Windows Tutorials

How To Remove Sophos Tamper Protection

In this tutorial you will be shown How To Remove Sophos Tamper Protection from the Sophos Central Endpoint Software on your windows system. This comes handy when you no longer have access to Sophos Central available and you have a device with Sophos Endpoint software installed. 

Follow the magical steps below to obtain freedom from Sophos.

  1. Open up MSConfig.exe
  2. Click Boot tab 
  3. Select checkbox Safe boot with radio minimal selected
  4. Click apply and reboot
  5. Open the command line (Shell) and execute the following commands:

    REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SAVService" /t REG_DWORD /v Start /d 0x00000004 /f

    REG ADD"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Sophos MCS Agent" /t REG_DWORD /v Start /d 0x00000004 /f

    REG ADD “HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Sophos Endpoint Defense\TamperProtection\Config” /t REG_DWORD /v SAVEnabled /d 0 /f

    REG ADD “HKEY_LOCAL_MACHINE\S

Read the rest

Facebook Exposed 267M Users Phone Numbers

Researchers have found a database which exposes the names, phone numbers and Facebook user IDs of 267M of the Facebook users. This database was left unsecured on the web for nearly two weeks before it was removed.

The Data Exposed

In total 267,140,436 records were exposed. Most of the affected users were from the United States. Diachenko says all of them seem to be valid. Each contained:

  • A unique Facebook ID
  • A phone number
  • A full name
  • A timestamp

“A database this big is likely to be used for phishing and spam, particularly via SMS,” according to the Thursday report. “Facebook users should be on the lookout for suspicious text messages. Even if the sender knows your name or some basic information about you, be skeptical of any unsolicited messages.”

Facebook users can make some changes in their profiles from being scraped by strangers by adjusting their account privacy

Read the rest

How To Fix Your Trusted Platform Module Has Malfunctioned

How To Fix Your Trusted Platform Module Has Malfunctioned for Microsoft Outlook 2016 and 2019 and 365. This error effects your outlook login by prompting you for a password or not even displaying the window.

 

How you would go about to fix this Trusted Platform Module Has Malfunctioned error is be doing the following steps:

  1. Close Outlook
  2. Open Regedit
  3. to to following path HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
  4. Create REG_DWORD
  5. Name it: EnableADAL
  6. Make sure the value is: 0
  7. Open Outlook and you should be properly prompted.
Read the rest

Set A New Public Time Server

Here are a few commands to set a new public time server. 

Run CMD in Admin mode and run the following commands.

  1. net stop w32time
  2. w32tm /config /syncfromflags:manual /manualpeerlist:”0.it.pool.ntp.org 1.it.pool.ntp.org 2.it.pool.ntp.org 3.it.pool.ntp.org
  3. net start w32time
  4. tzutil /s “Eastern Standard Time”
  5. w32tm /config /update
  6. w32tm /resync /rediscover
     
Read the rest

A Simple But Strong Cyber Security Strategy

It’s quite a task having to protect a small business from online dangers. The threats that can come across your network are vast and in order to avoid them you should consider having a Simple But Strong Cyber Security Strategy.

You don’t have to know much about this topic to know that you absolutely need some sort of cyber security. Here are some Simple But Strong Cyber Security Strategy steps that you can follow in order to protect your small business while still educating yourself and employees about the matter.

 

Install the latest antivirus software

One of the most important things to have is a business class antivirus software. The antivirus software you use to protect your small business files should always be kept up to date and active on every computer used by your employees within your office space and you should also consider protecting computers that access the … Read the rest

Tech Tools For Beginners

Package Contents: 2 x Plastic Opening Tools 3 x ESD Tweezers 1 x Utility Knife 1 x Anti-Static Wrist Strap 1 x SIM Card Ejector Pin and LCD Suction Cup 4 x Triangle Plectrums  2 x Plastic Spudgers 3 x Metal Spudgers 1 x Tin Scraper 1 x Large Plastic Double Headed Opening Tool 1 x cleaning Cloth 1 x Magnetizing and Demagnetizing Tool 3 x SIM Card Shells 2 x Magnetic Protect Mats 1 x 60 in 1 Screwdriver Kit

Tech Tools For Beginners

  • Multi-Magnetic Screwdriver Set : 86 in 1 Precision Screwdriver Set have more tools, which includes utility knife, Anti-Static tweezers, Anti-Static Wrist Strap, SIM card ejector pin and LCD Suction Cup, Triangle plectrum, plastic spudgers, metal spudgers, SIM card shells, Magnetizing and demagnetizing tool, etc.
  • High Quality & Well Perform : These durable screwdriver bits are made of CRV steel, whose hardness can reach to HRC52-56,
Read the rest

Signs your Android phone may have a Virus or other Malware

Here are some signs your Android phone may have a virus or malware. Remember while the external damage is usually visible, internal damage is usually hidden from view.

Android Malware like virus is known to perform repeated tasks that can take up resources on your devices. Signs of Android malware may show up in these ways.

  1. Your phone is too slow.
  2. Apps take longer to load.
  3. The battery drains faster than expected.
  4. There is an abundance of pop-up ads.
  5. Your phone has apps you don’t remember downloading.
  6. Unexplained data usage occurs.
  7. Higher phone bills arrive.

How to remove viruses and other malware from your Android device

  1. Power off the phone and reboot in safe mode. Press the power button to access the Power Off options. Most Android phones come with the option to restart in Safe Mode. Here’s how, according to Google, although Safe Mode can vary by phone: Press
Read the rest
Windows Tutorials

How To Transfer Active Directory FSMO Roles

How to transfer the 5 FSMO (Flexible Single Master Operations) roles and GUI tools that can be used to move these roles between Active Directory Domain Controllers.

  • Schema Master – controls all updates and modifications to the Active Directory schema.
    This role can transferred using Active Directory Schema snap-in.
    If Active Directory Schema snap-in is not available you need to register required DLL using following command: regsvr32 schmmgmt.dll. On Windows Server 2008 and later this needs to be done in an elevated command prompt.
  • Domain Naming Master – controls the addition or removal of domains in the forest.
    This role can transferred using Active Directory Domains and Trusts snap-in.
     
  • Infrastructure Master – responsible for updating references from objects in its domain to objects in other domains.
    This role can transferred using Active Directory Users and Computers snap-in.
  • Relative ID (RID) Master – responsible for processing RID
Read the rest

Hackers Use Fake Windows Update Emails to Inject Cyborg Ransomware

Hackers are using a Fake Windows Update email to inject cyborg ransomware. The email campaign has been found during the latest Windows 10 November 2019 update that was release. Users are getting fake emails regarding this update Windows update and it states that you should download the update attached. This attachment is not a Windows 10 update, it actually installs “Cyborg Ransomware” in your PC.

 

How it Happens

Users will first receive an email regarding urging them to download the updates like “Critical Microsoft Windows Update!” or “Install Latest Microsoft Windows Update Now”. With this fake email will contain an attachment which has a “.jpeg” file which is not a picture; it’s an executable file.

Once you run this file it will download another executable file called bitcoingenerator.exe, which is programmed to deliver malware in your system. This file contains the Cyborg … Read the rest

Many Critical Vulnerabilities In VNC

Many critical vulnerabilities found in Virtual Network Computing (VNC). The VNC software was found to have 37 different memory corruption vulnerabilities and many of these could result in remote code execution. The researchers at Kaspersky said around 600,000 web-accessible servers use the code.

Kaspersky researchers wrote in an analysis of the bugs for ICS CERT, released Friday.

“The prevalence of such systems in general, and particularly ones that are vulnerable, is a significant issue for the industrial sector as potential damages can bring significant losses through disruption of complex production processes,” 

Kaspersky found many critical vulnerabilities in VNC client , but also on the server-side of the system which can be exploited after password authentication. Kaspersky said there are two main attack vectors:

“An attacker is on the same network with the VNC server and attacks it to gain the ability to execute code on the server with the

Read the rest

Stay Informed

Receive instant notifications when new content is released.