SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : Windows Vista
MSFT 514.77-0.4%Nov 4 3:59 PM EST

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
From: sammy™ -_-10/22/2007 12:48:10 AM
   of 1939
 
Windows XP Service Pack 3 FAQ
winsupersite.com

---

how to clean your new pc of junkware? is to reinstall the OS right way, using the vendor supplied recovery discs or partition

unfortunately a reinstall won't work with every pc

the Fujitsu, hp & Toshiba integrates the junk-ware into the OS install

Dell started shipping 3rd party software removal utility with dimension & inspiron, it doesn't touch dell branded apps

if an OS reinstall doesn't help; download PC Decrapifier pcdecrapifier.com, this utility automatically scans your pc for useless software and startup items and then lets you choose from a list the ones you want to remove

it makes some judgment calls and it can't distinguish between trial & paid versions of some software

but anything that you might conceivably need is deselected by default, so it's safe even for a dummie

junk-ware takes a toll on boot-times & performance, before you start pruning, fire-up your web browser and research anything you don't recognize

PC Decrapifier pcdecrapifier.com

---

I recently purchased a brand new Kensington Micro-Saver Combination Notebook Lock and overall I'm not happy with it. Perhaps the most disappointing feature of this lock, which retails for $30-$40, is that it can be opened with a penny in less than 20 seconds without damaging the lock or the device it's attached to. The technique described below can likely be applied to similar locks

Not only can a malicious attacker (aka thief) use this technique to walk away with a laptop, but also an undamaged lock that can be reset to any combination. In some cases the attacker may gain something more valuable than the laptop

These types of locks use a bar that extends through the four dials and through one end of the lock housing into a laptop or other device. The bar has 4 slots in it, allowing the rings to turn around it. Each ring has one slot in it, allowing the bar to slide when all of the rings are properly aligned. As long as any one of the dials is not in the correct position the bar cannot slide - in theory. In practice, tension can be applied to the bar so that the dials can be jammed into the correct positions, revealing the combination. The trick is to apply tension to the bar while turning the dials. For this particular lock, I've found that a coin can aid in applying the proper pressure on the bar

Slide a coin between the lock and the computer case. Wiggle the lock so the coin can be seated as close as possible to the locking bar. Bear in mind that the goal is to not cause damage to the lock or the laptop

With the coin in place, the lock will tend to lean away from the coin. By pressing the lock against the coin, squeezing the coin between the lock and computer case; push the lock perpendicular to the computer case and at the same time apply tension to the locking bar. A firm pressure is best; too much pressure may damage the lock and/or computer

With the proper pressure applied to the bar, the dials can be spun back and forth until they each stick, at which point the lock should open. With practice this can be done in well under 20 seconds by turning 2 to 3 dials at a time to start

In testing this technique, the dials seem to have a tendency to stick starting with the last digit and moving towards the first digit. This may or may not apply universally. If all but one of the digits is found, I recommend removing the coin and turning the dial of the unknown digit until the lock opens

People are creatures of habit, and in most cases the 4 digit combination used on the lock will probably be the same PIN as the owner's bank card, voice mail, luggage locks, etc. In many situations just learning the PIN may be more valuable than the laptop. In any case, the coin can now be used to turn the slot opposite the T-Bar, which will expose a red dot adjacent to the combination. When the red dot is exposed, a new combination can be chosen and set by turning the slot to its original position. This allows an attacker to reset the combination and replace the lock

This type of attack can be easily avoided if the dials of the combination lock are manufactured with grooves in each position corresponding to an incorrect digit. The bar would then jam in the grooves, making it impossible to determine if each dial is jamming in the slot; indicating a correct digit or a groove; indicating nada

I've recently reported this problem to Kensington :)
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext