Thursday, February 16, 2006
Google: windows 2000 net time command line ntp
Windows as an NTP client
About.com Windows 2000 net time command: NTP sync
net time \\computername /set /y
Without the "/set /y," you will simply see the time that the other machine has. Without the "/y" you will be prompted for whether or not you want to actually change the local time.
Installing Windows 2000
Sunday, October 23, 2005
NAV Corp. 7.6 Quarantine Fails
After I logged in as the local administrator, Norton AntiVirus Repair Wizard reports that a virus was detected. I step through the wizard and attempt to quarantine the infected items, but this fails.
- Updates installed
- Repair quarantined items?
- Repair fails
Resolution
I ran a full virus scan, manually, and when it came up clean I cleared out Quarantine. See my next posting for details.Screen Shots
Updates installed
Repair quarantined items?

Repair fails

Checking Up On Infected Files
- Right-click on a file name in the Virus History listing
- Select Move to Quarantine... Quarantine fails ambiguously
- Select Delete Permanently... Removal fails ambiguously

Monday, April 25, 2005
Yarden: wireless network security deserves more scrutiny
Friday, April 08, 2005
Fake Microsoft security updates circulate
An e-mail campaign designed to lure people to a bogus Microsoft Web site is making the rounds as part of an attempt to install a Trojan horse, antivirus company Sophos said Friday.
Monday, April 04, 2005
The six dumbest ways to secure a wireless LAN
The six dumbest ways to secure a wireless LAN by ZDNet's George Ou -- by describing the worst way to secure your WLAN, Mr. Ou illuminates the best practices. He has recently posted quite a few good articles on the many security issues involved in using Wi-Fi networking. From the article:
For the last three years, I've been meaning to put to rest once and for all the urban legends and myths on wireless LAN security. Every time I write an article or blog on wireless LAN security, someone has to come along and regurgitate one of these myths. If that weren't bad enough, many "so called" security experts propagated these myths through speaking engagements and publications and many continue to this day.
Free Malware removal tools for Windows
Saturday, April 02, 2005
Critical flaws in IE and Outlook discovered
The vulnerabilities allow for remote code execution with no actions from the computer user ... there is the potential of attackers installing backdoor Trojans without a person's knowledge.
Remember, surf safe! Friends don't let friends use Microsoft.