norton

Tue
14
Dec
Dennis Faas's picture

Is XP SP2 necessary, since my router acts like a firewall?

Infopackets Reader Kathy O. writes: " Dear Dennis, I am getting ready to build a new computer and plan to put Windows XP Home Edition with XP Service Pack 1, although I have already ordered the XP Service Pack 2 CD from Microsoft. As it stands now, ... I will be running both computers from my LinkSys router; however, I was told by a friend that I would need to turn off Windows XP's firewall from the Control Panel after I install Service Pack 2. Is this true? And also, is it necessary to apply XP Service Pack 2 since my router acts like a firewall? If so, should I disable the Windows Firewall ... (view more)

Tue
17
Feb
Dennis Faas's picture

Verify Action Type for File Association

Infopackets Reader Berlin B. writes: " Dear Dennis, As part of my stringent preventive maintenance plan, I recently ran AdAware 6.0 and Norton AntiVirus software on my PC. Norton reported a number of 'at risk' files on my system. After I ran AdAware ... 6.0, the document files listed in the My Documents folder now show a .DOC extension with no associative icon. When I try to click these files, a window appears and asks me to select the appropriate file extension. It also warns me that if I select the wrong type, the file may become unusable. I was unsure what to do, so I ran System Restore ... (view more)

Wed
06
Nov
Dennis Faas's picture

Using a software firewall and hardware firewall in tandem

Almost a month ago we were knee-deep in discussion with respect to tracking down a hacker. In short, our ongoing discussion probed possibilities and known methods which might be used to track down a hacker, if one ever attempted to hack into *your* ... computer system. RE: Can I track down a Hacker?, Part 1 , and Can I track down a Hacker?, Part 2 . Shortly after Part 2 was released, I received an email from Dan Daily (editor / webmaster) of Danny's Daily . Dan's comments focused on a proposed supposition, which was sent in from John B. in Part 2 of our Discussion . To recap: John suggested to ... (view more)

Wed
09
Oct
Dennis Faas's picture

Can I track down a hacker?, Part 2

Yesterday's Visitor Feedback asked, " Can I track down a hacker ?" My answer to that question was a passive one -- mainly based on the fact it would take an inconceivable amount of time to prosecute each and every hacker who tries to wallow his way ... into your computer system. An algorithm for a typical Hacker might look something like this: Randomly select a computer to hack; Attempt to gain access to randomly selected computer; If access is granted, deliver a payload (send virus/trojan, delete files); If access is not granted, disconnect from this computer; Repeat process. With the ... (view more)

Tue
25
Jun
Dennis Faas's picture

MSConfig errata

Last week's issue of the Infopackets Gazette was about the importance of using msconfig. The article also reviewed some third-party msconfig replacements for Windows 2000 users. I received a lot of feedback regarding the issue since the last ... newsletter was mailed. If you were unclear about how msconfig works, be sure to check out the revisions made to the article online. I have provided a few extra steps and a screen capture for clarity. One more note: I received email with regards to msconfig and the Klez Virus. Denise R. writes: " Dear Dennis, In reference to the recent newsletter, ... (view more)

Pages

Subscribe to RSS - norton