Two new viruses have been discovered to infiltrate systems through removable drives.
USB flash drives have become indispensable to almost everyone who uses a computer. It’s a quick and easy way to immediately transfer and share information and other data, especially files that are too large to send through email. Unfortunately, some malware take advantage of this convenience by attaching themselves to files on the drive to infect any other system it comes into contact with.
Two such malware have recently been discovered. Chymine is a Trojan application with keylogging capabilities, designed to copy passwords and other sensitive data, and Dulkis-A is a Visual Basic worm designed to copy and allow malware to infiltrate the system. Both exploit a vulnerability in Windows Shell.
Microsoft has yet to directly address the issue and provide a patch that fixes the problem. In the meantime, they have issued directions for a workaround that prevents both malware from manipulating the Windows Shell susceptibility. The workaround is effective for Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server R2, but it comes with a cost – you lose all your icon graphics.
Success in removing the virus has been marginal at best, with current fixes including a warning that removing these malware might result in unwanted changes to your system because of the way the virus embeds itself.
The best way to avoid being infected, be careful not to run any suspicious programs and files, especially when taken from USB drives and any other removable storage, even from a Blackberry or an iPhone. It’s also best to avoid automatically enabling USB devices to autorun once they’re plugged into your computer.
If you have any concerns or want to make sure your systems are protected, give us a call and we’ll work with you to ensure the security of your systems and data.

In every business, keeping people productive is very important. Lost productivity means less profit, so to keep things going, even when there’s no power, you need a UPS.
Jump Lists are lists of recently opened items, such as files, folders, or websites, organized by the program that you used to open them. You can also pin favorites to a Jump List, so you can quickly get to the items that you use every day.
Hacker attacks via “social engineering” can be a serious threat to the security of your organization.
Need to quickly find out what day it would be 45 days from now without counting squares on a calendar? Want to know how many days until a holiday, birthday, meeting, or other special event? The built-in calculator in Windows 7 can answer these questions.
You probably don’t know it, but you might be losing money because of a faulty IT system. It’s high time you take a look at the numbers and see where you stand.
Before you entrust your sensitive data to a “cloud” service provider, make sure you weigh the risks with the benefits.
To see images the way they are intended to be seen, calibrate your monitor so that what you see is what you get. Here’s how.
Cost effectiveness is always part of any company’s priorities, and taking steps to make your office become more environment-friendly can help you achieve that.
Scanners are the critical link between the non-digital and the digital world. Any picture or document can be turned into a digital format with a scanner. When looking for a scanner, you want to get one good enough to do what you need it to do, but avoid overpaying for features you will not use. The first thing to look at is resolution.


