How to uninstall McAffee Security Centre

If you try to remove McAffee Secuirty Centre from Add and Remove Programs in Windows’ Control Panel, you might run into trouble.  If you do, run “services.msc” and set properties on all McAfee services to disabled and recovery to “none”. Reboot computer and remove with “Add and Remove Programs”.

Job Done!


How to change drive letters in Windows

Click on Start and then Control Panel.
(Type computer management in the search box after clicking Start. Choose Computer Management.
   2   Click on the Administrative Tools link.
   In the Administrative Tools window, open the Computer Management program.
In the Computer Management window, locate the Disk Management option on the left and left-click on it.
If the Disk Management option is not visible, look under the Storage option by clicking the small arrow next to the word Storage.
On the right-hand side of the screen, locate and right-click on the drive that you wish to change the drive letter of and choose Change Drive Letter and Paths….
In the Change Drive Letter and Paths window, click on the Change… button.
The Change Drive Letter or Path dialog box will appear. Choose the drive letter you wish to assign to this partition.
Click OK.

How do I change my hosts file? Or, how can I see my domain before DNS changes propagate?

To see your domain on our system before a DNS change takes effect, either:

1) Edit your hosts file on your PC.

If you are using Windows, use “Start”, “Find”, “Files and Folders” to find a file in your windows directory (or WINNT\system32\drivers\etc) called “hosts”. Verify that the file is not “read only” by right clicking it, and choosing it’s Properties. Then open the file for editting with Notepad. There should already be an entry for “localhost”. Follow that format when you insert your domain and our IP.

On Windows98 and Windows95, the order may be ‘hostname’ then ‘IP address’. On Windows2000 and WindowsME, the order is ‘IP address’ then ‘hostname’ localhost

Then save this altered hosts file and close notepad. Make sure Windows did not silently save the file as “hosts.sam”. The filename has to be “hosts”. You may also need to reboot for the change to take effect. Next time you try to go to “”, your browser will try to find that domain at the corresponding IP instead of looking up the IP through DNS.

Mac OS 9’s hosts file format is based on RFC-1035. Mac OS 9 keeps its HOSTS file in the Preferences folder under the System folder. Edit this file and add a line for each host that you would like to map an IP to: 204.11.246.
To find the hosts file in OS X’s graphical interface:
1.  Open Finder.
2.  In the Go menu, select “Go to Folder”
3.  Type /etc for the folder name.
4.  In the list of files that appears, you should find hosts. Double click it to open it in a text editor.
5.  As in the earlier examples, the format of the file is: “”.
On unix-based systems, as well as OS X’s terminal, you can find the hosts file at /etc/hosts.

2) Or use thisother method instead.

Once you have modified your hosts file, you can flush your DNS so that you can see your new changes more quickly. Depending on your OS, there are different ways to do this:
·        For Mac OS X the command is:
lookupd -flushcache
·        For Windows the command is:
ipconfig /flushdns

Data Execution Prevention (DEP) explained

Can be found at Control Panel > System > Performance > Data Execution Prevention

Data Execution Prevention (DEP) is a security feature included in modernMicrosoft Windowsoperating systems that is intended to prevent anapplication or service from executing code from a non-executable memory region.

This helps prevent certain exploits that store code via abuffer overflow, for example. DEP runs in two modes: hardware-enforced DEP forCPUs that can mark memory pages as nonexecutable, and software-enforced DEP with a limited prevention for CPUs that do not have hardware support.

Software-enforced DEP does not protect from execution of code in data pages, but instead from another type of attack (SEH overwrite).

DEP was introduced inWindows XP Service Pack 2 and is included in Windows XP Tablet PC Edition 2005,Windows Server 2003 Service Pack 1 and later,Windows Vista, andWindows Server 2008.

Hardware-enforced DEP enables theNX bit on compatible CPUs, through the automatic use ofPAEkernel in 32-bit Windows and the native support on 64-bit kernels.Windows Vista DEP works by marking certain parts of memory as being intended to hold only data, which the NX or XD bit enabled processor then understands as non-executable.[1]

This helps preventbuffer overflow attacks from succeeding. In Windows Vista, the DEP status for a process, that is, whether DEP is enabled or disabled for a particular process can be viewed on the Processes tab in theWindows Task Manager.

In some instances, Data Execution Prevention can have theunintended consequence of preventing legitimate software from executing. In these cases, the affected software needs to be flagged as being allowed to execute code in those parts of memory, but this itself leads to a possible attack if the application isn’t rigorous in validating data that is passed into a region of memory that is marked as being executable.

If thex86 processor supports this feature in hardware, then the NX features are turned on automatically in Windows by default. If the feature is not supported by the x86 processor, then no protection is given. Outside of thex86 architecture, a version of NX also exists for Intel’sIA-64 architecture that is supported by Windows.
Software enforcement

Software DEP, while unrelated to the NX bit, is what Microsoft calls their enforcement of “Safe Structured Exception Handling”. Software DEP/SafeSEH simply checks when an exception is thrown to make sure that the exception is registered in a function table for the application, and requires the program to be built with it. However, even though it creates an impression that software DEP is related to the prevention of executing code in data pages, it is a different form of protection.


Unlike similar protection schemes available on other operating systems, DEP provides noaddress space layout randomization (ASLR, a feature nowavailable in Windows Vista), which may allowreturn-to-libc attacks that could feasibly be used todisable DEP during an attack. The possibility has now been demonstrated against Windows Hardware-enforced DEP by authors “skape & Skywing” in the following Uninformed article[1] which relies on a return-to-libc style attack. This technique relies on directly pointing the EIP register to the known service-pack-dependent location which applies the OptIn/OptOut mechanism. It is reliant on the boot-time option of OptOut/OptIn being available. If all pages are strictly enforced, then this attack will not succeed. ThePaX documentation furtherelaborates on why ASLR is necessary.


DEP is occasionally the cause of software problems, usually with older software. However, it also fixes problems with some applications, like the Age of Mythology game.[dubious–discuss]

Users have experienced problems using various command line commands that are a part of Microsoft’s Services for Unix, which is included as part of Vista as well asWindows Server 2003 R2.

In most cases, these problems may be solved by disabling the DEP features. DEP can be turned off on a per-application basis, or turned off entirely for all non-essential Windows programs and services.[2] Microsoft recommends that DEP not be globally disabled where an application crashes due to a DEP error. Instead, the author or vendor of the offending software should firstly be contacted for an updated version that does not violate DEP, or failing that, that DEP be disabled on an exception basis for the offending application only.[3]

The “COM surrogate has stopped working” error that is sometimes received in Windows Vista while viewing media folders can be corrected by turning off DEP for the dllhost.exe. This error surfaces in Windows Vista because manythird party video and audiocodecs are not DEP-compliant. This problem may also generally be resolved by updating any installed codecs to their latest versions.

DEP problems can occasionally occur with DEP-compliant core operating system components such asWindows Explorer,Internet Explorer andWindows Installer as they support in-processthird party extensions or plugins that may not be DEP-compliant.[4]


DEP controls in Windows Vista

DEP configuration for the system is controlled through switches in the Boot.ini file,[1] while opt-in or opt-out settings can be configured by using the System dialog box inControl Panel.[1]

The Boot.ini file settings are as follows: /noexecute= policy_level Note policy_level is defined as AlwaysOn, AlwaysOff, OptIn, or OptOut.OptIn: This setting is the default configuration for Windows XP. On systems with processors that can implement hardware-enforced DEP, DEP is enabled by default for limited system binaries and programs that “opt-in.” With this option, only Windows system binaries are covered by DEP by default and cannot be disabled without changing the policy to “AlwaysOff”.OptOut: This setting is the default configuration for Windows 2003 SP1. DEP is enabled by default for all processes.

A list of specific programs that should not have DEP applied can be entered using the System dialog box in Control Panel. Network administrators can use the Application Compatibility Toolkit to “opt-out” one or more programs from DEP protection. System compatibility fixes, or shims, for DEP do take effect. Also note that Windows silently disables DEP for certain executables, such as those packaged with ASPack.AlwaysOn: This setting provides full DEP coverage for the whole system. All processes always run with DEP applied. The exceptions list to exempt specific programs from DEP protection is not available. System compatibility fixes for DEP do not take effect. Programs that have been opted-out by using the Application Compatibility Toolkit run with DEP applied.AlwaysOff: This setting does not provide any DEP coverage for any part of the system, regardless of hardware DEP support.

How to – Register a DLL

On Microsoft Window’s operating systems, a DLL stands for Dynamic Link Library. DLL’s are relatively small files that include a library of functions- usually data that can be shared across multiple applications. DLL’s are called upon by various applications and can be loaded and utilized by these applications concurrently.

Registering a DLL

There are two easy ways that a DLL can be registered in your Window’s operating system’s registry, the first is the simplest, known as self registering files, the second way is to manually register a DLL.Self Registering Files
It should be noted that many DLL files are self registering, they include information required to store themselves in the operating system’s registry. As the name states, self registering files require no human intervention.

Self registering files will automatically store themselves on your machine and become accessible when needed. Besides DLL files, other types of files that are sometimes self registering include .EXE and .OCX.Manually Register Files
The second method used to register DLL files on your computer is via manual registration. Manually registering a DLL file is quite simple and can be done in only a few steps.The first step is turn on your computer, launching your Window’s operating system. Once your Window’s operating system has loaded completely, click on Start and then click on Run. In the third step, you will input in the Run field a command that tells your computer to register the DLL file. You will need to input specific information including the path and the file name. The following is a template for the command: regsvr32 “\FileName.dll”

It is important to note that path is the actually location or directory of where the file is located. Filename is obviously the name of the DLL file you will be registering. Below is a sample command: Regsvr32 “C:\Windows\System32\example.dll” Once the command is input into the Run field correctly, press Enter. Once the DLL has been registered, you should receive a confirmation in the form of a pop up box. This message will list your newly registered DLL file and confirm that is was successfully registered into the registry.