The M.I.C.A. Community has discovered several methods for checking your computer for infection while keeping everything running smoothly through regular maintenance. The Lockdown series is devoted exclusively to security & maintenance-related issues. Follow along and learn about the tools included with your XP Home operating system and some that should have been.
Security and maintenance for your new or used computer start here. This is the foundation for everything pertaining to computer security and the maintenance needed to keep your machine running smoothly. Please start at the top of the page and work your way through the lockdown series till you reach the end. If you can not finish everything today, stop back and continue the process as soon as possible.
LOCKDOWN™ STUDIES
Prescribed maintenance routine, malware scanning and computer
settings locked down.
We define "Lockdown Mode" as a way of thinking when it comes to
computer security. This is a reference we will make through out our
network from time to time. The basic principles behind Lockdown™
cover privacy & security related issues. In order to be in 'safe
lockdown mode' you have to lockdown your machine and do the routine
maintenance listed below, along with scrubbing your machine for
infection.
» O.K. now we can adjust a few things with your settings. The first
3 things I would change is the 'Recycle Bin' size, 'System Restore'
size and the 'Temporary Internet Files.' Your recycle bin should be
set to around 3%, the system restore to 3-6%, at the most and the
temp internet files set to around 33mb. These settings will give you
enough space to hold back-up and history for 2-4 days. This is
plenty for most anyone and will help protect you in case of someone
using your machine. I do not recommend completely shutting off these
services because you may need them to restore something in case of a
accident.
» O.K. now you can set your java cache. If you have java installed,
it will be listed in the control panel as 'java plug-in.' I like to
lower the default settings of unlimited or 70mb, down to 4mb. This
is plenty of space for most surfers.
» I recommend that you turn off the "indexing service" included with
your XP operating system. It was designed to offer faster search
times when using the search tool, but it requires a lot of system
resources and slows things way down. You will not suffer really any
difference in speed while searching. To turn it off, open the
"control panel" and then "add or remove programs" and then click on
the "add/remove windows components" tab on the left hand toolbar.
Now, uncheck the box next to "indexing service" and then click
"next" and then "finish."
» Another item that needs your attention is the “C:\windows\temp”
folder. You should delete everything that is in this folder, BUT not
the folder itself. If you have never done this, it will have a ton
of stuff in it. All of this stuff is safe to clean as often as you
wish. This stuff was used at one time or another but is no longer
needed. That is why they call it a temporary file.
» Now we can make sure that file extensions are displayed. This is
important for locating malware. Open 'control panel' and then click
on "folder options" and the "view." Make sure to uncheck the box
"hide extensions for known file types" and check "show hidden files
and folders." This will allow your complete system; including
critical system files so do not delete things that are unknown to
you. While we are here, lets check the box "display the full path in
the address bar." This will display the complete web address of the
sites you are visiting.
» Now Let's move on to the virtual memory setting. Open the 'control
panel' and click on "system." On this page, in the bottom right
corner, you will see the amount of ram memory you have installed.
Your virtual memory should be around 2.5 times the amount of ram.
Because some of your ram will be in use, you will need to round up
to the closest number shown in the chart below. Write this number
down and move on to the next paragraph.
If you use Belarc Advisor, you can check the memory installed and
times it by 2.5 times to get your specific virtual memory specs.
Virtual Memory Set-up Chart:
Any number up to, but not over 256mb ram = 640mb virtual.
Any number above 256, but not over 512 ram = 1280mb virtual.
Any number above 512, but not over 768 ram = 1536mb virtual.
Any number above 768, but not over 1024 ram = 2048mb virtual.
Any number above 1024, but not over 1280 ram = 2560mb virtual.
Any number above 1280, but not over 1536 ram = 3072mb virtual.
Any number above 1536, but not over 1792 ram = 4480mb virtual.
Any number above 1792, but not over 2048 ram = 5120mb virtual.
note: If you are using an older computer and you have a number
higher than 768 listed for your ram, then you should still set your
virtual memory to 1536mb. This equals 1.5 GB and your machine will
work very well with this. However, many computer makers do not want
virtual memory set higher than 1.5 GB on older models (more than 15
months), so please and be sure to set the correct specs. While this
information has worked on hundreds of machines, it is a general rule
for most computers, and some can be set higher...much higher. You
may send us your machine brand & model and we will provide specific
settings for your machine at no charge.
Now that we have your proper number wrote down, let’s change the
setting. With "system" open, click on "advanced" and then
"performance settings" Now "advanced" and then "virtual memory /
change." Select "custom size" and then type the number you wrote
down (it should be either 640, 1280, 1536, 2048, 2560, 3072, 4480 or
5120mb) into both boxes and then click "set." And then click "OK"
and then "OK" and then "apply."
Finally you will need to "restart" your machine and then visit us
again to continue below.
» Windows has included a special tool for automatically repairing disk errors that can dramatically reduce the performance and stability of your Windows XP machine. I recommend that you run this tool every thirty days. To do this, go to "start" and then "my computer" and then right click on the drive "C" and then click "properties" and then click on the "tools" tab. Next, click on the "check now" button. Now put a check next to the two options listed and then click "start." A dialog box will pop up saying that you must re-start your machine to run this, so click "OK" and then re-start your machine. Do not touch anything or it will stop the tool from starting. Once it is underway, you can watch it run through all five sections. When it is complete it will re-start and you will be ready to go. If you want to see the results of the scan, you will need to use the "event viewer" located in the "administrative tools."
» Now lets take care of your Windows updates. We can not lockdown
your machine unless you are running ALL of the current updates for
your system. If you are asked to validate your Operating System,
please do so and continue with the updates. After you are done
there, you will need to go to Microsoft Office and obtain any
updates related to your Windows productivity software. These
programs are not listed on the regular Windows update site. You can
switch over to the better Microsoft update site. This newer service
will update EVERY Microsoft product installed on your machine! After
you have completed these critical steps, restart your machine and
then visit us to continue below.
» Lets take a look at ALL of the other software you have install.
You will need to either update it, or uninstall it to prevent
security breaches. This step will make your machine perform better,
as well as much more secure. Windows XP works best with a hard drive
that has at least 50% of free space. So, if you have a small hard
drive, every program that you can remove will help with performance.
» Great, now you will need to update the other technologies
installed. You should visit the website of the builder (i.e. Dell)
of your machine to acquire any recommended updates from them. Next,
visit Macromedia, Java and Intel and get the latest versions of
their products.
» Finally, you have one more item to update, Adobe. This product is
probably installed on your machine and if you have not been using
Adobe, it has not been updated. Once all of these items are current,
you should uninstall the old versions from your machine.
» We do not know what all is installed all your machine, so you will
need to investigate each program at the product's website. If you
come across programs that you do not use anymore, just remove them
and save yourself trouble down the road. Remember, all software
needs to be updated to the current version to be protected from
possible security holes. It does not matter how old they are, as
long as they are current with the maker. You do not have to use the
newest edition; just verify that your version is safe by the maker's
website. Once this step is complete...
You are now ready to move on to the Lockdown Microsoft Internet Explorer section.
This series covers the Internet Options, listed in your control
panel. These control most things related to internet connections and
their functions. We will cover every setting and give you the right
information to set up your machine correctly. After this series,
your computer will be much safer and perform more efficiently.
Lets get started...Click 'start' & then click 'control panel'. Now
click on 'internet options' and start the study below.
» O.K. with the 'internet options' open, you will see the general
page. Your home page is the address of your home page while on-line.
You should recognize this address as the first page viewed upon
connecting to the internet.
» Next is the temporary internet files. You can click 'delete
cookies' and clear all of your stored cookies. Click 'delete files'
and then check the 'delete all offline content' box & then click
'o.k.'
» Now click 'settings' and under the "check for newer versions of
stored pages," check 'automatically. Next change the "amount of disk
space to use" down to 55MB. This will be plenty for you since you
will need to empty this regularly. You will see the current location
of your temporary internet files folder. This is fine to leave alone
but if you wanted to change the location, you would click 'move
folder' and then you would search you hard drive for a new location.
I would keep it in the "local folder" but I know some people who
move it to the "my documents" folder for the ease of finding it.
» Now click 'view files' and a screen will open with all of your
files stored from surfing the internet. They are named this because
they are not part of anything important and should be cleared
regularly. They are needed while on-line for that very instant and
then need to be cleared. This is cleared when you use the features
listed above. You can also clear them in the new window that opened
by moving your mouse over a un-written area and click & drag all the
way to the left, going over all the names of the files and then
clicking delete. If you do not know what 'click & drag' means, it
refers to clicking the left mouse button and holding it down while
moving it around the screen.
» Next click 'view objects' and a new window will open listing the
"downloaded program files" and you should recognize the names in
here such as "java runtime, office update engine, shockwave flash
object." These work to support your browser functions and pose a
risk if a malicious program is listed here. Investigate each item
and verify it maker.
» Now we can look at history area and change the "days to keep in
history" down to 0-4 days. This determines the amount of days, it
will track your internet habits, which is stored in the temporary
internet folder. I set mine at 0 but some people like to have recent
history for sites they go to often and 4 days worth of surf records
should be the most you keep.
» Next, click 'colors' and check 'use windows colors' and click
'o.k.' This sets the color s used while on-line but some sites will
not display a custom color so I recommend using the windows colors.
Click 'fonts' and set the "language script" to 'Latin based' & "web
page font" to MS Reference and the "plain text font" to 'Lucida
console' and click 'o.k.' You could pick some other font bit again
some sites will not view the same and all of these effect the speed
of opening pages on-line. click 'languages' and it will list
"English (united states) [en-us] for English but you can add
different languages if you visit web sites from other countries and
want to view this as well. click 'add' & pick from the list, then
click 'o.k.'
» Now click the final button listed on the general page,
"accessibility" and un-check all 4 boxes and click 'o.k.' Now click
'apply' at the bottom. All of the settings for this page is
complete. You have learned the "general page" of the internet
properties. To safeguard your system you need to finish this series
to learn about the "security, privacy, content, connections,
programs and advanced" pages. We will then start a new series
covering a different tool or program.
» As you open the 'security' page, you will see the different
internet worlds that your sites are assigned to. You should start
out by clicking the 'internet world' and then click default. Next
click 'local intranet world' and click 'default'. Now click on the
'trusted sites world' and again on 'default'. And finally click on
the 'restricted sites world' and then click 'default'.
» With these settings on default, you will have pretty good security
and still have high user function. If you click on one of the worlds
and then click 'custom level' you can turn off/on the many
activities that are required to surf websites. I would keep the
default settings for a little while and watch the behavior of your
surfing sessions for trouble. After you get use to your machine, you
can adjust the separate items.
» This should only be done one setting at a time and then surfing
the sites you trust to troubleshoot. The more common things that
users will tweak are; ActiveX controls, turning off/on pop-up
blockers, controlling download, Java scripting, user log-on and
nearly every setting listed which will affect your surfing
abilities. These separate worlds, as they are referred to, work
great at controlling security while providing functionality over a
broad range of websites.
» For some serious control, set 'ActiveX and 'Java Scripting' to
"prompt" which will ask you if it may run at every site you visit.
This is an optional setting. I have found that, after several
pop-ups, many users will just approve anything that will pop-up and
therefore this option can make users numb to security. You should
read EVERY dialog box that asks you to approve a request.
» Another great feature of this is to add websites to the 'safe
sites world' so you can let your shields down for that specific
site. You should only add addresses that are super safe because your
machine will trust them with all of the features listed for that
world. If you study the differences of every setting listed for the
four worlds, you will find many differences and start to understand
which settings can be turned on or off for your needs. However I
still think the default settings are best for most surfers.
» On this page, set the slide bar to "Medium High" and make sure there is a check mark at the bottom, next to the "block pop-ups."
» If you have been doing our M.I.C.A. Maintenance, you will be
familiar with this page. Clear the 'SSL State' regularly and turn
off the 'AutoComplete' altogether.
» If you want a little extra protection from adult content, use the
'Content Advisor' by clicking 'Enable.' Then click 'Settings' and
check everything you want to allow or block. This will help block
some bad content, however not every site will be blocked by this
feature. For serious content control, you will need a third party
program that uses powerful filtering technologies.
» I would not use the 'My Profile' for your personal information.
» OK, out of the three options, I would put a check mark by the "Never dial a connection" and leave everything else the way it is. This will prevent your sign-in box from popping up automatically, when you click on something that requires an internet connection. This can become annoying at times.
» Here you can specify which program you want to use automatically.
Click on the arrow tab next to each item for the choices available
to you. Next, you can fix some problems with Internet Explorer by
'resetting' the default settings. However, this will change several
other settings that have been customized, so you should only use
this as a last resort. Then you should go back through our Lockdown
Microsoft Internet Explorer section and reset the things we have
been changing. You will have to change your 'home page' back to your
preferred website.
» The 'Manage Add-ons' button will give you a look at all of the
"helpers" that are installed on your machine. You can disable bad
ones or allow the ones you want. Do not disable anything that you
are unsure about. You should research an item before you change
anything. You may contact us for free help on these items.
Advanced Tab
» When you open the 'advanced' page, you will see the same items we
have listed below. There are many different options for these items
and we feel that the set up below will allow the best mix between
function and security. If you secure things too much, you will spend
all of your time clicking and approving every step you make. While
this is the best security, we have found that most users will become
tired of the hassles and lower the security. You should
check/uncheck the same ones that we have.
Did you know that Microsoft has included explanations of these
items? With the tab opened, click the "question mark" at the top
right corner and then click on any of the items.
Accessibility
√ Always expand ALT text for images
X Move system caret with focus/selection changes
Browsing
X Always send URLs as UTF-8 (requires restart)
X Automatically check for Internet Explorer updates
√ Close unused folders in History and Favorites (requires restart)
X Disable Script Debugging (Internet Explorer)
√ Disable Script Debugging (Other)
X Display a notification about every script error
√ Enable folder view for FTP sites
X Enable Install on Demand (Internet Explorer)
√ Enable Install on Demand (Other)
√ Enable offline items to be synchronized on a schedule
√ Enable page transitions
√ Enable Personalized Favorites Menu
√ Enable third-party browser extensions (requires restart)
√ Enable visual styles on buttons and controls in web pages
X Force off screen composition even under Terminal Server (requires
restart)
√ Notify when downloads complete
√ Reuse windows for launching shortcuts
X Show friendly HTTP error messages
√ Show friendly URLs
√ Show Go button in Address bar
Underline links
√ Always
X Hover
X Never
X Use inline AutoComplete
√ Use Passive FTP (for firewall and DSL modem compatibility)
√ Use smooth scrolling
HTTP 1.1 settings
√ Use HTTP 1.1
X Use HTTP 1.1 through proxy settings
Multimedia
√ Enable Automatic Image Resizing
√ Enable Image Toolbar (requires restart)
√ Play animations in web pages
√ Play sounds in web pages
√ Play videos in web pages
X Show images download placeholders
√ Show pictures
√ Smart image dithering
Printing
X Print background colors and images
Search from the address bar
When searching
√ Display results, and go to the most likely site
X Do not search from the address bar
X Just display the results in the main window
X Just go to the most likely site
Security
X Allow active content from CD’s to run on My Computer
X Allow active content to run in files on My Computer
X Allow active software to run or install even if the signature is
invalid
√ Check for publisher’s certificate revocation
√ Check for server certificate revocation (requires restart)
√ Check for signatures on downloaded programs
√ Do not save encrypted pages to disk
√ Empty Temporary Internet Files folder when browser is closed
√ Enable Integrated Windows Authentication (requires restart)
√ Enable Profile Assistant
√ Use SSL 2.0
√ Use SSL 3.0
X Use TLS 1.0
√ Warn about invalid site certificates
√ Warn if changing between secure and not secure mode
√ Warn if forms submittal is being redirected
And that completes this section.
Let's move forward to layering another solid security countermeasure, IE-SPYAD2.
» This tool will prevent abuse through the Internet
Explorer browser. unlike a typical active program running, this tool will
simply run once and install a larger
database of blocked websites to the restricted zone of the internet
properties. Microsoft adds some on its own, and ie-spyad2 will add
several dozen more to the list. There is nothing more to do after
downloading and installing the data file. This is not another
program grabbing your resources.
That completes this section. You are now much more secured and
your machine will work more
efficiently.
Now you need to Scrub up!
» In order for you to scrub-up, You will need to download the 3
programs listed below, if you do not already have them. These will
work perfectly next to any virus scanner you may have. You can have
several malware tools running at once, but you can only have one
virus scanner installed. They simply do not get along and will
affect your performance in a big way.
You need one virus scanner, one firewall, 3-6 malware cleaners and
2-3 investigating tools for your armory to be complete.
Now this is where you think were going to ask you to buy stuff to
fix your problems, but hey, were just not like that. This will cost
$0.00 and not to much of your time either. You can install more
malware scanners, which can be found at our Downloads page, but the
ones below will cover most users needs.
The three products you need to download are:
1.) Malwarebytes Anti-Malware freeware/premium
2.)
Microsoft's Windows Defender freeware
3.)
CCleaner freeware
4.) And if you want the very best in automated premium software, I would
recommend throwing twenty bucks at Sunbelt Software CounterSpy:
» Next install & update the product definitions, then run them and see what you've been hiding. Remove all bad products listed and then restart you machine. Then run your virus scanner. All of these products should be run on a regular cycle. Most computer repair people say things like "scan for viruses twice monthly" but this is better looked at by the HOURS you surf. If you surf ten hours a day, you should run the malware tools above every 1-2 days, but if you surf a couple of hours per day then you could run these once a week. Now that we have malware scanners starting the clean-up process, you have taken a big step in the right direction!
You must continue to scan, clean and restart your machine until you have NO infections. If you can not obtain a clean scan, you will need to use HiJackThis! and allow us to help you with the process. This is provided free of charge, so you have nothing to worry about there. If you can not clean the malware, you can gain a little on malware by unplugging the machine from the internet, and by restarting the machine into "safe mode".
This is the first investigating tool you will need to download. When
“HijackThis!” is installed, the default location for installation
will be a temporary folder. This means that any backups you create,
as a result of fixes made, will not be saved if we need to use them
at a later date. It will not function properly when run from the zip
folder or a temporary folder.
» Create a folder on the C: drive called HiJackThis. Make this
folder first, as you will not be able to move the program after
install.
» You can create this new folder by going to “My Computer” and then
‘double click’ on “C:” and then ‘right click’ and select “New
Folder” and then name it ‘JackThis’
» Now download the new Trend Micro HiJackThis v2 (freeware) from
Download button and install into the new folder you made for it.Get
it from CNET Download.com! This is a new version created after Trend
Micro purchased the HiJackThis! v1.99 edition. Trend Micro is not
offering support or a download of this new program yet, so you will
have to click the button and get it from Download.com (a trusted
resource of ours).
» Launch “HijackThis!” and then click “scan” and then click “save
Log.” This will generate a text file that will list all running
processes and applications that are loaded automatically when you
start Windows, plus a lot of other important information that we
will use to diagnose your machine.
» Remember, HiJackThis! is for auditing your system files for
infection. You should never 'check & remove' any items with this
tool by yourself. It is very powerful. If your machine is infected
after following our Lockdown series, you will need to use HijackThis!
to run a scan and then save the log file to email it to us for
further directions. If you do not want to use email, you may post
the log at our trusted computer forum for help.
1) ‘Scan’ for Adware, Spyware and all Malware DAILY.
2) Clean your ‘Temporary Internet files’ and ‘History list’ every 5
Days.
3) Clear your ‘SSL state’ every 5 Days.
4) Clear your ‘Java files’ in your Java console every 5 Days
5) Empty the ‘Recycle bin’ every 5 Days.
6) ‘Defrag’ your hard Drive every 10 Days.
7) ‘Scan’ for Viruses and Trojans every 5 Days.
8) ‘Degauss’ your monitor by turning it off completely and back on,
every 10 Days.
9) ‘Completely turn off’ your machine every 10 Days. This is
different than re-starting. When you re-start, it does not shut down
100%
10) Clear your 'C:\windows\temp' folder every 30 Days. Remember to
delete the contents, but not the folder itself.
11) Run 'disc check' every 30 Days.
12) Run ALL scanners in 'safe mode' every 30 Days.
In order to start your machine in "safe mode" you will need to re-start your machine and then once you see the first screen, start pressing the "F8" key every few seconds until you see the black screen prompting you to select safe mode start-up. Use the arrow keys to move up to it and then hit the "enter" key. Log on to your user name and you are running in safe mode! Things will look a little different, as this set-up is for maintenance only.
» Now we need to check for 'Rootkits'. You can read our take on
these well-hidden programs by visiting our Safe lockdown story on
Rootkits. In order to check your system for rootkits, you will need
a special scan of your machine. You can use the F-Secure’s
Blacklight beta tool for this task.
Another quality program that works very well for this task is the
Rootkit Revealer scanner.
» Lets check your system for security breaches and verify that your
machine is in lockdown mode.
» Let's go to Gibson Research Corp and use the 'Shields up' and the
'Leaktest' program to check you computer ports and firewall. We want
the 'Shields Up' to show all ports as being in stealth mode. Run all
of the tools listed on the Shields up page to verify several key
areas of your machine. Then we want the 'Leaktest' to pass your
firewall as blocking all access.
» If you have made it to here with clean scans ~ Congratulations!
You are now in Lockdown mode, with a more secure system. Check back
every so often to find new information that we will be adding. We
will dig a little deeper in the coming weeks. Please follow the
final step below. This will clean your restore points for any
infection.
» Turn off system restore to clear all restore points, restart your
machine. Run a final scan with your virus scanner, Ad-Aware and
Spybot. If you have clean scans, turn system restore back on. Set
the size to 3-6%. If you are not clean, repeat the steps to scan and
clean until you are not infected. It may take a few rounds of
scanning, cleaning and restarting to clean-up a infected machine.
Once you are complete, you are ready to go back online with your
new, safe & secure machine!
Follow the M.I.C.A. Maintenance routine to keep the infection from
coming back.
Now that you have a clean machine, let's learn about some tools for investigating your machine.
Maybe a program is not responding and you need to close it without causing harm. We can show you how to take back control. You have a great tool included with Windows XP, and it is vital for you understand how to utilize it.
» Let’s get started investigating your system. You will learn where
to look and how to find out why your system is acting the way it is!
You will perform all checks discretely and without us interacting
with your machine. Once you learn about this tool, you will have
better control over your machine.
1) Hold down the ‘control,' ‘alternate,’ and ‘delete’ keyboard keys
at the same time and release. You will now have the ‘TASK MANAGER’
open. Great, now you can see what is running (using your system
resources). WORD OF CAUTION: Do Not Shut Down or stop any of the
items listed, because that will affect your system. Use the task
manager as a investigating tool to check things out.
2) Write down the CPU Usage %, # of Processes, and all applications
listed under the applications TAB. You can use the print screen
keyboard shortcut as well.
3) Click Options and select Show Full Account Name. Next click View
and choose “Select Columns;” select all of them available. Great;
now you are set up to see what is happening on your system. You have
gained much knowledge, so let's get started on your next steps!
4) O.K. ready to get to it? Write down all the names listed under
the “Image Name” tab. Write the full name which will look something
like (svchost.exe).
5) Click View and select “Select Columns;” then select “Image Name,
PID, CPU Usage, CPU Time, Memory Usage, Session ID, User Name,
Virtual Memory Size, Base Priority, I/O Other,” and click “O.K.” For
now they are all you need to see from time to time. Now ‘maximize
screen’ to view information full screen.
6) This is a great start for now. Keep checking these settings for
the next two weeks. Become familiar with their habits while running
certain programs.
» This is a really useful tool for discovering what your machine is
doing. If something
is acting up, it will show up here. The event viewer is located in
the "control panel" listed in the "administrative tools" folder.
Click on "event viewer" and then pick one of the three topics
listed. You can double click on any item to read the properties box
on the specific item.
To help your tech support team, write down the "event I.D." and the
"description." This will save time and clarify the problem to them.
If you are online, you can click on the link and read detailed
information about the reported item from Microsoft.
» Another great tool for investigating your machine is Belarc Advisor. You can learn a lot about your machine by using this program. The personal edition is free, while the different programs used for commercial purposes and networks will cost you a little. The personal edition will handle your personal needs with ease. Not only will it expose the programs installed, but it will tell you everything about the hardware components that your machine was built with. You can print the inventory list before going to the store for new goodies, and always buy the right products for your machine. Another handy feature of the Belarc Advisor is the Windows update list, showing all of the installed updates, along with the status of those installed. You will find more approved auditing tools on our Mighty Mica Awards webpage.
SAFE programs RUNNING on your system:
» These programs are known to be part of Microsoft services running
on your machine and should be considered safe. We are working on a
complete databank of these, as this is only a sample of
approved/verified safe programs running on your machine.
taskmgr.exe, alg.exe, ctf.exe, svchost.exe, explorer.exe,
iexplorer.exe, lsass.exe, winlogon.exe, services.exe, system, system
idle process, csrss.exe, smss.exe, gcasDTServ.exe, gcasServ.exe,
Spoolsv.exe, MDM.exe, wdfmgr.exe, msmsgs.exe, shwiconEM.exe
» File extensions tell your machine what program to use to open it and what type of action is needed with that file or folder. We have compiled a database with some of the thousands of programs that we have come across. We will be adding to this on a regular basis until it is complete. If you need to look up a extension, check out our File Facts section.
The End. Congratulations on learning how to care for your machine.
We will continue with this study. Lots of new studies are being finished, so check back and find out how to fix things yourself. When this site is finished, every part of Windows will be explained to you, along with extensive databanks full of important information needed to keep you running smoothly.
If you want to read security related articles, check out our MicaMagazine page.
Or if you are looking for links to serious security software then you want our Downloads page and the Product Testing page for information on the best hardware and software offered anywhere!
There's a lot of information but we will give you plenty of time to understand it.