Download direct : link
http://www.adrive.com/public/afdc825c1d490a02def09539c48810524cf1a02de52f59cd451198f811d37331.html
If you have doubts and queries or invalid link.. send your feedback as comments
Manual Process of removal
So let’s start the process off reclaiming the turf that virus took over from us.
I hope this information helps you win your own battle against this virus. Soon all antivirus programs will be able to automatically detect and clean this virus. Also i hope Avast finds a way to solve this issues.
As a side note i have found a little back dog( winpatrol ) that used to work perfectly on my old system. It was not their in my new PC, I have installed it again , as I want to stay ahead by forever closing the supply line of these virus. You can download it form Winpatrol website.
STEPS R AS UNDER :
1. Open Notepad
2. Type the following:
[General]
Manufacturer="your_name
[Support Information]
Line1= http://www.blogger.com
Line2= visit http://dhanabalonline.blogspot.com for more info
3. Save as "oeminfo.ini" in the System32 folder.(Without Quote)
4. Create a bmp file(Your Photo) and save it the System32folder as "oemlogo.bmp"(Without Quote).The size of the image should be within 180 (wide) x120 (high) pixels
5. Now Check your My Computer Properties.
It's tested and working
If you want to create a Logon Banner: A message box to appear below your logon on.
This small tip helps you to track your start and shutdown time:
According to this, Microsoft will stop selling the security software for personal computers and will allow users to download a free software to prevent viruses and spyware.
Microsoft intend to call this new security software Morro and it will appear in the first half of 2009, after Microsoft officially stopped providing Windows Live OneCare service to the users.
According to the statistics, Windows Live OneCare service after two years was only 2% in the security market. This is also a sign of Microsoft going down on this area compared with McAfee and Symantec.
Morro will be free to download and it is mainly for home users.
1. Nokia E71
2. Nokia E66
3. Samsung SGH-F480
4. iPhone 3G
5. Sony Ericsson C902 Cyber-shot
6. Sony Ericsson W910i Walkman
7. Nokia 6500 slide
8. Nokia 6300
9. LG Secret KF750
10. Nokia N85
When can not login Windows XP because of corrupted or missing file system, many people have to reinstall Windows. This takes time and the data may be lost.
In fact, you can fix this problem without having to reinstall Windows by following steps:
1. First, you must have a disk to installation CD of Windows and boot your computer from this CD.
2. When the Windows Installation Screen appears to welcome to the windows setup, select the line repair a windows xp installation using recovery console, (or you just press R).
3. When the notice asks you which operating system need to restore, you just choose your operating system or if you have only one operating system, just press 1 then enter.
Note: if your Windows has Administrator account has a password, you have to enter your password and then choose OK to continue.
4. Now you types these command to restore missing system files (just in the yellow box):
cd system32 | move to the directory System32 where stores Windows XP system files |
cd config | move to the directory where stores system config files |
ren system system.old | rename the file system, which stores your current config of your system files, to system.old |
copy c:\windows\repair\system | copy the original file system from directory Repair to directory System32 to restore the file system |
Encryption is possible
We can enable Disk Quotas
File compression is possible
Sparse files
Indexing Service
NTFS change journal
In FAT file system we can apply only share level security. File level protection is not possible. In NTFS we can apply both share level as well as file level security
NTFS supports large partition sizes than FAT file systems
NTFS supports long file names than FAT file systems
Possible to configure stub zones in windows 2003 DNS
Volume shadow copy services is introduced
Windows 2003 gives an option to replicate DNS data b/w all DNS servers in forest or All DNS servers in the domain.
In Windows NT only PDC is having writable copy of SAM database but the BDC is only read only database. In case of Windows 2000 both DC and ADC is having write copy of the database
Windows NT will not support FAT32 file system. Windows 2000 supports FAT32
Default authentication protocol in NT is NTLM (NT LAN manager). In windows 2000 default authentication protocol is Kerberos V5.
Windows 2000 depends and Integrated with DNS. NT user Netbios names
Active Directory can be backed up easily with System state data
There are two different protocols available to access e-mail: POP3 and IMAP. POP3 is useful when e-mail is checked from only one computer. IMAP is the better choice when you would like to check your mail from multiple computers, at work and home, for example. IMAP has the added benefit of accessing folders on the server, allowing you to organize your e-mail, and access it from anywhere. If you use Webmail, you should use IMAP on all of your e-mail clients. Use of a POP3 mail client in association with Webmail can cause errors in your inbox that will result in a temporary loss of access to your mail.
POP3 works by reviewing the inbox on the mail server, and downloading the new messages to your computer. Clients can access their inboxes. no other folders on the server can be accessed. POP3 only handles retrieval of messages from a client's inbox. When using POP3, your mail is stored on your PC.
IMAP downloads the headers of the new messages on the server, then retrieves the message you want to read when you click on it. IMAP4 can be used to access multiple mailboxes and mailbox folders, and public folders, as well. When using IMAP, the mail is stored on the mail server. Unless you copy a message to a "Local Folder" the messages are never copied to your PC.
Webmail (a.k.a. Outlook Web Access) uses HTTP/HTTPS to provide Web browser-based access to clients' inboxes, their other mail folders and to public folders.
POP3
You only check e-mail from one computer.
You want to remove your e-mail from the mail server.
IMAP
You check e-mail from multiple locations. at work and home
You use Webmail.
Tips Keep your Inbox small! This will speed up your e-mail retrieval. Checking the e-mail is directly dependent on how many e-mail messages are in your inbox on the mail server.
POP3
Set to remove mail from server after 30 days.
Don't check more frequently than every 15 minutes.
75 MB is the maximum for POP3 users. POP'ing large mail boxes consumes excessive server resources.
IMAP
Do NOT check all folders for new messages! This slows your e-mail substantially.
Use "mail/" ( without the quotes ) as your IMAP folder directory.
You can set your client to download the mail and to remove the mail from the server, like a POP3 client.
Organize your mail into folders, and archive your older messages. This speeds e-mail retrieval by minimizing the number of messages in the inbox.
POP3 | IMAP |
Downloads messages to computer and deletes from server. | Downloads only header of the message. It retrieves the message only if you want to read. |
Only inbox is accessible. No other folder on the server can be accessed. | Cab be used to access multiple mail box and mail box folders. |
Mail is stored in PC | Mail is stored in server, unless you copy the message to local folder. |
Choose if You only check e-mail from one computer
|
|
Choose if You want to remove your e-mail from the mail server | Choose if You use Webmail. |