tag:blogger.com,1999:blog-89765719748357258012024-03-14T02:13:55.935-07:00Information Services ConfidentialLet me share my experiences in the field with you and my passion for great running business systems.Walter Taucher - Corporate Computer, Inc.http://www.blogger.com/profile/00655925772717118653noreply@blogger.comBlogger15125tag:blogger.com,1999:blog-8976571974835725801.post-5080506312111199072012-04-30T16:37:00.001-07:002012-04-30T16:37:31.973-07:00S.M.A.R.T Virus ( Aleuron.E ) hides in a Hidden Partition<div class="MsoNormal" style="line-height: normal; margin: 0in 0in 6pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12pt; mso-fareast-font-family: "Times New Roman";">Last week a client had gotten the virus that make it appear that
you are having hd disk failures (SMART HDD failure) Normally removal of this
virus has been simple and well documented as found at reputable websites such
as <a href="http://www.bleepingcomputer.com/virus-removal/remove-smart-hdd" target="_blank"><span style="color: blue;">here</span></a> . And as such, I had
removed the virus for the client successfully, or so I thought. a few hours later, he calls me and tells me that is antivirus program, Microsoft Security
Essentials is popping up and capturing the “Aleuron.E “ virus and every time he
clicks remove,<span style="mso-spacerun: yes;"> </span>it pops backup within
seconds with the same virus. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0in 0in 6pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12pt; mso-fareast-font-family: "Times New Roman";"><o:p> </o:p></span><span style="font-family: "Times New Roman","serif"; font-size: 12pt; mso-fareast-font-family: "Times New Roman";">Later that day he drops by with the pc in hand and figure it
cannot be that hard, I will simply remove the virus with a root kit
remover.<span style="mso-spacerun: yes;"> </span><o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0in 0in 6pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12pt; mso-fareast-font-family: "Times New Roman";">I proceeded to run the normal tools that I have linked on my
site <a href="http://www.cci.net/support"><span style="color: blue;">www.cci.net/support</span></a><span style="mso-spacerun: yes;"> </span>I first tried TDSSKILLER,<span style="mso-spacerun: yes;"> </span>the amazing and <span style="mso-spacerun: yes;"> </span>reliable tool and this time finds no root kit,<span style="mso-spacerun: yes;"> </span>then I went to McAfee and gave STINGER a try
as I had an occurrence where it found root kit when TDSSKILLER did not,<span style="mso-spacerun: yes;"> </span>still nothing was found.<span style="mso-spacerun: yes;"> </span>Hmm I then went thru all the tools, Norton
Security sweep, Microsoft Scanner, and lastly COMBOFIX.<span style="mso-spacerun: yes;"> </span>But, no positive results,<span style="mso-spacerun: yes;"> </span>Microsoft AV is still popping up with the "Aleuron.E
" virus warning<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0in 0in 6pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12pt; mso-fareast-font-family: "Times New Roman";">So, then I got out the Windows Xp cdrom and booted from it
and ran FIXMBR hoping that I can rewrite the master boot record to overwrite
the virus, but after the restart, it was still there.<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0in 0in 6pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12pt; mso-fareast-font-family: "Times New Roman";">Finally, I brought up the “Disk Manager” in Windows and
noticed an “unused” partition at the very end of Drive C.<span style="mso-spacerun: yes;"> </span>It was very small, well under 100mb and did
not seem to be formatted or have a drive letter associated with it.<span style="mso-spacerun: yes;"> </span>But this is where the virus lived.<span style="mso-spacerun: yes;"> </span>I highlighted the partition and deleted
it.<span style="mso-spacerun: yes;"> </span>Rebooted the pc, did a final
sweep with my virus scanner tools and verified that it was CLEAN.<span style="mso-spacerun: yes;"> </span><o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0in 0in 6pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12pt; mso-fareast-font-family: "Times New Roman";">We can expect to see more viruses using this technique.<span style="mso-spacerun: yes;"> </span><o:p></o:p></span></div>
<div class="MsoNormal" style="margin: 0in 0in 10pt;">
<br /></div>Walter Taucher - Corporate Computer, Inc.http://www.blogger.com/profile/00655925772717118653noreply@blogger.com0tag:blogger.com,1999:blog-8976571974835725801.post-8397204059002370212009-12-02T09:24:00.000-08:002009-12-02T09:24:37.077-08:00Spam Confidential 12-10-2009<span style="color: red;"></span> <div align="center"><br />
</div><div style="text-align: center;"><span style="color: red;"><strong><a href="http://en.wikipedia.org/wiki/Phishing">PHISHING ALERT</a></strong></span><br />
</div><div style="text-align: center;"><span style="color: #cc0000;">link contains http://online.cdc.gov.yttt4l.co.im/h1n1..... Notice that the link has cdc.gov in the link but it continues to yttt41.co.im ( co.im is for domains in the Isle of Man) If it were to really to go cdc.gov you would see something more like http://online.cdc.gov/index.html</span> <br />
</div><br />
<br />
<br />
-----Original Message-----<br />
<br />
From: Centers for Disease Control and Prevention [mailto:cdc-message-id:46024med@cdcmails.gov] <br />
<br />
Sent: Tuesday, December 01, 2009 6:59 AM<br />
<br />
To: <br />
<br />
Subject: Governmental registration program on the H1N1 vaccination<br />
<br />
<br />
<br />
You have received this e-mail because of the launching of State Vaccination H1N1 Program.<br />
<br />
You need to create your personal H1N1 (swine flu) Vaccination Profile on the cdc.gov website. The Vaccination is not obligatory, but every person that has reached the age of 18 has to have his personal Vaccination Profile on the cdc.gov site. This profile has to be created both for the vaccinated people and the not-vaccinated ones. This profile is used for the registering system of vaccinated and not-vaccinated people.<br />
<br />
Create your Personal H1N1 Vaccination Profile using the link:<br />
<br />
Create Personal Profile <strong><em><span style="color: red;">link contains <a href="http://online.cdc.gov.yttt4l.co.im/h1n1">http://online.cdc.gov.yttt4l.co.im/h1n1</a>..... Notice that the link has cdc.gov in the link but it continues to yttt41.co.im ( co.im is for domains in the Isle of Man) If it were to really to go cdc.gov you would see something more like <a href="http://online.cdc.gov/index.html">http://online.cdc.gov/index.html</a> </span></em></strong><br />
<br />
<br />
________________________________________<br />
<br />
Centers for Disease Control and Prevention (CDC) • 1600 Clifton Rd • Atlanta GA 30333 • 800-CDC-INFO (800-232-4636)Walter Taucher - Corporate Computer, Inc.http://www.blogger.com/profile/00655925772717118653noreply@blogger.com0tag:blogger.com,1999:blog-8976571974835725801.post-39696938940150241842009-10-24T17:44:00.000-07:002009-10-28T10:07:11.405-07:00Rsync With Delta Copy.In my earlier articles I talked about the need to have backups of your valuable information. One very popular method is to synchronize your data to a computer at a remote location. You can subscribe to a remote data replication/backup service like Carbonite.com or if like many who already have access to a second computer in your home or business, you can do the same yourself for free. I will show you <a href="http://www.cci.net/blog/ccigoogle/RsyncDeltacopy/Deltacopy.htm">how to setup such a service “Rsync” using the open source (free) Delta Copy software.</a>Walter Taucher - Corporate Computer, Inc.http://www.blogger.com/profile/00655925772717118653noreply@blogger.com2tag:blogger.com,1999:blog-8976571974835725801.post-86121905312632615422009-09-29T22:41:00.000-07:002009-09-29T22:41:54.993-07:00Lean and Mean, Microsoft Security Essentials Just releasedLean and Mean, Microsoft has just released to the public a great free and effective antivirus / anti=malware solution for your Windows Xp - Vista and Windows 7 computer. Download from the <a href="http://www.microsoft.com/security_essentials/">Microsoft Security Essentials Website</a> If you have doubts please check out this first look article from <a href="http://arstechnica.com/microsoft/news/2009/09/first-look-microsoft-security-essentials-impresses.ars">Ars Technica</a>Walter Taucher - Corporate Computer, Inc.http://www.blogger.com/profile/00655925772717118653noreply@blogger.com0tag:blogger.com,1999:blog-8976571974835725801.post-57861073658574119742009-06-23T17:38:00.000-07:002009-06-23T17:56:36.261-07:00it's finally here - Free ANTIVIRUS protection from MicrosoftFrom Microsoft and it is FREE!!! This is what many have been waiting for and those that have installed it are impressed.<br /><br />Here is a review from the computer trade publication <a href="http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9134682&source=CTWNLE_nlt_pm_2009-06-23">Computer World</a> It is lightweight , uses less horsepower to run and promises to be excellent. Now there is no excuse for not having AV loaded on your system. Did I mention FREE???<br /><br />Here is the catch,, the free beta is limited to a set number. <a href="http://www.microsoft.com/security_essentials/">Get it here</a>Walter Taucher - Corporate Computer, Inc.http://www.blogger.com/profile/00655925772717118653noreply@blogger.com1tag:blogger.com,1999:blog-8976571974835725801.post-26675527081772517062009-04-03T15:40:00.001-07:002009-04-03T15:42:52.817-07:00Conficker test<p>Using basic knowledge of the blacklisting that Conficker employs to avoid attempting to infect IPs that belong to popular Anti-Virus and security firms (including Microsoft), the Conficker Working Group whipped up this very simple test to see if you can load content from the various pages. If you can see all of the images, you're more than likely Conficker-free.<br /><a href="http://www.confickerworkinggroup.org/infection_test/cfeyechart.html">CONFICKER -- Check to see if you are infected</a></p><p>Thanks to<br />Joe Stewart from the Conficker Working Group<br /><a href="http://www.confickerworkinggroup.org/">http://www.confickerworkinggroup.org/</a></p><p></p>Walter Taucher - Corporate Computer, Inc.http://www.blogger.com/profile/00655925772717118653noreply@blogger.com0tag:blogger.com,1999:blog-8976571974835725801.post-43104539434460109042009-03-20T10:58:00.000-07:002009-03-21T13:58:58.921-07:00Anatomy of a hoax virus warning email<p><br />key words to look for in emails that tell you to panic<br /><strong></strong></p><p><strong>I checked with Norton Anti-Virus, and they are gearing up for this virus!<br /></strong><span style="color:#ff0000;">Hoax like wording because:</span> Norton / Microsoft,/ CNN /etc do not gear up for viruses and assure ably if you call Norton, Microsoft, etc you will not get anyone to make a public statement such as this </p><p><br /><strong>I checked Snopes (URL above:), and it is for real!!<br /></strong><span style="color:#ff0000;">Hoax like wording because: </span>the letter writer knows that most will never check with snopes for if they did, they would have found it to be a hoax or not listed. </p><p><br /><strong>Get this E-mail message sent around to your contacts ASAP.<br /></strong><span style="color:#ff0000;">Hoax like wording because: </span>yes, that is the purpose of the email. to see it cause panic<br /></p><p><strong>PLEASE FORWARD THIS WARNING AMONG FRIENDS, FAMILY AND CONTACTS!<br /></strong><span style="color:#cc0000;">Hoax like wording because:</span> please send it to everyone</p><p><br /><strong>You should be alert during the next few days. Do not open any message with an attachment entitled 'POSTCARD FROM HALLMARK,' regardless of who sent it to you. It is a virus which opens A POSTCARD IMAGE, which 'burns' thewhole hard disc C of your computer.<br /></strong><span style="color:#ff0000;">Hoax like wording because: </span>viruses today do not destroy equipment, viruses are used today to steal your identity and control your computer, The last thing that they want to do is destroy your hardware for that would prevent them from using you for thier deeds<br /></p><p><strong>This virus will be received from someone who has your e-mail address in his/her contact list. This is the reason why you need to send this e-mail to all your contacts It is better to receive this message 25 times than to receive the virus and open it.<br /></strong><span style="color:#ff0000;">Hoax like wording because: </span>yes please don't annoy them once. send them the same hoax every day if you can<br /></p><p><strong>If you receive a mail called' POSTCARD,' even though sent to you by a friend, do not open it! Shut down your computer immediately .<br /></strong><span style="color:#ff0000;">Hoax like wording because: </span>even better, shut down your pc when you receive mail, any email, ( except from me of course)<br /><br /><strong>This is the worst virus announced by CNN. It has been classified by Microsoft as the most destructive virus ever. This virus was discovered recently by McAfee, and there is no repair yet for this kind of virus. This virus simply destroys the Zero Sector of the Hard Disc, where the vital information is kept.</strong><br /><span style="color:#ff0000;">Hoax like wording because: </span>According to John Stewart of Comedy Central Daily Show, Cable News like CNN and CNBC cannot even keep track of financial news properly, now you think they would be in the Virus news space? In fact, MSFT, CNN, McAfee would never make a press release such as this, and if they did, you would not need the email.</p><p><strong>COPY THIS E-MAIL, AND SEND IT TO YOUR FRIENDS. REMEMBER: IF YOU SEND IT TO THEM, YOU WILL BENEFIT ALL OF US.</strong><br /><span style="color:#ff0000;">Hoax like wording because: </span>how many times does this email remind us to send it to everyone? hmmm.....<br /></p>Walter Taucher - Corporate Computer, Inc.http://www.blogger.com/profile/00655925772717118653noreply@blogger.com1tag:blogger.com,1999:blog-8976571974835725801.post-34597496101647793052009-03-15T20:29:00.000-07:002009-03-15T20:37:27.898-07:00for personal users , consider online backupsA buddy was telling me about this great service that he was using <a href="http://mozy.com/">http://mozy.com/</a> for a backup services. Since he really does care about his data, has 100s of <span id="SPELLING_ERROR_0" class="blsp-spelling-corrected">GB</span> of pictures, music and audio books., <span id="SPELLING_ERROR_1" class="blsp-spelling-corrected">keeping</span> his data safe and protected from <span id="SPELLING_ERROR_2" class="blsp-spelling-corrected">burglaries</span>, hardware disasters etc were very important to him, Plus he is as cheap as I am about spending money so i perked up when he found a great deal, <span id="SPELLING_ERROR_3" class="blsp-spelling-error">Mozy</span> is only $5.00 per month and provides unlimited storage and works with both Macs and Windows . Another great alternative to consider. cheers...<span id="SPELLING_ERROR_4" class="blsp-spelling-error">walter</span>Walter Taucher - Corporate Computer, Inc.http://www.blogger.com/profile/00655925772717118653noreply@blogger.com1tag:blogger.com,1999:blog-8976571974835725801.post-33702692857212736442009-03-09T18:46:00.000-07:002009-03-09T19:23:17.077-07:00Managers can be so pragmaticLike many others companies this particular client has over a terabyte of storage spread out over several servers. Many of the files are old and obsolete but for legal reasons, they have to be kept. So today the office manager called me and during the <span id="SPELLING_ERROR_0" class="blsp-spelling-corrected">discussion</span> on data sprawl she noted that since <span id="SPELLING_ERROR_1" class="blsp-spelling-error">USB </span>external drives are so inexpensive, why not do a backup of the files to tape archive and then move the files off the server on to a <span id="SPELLING_ERROR_2" class="blsp-spelling-error">USB external </span>drive and store the drive as a convenient archive? Considering the time and resources to backup seldom used data, moving to an extermal hd to be stored away is a great solution that we can all use.Walter Taucher - Corporate Computer, Inc.http://www.blogger.com/profile/00655925772717118653noreply@blogger.com0tag:blogger.com,1999:blog-8976571974835725801.post-20537018166834248612009-02-26T09:04:00.001-08:002009-02-26T09:13:29.763-08:00LoJack your Laptop for freeOne of the concerns that you should have with your mobile users is theft, and not your employees stealing but someone stealing your employee's laptop and with it, your <span id="SPELLING_ERROR_0" class="blsp-spelling-corrected">companies</span> secrets. One such product that we utilize at <span id="SPELLING_ERROR_1" class="blsp-spelling-error">CCI</span> is a free software that allows you to track the location of your <span id="SPELLING_ERROR_2" class="blsp-spelling-corrected">PC</span> and if stolen, allow you to delete the data remotely.<br /><br />So, take some time and visit <a href="http://www.thelaptoplock.com/">http://www.thelaptoplock.com/</a> and give this a try.. cheers for now... <span id="SPELLING_ERROR_3" class="blsp-spelling-error">walter</span>Walter Taucher - Corporate Computer, Inc.http://www.blogger.com/profile/00655925772717118653noreply@blogger.com0tag:blogger.com,1999:blog-8976571974835725801.post-52833519520620806342009-01-18T15:49:00.000-08:002009-03-09T18:58:16.955-07:00Email SecurityJust read on <a href="http://www.digg.com/">http://www.digg.com/</a> about this sad story of <a href="http://www.windsorstar.com/Leamington+loses+Nigerian+scam/1173799/story.html?ref=canada.com">another man who lost $150k </a>to a <a href="http://en.wikipedia.org/wiki/Advance_fee_fraud">Nigerian 419 scam</a>. It reminds us that our beloved email is a tool and a big fat opportunity for danger.<br /><br />Much of last week was spent removing <a href="http://en.wikipedia.org/wiki/Trojan_horse_virus"><span id="SPELLING_ERROR_0" class="blsp-spelling-corrected">Trojan</span> horse viruses </a>and <a href="http://en.wikipedia.org/wiki/Root_kit">root kits </a>from a lot of very intelligent and Internet <span id="SPELLING_ERROR_1" class="blsp-spelling-corrected">savvy</span> individuals. There is a common thread in how they got tricked. Besides <a href="http://securitylabs.websense.com/content/Blogs/3264.aspx">Google Sponsored Malicious <span id="SPELLING_ERROR_2" class="blsp-spelling-error">WebLinks</span> </a>are <a href="http://www.google.com/alerts">Google Alert emails </a>and CCNAlerts etc, with <a href="http://www.google.com/search?q=Google+Alert+emails+with+malicous+links.&rls=com.microsoft:en-us&ie=UTF-8&oe=UTF-8&startIndex=&startPage=1"><span id="SPELLING_ERROR_3" class="blsp-spelling-corrected">malicious</span> links</a>. They link may take you to a fake YouTube.com website , Facebook.com or other known site and a pop up warns of spyware or virus or to update Quicktime, Flash or other program.<br /><br />If you find yourself going to a website from a weblink on a webpage or email and you get a popup to download a update from any website, the safe thing is to CTRL+F4 (hold the control key press the F4 key) to close the popup and do the same to close the webpage. If you still want to download a flash or quick time upgrade, then go the <a href="http://www.adobe.com/">http://www.adobe.com/</a> or <a href="http://www.apple.com/">http://www.apple.com/</a> and update your program from the publisher of the application, not from a website that is not the creator of the program.<br /><br />Good luck and be safe..<br />and you may enjoy this story from the <a href="http://garwarner.blogspot.com/2008/08/msnbc-breaking-news-joins-spam-news.html">Cybercrime and Doing Time </a>blog.Walter Taucher - Corporate Computer, Inc.http://www.blogger.com/profile/00655925772717118653noreply@blogger.com0tag:blogger.com,1999:blog-8976571974835725801.post-18923956417491127762009-01-11T22:28:00.000-08:002009-03-09T19:30:17.347-07:00Why is data backup so hardLets talk about disk to disk backup strategies. Let me share with you the method we use at Corporate Computer, Inc. We use NT backup on a daily schedule to backup to a file our network connected <a href="http://www.infoworld.com/article/06/09/18/38TCstorage_1.html">HP <span id="SPELLING_ERROR_0" class="blsp-spelling-error">AIO</span> 600 <span id="SPELLING_ERROR_1" class="blsp-spelling-error">ISCSI</span> Storage server </a>We installed a <a href="http://h10010.www1.hp.com/wwpc/us/en/en/WF05a/12169-304612-3446236-3446236-3446236-3239093.html">HP <span id="SPELLING_ERROR_2" class="blsp-spelling-error">Ultrium</span> 920 800<span id="SPELLING_ERROR_3" class="blsp-spelling-error">gb</span> tape drive </a>on the same storage server.<br /><br />Every night each file server using NT Backup sends its backup file to the storage server. By the early am, every file server has sent the backup to the hard disk on the storage server. Then in the early am, the storage server sends all the backup files that are stored on the hard disk to the <span id="SPELLING_ERROR_4" class="blsp-spelling-error">Ultrium</span> tape drive. Our tape drive is large <span id="SPELLING_ERROR_5" class="blsp-spelling-corrected">enough</span> to store all the files on a single tape. The tape then gets stored off site as an archive. A system such as ours can cost a company <span id="SPELLING_ERROR_6" class="blsp-spelling-corrected">approximately</span> $15,000 but the ease and reliability of keeping sound backups can be your least expensive insurance from disasters.Walter Taucher - Corporate Computer, Inc.http://www.blogger.com/profile/00655925772717118653noreply@blogger.com0tag:blogger.com,1999:blog-8976571974835725801.post-35804290888395107842009-01-05T13:51:00.000-08:002009-01-05T13:55:01.751-08:00Backup your PC -- continuedWhile on the topic of backups, if you store information on your pc, esp in "My Document" consider buying a inexpensive USB hard disk to backup your data to. Download Microsoft's easy to use utility <a href="http://www.microsoft.com/downloads/details.aspx?familyid=C26EFA36-98E0-4EE9-A7C5-98D0592D8C52&displaylang=en">SyncToy </a>. Detail from Microsoft's website..<br /><br />OverviewSyncToy 2.0 for Windows is available as a free download from the Microsoft Download Center. The easy to use, customizable application helps you copy, move, rename, and delete files between folders and computers. There are files from all kinds of sources that we want to store and manage. Files are created by our digital cameras, e-mail, cell phones, portable media players, camcorders, PDAs, and laptops. Increasingly, computer users are using different folders, drives, and even different computers (such as a laptop and a desktop) to store, manage, retrieve and view files. Yet managing hundreds or thousands of files is still largely a manual operation. In some cases it is necessary to regularly get copies of files from another location to add to primary location; in other cases there is a need to keep two storage locations exactly in sync. Some users manage files manually, dragging and dropping from one place to another and keeping track of whether the locations are synchronized in their heads. Other users may use two or more applications to provide this functionality.Now there is an easier way. SyncToy, a free PowerToy for Microsoft Windows, is an easy to use, highly customizable program that helps users to do the heavy lifting involved with the copying, moving, and synchronization of different directories. Most common operations can be performed with just a few clicks of the mouse, and additional customization is available without additional complexity. SyncToy can manage multiple sets of folders at the same time; it can combine files from two folders in one case, and mimic renames and deletes in another case. Unlike other applications, SyncToy actually keeps track of renames to files and will make sure those changes get carried over to the synchronized folder.Walter Taucher - Corporate Computer, Inc.http://www.blogger.com/profile/00655925772717118653noreply@blogger.com0tag:blogger.com,1999:blog-8976571974835725801.post-31676835583707619502009-01-04T21:08:00.000-08:002009-03-09T18:57:00.693-07:00Backup your data.You may have heard that disk only backups are fine. At Corporate Computer, Inc, our policy is to always have a tape archive. Disk backups tend to provide a false sense of security. Consider having a computer with a lot of hard disk space and then setup a disk to disk backup using the ntbackup program that is included with Windows. Then backup your disk backup files to tape. There are many easy to use tape backup software, one that many of our clients find easy to use is <a href="http://www.backupassist.com/">BACKUP ASSIST</a> . And don't forget to check your backup logs. Be proactive dangit!<br /><br />Consider how bad companies have been distroyed by lack of backups. The folks at <a href="http://journalspace.com/this_is_the_way_the_world_ends/not_with_a_bang_but_a_whimper.html">Journalspace.com </a>just this past month lost everything when the hard disk mirror lost the data, then replicated the corruption to the mirror disks.Walter Taucher - Corporate Computer, Inc.http://www.blogger.com/profile/00655925772717118653noreply@blogger.com0tag:blogger.com,1999:blog-8976571974835725801.post-35838782352568319452009-01-04T19:42:00.001-08:002009-01-04T20:40:18.901-08:00Welcome to Info Services ConfidentialMany of you have been thrown into the duties of supporting your companies desktops and perhaps your servers. Let me share my experiences from the field with you and hopefully you will learn many of my tricks and techniques. And, perhaps you have some experiences to share with me too.Walter Taucher - Corporate Computer, Inc.http://www.blogger.com/profile/00655925772717118653noreply@blogger.com0