Most boot sector viruses detected by some of the best commercial antivirus software such as Symantec's Norton Antivirus, Microsoft's Security Essentials, or Kapersky's Antivirus can not be removed by these applications. And in many cases a boot sector virus is capable of alluding these applications unless the drive is connected to a clean system that has the AV software actively running.
What is a boot sector virus? This is a computer virus that infects a diskette or hard drive in the area which contains information about the configuration of the disk. The boot sector is used by many computer operating systems to determine how to access the diskette or drive. These viruses replace the critical boot sector program used to start the computer with their own malicious program often causing frequent computer crashes, allowing other malware infections, and performance issues.
When using the recovery CD for various eMachines (T2080, T2792, T3065) with Windows XP, the computer hangs or freezes at the Name My Computer stage of the process. After spending some time researching the issue, other technicians have noted that the system is stuck trying to configure the video.
The easiest way around this is to shutdown and reboot in VGA mode as follows. If your not sure how to shutdown the computer at this point, just press and hold the power button for about 10 seconds until the computer powers off.
One of our QuickBooks Enterprise users started to get an error whenever they would run payroll and create checks. The process would complete and checks would be created but QuickBooks would display an error message "An unexpected error has occurred in 'Intuit QuickBooks Enterprise Solutions: Professional Services 14.0' and then the application would close.
It is suspected that there was an update applied that changed the security settings in the application that caused this issue because when another user that was an administrator of QuickBooks ran payroll the problem didn't occur. In addition the error message in the Windows Application Event log indicated that the failure was related to access to the employee template file, "Failed adding medicare tax item to employee template - Permission error".
Have you considered the security risk that your copier poses to your company? What about the risk to your employees and the potential lawsuits by them when their identity is stolen?
For the last several years most copier manufactures have been installing hard drives into these devices. The hard drives contain the impressions of the copies that were made whenever someone made a copy of a document. These images can exist on the copier for as long as the copier is in use and longer.
Many companies today don't own their copiers, they lease them. What happens when that copier is removed from a business and replaced with a new one? All of the companies information has just been rolled out of the business waiting for someone to discover it. In some cases the copier might be shipped to another country.
Have your employees ever used these copiers to make copies of personal medical information? Their information is at risk too. Identity theft is on the rise and your employees might be looking to blame you for allowing their information to be compromised.
Many small businesses spend big money on getting themselves noticed on the web with very little results. Often with a little effort of someone who has some basic computer skills can improve a company's presence with many of the free tools that are available.
Yext has one of those tools and they will allow you to use it for free, but like everything that is free there is still a price to be paid. If you use Yext's web listing tool to just get a report of where your business is listed it won't cost you anything but a couple of phone calls from their sales team trying to get you to use there service.
For some reason business owners have come to believe that relocating their telephone lines and Internet service can be done quickly and easily. Some of this misunderstanding and failed expectation may come from the ease of moving a cell phone number from one carrier to another. This is not the case for land line phone numbers or Internet service.
The process for upgrading QuickBooks Enterprise 2012 to QuickBooks Enterprise 2013 is fairly easy, but it may take some time depending on the number of workstations and the size of the database file.
In our client's environment, we run QuickBooks Enterprise on a Microsoft Windows Small Business Server 2011, which runs as a Virtual Machine (VM) within VMware vSphere 4.1. The first step in any upgrade is to make sure you have a good back up before proceeding.
When setting up Intuit QuickBooks POS v12 in a multi-user environment, you will likely want to have each user sign into the POS system to track their sales transactions. By default the log in requirement is disabled so when you setup a new employee you will not have the option to assign a password.
To setup employee accounts with passwords follow these steps.
Most of the Microsoft Exchange technical notes do a great job of explaining how to move a recipient's mailbox from one database to another. But there is little to be found about moving the recipient resources to different database. The short answer is that it is the same process.
So you don't have to go looking for the details, here are the steps to follow.
There are times that you may have a web site that you frequent often that gets updated which causes the site to function in unusual ways or may not work at all. Most likely the reason is that some of the files that are related to the site didn't update on your local computer. To resolve this issue you need to flush or clear the cache files from your browser. The steps below are for Microsoft Internet Explorer 10 but are similar for older versions.
- Open Internet Explorer or IE as it is often referred to.
- Select Tools from the menu or the gear icon.
- Select Internet options which will open a dialog box defaulting to the General tab.
- Click the Delete... button under the Browsing History section.
- Click the OK button at the bottom and the close Internet Explorer
- Reopen Internet Explorer and go to the web site that was having issues.
If the cache of older incompatible files was the issue, then the site should be working now. If this was not the issue, it might be a compatibility issue with Internet Explorer and may need the Compatibility View option enabled for the site.
On some occasions Windows Small Business Server 2011 will not keep accurate time. This can be a problem with some network devices attempting to connect with the server and is especially an issue with workstations that will automatically look to the small business server for their time.
By running the following command from a command prompt, you can view the current configuration and status of the Windows Time service.
On a number of occasions I have attempted to import an exported MySQL database file and received the following message.
/* SQL Error (1064): You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?# -------------------------------------------------------- # Host: ' at line 1 */
/* Error with snippets directory: The specified path was not found */
# Host: 127.0.0.1
# Server version: 5.5.40 - MySQL Community Server (GPL)
# Server OS: Win32
# HeidiSQL version: 188.8.131.5253
# Date/time: 2014-01-20 09:48:36
After completing several updates on Exchange 2013 due to another issue, we found that e-mail messages were going to the Drafts folder instead of the Sent Items folder. In addition the server was not receiving any messages either.
After further investigation we found that the Mail Transport service was failing, not immediately, which was why we didn't notice it after it was started. In this particular case the client had a secondary SMTP port configured for relay messages but that port was setup on both the Exchange 2013 CAS and Database servers but only one of the CAS server actually had the IP address assigned on the NIC. Once the relay SMTP port configuration was removed from the Database server the Mail Transport service ran fine and mail flowed through the system correctly.
Client's Macbook Pro 8 installed with OS X 10.7.5 Lion would boot up with out any chime, display the user login, but the cursor would just spin without completing the login process.
The client didn't have a backup so our first goal was to get a backup of the drive. That proved a bit of a challenge as it would not mount under any other system prior to v10.7.5. The system booted fine into the Disk Recovery partition, which allowed the disk repair to be run, however it found no issues.
Computer security is an important training topic for us with all of our clients, both consumer and business. We know that keeping your financial information safe is as important to you as it is to your bank. Your bank has likely instituted some safeguards according to established security standards which keep your financial information secure and confidential. While your bank works hard to keep your money safe, you also need do your part. The following reminders will help protect your information from online fraud and identity theft.
The first line of defense is you. It is important that you use the tools available to protect your data, which is anything that may describe who you are as well as your account numbers and passwords. Your choice of password, decision to visit a web site, open an e-mail message, or post personal data will affect the security of your personal data.
The End of Life for the Windows Server 2003 was on July 14, 2015. It was reported that as many as 8 million licenses were still active at the time of the expiration for support. All support for Windows Server 2003 including R2 have ceased unless special paid support has been arranged with Microsoft. Now is a good time to begin making plans to upgrade your old servers that may be running Windows Server 2003 and the applications you have running on them.
Not sure how this will impact your business? Then let us help you review your current install base and provide you with the man options available. This might be a great opportunity migrate applications to one of our Cloud Services like Microsoft Exchange, Nebula Data Online Backup, or VMware Cloud Air.
We had a situation where we wanted to setup an Intuit QuickBooks POS system in a locked down configuration so that it was more like a kiosk for the register attendants. There are several ways to go about this but most will lock down every user, but in our case we only wanted to affect the POS users to prevent unnecessary changes to the system.
The process we came up with uses a combination of parental rights, registry hacks, and user menu modifications. You will also need to make sure you create a special local user account that you will assign these changes to. Before attempting this process, make sure you have a backup of your system in the event something doesn't work as expected.
While working on a client’s Gateway LT2030u netbook running Windows 7, I ran into an issue resolving dns names to IP addresses. The computer had been infected with a number of malware applications, including some Trojans and a large number of adware entries in the registry. But those were all cleaned up.
Despite several attempts to clear out everything, including:
- IPCONFIG release and renew
- removing NIC adapters and rebooting
- correcting the etc/hosts file
The computer still would not resolve a simple address like www.apple.com. IPCONFIG /ALL indicated that everything was configured correctly but Windows 7 still would not resolve the dns name.
Yes, a standard PING test to a physical IP address worked fine.
Microsoft has recently released several news and technotes regarding a vulnerability recently discovered in Internet Explorer versions 6 through 11. This vulnerability could allow a hacker to compromise a computer that is browsing a web site that has been selectively changed to take advantage of this vulnerability.
News sources have reported that Internet Explorer should not be used and the US Department of Home Land Security is also warning computer users of this issue.