 12MB in previous versions of Windows…..

MORE:
Registry Size Limit functionality has been removed from Windows Server 2003 and from Windows XP
http://support.microsoft.com/kb/292726
Windows Registry Size Limits
http://msdn2.microsoft.com/en-us/library/ms724872.aspx
Registry Size Limit
http://www.microsoft.com/technet/prodtechnol/windows2000serv/reskit/r

Don’t listen to hackers – and this is extremely crucial with all systems released before Windows XP. The XP size limit was increased but has an imposed Size Limit by Microsoft. Some say “don’t worry about it”… and those are just the persons you remember when your computer fails. Too late then.

Hackers may tell you to set up “registry folders” for Windows 98 and 95 to place these downloads (lists) in that would save or add registry room which would be preposterous. Hackers will tell you if and when you run out of room in XP you can “increase the paged pool size – no problem”. Neither of these work or are true – and are bad hacks and they may be intentionally attempting these malicious pranks at your expense to destroy peoples machines like the “kiddie script” malware writers for “bragging rights” achieved. DUMP IT !

Did you know that antispyware programs like Webroot Spysweeper and Trend Micro Antispyware and the free Microsoft Windows Defender have real time active shields that block all “drive by” threat installations at all sites – not just “the bad ones – Restricted Sites” ?

This is what those that run donate forums and repair shops do not tell you so that they continually derive profit at the expense of the unknowing consumer. It is very simple – for 30 dollars a year you are good to go. End of story. Do it and dump it now before you injure your machine.

THE FRAUD OF THESE UTILTITIES

FACT – WELL OVER 25 BILLION WEBPAGES ……
World Wide Web
http://en.wikipedia.org/wiki/World_Wide_Web
Statistics
A more recent study, which used Web searches in 75 different languages to sample the Web, determined that there were over 11.5 billion Web pages in the publicly indexable Web as of the end of January 2005. As of March 2009, the indexable web contains at least 25.21 billion pages.

These products claim to….
“secures browser against dangerous sites and their unwanted malware” and explain their features as “preventing installation of spyware and other unwanted software, exploitation of security vulnerabilites, …”
IS THE FANCY DECEPTIVE WAY OF SAYING……
The product enters the entire list to date they have compiled as bad content websites and/or webpage addresses into Restricted Sites CREATING AN INDIVIDUAL REGISTRY KEY FOR EACH “DEFINTION” UPDATE FOR EACH WEBPAGE OR WEBSITE DOMAIN – one Windows Regsitry Key for each “automatic update” — and CONTINUALLY as new ones emerge, which is the activity of professional industry antivirus and antispyware companies attend continually to block threats from ALL.

NOW a collection of webpages makes up the website. Each website is a domain such as microsoft.com and is called the microsoft.com domain. If we use a simple number like most of the sites will use 10 webpages and divide that into the 25 Billion number of webpages plus – we can chop it down to 2.5 Billion Websites as very general. If we take just one percent of those as malicious content bad websites THEN these utiltiies claiming protection must have in the neighborhood of 25 Million bad domains out here as defintions in your computer or it is fraud and we just read this is physically impossible because of registry size.

CONCLUSION AS FAKE PRODUCT …… REMEMBER THEY SAY THEY “WILL PROTECT” AS ADVERTISING FOR DONATIONS….

So the defintions needed to support their claims of protection then has to be in the same ballpark as the 25 million bad websites added as Restricted Sites by their utilities. Now remember we just read at Microsoft that the Windows Registry has a 200M (million bits) size restriction. Now they are talking they are going to insert 25 million multi letter name domain words in the least, as new registry keys to fulfill their advertising and donation requests when in reality it may be in the hundreds if that.

So it is a compound or double deception. Number one, they have not possibly attained their advertised protection as they would have to have a minimum of at least in the tens of millions of known bad sites in their “Updates”, which are not updates at all but simply a new list of additional bad sites added to Restricted Sites.

And two, if they did as advertisied – simply the computer would cease to function from ‘incremental damage to the registry” – exceeding the “Registry Size Limit”.

FURTHERMORE…. If you don’t believe this – play this mediacast showing that the Restricted Sites does not even work ! …. (Webmaster of http://pdamobileCLOSEDcafe.net/ )
“Reticted Sites Circumvented – Does Not Block Successfully”
http://pdamobilecafe.net/CLOSED2010/04/27/reticted-sites-circumvented–does-not-block-successfully.aspx

POINT OF THIS EXERCISE – ? …..
WE DO NOT PROMOTE FEEL GOOD IN-SECURITY AND KNOW HOW DUMB YOU MAY FEEL RIGHT NOW AS WE DID WHEN WE WERE NEWBIES AND WENT TO THE SAME PLACES AND DOWNLOADED THE SAME FREE STUFF YOU ARE DOING. THE POINT OF THIS EXERCISE IS TO WAKE UP TO REALITY AND GET HIGH QUALITY PROFESSIONAL PRODUCTS THAT ACTUALLY PROTECT YOUR COMPUTER AND LIFE (ID THEFTS) A.S.A.P. ! ! !

Webmaster,

BLOG ENTRY:
http://blogcasts.bluecollarpc.orCLOSEDg/2010/05/23/restricted-sites-utilities-softwares-fraud-potentially-damaging-to-windows-registry.aspx
 

About Software Utilities Adding Restricted Sites lists to the Registry

THIS IS ABOUT USING RESTRICTED SITES UTILTITIES FOR “BROWSER IMMUNIZATION” OR “BLOCKS POTENTIALLY UNWANTED SPYWARE AND OTHER UNWANTED SOFTWARES” etc.

THIS EXPLAINS WHY THEY ARE A SCAM AND DAMAGING TO COMPUTERS AS WILL EVENTUALLY DESTROY THE COMPUTER SYSTEM RENDERING IT INOPERABLE

ASIDE FROM THE FACT THAT THIS BROWSER SOFTWARE SETTING ENTERS A REGISTRY KEY FOR EVERY WEBPAGE OR SITE BLOCKED AND HAS BEEN CIRCUMVENTED BY MALWARE – WE WILL START HERE WITH THE FACTS THAT CONTINUAL ENTRIES INTO THE WINDOWS REGISTRY WILL DESTROY THE SYSTEM MAKING IT INOPERATIVE…..

YOU MOST LIKELY THINK THEY ARE SOME MAGIC WAND OF PROTECTION — HERE IS ALL THEY DO AS “IMMUNIZATION” OR “PROTECTION” FOR DONATION MONEY…….
How to use security zones in Internet Explorer
http://support.microsoft.com/kb/174360
Restricted Sites Zone
“This zone contains Web sites that you do not trust. When you add a Web site to the Restricted Sites zone, you believe that files that you download or run from the Web site may damage your computer or your data. By default, there are no Web sites that are assigned to the Restricted Sites zone, and the security level is set to High.”
Generally the registry value added is “4″ from 0-4 SEE:   HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionInternet SettingsLockDown_zones4
SO THAT ONE KEY WILL BE ENTERED BY THEM FOR EACH BAD SITE THEY ADD TO UPDATE DEFINTIONS…..EXAMPLE:

EACH SITE ADDRESS MUST BE ENTERED HERE AS A “RETRICTED SITE” …..
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionInternet
SettingsZoneMapDomains

EXAMPLE…. We are placing “adult.com” in Restricted Sites to show the key made immediately and written into the Windows Registry (adult.com as example here to block underage users on same PC – not saying it is a bad site at all)
HERE IS THE KEY IMMEDIATELY WRITTEN INTO THE REGISTRY TO BLOCK BROWSER ….
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionInternet SettingsZoneMapDomainsadult.com

What Professionals and Experts say…..

You will see below a Professional explanation and why registry cleaners are used to prevent damage to Windows and/or softwares. Whereby certain utilities may add lists of sites and domains – this can be an exact example of “incremental entries” by softwares, or manually, into the Registry constantly per “definitions” Updates (lists of ‘bad’ domains added)….

Product Incrementation of Windows Registry –
Windows Registry Size Limits
http://www.liutilities.com/products/registrybooster/faq/registrycleaner/

“Fragmentation is a serious problem and occurs when application processes modify the registry continually and incrementally .
Eventually registry file sizes may exceed the Registry Size Limits imposed by Windows. This causes subsequent modifications to the registry to fail. Most registry repair software allow you to defrag your registry ensuring that such issues do not occur. This is true prevention.”

…..the constant inordinate or unusual ‘incrementation’ of constantly adding Restricted Sites and domain entries in great mass volume offers no real protection – as malware circumvents the Restricted Sites feature of any browser anyway – and as explained will lead to failure of software running processes and application design as well as the Windows Operating System.

The Windows Registry has an imposed size limit. When this is approached and to succession – Windows will fail to operate as well as other software that relies on normal incremental changes such as definition updates to antivirus and critical Windows Updates as prime example.

What is bottom line is, actually Windows can cease to function at some point of additions to the Windows Registry just like regular hard drive memory runs out at some point of continual downloads of files, media, etc.

SEE: Microsoft – Windows Registry Size Limits Imposed
Below are the Experts and creators of Windows facts….

Windows Registry Size Limits Imposed / Microsoft…
http://msdn.microsoft.com/msdnmag/issues/01/12/XPKernel/
There is a limit on the size of the System hive (the file that stores the HKEY_LOCAL_MACHINESystem key and its descendants) of 200MB, because of restrictions placed on the operating system boot loader by the environment in which it runs (the boot loader reads the System hive into memory very early in the boot process), but the limit for the System hive was just 12MB in previous versions of Windows…..

MORE:
Registry Size Limit functionality has been removed from Windows Server 2003 and from Windows XP
http://support.microsoft.com/kb/292726
Windows Registry Size Limits
http://msdn2.microsoft.com/en-us/library/ms724872.aspx
Registry Size Limit
http://www.microsoft.com/technet/prodtechnol/windows2000serv/reskit/r

Don’t listen to hackers – and this is extremely crucial with all systems released before Windows XP. The XP size limit was increased but has an imposed Size Limit by Microsoft. Some say “don’t worry about it”… and those are just the persons you remember when your computer fails. Too late then.

Hackers may tell you to set up “registry folders” for Windows 98 and 95 to place these downloads (lists) in that would save or add registry room which would be preposterous. Hackers will tell you if and when you run out of room in XP you can “increase the paged pool size – no problem”. Neither of these work or are true – and are bad hacks and they may be intentionally attempting these malicious pranks at your expense to destroy peoples machines like the “kiddie script” malware writers for “bragging rights” achieved. DUMP IT !

Did you know that antispyware programs like Webroot Spysweeper and Trend Micro Antispyware and the free Microsoft Windows Defender have real time active shields that block all “drive by” threat installations at all sites – not just “the bad ones – Restricted Sites” ?

This is what those that run donate forums and repair shops do not tell you so that they continually derive profit at the expense of the unknowing consumer. It is very simple – for 30 dollars a year you are good to go. End of story. Do it and dump it now before you injure your machine.

THE FRAUD OF THESE UTILTITIES

FACT – WELL OVER 25 BILLION WEBPAGES ……
World Wide Web
http://en.wikipedia.org/wiki/World_Wide_Web
Statistics
A more recent study, which used Web searches in 75 different languages to sample the Web, determined that there were over 11.5 billion Web pages in the publicly indexable Web as of the end of January 2005. As of March 2009, the indexable web contains at least 25.21 billion pages.

These products claim to….
“secures browser against dangerous sites and their unwanted malware” and explain their features as “preventing installation of spyware and other unwanted software, exploitation of security vulnerabilites, …”
IS THE FANCY DECEPTIVE WAY OF SAYING……
The product enters the entire list to date they have compiled as bad content websites and/or webpage addresses into Restricted Sites CREATING AN INDIVIDUAL REGISTRY KEY FOR EACH “DEFINTION” UPDATE FOR EACH WEBPAGE OR WEBSITE DOMAIN – one Windows Regsitry Key for each “automatic update” — and CONTINUALLY as new ones emerge, which is the activity of professional industry antivirus and antispyware companies attend continually to block threats from ALL.

NOW a collection of webpages makes up the website. Each website is a domain such as microsoft.com and is called the microsoft.com domain. If we use a simple number like most of the sites will use 10 webpages and divide that into the 25 Billion number of webpages plus – we can chop it down to 2.5 Billion Websites as very general. If we take just one percent of those as malicious content bad websites THEN these utiltiies claiming protection must have in the neighborhood of 25 Million bad domains out here as defintions in your computer or it is fraud and we just read this is physically impossible because of registry size.

CONCLUSION AS FAKE PRODUCT …… REMEMBER THEY SAY THEY “WILL PROTECT” AS ADVERTISING FOR DONATIONS….

So the defintions needed to support their claims of protection then has to be in the same ballpark as the 25 million bad websites added as Restricted Sites by their utilities. Now remember we just read at Microsoft that the Windows Registry has a 200M (million bits) size restriction. Now they are talking they are going to insert 25 million multi letter name domain words in the least, as new registry keys to fulfill their advertising and donation requests when in reality it may be in the hundreds if that.

So it is a compound or double deception. Number one, they have not possibly attained their advertised protection as they would have to have a minimum of at least in the tens of millions of known bad sites in their “Updates”, which are not updates at all but simply a new list of additional bad sites added to Restricted Sites.

And two, if they did as advertisied – simply the computer would cease to function from ‘incremental damage to the registry” – exceeding the “Registry Size Limit”.

POINT OF THIS EXERCISE – ? …..
WE DO NOT PROMOTE FEEL GOOD IN-SECURITY AND KNOW HOW DUMB YOU MAY FEEL RIGHT NOW AS WE DID WHEN WE WERE NEWBIES AND WENT TO THE SAME PLACES AND DOWNLOADED THE SAME FREE STUFF YOU ARE DOING. THE POINT OF THIS EXERCISE IS TO WAKE UP TO REALITY AND GET HIGH QUALITY PROFESSIONAL PRODUCTS THAT ACTUALLY PROTECT YOUR COMPUTER AND LIFE (ID THEFTS) A.S.A.P. ! ! !

————–

BLUECOLLARPC.US BLOGPOST

Many times asked “Best Easiest Free Registry Cleaner/Fixer

http://bluecollarpc.us/2011/03/10/many-times-asked-best-easiest-free-registry-cleanerfixer/

By bluecollarpcLast updated: Thursday, March 10, 2011 – Save & ShareLeave a Comment

Many times asked “Best Easiest Free Registry Cleaner/Fixer….

Our Answer…

Whole list here… http://bluecollarpc.us/windowsregistry.php
Uniblue Registry Cleaner Comparison Chart
LINKS/Soure: http://www.liutilities.com/products/registrybooster/comparisions/

For free the two best in the world are ….

(ADVANCED)
RegSeeker 1.55:
http://www.hoverdesk.net/freeware.htm
RegSeeker is a perfect companion for your Windows registry !
RegSeeker includes a powerful registry cleaner and can display various informations like your startup entries, several histories (even index.dat files), installed applications and much more ! With RegSeeker you can search for any item inside your registry, export/delete the results, open them in the registry. RegSeeker also includes a tweaks panel to optimize your OS ! Now RegSeeker includes a file tool to search for duplicate files, bad shortcuts
and more ! RegSeeker is FREE for personal use only !

GREAT FOR NOVICE AND ADVANCED – ALL …. (Use safest user settings)
RECOMMENDED:
PowerTools Lite – The Freeware Registry Cleaner
http://www.macecraft.com/ptlite/
Key Features

•Detects and fixes registry errors
•Finds and cleans unneeded registry junk
•Finds leftover temp files
•Clears History and MRU data
•Safe to use – automatic backup feature
•Multilingual user interface
•Based to the same award-winning engine as jv16 PowerTools

jv16 PowerTools by Macecraft has been consistently about the world’s best for a decade. Very, very, very well known by power users and that trusted. Costs bucks, however, they recently have given back to the community by releasing their Free Home Version no catches for real for all users. It has like four different settings of intensity for cleaning/fixing. Use simply the safest and at most one more click up in a scan/fix. Very fast, very safe. Best !

Also has back up one click button to restore anything deleted. You may want to get a little more familiar, but you can perform the full Registry Back Up BEFORE proceeding to ANY changes by opening the Windows Registry and make a COPY of it before change that can reinstall the full registry in a click.

HowTo….
Click > Start > Run and type in “regedit” without the parenthesis.
This opens the Windows Registry and don’t dare touch anything or you can render Windows/other softwares inoperable by a mistake !
NOW Click > File > Export…. (top left tabs). It will open the dialouge as if you were saving a file or media or software. NAME the file you wish to call it like “Reg_Back_up_Today” or anything you wish to call it so you remember and then Click > Save ….and usually to My Documents.
NOW WAIT about 30 to 60 seconds as it will then copy the ENTIRE Registry to the restore file. It can take even up to 90 seconds if ypou havea lot of stuff installed. Hover your mouse cursor over it to see progress. DO NOT DARE INTERRUPT THE PROCESS UNTIL COMPLETED !!! or you may cause dreaded Registry Damage ! Do NOT mess up with impatience or doubt !

IF USED TO RESTORE THE REGISTRY… you Double Click the Registry back up file created and DON’T DARE INTERRUPT THE PROCESS and can take even up to five minutes for it to rewrite in the Registry.

Note, after any changes to the PC you need to Export the Registry again in a new back up file to restore to current state of the PC such as new softwares added etc. Recommended to do this like weekly or monthly as how many times in a lifetime will this ever need to be done. Every blue moon – but you need the back up like to restore the computer if hit by malware plus files back up correspondingly.

Source(s):
http://bluecollarpc.us/windowsregistry.php

Webmaster, http://BlueCollarPC.US

 

FURTHERMORE READ THIS WHICH INCLUDES INFORMATION ABOUT MODERN REGISTRY CLEANERS THAT SEVERAL YEARS AGO WERE UPGRADED TO NOW ALSO PERFORM REGISTRY DEFRAGMENT TO HEAL REGISTRY FRAGMENTATION THAT OCCURS IN NORMAL USE AND WORSE IN HEAVY USE UNATTENDED…..

 

Why You Should Defragment Your Registry

http://www.maketecheasier.com/why-you-should-defragment-your-registry/2008/01/29

QUOTED:

The Need to Defrag the Windows Registry

If you monitor the registry of your system using a tool, you will see that it is accessed by your Windows operating system and programs installed on it more than a hundred times every second. Therefore, if your registry is fragmented and slow in responding to requests for information, it directly affects the performance of your PC and slows it down. This is the reason why it is important for you to keep your registry free from unwanted files and defrag it regularly to speed up your PC and maintain it at its optimal performance.

Causes for Registry Fragmentation

The registry is one of the most used components of your Windows system because it comprises configuration data of all hardware devices and software programs installed on your PC. Therefore, each and every operation that occurs on your system adds or removes information from the registry. Most of the time, when these entries are no longer required, they are removed from the registry. However, in reality, a lot of information gets left behind causing the registry to bloat up. This registry bloating eventually fragments and damages the registry files.

Registry files also get fragmented due to the accumulation of several empty registry keys within it. These keys are generated when the registry entries that are removed from the registry fail to remove their placeholders. In due course, the number of these empty registry keys increases in the registry and causes registry fragmentation.

How to Defrag the Registry

There is no tool available in your Windows system that you can use to defrag the registry. Therefore, the only way to defrag it is by using a reliable third-party registry cleaner tool. Today, there are a large number of registry cleaner tools available in the market today. You must choose and download the one that meets your requirements, carries good user reviews and is compatible with your operating system.

Registry tools are easy-to-use and enable you can defrag the registry easily in just a few mouse clicks. When you start the registry defragment process, your registry tool consolidates all the fragmented registry files, reindexes them to improve the data access time, and removes all empty registry keys to compress the registry.

When To Defrag the Registry

Because the registry defragmentation process enables you to remove empty registry keys, you must defrag the registry after you have performed any activity that removes a lot of entries from the registry.

For instance, after you clean up the registry using the registry scanner tool, all the invalid keys removed leave behind their empty place holders. In the same way, empty keys may get left behind when you uninstall applications from your PC. So, even if you would have removed all unwanted information from the registry—or uninstalled an application, the size of the registry may remain the same due to the existence of these empty registry keys. This is the reason you may always defragment the registry after registry scan and repair and program uninstall processes.

The registry is an important component of your Windows system and it is important for you to perform regular registry maintenance to ensure yourself a healthy, high-performance PC. You can do this easily using your registry cleaner tool. In addition to repairing registry errors and defragging the registry, you may also use the tool to backup the registry. It is quite useful to make regular registry back-ups, because if despite of all your maintenance activities the registry fails, you can easily restore it using the back-up you would have taken earlier.

This article is a guest post by James Ricketts

James Ricketts is a full time writer who loves to write about the errors, solutions, and various tips, tweaks, and nuances of the Windows Vista and XP registry. With his background in computers and writing he’s blended both his talents into writing helpful articles relating to various Windows and computer issues

http://www.maketecheasier.com/why-you-should-defragment-your-registry/2008/01/29

FURTHERMORE… ROOTKITS SEARCH FOR LEFT OVER FILES AND REGISTRY KEYS FROM UNINSTALLS TO USE THEM TO HIDE BEHIND TO AVOID DETECTION AND THESE ORPHAN FILES AND KEYS ARE SOMETIMES CALLED POTENTIAL SLEEPER FILES AND KEYS.

What are Information – Data security threats?

This is from an actual question I fielded as Antibotnet alternate Yahoo ID at yahoo Answers > Security….

QUESTION:

Information security – threat? In information security what do we call a “threat” exactly? Hacker? or action itself aka eavesdropping/ system intrusion? Kinda confused about the concept http://answers.yahoo.com/question/index?qid=20130420123253AAJSqc2

MY ANSWER AS ANTIBOTNET YAHOO id (ALTERNATE id)  

Best Answer – Chosen by Asker

ANSWER:

Not sure if you mean general average user or actual IT Security ? The term threat to the average user computer is several fold.

Threat generally means malware such as a computer virus, worm, trojan, spyware etc. Malware can pose a threat to the actual operating system (Windows etc) as destrutive to the system and even hardware. It can destroy the operating system rendering it inoperable via corruption of files and/or actual deletion of system files such as by a worm.

Threats by spyware are generally referring to comprimising personal information generally always meaning financial information such as account numbers and pins etc that might be stored by a user in a document or text file etc. Another spyware category threat as “keylogger” can record everything being typed such as purchases online etc. Threat here means ultimately as an attempt as ID Theft, but also includes like personal photos and media etc that can be copied and transmitted in stealth from the infected unprotected computer. As well these threats to information includes all email contacts and any information there as a phone number, address, etc. – such as copy/transmitting these via spyware or even some viruses from the Contacts/Address Book information stored in the computer email programs contacts area. When you consider a broad term as “Social Engineering” you can place together additional areas of crime as stalking etc outside the computer system and worldwide web – robberies, kidnaps, and worst – due to threats to information or “data” stored in the computer.

Quality antimalware installed on the computer prevents these.

Threats also mean hackers trying to break into and take over a computer, and an acute looming threat if there is no personal software firewall installed.

Threat may also refer to security holes in the operating system and/or other softwares installed. These get patch/fix/update/upgrade through as example Windows Updates or similar in other operating systems as Linux, Apple/Mac etc.

It is on the enterprise corporate level in IT Security that refers to computer security for Home/Small Businesses all the way up to major companies/corporations etc. These are hired to address computing security for businesses against malware threats and much more. Computer forensics is an additional add-on or hired outside the/for the firm.

Biometrics security refers generally to physical type preventions as voice and retina and fingerprint recognition etc. to even gain entry into like a security firm as a major antivirus company as example. These too may include similar to even access a company computer. Threats to these areas are another area other than malware and an up to date fully patched computer.

SEE Zero Day threats…. also:

http://www.webopedia.com/TERM/Z/Zero_Day_exploit.html http://en.wikipedia.org/wiki/Zero-Day_Attack

 

List of threats to PCs…. http://bluecollarpc.us/threats-faqs/

 

Source(s):

http://bluecollarpc.us/forensics/

http://bluecollarpc.us/threats-faqs/

What are Information – Data security threats?

What are Information – Data security threats?

By bluecollarpc – Last updated: Sunday, April 21, 2013

http://bluecollarpc.us/2013/04/21/what-are-information-data-security-threats/

 

This is from an actual question I fielded as Antibotnet alternate Yahoo ID at yahoo Answers > Security….

QUESTION:

Information security – threat? In information security what do we call a “threat” exactly? Hacker? or action itself aka eavesdropping/ system intrusion? Kinda confused about the concept http://answers.yahoo.com/question/index?qid=20130420123253AAJSqc2

MY ANSWER AS ANTIBOTNET YAHOO id (ALTERNATE id)

 

Best Answer – Chosen by Asker

 

ANSWER:

Not sure if you mean general average user or actual IT Security ? The term threat to the average user computer is several fold.

Threat generally means malware such as a computer virus, worm, trojan, spyware etc. Malware can pose a threat to the actual operating system (Windows etc) as destrutive to the system and even hardware. It can destroy the operating system rendering it inoperable via corruption of files and/or actual deletion of system files such as by a worm.

Threats by spyware are generally referring to comprimising personal information generally always meaning financial information such as account numbers and pins etc that might be stored by a user in a document or text file etc. Another spyware category threat as “keylogger” can record everything being typed such as purchases online etc. Threat here means ultimately as an attempt as ID Theft, but also includes like personal photos and media etc that can be copied and transmitted in stealth from the infected unprotected computer. As well these threats to information includes all email contacts and any information there as a phone number, address, etc. – such as copy/transmitting these via spyware or even some viruses from the Contacts/Address Book information stored in the computer email programs contacts area. When you consider a broad term as “Social Engineering” you can place together additional areas of crime as stalking etc outside the computer system and worldwide web – robberies, kidnaps, and worst – due to threats to information or “data” stored in the computer.

Quality antimalware installed on the computer prevents these.

Threats also mean hackers trying to break into and take over a computer, and an acute looming threat if there is no personal software firewall installed.

Threat may also refer to security holes in the operating system and/or other softwares installed. These get patch/fix/update/upgrade through as example Windows Updates or similar in other operating systems as Linux, Apple/Mac etc.

It is on the enterprise corporate level in IT Security that refers to computer security for Home/Small Businesses all the way up to major companies/corporations etc. These are hired to address computing security for businesses against malware threats and much more. Computer forensics is an additional add-on or hired outside the/for the firm.

Biometrics security refers generally to physical type preventions as voice and retina and fingerprint recognition etc. to even gain entry into like a security firm as a major antivirus company as example. These too may include similar to even access a company computer. Threats to these areas are another area other than malware and an up to date fully patched computer.

SEE Zero Day threats…. also:

http://www.webopedia.com/TERM/Z/Zero_Day_exploit.htm

http://en.wikipedia.org/wiki/Zero-Day_Attack

List of threats to PCs….

http://bluecollarpc.us/threats-faqs/

 

Source(s):

http://bluecollarpc.us/forensics/

http://bluecollarpc.us/threats-faqs/

 

 

Welcome all, archived blog installed

Welcome all, archived blog installed….. We have imported our archived blog posts from our original BlueCollarPC @ WordPress security blog. This is located at https://bluecollarpcwebs.wordpress.com/

We will keep the free version and continue to post to it, as has been linked for years. I am the original webmaster of the BlueCollarPC .Net and .Org and lastly .US . The BlueCollarPC .Net originally began about year 2005 as a help and information site dealing with spyware as main course. There were many video help tutorials for download in several formats. This became a huge site trafficking about 2,700 to 3,000 Visitors monthly, and tolled in at just over 6 million by 2009. Those kinds of numbers are usually seen at small business sites, but I had just a simple personal website !

Being able to help that many people who found our site as a primary or a main additional site for help and instruction in PC security and malware removal outweighed any personal pride or egotism in hits counters. That is what it was launched for, genuine informed help – not a personality contest. It was humbling to see those kinds of numbers though.

Push come to shove, our site was attacked and there were several behind the scenes personal attacks against myself and equipment – attempts at destroying computers and mobile computer. These attacks were sophisticated dreaded botnet payload attacks and another as attempting circumventing Vista technology and destruction. So, my site theme being “BlueCollarPC” as a spyware removal  site originally, now was upgraded to a full blown malware removal help and instruction site – all malware with heavy concentration into botnet detection and removal and restoration of damaged systems and I graduated through this all into Amateur Forensics (Computer Forensics). What did not kill us makes us stronger, and so it goes. All but the BlueCollarPC .US were closed with this new full malware removal site including information and help against all malware now as viruses, worms, trojans, rootkits, adware, spyware, botnets and bootkits. etc etc etc.

At the end of the decade (2000 to 2010) and into the new one, things seemed to be a ghost town at many help destinations as groups, forums, and lists, others. It seemed the whole “XP Generation” of  the “XP Years” (Windows XP) had graduated and learned it all or enough to carry them through. Of course I invested into a Vista PC which was the actual crown jewel of the decade in security software – unprecedented as an operating system itself being the best security software available. To this day Windows Users are unaware that viruses could not run on Vista and neither the dreaded rootkit malware. UAC User Account Control was just one of these new security technologies in Vista. First hand, no lie, two or three times I saw a virus execute to install on my Vista (drive by hit – bad website, tried to install scareware fake antivirus programs). Sure enough and word for word from Microsoft – “viruses are not able to write to the disk in Vista”. They the payloads were in Temporary Internet Files. All I had to do was close the browser with the settings I had clicked to “Delete All Temporary Internet Files” etc. I also use and ran CCleaner offering a little more clean up. That was it. The virus was gone ! I then scanned with high quality antimalware to prove it. Zero infection. The point  was, or joke, you did not even need antivirus with Vista – like “you’re kidding, you actually purchased antivirus for Vista ? What for ? ” Seeing is believing.

Windows 7 was the first time in history an operating system (Windows, Linux, Apple/Mac etc) was actually downgraded security wise. Users screamed about UAC. The security world kind of went with – what idiots, sorry to say. This did not make sense. It did not make sense worst, that Microsoft themselves accomadated them. LOL. You get what you pay for. They seemed to love no intrusion whatsoever on having a good time on the Net – utterly regardless of the dangers. It was like handing drunk teenagers the keys to the sports car. We all know how that ended. Many never made it home.

Enter Windows 8 with the new anti-rootkit / anti-bootkit technologies – the ‘secure boot’ Windows 8. Windows 8 is a gigantic leap forward from XP as blocking rootkits/bootkits from running before antimalware programs are able to boot to begin detecting malware attempting to run in the session. With XP, we all know if a rootkit was suspected it meant reinstalling Windows as the ONLY cure. The trouble was most anti-rootkit softwares were crap at detecting them and even worst at attempting to remove them. Enter Windows 8 new security technologies. THOSE DAYS are over with forever. Just before Windows 8 hit the streets there was hint at they could crack this. But as well there is new anti-malware softwares that can “cold boot” to detect this. Somewhat as being able to scan the system without even starting the computer and as it does start up. Bye bye, covered anyway.

Well back to re-launching BlueCollarPC.US – now in the WordPress format rather than the traditional website. Kind of all in one – blog and content, links. Spread the word – “We are back !” (StarTrekkies – Romulans and Enterprise Captain Picard in the Neutral Zone Confontation over Borg encroachments).

From our alternate back up website at https://sites.google.com/site/pcsecurityhelper/

Welcome to the BlueCollarPC Security Helper!
SPECIAL NOTE: Our Main Domain BlueCollarPC.US is being closed June 2012.
For the record….. I began the BlueCollarPC Computing Security Community Website in 2005 at the original .Net website. I believe at that time, the .Com website was actually a PC Repair Shop which I was not connected with. Towards the end of 2009, the BlueCollarPC .Net created by me had enjoyed just over 6 Million Vistors/Users! – are proud to have been a part of it all and indeed actually had “discovery” in the security industry concerning the malware RASautodial registry entries discovered by Yours Truly. Never be afraid to ‘take a look under the hood’ of your PC ! You never know what you’ll find.

User Question: Should I disable updates then update programs when necessary?

Hey all…. I go by the handle of “antibotnet @ yahoo.com” at Yahoo Answers > Security. Here is a new question I am blogging as answer contents are pretty standard ven as a “form answer” for these type standard questions you meet over and over again, all slightly different:

 

Should I disable updates then update programs when necessary?
“I’m a rookie network administrator. I sysprep my machines twice a year on a schedule. I’m thinking this time I should lock down the usual but also disable all updates from all software and Windows 7. When an update comes along that is worthy I can then update the machines individual. Last time I used GPO it uninstall all the programs instead of installing them. Very odd. I’ve heard it is “unsafe’ to not always update your OS but I’m thinking almost everything were using is web-based. What do you all think?
Note: I will always let AVG update. ”
FULL:
http://answers.yahoo.com/question/index;_ylt=AnyXcm_aRycJOo1WdNm9.Ksw5XNG;_ylv=3?qid=20120328130039AAzYR2o

This is very specific to your network usage in security and allowances. Anywhere from a Home Network all the way up to Home/Small Business (and anything in between) is indicated and you were not specific. Generally, I don’t know anyone that would give away this type consultation for free, as generally IT Security et al freelancing can start with a preliminary environment evaluation at price, (which is what I do) adding hourly flat fee starting at $150.00 and then a contract price for specific services rendered — which is apparently what you are seeming to ask for free – a Preliminary Environment Evaluation, or onsite impression of existing set up.

TIP: Basically as far as computer security, the general recommendations are all things up to date all the time. Security Updates are not eye candy. They are for specific necessary defense which left undone can cause a liability for you personally according to whatever the network usage is. SEE the infamous JiffyLube case whereby they were held responsible. That should put you in the right frame of mind and away from bad disingenuous advice.

TIP: Windows Updates have historically not been found at fault at all when applied when some programs/softwares may have been “broken”. This has been historically the software creator(s) fault – NOT Microsoft Windows Updates. That is one example of less than acceptable IT people that ignorantly always chronically blame Microsoft for all the “woes” that are, in reality, virtually always self made or lax third party softwares faults.

TIP: Security wise – ALL softwares are to be up to date ALL the time with vendor updates. Secunia PSI is excellent. Installed softwares are a “SOFT TARGET” for cyber criminal crimewares now to gain entry into the system or network.

Have Hardware Firewalls been activated additionally – and as well in modems ?

NOTICE: Security Updates via Windows Updates are ONLY sent out each Second Tuesday of the month (if any, usually are) which has been dubbed “Patch Tuesday”. If there is an Emergency Patch such as for a new “zero day threat” – these are issued as soon as ready – immediately – as an “OUT OF CYCLE PATCH” as an emergency patch.

IMPORTANT: It is difficult to determine your “twice yearly” updating mentioned as you did not give specifics. Try and be very particular and clear about items with detail. If you meant Windows Updates – well as you can see, and as you mentioned, you are definitely a “rookie network administrator ” as you say and the PCs in network are most likely in severe need of upgrading immediately.
If you meant OS (operating system) Upgrades twice yearly – that does not make sense as these Upgrades have been the releases of XP, Vista, Windows 7 and then 8 – as example and years apart, not occurring ” twice yearly”.

ADVICE: Considering cyber events as corporate “Blended Threats” , CEO type Phishing targeting, bots, I would re-evaluate your “security solution” mentioned as bi-yearly patching and AVG Business. There are a good handful of products well above in quality and documented defense such as Trend Micro for one. You can be polite to a mutt – but will it defend you as completely as a well trained thorough bred ? Or run away squealing and yelping ?

Source(s):
http://en.wikipedia.org/wiki/Group_Policy
http://support.microsoft.com/kb/302577

 

 

%d bloggers like this: