Category Archives: kb_vishwacloud

Webmixes – Introduction

Symbaloo

 


What is Symbaloo?

Symbaloo is a new way to organize, share your online life and discover that of others.

What does it cost to use Symbaloo?

No! Symbaloo is completely free and does not contain any banner ads.

Do I need to register?

No, you don´t need to register to use Symbaloo. In case you want to access your webmix(es) from more than one place, you can sign up for a free account!

Can I add programs from my computer to my Symbaloo desk?

Unfortunately, that is not possible.

Is it possible to use Symbaloo with my PDA, Smartphone or iPhone?

Currently, Symbaloo is not optimized for mobile devices. We hope to offer a mobile solution soon. We will let you know through our newsletter as soon as it is available.

I can´t find the answer to my question?

If you have a question about Symbaloo but can´t find the answer? Please visit Symbaloo Servicehere.

VishwaCloud NetWorX | VNX.tv

God is REAL!

SlideShare by WikiBrains

CALL FLOW – opening

HAR HAR MAHADEV
HAR HAR MAHADEV

“Remember, before opening the call think of something that makes you feel good”

Suggested Verbiage:

“Welcome to Tech Support, My Name is Oscar; How may I help you?”

————————————————————————————–

Thank the customer, and ask for Name.

“Hi Mr. Smith, How are you doing today?”

Having said that, let me clarify that, asking the question gives you space and helps in building Rapport.

Here, depending on the response, we can categorize Inbound Callers primarily, into 3 Categories:

1. Talkative

2. Finicky

3. Professional

PROFILE THE CUSTOMER AND ADAPT ACCORDINGLY

  • The Talkative Customer; would respond something like, “I am doing fine, what about you?”

HERE, TRY TO BUILD A CONVERSATION AND RAPPORT WITH THE CUSTOMER

  • A finicky customer would respond something as, “Are you Yahoo?’; “Is this AOL?”

HERE THE APPROACH SHOULD BE LOGICAL IN NATURE (for e.g; “We do provide support / coverage to Yahoo or HP as well”)

  • Whereas, a Professional customer would respond abruptly and to the point; as, “I am facing an issue with downloading the messages from Yahoo, can you help me with it?”

HERE THE APPROACH SHOULD BE PRECISE AND TO THE POINT

Assurance Statement: “Let me see what best could be done to sort out the issue” 

or

“Rest Assured, we will see what we can do about it”

Selling Techniques

English: An example of an automated online ass...
English: An example of an automated online assistant. Further information is found in the Automated online assistant article in Wikipedia. (Photo credit: Wikipedia)

 

SALE
SALE (Photo credit: Gerard Stolk (vers l’Avent))

 

 

   

 

Is fear of selling keeping you from converting your prospects into buyers? Here are my top 10 techniques for squashing fear and transferring your confidence to create happy lifetime customers.  

 

  

 

Selling… probably one of the most feared words in the English language, right up there with public speaking. But if you’ve ever persuaded someone to see things from your point of view, you’re already a salesperson. Here’s how to nip the fear of selling in the bud.   

 

What are you afraid of? Fear of success, fear of failure, acceptance, judgment, what everyone thinks about you, your clothes, your haircut, the car you drive? You know what? Forget about it.

 

Fear has to do with punishment. Don’t worry, no one is going to punish you for having an ugly web site, or lousy selling techniques. You might not get many people converting to buyers, but how can you get good at something unless you practice?

 

If you think about it, fear is just an absence of love. The only cure is to add love and compassion. That’s why the first newsletter I wrote in the summer of ’99 was… love what you do. If you honestly add value and truly want to be of service and help people, it’s a far more abundant attitude than a mere sales mentality.

 

If you are truly helpful, people will want to buy from you. All you need to do, is transfer your confidence to them. That’s all selling is really. To make someone as comfortable about their choice as possible. But they won’t be confident if you’re not.

 

That’s why, you need to know as much as possible, about what you are selling. Suppose I come to you and say, “This where I am now, but this is where I want to be.”

 

That measure, or distance between the two, is your opportunity to make the sale. This is where it’s crucial to understand, which product will best fulfill my needs. Sometimes, it’s not your product. But I expect you to know that.

 

That’s one of the biggest mistakes that salespeople make. Going after the short term, or single sale, rather than building the lifetime value or relationship with the customer. That said, here are a few rules we can apply to conquer the fear of selling, whether it’s a product, service, or selling ourselves.

 

1) People love to buy, but hate to be sold. So sell what people want to buy, not what you want to sell. One road leads to riches, the other to poverty.

 

2) Believe in your product. Know the features and benefits. But also know when it’s not right for a particular situation. People will respect your honesty.

 

3) Say the right thing on a continual basis. Stick to the truth, what you’ve experienced, the facts, and first hand proof. Avoid hearsay or stories you’ve heard others tell. In other words, keep hype to a minimum, or better yet, remove it completely. Hype doesn’t work anymore, especially on customers less than 30 years old.

 

4a) Don’t use the tired phrases and wording that everyone else is using. They don’t work anymore. (Words and phrases like; skyrocket, through the roof, amazing, fantastic, incredible, outrageous, ground-breaking, special, time limited, never again, powerful, reveal, exposed, moneymaking, fortune, profit.)

 

4b) All of the words in the list above, should be permanently banned from your sales vocabulary – and your sales letters – if you want to reach todays buyers. Todays buyers have their hype meters on full alert, and are quick to say, “bullship” totally ignoring the rest of your message. In fact, these hype words are so associated with spam that they won’t even get past most email filters.

 

5) Go after the long term relationship, even turning away business that’s not a proper fit for you, your company, or your personality. If there’s something that bothers you about a prospect, even if its a small thing, it will seem 10 times bigger down the road. Choose your clients – your relationships – carefully.

 

6) Don’t train your customers to wait for a sale. Offer good value at a fair price at all times. Above all, offer exemplary customer service. People will always return to someone, or a place, that made them good.

 

7) Think service, not sales. Ask what you can give in any situation, not what you can get. Start by being compassionate towards your customer.

 

8) People buy on emotion and later use logic, to justify a purchase decision. If you appeal to the emotion, the end result, how something will make someone feel, focusing on benefits, or feelings, as opposed to features, your conversion rates will be much higher.

 

9) Sell what you know. For knowledge is certain, not mere perception. Help customers make a wise decision. Make them feel good about their decision, by transferring your confidence to them.

 

10) Finally, when the time is right, don’t be afraid to ask for the order, with a strong call to action. Say, “Can I wrap one of those up for you?” or “Would you like to take one home with you?” On your web site do the same thing, “Click here to have it delivered to your door.” or “Click here to download it to your computer immediately.”

 

Follow these top 10 techniques to squash your fear of selling, and you’ll be well on your way to more confidence, which when transferred to your prospect, will make them a happy customer. One that rewards your desire to learn, inform and serve, with a long term relationship, returning time and again, as a customer for life.

 

 

 

The next big thing in computers

Quantum Computer
Quantum Computer (Photo credit: jurvetson)
Quantum Computing for Google Goggles
Quantum Computing for Google Goggles (Photo credit: jurvetson)
Rose’s Law for Quantum Computers
Rose’s Law for Quantum Computers (Photo credit: jurvetson)
Image representing Google Docs as depicted in ...
Image via CrunchBase

Computing as we know it will change dramatically in the next decade. Digital computing has reached a potential limit in terms of power, size of chips, and ever-decreasing costs. Otherwise referred to as the end of the prediction called Moore’s Law, this is what we are facing, an arrested development as it were.

The other big thing on the horizon is cloud computing, where we substitute our hard drives of data for life on another server, in the cloud. Cloud computing offers computing as a network service, like the electricity grid, that we plug into to send and retrieve information. But here major privacy issues may erupt. After all the information is being sent to another’s server.

One savior for both challenges may be the quantum computer. A recent study published in Science finds that quantum computing may be perfect for the cloud. But having data “out there” on the Internet as opposed to in your hard drive at home brings up privacy risks. The solution recently laid out in the paper is called “blind quantum computing.”

But let’s back up and explain quantum computing.

Its advantage comes from a computational unit called a qubit. So in computers as we typically know them today, a digital bit of data can take the form of either a 0 or a 1. The fascinating and fortunate thing with quantum computing is that a qubit can be both 0 and 1 simultaneously. Quantum computing uses photons that are sent over long distances and have operations performed on them to encode the data.

Researchers are hopeful that qubits will be able to perform tasks we simply cannot do today with digital computing. Among the top most-wanted: The ability to protect and crack encrypted communication.

With quantum computing information can be sent via cloud services like Google Docs with privacy intact.

Essentially blind computing means the data can be worked and manipulated without ever being revealed.

Right now quantum computing and cryptography remain a distant reward limited to labs, but in this recent paper scientists believe we only need to find a way to make qubits at home, while the complicated work of quantum computing can be done securely in the cloud.

“Quantum physics solves one of the key challenges in distributed computing. It can preserve data privacy when users interact with remote computing centers,” Stefanie Barz of the University of Veinna and lead author of the study, said in a publicly released statement.

As explained in a recent piece from the BBC news:

A user would send single qubits – each perfectly secure – to a remote computer, along with a recipe for the measurements to be made.

The process is completely clear to the user – for example, finding all the numbers that multiply together to reach the number 2,012 – but because the number 2,012 is encrypted, the instructions appear to be a series of random steps on an unknown number.

The remote computer blindly “entangles” the unknown bits, carries out the steps, and sends the qubits back down the line, solving the problem without ever decoding what is going on.

The team built a system demonstrating that the approach works, using a number of computational steps that might make up future computing scenarios.

Essentially this means the person who produces the qubits knows their state (or entanglement) and can decipher the outcome. But the people who do the data processing will not be able to decode the qubits. Basically the data would look like a bunch of nonsensical commands.

This research is a good first step towards realizing a possibility of having quantum computing widely available to the public, within the realm of cloud computing. Although right now the only organizations that can afford quantum computing are governments, mega-corporations, or the military. At least these recent studies promise hyper-secure computing for such organizations.

Still what is not there is the hyper-powerful quantum computer itself, although as the BBC noted earlier this January a computer could deal with 84 qubits at once. Scientists note in the abstract: This computation is the largest experimental implementation of a scientifically meaningful quantum algorithm that has been done to date.

Cost, size and complexity all need to significantly decrease, however, before quantum computing can become a reality in the consumer cloud.

2012 – tribute to STEVE JOBS

English: Apple director Steve Jobs shows iPhone
English: Apple director Steve Jobs shows iPhone (Photo credit: Wikipedia)
Steve Jobs inspiration poster
Steve Jobs inspiration poster (Photo credit: MarkGregory007)
Image representing Steve Jobs as depicted in C...
Image via CrunchBase

THE FIVE DRAGONS & Steve Jobs

Troubleshooting Windows Update

The Windows family tree.
The Windows family tree. (Photo credit: Wikipedia)
Image representing Windows as depicted in Crun...
Image via CrunchBase

Troubleshooting Windows Update:

The error messages generated while using the Windows Update site can be used to determine where the problem is occurring. Windows Update error messages can be viewed in two locations; they are displayed on the Windows Update site when the error occurs and are also entered into the WindowsUpdate.log file.

The following table lists the basic format.

Collapse this tableExpand this table

Date Time PID TID Component Text
2005-06-01 18:30:03 992 810 Misc = Logging initialized
2005-06-01 18:30:03 992 810 Misc = Process:
2005-06-01 18:30:03 992 810 Misc = Module:

The WindowsUpdate.log file is located in the %SystemRoot% directory, which is usually C:\Windows. It is important to note that there are two similarly named log files, WindowsUpdate.log is the version 5 log file, while Windows Update.log is the version 4 log file. For quick access to this file, click on Start /Run and type WINDOWSUPDATE.LOG and click OK.

To determine where an error has occurred by looking up the error code in the table below. The beginning segment will identify what Windows Update process returned the error. Once you have identified the error code and determined where it is being generated you can look up the error text in the spreadsheet for a more detailed description.

Error Prefix Process
0x8DDD???? Windows Update Web Site
0x18?????? Windows Update Web Site
0x800700?? Windows Update Web Site
0x8024???? WUS Controls (Scan for Updates)
0x8019???? Background Intelligent Transfer Service (BITS)
0x8020???? Background Intelligent Transfer Service
0x8007F??? update.exe installer
0xC???????? Corruption in C:\windows\softwaredistribution\datastore

Using the error code received from the log file, you can search for articles from Microsoft website.

Troubleshooting Windows Service Startup Problems

If you cannot start the services tool, configure the service to use the built-in system account using the following steps:

  1. Start Registry Editor (Regedit.exe).

Important: This section, method, or task contains steps that tell you how to modify the registry. However, serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these steps carefully. For added protection, back up the registry before you modify it. Then, you can restore the registry if a problem occurs.

  1. Locate the ObjectName value in the following registry key:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ServiceName

  1. On the Edit menu, click Modify.
  2. In the Value Data box, type localsystem, and then click OK.
  3. Quit Registry Editor.
  4. Attempt to restart the service. You may need to restart the computer for some services to restart properly.

Note: If you cannot start Registry Editor, you can modify the service account information by performing a parallel installation.

Troubleshooting Windows Firewall

While troubleshooting Windows Firewall, follow the basic rules mentioned below:

  1. Windows Firewall can be enabled or disabled only by administrators. It can be enabled or disabled by a Local Security Policy or Group Policy, as well—sometimes preventing access even by a local administrator.
  1. To share printers and files on a local computer that is running Windows Firewall, you must enable the File And Printer Sharing exception.
  1. If the local computer is running a service, such as a Web server, FTP server, or other service, network users cannot connect to these services unless you create the proper exceptions in Windows Firewall.
  1. Windows Firewall blocks Remote Assistance and Remote Desktop traffic by default. You must enable the Remote Desktop and/or Remote Assistance exceptions for remote users to be able to connect to a local computer with Remote Desktop or Remote Assistance.

Follow these steps to diagnose problems:

  • To verify that TCP/IP is functioning correctly, use the ping command to test the loopback address (127.0.0.1) and the assigned IP address.
  • Verify the configuration in the user interface to determine whether the firewall has been unintentionally set to Off or On with No Exceptions.
  • Use the netsh commands for Status and Configuration information to look for unintended settings that could be interfering with expected behavior.
  • Determine the status of the Windows Firewall/Internet Connection Sharing service by typing the following at a command prompt:

sc query sharedaccess

(The short name of this service is SharedAccess.) Troubleshoot service startup based on the Win32 exit code if this service does not start.

  • Determine the status of the Ipnat.sys firewall driver by typing the following at a command prompt:

sc query ipnat

This command also returns the Win32 exit code from the last start try. If the driver is not starting, use troubleshooting steps that would apply to any other driver.

  • If the driver and service are both running, and no related errors exist in the event logs, use the Restore Defaults option on the Advanced tab of Windows Firewall properties to eliminate any potential problem configuration.
  • If the issue is still not resolved, look for policy settings that might produce the unexpected behavior. To do this, type GPResult /v > gpresult.txt at the command prompt, and then examine the resulting text file for configured policies that are related to the firewall

Windows Firewall Troubleshooting Tools

Windows XP with SP2 provides the following tools for troubleshooting Windows Firewall issues:

  • Netsh firewall show commands
  • Audit logging
  • Windows Firewall logging file
  • The Services snap-in
  • The Event Viewer snap-in
  • The Netstat tool

Netsh Firewall Show Commands

To obtain information when troubleshooting Windows Firewall, use the following netsh commands:

netsh firewall show state verbose=enable

This command displays the actual state of Windows Firewall for the current set of settings, as configured by the combination of local Windows Firewall settings and Group Policy-based Windows Firewall settings, and the current set of open ports.

netsh firewall show config verbose=enable

This command displays only the local Windows Firewall settings as configured by local settings. Note that unlike the netsh firewall show state verbose=enable command, this command only shows what is configured locally, rather than the current state of the Windows Firewall. You can use this command when you want to compare what is configured locally to the actual state of Windows Firewall, to determine the changes in Windows Firewall settings due to Group Policy.

Audit Logging

To track changes that are made to Windows Firewall settings and to see which applications and services asked Windows XP to listen on a port, you can enable audit logging and then look for audit events in the security event log.

To enable audit logging on a computer running Windows XP with SP2, do the following:

  1. Log on using an account that is a local administrator.
  1. From the Windows XP desktop, click Start, click Control Panel, click Performance and Maintenance, and then click Administrative Tools.
  1. In Administrative Tools window, double-click Local Security Policy Shortcut.
  1. In the console tree of the Local Security Settings snap-in, click Local Policies, and then click Audit Policy.
  1. In the details pane of the Local Security Settings snap-in, double-click Audit policy change. Select Success and Failure, and then click OK.
  1. In the details pane of the Local Security Settings snap-in, double-click Audit process tracking. Select Success and Failure, and then click OK.
  1. Close the Local Security Settings snap-in.

You can also enable audit logging for multiple computers in an Active Directory® directory service domain using Group Policy by modifying the Audit policy change and Audit process tracking settings at Computer Configuration\Windows Settings\Security Settings\Local Policies\Audit Policy for the Group Policy objects in the appropriate domain system containers.

Once audit logging is enabled, use the Event Viewer snap-in to view audit events in the security event log.

Windows Firewall uses the following event IDs:

  • 848 – Displays the startup configuration of Windows Firewall.
  • 849 – Displays an application exception configuration.
  • 850 – Displays a port exception configuration.
  • 851 – Displays a change made to the application exceptions list.
  • 852 – Displays a change made to the port exceptions list.
  • 853 – Displays a change made to the Windows Firewall operation mode.
  • 854 – Displays a change made to Windows Firewall logging settings.
  • 855 – Displays a change made to ICMP settings.
  • 856 – Displays a change made to the Prohibit unicast response to multicast or broadcast requests setting.
  • 857 – Displays a change made to the Remote Administration setting.
  • 860 – Displays a change made to a different profile.
  • 861 – Displays an application attempting to listen for incoming traffic.

Windows Firewall Logging File

To determine whether a specific computer is dropping packets, enable Windows Firewall logging, either on an individual computer or through Group Policy settings. Then, check the Windows Firewall log file for entries that correspond to the suspected traffic.

The Pfirewall.log file, stored by default in your main Windows folder, records either discarded incoming requests or successful connections based on the Security Logging settings on the Advanced tab in the Windows Firewall component of Control Panel or through the Windows Firewall: Allow logging Group Policy setting. You can use the contents of the Pfirewall.log file to determine whether traffic is reaching the computer on which Windows Firewall is enabled without having to create an exception or enable ICMP traffic.

For example, when you select the Log dropped packets check box, all incoming traffic that is discarded by the firewall is logged in the Pfirewall.log file. You can view this file by double-clicking it in your main Windows folder with Windows Explorer. Use the contents of the log file to determine whether traffic reached your computer and was discarded by Windows Firewall.

The Services Snap-in

You use the Services snap-in to check the status of services (programs running on your computer that provide capabilities to other application programs you might run). For Windows Firewall troubleshooting, use the Services snap-in to check the status and properties of the Windows Firewall (WF)/Internet Connection Sharing (ICS) service. Once Windows Firewall has been enabled, the Windows Firewall (WF)/Internet Connection Sharing (ICS) service in the Services snap-in should be started and configured to automatically start. To use the Services snap-in for Windows Firewall troubleshooting, do the following:

  1. Click Start, click Control Panel, click Performance and Maintenance, click Administrative Tools, and then double-click Services.
  2. In the details pane of the Services snap-in, double-click the Windows Firewall (WF)/Internet Connection Sharing (ICS) service.

Startup type should be set to Automatic and the Service status should be Started.

The Event Viewer Snap-in

If the Windows Firewall (WF)/Internet Connection Sharing (ICS) service is unable to start, then it adds entries to the system event log with information about why it could not start. Additionally, audit log events corresponding to changes in Windows Firewall configuration and program requests to open ports are stored in the security event log. To view the system or security event logs, use the Event Viewer snap-in.

To view the entries in the system or security event logs with the Event Viewer snap-in, do the following:

  1. Click Start, click Control Panel, click Performance and Maintenance, click Administrative Tools, and then double-click Event Viewer.
  1. To look for error events for the Windows Firewall (WF)/Internet Connection Sharing (ICS) service, click System in the console tree of the Event Viewer snap-in.
  1. In the details pane of the Event Viewer, look for Error events.
  1. To look for audit events corresponding to applications or service attempting to open ports, click Security in the console tree of the Event Viewer snap-in.
  1. In the details pane of the Event Viewer, look for events with the event IDs 849, 850, and 861.

The following figure shows an example of an audit event in the security event log.

The Netstat Tool

The Netstat tool displays a variety of information about active TCP connections, ports on which the computer is listening, Ethernet statistics, the IP routing table, and IPv4 and IPv6 statistics. In Windows XP with SP2, the Netstat tool supports a new –b option that displays the set of components by file name that are listening on each open TCP and UDP port.

In Windows XP with SP1 and Windows XP with SP2, you can use the netstat –ano command to display the complete set of ports being listened to in numerical form and their corresponding process IDs (PIDs). You can then look up the PID in the display of the tasklist /svc command to discover the name of the process that owns the port. However, in some cases, there are multiple services within a single process and it is not possible with the netstat –ano command to determine which service within the process owns the port.

With the netstat –anb command, Netstat displays the complete set of TCP or UDP ports in numerical form, the file names corresponding to the components of the service that owns the port, and the corresponding PIDs. From the file names and the PID, you can determine which of the services in the display of the tasklist /svc command opened the port.

Troubleshooting Registry Corruption

When registry is corrupt, you may encounter different error messages such as

Windows XP could not start because the following file is missing or corrupt: \WINDOWS\SYSTEM32\CONFIG\SYSTEM

Or

Windows XP could not start because the following file is missing or corrupt: \WINDOWS\SYSTEM32\CONFIG\SOFTWARE

Recovery Steps

To restore the computer to a stable condition, perform the following actions:

  1. Use Repair Hives: Replace current registry hives with those from %windir%\Repair.
  2. Boot the Computer to Safe Mode: boot to Safe Mode in order to access the Restore Point registry files easily.
  3. Obtain Restore Point Hives: Retrieve registry hive files from a recent Restore Point and place them in a folder under %windir%.
  4. Use Restore Point Hives: Replace current registry hives with those from the folder created in the previous step.

The steps for each of these actions are given below in detail:

Use Repair Hives

The best currently accessible registry files are in the %windir%\repair directory. These need to be copied to the %windir%\system32\config folder, after renaming the files currently in place. The steps in this section should enable the computer to boot, but applications installed since the Repair registry hives were last saved will likely not function.

Use the following steps:

  1. At the Recovery Console command prompt, type the following lines, pressing ENTER after you type each line:

cd \windows\system32\config

ren system system.old

ren software software.old

ren SAM SAM.old

ren security security.old

ren default default.old

cd \

cd windows\repair

  1. This next step checks the date and time on the files in the Repair folder. It is important to determine how recently these files were updated. They could be unchanged since Windows XP was originally installed. In order to check the date and time of the files, type DIR.
  2. Note the date the files were modified for use later.
  3. Continue with the copy of files from the Repair folder to the Config folder using the following commands:

copy system C:\windows\system32\config\system

copy software C:\windows\system32\config\software

copy sam C:\windows\system32\config\sam

copy security C:\windows\system32\config\security

copy default C:\windows\system32\config\default

  1. Type exit and restart the computer

Boot the Computer to Safe Mode

You may be unable to log on to the computer in Normal Mode at this point. This can occur because the local user account passwords have been reset to the point at which the Repair registry hives were last saved.

In the event that you cannot log on, use the Administrator account, which does not have a password set by default.

Obtain Restore Point Hives

After gaining access to Windows, you can now make copies of the more recent registries from the Restore Point folders created by System Restore. To do this, use the following steps:

  1. Start Windows Explorer.
  2. On the Tools menu, click Folder options.
  3. Click the View tab.
  4. Under Hidden files and folders, click to select Show hidden files and folders, and then click to clear the Hide protected operating system files (Recommended) check box.
  5. Click Yes when the dialog box that confirms that you want to display these files appears.
  6. Double-click the drive where you installed Windows XP to display a list of the folders. If is important to click the correct drive.
  7. Open the System Volume Information folder. This folder is unavailable and appears dimmed because it is set as a super-hidden folder.

Note: This folder contains one or more _restore {GUID} folders such as “_restore{87BD3667-3246-476B-923F-F86E30B3E7F8}”. If you receive the following error message, use the steps below to add the current user to the permissions for the folder. Otherwise proceed

to step 8 below.

C:\System Volume Information is not accessible. Access is denied.

  1. Open My Computer, right-click the System Volume Information folder, and then click Properties.
  2. Click the Security tab, which will display an interface such as that shown below.
  1. Click Add, and then type the name of the current user. This is the account with which you are logged on.
  2. Click OK, and then click OK.
  3. Double-click the System Volume Information folder to open it.
  1. In the GUID folder, open a folder that was created recently. You may need to click Details on the View menu to see when these folders were created. There may be one or more folders starting with “RP x” under this folder. These are restore points.
  1. Open one of these folders to locate a Snapshot subfolder. The following path is an example of a folder path to the Snapshot folder. Also see for an image of a Snapshot folder:

C:\System Volume Information_restore{D86480E3-73EF-47BCA0EB-

A81BE6EE3ED8}\RP1\Snapshot

  1. From the Snapshot folder, copy the following files to the C:\Windows\Tmp folder:

REGISTRY_USER.DEFAULT

_REGISTRY_MACHINE_SECURITY

_REGISTRY_MACHINE_SOFTWARE

_REGISTRY_MACHINE_SYSTEM

_REGISTRY_MACHINE_SAM

  1. Rename the files in the C:\Windows\Tmp folder as follows:

Rename REGISTRY_USER.DEFAULT to DEFAULT

Rename _REGISTRY_MACHINE_SECURITY to SECURITY

Rename _REGISTRY_MACHINE_SOFTWARE to SOFTWARE

Rename _REGISTRY_MACHINE_SYSTEM to SYSTEM

Rename _REGISTRY_MACHINE_SAM to SAM

Use Restore Point Hives

Now these registry hive files can be copied to the proper location for use by the system. To do this, return to Recovery Console.

  1. At the command prompt, type the following lines, pressing ENTER after you type each line:

cd system32\config

ren sam sam.rep

ren security security.rep

ren software software.rep

ren default default.rep

ren system system.rep

copy c:\windows\tmp\software

copy c:\windows\tmp\system

copy c:\windows\tmp\sam

copy c:\windows\tmp\security

copy c:\windows\tmp\default

  1. Type exit to quit Recovery Console. Your computer restarts

The computer should start in Normal Mode, and the most recent passwords should be functional again and the final state of the computer has matching files and registry configuration.

 

Troubleshooting Scenarios

English: Windows XP Editions
English: Windows XP Editions (Photo credit: Wikipedia)

Troubleshooting Scenarios

Scenario 1: You might get an error message related to Windows Installer. This means the Windows Installer is corrupt.

Resolution: Follow the below methods to surpass the above issue:

Method 1: Reregister the Windows Installer

  1. Quit all Windows programs.
  2. Click Start, click Run, type msiexec /unregister in the Open box, and then click OK.
  3. Click Start, click Run, type msiexec /regserver in the Open box, and then click OK.
  4. Restart your computer.

Method 2: Remove the Windows Installer files

  1. Quit all Windows programs.
  2. Click Start, click Run, type msiexec /unregister in the Open box, and then click OK.
  3. In Windows Explorer, rename the following files in the %systemroot%\System32 folder:
  • Msi.dll
  • Msihnd.dll
  • Msiexec.exe

Note: If you cannot rename these files, try to rename the files at a command prompt. To start a command prompt, click Start, click Run, type cmd in the Open box, and then click OK.

  1. Restart Windows XP.

Method 3: Restart Windows XP in Safe Mode

Restart Windows XP in Safe Mode, and then retry Method 1 and Method 2

Method 4: Download latest version of Windows Installer

Download and install the latest version of Windows Installer from Microsoft website. This will upgrade the installed version.

Scenario 2

Already installed security software is not allowing to install the product thus causing a conflict or error during installation process

Ans- Do the following steps:

  1. Create a System Restore Point
  2. Check Add/ Remove Program and remove the already installed security software.
  3. If fail to do so then download the removal tool from the product manufacturer’s website and run the tool to remove the program
  4. Reboot the computer
  5. Install the security software

Scenario 3

There might be a possibility that the computer is already infected by any virus or spyware which is not allowing to install the security software

Ans- Do the following steps:

  1. Create a system restore point
  2. Update the virus definitions if there is an Antivirus/ Antispyware is already installed
  3. Run the Scan
  4. If there is no Antivirus/ Antispyware installed then you can run the online scan. Following links can be used for online scan:

Scenario 4

It might be a possibility that you have removed the already install Antivirus/ Antispyware application but it is not completely removed thus causing a conflict or error while installing another security application.

Ans- In such circumstances do the following:

  1. Download the removal tool, from the product manufacturer’s website
  2. Run the tool
  3. Reboot the computer
  4. Install another security software

Scenario 5

It might be a possibility that user is unable to use the internet after installing the security software.

Ans- This generally happens when the newly installed security software blocks the ports used to browse the web pages due to security reasons. In such scenarios do the following:

  1. Open the Security Software
  2. Go to Settings/ Advance Settings, where you can allow the ports
  3. Open or allow port number 80 and 443 to browse the website
  4. If you are using MS Outlook or any email client to check your mails then allow port numbers 110, 25.
  5. You can also contact your ISP for the port number used for SSL Accounts and the allow the given port numbers

Scenario 6

It might be a case when you are not able to boot the computer after installing the security software

Ans- In such scenarios do the following:

  1. Try to boot the computer by using LKGC
  1. Boot the computer by using Advance boot options (Safe Mode)
  2. Select the option Last known good configuration and then press Enter
  1. Perform Clean Boot
  1. Boot the computer by using Advance boot options (Safe Mode)
  2. Select Safe Mode option and then press Enter
  3. Perform clean boot by using Msconfig
  1. Use System Restore via Command Prompt
  1. Boot the computer by using Advance boot options (Safe Mode)
  2. Select Command Prompt option and then press Enter
  3. On the command prompt type the following commands:
  4. CD WINDOWS and then press Enter
  5. CD SYSTEM32 and then press Enter
  6. CD RESTORE and then press Enter
  7. RSTRUI and then press Enter
  1. Unable to boot XP based computer in Normal and Safe Mode

Computer Restarts after the XP logo. Computer is unable to boot to safe mode or any other options listed. Computer will show the ARC paths and hang at agp440 on the last line of the screen

This error is found to be caused by an incompatible/corrupted video driver.

Follow these steps to resolve the issue

  1. Boot computer in Recover Console
  2. At the Command Prompt type ListSvc Check out if you have the AGP440 listed there.
  3. Check for Agp440 service and that the startup type is set to ‘Boot’
  4. At the command prompt now type Disable Agp440 and press enter.
  5. You will receive a message that the registry setting for this service was found, and that its current startup state is ‘service_disabled’.
  6. Type exit, and then press ENTER.
  7. If you are prompted to start in Safe mode or Normal mode, start in Normal Mode.
  8. Windows XP includes default video drivers that make it possible for the system to work.

Troubleshooting

How to Manually Remove Virus

If you need to remove the virus manually then you need to perform the following steps:

Step1

  1. Create the backup by creating a System Restore Point.
  2. Check for unknown processes running in the Task Manager.
  3. If so, then highlight it and then click End Task.
  4. Check Add/Remove Programs list and uninstall any suspicious program.
  5. Check the Startup folder in your profile directory \Start Menu\Programs\Startup.
  6. Launch Windows Command Prompt
  7. Look for the directory or folder where the virus resides, generally virus resides in Temp folder and System folder: CD C:\System
  8. To show the hidden virus remove its attributes by using Attrib command: For Example Attrib -r -a -s -h ABC. Virus
  9. Delete the virus: For Example Del ABC. Virus

Step2

  1. Click Start and then click Run.
  2. Type Regedit and then press Enter, it will open Registry Editor Window.
  3. Highlight My Computer on the left Pane
  4. Press F3, to open Find Dialog box, type the virus name and then press Enter
  5. It will scan the registry hives and will highlight the searched entry.
  6. Delete the highlighted registry entry.
  7. Repeat the steps from No. 4 to 6, till it displays the message, no entry found.
  8. You can also check the following Registry Entries, if Virus entries are added to it then Delete the infected keys:
    1. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
    2. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
    3. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx
    4. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
    5. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServicesOnce HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
    6. HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Runonce

How to Manually Remove Spyware

You can remove a spyware using three methods, discussed underneath:

Remove Spyware Manually using Add or Remove Programs

  1. Clicking the “Start” button that is located on the bottom left hand corner of the desktop.
  2. From there, scroll the mouse up to the “Control Panel” button and double click this button.
  3. The Control Panel window will open, and provide you with a variety of tasks you can perform.
  4. Double click on “Add or Remove Programs”
  5. The “Add or Remove Programs” window opens and provides you with a list of programs installed on your computer.
  6. From here it is important to search for the spyware software that was installed onto your computer. Usually they will have names that are obviously associated with advertising such as Dealhelper or Bonzibuddy. You can highlight it by clicking it once.
  7. Then click the “Change or Remove” button, and follow the instructions to remove the spyware from your computer.
  8. Afterwards, it is recommended that the computer be rebooted again in normal mode.

Remove Spyware Manually Deleting Spyware Files

Another way to remove spyware manually from the computer is to research on the Internet the files that are specifically installed with a known spyware program.

From here it is just a matter of searching for these files, usually in your Windows “System” folder, and deleting them from there.

This method may cause error messages to appear when Microsoft Windows starts up, as Windows may attempt to run programs that no longer exist.

Remove Spyware Manually using HijackThis

It is also popular for many advanced users to download HijackThis and install it onto their computer.

HijackThis will return a list of all programs installed. You can also use it to manually remove registry entries installed by the spyware software.

Anti-virus reports a false positive

A false positive, also known as a false detection or false alarm, occurs when an antivirus program detects a known virus string in an uninfected file. The file, while not infected with an actual virus, does contain a string of characters that matches a string from an actual virus.

A false positive can also occur when a program performs an action, which appears to the antivirus program to be a virus-like activity.

Examples of such activity can include, but are not limited to, writing to the master boot record of the hard disk, making changes to a system file, or running a custom macro in a program such as Microsoft Word.

False detections, once confirmed, are usually corrected as soon as possible.

Troubleshooting Anti-virus false positive issues:

Situation 1: You encounter a Blue screen or DCOM error, followed by shutdown messages after you update your McAfee’s anti-virus to DAT file version 5958.

‘The file C:WINDOWS\system32\svchost.exe contains the W32/Wecorl.a Virus.

Undetermined clean error, OAS denied access and continued.

Detected using Scan engine version 5400.1158 DAT version 5958.0000.’

Resolution: McAfee has developed a SuperDAT remediation Tool to restore the svchost.exe file on affected systems.

What does the SuperDAT Remediation Tool do?

The tool suppresses the driver causing the false positive by applying an Extra.dat file in c:\program files\commonfiles\mcafee\engine folder. It then restores the svchost.exe by first looking in%SYSTEM_DIR%\dllcache\svchost.exe. If not present, it attempts a restore from the following:

  • %WINDOWS%\servicepackfiles\i386\svchost.exe
  • Quarantine.

After the tool has been run, restart your computer.

Anti-virus is unable to update itself

The auto update feature of an anti-virus can stop due to below reasons:

  • Installing a firewall
  • Poor Speed of Internet Connection
  • Elevated administrative privileges

Troubleshooting Anti-virus Auto update scenarios

Problem 1: Norton Antivirus Live Update Fails to Update with the following error:

‘Error: “LU1814: LiveUpdate could not retrieve the update list

Resolution:

Step 1: Temporarily disable your firewall (for a brief test)

  1. Start the firewall program.

Most firewall programs display a small icon in the area near the clock. Try right-clicking or double-clicking the program icon.

  1. Temporarily disable the firewall.

Read the program’s help or contact the program publisher’s support for instructions

  1. Start your Norton program and run LiveUpdate
  1. Re-enable the firewall. Do this now whether or not LiveUpdate ran successfully.
  1. Do one of the following:
  • If LiveUpdate ran successfully when your firewall was disabled, go on to line 6.
  • If LiveUpdate did not run successfully when your firewall was disabled, go to Step 3.
  1. Change the settings in the firewall program so that the program allows the following file to connect to the Internet:

C:\Program Files\Symantec\LiveUpdate\LuComServer*.exe

If you are not sure how to do this, contact the firewall program publisher. When you have changed the rule, run LiveUpdate again.

Step 2: Check settings in a Windows file

Windows Vista

  1. Click the Start button, and then click Control Panel.
  1. In the Control Panel window, click Additional Options.
  1. Click Symantec LiveUpdate
  1. In the User Account Control window, click Continue.
  1. On the FTP tab, click I want to use my Internet Options FTP settings
  1. On the HTTP tab, click I want to use my Internet Options HTTP settings.
  1. On the ISP tab, click Internet Options in the Control Panel.
  1. Click Apply > OK.

Windows XP

  1. Click Start > Control Panel.
  1. In the Control Panel window, double-click Symantec LiveUpdate.

 If you do not see Symantec LiveUpdate, on the left side, first click Switch to Classic View.

  1. On the FTP tab, click I want to use my Internet FTP setting
  1. On the HTTP tab, click I want to use my Internet HTTP settings.
  1. On the ISP tab, click Internet Options in the Control Panel.
  1. Click Apply > OK.

Step 3: Download and install the latest version of LiveUpdate

Problem 2: McAfee antivirus won’t auto update and returns the below error message:

‘McAfee Common Framework returned error 80040154@1’

Resolution:

  1. Uninstall the McAfee Virus scan from your PC.
  1. Go to: Start –> Run, and type: regedit
  1. Go to: HKEY_LOCAL_MACHINE\SOFTWARE and delete the registry folder named: “Network Associates”.
  1. Close the regedit and restart the PC.
  1. Install the McAfee, restart the PC again.

Problem 3: PC Security Shield Virus Update Fails with the error:

‘Update Failed!’

Resolution: Be sure that you are connected to the internet while starting your updates. If you are connected then it is likely that the system is simply busy from many people running updates at that moment.

Try a different server. Open The Shield Antivirus, go to Updates and then Configure and select one of the other 3 (B,C, or D) servers for updates.

Troubleshooting scenarios while Manual Update of Anti-virus software:

Situation 1: You encounter the below error message while trying to manually update AVG Antivirus 9.0:

‘The update has failed due to a binary code’

Resolution: Uninstall and then re-install AVG Antivirus 9.0.

Situation 2: You get the below error message when you try to manually update your ZoneAlarm Security Suite:

‘anti-virus update error’

Resolution: Uninstall and then re-install ZoneAlarm Security Suite.

Situation 3: After hitting the ‘Update’ button of my anti-virus, I encounter the below error message:

‘Anti-virus/Anti-spyware:

Error: Unable to install’

Cause: Few reasons responsible for the above error message can be a result of:

  • Corrupted anti-virus settings
  • Running multiple security tools
  • Operating system damaged
  • Malware malfunction

Resolution: Try a Database Reset using below steps:

  1. Hold down the Ctrl and Shift keys together
  2. Right click on the anti-virus icon near your clock in the system tray lower right corner
  3. Choose ‘Reset’ from the box that comes up
  4. Choose Yes on the Reset Settings dialog box
  5. When prompted, choose OK to restart your system
  6. Follow the on screen configuration prompts after reboot

Situation 4: The below error message pops up when you try to manually update your AVG software:

‘The connection with update server has failed’

Cause: Your Internet connection is not fully functional.

Resolution: Follow the below steps to rectify the above issue:

  1. Open menu Start -> (Settings) -> Control Panel.
  2. Double-click on Network connections.
  3. Right-click on Local area connection and select Repair.
  4. Try to update AVG.

Situation 5: While trying to update my AVG anti-virus, you might encounter the below error message:

‘Invalid Update Control CTF File’

Cause: The above error message occurs due to temporary update files.

Resolution: Follow the below steps to delete the temporary update files:

  1. Double-click the AVG icon in the Notification area.
  2. Click the Tools menu and click Advanced Settings
  3. Navigate to the Manage option in the Update branch.

(The Manage option is included in AVG version 8.0.233 and higher.)

  1. Click the Delete temporary update files button.
  2. Click Yes to confirm removal

Situation 6: When trying to update your McAfee VirusScan Enterprise 8.5i edition, you encounter an error message similar to following:

‘Error occurred while loading COM componet:{9BE8D8A1-2DB5-4A29-A95F-50C8B27820DA}.

2006-12-6 19:26:21 HEWEI\Administrator Error occurred while getting point product callback component interface………….’

Cause: Registry entry corruption.

Resolution: Delete the below registry entry:

HKEY_LOCAL_MACHINE\SOFTWARE\Network Associates\ePolicy Orchestrator\Application Plugins\VIRUSCAN8000

Troubleshooting Antivirus Post Installation issues

Three common troubleshooting steps that resolve almost all antivirus issues are discussed below:

  • Update your antivirus software

Missing antivirus software updates could be the cause of your computer’s problem. To make sure your antivirus is up to date, follow these steps:

  1. Click to open Microsoft Security Center.
  2. Click Malware protection.
  3. If your software needs to be updated, click Update now.

If Windows can detect your antivirus software, it will be listed under Virus protection.

If your antivirus software is not displayed in Windows Security Center, go to the downloads section of your antivirus software provider’s website. Find the update for your version of the software and your operating system, and then install it. For more information, check the Help for your antivirus software.

Most antivirus software updates are free, but some providers charge a small fee for the updates. If you’re using an older version of the software, you might also have to pay to upgrade to a more recent version to continue to receive the updates.

  • Check for multiple antivirus programs running on your computer

Running two antivirus software programs on your computer at the same time is not recommended because the two programs can interfere with each other. Even if you don’t think your computer could be running two antivirus programs, antivirus software can sometimes come bundled with your computer and it might be running without your knowledge. To check if two antivirus programs are running, follow these steps:

  1. Click the Start button, click Control Panel, click System and Maintenance, and then click Administrative Tools.
  2. Double-click Services. If you are prompted for an administrator password or confirmation, type the password or provide confirmation.
  3. Look at the list of services under the Name column. If you find two antivirus programs, right-click each service associated with one of the programs, and then click Stop. Note that there may be multiple services running for one antivirus program.
  • Contact the antivirus manufacturer

If you’ve completed the previous steps, it is recommended to contact the antivirus manufacturer directly for additional support.

Troubleshooting Real-Time Problems:

Situation 1: After you install CA anti-virus, the system starts running very slow.

Cause:

  • The CA Anti-Virus real time monitor scans an MSP file
  • Windows is trying to update / access the MSP file at the same time
  • An activity with the MSP file causes step (a) to repeat
  • An activity with the MSP file at step (a) causes step (b) to repeat.
  • Steps (a) and (b) go in a loop.
  • As computer’s memory is consumed for this process; it blocks you from other activities.

Resolution: Run the CA Anti-Virus hot fix that was released for this problem.

Situation 2: After installing McAfee antivirus 14, your MS Outlook 2007 does not open. Furthermore, you encounter the below error message each time you try to open your Outlook:

‘The add-in “McAfee Anti-Spam”  (c:\program~2\mcafee\msk\mskolplg.dll) cannot be loaded and has been  disabled by Outlook. Please contact the Add-in manufacturer for an  update. If not available, please uninstall the Add-in.’

Resolution: Follow the below steps to resolve the above error:

  1. Click trust center
  2. from the left pane click Add-ins
  3. Under manage (at the bottom) uncheck any addon for mcafee / do the same for Disabled item
  4. Close outlook and open it back to apply the effect

Situation 3: While trying to fix issues using Symantic, you encounter the above error message:

‘Error 1304: Error writing to file c:\programfiles\symantec antivirus\visurs defs/naveng.sys’

Resolution: Follow the below steps to resolve the issue:

  1. Open the system in safe mode and logon as the administrator.
  2. Uninstall Symantic anti-virus using ‘Add and Remove’ option.
  3. Now reinstall the latest version of the software.

Situation 4: When trying to open the AVG to scan the system, you encounter the below error message:

‘C:\Program Files(x86)\AVG\AVG9\avgui.exe

The application has failed to start because its side-by-side configuration is incorrect. Please see the application event log or use the command-line sxstrace.exe tool for more detail.’

Resolution: Uninstall AVG completely and reinstall it.

Situation 5: Your system shuts down several times in a day and generates the below error message:

‘Problem caused by antivirus or firewall program. Firewall or antivirus program caused blue screen error.’

The problem has been occurring since you updated your CA anti-virus software.

Cause: The updates are incompatible with your system or not downloaded correctly.

Resolution: Uninstall and then reinstall CA anti-virus software.