25th anniversary of the firewall for computers

The 25th anniversary of the firewall: Celebrating a new generation
Posted on Jul 24, 2014 10:40 am
This month marks the 25th anniversary of the firewall and, like a parent looking back on the life of his children, I wonder where the time went. The McAfee Infographic that depicts the ‘lifetime’ of t…
Read in browser »
http://www.net-security.org/article.php?id=2079

MORE INFO: https://sites.google.com/site/pcsecurityhelper/windows-registry-help/pc-help
Firewalls / Information Links:

Comodo Personal Firewall [new, advanced users]
(Genuine Freeware, and rated by international tests as about world’s best – now includes antivirus real time)
http://www.personalfirewall.comodo.com/

Sygate Personal Firewall Free 5.6.2808 [Not supported, extinct]
(Old favorite now owned by Symantec)
http://www.softpedia.com/get/Security/Firewall/Sygate-Personal-Firewall-Free.shtml

ZoneAlarm Free Firewall
Protect your PC with #1 Free Firewall
http://www.zonealarm.com/security/en-us/zonealarm-pc-security-free-firewall.htm

Ashampoo FireWall Free 1.2 (popular) [wrkx w/ Netbooks]
http://www.download.com/Ashampoo-FireWall-Free/3000-10435_4-10575187.html

Online Armor Personal Firewall Free [new/advanced users]
http://www.tallemu.com/
Online Armor Free provides both a firewall and a whitelist approach to program security for Windows NT, 2000 and XP. It does not show pop-ups for many
known good programs, and it scans all your installed programs when it first runs so that you can quickly tell it what to do with apps it doesn’t know about.
Operating Systems:  Windows XP, Windows 2000, Windows Vista
What is firewall? – A Word Definition From the Webopedia Computer …
http://www.webopedia.com/TERM/f/firewall.html
This page describes the term firewall and lists other pages on the Web where you can find additional information.

Internet Firewalls: Frequently Asked Questions
http://www.interhack.net/pubs/fwfaq/
3.1 What are some of the basic design decisions in a firewall? … Can’tI just poke a hole in the firewall and tunnel that port? …

Windows Firewall in Windows XP Service Pack 2
http://www.microsoft.com/windowsxp/%20using/security/internet/sp2_wfintro.mspx
Learn the basics about the new Windows Firewall in Windows XP Service Pack 2, plus find out hot to adjust your firewall settings if you need to.

Firewall Builder
http://www.fwbuilder.org/
Firewall Builder is multi-platform object oriented firewall configuration and management tool. It consists of a GUI and set of policy compilers for iptables …

Firewall Net.com
http://www.firewall-net.com/en/
Guide to install & configure for Windows Mac or …Firewall Net is a guide for installation and configuration of firewall with windows 95 98 NT 2000 Me Millenium
XP, linux or mac , using : conseal atguard …

Firewall Q&A (Questions & Answers)
http://www.vicomsoft.com/knowledge/reference/firewalls1.html
A whitepaper on relevant firewall questions and answers. The knowledge of this subject relates to firewalls in general use, and stems from NAT and proxy …

Home PC Firewall Guide
http://www.firewallguide.com/
Learn how to protect home computers and networks from Internet outlaws by using personal firewall, antivirus and anti-spyware software plus low-cost …

Howstuffworks “How Firewalls Work”
http://www.howstuffworks.com/firewall.htm
An introductory explanation of how a firewall works and the various filtering methods used, with related links.

IPCop Firewall
http://www.ipcop.org/
A secure Linux distribution managed through a web-interface. It turns an old PC into a firewall and VPN gateway. Features an Intrusion Detection System.

OpenOffice (comparable to Microsoft products)
http://www.openoffice.org/
OpenOffice.org is the leading open-source office software suite  for word processing, spreadsheets, presentations, graphics, databases and more. It is available
in many languages  and works on all common computers. It stores all your data in an international open standard format and can also read and write files from
other common office software packages. It can be downloaded and used completely free of charge for any purpose.

 

-- 
SENDER: gerald309 -- 
Have A Safe Computing Day!
Webmaster: Malware Removal/Amateur Forensics
HOME http://bluecollarpc.us/
Alternate https://sites.google.com/site/pcsecurityhelper/
HELP http://tech.groups.yahoo.com/group/BlueCollarPCSecurity/
Membership/Join List:
Subscribe: BlueCollarPCSecurity-subscribe@yahoogroups.com
Free Malware Removal Help / A Community Website Since 2005 

Why you should immediately apply any Adobe Flash Updates

Why you should immediately apply any Adobe Flash Updates

LATEST UPDATES RELEASE:
https://groups.google.com/forum/#!profile/bluecollarpcsecurity/APn2wQcWBN2p2QHo2J3gRuAIhcZTOfcbxNpBaf6Irq87bIIScFtkYlGFIUqa-Dpkynb8ZYQnF_yX/bluecollarpcsecurity/TkUYt8nAPPk/V7pko0ureI4J

NCCIC / US-CERT
National Cyber Awareness System:
Adobe Releases Security Updates for Flash Player and Air
07/08/2014 03:17 PM EDT
Original release date: July 08, 2014
Adobe has released security updates to address multiple vulnerabilities in Flash Player and Air. Exploitation of these vulnerabilities could potentially allow an attacker to take control of the affected system.

The following updates are available:

Adobe Flash Player 14.0.0.145 for Windows, Macintosh and Linux
Adobe Flash Player 11.2.202.394 for Linux
Adobe AIR 14.0.0.137 for Windows, Macintosh and Android
Adobe AIR SDK and Compiler 14.0.0.137 for Windows, Macintosh, Android and iOS
Adobe AIR SDK 14.0.0.137 for Windows, Macintosh, Android and iOS

Why you should immediately apply any Adobe Flash Updates…..

Read this over (blogpost) which is more common now in various form. It is imperative to apply any Adobe Flash Player updtaes immediately which are security updates to correct any security holes found in the software/plug-ins.

FROM MY BLOG:

Forensics: “Unknown Flash Movie Virus”
May 7, 2013 — bluecollarpc
Forensics: “Unknown Flash Movie Virus”
By bluecollarpc — Last updated: Tuesday, May 7, 2013
https://bluecollarpcwebs.wordpress.com/2013/05/07/forensics-unknown-flash-movie-virus/

How to check your version of Adobe Flash Player Installed

Click > Start (lower left) > Control Panel > double click Flash Player > on small pop up panel click tab Advanced.

On the Advanced tab note your version number installed. Click > Check Now…. your browser will open to the Adobe Flash Player website and will display your version installed and also the latest versions available. Match the numbers. Do you have the latest installed ? You are good to go. If not, click install the latest version.

Alternatively you can uninstall the older version from the computer first at Start > Control Panel > Programs and Features > click Adobe Flash Player and wait as it will uninstall automatically. THEN go back to the Adobe Flash Player website and install the latest. Note this is done usually when a new full number version is released such as jumping from 13 to 14 something (13.111 to 14.1 example) to avoid any hack into the system through old files unused. The full number like 14 and point somethings (14.1141 example) are generally add in or ons or patching existing.


SENDER: gerald309 —
Have A Safe Computing Day!
Webmaster: Malware Removal/Amateur Forensics
HOME http://bluecollarpc.us/
Alternate https://sites.google.com/site/pcsecurityhelper/
HELP http://tech.groups.yahoo.com/group/BlueCollarPCSecurity/
Membership/Join List:
Subscribe: BlueCollarPCSecurity-subscribe@yahoogroups.com
Free Malware Removal Help / A Community Website Since 2005

Botnets: Everything Afraid To Ask Answered

Botnets: Everything Afraid To Ask Answered ….

This is a really good article covering about all the bases:

HTG Explains: What is a Botnet?
Botnets are networks made up of remote-controlled computers, or “bots.” These computers have been infected with malware that allows them to be remotely controlled. Some botnets consist of hundreds of thousands — or even millions — of computers. ….
http://www.howtogeek.com/183812/htg-explains-what-is-a-botnet/

Windows 8 and 8.1 gives malicious code the boot

Windows 8 and 8.1 gives malicious code the boot….

The following article needs some updating about today’s quality antimalware that has the new protections working with Windows 8 and 8.1….

Windows 8.1 gives malicious code the boot(s) TechRepublic The Windows operating system has a number of security controls, and most users have some sort of anti-malware security suite installed on their …
http://www.techrepublic.com/article/windows-81-gives-malicious-code-the-boots/

FOLLOW UP:

Threats/infection that launch before system:

Rootkit (definition) http://en.wikipedia.org/wiki/Rootkit

BOOTKITS Bootkits http://en.wikipedia.org/wiki/Bootkit#bootkit
A kernel-mode rootkit variant called a bootkit can infect startup code like the Master Boot Record (MBR), Volume Boot Record (VBR) or boot sector, and in this way, can be used to attack full disk encryption systems. An example is the “Evil Maid Attack”, in which an attacker installs a bootkit on an unattended computer, replacing the legitimate boot loader with one under his control.  Typically the malware loader persists through the transition to protected mode when the kernel has loaded, and is thus able to subvert the kernel. For example, the “Stoned Bootkit” subverts the system by using a compromised boot loader to intercept encryption keys and passwords. More recently, the Alureon rootkit has successfully subverted the requirement for 64-bit kernel-mode driver signing in Windows 7 by modifying the master boot record.

Today’s quality Antimalware products:

Early Launch Anti-Malware http://www.techopedia.com/definition/29079/early-launch-anti-malware-elam-windows-8?utm_source=tod_newsletter&utm_medium=email&utm_content=tod_more&utm_campaign=newsletter
What does it mean? Early Launch Anti-Malware (ELAM) is a Windows 8 security technology that evaluates non-Microsoft Windows boot time device/application drivers for malicious code. It is the first system kernel driver that starts in Windows 8 operating mode, before any third party software or driver. Techopedia Explains As a component of Secure Boot – also introduced in Windows 8 – ELAM is a detection driver used to identify malware, root kits or other malicious code/drivers initiated at system Read more »

(((Note …. newer technology for Windows 8 in antimalware (antivirus plus antispyware). Some additional links….)))

Windows 8 Early Launch Anti-Malware from Third-Party AV Vendors http://news.softpedia.com/news/Windows-8-Early-Launch-Anti-Malware-from-Third-Party-AV-Vendors-226789.shtml

Managing early launch anti-malware (ELAM) detections http://www.symantec.com/business/support/index?page=content&id=HOWTO81107

Windows 8 ELAM: too late, too little! http://www.virusbtn.com/conference/vb2012/abstracts/KulkarniJagdale.xml

How to configure Early Launch Anti-Malware Protection in Windows 8 http://www.bleepingcomputer.com/tutorials/configure-early-launch-antimalware-protection/

How to disable Early Launch Anti-Malware Protection http://www.bleepingcomputer.com/tutorials/disable-early-launch-antimalware-protection/

Understanding Early Launch Anti-Malware (ELAM) technology in Windows 8 http://www.thewindowsclub.com/earlylaunch-antimalware-elam-technology-windows-8

[Hot Fix] B0006 – The Early Launch Anti-Malware of Titanium 2013 does not load properly http://esupport.trendmicro.com/solution/en-US/1095123.aspx

Windows 8: Trusted Boot: Secure Boot – Measured Boot http://blogs.msdn.com/b/olivnie/archive/2013/01/09/windows-8-trusted-boot-secure-boot-measured-boot.aspx

-- 
SENDER: gerald309 -- 
Have A Safe Computing Day!
Webmaster: Malware Removal/Amateur Forensics
HOME http://bluecollarpc.us/
Alternate https://sites.google.com/site/pcsecurityhelper/
HELP http://tech.groups.yahoo.com/group/BlueCollarPCSecurity/
Membership/Join List:
Subscribe: BlueCollarPCSecurity-subscribe@yahoogroups.com
Free Malware Removal Help / A Community Website Since 2005

Finally added Facebook and other media share links to BlueCollarPC

Finally added Facebook and other media share links to BlueCollarPC….

From the beginning, Facebook was kind of frowned on for security/privacy issues. They have come a long way. We did not want our site pulling down information and so have also tested things and the best is up to each Facebook user to control all content via the privacy/security settings.

With PC Security the major issue aside of learning how to efficiently use a Windows PC, it is important to have trusted sites and their content available as widespread as possible considering there are hundreds of millions computers in use. With convenient simple enough plug ins now added at BlueCollarPC.US – this should help that Community effort. Share what is important to you and of course you know needed for others to see.

Webmaster, BlueCollarPC.US

Have a Safe Computing Day!

Horizon threats, Here already! Direct Memory Access Malware – GPU others

HORIZON THREATS? Here already! DMA and RDMA Threats
Malware could be hiding in your GPU
(Let us become familiar by browsing the DMA Direct Memory Access links below)
Direct memory access
From Wikipedia, the free encyclopedia
What is DMA? – A Word Definition From the Webopedia
What is Direct Memory Access (DMA)? – Definition from Techopedia
Remote direct memory access (RDMA)
From Wikipedia, the free encyclopedia
Introduction to direct memory access
Implementing direct memory access is straightforward, once you know how it works and how to configure your DMA controller. Here’s a primer on this most efficient means of moving data around in a system.
“Malware writers have worked out ways of hiding trojan horses in places where viruses checkers can’t look, according to one security researcher.
Patrick Stewin has demonstrated a a detector which can be built to find sophisticated malware that runs on dedicated devices and attacks direct memory access (DMA).
This will mean that it will finally tell us how effective crackers have been at getting malware into graphics and network cards.
The code has managed to find attacks launched by the malware, dubbed DAGGER, which targeted host runtime memory using DMA provided to hardware devices.
DAGGER attacked 32bit and 64bit Windows and Linux systems and could bypass memory address randomisation. It has now been developed to a point where the host cannot detect its presence, Stewin said.”….
memory address randomisation / Address space layout randomization
http://en.wikipedia.org/wiki/Address_space_layout_randomization
“Address space randomization hinders some types of security attacks by making it more difficult for an attacker to predict target addresses. For example, attackers trying to execute return-to-libc attacks must locate the code to be executed, while other attackers trying to execute shellcode injected on the stack have to find the stack first. In both cases, the system obscures related memory-addresses from the attackers. These values have to be guessed, and a mistaken guess is not usually recoverable due to the application crashing.”
NOW READ THIS…
Direct Memory Access | Security Architect
Sep 5, 2013 – … when someone mentioned “HBGary Direct Memory Access tools. … as well as use tools to protect against malware delivered remotely. ….
“You ask, “Can they really do that?” and you may be thinking “Only in the movies”  but all along I would have told you “Yeah, they probably can.” The other day I got confirmation when someone mentioned “HBGary Direct Memory Access tools.” That was enough of a lead to spawn a Google search and soon I confirmed such tools aren’t just in the movies.
Of course, if you’ve got great contacts in law enforcement and defense/intel you probably knew that already. But for the rest of us, you don’t have to watch the detectives anymore, there’s a considerably better source for such secret knowledge. I pulled up an old Ars Technica titled “Black ops: how HBGary wrote backdoors for the government.” This was written in the wake of the Anonymous attack on Federal contractor HBGary which led to a Wikileaks-style puke out of the company’s email data banks. Per the article:
“In 2009, HBGary…partnered with…General Dynamics to work on a project euphemistically known as ‘Task B.’ The team had a simple mission: slip a piece of stealth software onto a target laptop…they focused on the ‘direct access’ ports [PCMCIA, ExpressCard and Firewire] that provide ‘uninhibited electronic direct memory access’…[allowing] a custom piece of hardware delivered by a field operative to interact directly with the laptop [and] write directly to the computer’s memory…The [USB and wifi ports] needed “trust relationships” or relied on ‘buffer overflows…”
From the email records it seems HBGary wrote multiple exploits including so-called “rootkits,” a type of malware that installs deep in the OS to become undetectable to anti-virus scanners using standard I/O interfaces. The DMA rootkit was the malware of choice on “Task B” because it was thought to have the lowest risk of detection. And it could be used in physical access scenarios such as a spy accessing a laptop left on a desk or in the hotel room. ….”
PRESS:
Hacker Defeats Hardware-based Rootkit Detection – Slashdot
Mar 4, 2007 … And that’s what hardware-based rootkit detection is about. Use hardware with DMA (which you trust) to access memory instead of letting the …
Researchers Find Way to Detect Direct Memory Access Malware
September 27th, 2013, 08:11 GMT · By Eduard Kovacs
http://news.softpedia.com/news/Researchers-Find-Way-to-Detect-Direct-Memory-Access-Malware-386671.shtml
RELATED:
How to Enable Direct Memory Access (DMA) – Microsoft Support
This article describes how to enable Direct Memory Access (DMA) on your Windows 98-based, Windows 95-based or Windows Millennium Edition-based…

False Claims: Using a Registry Cleaner Will Not Speed Up Your PC (Actually Does)

False Claims: Why Using a Registry Cleaner Will Not Speed Up Your PC …
WE TOTALLY DISAGREE WITH THE FOLLOWING ARTICLE, AND IF AS STATED THAT REGISTRY CLEANERS WERE SNAKE OIL (WORTHLESS, FALSE ADVERTISEMENT AND CLAIM) THERE WOULD BE PLENTY OF COMPLAINTS AND SUITS AND LEGAL ACTION BY CONSUMERS AND GROUPS AND THE LAW BROUGHT AGAINST THEM IN ALL THESE YEARS FOR SUIT AND CEASE AND DESIST TYPE ORDERS FROM A COURT WITH PENALTIES/FINES FOR FALSE ADVERTISING. ……
THIS IS IRRESPONSIBLE AND UNINFORMED AND AS THEY ARE NOT EXPERTS AND PROFESSIONALS PRODUCING PRODUCTS FOR THE WINDOWS PC.
HOWTOGEEK.COM IS RARELY WRONG BUT ATE A BIG FOOT IN THE MOUTH ON THIS ONE. WRITE ONLY ABOUT WHAT YOU KNOW – OLD AXIM.
ARTICLE:
Why Using a Registry Cleaner Won’t Speed Up Your PC or Fix Crashes
We’ve said it again and again: Registry cleaners don’t speed up your PC. At best, they’re a waste of time — and often money. At worst, they can cause problems by removing registry entries they shouldn’t.
READ THEIR ARTICLE AND RETURN HERE AND READ OUR BLOG POSTS ON THE SUBJECT AND CHECK OUT OUR WEBPAGE AT OUR SITE FOR THE WINDOWS REGISTRY HELP…  http://bluecollarpc.us/windows-registry-help/
NO BENCHMARK TESTS?
QUOTE: http://www.howtogeek.com/171633/why-using-a-registry-cleaner-wont-speed-up-your-pc-or-fix-crashes/ “…No legitimate benchmarks showing a performance increase as a result of a registry cleaner have ever been released. If a registry cleaner offered boosted performance, we would have some benchmarks by now.”
BENCHMARK RESULTS…
New jv16 PowerTools 2014 software delivers over 20% improved benchmark
scores and Windows startup times.
The new 2014 edition improves performance and cleans errors from
Windows-based systems with ease. The 2014 version was released alongside a
benchmark study which shows that this latest edition can deliver over 20%
improvement to system benchmark scores and Windows startup times.
For more information, please see:
BLUECOLLARPC.US BLOGPOST
Restricted Sites Utilities Softwares Fraud,Potentially Damaging Windows Registry
By bluecollarpcLast updated: Sunday, May 23, 2010 – Save & ShareLeave a Comment
About Software Utilities Adding Restricted Sites lists to the Registry

THIS IS ABOUT USING RESTRICTED SITES UTILTITIES FOR “BROWSER IMMUNIZATION” OR “BLOCKS POTENTIALLY UNWANTED SPYWARE AND OTHER UNWANTED SOFTWARES” etc.

THIS EXPLAINS WHY THEY ARE A SCAM AND DAMAGING TO COMPUTERS AS WILL EVENTUALLY DESTROY THE COMPUTER SYSTEM RENDERING IT INOPERABLE

ASIDE FROM THE FACT THAT THIS BROWSER SOFTWARE SETTING ENTERS A REGISTRY KEY FOR EVERY WEBPAGE OR SITE BLOCKED AND HAS BEEN CIRCUMVENTED BY MALWARE – WE WILL START HERE WITH THE FACTS THAT CONTINUAL ENTRIES INTO THE WINDOWS REGISTRY WILL DESTROY THE SYSTEM MAKING IT INOPERATIVE…..

YOU MOST LIKELY THINK THEY ARE SOME MAGIC WAND OF PROTECTION — HERE IS ALL THEY DO AS “IMMUNIZATION” OR “PROTECTION” FOR DONATION MONEY…….
How to use security zones in Internet Explorer
http://support.microsoft.com/kb/174360
Restricted Sites Zone
“This zone contains Web sites that you do not trust. When you add a Web site to the Restricted Sites zone, you believe that files that you download or run from the Web site may damage your computer or your data. By default, there are no Web sites that are assigned to the Restricted Sites zone, and the security level is set to High.”
Generally the registry value added is “4″ from 0-4 SEE:   HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionInternet SettingsLockDown_zones4
SO THAT ONE KEY WILL BE ENTERED BY THEM FOR EACH BAD SITE THEY ADD TO UPDATE DEFINTIONS…..EXAMPLE:

EACH SITE ADDRESS MUST BE ENTERED HERE AS A “RETRICTED SITE” …..
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionInternet
SettingsZoneMapDomains

EXAMPLE…. We are placing “adult.com” in Restricted Sites to show the key made immediately and written into the Windows Registry (adult.com as example here to block underage users on same PC – not saying it is a bad site at all)
HERE IS THE KEY IMMEDIATELY WRITTEN INTO THE REGISTRY TO BLOCK BROWSER ….
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionInternet SettingsZoneMapDomainsadult.com

What Professionals and Experts say…..

You will see below a Professional explanation and why registry cleaners are used to prevent damage to Windows and/or softwares. Whereby certain utilities may add lists of sites and domains – this can be an exact example of “incremental entries” by softwares, or manually, into the Registry constantly per “definitions” Updates (lists of ‘bad’ domains added)….

Product Incrementation of Windows Registry –
Windows Registry Size Limits
http://www.liutilities.com/products/registrybooster/faq/registrycleaner/

“Fragmentation is a serious problem and occurs when application processes modify the registry continually and incrementally .
Eventually registry file sizes may exceed the Registry Size Limits imposed by Windows. This causes subsequent modifications to the registry to fail. Most registry repair software allow you to defrag your registry ensuring that such issues do not occur. This is true prevention.”

…..the constant inordinate or unusual ‘incrementation’ of constantly adding Restricted Sites and domain entries in great mass volume offers no real protection – as malware circumvents the Restricted Sites feature of any browser anyway – and as explained will lead to failure of software running processes and application design as well as the Windows Operating System.

The Windows Registry has an imposed size limit. When this is approached and to succession – Windows will fail to operate as well as other software that relies on normal incremental changes such as definition updates to antivirus and critical Windows Updates as prime example.

What is bottom line is, actually Windows can cease to function at some point of additions to the Windows Registry just like regular hard drive memory runs out at some point of continual downloads of files, media, etc.

SEE: Microsoft – Windows Registry Size Limits Imposed
Below are the Experts and creators of Windows facts….

Windows Registry Size Limits Imposed / Microsoft…
http://msdn.microsoft.com/msdnmag/issues/01/12/XPKernel/
There is a limit on the size of the System hive (the file that stores the HKEY_LOCAL_MACHINESystem key and its descendants) of 200MB, because of restrictions placed on the operating system boot loader by the environment in which it runs (the boot loader reads the System hive into memory very early in the boot process), but the limit for the System hive was just 12MB in previous versions of Windows…..

MORE:
Registry Size Limit functionality has been removed from Windows Server 2003 and from Windows XP
http://support.microsoft.com/kb/292726
Windows Registry Size Limits
http://msdn2.microsoft.com/en-us/library/ms724872.aspx
Registry Size Limit
http://www.microsoft.com/technet/prodtechnol/windows2000serv/reskit/r

Don’t listen to hackers – and this is extremely crucial with all systems released before Windows XP. The XP size limit was increased but has an imposed Size Limit by Microsoft. Some say “don’t worry about it”… and those are just the persons you remember when your computer fails. Too late then.

Hackers may tell you to set up “registry folders” for Windows 98 and 95 to place these downloads (lists) in that would save or add registry room which would be preposterous. Hackers will tell you if and when you run out of room in XP you can “increase the paged pool size – no problem”. Neither of these work or are true – and are bad hacks and they may be intentionally attempting these malicious pranks at your expense to destroy peoples machines like the “kiddie script” malware writers for “bragging rights” achieved. DUMP IT !

Did you know that antispyware programs like Webroot Spysweeper and Trend Micro Antispyware and the free Microsoft Windows Defender have real time active shields that block all “drive by” threat installations at all sites – not just “the bad ones – Restricted Sites” ?

This is what those that run donate forums and repair shops do not tell you so that they continually derive profit at the expense of the unknowing consumer. It is very simple – for 30 dollars a year you are good to go. End of story. Do it and dump it now before you injure your machine.

THE FRAUD OF THESE UTILTITIES

FACT – WELL OVER 25 BILLION WEBPAGES ……
World Wide Web
http://en.wikipedia.org/wiki/World_Wide_Web
Statistics
A more recent study, which used Web searches in 75 different languages to sample the Web, determined that there were over 11.5 billion Web pages in the publicly indexable Web as of the end of January 2005. As of March 2009, the indexable web contains at least 25.21 billion pages.

These products claim to….
“secures browser against dangerous sites and their unwanted malware” and explain their features as “preventing installation of spyware and other unwanted software, exploitation of security vulnerabilites, …”
IS THE FANCY DECEPTIVE WAY OF SAYING……
The product enters the entire list to date they have compiled as bad content websites and/or webpage addresses into Restricted Sites CREATING AN INDIVIDUAL REGISTRY KEY FOR EACH “DEFINTION” UPDATE FOR EACH WEBPAGE OR WEBSITE DOMAIN – one Windows Regsitry Key for each “automatic update” — and CONTINUALLY as new ones emerge, which is the activity of professional industry antivirus and antispyware companies attend continually to block threats from ALL.

NOW a collection of webpages makes up the website. Each website is a domain such as microsoft.com and is called the microsoft.com domain. If we use a simple number like most of the sites will use 10 webpages and divide that into the 25 Billion number of webpages plus – we can chop it down to 2.5 Billion Websites as very general. If we take just one percent of those as malicious content bad websites THEN these utiltiies claiming protection must have in the neighborhood of 25 Million bad domains out here as defintions in your computer or it is fraud and we just read this is physically impossible because of registry size.

CONCLUSION AS FAKE PRODUCT …… REMEMBER THEY SAY THEY “WILL PROTECT” AS ADVERTISING FOR DONATIONS….

So the defintions needed to support their claims of protection then has to be in the same ballpark as the 25 million bad websites added as Restricted Sites by their utilities. Now remember we just read at Microsoft that the Windows Registry has a 200M (million bits) size restriction. Now they are talking they are going to insert 25 million multi letter name domain words in the least, as new registry keys to fulfill their advertising and donation requests when in reality it may be in the hundreds if that.

So it is a compound or double deception. Number one, they have not possibly attained their advertised protection as they would have to have a minimum of at least in the tens of millions of known bad sites in their “Updates”, which are not updates at all but simply a new list of additional bad sites added to Restricted Sites.

And two, if they did as advertisied – simply the computer would cease to function from ‘incremental damage to the registry” – exceeding the “Registry Size Limit”.

FURTHERMORE…. If you don’t believe this – play this mediacast showing that the Restricted Sites does not even work ! …. (Webmaster of http://pdamobileCLOSEDcafe.net/ )
“Reticted Sites Circumvented – Does Not Block Successfully”
http://pdamobilecafe.net/CLOSED2010/04/27/reticted-sites-circumvented–does-not-block-successfully.aspx

POINT OF THIS EXERCISE – ? …..
WE DO NOT PROMOTE FEEL GOOD IN-SECURITY AND KNOW HOW DUMB YOU MAY FEEL RIGHT NOW AS WE DID WHEN WE WERE NEWBIES AND WENT TO THE SAME PLACES AND DOWNLOADED THE SAME FREE STUFF YOU ARE DOING. THE POINT OF THIS EXERCISE IS TO WAKE UP TO REALITY AND GET HIGH QUALITY PROFESSIONAL PRODUCTS THAT ACTUALLY PROTECT YOUR COMPUTER AND LIFE (ID THEFTS) A.S.A.P. ! ! !

Webmaster,

BLOG ENTRY:
http://blogcasts.bluecollarpc.orCLOSEDg/2010/05/23/restricted-sites-utilities-softwares-fraud-potentially-damaging-to-windows-registry.aspx
 

About Software Utilities Adding Restricted Sites lists to the Registry

THIS IS ABOUT USING RESTRICTED SITES UTILTITIES FOR “BROWSER IMMUNIZATION” OR “BLOCKS POTENTIALLY UNWANTED SPYWARE AND OTHER UNWANTED SOFTWARES” etc.

THIS EXPLAINS WHY THEY ARE A SCAM AND DAMAGING TO COMPUTERS AS WILL EVENTUALLY DESTROY THE COMPUTER SYSTEM RENDERING IT INOPERABLE

ASIDE FROM THE FACT THAT THIS BROWSER SOFTWARE SETTING ENTERS A REGISTRY KEY FOR EVERY WEBPAGE OR SITE BLOCKED AND HAS BEEN CIRCUMVENTED BY MALWARE – WE WILL START HERE WITH THE FACTS THAT CONTINUAL ENTRIES INTO THE WINDOWS REGISTRY WILL DESTROY THE SYSTEM MAKING IT INOPERATIVE…..

YOU MOST LIKELY THINK THEY ARE SOME MAGIC WAND OF PROTECTION — HERE IS ALL THEY DO AS “IMMUNIZATION” OR “PROTECTION” FOR DONATION MONEY…….
How to use security zones in Internet Explorer
http://support.microsoft.com/kb/174360
Restricted Sites Zone
“This zone contains Web sites that you do not trust. When you add a Web site to the Restricted Sites zone, you believe that files that you download or run from the Web site may damage your computer or your data. By default, there are no Web sites that are assigned to the Restricted Sites zone, and the security level is set to High.”
Generally the registry value added is “4″ from 0-4 SEE:   HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionInternet SettingsLockDown_zones4
SO THAT ONE KEY WILL BE ENTERED BY THEM FOR EACH BAD SITE THEY ADD TO UPDATE DEFINTIONS…..EXAMPLE:

EACH SITE ADDRESS MUST BE ENTERED HERE AS A “RETRICTED SITE” …..
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionInternet
SettingsZoneMapDomains

EXAMPLE…. We are placing “adult.com” in Restricted Sites to show the key made immediately and written into the Windows Registry (adult.com as example here to block underage users on same PC – not saying it is a bad site at all)
HERE IS THE KEY IMMEDIATELY WRITTEN INTO THE REGISTRY TO BLOCK BROWSER ….
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionInternet SettingsZoneMapDomainsadult.com

What Professionals and Experts say…..

You will see below a Professional explanation and why registry cleaners are used to prevent damage to Windows and/or softwares. Whereby certain utilities may add lists of sites and domains – this can be an exact example of “incremental entries” by softwares, or manually, into the Registry constantly per “definitions” Updates (lists of ‘bad’ domains added)….

Product Incrementation of Windows Registry –
Windows Registry Size Limits
http://www.liutilities.com/products/registrybooster/faq/registrycleaner/

“Fragmentation is a serious problem and occurs when application processes modify the registry continually and incrementally .
Eventually registry file sizes may exceed the Registry Size Limits imposed by Windows. This causes subsequent modifications to the registry to fail. Most registry repair software allow you to defrag your registry ensuring that such issues do not occur. This is true prevention.”

…..the constant inordinate or unusual ‘incrementation’ of constantly adding Restricted Sites and domain entries in great mass volume offers no real protection – as malware circumvents the Restricted Sites feature of any browser anyway – and as explained will lead to failure of software running processes and application design as well as the Windows Operating System.

The Windows Registry has an imposed size limit. When this is approached and to succession – Windows will fail to operate as well as other software that relies on normal incremental changes such as definition updates to antivirus and critical Windows Updates as prime example.

What is bottom line is, actually Windows can cease to function at some point of additions to the Windows Registry just like regular hard drive memory runs out at some point of continual downloads of files, media, etc.

SEE: Microsoft – Windows Registry Size Limits Imposed
Below are the Experts and creators of Windows facts….

Windows Registry Size Limits Imposed / Microsoft…
http://msdn.microsoft.com/msdnmag/issues/01/12/XPKernel/
There is a limit on the size of the System hive (the file that stores the HKEY_LOCAL_MACHINESystem key and its descendants) of 200MB, because of restrictions placed on the operating system boot loader by the environment in which it runs (the boot loader reads the System hive into memory very early in the boot process), but the limit for the System hive was just 12MB in previous versions of Windows…..

MORE:
Registry Size Limit functionality has been removed from Windows Server 2003 and from Windows XP
http://support.microsoft.com/kb/292726
Windows Registry Size Limits
http://msdn2.microsoft.com/en-us/library/ms724872.aspx
Registry Size Limit
http://www.microsoft.com/technet/prodtechnol/windows2000serv/reskit/r

Don’t listen to hackers – and this is extremely crucial with all systems released before Windows XP. The XP size limit was increased but has an imposed Size Limit by Microsoft. Some say “don’t worry about it”… and those are just the persons you remember when your computer fails. Too late then.

Hackers may tell you to set up “registry folders” for Windows 98 and 95 to place these downloads (lists) in that would save or add registry room which would be preposterous. Hackers will tell you if and when you run out of room in XP you can “increase the paged pool size – no problem”. Neither of these work or are true – and are bad hacks and they may be intentionally attempting these malicious pranks at your expense to destroy peoples machines like the “kiddie script” malware writers for “bragging rights” achieved. DUMP IT !

Did you know that antispyware programs like Webroot Spysweeper and Trend Micro Antispyware and the free Microsoft Windows Defender have real time active shields that block all “drive by” threat installations at all sites – not just “the bad ones – Restricted Sites” ?

This is what those that run donate forums and repair shops do not tell you so that they continually derive profit at the expense of the unknowing consumer. It is very simple – for 30 dollars a year you are good to go. End of story. Do it and dump it now before you injure your machine.

THE FRAUD OF THESE UTILTITIES

FACT – WELL OVER 25 BILLION WEBPAGES ……
World Wide Web
http://en.wikipedia.org/wiki/World_Wide_Web
Statistics
A more recent study, which used Web searches in 75 different languages to sample the Web, determined that there were over 11.5 billion Web pages in the publicly indexable Web as of the end of January 2005. As of March 2009, the indexable web contains at least 25.21 billion pages.

These products claim to….
“secures browser against dangerous sites and their unwanted malware” and explain their features as “preventing installation of spyware and other unwanted software, exploitation of security vulnerabilites, …”
IS THE FANCY DECEPTIVE WAY OF SAYING……
The product enters the entire list to date they have compiled as bad content websites and/or webpage addresses into Restricted Sites CREATING AN INDIVIDUAL REGISTRY KEY FOR EACH “DEFINTION” UPDATE FOR EACH WEBPAGE OR WEBSITE DOMAIN – one Windows Regsitry Key for each “automatic update” — and CONTINUALLY as new ones emerge, which is the activity of professional industry antivirus and antispyware companies attend continually to block threats from ALL.

NOW a collection of webpages makes up the website. Each website is a domain such as microsoft.com and is called the microsoft.com domain. If we use a simple number like most of the sites will use 10 webpages and divide that into the 25 Billion number of webpages plus – we can chop it down to 2.5 Billion Websites as very general. If we take just one percent of those as malicious content bad websites THEN these utiltiies claiming protection must have in the neighborhood of 25 Million bad domains out here as defintions in your computer or it is fraud and we just read this is physically impossible because of registry size.

CONCLUSION AS FAKE PRODUCT …… REMEMBER THEY SAY THEY “WILL PROTECT” AS ADVERTISING FOR DONATIONS….

So the defintions needed to support their claims of protection then has to be in the same ballpark as the 25 million bad websites added as Restricted Sites by their utilities. Now remember we just read at Microsoft that the Windows Registry has a 200M (million bits) size restriction. Now they are talking they are going to insert 25 million multi letter name domain words in the least, as new registry keys to fulfill their advertising and donation requests when in reality it may be in the hundreds if that.

So it is a compound or double deception. Number one, they have not possibly attained their advertised protection as they would have to have a minimum of at least in the tens of millions of known bad sites in their “Updates”, which are not updates at all but simply a new list of additional bad sites added to Restricted Sites.

And two, if they did as advertisied – simply the computer would cease to function from ‘incremental damage to the registry” – exceeding the “Registry Size Limit”.

POINT OF THIS EXERCISE – ? …..
WE DO NOT PROMOTE FEEL GOOD IN-SECURITY AND KNOW HOW DUMB YOU MAY FEEL RIGHT NOW AS WE DID WHEN WE WERE NEWBIES AND WENT TO THE SAME PLACES AND DOWNLOADED THE SAME FREE STUFF YOU ARE DOING. THE POINT OF THIS EXERCISE IS TO WAKE UP TO REALITY AND GET HIGH QUALITY PROFESSIONAL PRODUCTS THAT ACTUALLY PROTECT YOUR COMPUTER AND LIFE (ID THEFTS) A.S.A.P. ! ! !

————–

BLUECOLLARPC.US BLOGPOST

Many times asked “Best Easiest Free Registry Cleaner/Fixer

http://bluecollarpc.us/2011/03/10/many-times-asked-best-easiest-free-registry-cleanerfixer/

By bluecollarpcLast updated: Thursday, March 10, 2011 – Save & ShareLeave a Comment

Many times asked “Best Easiest Free Registry Cleaner/Fixer….

Our Answer…

Whole list here… http://bluecollarpc.us/windowsregistry.php
Uniblue Registry Cleaner Comparison Chart
LINKS/Soure: http://www.liutilities.com/products/registrybooster/comparisions/

For free the two best in the world are ….

(ADVANCED)
RegSeeker 1.55:
http://www.hoverdesk.net/freeware.htm
RegSeeker is a perfect companion for your Windows registry !
RegSeeker includes a powerful registry cleaner and can display various informations like your startup entries, several histories (even index.dat files), installed applications and much more ! With RegSeeker you can search for any item inside your registry, export/delete the results, open them in the registry. RegSeeker also includes a tweaks panel to optimize your OS ! Now RegSeeker includes a file tool to search for duplicate files, bad shortcuts
and more ! RegSeeker is FREE for personal use only !

GREAT FOR NOVICE AND ADVANCED – ALL …. (Use safest user settings)
RECOMMENDED:
PowerTools Lite – The Freeware Registry Cleaner
http://www.macecraft.com/ptlite/
Key Features

•Detects and fixes registry errors
•Finds and cleans unneeded registry junk
•Finds leftover temp files
•Clears History and MRU data
•Safe to use – automatic backup feature
•Multilingual user interface
•Based to the same award-winning engine as jv16 PowerTools

jv16 PowerTools by Macecraft has been consistently about the world’s best for a decade. Very, very, very well known by power users and that trusted. Costs bucks, however, they recently have given back to the community by releasing their Free Home Version no catches for real for all users. It has like four different settings of intensity for cleaning/fixing. Use simply the safest and at most one more click up in a scan/fix. Very fast, very safe. Best !

Also has back up one click button to restore anything deleted. You may want to get a little more familiar, but you can perform the full Registry Back Up BEFORE proceeding to ANY changes by opening the Windows Registry and make a COPY of it before change that can reinstall the full registry in a click.

HowTo….
Click > Start > Run and type in “regedit” without the parenthesis.
This opens the Windows Registry and don’t dare touch anything or you can render Windows/other softwares inoperable by a mistake !
NOW Click > File > Export…. (top left tabs). It will open the dialouge as if you were saving a file or media or software. NAME the file you wish to call it like “Reg_Back_up_Today” or anything you wish to call it so you remember and then Click > Save ….and usually to My Documents.
NOW WAIT about 30 to 60 seconds as it will then copy the ENTIRE Registry to the restore file. It can take even up to 90 seconds if ypou havea lot of stuff installed. Hover your mouse cursor over it to see progress. DO NOT DARE INTERRUPT THE PROCESS UNTIL COMPLETED !!! or you may cause dreaded Registry Damage ! Do NOT mess up with impatience or doubt !

IF USED TO RESTORE THE REGISTRY… you Double Click the Registry back up file created and DON’T DARE INTERRUPT THE PROCESS and can take even up to five minutes for it to rewrite in the Registry.

Note, after any changes to the PC you need to Export the Registry again in a new back up file to restore to current state of the PC such as new softwares added etc. Recommended to do this like weekly or monthly as how many times in a lifetime will this ever need to be done. Every blue moon – but you need the back up like to restore the computer if hit by malware plus files back up correspondingly.

Source(s):
http://bluecollarpc.us/windowsregistry.php

Webmaster, http://BlueCollarPC.US

 

FURTHERMORE READ THIS WHICH INCLUDES INFORMATION ABOUT MODERN REGISTRY CLEANERS THAT SEVERAL YEARS AGO WERE UPGRADED TO NOW ALSO PERFORM REGISTRY DEFRAGMENT TO HEAL REGISTRY FRAGMENTATION THAT OCCURS IN NORMAL USE AND WORSE IN HEAVY USE UNATTENDED…..

 

Why You Should Defragment Your Registry

http://www.maketecheasier.com/why-you-should-defragment-your-registry/2008/01/29

QUOTED:

The Need to Defrag the Windows Registry

If you monitor the registry of your system using a tool, you will see that it is accessed by your Windows operating system and programs installed on it more than a hundred times every second. Therefore, if your registry is fragmented and slow in responding to requests for information, it directly affects the performance of your PC and slows it down. This is the reason why it is important for you to keep your registry free from unwanted files and defrag it regularly to speed up your PC and maintain it at its optimal performance.

Causes for Registry Fragmentation

The registry is one of the most used components of your Windows system because it comprises configuration data of all hardware devices and software programs installed on your PC. Therefore, each and every operation that occurs on your system adds or removes information from the registry. Most of the time, when these entries are no longer required, they are removed from the registry. However, in reality, a lot of information gets left behind causing the registry to bloat up. This registry bloating eventually fragments and damages the registry files.

Registry files also get fragmented due to the accumulation of several empty registry keys within it. These keys are generated when the registry entries that are removed from the registry fail to remove their placeholders. In due course, the number of these empty registry keys increases in the registry and causes registry fragmentation.

How to Defrag the Registry

There is no tool available in your Windows system that you can use to defrag the registry. Therefore, the only way to defrag it is by using a reliable third-party registry cleaner tool. Today, there are a large number of registry cleaner tools available in the market today. You must choose and download the one that meets your requirements, carries good user reviews and is compatible with your operating system.

Registry tools are easy-to-use and enable you can defrag the registry easily in just a few mouse clicks. When you start the registry defragment process, your registry tool consolidates all the fragmented registry files, reindexes them to improve the data access time, and removes all empty registry keys to compress the registry.

When To Defrag the Registry

Because the registry defragmentation process enables you to remove empty registry keys, you must defrag the registry after you have performed any activity that removes a lot of entries from the registry.

For instance, after you clean up the registry using the registry scanner tool, all the invalid keys removed leave behind their empty place holders. In the same way, empty keys may get left behind when you uninstall applications from your PC. So, even if you would have removed all unwanted information from the registry—or uninstalled an application, the size of the registry may remain the same due to the existence of these empty registry keys. This is the reason you may always defragment the registry after registry scan and repair and program uninstall processes.

The registry is an important component of your Windows system and it is important for you to perform regular registry maintenance to ensure yourself a healthy, high-performance PC. You can do this easily using your registry cleaner tool. In addition to repairing registry errors and defragging the registry, you may also use the tool to backup the registry. It is quite useful to make regular registry back-ups, because if despite of all your maintenance activities the registry fails, you can easily restore it using the back-up you would have taken earlier.

This article is a guest post by James Ricketts

James Ricketts is a full time writer who loves to write about the errors, solutions, and various tips, tweaks, and nuances of the Windows Vista and XP registry. With his background in computers and writing he’s blended both his talents into writing helpful articles relating to various Windows and computer issues

http://www.maketecheasier.com/why-you-should-defragment-your-registry/2008/01/29

FURTHERMORE… ROOTKITS SEARCH FOR LEFT OVER FILES AND REGISTRY KEYS FROM UNINSTALLS TO USE THEM TO HIDE BEHIND TO AVOID DETECTION AND THESE ORPHAN FILES AND KEYS ARE SOMETIMES CALLED POTENTIAL SLEEPER FILES AND KEYS.

%d bloggers like this: