GENERAL SUPPORT
AND TROUBLESHOOTING

BASIC SOFTWARE TROUBLESHOOTING STEPS

ADVANCED SOFTWARE TROUBLESHOOTING STEPS

SPYWARE NEWS, PREVENTION, AND RELATED ARTICLES

AN ALL-TOO-EASY WAY TO PREVENT IDENTITY THEFT
INCLUDES A HUMOROUS APPROACH TO ID THEFT SOLUTIONS

SECURE DATA REMOVAL
INCLUDES INFORMATION ON CLEANING WORD DOCUMENTS

FREE COMPRESSION (ZIP) TOOLS

HARD DRIVE TROUBLESHOOTING

BASIC ONLINE SECURITY TIPS, COURTESY OF YAHOO!
OPENS IN A NEW WINDOW

NEW!  PREVENT YOUR COMPUTER FROM BEING
A SPAM-BOT!

A:        BASIC TROUBLESHOOTING

1.     Restart your computer:  A large percentage of problems can be solved simply by restarting your computer.  To Restart: Click on the Start menu in the lower left corner of your screen and click on Shut Down, choose Shut Down from the menu and then click OK.  Once the computer shuts down, you can then start it up normally.  If your problem is with a printer, scanner, or other peripheral, it is often helpful to turn these off after shutting down your computer, waiting for ten seconds, powering them back on and then powering your computer back on.  If the above procedure does not work, you can press the Ctrl Alt and Delete keys simultaneously several times.   As a last resort if the computer still does not restart, you can turn off the power to your computer or power strip, wait ten seconds and then turn the power back on.

2.      Check to make sure that all cables are connected properly:  The time spent waiting for your computer to restart is the perfect opportunity to ensure that all cables are firmly connected to your computer equipment.  Take the time to ensure that the cables are snugly connected both to the computer equipment and to the wall outlet or network jack.

3.     If the problem persists, create a complete record of the problem, and give us a call:  Be sure to include the exact error message you get if any and information such as what program(s) you were running and what you were trying to do in the program (if a website, please list the address).  Submitting the exact error message is vital as it can help the technician immensely in determining what the cause of the problem is and reduce the time it takes to correct it.


B:      ADVANCED TROUBLESHOOTING

1.     Use the Microsoft Configuration Utility (Windows 98, ME, XP): Often times, software you install will want to start every time your computer boots into Windows.  To eliminate these "self-starting" programs as a source of your problems, you can use the MS Configuration tool (on Windows 98, ME, or XP).  Click START, then RUN.  Type MSCONFIG and tap ENTER.  The STARTUP tab is usually the place you'd want to look for rouge startup applications.  Best practice when troubleshooting is to UNCHECK EVERYTHING, click APPLY, then OK, and restart.  Then, promptly go to ADD/REMOVE PROGRAMS, also in Control Panel, and uninstall any software that doesn't look familiar.  Give us a call if you need assistance identifying "legit" Windows software.  Note that some antivirus software will still start up normally even after being "disabled" with the MSCONFIG tool -- this is expected, and okay, because it means that a "bad" program cannot disable the antivirus software on purpose.   Windows 95 and Windows 2000 does not have such a utility as MSCONFIG, but there is a free program you can download called STARTUP CONTROL PANEL that will serve the same purpose.  See this site for more information:  http://www.mlin.net/StartupCPL.shtml

2.     Run an antivirus scan: Most computer users are familiar with the term "virus" and do know well enough to have an antivirus program on their systems. The important thing, however is to make sure the program is UP TO DATE with the latest virus definitions or signatures, which change almost weekly these days. Check with your antivirus software manufacturer or computer vendor to find out how to obtain updates to your antivirus software. The popular antivirus vendors are listed below, more are listed throughout this page.

Symantec

McAfee

Sophos

Panda

3.     Check for Spyware: Besides the run of the mill computer virus, there is a new type of "infection" that plagues Windows computers today, and that is the installation of spyware or ad ware. This type of software is often "piggybacked" onto software you install for another purpose, such as file sharing or gaming, or it can be installed by clicking on an authentic-looking Windows-like dialog box (actually a banner ad which is made to look like a Windows box).   More information about this technique is provided below.   One way of avoiding some of the spyware introduced through Internet browsing is to use an alternative browser like Mozilla FireFox.  This is because most spyware popups and downloads take advantage of vulnerabilities and functions in Microsoft Internet Explorer; functions which are not present in these other browsers. For more information about Firefox, see http://www.getfirefox.com.

RESOURCES ON "SPYWARE" AND "MALWARE"
UPDATED JANUARY 13, 2010


2009 PROVES TO BE THE WORST YEAR FOR MALWARE --
BUT 2010 ALREADY HAS SEEN A NASTY OUTBREAK:

THE "SEARCHCLICK8" TROJAN AND "DESKTOP DEFENDER 2010!"

January 12, 2010:   A recent computer check-up and repair of a client's system revealed yet another rougue antivirus product on his system.  DESKTOP DEFENDER 2010.  Looks authentic, huh?

 Desktop Defender 2010

       Of course, the "cleaning" functionality was disabled in an attempt to get you to purchase a
       license key; not that this would actually FIX anything.  Other symptoms of the infection
       included:

  •          --  A false virus warning upon every start of the system mentioning the NetSky trojan.
            --  Disabling of the Windows Task Manager so I could not locate and forcibly end the processes
                 tied to this infection.

  •         --  Inability to run system restore, command prompt, or other tools - doing so would simply pop up 
                an "error" indicating the file is infected.

  •         -- Inability to boot into safe mode - at one point safe mode would not start, but when I was able to   
               get in, I noted the false virus warnings persisted.

Related to this, all typical yahoo and google searches re-directed through SearchClick8, a rogue search engine that I believe is the source of the Desktop Defender "drive by download."  This happened on both Internet Explorer as well as on Firefox (a first for me, as Firefox is usually immune to such things.  What to do?

The usual compliment of legitimate anti-virus products ALREADY INSTALLED on the system included Windows Defender (which did pick up a variant of the infection), NOD32 (which likewise found some infected files) and MalwareBytes AntiMalware (which, like NOD32, found only part of the infection).  So, although these were good products in their own right, none could eliminate this blended threat of desktop hijacker and browser redirector.  What finally worked was to run the latest version of COMBOFIX, (similar to SMITREM below) which forcibly disables Windows Explorer, unlocking any files in use by the malware.  The link provided takes you to a tutorial on its use and gives you download locations. 

When you do run ComboFix, it will alert you to DISABLE any antivirus or anti-malware software so that it may do its work unobstructed.  You may continue without doing so, but ComboFix's effectiveness is reduced (enough to actually cause more damage).  Combofix runs through a series of scans and disables key processes in Windows.  It may reboot your system by itself.  Whatever happens, you must let the ComboFix file do its own thing.  You will know it is complete when the final log file is displayed.

For good measure, after ComboFix did it's job, I ran sucessive scans with the three anti-virus programs and they came up clean.  A reboot for good measure, and I was back in buiness.  I updated to the latest version of Firefox on the client's computer, and told him to use that instead of IE for now, as I still believe that Internet Explorer was the original entry vector.  He's good -- til the next go-round.  :-)

ADDITIONAL NOTES:  JANUARY 19, 2010 

I have encountered the same problems on at least THREE other systems after doing this write-up, and I am sure more are to follow.    On XP machines, the procedure above worked fine, but on one Vista machine I had problems running ComboFix.  The issue was resolved by booting into SAFE MODE COMMAND PROMPT, running SmitRem (see below) from a USB flash drive, then rebooting with a Vista DVD so that I could repair the computer's startup options.  Note that this also gives you an opportunity to access your system's "restore points" in a sandboxed environment, something XP does not offer.

 


Spyware is Getting Sneakier!

Courtesy of "Uptime" - A Productivity Enhancing Blog from Butler Consulting, Inc.

"... After the initial scan, it discovered a hidden process called tdssserv.sys. Turns out, this file is a variant of the clbdriver/Troj/NtRootK-DR malware. Now, here’s the problem. This malware is designed to hide itself from the Operating System so it won’t show up in the process list or during a directory scan. Needless to say, this also makes it fairly difficult to eliminate."

For more, please see the original blog entry or the removal instructions at the Malware Bytes Forum
 

 

POPULAR ANTI-VIRUS SOLUTIONS UPDATED
March 2010

Comcast Now Offers Norton Internet Security Suite to Its Customers - Comcast customers can now get Norton™ Security. It protects your computer, files and identity without slowing you down. Plus, get the award winning OnlineFamily.Norton to safeguard your kids online - $160 dollar value at no additional cost with your Comcast high-speed internet subscription.  Go to http://security.comcast.net, and get the software for Windows or Mac.Norton Security Suite  A valid Comcast.net e-mail address is required.  This REPLACES the McAfee Security Suite offering that was previously available, and existing McAfee customers can switch for free.

 

 

 

 

 

 

Ruggiero AV Services Supports antivirus products from ESET - Nod32 Antivirus, and ESET Smart Security, now at version 4, provides "the lightest and most effective defense against internet threats."  Smart proactive detection blocks most known and emerging threats hours or days faster than other antivirus technologies. Fast, light and unobtrusive software protects your Internet experience without annoying system slowdowns. Smart Security Screenshot

Sophos Endpoint Solutions - Ruggiero AV Services supports systems which utilize the anti-malware protection ofSophos Endpoint Security Sophos Endpoint Security (AntiVirus, Firewall, and Application Control).  Sophos products are usually distributed by businesses, schools, and other such institutions.  Based on their  license agreement, a student, teacher, or employee may utilize the same protection afforded their corporate machines on their home computers.  Ruggiero AV Services handles reinstallation and upgrades ONLY, although we will perform a full install as part of a pre/reload of a customer's system IF proper proof is provided that said user is allowed to access the Sophos product in question.

 


HOW DID I GET INFECTED WITH ANTIVIRUS 2009?

Q: I have Norton Internet security, yet my computer has been infected with the Antivirus 2009 program. How can this happen and how do I get rid of it?  - Glenn

WHY DO I STILL GET INFECTED?

Q: If I installed anti-virus and anti-spyware software, have kept Windows updated and have a firewall, why am I still getting infections? - William

CLICK THE LINK ABOVE TO READ THE ANSWER - COURTESY OF LOCKERGNOME.COM

 

RUGGIERO AV SERVICES RECOMMENDS:

As I test software on my own systems, as well as troubleshoot problems on other people's machines, I come across a wide variety of issues; some caused by multiple programs running in the background, and some caused in fact by viruses and spyware or malware.  As new variants are discovered, I try and find better software to deal with such problems.  I believe that - as of this writing - I have found THE ultimate anti-spyware application, which I believe rivals any freeware or commercial offering currently available:

SPYWARE TERMINATOR

The basic version is FREE for home and business use, and unlike some other freeware versions, the software doesn't strip its features in an effort to get you to upgrade to the paid "professional" version*.  The spyware database is constantly updated, the website offers a great forum for support and questions, and program is light on system resources.  It is Microsoft Windows Vista compatible.** It even integrates with the freeware antivirus application ClamAV, if you happen to have it installed, which is a plus, because by itself, the standard ClamAV for Windows does not have a "resident" or "on-access" scanner at this time. 

Spyware terminator is not a substitute FOR an antivirus program, so I still advise users to keep an antivirus program on their systems and up-to-date.  With all that said, this may be the last anti-spyware application you will ever need.

http://www.spywareterminator.com

* PRO VERSION = CORPORATE EDITION - Spyware Terminator Corporate Edition is a centrally managed anti-spyware solution for the corporate environment, allowing the IT administrator to prevent and combat spyware infection on computers used by employees. With Spyware Terminator Corporate Edition you can effectively protect your data and keep intruders out.   A 30-day trial is available, and 2-year non-profit licenses are also available for free.  As of this writing, a 10-pack of corporate licenses is only $20.00!

** NOTE ON VISTA COMPATIBILITY - the latest version of the software from the Spyware Terminator website runs under Windows Vista.  For best results, it is advised to DISABLE Microsoft's Windows Defender before installing Spyware Terminator:

  1. Hold the “Windows Key” and press the letter “R”
  2. In the run box type “msconfig” and press enter
  3. Click “Continue” on the message box if you have one
  4. Select the “Startup” tab at the top
  5. Locate the Startup item called “Windows Defender” and uncheck the box next to it
  6. Click apply, click ok and say no to rebooting your computer
  7. Then open Windows Defender
  8. Click Tools
  9. Click General Settings
  10. Scroll down to Real Time Protection Options
  11. Uncheck Turn on Real Time Protection
  12. After you uncheck this, click on the Save button
  13. Close Windows Defender
  14. Reboot your computer

 

GIVE SPYAXE THE AXE!

 -  Can’t change your desktop background?

Little orange triangle in your system tray telling that you have an infection,
    and for $29.99 they can fix it?

-  New icons for SpyAxe on your desktop?

-  "Critical System Error" dialog box permanently on your desktop?

-   Desktop background says you have a spyware infection or has an image
    of a BSOD (Blue Screen of Death)?

If you answer yes to any of these, then you are probably one of the
          unlucky many that have had a run in with Spy Axe or one of its many
          variants. These rogue anti-spyware applications have some nasty
          effects on your computer; slowness, pop-ups, downloading
          other spyware, etc. but all is not lost.  You can remove them with the
          tools below:


What you need (you can click the item name to download it):

SmitRem (courtesy of Dave’s World)
CCleaner (hosted by filehippo.com)


BEFORE DOING ANYTHING WITH THESE TOOLS, BE SURE TO BACK UP YOUR DOCUMENTS OR ANY OTHER IMPORTANT INFORMATION.  You might also want to PRINT this information before proceeding, because these procedures require you to close all open windows.  Last, you can install CCleaner following all instructions, because you will use it at the end of this procedure. 

  • Open the smitrem.exe file.

  • You will be asked to extract the contents into a folder; I would suggest extracting them into a folder on your desktop.
  • Now that the files have been extracted, close all open windows, and open the folder where you have extracted the files, and double click the file that is named RUNTHIS. You will be prompted to back up your data, etc., continue through the steps given to you to use this program. As you continue, you will see many ‘file not founds’ and your Windows task bar will disappear - this is normal! Once the clean is finished, you will be prompted to hit any key.
  • Now you will get your desktop back, and any desktop hijacker will be gone! Windows disk cleanup will also be open. I suggest you close Windows disk cleanup and run the CCleaner app (just open it and hit Run Cleaner), but you definitely need to run one of the two.
  • Finally, REBOOT!


The combination of using SMITREM and CCLEANER should completely rid your system of any spyware variants.  For keeping your computer spyware-free, you may want to download one of the following FREE tools... see the black boxes below for additional information.

Windows Defender (requires Genuine Windows Validation)
SpyBot - Search and Destroy (from Safer Networking)
Yahoo! Toolbar with Antispy (don't need a Yahoo! ID for use)
Important note on the Yahoo Toolbar - versions 7.0 to 7.03 of the Yahoo toolbar did not feature Anti-spy.  It has returned in version 7.04. You may still get the older 6.36 version from Download.com

 

KEEP AN EYE ON THAT MOUSE POINTER!

The "conspiracy" story below highlights a PRIME EXAMPLE of something I have stressed to people who have come to me with issues they think are related to "viruses" but are in fact caused by "spyware."  My emphasis on this point is underlined within the article, but to sum up, I have always known and enforced the idea that the best practice is to WATCH YOUR MOUSE POINTER when clicking on a dialog box that looks like a standard Windows error. 

IF THE POINTER REMAINS LOOKING LIKE A "HAND" NO MATTER WHERE YOU PUT YOUR MOUSE, DO NOT CLICK ANYWHERE ON THAT ITEM!    The best thing to do is to press ALT-F4 to close the offending window.  Also, two more dead giveaways are:

  • standard windows "errors" do not include the text "Microsoft Internet Explorer" or "Windows Internet Explorer" in their window titles.  If you look carefully for the word ADVERTISEMENT in the window you will also know that you are looking at a web ad, and not an actual Windows error.

  • standard windows "errors" are NEVER "embedded" into a website, or seem to be integrated within it.
     

THE ANTI-SPYWARE CONSPIRACY?
(courtesy of Lockergnome and SysInternals/Mark Russinovich)

ADDED 1/17/2006 - UPDATED 2006.
ARTICLE HAS NOW BEEN ARCHIVED AND IS PROVIDED COURTESY OF
THE INTERNET ARCHIVE - WWW.ARCHIVE.ORG

"Since the release of the first antivirus products many people have believed in a conspiracy theory where antivirus companies generate their own market by paying virus writers to develop and release viruses. I don’t subscribe to that theory and trust the major security vendors, but recent trends show that there’s a fuzzy line between second-tier antispyware vendors and the malware they clean.

The most innocuous of malware-like antimalware behaviors is to advertise with web site banners and popups that mislead average users into thinking that they have a malware problem. Most of the advertisements look like Windows error dialogs complete with Yes and No buttons, and although the word “advertisement” sometimes appears on the dialog background, the notice is usually small, faded and far from the area where users focus their attention. Even more unlike Windows dialogs, however, is the fact that clicking anywhere on the image, even the part that looks like a No button, results in the browser following the underlying link to the target page. Here’s an example I ran across recently on a popular web site..."

CONTINUE READING ARCHIVED ARTICLE:
CLICK HERE


MORE ARTICLES ON SPYWARE

 


ABOUT PHISHING

There is a growing scam which is taking place known as phishing (pronounced ‘fishing’).  It initially became prevalent with the introduction of AOL in the 1990’s and basically refers to any way in which an unscrupulous individual tricks someone into giving them their password or other personal information...

CLICK THE LINK ABOVE TO READ MORE

 

 


ABOUT INTEGRATED SEARCH TECHNOLOGIES

ADDED 3/21/2005

offsite archived link - actual "attack" is now out-of-date, but the information is still valid, as it demonstrates one such technique used by malware writers.

 



IDENTITY THEFT PREVENTION:
IT'S EASIER THAN YOU THINK!

by Joseph Ruggiero


The majority of information on this page deals with methods of preventing or removing malicious computer programs or websites that are designed primarily to harvest your personal information -- from finding out where you like to surf on the Internet and your personal online shopping habits, to the actual account information linked to your bank and credit cards.  Most of the time, these websites work because they rely on "social engineering" - the fact that you trust a name like E-bay or the company associated with your credit card makes the websites associated with those organizations easy targets for spoofing.  Our page on PHISHING can give you more details on how to spot fake websites and e-mails, and what to do if you are unsure about the validity of a given site or e-mail request.   But, besides the "new rules" for keeping your information safe online, there have always been traditional rules that come into play when dealing with personal, private information, and performing tasks associated with that information.  An example of what NOT to do follows...

One afternoon in February, 2006, I was riding a public bus, and a lady was sitting behind me on her cellular phone.   She was speaking quite loudly, and although there was a general din of conversation among the other passengers, her voice was easily heard and understood, at least to a person sitting directly in front of, behind, or even next to her.  Apparently, this woman's regular land-line phone had been turned off, and she was speaking with the phone company in an attempt to get it re-activated.  I was actually only half-paying attention to her conversation, BUT my ears perked up even more when she asked if she could make a payment right then and there.  You can probably guess what came next.  All at once, this lady (whose name was Daphne) proceeded to give her debit card number, personal PIN number or password, and a home address to the person on the other end of the line, seemingly unaware that she was also vocally broadcasting that information to anyone in earshot!  I am sure she could have waited until she was in a more private location before she rattled off her private account details to the customer service representative and thus the majority of the passengers on the bus. 

Believe me, I am NOT the kind of person who would use that kind of information, and frankly my brain has more important things to remember - by now I have pretty much forgotten whatever details were exchanged.  But the fact remains, another more unscrupulous person COULD have taken note of everything she said verbatim, and used that information to do some serious damage.  So again, along with the rules of cyberspace, we have the rules of public space... DON'T REVEAL PERSONAL INFORMATION IN PUBLIC.  Keep personal account numbers, PINs, and passwords completely private.  And If you MUST speak on a cellular phone with someone who requires personal information, make certain you are in an area where you will not be overheard.

Daphne, I hope you are safe on Salem Road!

 

ADDENDUM - MAY 2006:  THE FUNNY SIDE TO IDENTITY THEFT?

Citibank is currently promoting its identity-theft solutions on television.  It is fantastic that a company is taking such an active role in monitoring customers' accounts, and providing real-time assistance in the case of problems.   I have made use of their services and have been notified by their automated early-warning systems when I charged a large purchase or several small ones in succession.  Also, although most may disagree, and the sheer act of identity theft remains a big problem, I think it is great that Citi has chosen to approach their ads with a bit of humor.  Check out a sample of their 2006 ad campaign.

WATCH DARREL P. - CLICK HERE
(1.7mb Windows Media file)
 -- right-click and save target/link to view offline --

THE INFORMATION BELOW IS COURTESY OF
Data Doctors Computer Services

The direct links that follow as well as the article from DataDoctors.com are provided as a courtesy to Ruggiero AV Services' customers.  While Ruggiero AV Services does understand that the utilities and programs referenced are destructive in nature (for the purpose of data security), no warranty is made, either expressed or implied, as to a particular program or utility's usefulness and/or performance.  You assume all risks when using these utilities. 

Secure Data Removal:
Will Formatting a Hard Drive Truly Erase All My Information?

ADDED 2/2/2006

This question was answered on September 11, 2003. Much of the information contained herein may have changed since posting. Data Doctors makes no guarantees as to the quality of this answer, nor to the safety of any procedures contained herein.

"The most common way to delete files in Windows and Macintosh is to drag the file into the Mac "trash can'' or Windows "recycling bin.'' While that removes it from the desktop it does not remove it from the computer. In fact, you can restore the file by simply opening the trash or recycling bin and dragging it back to the desktop.

Both the Mac and Windows allow you to go one step further by emptying the trash which appears to delete the file completely. The Mac, for example, asks you if you are sure "you want to remove the item in the trash permanently.'' Windows asks if you're "sure you want to delete all of the items in the recycling bin.''

But neither method is permanent. Erasing a file doesn't actually delete the data; it just removes the file name from the directory. The data is still there. Deleting a file the standard way is a bit like crumpling up a piece of paper and throwing it in the trash can rather than running it through a shredder. The MS-DOS delete command doesn't have an obvious "undo'' feature but it too can easily be reversed..."

CONTINUE READING AT SOURCE:
CLICK HERE

GOOGLE SEARCH:
FREE SECURE ERASE

DIRECT LINKS:
ERASER
Advanced security tool (for Windows), which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Works with Windows 95, 98, ME, NT, 2000, XP and DOS. Eraser is Free software and its source code is released under GNU General Public License.
SDELETE

SDelete is a secure delete application that can overwrite a disk's unused or unallocated space, or securely delete existing files. It implements the US Department of Defense clearing standard DOD 5220.22-M, and you can specify the number of overwrite passes it makes. It can also wipe Windows NT/2K compressed, encrypted and sparse files (it uses Windows defragmentation API to accomplish this), and clears the NTFS Master File Table (MFT). (It does not delete the filenames of your files in the free disk space though - apparently it is not possible to do this in NT/2K.) This program comes with source code and works under Windows 95, 98, NT 4.0 and Windows 2000. It is a command line utility.

DARIK'S BOOT AND NUKE
Darik's Boot and Nuke is a utility that you use when you want to completely obliterate all your data in all your hard disks and their partitions. It comes in the form of a bootable floppy disk or a bootable CDROM image (you download whichever you prefer), complete with an operating system (Linux) and the Boot and Nuke utility. Once you boot up that floppy (or CDROM), the utility will proceed to destroy all your data in every partition of every hard disk. The site says that it is designed for bulk or emergency data destruction. (It is probably also useful in less dramatic cases, such as when you want to wipe your disks prior to giving your computer away to someone).


Keeping Your
Word Documents Clean

originally published as part of
LOCKERGNOME'S WINDOWS FANATICS Newsletter
(www.lockergnome.com)
3/8/2006

"If you e-mail business letters, resumes, and personal documents as Word documents you need to keep in mind that if you’re not careful, recipients of those Word documents can easily see what you deleted or modified. That letter you hacked from something you downloaded, the draft where you called the Boss “smart arse” before a final search and replace changed that to “great guy and brilliant visionary.” But if you’re not careful, 'Smart Arse' may know what you really think.

Hidden within your letter is the original wording. Microsoft Word saved it all and the recipient doesn't have to be too smart to find it. Word inserts metadata (information about data) to help identify author names, document titles, keywords, print and save dates, and all the names of people who reviewed and saved the document. Metadata may include your place of business, your company or organization's name, the name of the network server on which the document is saved and all the comments you and your ghost writer have added.

There are a number of ways to ensure that your personal data and the mess that you call a draft stays with you:

Turn off Fast Save. This feature speeds up saving a document by saving only changes made to a document. However, text that you delete from a document may remain. Microsoft recommends turning off this feature to eliminate any chance of deleted text remaining in the document. Click Tools, then Options. Click the Save tab. Clear the "Allow fast saves" check box and click OK.

You can remove personal information when you save a doc. In Word 2002 and 2003, click Tools, then Options. Click the Security tab. Under Privacy options, select "Remove personal information from file properties on save" and click OK. In Word 2000, click Tools, the Options. Select the User Information tab. Clear the information in Name, Initials and Mailing Address and click OK.

Turn off the Track Changes tool. In Word 2002 and 2003, click Tools, then Track Changes. In Word 2000 and earlier versions, click Tools, Track Changes, Highlight Changes. Click to clear the check mark in the "Track Changes while editing" box.

You can tell if the Track Changes feature is on by looking at the status bar. When Track Changes is enabled, TRK appears in the status bar. When Track Changes is disabled, TRK is dimmed.

Track Changes must be disabled before writing the document. Otherwise, any changes made will not be removed.

A Microsoft tool exists that can remove hidden data from Word, Excel and PowerPoint. The Remove Hidden Data add-in tool will delete text and comments from files."


INFORMATION ON "COMPRESSION" SOFTWARE:
WHY "WINZIP" IS NO LONGER SHAREWARE, AND SOME FREEWARE ALTERNATIVES

Since the days of online bulletin boards, predating the Internet as we know it today, there has been a need to send information and data electronically.  On a BBS this was accomplished via a slow telephone modem link, and that slow link still exists today in contrast to the high speed connections some of us now enjoy.  But even those of us with high speed connections can appreciate the need to send large amounts of information quickly.  It is for this reason that the "ZIP" format was created, to be later supplemented by other forms of compression, such as "RAR"  Even Microsoft's "CAB" format (short for cabinet) is a viable compression format.  

Compression allows not only for a large amount of information to be shrunk down into a manageable package, but it also allows different TYPES of information to coexist in one "container" - one zip archive may contain any number or type of individual file, and they all retain their original integrity inside of that archive.   Also, a single zip file can be encrypted and/or password protected so as to prevent private or confidential files to be viewed.

Before Windows, and during the years of Windows 3.1, the most popular program for compressing files or groups of files was called PKZIP, created by PKWare, Inc. (www.pkware.com).  This was followed shortly by another competing commercial product known simply as Winzip.  Offered originally by Niko Mak Computing, the company later changed their name to Winzip Computing, and has been recently bought out by Corel Software, Inc.  Winzip used to be "uncrippled shareware" which meant you could personally use it WITHOUT registering, although you would be "nagged" to register at each use.  Or you could pay the reasonable cost and be entitled to unlimited version upgrades.  Since the acquisition by Corel, WinZip has become a full commercial product, and no longer falls under the shareware category.

Since PKZip and WinZip, there have been various freeware**, shareware, and commercial compression programs available.  Microsoft's Windows XP even has native support for Zip files requiring NO third-party software to be installed at all.  But most users will opt to install a third party application, even under XP, to take advantage of some advanced management functions offered by these other programs, such as encryption.

GOOGLE SEARCH:
FREE ZIP MANAGER

** 7-zip and Zip Central are FREEWARE alternatives to both PKZIP and WinZip.  Click the Google Search link above for these and other results. 

GO BACK TO THE PREVIOUS PAGE

Last Updated 03/17/2010 07:04 PM