Posted by & filed under General.

I know many people are server admins for large companies that may be interested in this. The .CO TLD has been opened up for pre-registration for non-Columbians.

Godaddy and other registrars are trying to convince people this is the next big TLD – associating .CO with COmpany or COrporation or COmmerce. The sad thing is, with all of the marketing about to take place, it may just work.

Trademark holders, and current third level .co holders have first dibs, then people willing to pay $299, and finally people only willing to pay $29.

So, like .info, .mobi, etc, if your company has a presence worth protecting, you may need to shell out the $$ to protect against squatters.

Here’s a link to Godaddy’s page about .CO:

http://www.godaddy.com/tlds/co-domain.aspx?ci=19152

It also happens to be the 25th anniversary of .COM today.

http://news.bbc.co.uk/2/hi/technology/8567414.stm

Posted by & filed under Windows / Server.

I find adding common tasks to the shell menu a great timesaver when I am running between stations. It is also easier to direct users to simply “right-click” on something rather than walk them through a maze of menus…or even have them find the “run” box.

  1. Click Start -> type “regedit” in the Search command box.
  2. Navigate to HKEY_CLASSES_ROOT\Drive\shell.
  3. Right-click on “shell” and select New -> Key. Name it “runas” and set the default value to “Defragment”.
  4. Right-click on “runas” and select New -> Key. Name it “command” and set the default value to “defrag %1 -v“.
  5. If you ever wish to remove this functionality, just delete the “runas” key.

 

Add Defrag to the shell menu registry edit

 

You can also paste the following into Notepad and save it as: RightClickDefragment.reg or you can download the zipped RightClickDefragment.reg here. Double-click on the .reg file and click “yes” when asked to enter it into the registry.

Windows Registry Editor Version 5.00

[HKEY_CLASSES_ROOT\Drive\shell\runas]
@=”Defragment”

[HKEY_CLASSES_ROOT\Drive\shell\runas\command]
@=”defrag %1 -v”

 

Defragment Command Screen

Posted by & filed under Windows / Server.

Although this particular problem has been around for some time, I am surprised at how many times I am asked about the solution. Many programs use an HTML help system that requires Internet Explorer and ActiveX to run (CHM – Compiled HTML Help). After security updates 896358 and 890175, some HTML content outside of the “local machine” zone was disabled. This would affect many network based programs or programs that connect to an outside server for HELP files. When accessing the Help system, an error saying “Page Cannot Be Displayed” would show up. Luckily the fix is easy.

In Notepad, copy and paste the code you need and name it “htmlhelpfix.reg” Then double-click on the file and click “YES” when it asks if you want to enter it into the registry.

Enable Local Machine, Local Intranet and Trusted Site Zones to display ActiveX HTML Help. This is the most commonly referred to fix – this is probably the one you want. You can also download the zipped htmlhelpfix.reg file here.

REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\HTMLHelp]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\HTMLHelp\1.x\HHRestrictions]
“MaxAllowedZone”=dword:00000002

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\HTMLHelp\1.x\ItssRestrictions]
“MaxAllowedZone”=dword:00000002

Enable Local Machine Zones to display ActiveX HTML Help. This is the default entry, you can use it to reset.

REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\HTMLHelp]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\HTMLHelp\1.x\HHRestrictions]
“MaxAllowedZone”=dword:00000000

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\HTMLHelp\1.x\ItssRestrictions]
“MaxAllowedZone”=dword:00000000

Enable Local Machine and Local Intranet Zones to display ActiveX HTML Help.

REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\HTMLHelp]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\HTMLHelp\1.x\HHRestrictions]
“MaxAllowedZone”=dword:00000001

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\HTMLHelp\1.x\ItssRestrictions]
“MaxAllowedZone”=dword:00000001

Enable Local Machine, Local Intranet, Trusted Site and Internet Zones to display ActiveX HTML Help.

REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\HTMLHelp]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\HTMLHelp\1.x\HHRestrictions]
“MaxAllowedZone”=dword:00000003

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\HTMLHelp\1.x\ItssRestrictions]
“MaxAllowedZone”=dword:00000003

Enable Local Machine, Local Intranet, Trusted Site, Internet and Restricted Zones to display ActiveX HTML Help. NOT RECOMMENDED!

REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\HTMLHelp]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\HTMLHelp\1.x\HHRestrictions]
“MaxAllowedZone”=dword:00000004

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\HTMLHelp\1.x\ItssRestrictions]
“MaxAllowedZone”=dword:00000004

Posted by & filed under Windows / Server.

The Windows Recovery Console is required to fix many startup issues caused by malware, viruses, and corrupt system files. The Recovery Console can be booted from the Windows Setup disc, but many machines (including Netbooks) do not have CD drives or easy access to the Windows Setup disc.

Below are the instructions to install the Recovery Console on any Windows XP machine as a boot list option. You will no longer need physical access to the Windows Setup disc (except to install initially) when things go wrong.

  • Insert the Windows XP setup disc.
  • Click Start -> Run and type: “%windir%\i386\winnt32.exe /cmdcons
  • Click YES on the Windows Setup box to install the Recovery Console.
Windows XP Recovery Console Install
  • Setup will attempt to connect to the Internet to update any setup files from the disc. Press ESC to interrupt the setup and use the files on the disc only.
  • Once the Recovery Console is installed a confirmation box will pop up. Click OK.

Some Windows XP passwords will not be recognized by the Recovery Console. To remove the password requirement, modify the following registry key:

  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Setup\RecoveryConsole
  • Set the DWORD SecurityLevel value to 1.

Posted by & filed under Security, Windows / Server.

The PC-OFF.BAT virus loads a shutdown script when logging onto Windows XP. A few seconds after logging in, Windows will shutdown. This also affects safe mode. The countdown timer is set to only a few seconds, not allowing the user to enter “shutdown – a” in the run box. You may not even see the emergency shutdown dialog before you are automatically shutdown.

Windows_XP_Emergency_Shutdown

In order to remove the files, you’ll need the Windows XP CD. Other options include putting the hard drive into another computer, or using a LiveCD (BartPE or Linux) to remove the files.

Remove the files from your hard drive using the Windows XP CD

  1. Insert the Windows XP disc into the CDROM. You may need to adjust your BIOS settings to boot the CDROM first.
  2. When the “Welcome to Setup” screen appears, press “R.”
  3. Select the installation you wish to access (there should be only one option for most systems).
  4. Enter the administrator password when asked.
  5. Once at the Recovery Prompt, press ENTER after typing the following command: chdir c:\windows
  6. Press ENTER after typing the following command: del bar311.exe
  7. Press ENTER after typing the following command: del password_viewer.exe
  8. Press ENTER after typing the following command: del photo.zip.exe
  9. Press ENTER after typing the following command: del pc-off.bat
  10. Press ENTER after typing the following command: exit
  11. Remove the Windows XP disc and restart your computer.

Once pc-off.bat is removed from the Windows directory, you’ll be able to logon to Windows without it shutting down immediately. There are still remnants left over in the registry though – best to clean those up.

  1. Go to Start -> Run and type “regedit” and press ENTER.
  2. Go to HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon and find the key: “Userinit=C:\WINDOWS\system32\userinit.exe,xxxxxx.exe” where xxxxxx.exe is bar311.exe, photo.zip.exe or password_viewer.exe.
  3. Delete bar311.exe, photo.zip.exe or password_viewer.exe from the key, but be sure to leave userinit.exe! If you delete that, you will be unable to logon to Windows.
  4. Go to HKEY_CURRENT_USER \software\microsoft\windows\currentversion\explorer\advanced and set the following key values: “Hidden=dword:00000001 (1)” “HideFileExt=Dword:00000000 (0)” “ShowSupperHidden=Dword:00000001 (1)”
  5. Go to HKEY_CURRENT_USER \software\microsoft\Command Processor and find the key: “autorun=c:\windows\pc-off.bat” and remove “c:\windows\pc-off.bat”