MoonPoint Support Logo

 

Shop Amazon Warehouse Deals - Deep Discounts on Open-box and Used ProductsAmazon Warehouse Deals



Advanced Search
April
Sun Mon Tue Wed Thu Fri Sat
         
2007
Months
Apr


Mon, Apr 30, 2007 11:13 pm

Charlene Infection

After a user complained of popup windows advising her to download antivirus software, I checked the system with Spybot Search & Destroy. Spybot found the following malware on the system:

FunWeb
FunWebProducts
MyWay.MyWebSearch
MyWebSearch
TagASaurus
Zlob.VideoAccessActiveXObject

I also found that the popup ad was appearing whenever Internet Explorer was opened. When Interenet Explorer was opened it would go immediately to http://aprotectservice.com/, which would result in a dubious W32.Myzor.FK@yf virus warning appearing.

[ More Info ]

[/security/spyware/funwebproducts] permanent link

Mon, Apr 30, 2007 12:38 am

Remotely Enabling Remote Desktop Protocol

If you need to enable Remote Desktop support on a system in a domain from the domain controller, you can do it by editing the HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server key in the registry of the remote system. By changing the value of fDenyTSConnection from 1 to 0 and then rebooting the system, you can enable Remote Desktop support.

[ More Info ]

[/os/windows/software/remote-control/rdp] permanent link

Sun, Apr 29, 2007 9:30 pm

Updating NVIDIA Driver Fixed GoPets and Second Life Problem

When I updated the driver for the NVIDIA GeForce 6150 LE video adapter in a Windows XP PC earlier today from version 8.2.08 (driver date: 5/9/2006) to version 6.14.10.9371 (driver date: 10/22/2006), the update corrected a problem with GoPets and a problem with Second Life.

A family member has many fruit trees on GoPets from which she harvests fruit regularly. However, whenever she put the fruit in her inventory, GoPets would randomly crash. Sometimes it would crash after she put only 1 piece of fruit in her inventory. At other times, she could put 3 or 4 pieces of fruit in her inventory before it crashed. And sometimes even 10 or more pieces of fruit in her inventory. Upgrading the driver for the NVIDIA video card stopped those crashes altogether.

When she was in Second Life, her avatar would continually turn to the right, as if she was clicking the arrow to turn to the right. The only way she could stop the behavior was to switch to full-screen mode, which she preferred not to do. Updating the video driver resolved that problem, also.

For anyone experiencing either problem, you can check the version of the driver for the video adapter in your system by the following steps on a Windows XP system:

  1. Click on Start.

  2. Click on Settings. If you don't see Settings, look for Control Panel instead.

  3. Click on Control Panel.

  4. Within the Control Panel, double-click on System.

  5. Click on the Hardware tab.

  6. Click on the Device Manager button.

  7. Double-click on Display Adapters to expand the list of display adapters.

  8. Right-click on a display adapter (for most systems there will be only 1) and choose Properties.

  9. Click on the Driver tab. You should then see the driver provider, driver date, and driver version listed.

  10. You can then click on Cancel and close the window.

If you are experiencing any of the above problems a driver update may help. If your system has an NVIDIA adapter, you can get the latest drvier from the NVIDIA software download webpage.

[/os/windows/software/games] permanent link

Sun, Apr 29, 2007 3:31 pm

GoPets and Second Life Won't Run After Nvidia Hardware Acceleration Turned Off

I turned off hardware acceleration for an Nvidia GeForce 6150 LE video adapter in a Windows XP Media Center PC, but then the family member using the system found that neither GoPets nor Second Life would start. For GoPets, the following window appeared.

Initialize Error
Your video card could not support the requested 3D function.
This error may occur if your video card is not supported by GoPets.
Please view the Download page at the GoPets website for a list of unsupported video cards.

OK

When she clicked on OK, another error window appeared.

Error
white x in red circle   Failed to initialize the rendering engine.: 0

OK

Clicking OK on that window closed the application.

When she started Second Life the message "detecting hardware" appeared followed by the error window below.

Error
Second Life is unable to run because your video card drivers
are out of date or unsupported. Please make sure you have
the latest video card drivers installed.

If you continue to receive this message, contact customer service.

OK

I had turned video acceleration off for the Nvidia graphics adapter when Paint Shop Pro 9 would not start with it turned on. To turn it back on I tried the following steps.

  1. Right-click on desktop.
  2. Select Properties.
  3. Click on Settings.
  4. Click on the Advanced button.

But then the following message appeared.

NVIDIA Display
The NVIDIA Display Panel extension cannot be created.

Possible reasons include:
Disabled graphics hardware acceleration. To enable Hardware Acceleration:
  1. Right click on your desktop, select Properties, the Settings tab, and click Advanced.
  2. Click the Troubleshoot tab and move the 'Hardware acceleration' slider all the way to Full.
  3. Click OK.
  4. If prompted, restart your computer.

  5. OK

I clicked on the Troubleshoot tab instead, clicked on the hardware acceleration slider and dragged it down to the "Full" end. GoPets and Second Life then started when I tried to open them. Paint Shop Pro 9 wouldn't start again, though. It hung while starting up (see Paint Shop Pro Hangs at Startup).

I checked the version of the driver installed for the NVIDIA GeForce 6150 LE through the device manager. I saw the following.

Driver Provider:NVIDIA
Driver Date:5/9/2006
Driver Version:8.2.0.8
Digital Signer:Microsoft Windows Hardware Compatibility Publisher

I went to the NVIDIA software download page. I didn't find a driver listed specifically for the NVIDIA GeForce 6150 LE adapter, but I found that the GeForce 6 Series driver supports the GeForce 6150 LE adapter.

The "Driver Installation Hints" for the new driver stated the following.

Before installing new drivers make sure you uninstall all NVIDIA display drivers from the Windows Control Panel. Browse to the Start Menu > Windows Control Panel > Add/Remove Programs and search for "NVIDIA Windows Display Drivers" or "NVIDIA Display Drivers" and select remove.

I removed the existing NVIDIA drivers through "Add or Remove Programs". I chose to "Remove all NVIDIA drivers, including Display". I also opted to remove the nView profiles. After rebooting, GoPets, Second Life, and Paint Shop Pro 9 all started without problems.

[/os/windows/software/games] permanent link

Sat, Apr 28, 2007 1:30 pm

Removing the Arrow from Windows Shortcuts

If you want to remove the arrow that appears on Windows shortcuts, you can do so by using the following procedure.
  1. Click on Start.
  2. Select Run.
  3. Type regedit
  4. Click on Ok.
  5. Navigate to HKEY_CLASSES_ROOT\lnkfile.
  6. On the right side of the window, right-click on IsShortcut and choose Delete.

Remember, you must be careful when editing the registry. Mistakes in editing registry entries can cause significant problems.

As an alternative to the above method, you can use this shortcut-arrow-removal.reg registry file, which will delete the IsShortcut key from the registry. Download the file (you can right-click on the link and choose "download", "save link target as", or whatever your browser ues to initiate a download) and then, once it is downloaded, double-click on the file on your system. When prompted "Are you sure you want to add the information in shortcut-arrow-removal.reg to the registry?", select "Yes". That action will result in the key being removed; the prompt about adding information is just the default message that appears whenever you click on a .reg file.

References:

  1. Remove shortcut arrow from desktop icons
    Free PC Tech Support - Guides and FAQs

[/os/windows/registry] permanent link

Sat, Apr 28, 2007 12:33 pm

Problem Uninstalling Starddock Central Applications

A family member uninstalled StarDock Central, but then found the files for the software were still under C:\Program Files and the applications, such as WindowBlinds, which are part of the software, still seemed to be active on the system.

I suggested reinstalling StardDock Central and then uninstalling the various modules, such as WindowBlinds from within it. After reinstalling StarDock Central and then opening StarDock Central, right-clicking on the various packages and choosing "uninstall" would not uninstall the packages.

Trying to uninstall IconPackager produced the message below.

Stardock Central
There has been an error uninstalling IconPackager. Would you like to set the item as uninstalled?

Yes     No

Trying to uninstall WindowBlinds produced a similar message

Stardock Central
There has been an error uninstalling WindowBlinds4. Would you like to set the item as uninstalled?

Yes     No

On one of the StarDock Forums, there was a posting Uninstall Problem Gives me an error where someone reported a problem uninstalling WindowBlinds to which a respondent suggested running a "zapper" program from StarDock to uninstall StarDock applications. The ODNT Component Zapper is available from Downloads at the Stardock site.

Stardock describes it as a "Utility program that can be used to unload or remove Object Desktop components (like if an install.log file is missing). Warning: this will delete any installed skins/themes for the component when used to uninstall that component."

I ran the program and chose "Select All" to remove all Object Desktop components.

Stardock Clenaup

A window popped up showing the applications to be removed, but the list was so long I couldn't see the buttons at the bottom and there was no scrollbar. But, since the default response button was "Yes", hitting the enter key resulted in an attempt to zap the programs, but then I saw "odnt_zapper.exe has encountered a problem and needs to close. We are sorry for any inconvenience." However when I restarted the ODNT Component Zapper, I didn't see any applications listed to remove this time under the Uninstall tab. But under the Unload tab, I saw WebBlinds listed. I chose to unload it by selecting it and then clicking on Apply.

I then clicked on Start, Control Panel, and then Add or Remove Programs, chose Stardock Central, and then Change/Remove to remove it from the system.

The C:\Program Files\Stardock folder remained, so I attempted to manually delete it. When I tried deleting it, I saw the message "Renaming, moving or deleting 'Stardock' could make some programs not work. Are you sure you want to do this?" I chose "No" and rebooted, thinking perhaps a DLL file associated with the program might still be loaded in memory. I got the same message after rebooting when I tried uninstalling it again, but this time I chose "Yes" to proceed with the uninstall

  1. Uninstall Problem Gives me an error
    By kid4christ
    Posted December 10, 2005
    Stardock Forums

[/os/windows/software/themes] permanent link

Fri, Apr 27, 2007 9:16 pm

Paint Shop Pro Hangs at Startup

Whenever I attempted to start PaintShop Pro 9 on a Windows XP system, the program would hang at startup. When I tried to uninstall it, the uninstall routine hung as well. I finally resolved the problem by disabling hardware acceleration for the Nvidia video adapter in the system, though updating the driver for the video card may resolve the problem as well [Update: that is probably the better alternative, since turning off hardware acceleration may create problems for other programs as noted in GoPets and Second Life Won't Run After Nvidia Hardware Acceleration Turned off]

[ More Info ]

[/os/windows/software/graphics/corel/psp] permanent link

Thu, Apr 26, 2007 8:58 pm

Add Notification Sounds to SquirrelMail

To add additional notification sounds that a user can select to have played when she receives new email, place the wav file you wish to add in /usr/share/squirrelmail/plugins/newmail/sounds.

You've Got Mail Wav File

[/network/email/squirrelmail] permanent link

Mon, Apr 23, 2007 9:00 pm

PayPal Phishing Page at Hong Kong University Removed

When I checked agin, I found the PayPal phishing page that was located on a webserver at the Hong Kong Polytechnic University this weekend was now gone.

[/security/scams/phishing/paypal] permanent link

Mon, Apr 23, 2007 6:42 pm

Adding an Account to the Administrator Group

Sometimes you may need to add an account to the Administrator group temporarily to install software that otherwise won't run from a normal users account. Perhaps the software can be made to run if you can determine all of the files and registry keys it needs to access and provide the appropriate permissions on those, but sometimes the most reasonable course is just to reinstall the software from a user account after adding the user to the administrator group temporarily and then remove the user account afterwards.

To do so on Windows XP system, e.g a Windows XP Home or Media Center Edition system, take the following steps:

  1. Log into the system as the administrator.

  2. Click on Start.

  3. Click on Control Panel.

  4. Double-click on User Accounts.

  5. Double-click on the account to which you wish to grant administrator access.

  6. Click on Change the account type.

  7. Change the account type from Limited to Computer Administrator.

  8. Click on the Change Account Type button.

  9. Logoff as administrator and logon under the user account.

You can then follow the same procedure after you have installed the software to change the account type back to Limited.

[/os/windows/xp] permanent link

Sun, Apr 22, 2007 2:59 pm

PayPal Phishing at Hong Kong Polytechnic University

When I checked to see if the spoofed PayPal webpages were still present at http://production.mic.polyu.edu.hk/pp/login.html, I found the pages were still accessible. Yesterday, someone forwarded a message to me which stated an email address had been added to his PayPal account. The message asked him to confirm the addition by going to a PayPal website, but the link in the message actually led to the server at the Media Innovation Centre in the School of Design at the Hong Kong Polytechnic University.

The recipient doesn't have a PayPal account. Whoever created the spam message probably sent it to thousands of people with no way of knowing how many of those recipients might have PayPal accounts.

I checked the online directory for the university today and sent another message regarding the spoofed site; this time I sent the message to the chair of the School of Design at the university plus email addresses for people who appeared to be IT people at the university, and some general contact addresses. Hopefully, one of them can get the spoofed webpages removed and take action that will result in the perpetrator being apprehended and disciplined.

[/security/scams/phishing/paypal] permanent link

Sat, Apr 21, 2007 8:15 pm

PayPal Phishing at a Hong Kong University

A user forwarded an email message to me today that attempts to lure gullible PayPal users to a website at a university in Hong Kong. The email message asked the recipient to verify the addition of an email address to his PayPal account by going to the PayPal website. But the link actually directed anyone who clicked on it to http://production.mic.polyu.edu.hk/pp/login.html. The "hk" at the end of the domain name indicates the site is in Hong Kong, since "hk" is the country code for Hong Kong. The "edu" before it indicates it is an educational institution.

Going to http://mic.polyu.edu.hk/ instead, I found the following information for the site:

Multimedia Innovation Centre, HK

I reported the spoofed site to to the contact address listed for the Hong Kong Polytechnic University. The webserver being used to host the spoofed PayPal site apparently belongs to the Multimedia Innovation Centre School of Design at that university. I also reported this phishing attempt to PayPal via the PayPal Report Fake Site/Spoofwebpage. And I reported the spoofed site at the following phishing report wepbages:

OrganizationReporting Page
CastleCops Phishing Incident & Termination
Symantec Phish Report Network Report Suspected Phishing Sites

[/security/scams/phishing/paypal] permanent link

Tue, Apr 17, 2007 9:50 pm

Attachment Sizes for Free Email Services

Google offers a free email service Gmail. Google offers up to 2,500 MB (2 GB) of storage for Gmail accounts. With that service attachments can be up to 10 MB in size. I have successfully sent a message with a 10 MB attachment to a test Gmail account I maintain. It is possible that a message with an attachment that is somewhat less than 10 MB might not be delivered, though. Google states the following in regards to attachment size for messages from/to Gmail accounts:
With Gmail, you can send and receive messages up to 10 megabytes (MB) in size. However, the precise amount allowable will depend on the attachment. When you add an attachment, the size of a file may increase because transport encodings are automatically added. (Transport encodings are the information that allows your message to be safely sent and read.) This means that in some cases, attachments that are 6 to 10MB in size may push the total message size above 10MB. When this happens, Gmail displays a warning that your message exceeds the 10MB limit.

Microsoft offers a free email service Hotmail, which provides 1,000 MB (1 GB) of free storage for email. That service currently has a 10 MB limit on attachments. I have successfully sent a message with a 10 MB attachment to a test Hotmail account I maintain.

Hotmail also has the following restrictions currently:

[/network/email/free] permanent link

Mon, Apr 16, 2007 7:42 pm

ClamWin No Longer Reporting Opera Infected with Trojan.Bifrose-495

When I scanned opera.exe, the executable for the Opera 8.54 web browser on April 8, 2007 with ClamWin 0.90.1, it reported the file was infected with Trojan.Bifrose-495 (see ClamWin Reporting Opera Infected with Trojan.Bifrose-495). The report appeared to be a false positive and I submitted the file as a false positive using the form at ClamAV Virus Database.

When I opened ClamWin today to see if new virus definitions would result in the file no longer being reported as infected, I saw the message "You have not yet downloaded Virus Definitions Database. Would you like to download it now?" I chose "Yes". ClamWin appeared to download new definitions, but when I selected the file the Scan button was grayed out. I closed and reopened ClamWin. Again I got the message stating that I had not yet downloaded virus definitions. I chose to download them again, but the results were the same. When I exited from the program, right-clicked on the file to scan and chose "Scan with ClamWin Free Antivirus", I saw the message "Virus Definitions Database Not Found! Please download it now."

So I checked the ClamWin website. I found there was a new version, 0.90.1.1 The site had the following information on the new version:

Wednesday, 11 April 2007
This quick-fix release addresses the "Missing Virus Database" Error. Also it includes couple of bug fixes:

I installed the new version. I was then able to scan opera.exe and it now reports that the file is uninfected. Previously ClamWin 0.90.1 was reporting that laplink.exe was also infected. It reported that file was infected with Trojan.Mybot-7604. I felt then that there was a fairly high probabability that the report was another false positive. When I scanned the file with the new version of ClamWin with current virus definitions, that file is now reported as uninfected as well.

[/security/antivirus/clamav] permanent link

Sun, Apr 15, 2007 4:53 pm

Stopping an Attacker with the Route Reject Command

You can use KRIPP to monitor FTP dictionary attacks where an attacker tries to guess a userid and password combination to break into an FTP server. You can block the attacking system with the route command, e.g. route add 202.123.213.3 reject to block all packets from 202.123.213.3. When the attacker has moved on to other targets, you can remove the routing table entry with route del 202.123.213.3 reject.

[ More Info ]

[/os/unix/commands] permanent link

Sat, Apr 14, 2007 9:12 pm

Changing an Uppercase Name in Perl

For a Perl variable, $name, which contains a name in the form first name followed by a space and then the last name with all letters in uppercase, the following code will change the name so that only the first letter of both parts of the name is capitalized with the rest of the name in lowercase. E.g. if $name contains JOHN SMITH, afterwards it will contain John Smith.


# The name is in all uppercase letters. Leave the first letter of
# each part of the name in upper case, but put all the others in lowercase
$name =~ tr/A-Z/a-z/;
$name =~ s/([a-z]+)\s([a-z]+)/\u$1 \u$2/;

The first line changes all uppercase letters to lowercase. The next line looks for the first part of the name, which is stored in $1. There is then a space followed by the last name, which is stored in $2. Using the substitute command, the first letter of $1 is changed to uppercase as is the first letter of $2.

The [a-z] instructs Perl to look for an occurrence of any letter from "a" to "z". The + afterwards indicates that Perl should look for 1 or more occurrences of any letter between "a" and "z". Enclosing the [a-z]+ between ( and ) instructs Perl to store what if finds, i.e. the first name in this case, in a variable $1. The \s tells it to look for a whitespace character, i.e. a space in this case, and then the next ([a-z]+) will find all of the letters for the last name and store it in a variable $2 The \u changes the following letter to uppercase for $1, which is the first name. The \u$2 then changes the first letter of $2 , which is the last name to uppercase.

[/languages/perl] permanent link

Mon, Apr 09, 2007 11:01 pm

Anomalous Windows XP Firewall Rules

When checking the firewall settings on a Windows XP Service Pack 2 system tonight, I found several anomalous firewall rules. The system is running the Windows XP firewall.

When I checked the firewall openings with the netsh firewall show state command, I didn't see anything unusual.

C:\>netsh firewall show state

Firewall status:
-------------------------------------------------------------------
Profile                           = Domain
Operational mode                  = Enable
Exception mode                    = Enable
Multicast/broadcast response mode = Enable
Notification mode                 = Enable
Group policy version              = Windows Firewall
Remote admin mode                 = Enable

Ports currently open on all network interfaces:
Port   Protocol  Version  Program
-------------------------------------------------------------------
135    TCP       IPv4     (null)
137    UDP       IPv4     (null)
139    TCP       IPv4     (null)
138    UDP       IPv4     (null)
9370   UDP       IPv4     C:\Program Files\Logitech\Desktop Messenger\8876480\Pr
ogram\LogitechDesktopMessenger.exe
3389   TCP       IPv4     (null)
445    TCP       IPv4     (null)
22     TCP       IPv4     C:\Program Files\Network\OpenSSH\usr\sbin\sshd.exe

Nor did I see anything unusual when I issued the command netsh firewall show portopening.

C:\>netsh firewall show portopening

Port configuration for Domain profile:
Port   Protocol  Mode     Name
-------------------------------------------------------------------
22022  TCP       Enable   OpenSSH
139    TCP       Enable   NetBIOS Session Service
445    TCP       Enable   SMB over TCP
137    UDP       Enable   NetBIOS Name Service
138    UDP       Enable   NetBIOS Datagram Service
3389   TCP       Enable   Remote Desktop

Port configuration for Standard profile:
Port   Protocol  Mode     Name
-------------------------------------------------------------------
139    TCP       Enable   NetBIOS Session Service
445    TCP       Enable   SMB over TCP
137    UDP       Enable   NetBIOS Name Service
138    UDP       Enable   NetBIOS Datagram Service
3389   TCP       Enable   Remote Desktop

However, when I went to the GUI for configuring the firewall to correct an mistake I noticed in the firewall configuration, I saw DwnMaster listed. I didn't know what that program was nor why it needed a firewall rule.

DwnMaster firewall rule

Double-clicking on DwnMaster showed that the program associated with the firewall rule was syst.exe in C:\WINDOWS\Temp.

DwnMaster using syst.exe

When I checked to see if syst.exe was running, I didn't see evidence of it running.

C:\>tasklist /fi "imagename eq syst.exe"
INFO: No tasks running with the specified criteria.

And when I checked for the existence of the file, however, though I found it, it was only zero bytes in length. I am presuming that it was nullified during an antivirus or antispyware scan of the system.

C:\>dir c:\windows\temp\syst.exe
 Volume in drive C has no label.
 Volume Serial Number is 909B-3E78

 Directory of c:\windows\temp

02/02/2007  03:32 AM                 0 syst.exe
               1 File(s)              0 bytes
               0 Dir(s)  57,556,082,688 bytes free

Looking at the "allowed programs" list for the firewall, I noticed another unusual entry, C:\win.com.

C:\>netsh firewall show allowedprogram


Allowed programs configuration for Domain profile:
Mode     Name / Program
-------------------------------------------------------------------
Enable   Remote Assistance / C:\WINDOWS\system32\sessmgr.exe
Enable   DwnMaster / C:\WINDOWS\Temp\syst.exe
Enable   TCP / C:\WIN.COM
Enable   Logitech Desktop Messenger / C:\Program Files\Logitech\Desktop Messenge
r\8876480\Program\LogitechDesktopMessenger.exe

Allowed programs configuration for Standard profile:
Mode     Name / Program
-------------------------------------------------------------------
Enable   restorea0 / c:\windows\system32\restorea0.exe
Enable   Remote Assistance / C:\WINDOWS\system32\sessmgr.exe
Enable   Logitech Desktop Messenger / C:\Program Files\Logitech\Desktop Messenge
r\8876480\Program\LogitechDesktopMessenger.exe

The name given to it was TCP, apparently in an attempt to make it less likely to stand out as possible malware.

TCP firewall rule

But I wouldn't expect to find a win.com file in the root directory of a Windows XP system.

TCP using win.com

It was also a zero byte file when I checked for its existence, however, so may also have been nullified by a previous scan of the system with antivirus or antispyware software.

C:\>dir c:\win.com
 Volume in drive C has no label.
 Volume Serial Number is 909B-3E78

 Directory of c:\

02/09/2007  02:47 AM                 0 WIN.COM
               1 File(s)              0 bytes
               0 Dir(s)  57,555,771,392 bytes free

Another allowed program that looked suspicious was restorea0 in c:\windows\system32\. But when I looked for it, I did not see it on the system. So it may have been removed completely by antivirus or antispyware software previously. At FKIYY.EXE Spyware Remove, I found it listed as one of many alternative names associated with malware detected by Prevx.

At SYST.EXE Spyware Remove, Prevx lists syst.exe as being associated with Trojan Downloader Small yt. At WIN.COM Spyware Remove, win.com is linked to Adware Virtumonde

[/os/windows/xp/firewall] permanent link

Mon, Apr 09, 2007 9:47 pm

Allow Rtvscan Access Through Windows XP Firewall

Symantec AntiVirus Corporate Edition 8.0 uses rtvscan.exe on client systems for management of those systems from the antivirus server. Rtvscan listens on UDP port 2967 on the client systems. You can determine if rtvscan.exe is running on a Windows XP or later system with the tasklist command.
C:\>tasklist /fi "imagename eq rtvscan.exe"

Image Name                   PID Session Name     Session#    Mem Usage
========================= ====== ================ ======== ============
Rtvscan.exe                 1784 Console                 0      9,736 K

From the above information, I can see that rtvscan.exe is running on the system and that it has process ID (PID) 1794. I can verify that the process with PID 1784 is listening on port 2967 on the system using the netstat command.

C:\>netstat -ano | find "1784"
UDP    0.0.0.0:1061           *:*                                    1784
UDP    0.0.0.0:2967           *:*                                    1784

You can create a firewall rule to allow the server to communicate with the client using the instructions at Configuring Windows XP Firewall for Symantec Antivirus Client through either a GUI or the command line. An example using the command line is shown below. The example below presumes the server's IP address is 192.168.0.33.

C:\>netsh firewall set portopening protocol = UDP port = 2967 name = "Symantec A
ntiVirus Client Management" mode = ENABLE scope = CUSTOM 192.168.0.33
Ok.

You can verify the firewall now has the appropriate port opening with the netsh firewall show portopening command.

C:\>netsh firewall show portopening

Port configuration for Domain profile:
Port   Protocol  Mode     Name
-------------------------------------------------------------------
10280  UDP       Enable   Windows Media Connect
10281  UDP       Enable   Windows Media Connect
10282  UDP       Enable   Windows Media Connect
10283  UDP       Enable   Windows Media Connect
10284  UDP       Enable   Windows Media Connect
10243  TCP       Enable   Windows Media Connect
22     TCP       Enable   OpenSSH
2967   UDP       Enable   Symantec AntiVirus Client Management
139    TCP       Enable   NetBIOS Session Service
445    TCP       Enable   SMB over TCP
137    UDP       Enable   NetBIOS Name Service
138    UDP       Enable   NetBIOS Datagram Service
1900   UDP       Enable   SSDP Component of UPnP Framework
2869   TCP       Enable   UPnP Framework over TCP

Port configuration for Standard profile:
Port   Protocol  Mode     Name
-------------------------------------------------------------------
10280  UDP       Enable   Windows Media Connect
10281  UDP       Enable   Windows Media Connect
10282  UDP       Enable   Windows Media Connect
10283  UDP       Enable   Windows Media Connect
10284  UDP       Enable   Windows Media Connect
10243  TCP       Enable   Windows Media Connect
139    TCP       Enable   NetBIOS Session Service
445    TCP       Enable   SMB over TCP
137    UDP       Enable   NetBIOS Name Service
138    UDP       Enable   NetBIOS Datagram Service
1900   UDP       Enable   SSDP Component of UPnP Framework
2869   TCP       Enable   UPnP Framework over TCP
3389   TCP       Enable   Remote Desktop

Port configuration for Local Area Connection:
Port   Protocol  Mode     Name
-------------------------------------------------------------------
3389   TCP       Enable   Remote Desktop

Or, alternatively, you can use the netsh firewall show state command.

C:\>netsh firewall show state

Firewall status:
-------------------------------------------------------------------
Profile                           = Domain
Operational mode                  = Enable
Exception mode                    = Enable
Multicast/broadcast response mode = Enable
Notification mode                 = Enable
Group policy version              = Windows Firewall
Remote admin mode                 = Enable

Ports currently open on all network interfaces:
Port   Protocol  Version  Program
-------------------------------------------------------------------
10243  TCP       IPv4     (null)
10280  UDP       IPv4     (null)
10281  UDP       IPv4     (null)
10282  UDP       IPv4     (null)
10283  UDP       IPv4     (null)
10284  UDP       IPv4     (null)
135    TCP       IPv4     (null)
137    UDP       IPv4     (null)
139    TCP       IPv4     (null)
138    UDP       IPv4     (null)
3389   TCP       IPv4     (null)
445    TCP       IPv4     (null)
22     TCP       IPv4     C:\Program Files\Network\OpenSSH\usr\sbin\sshd.exe
1562   TCP       IPv4     C:\WINDOWS\SYSTEM32\SVCHOST.EXE
2869   TCP       IPv4     (null)
1900   UDP       IPv4     C:\WINDOWS\SYSTEM32\SVCHOST.EXE
2967   UDP       IPv4     C:\Program Files\Symantec_Client_Security\Symantec Ant
iVirus\Rtvscan.exe

Additional ports open on Local Area Connection:
Port   Protocol  Version
-------------------------------------------------------------------
3389   TCP       Any

The netsh firewall show state command will show you what program is listening on the port. In this case it shows that Rtvscan.exe is listening on port 2967

References:

  1. Configuring Windows XP Firewall for Symantec Antivirus Client
    Written: May 30, 2005
    MoonPoint Support

[/security/antivirus/symantec/SAV-Firewall] permanent link

Sun, Apr 08, 2007 11:10 pm

ClamWin Reporting Opera Infected with Trojan.Bifrose-495

When I scanned a system with ClamWin 0.90.1, it reported that the executable opera.exe for the Opera web browser was infected with Trojan.Bifrose-495. The system has Opera 8.54 on it.

Checking the definitions timestamp in ClamWin, I saw the following:

ClamAV 0.90.1
Protecting from 107238 Viruses
Virus DB Version: (main: 42, daily: 3049)
Updated: 18:49 08 Apr 2007

I found someone else reporting the same problem on a ClamWin support forum at False Positives. And I found a post, Opera.exe: Trojan.Bifrose-495 FOUND, on an Opera community forum site, where someone posted that ClamAV reported "Trojan.Bifrose-495 FOUND" for opera.exe, though in his case it appeared he had version 7 of Opera on his system. He submitted opera.exe from his system to VirusTotal, which provides a free service allowing you to upload a file for analysis by many different antivirus programs. Only ClamAV and Fortinet identified the file as being suspicious. The other 27 antivirus scanners used by VirusTotal reported it was uninfected. ClamWin is a Windows implementation of ClamAV.

There was also another posting, Trojan.Bifrose-495? in a ClamWin forum where someone stated that ClamWin 0.88.7 reported the same infection for his copy of opera.exe. One of the ClamWin developers, sherpya, responded that it was a false positive. That person also submitted his copy to VirusTotal. The result was the same for him, with only ClamAV reporting the file as infected and Fortinet labelling it as "suspicious".

I found someone else reporting that ClamWin reported Opera was infected with Trojan.Bifrose-495 at Cleaning up a trojan, but the poster didn't appear to consider the possibility that the report may have been a false positive.

I submitted the opera.exe file from my system to VirusTotal also. One of the ClamWin developer's referred the person who posted at False Positives on the ClamWin forum to How can I report a virus that ClamWin doesn't recognise? Or a false positive?, which also suggests submitting the file to VirusTotal , if you suspect that ClamWin is reporting a false positive. The file was scanned by 23 antivirus programs. Only ClamAv and Fortinet reported an issue with the file. ClamAv reported it found "Trojan.Bifrose-495", while Fortinet reported the file as "suspicious".

I also submitted the file to Jotti's Malware Scan, which also provides a free virus scanning service. Of the 17 antivirus programs it uses, only ClamAv reported the file as infected with ClamAv reporting "Found Trojan.Bifrose-495". It scanned the file with Fortinet as well, but reported for Fortinet that "Found nothing" (see report ).

I did submit the file using the on-line form at ClamAV Virus Database as a false positive.

So what does Trojan.Bifrose-495 do? I don't know and could not find any information on it via a Google search. Though I really like ClamWin and ClamAV, using them on many systems, one major advantage I see to a program like Symantec's antivirus software, aside from real-time scanning, is that Symantec will provide you with details on how most of the viruses it identifies work. By looking at the provided details, you can determine, if your system was infected, what the virus or trojan may have done and what other indicators of the infection you should expect to find on the system. ClamAV and thus ClamWin, which is built on ClamAV, provide no virus encyclopedia you can use for reference. If this wasn't a false positive I would certainly like to know how the virus or trojan operates, not just a name for it. Does it allow someone to take remote control of the infected system? Does it send out spam from the system, delete or corrupt files, etc.?

I normally use ClamWin as an adjunct to other antivirus software on a system and don't want real-time scanning capability from it, but really would like to have further details on any infections found. I have found ClamWin identifies malware other antivirus programs sometimes miss and am very appreciative of the work done by the developers for both ClamAV and ClamWin, but, whenever they report an infected file, I often have to submit the file to VirusTotal or Jotti's Malware Scan to attempt to figure out the potential harm that may have been caused by an infection. I look at the names used for the infection by other antivirus programs that also report the submitted file is infected. I then look check virus encyclopedias they may provide or do further searching of the web using the names they use for the malware.

Details for the file I submitted:

Filename:opera.exe
Size:76.5 KB (78,336 bytes)
Created:Saturday, April 15, 2006, 1:34:26 PM
Modified:Friday, March 24, 2006, 5:40:10 PM
File Version:7730
Product Name:Opera Internet Browser
Product Version:8.54
MD5 Sum:40d2e3a6f1c1dbe7825553164a3b86d3
SHA-1 Hash:c9623b9018fb6faebef38af37ff02dad361f774d

The modification date listed on the file when I right-clicked on it and chose Properties was March 24, 2006. I installed Opera 8.54 on the system on April 15, 2006, so the modification date listed is several weeks prior to the software being installed on the system.

I also scanned the file with BitDefender 8 Free Edition, which had virus definitions of April 8, 2007, which is today's date, and Symantec AntiVirus Corporate Edition 8, which had virus definitions from April 4, 2007. Both of those antivirus programs were on the system where I ran the ClamAV scan. Both reported the file was uninfected, so I'm fairly confident at this point that ClamAV's report of the file as infected was a false positive.

References:

  1. False Positives
    Posted February 11, 2006
    ClamWin Free Antivirus Support and Discussion Forums

  2. Opera.exe: Trojan.Bifrose-495 FOUND
    Posted: December 20, 2006
    Forums - Opera Community

  3. Trojan.Bifrose-495?
    January 5, 2007
    ClamWin Free Antivirus Support and Discussion Forums

  4. Cleaning up a trojan
    December 21, 2006
    WebDeveloper.com Forum

[/security/antivirus/clamav] permanent link

Sun, Apr 08, 2007 7:53 pm

LibClamAV Error When Scanning a System with ClamWin 0.90.1

I upgraded ClamWin on a system from version 0.88.4 to 0.90.1, set it to scan all of drive C on the system and then went to bed.

When I checked the results 9 hours later, I was surprised to find ClamWin still running. I also saw lots of error messages similar to the following:


LibClamAV Error: ERROR: failed to create file: c:\docume~1\admini~\locals~1
\temp/clamav-b3e9e513a21a2f87d6834aa7fb84676.00000530.clamtmp/
_becaa_r_ndoaa_geiaa_cemaa_r_behaa_feiaa_heeaa_kdbaa_idhaa_idpaa_ldg
aa_ldoaa_idjaa_D_ideaa_idjaa_ldmaa_

On the Clamwin support forums, I found several references to the problem. At ERROR: failed to create file, shepya, one of the ClamWin developers, responded on November 12 that the problem was due to the OLE2 unpacker that is used by ClamWin attempting to unpack CAB files, but encountering problems when doing so, since the files inside the CAB file have seemingly random names and unpacking them with the OLE2 unpacker would lead to new files being created with the same name as existing files, if ClamWin didn't stop unpacking the files and produce the error message instead. Sherpya stated in his response that ClamWin first tries to unpack the CAB files with a CAB unpacker, but for Installshield CAB files, since Installshield CAB files are not supported, it then passes the file on to the OLE2 unpacker, which can't properly unpack the CAB files. Shepya states the problem is due to Microsoft using the same file signature for both CAB and OLE2 files. File Extension for .CAB also indicates that InstallShield CAB files are not compatible with Microsoft CAB files.

Shepya further stated in a December 11, 2006 posting in the same thread that "since the cab code skips the archive, so it's passed to the ole2 code that doesn't pick the correct filenames to extract and since there are a lof of garbage in file names, clamav tries to sanitize it by replacing invalid chars by a _, this causes a lot of name clashes, but I preferred to warn instead of silent ignoring." ClamWin is using ClamAV for virus scanning; it is a Windows implementation for ClamAV.

There is another thread on the topic at Scan Write Errors. Sherpya states in that one that "m$ decided to make .msi files like ole2 container just like office document, but really they are a sort of cab archives."

And in response to the LIBCLAM AV error posting on April 4, 2007 by cebo, sherpya responds that "these messages are harmless, they will be removed on next release." I certainly hope there is an improvement with the next release.

Previously, when I started ClamWin on this system before going to bed, it would be finished when I checked it in the morning. When I checked the system at 9:00 A.M. after starting it around 11:00 P.M. the previous night, I found the CPU utilization was at about 100%. ClamWin was using over half the CPU time, but Spy Sweeper was also using a considerable amount of CPU time. I stopped Spy Sweeper. Then ClamWin was getting almost all of the CPU time, with the Task Manager showing its CPU utilization fluctuating between 90% and 97%, yet it still did not complete until 7:00 P.M., almost 20 hours after I started it.

I also saw the error message LibClamAV Error: Message is not un uuencoded form during the scan.

References:

  1. ClamWin

  2. ERROR: failed to create file:
    Posted: November 6, 2006
    ClamWin Free Antivirus Support and Discussion Forums

  3. Scan Write Errors
    Posted: October 11, 2006
    ClamWin Free Antivirus Support and Discussion Forums

  4. Cabinet (file format)
    Wikipedia, the free encyclopedia

  5. File Extension for .CAB
    FILExt

  6. Object Linking and Embedding
    Wikipedia, the free encyclopedia

  7. LIBCLAM AV error
    Posted: Wednesday, April 4, 2007
    ClamWin Free Antivirus Support and Discussion Forums

[/security/antivirus/clamav] permanent link

Sun, Apr 08, 2007 12:24 pm

Excluding ClamWin Quarantine Directory When Scanning

While searching for information on error messages I was getting while scanning a system with ClamWin 0.90.1, I found a comment by one of the ClamWin developers, alch, at clamwin is scanning its own quarantine files that in version 1 the quarantined files will be encrypted in such a way that they won't be flagged as infected files on subsequent scans. The response was to a ClamWin user's complaint about the current version's default behavior of scanning files in the quarantine folder, flagging them as infected, and then quarantining them again with a different name. Alch made the statement on March 23, 2007. He also stated version 1 "is in it's final stages of development."

You can exclude ClamWin's quarantine directory from being scanned by ClamWin by following the steps listed in Excluding the Quarantine Directory from a ClamWin scan.

[/security/antivirus/clamav] permanent link

Sat, Apr 07, 2007 8:03 am

Happy Birthday Internet!

Reckoning by the publication of the first Request for Comment (RFC) document, the Internet was born April 7, 1969, when RFC 1 Title: Host Software was published by Steve Crocker.

RFC's document the protcols on the Internet. The precursor to today's Internet was the ARPANET, which was developed for the United States Department of Defense. The first RFCs were published in 1969 for the ARPANET. At first researchers distributed hard copies of the RFCs among themselves, but in December of 1969 they began distributing them using the ARPANET itself.

References:

  1. April 7, 1969: Birth of That Thing We Call the Internet
    By Tony Long
    Wired News
  2. Request for Comments
    Wikipedia, the free encyclopedia
  3. ARPANET
    Wikipedia, the free encyclopedia
  4. RFC 1 Title: Host Software
    By Steve Crocker
    IETF Tools

[/network/Internet] permanent link

Tue, Apr 03, 2007 12:01 pm

Googlebot Alert

If you would like to know when the Google webcrawler, Googlebot, visits your website you can insert the PHP code below in the home page for your site.
<?
$email = "yourname@example.com";
if( eregi("googlebot", $_SERVER['HTTP_USER_AGENT']) )
{ 
    mail($email, "Googlebot Alert", 
            "Google just indexed your following page: " .
            $_SERVER['REQUEST_URI']); 
}
?>

You will, of course, need to replace yourname@example.com with your own email address.

On a Linux or Unix system, you can issue the following commands to see how many requests for pages on your site today have come from a Googlebot visit to your site.

grep "$(date +"%d/%b/%Y")" access.log | grep -i "googlebot" | wc -l

You will need to substitute the name and location of the log file that tracks access to your site for access.log.

The $(date +"%d/%b/%Y") tells grep to look for occurrences of the current date in the form dd/mmm/YYYY, e.g. 03/Apr/2007 . In my Apache log files, entries appear similar to the one below.

66.249.66.147 - - [03/Apr/2007:09:10:42 -0400] "GET /robots.txt HTTP/1.1" 200 146

If the date is formatted in a different manner in your log file, you will need to adjust the format accordingly. You can obtain information on formatting the date with man date.

If you don't have IP addresses translated to a FQDN, e.g. if your log file records 66.249.66.147 instead of crawl-66-249-66-147.googlebot.com, which is the case for my log file, then you will need to look for the IP address range that is used by Googlebot. Googlebot's and Mediapartners-google's IP indicates that 66.249.71.x appears to be assigned to Googlebot, though reverse name lookups only work up to 66.249.71.208. You can use the following commands to search for the Googlebot IP address range 66.249.71.1 to 66.249.71.255.

grep "$(date +"%d/%b/%Y")" access.log | grep -i '66.249.66.' | wc -l

The Googlebot's and Mediapartners-google's IP article mentions that Google uses a separate bot that checks pages with Google AdSense ads on them. So, if you have Google AdSense ads on your site, then both the main Googlebot bot and the MediaPartners-Google bot will probably visit your site. The author of that article states he has seen the following IP addresses used for the Mediapartners-Google bot.

66.249.65.40crawl-66-249-65-40.googlebot.com
66.249.66.65crawl-66-249-66-65.googlebot.com

References:

  1. Googlebot Alert
    By Philipp Lenssen
    June 23, 2004
    Google Blogoscoped
  2. Googlebot's and Mediapartners-google's IP
    By Tim Johansson
    gurka.se
  3. FQDN
    Wikipedia, the free encyclopedia
  4. Internet bot
    Wikipedia, the free encyclopedia

[/network/web/search] permanent link

Valid HTML 4.01 Transitional

Privacy Policy   Contact

Blosxom logo