Saturday, November 6, 2010

Yet another Facebook worm going around!

Another Facebook worm has been found floating around the Facebook community. The worm propagates through Facebook Instant Messenger. The worm sends an instant message with that says "Is this you" along with a link to the malicious Facebook App. The link takes you...
to a site which will ask you for your Facebook username and password in order for you to view the locked content. Here is a screenshot of that "FAKE" login page:


Many people have already been a victim to this worm. Make sure when you login to Facebook, you never click a link that is sent to you, especially when it ask for your username and password.

Read more...

Monday, October 18, 2010

Infecting myself with a basic undetectable trojan virus & manually removing it

In this video I infect myself with a basic trojan virus, show some of its features and then show how to manually remove it.

 This trojan is NOT public.  Watch it in HD!









Read more...

MPX Backup v1.0 Released - FREE no install backup program

MPX Backup v1.0 has been released.
This tool requires no installation and is great for backing up to a flash drive.  It is very basic and does not need much user input, just place the program
where you want your backup stored and run the program and select what you want, it will do the rest. Give it a try, its FREE!!!

Download Now

Read more...

Saturday, October 9, 2010

Email Spreading Worm 10-9-2010 to.php BE VERY CAREFUL

There is a bad worm going around right now.  Once you are infected with it, it will grab all of your contacts and send them an email with a link inside to an infected web server with a php exploit. This link, from what I have seen, has always been to a page called "to.php" on a random web server.

Example Email:
http://ta******.com/to.php
Best regards, ali*********@live.com

Remember, never click on random websites whether you know who it is from or not.  If you do not know the address, do not go to it.  Best advise I can give.




Read more...

Wednesday, October 6, 2010

Windows Tips & Tricks - Part 1 - Run Commands

In this video I will show you just a few of the available commands that can be used with the run function.





Here are the commands I used:

appwiz.cpl - Installed Programs
desk.cpl - Display Settings
firewall.cpl - Firewall Configuration
inetcpl.cpl - Internet Options
joy.cpl - Game Controllers
main.cpl - Mouse Properties
powercfg.cpl - Power Options
sysdm.cpl - System Properties
timedate.cpl - Date & Time config

Read more...

New Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Remote Code Execution Discovered Sept. 14, 2010

Description:
The most severe of these vulnerabilities could allow remote code execution if a client sends a specially crafted HTTP request to the server. An attacker who successfully exploited this vulnerability could take complete control of an affected system.


Solution:
Click here to check your Windows for updates.


A list of affected operating systems can be found here:
http://www.microsoft.com/technet/security/bulletin/MS10-065.mspx




Read more...

New Vulnerability in MPEG-4 Codec Could Allow Remote Code Execution Discovered Sept. 14, 2010

Description:
The vulnerability could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content.


Affected Operating Systems:
  • Windows XP
  • Windows Server 2003
  • Windows Vista
  • Windows Server 2008
Windows 7 is NOT affected!


Solution:
Click here to check your Windows for updates.


More info:
http://www.microsoft.com/technet/security/Bulletin/ms10-062.mspx
Read more...

New Print Spooler Service Vulnerability Could Allow Remote Code Execution Sept. 15, 2010

This is a critical vulnerability in the Windows Print Spooler service which allows attackers to gain remote control of the affected computer.

Affected Operating Systems:

  • Windows XP
  • Windows Server 2003
  • Windows Vista
  • Windows Server 2008
  • Windows 7


Solution:
Click here to check your windows for updates.


More Info:




Read more...

New Adobe Flash Player / AIR Code Execution Vulnerability Discovered Sept. 15, 2010

A vulnerability has been discovered in Adobe Flash Player and Adobe AIR, which can be exploited by malicious people to compromise a user's system. This vulnerability could cause a crash and potentially allow an attacker to take control of the affected system.

The vulnerability is reported in the following products:

  • Adobe Flash Player 10.1.82.76 (confirmed) and prior.
  • Adobe Flash Player 9.x
  • Adobe AIR 2.0.3 and prior.


Solution:
Click here to update your Adobe Flash Player / Air.

More info:
http://www.adobe.com/support/security/advisories/apsa10-03.html
Read more...

New Office Outlook Vulnerability Discovered Sept. 15, 2010

New Reported Vulnerability in Microsoft Outlook Could Allow Remote Code Execution!
It is a critical vulnerability in Office Outlook, which allows users to gain remote control of the affected computer.

Operating Systems Affected:
Microsoft Office XP Service Pack 3
Microsoft Office 2003 Service Pack 3
Microsoft Office 2007 Service Pack 2

Solution:
Click here to check your windows for updates.

More info:





Read more...

Thursday, September 30, 2010

SOLVED!!! Error 25007.Error occurred while initializing fusion. Setup could not load fusion with LoadLibraryShim().

.NET Framework 2.0 error.
Error 25007.Error occurred while initializing fusion. Setup could not load fusion with LoadLibraryShim().

I came across this error the other day while at work. The computer in question had been getting errors about .net crashing when opening a certain web based application.  I tried reinstalling .NET framework 2.0 to no avail. The computer would get the dreadful "Error 25007.Error occurred while initializing fusion. Setup could not load fusion with LoadLibraryShim()" message.

I did some research online using google, some of the things I found told me to delete my "winsxs\policies" folder or try renaming or deleting anything that has the file name x86_Microsoft.VC80.CRT_1fc8b3b9********** inside the "C:\windows\winsxs" folder or just try a complete manual uninstall of .NET framework 2.0. Yadda yadda yadda.

I proceeded to try out all of these ideas with no success.  :(

At this point, I had .net 2.0 removed completely with no trace of it anywhere. While manually removing .NET 2.0, I noticed that .NET 3.5 was not installed anymore which it had been before all the errors started, and that .NET 4.0 WAS installed still.  I then went to add/remove programs and saw that .NET 3.5 was still showing installed, along with .NET 4.0.  I tried removing 3.5 but it gave me errors saying that it was not installed. I then tried removing .NET 4.0 which uninstalled just fine.

After all this, I decided to go and try the .NET 2.0 install again. I was amazed when the installer did not error out... the whole problem was due to .NET 4.0 being installed, once that was gone... .NET 2.0, 3.5 and 4.0 all reinstalled flawlessly.

The manual uninstall of .NET framework 2.0 can be found here:
http://support.microsoft.com/kb/908077/en-us?spid=8291&sid=global

If you found this usefull...
Please visit and support this blog: http://lovingmotherearth.blogspot.com

Check it out:


Read more...