Kill Rogue Malicious Process

Internet Security 201x is a fake antivirus software, displaying lots of fake warning.


If your PC is a victim of such rouge malicious process (yes its not a virus, which remains undetected even with best antivirus security suite).

Then run following command in start–> run

taskkill /F /IM isecurity.exe

follow the syntax and case sensitivity

execute the command few more times to make sure that the process is not running anymore.

Remove these registry entries
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run “Internet Security 201x?

Remove these Internet Security 201x files:
All Users\Application Data\isecurity.exe
All Users\AppData\isecurity.exe

Its now time to install legitimate antivirus.
make a full scan with latest antivirus
make windows update
restart your PC

Bluecoat Proxy – Site restriction

Hey, sysadmin’s

Those administering Bluecoat Proxy SG appliance and has encountered that allowing certain sites/url for selected users does not work properly.

This is due to that the main site accessing  different subsites/urls in background for providing the associated services.

All those sites/urls have to be taken into consideration while providing access to particular site.

Well lets take for example you give access to only hotmail/ and its not working properly then in that case the following all urls needs to be permitted for flawless working:

hotmail site     

and for facebook here are the URL which includes games apps too.

facebook site


Aggregators / Scrapers beware

WordPress bloggers, technologist, twitters, face fans, linkedin n host of socialist beware of information aggregation or scraping, since google has launched algorithm change.

as per Mattcutts 
searchers are more likely to see the sites that wrote the original content rather than a site that scraped or copied the original site’s content. and hence this effective step.

great work google, keep innovating….

10 things to look for in a data center

Everyone’s going to the cloud. The cloud’s all the rage. Almost no IT discussion is complete without mentioning “the cloud.” But when it comes down to it, the cloud is nothing more than systems hosting information in a data center somewhere “out there.”

Organizations have discovered the benefits of offloading infrastructure development, automatic failover engineering, and multiple coordinated power feeds, not to mention backups, OS maintenance, and physical security, to third-party data centers. That’s why “going to the cloud” ultimately makes sense.

Unfortunately, not every data center is ready for prime time. Some have sprung up as part of a cloud-based land grab. Review these 10 factors to ensure that your organization’s data center is up to the task.

1: Data capacity

2: Redundant power

3: Backup Internet

4: Automatic hardware failover

5: Access control

6: 24×7×365 support

7: Independent power

8: In-house break/fix service

9: Written SLAs

10: Financial stability

more here

Zero Day Attack

An airliner’s controls abruptly fail mid-flight over the Atlantic. An oil tanker runs aground in Japan when its navigational system suddenly stops dead. Hospitals everywhere have to abandon their computer

databases when patients die after being administered incorrect dosages of their medicine. In the Midwest, a nuclear power plant nearly becomes the next Chernobyl when its cooling systems malfunction.

At first, these random computer failures seem like unrelated events. But Jeff Aiken, a former government analyst who quit in disgust after witnessing the gross errors that led up to 9/11, thinks otherwise. Jeff fears a more serious attack targeting the United States computer infrastructure is already under way. And as other menacing computer malfunctions pop up around the world, some with deadly results, he realizes that there isn’t much time if he hopes to prevent an international catastrophe.

Written by a global authority on cyber security, Zero Day presents a chilling “what if” scenario that, in a world completely reliant on technology, is more than possible today—it’s a cataclysmic disaster just waiting to happen.

Ever, since i read the first chapter (only 7 pages) am just waiting desperately for the release of the book to grab it…

      Mark Russinovich works at Microsoft in the Windows Azure product team as a Technical Fellow, Microsoft’s senior-most technical position. Mark earned a Ph.D. in computer engineering from Carnegie Mellon University and he joined Microsoft when it acquired Winternals Software, which he co-founded in 1996. He is also author of the popular Sysinternals Windows administration and diagnostic tools. He is coauthor of the Microsoft Press Windows Internals book series, a contributing editor for TechNet Magazine, and a senior contributing editor for Windows IT Pro Magazine.

more here
book review here

Terminal Server Performance Best Practices

Often a minor changes to Terminal Server results in tremendous performance. Tweaking and maintaining the server performance to acceptable level is always a challenging issue.

Here am sharing recently tweaked settings resulting in little but effective performance increase:

feel free to share your tips.

Decreasing the memory usage of OfficeScan client on a terminal server

source: here


A terminal server hosts multiple user sessions at once and OfficeScan starts up the client GUI for each session.

Use this solution to modify the default settings so that the OfficeScan client GUI does not start up for every session, which in turn can help save system memory.


Please do the following:


Log on to the OfficeScan management console.


Go to Networked Computers > Client Management.


Select the OfficeScan client and then click to Settings > Privileges and Other Settings > Other Settings tab.


Under Client Console Access Restriction, select the Do not allow users to access the client console from the system tray or Windows Start menu check box.


Click Apply to All Clients.

By setting this restriction, your users will not be able to access the client console from the system tray or Windows Start menu. OfficeScan will run in the background and will continue to provide protection from security risks. This setting will also save you 6.5 to 7 MB of memory for each session in the terminal server.