Running Applications from a Network Share on Windows 2003 Server

To allow applications to run from a network share on a Windows 2003 Server system perform the following:

  1.    Start->Control Pannel->Internet Options.
  2.    Select the Security Tab.
  3.    Click on the Custom Level Button.
  4.    In the Security Settings Window scroll down to Launching applications and unsafe files.
  5.    Click on the Enable button.
  6.    Click on OK.
  7.    Click on Apply
  8.    Click on OK.

How to Fix a Corupted Master Boot Record under Windows 7 and Vista

Windows partitions are still there and are unharmed.

Here is the quick and very easy way to fix the master boot record under Windows 7 or Vista. These instructions are from Microsoft's site but with my own added tips for a brainless recovery:

  1. Put the Windows Vista or Windows 7 installation disc in the disc drive, and then start the computer (set to boot from CD in BIOS).
  2. Press a key when you are prompted.
  3. Select a language, a time, a currency, a keyboard or an input method, and then click Next.
  4. Click Repair your computer (this is located in the lower left hand portion of the screen).
  5. Click the operating system that you want to repair, and then click Next.
  6. In the System Recovery Options dialog box, click Command Prompt.
  7. Once in the command prompt, type exactly Bootrec.exe /FixMbr and then press ENTER. You will see "operation completed successfully."
  8. Reboot and set BIOS to boot from the HDD again.

Manual Scanning of Malicious Software


In order to perform the steps that are outlined in this document you need to have Internet access. This
document defines the steps that are required to download and run the Microsoft® Windows®
Malicious Software Removal Tool.


Downloading Microsoft's Malicious Software Removal Tool

The following steps outline how to download the Malicious Software Removal Tool from Microsoft's
web site.

  1. Open Internet Explore, or Firefox, and enter the following URL into the address text box.
  2. This will display a web page like the one shown in Illustration 1 above.
  3. Next you will need to click on the “Skip the details and download the tool”. This is indicated by
    the red arrow in Illustration 2 below.
  4. This will take you to the actual download page, as shown in Illustration 3 below.
  5. From this page you will need to click on the Downloads button, this is indicated in Illustration 4
    below by the red arrow.
  6. Once you have clicked on the Download button. A File Download – Security Warning window
    will be presented to you. This shown in Illustration 5 below.
  7. You should click on the Save button. This is indicated in Illustration 5 above.
  8. Next you will be prompted with a Save As window. From this window select Desktop. Illustration 6
    below shows an example of the Windows Vista Save As window.
  9. Once the download has completed you will be presented with the Download Complete window as
    shown in Illustration 7 below.
  10. From the Download Complete window Click on the Run button. This is indicated by the red
    arrow in Illustration 7 above.
  11. This will cause Windows to display a Open File – Security Warning window. From this window
    click on the Run button as indicated in Illustration 8 above. This action will start the tool running.
  12. Once the Microsoft Windows Malicious Software Removal Tool window opens will need to click on the Next button as indicated in Illustration 9 above.
  13. This will open up the Scan type window as shown in Illustration 10 below. From this window
    select the Full scan option as indicated by the red arrow in Illustration 10 below.
  14. Now click on the Next button.
  15. This will start the Full scan and display the progress in the application's window. This process can
    take up a hour or more depending how large your hard drive is and many other applications running.
  16. Once the scan finishes the application window will indicate that either no malicious software was
    detected, or that malicious software was detected and removed.
  17. You can view a detailed report of the scan by clicking on the View detailed results of the scan
    link. This open up another window which lists the different type of malicious software that the tool
    looks. This is shown Illustration 13 below.
  18. Once when are you done click on OK and then click the Finish button.