September 12, 2012

Vitiligo invadio el cuerpo de mi hijo


Descripción en español:
Hice este post en un vídeo para documentar mejor el progreso de mi hijo con vitiligo. Hice un video en español e InglésEspero que estos videos le ayudará en su búsqueda para encontrar un tratamiento para el vitiligo. El vitiligo es una enfermedad de la piel en la que se produce una pérdida de pigmentación (color) en ciertas áreas de la piel, lo que resulta en irregulares manchas blancas. Los vídeos están en la parte inferior.

English Description:
I made this post into a video to better document my son's progress with vitiligo. I made a video in spanish and english. Hope these videos help you in your quest to finding a treatment for vitiligo. Vitiligo is a skin condition in which there is loss of pigment (color) from areas of the skin, resulting in irregular white patches. Videos are at the bottom.


English Video



Video en Español



September 10, 2012

Vitiligo invaded my son's body

English Description:
I made this post into a video to better document my son's progress with vitiligo. I made a video in spanish and english. Hope these videos help you in your quest to finding a treatment for vitiligo. Vitiligo is a skin condition in which there is loss of pigment (color) from areas of the skin, resulting in irregular white patches. Videos are at the bottom.

Descripción en español:
Hice este post en un vídeo para documentar mejor el progreso de mi hijo con vitiligo. Hice un video en español e Inglés. Espero que estos videos le ayudará en su búsqueda para encontrar un tratamiento para el vitiligo. El vitiligo es una enfermedad de la piel en la que se produce una pérdida de pigmentación (color) en ciertas áreas de la piel, lo que resulta en irregulares manchas blancas. Los vídeos están en la parte inferior.

 English Video 


 Video en español


Why does anyone need a robots.txt? 

If you create a robots.txt file it does not mean that it will improve your search engine ranking, but it will provide robots with information regarding files you will not allow to be crawled and indexed for search engines. Whenever a robot crawls your site, the first thing it looks for is the robots.txt file. If it cannot find one it will automatically crawl and index your entire site. If you do not have a robots.txt file may also create 404 errors in your server logs, making it harder to track 404 errors.

 

A simple robots.txt file? 

Open notepad and type the following . Please note that this text will allow all robots to crawl and index all files. Save the file as robots.txt and uploaded it to the root directory of your domain.
This allows all robots to crawl all files on your server.
User-agent: * Disallow:
 
How to disallow certain files?
Open notepad and type the following. In this example you are not allowing robots to crawl the images file on your server. Please note: Disallowing a specific file to be crawled will keep it from being indexed. The file disallowed will not show up in the search engines. HOWEVER, this is only effective for friendly robots. Robots can choose to ignore your instructions.
 
This allows all robots to crawl all files except the images file.
User-agent: * Disallow: /images/
 
This will allow all robots to crawl all files except the images file and the awstats files.
User-agent: * Disallow: /images/ Disallow: /awstats/
 For every file that you do not want crawled just add it to the disallow line.
This will deny access to Googlebot-image to any files in your domain
User-agent: Googlebot-Image Disallow: /
 
This denies Googlebot-image to your images file
User-agent: Googlebot-Image Disallow: /images/
 
Upload the file to the root directory of your domain. To confirm that it has no errors go to the following site and check to make sure everything is correct. http://tool.motoricerca.info/robots-checker.phtml
 

Sex offender - Child Molester search

Free search for child molestors/sex offender who are living in your area without your knowledge. Find out how many child molestors/sex offenders are living down the block from your house. Just click on the link to your home state below and you will be taken to the sex offender registry of that state.

 

The following links will take you to your home state where you can search for child molesters that are living in your area.  

GUAM

Purpose of the Registry key Wow6432Node


What is the Purpose of Registry key: Wow6432Node?

The Wow6432 registry entry indicates that you're running a 64-bit version of Windows.
The OS uses this key to present a separate view of HKEY_LOCAL_MACHINESOFTWARE for
32-bit applications that run on a 64-bit version of Windows. When a 32-bit application queries a value under the
HKEY_LOCAL_MACHINESOFTWARE<company><product> subkey,
the application reads from the
HKEY_LOCAL_MACHINESOFTWAREWow6432Node<company><product> subkey

A "registry reflector" copies certain values between the 32-bit and 64-bit registry views (e.g., mainly for COM registration) and resolves any conflicts using a last-writer-wins approach.

What is my IP Address


What is your IP Adress?   


IP Address helps identify visitor's  geographical location such as country, region, city, latitude, longitude, ZIP  code, time zone, connection speed, ISP and domain name, IDD country code, area  code, weather station code and name using a proprietary IP address lookup  database and technology without invading the Internet user's privacy.


Below is your IP Address and other geographical information.


How to delete LSO Flash Cookies using Firefox


A new type of flash cookie is invading your system and recording your internet activities. LSO also known as Flash Cookies, are stored on the user system when you visit certain webpages and you cannot do anything about it. They function a lot like cookies and can be used to store session information. They record your browsing habits and stores them in a flash cookie so when you visit that site back, they will be able to know all your browsing history. The real problem that many users have with them is that they do not know that they exist because they are NOT stored in the same directory as the normal browser cookies.

If you do not delete them they will be stored in your system forever, tracking your every move. They never expire unless you delete them.

In Windows 7 they are located in the following location:
C:UsersComputerNameAppDataRoamingMacromedia

The following video will show you how to delete them using Firefox.



How to disable Startup Programs


Startup programs are programs that start every time Windows starts. Many of these programs do not need to start and they take up resources and slow down your computer.  Some of these programs can be viruses,  worms, spyware, and trojans. Learn how to disable them.

 

 To disable program in the Windows (XP/Vista/7) Startup:

1) Use the System Configuration Utility to safely turn off programs  that start-up through the Windows Registry. Access this utility by going to the Start -> Run

msconfig

2) Type msconfig and press Enter.
3) Under the Startup tab there is a list of all the  programs that start in the Windows Registry. By unchecking many of the  programs you can speed up the launch time of Windows. If you do not know what a program is, just search the internet for information on what it is.
4) It is recommended that you keep the lines that say ScanRegistry and SystemTray.

System_Configuration

5) Once you have unchecked all programs that you do not want to start with Windows, click OK and you will get another window like the following picture. Click Restart and wait for your system to restart and you are done.

restart


The following video will show you exactly how to disable Startup Programs stated above.


Funny pictures from around the internet

Funny pictures from around the internet.










































Worst tattoos found on the internet 1, 2, 3 and 4

Four videos of the worst tattoos found on the internet. What were they thinking?








September 8, 2012

What is hpqcxs08.dll

hpqcxs08.dll is a HPQCXS00 belonging to hp digital imaging - hp all-in-one series from Hewlett-Packard Co. Non-system processes like hpqcxs08.dll originate from software you installed on your system. As most applications store data in your system's registry, it is likely that your registry has suffered fragmentation and accumulated harmful errors.

What is wupdater.exe


updater.exe has nothing to do with Windows Update. It is spyware, which should be detected and removed by a program such as Ad-Aware or Spybot.
You should remove it. 

What is wuamgrd.exe


This is the WORM_AGOBOT.GY worm! See also trendmicro.com for more information. Use an antivirus or anti-spyware program to remove this from your system.

What is winnet.dll


winnet.dll" is part of the casinopalazzo trojan! (You will find winnet.dll, run_dos.dll, rnr.dll, taskmgn.exe, telnetxp.exe in your Windowssystem32 folder.) /winnet.dll.html 
You should remove it!

Note that "wininet.dll" is a Windows system file from Microsoft; malware often uses tricks like this to hide from users. 

What is updmgr.exe


updmgr.exe is adware. KeenValue.updmgr is an updater for eUniverse's products (KeenValue, IncrediFind, PerfectNav).
You should get rid of this in order to remove a risk to your system. 

What is twaintec.dll


twaintec.dll is part of the Twaintech Adware. It is located in the Windows folder.

From the developer: 'Twain-Tech is a software development company. We have developed a series of ad targeting applications such as Twain-Tech.dll that help advertisers deliver targeted ads. In addition to our software development, we also provide certain support services to the distributors of our software. Third party companies license and distribute our software, typically as part of their sponsorship of free software or free content. As part of any licensing of our software, Twain-Tech contractually requires all distributors to give notice concerning the presence of our software and to provide consumers access to a Twain-Tech supplied privacy policy.

What is sp.exe


This causes Internet Explorer users to get hijacked to http://www.ntsearch.com. The solution is to put the process into quaratine.

What is save.exe


The most common file with the name "save.exe" is an adware program:

The "save"-adware displays advertisements in pop-up windows whenever certain websites are visited.

It creates the folder Save inside the system's Program Files directory, then drops certain files into this folder in order to perform its adware routine.

It also uninstalls the software SaveNow from the infected machine.

You have to check the full path and the properties of this file to decide if it is dangerous or not. 

What is optimize.exe


optimize.exe" can be an Adult content dialer that dials numbers specific to porn related sites.
Alternately, "optimize.exe" can belong to an Internet connection optimizer.

You need to check the full path and properties of this file to decide if it is dangerous or not. 

What is NEWDOT~2.DLL


NEWDOT~2.DLL" or 'newdotnet_(number).dll' is an InternetExplorer Add-on that allows you to access non-standard domains such as .shop, .med, .mp3, and it provides search results when a user enters keywords in the address browser address bar, or attempts to resolve a mistaken or nonexistent URL. It is not overtly harmful in intent, but counts as Unsolicited Commercial Software as it installs behind your back and its purpose is to generate revenue for its manufacturer.

A very large range of software installs New.Net, including RealOne, AudioGalaxy, KaZaA, iMesh, Grokster, BearShare, Babylon and Radlight.

Removal: Open the Control Panel and look in the 'Add/Remove Programs' list. 

What is mxtarget.dll


mxtarget.dll is part of the Twaintech Adware program.

From the developer: 'Twain-Tech is a software development company. We have developed a series of ad targeting applications such as Twain-Tech.dll that help advertisers deliver targeted ads. In addition to our software development, we also provide certain support services to the distributors of our software. Third party companies license and distribute our software, typically as part of their sponsorship of free software or free content. As part of any licensing of our software, Twain-Tech contractually requires all distributors to give notice concerning the presence of our software and to provide consumers access to a Twain-Tech supplied privacy policy.

What is mslaugh.exe

The BLASTER.E WORM exploits the DCOM vulnerability using TCP port 135. The worm targets only Windows 2000 and Windows XP computers, and is obviously a security threat that you must deal with. 

What is msbb.exe

Part of nCase (Web3000) an advertising modul by 180Solutions.com. It is included in some freeware (adware) and starts automatically when Windows starts. You can remove it in the Control Panel.

What is istsvc.exe


istsvc.exe is part of ISTbar. This Internet Explorer add-in is spyware as well as a homepage and search page hijacker.

ISTbar may also install other parasites, including TinyBar, ToolbarCrash, SearchbarCrash, RapidBlaster and Download Plus.

If you don't recall downloading ISTbar, it may have found its way on your system by using an ActiveX control to silently install on your system by simply visiting a website. This is most commonly encountered on adult content websites.
You should remove it. 

What is gmt.exe


gmt.exe is Advertising Adware from GAIN, the Gator Advertising Information Network. This program will track all of the web sites you visit and send the information to the companies' Gain computers. You should remove it. 

What is cmesys.exe


cmesys.exe is Advertising Adware from GAIN, the Gator Advertising Information Network. This program will track all of the web sites you visit and send information about you to the companies' Gain computers. You should remove it. 

What is bridge.dll


Bridge dll is a file that is normally put onto your system by spyware. (C:WINDOWSDownloaded Program Filesbridge.dll).
You can delete this file, as well as "Bridge.ini". 

September 7, 2012

What is alchem.exe


lchem.exe is an adware component from http://www.clickalchemy.com.
It monitors your browsing behavior and sends information back to its servers. You should remove it from startup. 

What is 2_0_1browserhelper2.dll


This is a hijacker toolbar, a form of malware affecting your Internet brower. It is also known as TrojanClicker.Win32.Delf.r
You should remove it. 

What is belt.exe


File "Belt.exe" is related to the adware program "A Better Internet". In most cases you'll want to use an adware scanner to detect and remove such programs. 

What is slsvc.exe


This process implements the Software Licensing Service. Digital rights management is a technology used to protect digital products from copyright infringement. If this process consumes too much CPU time, try to stop the service and set it to Manual startup. 

Note: The slsvc.exe file is located in the folder C:WindowsSystem32. In other cases, slsvc.exe is a virus, spyware, trojan or worm! 

What is wscntfy.exe


wscntfy.exe is the Windows Security Center Notify Application, introduced in Windows XP Service Pack 2. It displays a tray icon indicating the status of Windows updates, virus protection, and firewall. 

wscntfy.exe can be disabled by going to "Services" and disabling Security Center (this is not recommented).

This service doesn't exists in Windows Vista or Windows 7! In this case "wscntfy.exe" could be the Rivarts trojan.

Note: The wscntfy.exe file is located in the folder C:WindowsSystem32. In other cases, wscntfy.exe is a virus, spyware, trojan or worm! 

What is system


This process is a single thread running on each processor, which has the sole task of accounting for processor time when the system isn't processing other threads. In Task Manager, expect this process to account for the majority of processor time unless the system is very busy processing. 

Note: Any malware can be named anything - so you should check where the files of the running processes are located on your disk. If a "non-Microsoft" .exe file is located in the C:Windows or C:WindowsSystem32 folder, then there is a high risk for a virus, spyware, trojan or worm infection!

What is regsvc.exe


The Remote Registry Service allows remote registry manipulation, and is used by certain utilities. You should disable it unless you need it for your network. This file is not essential for Windows XP. If the file exists in Windows XP, you have to check if this file is from Microsoft. This service doesn't exists in Windows Vista or Windows 7! In this case "regsvc.exe" could be a virus or trojan.

Note: The regsvc.exe file is located in the folder C:WindowsSystem32. In other cases, regsvc.exe is a virus, spyware, trojan or worm! 

What is regsvc.exe


The Remote Registry Service allows remote registry manipulation, and is used by certain utilities. You should disable it unless you need it for your network. This file is not essential for Windows XP. If the file exists in Windows XP, you have to check if this file is from Microsoft. This service doesn't exists in Windows Vista or Windows 7! In this case "regsvc.exe" could be a virus or trojan.

Note: The regsvc.exe file is located in the folder C:WindowsSystem32. In other cases, regsvc.exe is a virus, spyware, trojan or worm! 

What is PenService.exe


PenService.exe is penservice.exe is part of the Windows Ink Services Platform Tablet Input Subsystem program (WISPTIS) and is used to implement Microsoft Tablet PC functionality. More information about the Pen Service can be found on the wisptis.exe page. 

Note: The PenService.exe file is located in the folder C:WindowsSystem32. In other cases, PenService.exe is a virus, spyware, trojan or worm! 

What is pagefile.sys


Pagefile.sys is a windows system files, acts as swap file and was designed to improve performance. Windows uses it as RAM in case the application you're running on your computer ends up needing more RAM than you actually have. Usually page file is 1.5 times than your actual physical memory size, it is the recommended minimum size. The maximum size is 3 times than your actual physical memory size. Pagefile.sys is a hidden file. It means that you could see it in windows file manager only if you checked 'Show hidden files and folders' in Folder Options. 

As a system file you can’t simply delete it as you would for, say, a file that you yourself created but no longer wanted on your computer. To do so set both initial size and maximum size to zero, or click No paging file (Just right click on the workplace icon - either in start menu or on desktop - and select properties -> advanced -> performance options) then restart your computer. Your computer is no longer using pagefile.sys, and you can delete it now. To recover the pagefile.sys set some values to both initial size and maximum size the same way mentioned above. Microsoft strongly recommends that you do not disable or delete the paging file.

Note: Any malware can be named anything - so you should check where the files of the running processes are located on your disk. If a "non-Microsoft" .exe file is located in the C:Windows or C:WindowsSystem32 folder, then there is a high risk for a virus, spyware, trojan or worm infection! 

What is mstask.exe


This is the task scheduler service, responsible for running tasks at a time predetermined by the user. You can use it to start services at particular times, such as running a backup overnight. This file is not essential for Windows XP. If the file exists in Windows XP, you should ensure that it is from Microsoft. This service doesn't exists in Windows Vista or Windows 7! In this case "mstask.exe" could be a virus or trojan. 

Note: The mstask.exe file is located in the folder C:WindowsSystem32. In other cases, mstask.exe is a virus, spyware, trojan or worm! 

What is mssearch.exe


mssearch.exe is the process for the Search Engine of Windows Vista. There is also a file named mssearch.exe that is related to Microsoft SQL Server (Microsoft Search for full text indexing). 

Note: The mssearch.exe file is located in the folder C:WindowsSystem32. In other cases, mssearch.exe is a virus, spyware, trojan or worm! 

What is mdm.exe


What is mdm.exe?
Mdm.exe is the Machine Debug Manager, which is used by the Windows NT Option Pack and Microsoft Developer Studio to provide application debugging. When Script Debugging is enabled for Internet Explorer 4.0, the debug manager is initialized whenever Internet Explorer 4.0 is started. The Machine Debug Manager runs as a service and is loaded when your computer starts. If you do not use your computer for debugging purposes, you can safely turn this off.

Note: The mdm.exe file is located in the folder C:WindowsSystem32. In other cases, mdm.exe is a virus, spyware, trojan or worm!

How to Turn Off the Machine Debug Manager
If you run Microsoft Internet Explorer 5 or later, you can turn off the Machine Debug Manager by turning off script debugging. To do this, follow these steps:

 1. Open Internet Explorer.
 2. On the Tools menu, click Internet Options.
 3. Click the Advanced tab.
 4. Click to select the Disable script debugging check box, and then click OK.
 5. Close Internet Explorer.
 6. If you run Microsoft Windows 98 or Microsoft Windows Millennium Edition (Me), delete the registry value that starts the Machine Debug Manager. To do this, follow these steps.

 Important This section, method, or task contains steps that tell you how to modify the registry. However, serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these steps carefully. For added protection, back up the registry before you modify it. Then, you can restore the registry if a problem occurs. For more information about how to back up and restore the registry, click the following article number to view the article in the Microsoft Knowledge Base:
 322756 (http://support.microsoft.com/kb/322756/ ) How to back up and restore the registry in Windows
 1. Click Start, and then click Run.
 2. In the Open box, type regedit, and then click OK.
 3. In the Registry Editor, locate the following subkey:
 HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRunServices
 4. In the right pane, right-click MDM7, click Delete, and then click OK to confirm the deletion.

 NOTE: The value for your version of the Machine Debug Manager may be different from MDM7.
 5. Close the Registry Editor.

 NOTE: Running Detect and Repair in Office 2000 adds the registry entry for the Machine Debug Manager and causes it to run at startup. If this occurs on your system, use the previous procedure to remove the registry entry.

What is lsm.exe


What is lsm.exe?
SM is the Local Session Manager Service in Microsoft Windows. It is found mainly under Windows Vista/7, where it manages connections related to the terminal server on the hosted machine. It is considered a part of core Windows functionality. 

Note: The lsm.exe file is located in the folder C:WindowsSystem32. In other cases, lsm.exe is a virus, spyware, trojan or worm!


What is sdclt.exe


sdclt.exe is the process for the Vista backup tool (under Accessories > System Tools). It is used to both back up and restore files that you specify. 

Note: The sdclt.exe file is located in the folder C:WindowsSystem32. In other cases, sdclt.exe is a virus, spyware, trojan or worm! 


What is SLWinAct.exe


This process implements the Windows Activation Scheduler, and is found only in Windows Vista. It appears to be a part of the system used by Microsoft to prevent illegal copies of Vista from being used.

Note: The SLWinAct.exe file is located in the folder C:WindowsSystem32. In other cases, SLWinAct.exe is a virus, spyware, trojan or worm!

What is internat.exe


Internat.exe runs at startup; it loads the different input locales that are specified by the user. The locales to be loaded for the current user are taken from the following registry key:
HKEY_CURRENT_USERKeyboard LayoutPreload

Internat.exe loads the "EN" icon into the system tray, allowing the user to easily switch between locales. This icon disappears when the process is stopped, but the locales can still be changed through the Control Panel. Note that the locales for the "System" are loaded from here:
HKEY_USERS.DEFAULTKeyboard LayoutPreload

These locales are used by system services that are running under the Local System account, or when no user is logged on (for example, at the logon prompt). This service doesn't exists in Windows Vista or Windows 7! In this case "internat.exe" could be a virus or trojan.

Note: The internat.exe file is located in the folder C:WindowsSystem32. In other cases, internat.exe is a virus, spyware, trojan or worm! 

What is Thumbs.db


Thumbs.db is a cache file that is used by Windows in any folder it finds a picture or video. It is intended to speed up the displaying of thumbnails. Windows Explorer uses thumbs.db to view cache images when the folder is viewed in Thumbnails view. The thumbnails are created and saved once as thumbs.db instead of creating thumbnails 'on the fly' each time Windows Explorer displays the contents of a folder. Thumbs.db stores data for the following formats: JPEG, BMP, GIF, PNG, TIFF, AVI, PDF, PPTX, DOCX, HTML etc. Thumbs.db is a hidden file. It means that you could see it in windows file manager only if you checked 'Show hidden files and folders' in Folder Options. 

In Windows Vista and Windows 7, a central cache of thumbnail images was invented. The thumbcache is stored at %userprofile%AppDataLocalMicrosoftWindowsExplorer as a number of files with the name thumbcache_xxx.db where xxx is a number between 1 and 999.

Thumbs.db is totally safe to delete. It will be automatically generated next time you browse a folder in Thumbnails view. But you could disable re-creation of it. In Explorer, go to Tools, then Folder Options and click on the View tab. Check the box “Do not cache thumbnails” and click OK. You can also change this setting in the Registry. Open the Registry Editor (regedit.exe). Go to HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionExplorerAdvanced. Double-click the DisableThumbnailCache value, or go to Edit -> New -> DWORD value to create a new value by that name. Enter 1 for its value. Click Ok and close the Registry Editor when you're done; you'll have to log off and then log back on for this to take effect.

Note: Any malware can be named anything - so you should check where the files of the running processes are located on your disk. If a "non-Microsoft" .exe file is located in the C:Windows or C:WindowsSystem32 folder, then there is a high risk for a virus, spyware, trojan or worm infection!


What is winmgmt.exe


Winmgmt.exe is a core component of client management in Windows. This process initializes when the first client application connects, or runs continuously when management applications request its services.

Windows® Management Instrumentation (WMI) is a component of the Microsoft® Windows® operating system that provides management information and control in an enterprise environment. By using industry standards, managers can employ WMI to query and set information on desktop systems, applications, networks and other enterprise components. Developers can use WMI to create event monitoring applications that alert users when important incidents occur.

Note: The winmgmt.exe file is located in the folder C:WINDOWSSystem32Wbem. In other cases, winmgmt.exe is a virus, spyware, trojan or worm! 

What is wercon.exe


Wercon.exe is Windows Event Reporting, and is a part of Windows Vista/7 used to allow program crashes and other problems with the system to be reported to Microsoft for analysis. 

Note: The wercon.exe file is located in the folder C:WindowsSystem32. In other cases, wercon.exe is a virus, spyware, trojan or worm! 


What is wuauclt.exe


Windows Update AutoUpdate Client. This is a background process which checks with the Microsoft website for updates to the operating system. It shows up on the Task Manager's processes list when it is waiting for a response, such as to confirm permission to download an update. 

Note: The wuauclt.exe file is located in the folder C:WindowsSystem32. In other cases, wuauclt.exe is a virus, spyware, trojan or worm!


What is WUDFHost.exe


WUDFHost.exe is a part of Windows Vista and Windows 7. Some Windows Vista/7 drivers run in user mode (such as USB drivers), specifically in a process running the executable image WUDFHost.exe. See User Mode Driver Framework for a technical reference. 

Note: The WUDFHost.exe file is located in the folder C:WindowsSystem32. In other cases, WUDFHost.exe is a virus, spyware, trojan or worm! 


What is wpcumi.exe


wpcumi.exe is a component of the Parental Control feature of Windows Vista, which is used to allow parents to limit what their children can do within the operating system. This service doesn't exists in Windows XP or Windows 7! In this case "wscntfy.exe" could be a virus or trojan. 

Note: The wpcumi.exe file is located in the folder C:WindowsSystem32. In other cases, wpcumi.exe is a virus, spyware, trojan or worm! 


What is wmiprvse.exe


Windows® Management Instrumentation (WMI) is a component of the Microsoft® Windows® operating system that provides management information and control in an enterprise environment. By using industry standards, managers can use WMI to query and set information on desktop systems, applications, networks and other enterprise components. Developers can use WMI to create event monitoring applications that alert users when important incidents occur. 

In earlier versions of Windows, providers were loaded in-process with the Windows Management service (WinMgmt.exe), running under the LocalSystem security account. Failure of a provider caused the entire WMI service to fail; the next request to WMI restarted the service.
Beginning with Windows XP, WMI resides in a shared service host with several other services. To avoid stopping all the services when a provider fails, providers are loaded into a separate host process named Wmiprvse.exe. Multiple instances of Wmiprvse.exe can run at the same time under different accounts: LocalSystem, NetworkService or LocalService. The WMI core WinMgmt.exe is loaded into the shared Local Service host named Svchost.exe.

Note: wmiprvsw.exe is the Sasser worm!

Note: The wmiprvse.exe file is located in the folder C:WINDOWSSystem32Wbem. In other cases, wmiprvse.exe is a virus, spyware, trojan or worm!

What is winlogon.exe


The process "winlogon.exe" runs in the background. Winlogon is a part of the Windows Login subsystem, and is necessary for user authorization and Windows activation checks. 

Note: The winlogon.exe file is located in the folder C:WindowsSystem32. In other cases, winlogon.exe is a virus, spyware, trojan or worm!

What is svchost.exe


Svchost.exe" (Generic Host Process for Win32 Services) is an integral part of Windows OS. It cannot be stopped or restarted manually. This process manages system services that run from dynamic link libraries (files with extension .dll). Examples for such system services are: "Automatic Updates", "Windows Firewall", "Plug and Play", "Fax Service", "Windows Themes" and many more. 

At startup, Svchost.exe checks the services portion of the registry and constructs a list of services that it needs to load. Under normal conditions, multiple instances of Svchost.exe will be running simultaneously. Each Svchost.exe session can contain a grouping of services, so that many services can be run depending on how and where Svchost.exe is started. This allows for better control and debugging.
If the process svchost.exe uses high cpu resources, it is mostly due because the service "Automatic Updates" is downloading some new Windows update. But having a 99% or 100% cpu usage could be caused by downloads due of some hidden malware on your computer. Some malware like the Conficker worm changes the Windows Registry so that svchost loads the malware .dll file. In this case you only see the authentic svchost.exe process in the task manager! 


What is spoolsv.exe


The spooler service is responsible for managing spooled print/fax jobs. Spooling allows you to print in the background without your computer being tied up. 

Note: The spoolsv.exe file is located in the folder C:WindowsSystem32. In other cases, spoolsv.exe is a virus, spyware, trojan or worm! 


What is services.exe


This is the Services Control Manager, which is responsible for running, ending, and interacting with system services. Use this program to start services, stop them, or change their default from automatic to manual startup. 

Note: The services.exe file is located in the folder C:WindowsSystem32. In other cases, services.exe is a virus, spyware, trojan or worm! 


What is rundll32.exe


This program is part of Windows, and is used to run program code in DLL files as if they were within the actual program. However, many viruses also use this name or similar ones. This file is also commonly used by spyware to launch its own malicious code.

Note: The rundll32.exe file is located in the folder C:WindowsSystem32. In other cases, rundll32.exe is a virus, spyware, trojan or worm! 


What is msmsgs.exe


Windows Messenger from Microsoft provides online chat and instant messaging capabiltiies. 
If you don't use Windows Messenger, you can disable it as follows: Start -> Programs -> Windows Messenger -> Tools -> Options -> Preferences. Uncheck "Run this program when Windows Starts".

Note: The msmsgs.exe file is located in the folder C:Program FilesMessenger. In other cases, msmsgs.exe is a virus, spyware, trojan or worm! 

What is mobsync.exe


mobsync.exe is a mobile synchronization component of the Internet Explorer web browser. It synchronize offline web pages, and edited offline documents, calendars, and email messages.

Note: The mobsync.exe file is located in the folder C:WindowsSystem32. In other cases, mobsync.exe is a virus, spyware, trojan or worm! 



What is lsass.exe


lsass.exe is the Local Security Authentication Server. It verifies the validity of user logons to your PC or server. Lsass generates the process responsible for authenticating users for the Winlogon service. This is performed by using authentication packages such as the default, Msgina.dll. If authentication is successful, Lsass generates the user's access token, which is used to launch the initial shell. Other processes that the user initiates then inherit this token. 

Note: The lsass.exe file is located in the folder C:WindowsSystem32. In other cases, lsass.exe is a virus, spyware, trojan or worm! 


September 6, 2012

What is kernel32.dll


The Kernel32.dll file is a 32-bit dynamic link library file used in Windows 95,98 and Me. The Kernel32.dll file handles memory management, input/output operations and interrupts. When you start Windows, Kernel32.dll is loaded into a protected memory space so that other programs do not take it over. 

Note: Any malware can be named anything - so you should check where the files of the running processes are located on your disk. If a "non-Microsoft" .exe file is located in the C:Windows or C:WindowsSystem32 folder, then there is a high risk for a virus, spyware, trojan or worm infection!


What is hiberfil.sys


hiberfil.sys is a file the system creates when the computer goes into hibernation mode. Hibernate mode uses the hiberfil.sys file to store the current state (memory) of the PC on the hard drive and the file is used when Windows is turned back on. In Hibernate mode the PC power is down entirely, so you can even take the battery out, put it back in, and be right back where you were. hiberfil.sys is a hidden file. It means that you could see it in windows file manager only if you checked 'Show hidden files and folders' in Folder Options. 

hiberfil.sys is Windows system file and you can’t simply delete it as you would for, say, a file that you yourself created but no longer wanted on your computer. To delete hiberfil.sys in XP: go into Control Panel –> Power Options –> Hibernate tab. Uncheck the box, reboot your PC, and then you can delete the hiberfil.sys file. For Windows 7 or Vista run command line utility as Administrator and type “powercfg -h off”.

Note: Any malware can be named anything - so you should check where the files of the running processes are located on your disk. If a "non-Microsoft" .exe file is located in the C:Windows or C:WindowsSystem32 folder, then there is a high risk for a virus, spyware, trojan or worm infection!

What is explorer.exe


This is the user shell, which we see as the familiar taskbar, desktop, and other user interface features. This process isn't as vital to the running of Windows as you might expect, and can be stopped (and restarted) from Task Manager, usually with no negative side effects on other applications. 

Note: The explorer.exe file is located in the folder C:Windows. In other cases, explorer.exe is a virus, spyware, trojan or worm! 

What is dllhost.exe


The COM+ hosting process controls processes in Internet Information Services (IIS) and is used by many programs. For example, it loads the .NET runtime. There can be multiple instances of the DLLhost.exe process running. 

Note: The dllhost.exe file is located in the folder C:WindowsSystem32. In other cases, dllhost.exe is a virus, spyware, trojan or worm! 



What is desktop.ini


Desktop.ini is a Windows system file that stores information about customized folders. You can customize folder background, change icon or thumbnail image to a folder and create infotip by creating a Desktop.ini file for that folder. 

Desktop.ini is a hidden file. It means that you could see it in windows file manager only if you checked 'Show hidden files and folders' in Folder Options.

Desktop.ini can be deleted, but any view customizations related to the folder containing the file in question, will be reset to the system-wide default.

Note: Any malware can be named anything - so you should check where the files of the running processes are located on your disk. If a "non-Microsoft" .exe file is located in the C:Windows or C:WindowsSystem32 folder, then there is a high risk for a virus, spyware, trojan or worm infection!


What is alg.exe


Application Layer Gateway service is a component of of Windows OS. It is required if you use a third-party firewall or Internet Connection Sharing (ICS) to connect to the internet. If you end this program using the Task Manager, you will lose all Internet connectivity until your next system restart or login. 

Note: The alg.exe file is located in the folder C:WindowsSystem32. In other cases, alg.exe is a virus, spyware, trojan or worm!


What is audiodg.exe


audiodg.exe is a part of Windows Vista and Windows 7. System services like audio drivers run in different and isolated login session from the locally logged-in user in Windows Vista or Windows 7. This ensures that content and plug-ins cannot be modified by other applications (e.g. by spyware). 

Note: The audiodg.exe file is located in the folder C:WindowsSystem32. In other cases, audiodg.exe is a virus, spyware, trojan or worm!


What is ctfmon.exe


When you run a Microsoft Office XP program, the file Ctfmon.exe (Ctfmon) runs in the background, even after you quit all Office programs.

Ctfmon.exe monitors active windows and provides text input service support for speech recognition, handwriting recognition, keyboard translation, and other alternate user input forms. See How to uninstall CTFMON.EXE

Note: The ctfmon.exe file is located in the folder C:WindowsSystem32. In other cases, ctfmon.exe is a virus, spyware, trojan or worm!

What is csrss.exe


This is the user-mode portion of the Win32 subsystem; Win32.sys is the kernel-mode portion. Csrss stands for Client/Server Run-Time Subsystem, and is an essential subsystem that must be running at all times. Csrss is responsible for console windows, creating and/or deleting threads, and implementing some portions of the 16-bit virtual MS-DOS environment.

Note: The csrss.exe file is located in the folder C:WindowsSystem32. In other cases, csrss.exe is a virus, spyware, trojan or worm!