Sunbelt Weekly TechTips #53: How To’s

Vista Mobile Device Center
If you’re using Vista and you synch your PC with a Windows Mobile Smartphone or Pocket PC, you know that the old ActiveSync program has been replaced by the Mobile Device Center. This makes connecting a mobile device and transferring files to and from it much easier. You can read all about how to use it here.

If your device runs Windows Mobile 6, you need to update the Mobile Device Center application on Vista to version 6.1. This will support new features in Windows Mobile 6 such as Information Rights Management to protect email messages and Office documents, HTML mail, certificate enrollment and more. It’s a free download from the Microsoft Download Center.

How to put symbol characters in email messages
Reyna R. wrote to say “I get emails from people all the time that have symbol characters like the copyright or trademark character. Or foreign words with accent marks. But how do I type those characters in my own messages? What I do now is save these messages that have the characters in them and when I want to use one, I go back to it and copy and paste. But there’s got to be a better way!”

There is definitely a better way. First determine what font you’re using, then do this:

  1. Click Start | All Programs | Accessories | System Tools and click Character Map or on Vista click Start and type charmap in the Search box.
  2. Select the font in the drop-down box at the top.
  3. Scroll through the symbols to find the one you want to use (for example: ©).

You can double click the character and click Copy, then paste it into your document. But a faster way if you’re going to use the same characters often is to note and memorize the keystroke shown in the lower right corner (for example, ALT+0169 for the Copyright symbol). Then when you want to insert that character in the future, just type the keystroke combination instead of going to the Character Map. Note that some characters are not available in some fonts. Note that this procedure works for most applications, not just email.

Deb Shinder

Sunbelt Weekly TechTips #53: Configuration and Troubleshooting

How to configure paging file for optimization and recovery in XP
The paging file is used to create virtual memory on your computer, to fool applications into thinking they have more RAM than is actually installed. You can tweak the paging file for better performance, but there are some considerations, such as the ability to troubleshoot certain types of errors. KB article 314482 tells you the best methods for balancing these two factors.

Update web sites don’t scan for updates
If you have done a repair operation on XP SP1 or SP2 using the original XP installation CD, you might find that when you visit the Windows/Microsoft Update web sites, they no longer scan for updates. You might also see an error message in the WindowsUpdate.log file that says Windows Update ActiveX is not the right version. This happens because the repair replaced version 6 of the ActiveX control, which was installed by the service pack, with an old version. You need to download and reinstall Windows Update ActiveX control version 6. To find out how, see KB article 916259.

Battery drains quickly on XP SP2 laptop
If your portable computer running Windows XP Service Pack 2 is unable to go into a sleep state, which can happen because the USB controller won’t turn off, the battery may drain very quickly, resulting in a shutdown of the operating system. Ouch! But there is an update available from the Microsoft Download Center that you can install to fix this problem. To find out more and for a link to the update, see KB article 918005.

Deb Shinder

Are Computers Causing us to “Cocoon” Ourselves?

Several people wrote in response to an off-hand comment I made in last week’s feedback section on computer glitches, mentioning that I rarely go to see a movie in the theater anymore, preferring to wait for it to come out on DVD so I can watch it in the comfort of my home. Some of those readers (including a theater manager!) wrote to argue that no home theater could offer the level of experience available in the theater, but most wrote to heartily agree that the advantages of the super big screen are outweighed by the high concession stand prices, ringing cell phones, crying babies and misbehaving teenagers who mar the movie-going experience.

But one person pointed out that my (and many others’) preference for staying home is part of a bigger overall trend to avoid going out in public whenever possible and “cocoon” ourselves in our homes. And this trend is certainly encouraged, aided and abetted by today’s technology.

I have to admit it’s true, at least in my own life. Tom and I, and many others we know, have for the last several years put our money into creating a beautiful, functional home rather than on going out to eat, taking vacations, buying fancy cars and clothes and jewelry, etc. We have just about everything we want and need right here – so why ever leave? Few resorts can rival our own backyard, with the pool overlooking the lake, and we even have a remote control for the spa and pool heater – technology we wouldn’t find at most hotels (or if we did, would pay dearly for). And the sound system in our bedroom is connected to speakers on the patio so we can listen to music of our own preference while we swim, rather than something chosen by hotel staff. A computerized sprinkler system keeps the lawn and flower beds watered and looking nice.

Our home theater system may not have a screen that’s as large as the one at the local Cinemark, but our sound system is better, we’re closer to the screen, and we can pause the movie whenever we want and have whatever snacks we prefer while we watch instead of being limited to popcorn, hot dogs and candy.

The technology extends to the kitchen. We don’t have one of those refrigerators with a computer screen in the door, but it does notify us when the filter for the in-door water dispenser needs changing. The ovens (conventional and microwave) and other appliances are programmable so we can easily make great gourmet meals without paying those not-so-great restaurant prices. And when we don’t feel like cooking, we can always order pizza online.

We even work at home, so there are often times when we don’t leave the house for days at a time. We save a ton of money on gas and mostly live in shorts and tee shirts from WalMart. Once again, it’s technology that makes this possible: as tech writers, we conduct almost all our business over the Internet. We have an enterprise-level network in our home, with all our own web servers, mail server, DNS servers, etc. on site. And of course, there’s a security system to protect all this from burglars.

Some have speculated that this sort of “cocooning” behavior accelerated after 9/11, but I think the trend started prior to that. Just as technology has made it easier for us to “hole up” in our homes, our high tech, high pressure world has also made life outside our homes more hectic and hassle-prone.

Red-light cameras, computerized toll booths and fancy traffic control devices have made driving on increasingly crowded roads more of a chore. Surveillance cameras watching us everywhere we go has made going to the mall, bank, etc. less pleasant. Computerized “self service” checkouts that unfortunately often don’t work properly, making us wait for a human to come intervene and taking extra time, makes shopping a task to be dreaded. Why venture out into all that when you can stay home and do much of your shopping, banking, bill paying and other business while sitting at your computer?

Some express concern that we’re becoming isolated and anti-social, but I don’t think so. We have a far larger circle of friends now than we did in our pre- Internet, pre-homebound days. And those friends are scattered all over the world. We communicate with them on a daily basis, thanks to our technology. We exchange ideas, photos and videos, talk via IP phone calls and share in each others’ lives far more intimately than we did with most of our friends in the past.

And just because we meet on the ‘Net, that doesn’t mean we never get together in person. When we attend conferences, we usually already “know” many of our fellow attendees, through Internet discussion lists and web forums. We have parties and invite our long-time online friends; next month we have people planning to fly in from exotic places like Australia, Canada and Kentucky to attend our next one. Without the Internet, we’d never know them.

What’s your experience? Have you found yourself staying home more than you used to? Do you attribute that to fears of terrorist attacks, the growing hassle factor of urban/suburban living, the temptations of technology, slowing down as you age, or all, some or none of the above? Do you think “cocooning” is a bad thing, a good thing, or just one of many lifestyles available to us today? Would you stay at home more if you could, or do you long to get away? Have computers made you socialize less, or has Internet connectivity enhanced your social life? 

Deb Shinder

Poste Italiane phishers arrested

Some good news.

The first arrests ever in Italy having been carried out for association to commit crimes of phisings, the young hacker confesses: I used to send e-mails from Poste Italiane and entered into the current accounts of my victims from my laptop. The top components all come from Easten Europe.

The Provincial Command of the Military Financial Police (Guardia di Finanza) of Milan executed 26 Arrests Warrants for the people belonging to two criminal associations. These two criminal associations were connected through and made up of Italian and Foreign citizens, who were responsible of a series of deceptions of hundreds of users taking advantage of Home Banking Services, through techniques better known as phishing.

The operation, called “PHISH & CHIP“, allowed the Judicial Authorities to identify 18 Italian citizens and 8 foreign citizens from Eastern Europe, regularly living in our Country, who took advantage of the Home Banking Services’ personal access codes of the clients of “Poste Italiane” (holders of on-line bank accounts or PostePay Cards). The access codes were illegally wormed out through the answers given to the e-mails apparently sent by their Credit Institutions.

More here.

Alex Eckelberry

For your weekend viewing pleasure

Some botnet videos on YouTube.

Script kiddies showing off botnets:

(“i did not do this it was a person i know on his own server.”)

(“Msn worm, Controlled via irc. when net was at 21k spreading like 30 bots per second.”)

And from the UK, an educational video on being infected:

And finally, from the calming voice of the BBC, a video on botnets and infection (YouTube embedding disabled).

Enjoy your weekend.

Beware fake Italian IE 7, Google pages

From Italian researcher, Mauro, internet-explorer(dot)name offers to update IE. Choosing either Express (Rapido) or Custom (Personalizzato) prompts to download a malicious file, ie.exe, which looks like a trojan click fraud tool (Virus Total results here).  It also attempts to install an Active X control.

Iefake1388881281000

Google-Hard(dot)com offers Google searches.  However, it seems to want to install a TrojanProxy.

Googlehard21388882342348

Alex Eckelberry

Sunbelt developers work at speed of light, create a patch for the patch

As blogged earlier today, we have received scattered reports that the Tuesday’s Microsoft MS070–040 .NET pitch was causing problems on some customer sites running Sunbelt Ninja Email Security.

This evening, our developers released an update for the problem. Customers can download this latest version (2.1.4209) here.

With this hotfix in place, you will not suffer any negative effects from the recent Microsoft .NET patch with Sunbelt’s Ninja product (this update is for Ninja only and does not correct anything with the Microsoft patch itself).

Now, there’s some additional treats in this download, which were in the process of being released as the news of the .NET patch came out.

  • An updated Cloudmark Engine for increased detection of both image and pdf spam.
  • New Sunbelt Image Spam Engine for additional detection of image spam.
  • A SURBL engine has been added for detection of spam based on URLs within messages.

Customers who have questions are more than welcome to contact support, toll-free or by email.

Nice work, Sunbelt development. I’m going to have to do my Steve Ballmer dance.

Alex Eckelberry

Why “I’ve got nothing to hide” is a ludicrous argument

As privacy is a related subject to security, I often write about this issue, usually about what I believe are dangerous encroachments into the area.

Invariably, I get angry readers who decry my laments, seeing me as not understanding the “realities of the post 9/11 period”, or other such histrionics.

However, in answer to that, I can only say that those who argue for more governmental authority to peek into our lives are, effectively, arguing for a significant increase in governmental power — a surprising position for people, many of whom view themselves as political conservatives.

Privacy1238888888It’s also an argument to effectively give up rights to the very institution (the government) that is historically infamous for its inability to deal with privacy in any acceptable manner. Furthermore, experience teaches us that rights once renounced (and a tacit acceptance is, effectively, a renouncement) don’t come back easily — if at all.

I’m obviously not in favor of seeing terrorists running around, but good security doesn’t necessitate a frontal assault on rights.

In the US, we have a constitution which reasonably defines privacy rights in the 4th amendment. For others, there is the Universal Declaration of Human Rights (such as Article 12), which even the US government has described as enumerating the inalienable rights of people. (Inalienable is a key word here, meaning a right that can’t be taken away.)

But in the end, we’re fundamentally dealing with a problem of logic. Arguments against our inalienable rights are often predicated with something like “terrorists are all around us, therefore we must live with the hard cold realities that we have to give up our rights, our lives will just have to be a little less free, we’re going to have to suffer more”, etc.

The is also expressed as “if you’ve got nothing to hide, you shouldn’t be worried”, which has, as its corollary, “I’ve got nothing to hide, so I don’t worry about it” (similar to the dangerous “you have nothing to worry about if you’re innocent”).

Putting aside the numerous historical lessons, these arguments are flawed for a number of reasons. But few have taken on the full implications of it in a satisfactory academic fashion.

Recently, Professor Daniel Solove Of George Washington University Law School (who also blogs on Concurring Opinions) wrote an excellent logical overview of the statement “I’ve got nothing to hide”:

Whether explicit or not, conceptions of privacy underpin nearly every argument made about privacy, even the common quip “I’ve got nothing to hide.” As I have sought to demonstrate in this essay, understanding privacy as a pluralistic conception reveals that we are often talking past each other when discussing privacy issues. By focusing more specifically on the related problems under the rubric of “privacy,” we can better address each problem rather than ignore or conflate them. The “nothing to hide” argument speaks to some problems, but not to others. It represents a singular and narrow way of conceiving of privacy, and it wins by excluding consideration of the other problems often raised in government surveillance and data mining programs. When engaged with directly, the “nothing to hide” argument can ensnare, for it forces the debate to focus on its narrow understanding of privacy. But when confronted with the plurality of privacy problems implicated by government data collection and use beyond surveillance and disclosure, the “nothing to hide” argument, in the end, has nothing to say.

You can read the complete paper here (via BeSpacific).

Alex Eckelberry

Microsoft .NET patch causing problems?

This morning, SANs reported scattered reports that MS07–040 (KB928365), which attempts to resolve certain security issues in .NET, is causing problems:

It seems there are a number of readers struggling with the MS07-040 patch for the .NET framework on what appears to be mostly clients.

The reports we got so far seem not to lead to any specific thing that happens in many cases, just various things going haywire. We really do appreciate the heads-up warnings we get from our readers as it allows to write little warnings like this one.

We also have confirmed field reports of certain issues occurring subsequent to the patch, specifically with our Ninja Email Security (which uses .NET). Reports from our customers are also scattered — many customers are experiencing no issues at all. The workaround is generally to uninstall the patch.

We are currently working with Microsoft on trying to understand exactly the nature of the problem. If you are a Ninja customer and are experiencing any issues, please contact our support department.

Alex Eckelberry

Spam story on Forbes

Pat Peterson of IronPort (and all around good guy) has spent the last year doing some interesting stuff with spammers.

In mid-June Peterson ran out of leads and, feeling frustrated, made a buy on MyCanadianPharmacy. Now, Americans are forbidden to import prescription drugs, but there’s an exception: a three-month supply is permitted. To buy the pills, he created a one-time-use MasterCard (nyse: MA – news – people ) number tied to his wife’s account and spent $85 for ten pills of something called Viagra Professional. Within seconds he got a confirmation e-mail from E-Commerce Processing Systems, a discount code for future buys and a request to rate his customer experience. “I’d never seen cybercrime like this. It acts like a huge business,” says Peterson.

A London address appeared at the bottom of one message. Peterson had an IronPort employee there visit the building. It housed several offices, but a receptionist had never heard of the Web company. The address for the world headquarters of MyCanadianPharmacy is an empty parking lot in Toronto.

Peterson’s credit card was charged to an account in Russia. He called MasterCard for more details, but, without a subpoena, the card company could reveal only the merchant’s account name, #Pharmacyclient1.com, and asked him if he had a complaint. He said he didn’t, but a few weeks later his card was mysteriously reimbursed for the full charge.

Not surprisingly, mentioned in the article is one of Our Favorite ISPs, InterCage.

More here (free reg required).

Alex Eckelberry

Bizarre: Zlob guy posts on public forum

(Zlob is a fake “codec” that is a scourge on the Internet right now. There are different variants, and also some fake codecs are Trojan DNS changers. They are always marketed as “something you have to install to see a movie” or a “picture”. I’m not sure which variant is being referred to here, but the post is quite interesting.)

Making Only Teh BEst Softwares on internets:

Hello Mark
My name in Anthony and I am project manager for the team, who created this software.
First of all, noone is hiding. That’s why I am here. I will be glad to explain everything and make some changes to our software.
Lets start with EULA. Ok, we will modify it and provide clear and detailed disclosure about what software does and how to uninstall it. Then, we will modify the uninstaller and make it much simpler and easier. Everything will be removable from Add/Remove Programs in Windows.
As for multiple domain names, believe me, we do not own ALL of domain names listed in this topic. They are usually associated with us by mistake. Yes, we do change our links, but this is something we have to do. There are multiple reasons for that. As an example, I can say that sometimes our adware products are used by our affiliates in unfair tactics such as exploits and stuff. We strongly prohibit this and we block any webmaster’s account found breaking our rules. However we can not predict everything and sometimes we have to deal with dumb webmasters that simply cause us some troubles. That is why we have to change our domains and kill old ones with traffic on them, and believe me, this is not something we like to do. Same thing about modifying files. We have to do this for multiple reasons too.
I will ask our team webmaster to create a website with information about our product and we will use that name.

Hope this helps.
I will update you in 1-2 days about changes made.

Thanks for your attention.

Link here. Full forum discussion here.

Alex Eckelberry
(Thanks Suzi and Mark)

Update: Francesco points out to me that it’s not the first time a zlob person has posted. Link here.

Update #2: I got the following message from a Castlecops member: “From what I understand it is the developer of Video Activex Access/Object, and not connected with the fakecodec/dnschanger people or the KLIK gang (newmediacodec).”

CounterSpy special offer now only available on Second Life

$9.95 Crazy Eddie deal now only Second Life.

Corporate spiel:

Sunbelt Software, a leading provider of Windows security software, today announced that its aggressive competitive upgrade program to CounterSpy™ is now available exclusively to Second Life residents via the Sunbelt Software Island in Second Life. The upgrade program is offered to existing users of popular free antispyware tools, including SpyBot Search and Destroy, Lavasoft Ad-Aware, and Microsoft Windows Defender in an effort to encourage PC users to bolster their desktop security against more complex and malicious spyware threats.

More here.

Alex Eckelberry

Simple Google searches lead to more hacking

As we’ve blogged about before, there are quite a few .edu sites that have been hacked to serve spyware or porn.

And it’s pretty easy to find: Just use Google.

For example, the search term “f—-d hardcore site:edu” (I’ve removed the offensive language) brings back over 100,000 search results. Many have hardcore porn in them. Many have already been cleaned. And many, of course, are legitimate university web page.

But check out the search results in this image (the content is highly offensive so I’ve thumbnailed it if you choose not to expand the image):

Google123888123888

It’s all over the place. Christian Witness Theological Seminary has a redirect to a page which tries to install a fake codec (malware) from freerealitympegs(dot)com:

23488888888

UC Davis has a redirect to the site findadult(dot)net (similar to Adult Friend Finder).

MIT has a redirect to porn, which on exit, tries to push Contravirus:

213488812388888

Cal State San Bernardino has a site which redirects to “teen movie galleries”, which on exit, tries to push MalwareAlarm.

Virginia Tech has several pages that redirect to “ebony porn”.

You get the picture. The list goes on and on and on. Lots of attempts to install spyware (through fake codecs) and rogue antispyware products. And lots of other nasty stuff.

And it’s not just universities. You can try the same search term, with “site:gov”. You only get a couple of hits, but check out this from Sandia National Labs (warning, offensive content):

Sandia123898812312388

Click on one of those links, and you get an attempt to install a fake codec from free3xmovies(dot)com.

And the city of Dinuba, California, redirecting to an attempt to install a fake codec from freerealitympegs(dot)com (warning, offensive content):

Din124328823488188

How does this happen? It’s probably all over the place: Poorly maintained content management systems. Poorly maintained LAMP stacks. Wikis and tikis. One article to read is here.

It’s why patching and good security practices are so critical. People talk about patching Microsoft apps. Yes, that’s vital. But open source software needs to be kept updated as well.

As one security researcher mentioned to me in an email:

One problem with the edu sites is they have web applications that faculty and students use to create websites, upload content, etc. The students and faculty graduate or move on, but the stuff stays on the servers for a long time, years in some cases. Then the php apps and other server side apps become outdated and the vulnerabilities are never patched — perfect opening for hackers.

And they have forums/guestbooks etc. that are abandoned and spammed to death, or hacked. The stuff stays up forever.

I talked to one guy (by email) at a small private edu in upstate NY — he was the webmaster, professor of computer science, & head of IT. It was evident he had no clue of the state of the internet (exploits, hackers, crimeware, etc.) He seemed to think the internet was still like it was in the mid 90’s. His own site had some web apps that had been hacked. He knew there was a problem, but he had no clue why. Really sad and depressing, especially since he is teaching computer science!! I sent him some links — I hope he read them.

So there you have it: Google as a poor-man’s security scanner, which an IT administrator might use to see what might be missed in his/her own network — simply by regularly doing Google searches on their site with a few keywords. If one wants to get fancy, one can also use Yahoo Web Services APIs or Google APIs for fancy queries. It’s kind of a “jury rig” security but what the heck, it’s one more tool to use.

Alex Eckelberry

More hacked university sites… this is getting old

Last week, I blogged about a massive hacking spree at the University of Maryland (now apparently all clean).  [Nope:  Still looks like they’re up spawning spyware, but we’re still checking.]

Today, we see more evidence of hacking.  Long Island University, Ohio State, Carnegie Mellon, Conservatorio de Música de Puerto Rico and Virginia Intermont College. 

Don’t go to these links — they are not safe. (Note: Sesso is Italian for “sex”. These are Italian porn sites serving spyware.)

139889999999er9999

212388888888888888ac234

328888wf8213888881233

412388812388888f884

51348888123123888

Many have been cleaned.  But Carnegie Mellon and Virginia Intermont College are still live with malware as this goes to press. 

And it’s not only educational institutions.  We also see that the World Health Organization has a hacked page showing porn:

Who12309899999


Alex Eckelberry
(Credit to Sunbelt researcher Francesco)

Update/Clarification: These are not all the same malware.  World Health Organization redirects to a porn site, which doesn’t show any exploit right now, only porn links with adultfriendfinder ads, but it might be a rotational page and it’s obviously a hack.  The hack on Carnegie Mellon is Gromozon: it redirects to a site which has an encrypted script that requires an Italian IP to view, and attempts to download malware, including a fake Zlob codec. The Vermont Intermont hack is apparently from the CallSolutions gang, using the exploit and malware distribution kit mpack

Malware spawned through hundreds of AOL sites, others

See this screenshot of a web page? You wouldn’t want to click on “Continue”, because you’ll get the opportunity to install a nasty piece of spyware, the zlob fake codec.

Fakezlob1238888

Unfortunately, this codec is being hosted on over 450 free AOL accounts. But it’s not just AOL — as you can see from this list of infection sites, there’s quite a few others in there as well.

These sites are designed to work off of typos. You input a typo, and the search link shows up.

For example, typing in cadicallic” on Live brings up the following results:

Searchresults12399999

Alex Eckelberry
(Credit to security research Brian Porter)

Sunbelt Weekly TechTips #52: How To’s

Keep computer users from running Windows Messenger in XP or Vista
Do you have a computer that you share with others (for example, your children) and don’t want them to be able to use Windows Messenger? There are third party programs you can buy to control the running of certain programs, but there’s an easier and cheaper way to disable Messenger in XP or Vista, using Group Policy.

  1. Log on as an administrator.
  2. Click Start | Run.
  3. In the Run box, type gpedit.msc to open the Group Policy editor. In Vista, you will be prompted to continue. Click the Continue button.
  4. In the left pane, under Local Computer Policy | Computer Configuration, expand Administrative Templates and then Windows Components.
  5. Double click Windows Messenger.
  6. In the right pane, double click the policy “Do not allow Windows Messenger to be run.”
  7. Click the Enabled option.

Note that Remote Assistance will not be able to use Windows Messenger when you disable it this way.

Security at Home
If you find that most of the computer security information you find on the web seems to be focused on businesses, visit Microsoft’s Security at Home web site for articles and tips aimed at home computer users, including ways to protect children from the dangers of social networking web sites, how to create stronger passwords, and how to use controls built into Vista, Xbox and other products to control kids’ Internet use. Check back often for new information.

What’s going on with my Vista display?
QUESTION: I’ve upgraded to Vista Ultimate and I love it – BUT … sometimes after the computer has been running for a long time, I suddenly start having weird display problems, where parts of the screen go black or become transparent or the toolbar disappears or moves to a different location. Not good! Can you help? – Jon. J.

ANSWER: If it’s any consolation, you’re not the only one who’s had this problem. Logging off and logging back on should stop the bad behavior (for a while, at least), or you can stop and restart Windows Explorer. Here’s how:

  1. Press CTRL+ALT+DEL and select Task Manager.
  2. Click the Processes tab.
  3. Click explorer.exe to select it and click End Process, then confirm.
  4. Click the Applications tab.
  5. Click New Task and type explorer.exe in the Open box.
  6. Click OK to restart Explorer.

This can get old, though. There is an update you can download that should solve the problem.

Deb Shinder

Sunbelt Weekly TechTips #52: Configuration and Troubleshooting

How to edit the Boot.ini file in XP
You can manually edit the boot.ini file which contains information controlling the XP boot menu. This is especially helpful if you have a dual or multi-boot configuration or if you have old operating system versions that you no longer use and want to remove from the boot menu. For instructions on how to do it, see KB article 289022.

IE stops working when you click a web site link on XP SP2 or Vista
If you’ve installed certain security updates on your computer running XP with Service Pack 2, Vista or Server 2003, you may find that subsequently you get a hang up (non-response) when you click links on a web site. Even worse, you might hear a continuous clicking sound. What’s up with that? Well, you can fix it by installing the latest cumulative security update for IE, or with a hot fix that’s available to correct the problem. To learn more, see KB article 928387.

Vista stops responding when you transfer a file
If you try to transfer a file between your Vista machine and a file server that’s running an older version of Windows, Vista might hang up. It happens because the SMB 1.0 protocol is being used and the network connection is temporarily lost. There’s a hotfix available to address this problem. Read about how to get it in KB article 935427.

Deb Shinder

Sunbelt Weekly TechTips #52: News, Hints, Tips, Tricks & Tweaks

Windows Live Folders: coming soon to a computer near you
At this point, it’s still in private beta testing, but Microsoft’s new Windows Live service, Live Folders, is expected to be available to the public in the next couple of months. A free online file storage service, it allows you to create three types of folders: private, shared and public, on which you can set permissions for others to access them via the web. You get 500 MB of storage free, and it works with all Windows and Mac computers with recent versions of IE and Firefox. Find out more here.

Speaking of Windows Live betas
There are a whole slew of Windows Live services that are available for public beta testing now, including Windows Live services for mobile devices. Some you may not have heard of include Live Q&A, whereby you ask questions and get answers on a wide variety of topics; Live Product Search, which helps you compare products and make buying decisions; Live Academic Search, for accessing academic research; and Live Alerts, which notifies you of news stories, sports scores, stock quotes etc. that you preconfigure. You can try any or all of these, and more, by going here.

Xbox 360 warranty extended
After reports of hardware failures, Microsoft has extended the warranty on the Xbox 360 game console to three years from the purchase date. If you experience an error message accompanied by three flashing red lights, your Xbox will be repaired or replaced free of charge and if you’ve incurred repair costs for this problem before the announcement, Microsoft will reimburse you. Find out more here.

Iphone2348888888888iPhone alternatives on the way?
Last week, in my blog, I told you all the reasons why I won’t be buying an iPhone, at least not until a few important missing features, like over-the-air Exchange support, faster network support and a user-removable battery, make it into a future version. Some research in the meantime has turn up some potential alternatives with some of the iPhone’s design features for those of us who prefer to use Windows Mobile 6. One contender is LG’s KS20, a model that’s been the subject of rumors for several months now. You can see its resemblance to the iPhone here.

Meanwhile, another Windows Mobile phone with an iPhoneish look is the HTC Touch, which you can see here.

What’s your favorite alternative to the iPhone? Let us know.

Tiny TV episodes save time
With today’s DVR technology, some of us are already doing it ourselves – fast forwarding through the commercials and sometimes through the less exciting parts of the program, too, so we can get the gist of the story without spending an entire hour watching. After all, in today’s fast paced world, who has the time? I admit to watching some of my favorite half-hour HGTV shows in 15 minutes or less, speeding through the demolition to see the final results. Now you can see classic programs in an even more abbreviated format on the Minisode Network. Read more here.

New version of Movie Maker on Vista
Vista includes a new version of Windows Movie Maker (v. 6) that has some cool improvements. If you’ve used the XP Movie Maker, one enhancement you’ll appreciate is no longer being limited to a 320×240 preview. Another great new feature in Vista is the ability to publish Movie Maker projects directly to DVD with Windows DVD Maker. And if you’re a Windows Media Center fan, you’ll be glad to know that Movie Maker now supports the DVR-MS format that Media Center uses to record TV programs. You can edit out the commercials and/or save the program in WMV format to make a much smaller file, which is especially handy if you want to, for instance, store the program on an SD card and play it on your Pocket PC (note that you can’t edit programs that use Broadcast Flag, such as HBO and Cinemax programming). For more about Vista Movie Maker and to see a screenshot of the interface, see my blog post titled Making Movies with Vista published July 4th.

Deb Shinder