2023/03/14

How to forcefully remove the printer from system peripherals?

In Windows, it is possible to add (connect) a printer to the system by using the appropriate function in the printers and fax section (in Windows XP), devices and printers (in Windows 7), devices -> printers and scanners (in Windows 10).

Similarly, the removal of a printer from the system is normally achievable through the appropriate function found in the same section.

However, it can rarely happen that Windows gets stuck in a perpetual waiting state and the connection to the printer is never actually removed, even after restarting the PC!



CAUSE

The most likely explanation is that the Windows print spooler service (spoolsv.exe) has become stuck. In computer science, a Spool (Simultaneous Peripheral Operations On-line) refers to a technique that uses the disk as a temporary buffer to store incoming data from input devices or save output data until output devices are ready to accept them.

For example, when a user decides to print a document, to avoid blocking the computer in the printing activity, the operating system sends the file to the print spooler. In this way, the operating system immediately becomes fully available for any other type of activity, while the spooling software takes care of sending the individual pages to the printer, allowing it the time necessary to complete the job.

If this service does not start or does not work well, Windows is not able to manage any printer, and no operation can be performed on devices and printers.


SOLUTION

Force the elimination of the printer in question through the Windows registry.

  • For Windows XP: press START-> RUN and type regedit
  • For Windows 7: launch the regedit command in the appropriate text box that appears by clicking on the Windows Start icon.
  • Before proceeding, create a backup of the system registry. Inside the registry, search for the key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Print\Printers.
  • Under this entry, all printers installed in the system are listed and can be removed by selecting them with the right mouse button and choosing delete. Obviously, only delete the one that is not working! 
  • Restart the PC.

At this point, the problematic printer will no longer be present on the PC. This procedure does not uninstall the drivers of a printer but simply forces its removal from the list of those available on the PC (managed by the spoolsv.exe service).


PERSONAL EXPERIENCE:

In at least one case, I had to resort to regedit because Windows 7 refused to remove the printer, even after restarting! Even closing the device window resulted in error messages and prompted me to restart file explorer (without results). Instead, with the manual method through regedit, Windows immediately removed the printer!

2023/02/28

ChatGPT: How AI Technology is Revolutionizing Online Conversations

ChatGPT is a natural language model developed by OpenAI. The model was trained on a large corpus of English text, which enables it to understand and generate coherent and relevant sentences.



To use ChatGPT, one needs to access a platform or application that supports integration of the model. Once connected to ChatGPT, one can ask questions or make requests using natural language. ChatGPT will then use its language model to understand the question and provide an answer.

There are some best practices to keep in mind to get the most out of ChatGPT. For example, it is important to formulate questions clearly and concisely, using common natural language and avoiding jargon or slang.

Furthermore, it is important to understand that ChatGPT does not have the ability to understand the emotional or social context of conversations. Therefore, clear and respectful communication is necessary, avoiding the use of offensive or discriminatory language.

Finally, it is important to understand that ChatGPT may not be able to provide precise or complete answers to all questions. However, with adequate training and appropriate use, ChatGPT can be a useful support tool for many online activities.

It is important to note that ChatGPT was trained on English text, which means its ability to understand and generate text in other languages may be limited. However, there are versions of the model trained on other languages, such as ChatGPT-2 Italian, which can be used to support conversations in other languages.

ChatGPT Plus is an advanced and paid version of the natural language model ChatGPT developed by OpenAI. Compared to the standard version, ChatGPT Plus has been trained on a larger corpus of text and with more advanced machine learning algorithms, which means it is able to produce more accurate and coherent answers to user questions.


CAPABILITIES

The capabilities of ChatGPT are the result of training on a large corpus of text, which enables it to understand and generate coherent and relevant sentences. In particular, ChatGPT was trained using a machine learning technique called "transformer model," which was specifically developed to process and understand natural language text.

One of the main capabilities of ChatGPT is its ability to generate coherent and relevant text from a simple question or request in natural language. This ability makes it suitable for many applications, such as chatbots, virtual assistants, and customer support tools.

Furthermore, ChatGPT has demonstrated the ability to generate text in many different styles and tones, depending on the context and purpose of the conversation. For example, it can generate humorous, serious, technical, or academic text, depending on the user's needs.

ChatGPT is also able to understand and respond to complex questions and requests, using the information contained in the context of the conversation. For example, if a user asks "What are the best sushi restaurants in Tokyo?", ChatGPT will be able to understand the request and provide a list of sushi restaurants in Tokyo.

Finally, ChatGPT has demonstrated the ability to process the context of a conversation, even through multiple conversations. This capability makes it suitable for many applications, such as voice assistants for mobile devices, customer support chatbots, and virtual assistants for the home.

In general, the capabilities of ChatGPT make it an important technology for the development of natural language-based artificial intelligence applications. With adequate training and appropriate use, ChatGPT can significantly improve the user experience in many online and offline applications.


POSSIBLE USE CASES

There are many practical examples of using ChatGPT in various sectors and applications. Below are some examples:

  • Customer support chatbot: ChatGPT can be used to develop customer support chatbots that can understand users' questions and requests and provide relevant responses. For example, an airline company could use a customer support chatbot to answer passengers' questions about flight bookings, schedules, fares, cancellation policies, etc.
  • Virtual assistant: ChatGPT can be used to develop virtual assistants that can help users perform specific tasks, such as booking a hotel room, ordering food, or purchasing a product online. For example, a virtual assistant for an e-commerce site could help users find desired products, provide information about shipping and payment options, and answer questions about the return policy.
  • Machine learning tools: ChatGPT can be used to develop machine learning tools that can understand and analyze natural language text. For example, ChatGPT could be used to develop a grammar correction application that can identify and correct grammar and spelling errors in texts.
  • Voice assistant: ChatGPT can be used to develop voice assistants for mobile devices and smart homes, such as Siri, Alexa, or Google Assistant. These voice assistants can understand users' natural language and respond to questions or perform specific tasks. For example, a voice assistant could be used to turn on the lights in the house, adjust the temperature, or play music.
  • Content creation support tools: ChatGPT can be used to develop content creation support tools, such as automatic writing software or text generators. These tools can help users create content more efficiently and accurately. For example, a text generator could be used to automatically write product descriptions, reviews, or reports.

In summary, ChatGPT can be used in many sectors and applications to improve users' experience and increase the efficiency of business processes.


THE LIMITATIONS

Although ChatGPT has demonstrated many capabilities and potential uses, it also has some limitations that are worth considering.

Firstly, it is important to note that ChatGPT is an artificial intelligence model and does not have the ability to understand the deep meaning of words or phrases it processes. This means it may not always understand the emotional or social context of a conversation, which could lead to inadequate or insensitive responses.

Secondly, since ChatGPT was trained on a corpus of text, it may reflect biases present in that corpus. For example, if the corpus contains stereotypes or discrimination, it's possible that ChatGPT may reflect them in its responses. This could lead to inadequate or potentially offensive responses for some users.

Thirdly, ChatGPT may not always be able to provide precise or complete answers to all questions. This could be due to limitations in the corpus of text it was trained on or the complexity of the question itself. In these cases, it may be necessary to seek additional sources of information or qualified professionals to obtain a precise and complete answer.

Finally, it's important to note that ChatGPT may not be able to understand or generate text in all languages or dialects. This means its usefulness may be limited in some multilingual or multicultural contexts.

[LINK] OpenAI


PERSONAL EXPERIENCE:

Here's an example of an interaction:

When I asked:

"What will be the fuel for cars of the future?"

ChatGPT replied:

"There are several alternative power technologies that are being developed to replace traditional gasoline or diesel-powered internal combustion engines. Here are some of the main options for future car fuels:

Electric vehicles (EVs): these are already available on the market and use electric energy to power electric motors. EVs are powered by batteries that can be recharged from a home electrical outlet or a public charging station. Battery range and charging speed are continually evolving.

Hybrid vehicles: these vehicles combine a traditional internal combustion engine with an electric motor. Hybrid vehicles can run on both fuel and electric energy and can have better fuel efficiency than traditional internal combustion engine vehicles.

Alternative fuels: there are various alternative fuels in development, such as hydrogen, ethanol, methanol, biomethane, and biodiesel. However, the infrastructure to distribute these fuels globally still needs to be developed, and in many cases, production costs are still high.

Hydrogen cars: these vehicles use fuel cells to generate electricity, which powers electric motors. Hydrogen is used as fuel to produce the necessary electric energy. Developments in this technology are making hydrogen use increasingly competitive with other power technologies.

In summary, the fuel for future cars will depend on market needs and preferences, government policies, and the availability of natural resources. However, it appears that EVs and hydrogen vehicles are gaining ground as the most promising options for the future of transportation."

©REPRODUCTION RESERVED


2018/03/27

How to Send large files up to 30 GB free (Now are 50 GB!!)

Some recurrent questions:

  • How can I send large files for free?
  • How can I send a 20 GB file?
  • What is the best app to send large files?

If you need to send very large files or folders (e.g. 10 GB) by email, most email providers will not allow you to use your mail service.

You can circumvent this limitation by taking advantage of the service offered by the file sharing service: "FILEMAIL" 

Through this site you must:
  • Select the huge files present on your computer and that you have to send, 
  • Write your email address and the recipient's address
  • Enter a title (subject) and a text for the message. 
Then press enter and start uploading your file to the FILEMAIL servers.




Once the upload has been completed, the website sends an email to the recipient containing one link. The addressee will click to proceed the download of the file.

In essence, the addressee receives only the file link in his mailbox, and has a predefined number of days to download the file.

FILEMAIL offers 4 tariff plans (with different characteristics), one of which is completely free of charge.
  • FILEMAIL Free
  • FILEMAIL Pro - $10,00/month
  • FILEMAIL Business - $12,00/month
  • FILEMAIL Enterprise - $40,00/month
Already with the free FILEMAIL plan you have a remarkable service at your disposal:
  • Maximum size of annexes: 30 GB 50 GB
  • Days of availability on servers: 7 
  • Unlimited Downloads
  • Tracking of items
In addition, there are software and plugins that can help you to use this service.
There is a specific FILEMAIL APP for Android and iPhone/iPAD devices so you can easily send huge files from smartphones and tablets.

There is a Desktop software native for Windows, Mac, Linux & Unix! So you can send files and folders directly from your desktop or integrate it into your applications. 


Filemail Desktop is a small application you can install on your computer and that have features like:
  • Unstable internet connection? No problem with this rock solid transfer protocol!
  • Can be used for both uploading and downloading files
  • Fast transfer speeds using TCP/UDP Transfer acceleration protocols
  • Script/Automation support (command line/xml)
  • Free to use - no account/registration required!!

There is a Filemail Outlook Addin that lets you send large files directly from Outlook. The attachments are removed from the email and uploaded to Filemail servers instead - keeping your email small and deliverable. It's fast, secure and very easy to use. It is compatible with Outlook 2013/2016/2019.


Filemail APIs
If you are developer, you can integrate Filemail into your application and use the cloud infrastructure to send large files and emails.
It's easy to automate transfers by using .bat/.sh files.
Read more about Filemail APIs here: https://www.filemail.com/api



[Web Link]: FILEMAIL

PERSONAL EXPERIENCE:
FILEMAIL Free is one of the few services that provides free of charge, such a large space (30 GB 50 GB), usually you get to a maximum of 2 GB. You can also use FILEMAIL Free of charge without having to register an account.

Directly from the FAQs on the site, you can learn that FILEMAIL servers are connected directly to the main networks of Level3, GTT, NTT, Tata, NLayer, AMS-IX, Cogent and many others with BGP4. This means that all file transfers are faster than other cloud services.

There is an other simply way to quickly send files using an EXE program/script. I tried to use the FilemailCLI.exe for Windows (but there is a version also for Linux).
See here https://www.filemail.com/ApiDoc/FilemailLibs.aspx
Usage:

Filemail.exe [options]
  --help                 Display this help message
  --username arg         Your email address (Optional)
  --userpassword arg     Your password. Register at www.filemail.com if you
                         don't have one. (Optional)
  --files arg            Files that you want to send (Required)
  --to arg               Comma separated list of email addresses to send to
                         (Optional)
  --from arg             Email address to send from
                         (Optional)
  --subject arg          Subject of the transfer email that it sent to the
                         recipient(s) (Optional)
  --message arg          Message of the transfer email that it sent to the
                         recipient(s) (Optional)
  --transferpassword arg Password of transfer that is sent (Optional)
  --notify arg           Do you want to be notified when recipients download
                         your files? [true]/[false] (Optional)
  --confirmation arg     Do you want an email confirmation after sending the
                         files? [true]/[false] (Optional)
  --days arg             Number of days the file(s) will be available for
                         download (Optional)


Example:


Filemail.exe --username test@gmail.com --userpassword 4nfj38 

  --files "C:\cacert.pem" "C:\poco-1.7.5-all.zip" "C:\MyFolder" 
  --to myfriend@hotmail.com joe@email.net --subject "Files from me" 
  --message "Hi, here are your files" --transferpassword "Pa33W0rD" 

  --notify false --confirmation true --days 6

The proprietary FilemailCORE transfer protocol is used alongside with HTTPS based in order to maximize upload speed.
© ALL RIGHTS RESERVED

2015/01/18

Java 8 error 1603 - update did not complete - How to Resolve?

The Java runtime environment should always be kept updated to the latest version available, both for efficiency and safety. Unfortunately, sometimes the unexpected can happen, and after upgrading to the latest version of the software, the software itself stops working!
If you want to upgrade your JAVA environment, currently you must install the Java 8 update 25. Unfortunately, under certain conditions, it may happen that the installation is not successful and it is shown an Error Code 1603.
Java 8 and 1603 error code after installation 

One reason for this failure is the Bug ID: 8050838 (described in the Java Bug Database) which essentially prevents the correct installation of Java on the computer with Windows Operating Systems (8.0, 8.1) Professional / Enterprise that they are already joined to an Active Directory Domain and are localized in a language other than English (Italian, Russian, German, etc.).

The problem is by installing a version of JAVA including the 1.7 update 55 until the 1.8 update 25 (official) but also in beta until the 1.8 update 39 (unofficial)

ORACLE has finally solved the problem by correcting the bug from version 1.8 update 40 beta (build 12). The solution is then to use the beta version of the latest Java (available here), which have already fixed the bug.

PERSONAL EXPERIENCE:
On Windows Pro 8.1 64-bit already joined to an Active Directory Domain I solved the problem by installing the beta Java 8 update 40 (build 20) 64-bit! The error 1603 did not appear and the installation was successful. To further check just type the command "java -version" from the command prompt and check that the data shown are consistent with the version installed. 
For the record, you can also work around the problem by installing the Java version 8 update 25 before joining the computer to the Active Directory domain.
© ALL RIGHTS RESERVED

2014/10/24

4 different ways to share a printer or photocopier on a network

At work or at home it could be useful to share one printer with several devices (tablet, notebook, smartphone, PC) both to save money and to gain more efficiency.
To connect a printer to the local network, in order to print with the LAN (Local Area Network) connected PCs, there are several options, depending both on the printer’s characteristics or on the printer (or all-in-one device) itself, and on the user’s needs.
First of all you have to verify the printer’s characteristics, if it has already an internal network interface controller (Ethernet or Wi-Fi) and if it is predisposed for a LAN connection, or if it has just a USB port  (or an old parallel port). 
Then you have to consider if it is destined to a domestic use (few users that use it occasionally) or to professional purposes (many users that need it always on and ready  to use).


1) If the printer has already a built-in ethernet network controller
Usually  you should just connect it to the network switch or to the router and assign it a free static IP address (such as 192.168.x.y) or you could even use the dynamic IP configuration (DHCP) service, which dynamically and automatically assigns an available address. Generally, every kind of router (included the ADSL one) can give a DHCP service or at least it has to be enabled to function as SERVER DHCP, whereas the printer becomes a CLIENT DHCP.
Then you should install the printer driver related to your printer model on each PC on the network
In case of  Wi-Fi connection you should follow the same advices.

2) If you’re not so lucky and you have to use a USB or Parallel connection, then you should directly connect the printer to a  PC on the network (e.g. The network "SERVER") installing the printer driver on it. Then you should share it with all the other PCs and install the driver on them. Here, the printer is available through the SERVER, thus this computer must always be on and working in order to allow the users to print!

Share files and printers in Windows 7
Click the Start button, then Control Panel and open Advanced connection settings. Type network in the search box, click on Network and sharing center, then select  Change advanced connection settings in the left box.
Click the down arrow button to expand the current section.
If printer sharing is off, turn on printer sharing  and click Save changes.

Then you have to share the printer
Click Start and select Printers and devices. Right-click the printer you want to share and click Printer properties.
Click the Share tab and select the control box Share the printer.

3) If you don’t want to set apart  a PC for the printer or to leave always the sharing PC on, you can buy  a print / printer server, in other words a usually small and low energy consuming device, which incorporates an internal network interface card and one or more USB/parallel ports. By this device you can connect one or more printers to its ports and connect it/them to every PC on the network by the LAN. Of course it has to be configured by following the advices by the device’s manufacturer.

4) If you have an ”evolved” ADSL router with a USB port and you can activate it as "printer server" then you can connect the printer to the ADSL router and share it with the whole LAN. Even in this case you don’t need to set a PC apart, it is sufficient to leave the ADSL router on and connected to the LAN switch. For a domestic use, if the ADSL router has more than one Ethernet port, it could also substitute the network switch; it could be even “underused” as printer server and switch (avoiding to use it as a system to access to the internet by ADSL).
For instance, in the ADSL router  "ALICE GATE 2 PLUS WIFI" or "ALICE GATE VOIP 2 PLUS WIFI" you need to access to the router IP address (the default one is 192.168.1.1) by a web browser, type the password (default "admin"), move to the section relative to " USB Port ", activate "USB Printer server" and assign a name to the device. You have to connect the printer to the master USB port of the router. Finally,  you need to add a new device "printer" specifying the pathway, the name of the router (\\alice gate) or the IP address, and the device name on every Windows PC that  is to be connected to the printer. Finally, you have to choose and install the correct driver relative to the printer model used.


PERSONAL EXPERIENCE:
If you use either Windows or LINUX, the sharing of peripheral devices is within everyone’s reach; you have just to remember that the sharing PC (that is physically connected to the printer) may suffer the extra-work due to print spooling
On the other hand, true "print servers" (e.g. D-LINK DP-300U with 2 parallel ports and 1 USB) may be very useful in a company, where they need to be H24 available. 
Finally, I would underline that ADSL routers as printer servers  may result in higher efficiency, compatibility and performances if compared to other solutions.
In detail, if you want to share an all-in-one photocopier equipped with one USB only, (e.g.: KONICA Minolta Bizhub 163) you can use an  ADSL ALICE GATE VOIP PLUS WIFI router (Pirelli) configured as printer server, with the further advantage of allowing not only LAN but also WIFI sharing!!! 
© ALL RIGHTS RESERVED

2014/10/23

HOW TO REMOVE POLICE RANSOMWARE VIRUS

What is?
This computer fraud, in jargon known as "RANSOMWERE", is a new type of malware that propagates as a virus or worm. 
It locks the computer displaying a notice on the screen, and then, taking advantage of the fear of people and claiming to be a POLICE department (or the FBI, or CIA, etc..), it requires the payment of a sort of fine (but it would be better to call it "ransom") to unlock the user's computer.
The malware relies on the user's fear, accusing him of having committed illegal activities, such as downloading material protected by copyright like software or music, or be viewed and downloaded child pornography, and requires the payment of a fine (normally € 100,00) to remedy the alleged wrongdoing. 
Typical screen of Virus "Police"
A typical example of this malware displays a screen that reproduces the header of the Police (logo or emblem) and usually shows the IP address of the user's computer. In some cases even show the user's photo taken with the webcam of his own PC or notebook. 
It also requires the payment of a fine through fake websites (legal) specialized in making payments online without a credit card or debit card, such as www.ukash.com or www.paysafecard.com (in whose pages a message indicates the existence of this type of scam). 
This malware, due to the payment system used, it is also known as "Ukash virus" (but the Ukash site has nothing to do with the creator of the virus). 
Another name of this malware is "Reveton" that is based on Trojan Citadel (which, itself, is based on the Zeus trojan).
When the malware is active you cannot exit the screen, even with the keyboard shortcut CTRL + ALT + DELETE, and you are unable to freely use your PC. 

As you take? 
As with many other virus infection the possibility are: 
  • Pure and simple navigation of  compromised websites, 
  • Receiving emails with infected attachments or links to infected sites, 
  • Exchange of infected USB sticks, 
  • Installing cracked software, 
  • Etc. 
Who does it affect? 
Windows systems are the first to be affected, but now even the Apple MAC OS X are targeted by Ransomware, fortunately in this case the solution is simple, just do a reset of the SAFARI browser. 

Even Smartphone and Android tablets are attacked by ransomwere
An Android Cryptolocker version was discovered in 2012, but it  did not crypt the files like the Windows Version!
ESET has discovered a dangerous new type of malware (Android / Simplocker.A) that is able to encrypt the data / files on your SD card expansion of Android devices and then asks for a "ransom" for decryption. 
[Source] ESET Blog 
Android-Trojan.Koler.A

Android-Trojan.Koler.A is a type of Ramsomware that attacks Smartphone and Tablet Android. Use GPS to understand where is the victim and simulate local authorities more plausible. Android-Trojan.Koler.A is not dangerous, because it do not completely block the device, but only in the foreground holding a browser window with a threatening message. Bogdan Botezatu of Bitdefender says that you can manually uninstall the malware with the standard procedure, stating - "but only if the application icon is in the first row. Otherwise, you would not have the time necessary to drag the icon to uninstall." 
[Source] ARSTECNICA 

The Blog Malware do not need Coffee illustrates in detail the technique of propagation and the operation of this type of Ramsomware. 
[Source] Malware do not need Coffee: Police Locker land on Android Devices 

A new variant of ransomware locks the system and encrypt the data. This type of malware, however, shows clearly that it is a virus that has encrypted many files on your computer or on your smartphone / tablet  and requires a  ransom to decipher them. 

The malware best known in this category is "Cryptolocker", which is mainly spread via email attachment and that encrypts certain types of electronic documents on the hard drive and network shares. The malware connects to a remote server and uses a 2048-bit RSA public key to encrypt documents. Even removing the virus you cannot decrypt the file without having the key, which unfortunately is not stored in the computer.
CryptolockerCompanies FireEye and FOX IT, specializing in computer security, have created together a web portal www.decryptcryptolocker.com to help users of infected systems by Cryptolocker. Through this website you can send an email with an encrypted file from Cryptolocker, and you will receive in response to the private "master key" and personal for use with the software Decryptolocker to decipher all other files and encrypted documents.

How to prevent "ransomware" infection? 
The best way is to keep updating the software on your PC: Use Windows Update to the operating system, carry out security updates of the browser, email client and the main software used as Adobre Reader, OpenOffice, Microsoft Office, etc.. 
Also it is good to install a good antivirus (even free) and keep constantly updated virus signatures. 

The variants that encrypt the data: 
Who has the PC infected with variant Tojan-Ransom-digit .Win32.Rannoh which crypt some files so that they cannot be legitimately opened and edited, it can groped to recover them using special software developed by Kaspersky. It is RannohDecryptor.exe and is a tool that attempts to decrypt the files affected by this variant of ransomware. 

A new ransomware Trojan.ArchiveLock.20 (Dr.Web) affects primarily corporate networks by infecting the system and remaining invisible. Once activated remotely, malware and figure with WinRAR compresses several files through passwords and then shows a screen (which blocks the interface) with instructions to recover your data in exchange for money. In addition, the ransomware can delete any backup in the system. 
Trojan.ArchiveLock.20 (Dr.Web) 

But how to remove the "Police-themed" virus? 
Depends on the model, some are easy to eliminate other more resistant. Later in this article I have included some information on how to eradicate the most stubborn variants. 
Specific Antivirus and Ransomware removal tools: 
The anti-malware software HitmanPro.Kickstart has a specific form against the Police Ransomware. And 'possible to create a bootable USB stick with HitmanPro.Kickstart and use it to disinfect your PC. 
Even the software house PANDA security (anti-virus manufacturer) has developed a specific tool for the "Police Virus" is called PANDA RescueDISK. It 'a file with the extension. ISO (that is the image of a CD) and must be burned to a CD and booted at boot windows. 
This type of ransomware is also known as Trojan.Win32.Urausy and can be identified and eliminated, for example through Microsoft Security Essential
The Antivirus software company BitDefender, has created a special free Removal Tool (See: "How to remove ransomware infection FBI"). 
TrendMicro has released a free removal tool designed to detect and remove malicious software like ransomware: TrendMicro AntiRansomware Tool 3.0 

On 02.15.2013 Europol has vanquished the band of cyber criminals who had designed (at least) a type of malware RAMSOMWARE (with several variations). Source: Europol. Unfortunately, there are new sophisticated variations. 


PERSONAL EXPERIENCE:
Unfortunately, in the case that I have personally verified the malware has NOT been detected neither by 2 active anti-virus nor virus scanner and subsequently downloaded even by a couple of scans conducted via the Internet. This is symptomatic of the lack of preparedness of many antivirus towards this new type of scam. However, the malware variant that I faced, was not very insidious and it was very simple to remove it manually, here are the instructions: 

[Method 1 - By working Safe Mode] 
Start Windows in "safe mode" (press F8 when the PC) and click with the mouse on START (or START or the Windows icon) at the bottom left of the task bar. 
When you open the drop down menu vertical click "All Programs.
Look for the folder "Startup" and, once detected, click with the mouse on the corresponding icon that will display the list of programs configured to start automatically whenever the computer. 
Select the files that have names "strange" as sequences of characters and numbers 
(in the specific case was fir0.exe or WBT0.D
, And remove them by pressing the "DELETE" or "DEL". 
Select with the mouse the "Recycle Bin" on the desktop and click with the right button when the dialog at the bin, select "empty trash" to permanently remove the malware from your PC. 
Reboot the PC. 

[Method 2 - With safe mode running] 
An alternative method to easily remove the executable file from the automatic can be to use CCLEANER (if already installed) and select the "Tools" menu, then "Start" and then deleting the row that contains the executable in order to exclude the next boot. 
In the event that not enough simply removing the file you can switch to a more radical action using the "Restore System Configuration" in Windows XP, Vista and Seven. In this case, just go back a few days when you think your PC is not infected yet. 

N.B. Of course, to eliminate "physically" the virus must also delete the file responsible for the malfunction (making sure to write down the full path) and not only limited to the sole exception of the file from autorun malware is otherwise idle but still this disc fixed! 
I have also read most tenacious of variants that are activated already in "safe mode", however they have not yet addressed these variants can only suggest the methods they would adopt (already used for other viruses) and shown in this study: 

[Method 3 - With safe mode running] 
Download CCleaner and Malwarebytes and copy them to a USB stick to be inserted in the PC started. 

Start your PC with 'PROVISIONAL MODE WITH COMMAND PROMPT "by holding down the F8 key in the ignition phase. 
Once at the Command Prompt, press CTRL + ALT + DEL to start Task Manager
Insert the USB stick with the software already loaded. 
Go to File - New Activity Run.... Locate the USB memory and install both programs 
Install CCleaner and run it to perform a thorough cleaning of the system files. Then proceed to scan your registry and repair of items found. In Tools - Start off ALL entries. 
Install and Launch Malwarebytes (also from New Activity Run... and looking in the Program Files path) and perform a full scan. At the end restart your PC. 
Once you have removed the threat the desktop returns to normal and you can make a "clean-up" more in-depth. 
Disable the System Restore (XP) / Protection System (Vista, 7, 8) and delete all restore points created previously - Step essential to prevent the virus manages to recur in what is present in some file recovery 
Locate the folder for temporary files: 
XP - C: \ Documents and Settings \ <username> \ Local Settings \ Temp 
Vista, 7, 8 - C: \ Users \ <username> \ AppData \ Local \ Temp 
... and delete ALL files present 
Empty the trash immediately 
Run CCleaner again (Cleaning Files and Registry) 
Run Malwarebytes again - Full Scan 
Restart 
Run CCleaner again, click "Tools - Start" and reactivate the items you want, then reboot. 
Now the PC is  clean! 

As already indicated, there are many variants of this malware. For example, I recently met with the variant of the virus that displays a screen with the logo of the "Police State", like this: 

In this specific case the file was auto-start "ctfmon.lnk" (files with the extension. Lnk are shortcuts or links to other files and facilitate the opening or running). It pointed to the executable file "C: \ windows \ system32 \ rundll32.exe" which sent him running the malware. In this case it was probably a variant of "Trojan.Win32.FakeGdf" and side effects were (task bar unusable and some system services turned off). Even after the automatic removal since there have been problems in the repair of certain services (in particular Windows Update). The use of Malwarebytes Anti-Malware has allowed us to discover and automatically remove the additional services "malware" that were installed always start automatically. Another anti-virus software to use with variants "resistant" is definitely Combofix. Typically, the name of the file in "autostart" is a random numeric name (for example, in another case it was 0.751225951242083.exe.lnk name at least suspect!). 

PS: if you cannot solve by following these directions leave me a comment indicating more problems. 

© ALL RIGHTS RESERVED