Tuesday, May 26, 2009

Integrity in Ethics - The Practice of Client Retention

Computer Works of Toledo is celebrating 10 years of serving the business communities of Northwest Ohio through the delivery of IT related products and professional services. It is fitting that as we celebrate this milestone, we are honored by a nomination for the Better Business Bureau 2009 Torch Award for Marketplace Ethics. This annual program acknowledges those who demonstrate a commitment to outstanding ethical business practices in dealings with their employees, vendors, customers and community.

Computer Works of Toledo understands that what we do is less important than how we do it. We have worked hard at forming long-term relationships by using a partnership for success approach. Some of our clients have been with us from the beginning, which is a testament to the value of that approach. Our motto, ‘Understanding Objectives – Delivering Results,’ in
conjunction with a mission statement to conduct business ethically, is only part of the equation. It takes integrity to consistently deliver that commitment to ethics across all business dealings. This is especially true when presented with difficult circumstances, such as hard economic times.

To validate our efforts, we rely on positive feedback from our clients. In his nomination, Mike Deye of Hale Performance Coatings wrote, “When computers break, work comes to a complete stop. What I am impressed with, is when a call is made for a repair, they are here like lightning! On top of that, all repairs are done 100% accurate, and usually an improvement is made.” Mr. Deye went on to say, “When I am out and about, it seems that bad service is easy to find. It has been a long quest of ours to find a company like Computer Works.”

At Computer Works of Toledo, we know that integrity in ethics in the interest of client retention is a practice that is never completely satisfied. We continually strive to improve on the delivery of our products and services to meet the expectations of our clientele. Were it not for the feedback- both positive and critical- from our loyal clients, we would not be celebrating 10 years in business or the Marketplace Ethics Torch Award nomination. As our business model evolves to meet the demands of the regional IT market, what is at our core will never change. Conducting business ethically, and with integrity, will always come first. Above all else, we are solution advisors and relationship people.


Bill Wass - Technical Services Manager

Friday, May 22, 2009

Vundo Virus Fix

Malware is a broad term that refers to software designed to infiltrate or damage a computer system without the owner's consent. Popular forms of malware include spyware, adware, fraudware, viruses, worms and trojans. These programs are responsible for a significant decrease in user productivity due to their impact on PC performance and time spent on attempted self-repair. More catastrophic results include unauthorized access to company information by outside hackers, deletion of critical information and even operating system corruption leading to complete system failure. The solution is to proactively scan for and remove malware programs on a regular basis by a qualified PC administrator using utilities designed for the task.

If your proactive efforts have not been successful at preventing infection, it is often very difficult to completely remove infections like the Vundo virus or one of the myriad of variants (now classified as “Fraud Ware”). If you have physical access to the computer, then performing a “Clean Scan” process is the most reliable method of removing the Vundo Virus; however, as we often find ourselves attacking these types of infections on remote computers. The instructions below provide a reliable method of virus removal, for at least 80% of affected computers. This process can take between 2 to 6 hours, depending on the level of infection, with the average computer taking about 3 ½ to 4 hours.

Establish the Remote session using GoToAssist (G2A), GoToAssist Express (G2A-x), Log-Me-In or a similar utility.
Make sure to upgrade the remote session to “Run As A Service” or setup the “Unattended Support” option if available

Verify the computer has a valid Antivirus program installed, and that it has the latest virus Definitions.
If no valid Antivirus program is installed, the current Antivirus product has been disabled, or the current Antivirus product is expired; then download a current Trial or Free Antivirus program such as: AVG 8.x Free or ClamWin, which are available from
http://www.filehippo.com

Download, install and update the most recent version of the following programs:
SpyBot Search and Destroy (Spybot)
http://www.filehippo.com/download_spybot_search_destroy/
MalwareBytes’ Anti-Malware (aka: MBAM)
http://www.malwarebytes.org/mbam.php
Super Antispyware.
http://www.superantispyware.com/
A reliable Registry Cleaning Utility. I recommend one or both of the following:
i. Crap Cleaner (CCleaner) -
http://www.filehippo.com/download_ccleaner/
ii. EasyCleaner -
http://personal.inet.fi/business/toniarts/ecleane.htm

Disable System Restore:
Right Click on the “My Computer” Icon
Select “Properties”
Select the “System Restore” Tab
Check the box “Turn Off System Restore”
Approve the prompt message, and Click “OK” to close the Properties Window

Perform Registry and Application Cleanup (the instructions provided here are for CCleaner. You can also perform similar operations using EasyCleaner)
Select the ”Cleaner” button (Left Margin Bar)
i. Select the “Analyze” button (at the bottom) to catalog Temp files, the browser cache, and cookies
ii. Select the “Run Cleaner” button (bottom right)
Select the “Tools” Menu (Left Margin Bar)
Select the “Uninstall” Menu Button
i. Uninstall ALL toolbars (i.e. Yahoo Toolbar, Google Toolbar, MSN Tools, etc.)
ii. Uninstall All “Browser Helper” applications (i.e. Yahoo Browser Protection, WebX, Dell Redirector, etc.)
iii. Uninstall ALL Messenger programs (i.e. AOL, MSN, Yahoo Messenger, etc.)
iv. Uninstall Google Desktop and Microsoft Desktop Search (Indexer)
v. Uninstall all “search tools” or “search assistant” applications
Select the “Startup” Menu Button
i. Delete all “deactivated” startup items
ii. Disable any item that is suspect (i.e. XP_Antispyware_2008.exe, ZEDO.exe, etc.)
Select the “Registry” Button (Left Margin Bar)
i. Select the “Scan for Issues” button (at the bottom)
ii. Select the “Fix Selected issues…” button (bottom right) – approve all prompts, but do not save the current registry values
iii. Repeat the above registry cleaning as needed until all invalid registry entries are removed – this may take 6 or more times

Restart the PC in Safe Mode (With Networking)
Use the Remote Utility to “restart in safe mode” if it is available.
If not, force the PC into Safe Mode at the next startup
i. Click “Start”
ii. Select “Run…”
iii. Type “msconfig” in the Run Command prompt and select “Ok” or press the [enter] key
iv. Select the “Start in Safe Mode with Networking” radio button
v. Click Apply
vi. Click “OK”, then select “Restart the Computer” when prompted

Once the computer is at the desktop in Safe Mode, run Malwarebytes’ Anti-Malware (MBAM) and perform a “quick scan” (this scan usually takes 20 to 25 minutes) *** This scan can be performed at the same time as the Antispyware scan below, if the computer has sufficient hardware resources

Open Super Antispyware and perform a “Quick Scan” (this scan usually takes 20 to 25 minutes) *** This scan can be performed at the same time as the MBAM scan above, if the computer has sufficient hardware resources

Open Spybot, and select the “Check For Problems” button (this scan may take up to 1 ½ hours) *** This scan can be performed at the same time as the Antivirus scan below, if the computer has sufficient hardware resources
Select “Fix All Problems” then approve any prompts from this program

Setup Spybot to automatically run on the next PC startup
Click on the “Mode” Toolbar Menu
Select “Advanced Mode” and approve the prompt
Select the “Settings” Menu button
Highlight the “Settings” sub-menu
Scroll down to the “Scan Priority” sub-menu
i. Select the “Highest” radio button
Scroll down to the “Automation” sub-menu
i. Select the “Run Spybot on the Next System Startup” radio button
ii. Select the “Run Scan when program starts” check box
iii. Select the “Fix all problems” check box
Select the “Spybot S&D” Menu Button
Close Spybot

Open the Antivirus program and perform a “Full System Scan” (this is typically a “console mode” scanner in Safe Mode and may take up to 2 hours) *** This scan can be performed at the same time as the Spybot scan above, if the computer has sufficient hardware resources

Repeat Registry Cleanup (Step # 5 above using CCleaner or Easy Cleaner)

Restart the Computer in Normal Operation Mode (Reset the MSCONFIG boot option if this method was used to force a restart in Safe Mode)

Upon login, Spybot should automatically start to run and check for problems.
If Spybot does not startup automatically, then immediately repeat/verify step 13 above.
Once Spybot completes the scan, and fixes any problems, review the “fixed” items to insure there is no evidence of persistent virus activity then close Spybot

Run the Antivirus program. Once the Antivirus program completes, review the log to insure there is no persistent virus activity, then close the Antivirus program

Open Internet Explorer and verify the Home Page and security options, and that there are no installed Toolbars

Verify the clients Data is intact and programs are working normally.
Re-install any programs which do not work normally

NOTES: If no persistent virus activity is encountered:
· Perform a final registry cleanup for EACH user login on the computer (using CCleaner or Easy Cleaner)

If persistent virus activity is encountered:
· The computer cannot be “cleaned by normal means” and should have the Hard Disk Drive formatted and the Operating system reinstalled. If a format and OS reinstallation are still not an option, then a “Clean System Scan” must be performed, or the system should be removed from service or replaced.


This tip brought to you by Computer Works IT Consultant Mike Nagy

Tuesday, May 5, 2009

Best Practices for Networks

The following recommendations are ideal for most network types found in the small and medium sized organization. We do not warrant that by following these recommendations an organization is without risk of failure. Please consult with us if you require assistance implementing any of these practices.

1. Microsoft Updates
You should disable automatic installation of Windows Updates on servers. Updates can cause unexpected results, including server failure, which can be difficult to diagnose and/or reverse. You should; however, enable automatic updates on individual workstations.


2. Antivirus
Install antivirus software on every server and every workstation. If you use an internal email server like Microsoft Exchange Server, also protect your messaging with antivirus. The most effective management of antivirus scans are virus definition updates, and threat management is achieved with a network version of antivirus that is managed by a central server. It is also important to exclude certain files and folders from virus scanning due to the possibility of data corruption. This is particularly important on servers such as domain controllers, Exchange servers, and database servers.

3. Malware Management
Malware is a broad term that refers to software designed to infiltrate or damage a computer system without the owner's consent. Popular forms of malware include spyware & adware. These programs are responsible for a significant decrease in user productivity due to their impact on PC performance and time spent on attempted self-repair. More catastrophic results can include unauthorized access to company information by outside hackers, deletion of critical information, and even operating system corruption leading to complete system failure. You should proactively scan for and remove malware programs on a regular basis.


4. Internet Security
It is generally a necessity for most organizations to be connected to the Internet in order to conduct business in real-time. The way that this connection to the Internet is established is an often overlooked security risk. Without the proper hardware in place, the information stored on your network can be accessed by unauthorized persons. There are three types of hackers: The one who wants to retrieve data for personal or resale use, the one who wants to be destructive within a vulnerable network, and the one that wants to take control of your network computers in order to send spam or attack other companies. Whatever the motive, the results can be catastrophic and expensive to a business. The solution is a firewall appliance positioned between the private internal network and the public Internet.

5. Data Protection
It is recommended that a data backup solution be devised to facilitate disaster recovery. Data can be lost in a number of different ways including: Hard drive failure, database corruption, virus activity, end-user error, natural or man-made disaster, or Internet attack by unauthorized personnel. The value of data varies widely by organization but could result in an unrecoverable loss of revenue or even business failure.


There are a number of methods available for data backup including: Rewritable CDs and DVDs, external hard drives, online storage services, remote offsite data transfers, or the more traditional method of automated backup to tape media. Regardless of the method, it is a best practice to rotate data backups to a safe offsite location and to perform at least a semi-annual restoration and disaster recovery simulation to test the viability of your solution.

6. Remote Access

Most organizations operate outside the traditional four walls of the office space. Fast, easy, and secure access to the corporate environment from remote locations is becoming a necessity. A number of recent technology enhancements, coupled with the affordability of high-speed Internet access, are making the “virtual workplace” a reality. One of the earlier generation options in this area included pcAnywhere™.


Remote access is easier than ever before and serves a number of different needs including: Access from home, access for a roaming sales force, branch office connectivity, access to servers or individual office PCs, and access for Computer Works to quickly diagnose and resolve computer-related issues without spending time traveling to the office. Microsoft® Windows® Server 2003 makes it easy with two free built-in remote access licenses.

However, it is important to understand the risks that go along with providing remote access. Proper precautions must be taken to minimize the possibility of unauthorized access. Implementing and enforcing a strong password policy is a good first step. Eight-character passwords using numbers, upper and lower case letters, and even symbols can increase security not just from outside attackers, but from internal snooping as well. Additional steps such as encryption and biometric user identification can increase security substantially.

7. Junk Email
Spam is not just a can of mystery meat anymore. Spam is Internet slang for unwanted email, primarily unsolicited commercial email. Recipients of spam often consider it an unwanted intrusion that can be a financial drain by impacting the productivity of users, the performance of computers, and the speed of Internet access because of a “clogged drain.” Spam has also been linked with fraudulent business schemes, chain letters, and offensive sexual, political, hateful, or other inappropriate messages that may violate the company’s workplace or computer-use policies.
Spam is also a favorite delivery method of viruses, worms, trojans, and other malware like spyware and adware.

The solution is to subscribe to an inexpensive service (about $45/mo. for 15 users) or install hardware or software on site that filters this content before it gets delivered to your Inbox. Worried about missing something? Most services let you view your own private quarantine so that you can release anything that was improperly categorized as spam. They will also provide the option of always allowing the sender or domain through in the future. This is referred to as a “white list”. One more bit of caution: If you ever find that your organization is unable to send email to common recipients, make sure that your domain name has not been inadvertently added to a “black list” as a source of SPAM. It happens often if your organization sends electronic newsletters or other mass emails.

8. New Microsoft Products

You should consult with a qualified Microsoft Partner before adopting any new Microsoft products for your corporate environment. Despite the media excitement over new product releases, it is important to understand what the impact will be in a production environment. New product development is exciting and is an integral part of our technical advancement over time, but a thoughtful, measured approach where thorough testing has been performed makes the most sense.

9. Toner Supplies
One area of IT that many people often overlook is printer maintenance. Regular maintenance of printers and copiers can maximize printer availability and print quality. The maintenance interval is dependent primarily on the printer’s workload and operating environment. Heavily-utilized printers and those in a harsh environment require more frequent care. There is a considerable cost savings with remanufactured and compatible consumables for your printers, fax and copy machines. You can trim your IT supplies budget for these items by as much as 50%. The newest generation of these supplies has a 100% satisfaction guarantee and the same success rate and quality as the original manufacturer (OEM) supplies. These products are available for almost all models from popular manufacturers like HP, Brother, Xerox, Canon, and Lexmark, among others. Computer Works deals with these trusted names and can help you understand the cost benefit.

10. Hardware Lifecycle Management
Most companies have equipment at various levels of age and capability. Replacing the vital parts of the IT infrastructure at predefined intervals can provide maximum resource availability, new features, and improved performance. Servers and other enterprise-level network equipment are designed to be operational around the clock for many years. Most equipment will continue to run beyond their decommissioning date, but replacing the most critical equipment before it fails allows for thorough evaluation, planning, and testing which makes for an easier transition.


These tips were brought to you by Bill Wass, Computer Works' Technical Services Manager