Yes, it is someone nearby who has broadband access and a wireless network setup. Normally the range is under a hundred feet, although I have seen...
The simple view which makes it easier to understand is that java virtual machine (now called java runtime environment)is a make believe machine...
Do you mean the password at your ISP used to access your email account? Generally you do this via the ISP email web interface first , then in OE...
First, move hijackthis to a permanent folder like C:\Program files\Hijackthis\hijackthis.exe Running it from a temp folder means you will loose...
If the drive has not failed, you can buy an adapter so you can install it in a PC, then buy a new drive, likewise with an adapter and use standard...
I see nothing in the hijackthis log. Since your sfc finished, go to belarc.com , click on downloads and get the free belarc advisor. Run it and...
You have the bagle trojan http://www.sophos.com/virusinfo/analyses/trojbagledlk.html O4 - HKLM\..\Run: [winshost.exe]...
Have you tried reinstalling firefox? It sounds like it is a failed install or that it did not get added to your firewall. Or are you referring...
I believe Yahoo has a 1.5MB limit, but it may be smaller (I saw a reference to 1024KB )
Still a couple left O4 - HKCU\..\Run: [pshower] C:\WINDOWS\System32\pshwr.exe...
No problem, I enjoy criticism ; it lets me see what I am missing. I agree that he has not made clear exactly what he has done and what he has...
It really depends on what you are trying to do. If you are just interested in having a copy of your data, you can use windows backup or just...
Did you do chkdsk C: /f /r /x
This is one of the most common problems with a laptop, failure to find the hard drive. Why? Because they get moved around, and often the hard...
There are two types of wireless and I think you mean the LAN 802.11 type. (The other is broadband WAN wireless and requires a special Wireless...
I want to confirm something. Since you have a NT based OS (WIn2k) have you disabled messenger and alerter services? Following for xp , but I...
This is one reason why I tell people that they are fooling themselves with a false sense of security by using a proxy to hide http traffic. It...
I would say that 1MB is probably bigger than the limit per email for one of the ISPs. If you go to the tools/ accounts/ select the account/...
I would definitely upgrade a power supply if I were adding additional drives or upgrading a graphics card. So your description sounds like it is...
Most of these secure delete programs have a "wipe cluster tips and free space" option. Which will overwrite previously deleted data....
Separate names with a comma.