Wednesday, 31 July 2013

How to Open Multiple Google Accounts in One Browser (Multiple-Login)

How to Open Multiple Google Accounts in One Browser

Most of us use multiple google accounts for various purposes. One might just a mail account, other might be for docs, blogger, youtube, trends  analytics and webmasters. Sometimes we have different Google Accounts for home and office. But problem arises when you want to use multiple google accounts in one browser. Most of us think that its impossible to create multiple logins in one browser, but in reality its possible. There are two types on multiple login facilities provided by Google.
This feature will be described in detail in this post.

1). Enable Multiple Login in your Google Account

This feature enables you to use multiple google services with different google accounts in one browser.Ifin one tab you are using gmail, then you can use your blogger account with different google account on a new tab, and google docs with third Google Account in next tab.This might be a solution to some of you.









2).
Connect Multiple Google Accounts

This feature seems to be a better one. Using it you can connect your different google accounts to one account. Then one to login to your main account, you can switch between different accounts without entering the password. Isn’t it easy. Follow the following steps yo connect more than one google accounts.

  • Open Google and login into your first google account.
  • Now go to right upper corner in google page. It will show your profile picture with a drop down arrow.
  • Click on that arrow, it will show a box showing details of your account. It shows two buttons on bottom part, which are "Add Account" and "Sign Out". Go to "Add Account" and it will ask you to add login details of your second account. 

  • So now your two google accounts are connected. 
  • Now whenever you want to switch from one account to another account, just go to right upper corner of google page and it will show you both accounts in it and you can choose any one of them.

So thus switching between google accounts become easy and you don't need to enter your login details again and again.

People visit this page while searching for:


  • Multiple Google Accounts
  • Google Accounts Login
  • Connect Multiple Google Accounts
  • Google Accounts Connection
  • Switching Between Google Accounts
  • Switch Google Account
  • Open Multiple Google Accounts

Saturday, 27 July 2013

Best search engine optimization techniques.

It is the dream of every web publisher’s to get thousands of page views per day. So in order to get the maximum number of page views, it is very necessary to implement the proper search engine optimization techniques in each of the web posts.  In this post i will explain what are the techniques for search engine optimization.  

optimization tools

Post with “unique content”.
The most important think is “What is the content of the post”. For example if you writing an article about mobile reviews, film reviews, software reviews ..etc., then you often get very low search rank. Otherwise if you write an article about rare topics like “merits and demerits of a medicine, rare deceases …etc ”, then your post will get a chance of having high search engine rank.

Find proper keywords.
Finding the appropriate keywords is also important. You can use the keyword search services like Google adwords. By using the “adword keyword search tool” you can find the most relevant keywords for your post. Always choose the keywords with most number of global monthly search and having the low competition rate.   Don’t repeat any keywords. Repeating of keywords make reverse effect.

Targeted keyword’s in post title.
A meaningful and attractive post title brings you more traffic from the search engine.  Placing the target keyword on the post title is also favorite of  most search engines.

Optimized images in post.
Using an optimized image in your post bring more traffic from Google image search. Rename the image with the most targeted keyword. Don’t use any blank space or underscore for the image name. (-) hyphen is the better character for separating words. (E.g. search-engine-optimization-techniques)


Wednesday, 24 July 2013

Much activity for Zero-K and some other news

Zero-K, the probably coolest fully FOSS offspring of the SpringRTS engine has seen at least two new releases since it last crossed my mind to check their page... a pity actually as the new features of version 1.1.7.0 (and prior) seem quite nice.
And for those not into the game (yet), there is now a channel with commented multi-player matches like this one:



Just a pity that the game-play doesn't really allow much zooming in to see the graphically really nice units ;)

In unrelated news:
Hmm, there is probably much more... so please comment below :D

DatePicker In Dialog window part -2

DatePicker In Dialog window part -1

DatePicker

Tuesday, 23 July 2013

How to use Picasa-web-albums, without being re-directed to Google+ Photos

This article is about how to you can start Picasa-web-albums in way that stops you being immediately re-directed to Google+ Photos.

Update - August 2016

The article below was written in 2013, and has remained correct until very recently.   But changes which Google started rolling out from 1 August 2016 mean that it is now obsolete.    See the article Picasa-web redirects, August 2016 update for more information.

The following article is kept here for historic purposes only.



What happens when you start Picasa-web-albums?

If you have a Google+ account, either because you only signed up for Google recently, or you had a Blogger account first and then linked your blog to Google+, then you will know that if you go to Picasa-web-albums), you are immediately re-directed to Google+ photos.
When this happens, at the top of the screen, for a few seconds, there is a message saying:
 "Click here to go back to Picasa Web Albums."

But if you do something in Google+ photos, this top banner message disappears, and the only way to get it back again is to close and re-open Picasa-web.   This is tedious - it's a waste of time opening one website just so you can re-direct back to another one.



How to skip the re-direction message

To use Picasa-web-albums, without being sent to Google+ photos, you just need to start it using this link:    https://picasaweb.google.com/lh/myphotos?noredirect=1

I'm going to put it into the sidebar of my blog very soon, so I have easy access to it.


Is there a problem with using Picasa-web instead of Google+ Photos?

You might wonder if there is a problem with using the old Picasa-web-albums instead of Google+ Photos.

In short, the answer (for now anyway) is no, there is no problem - and I don't expect there to be one anytime soon.

Why?

You still only keep one set of photos in your Google account.   It just happens that Google now have two pieces of software that can access these photos.   One is Google+ Photos, and the other is Picasa-web-albums.    And they both work on the same underlying pictures and photo-albums.   So it won't cause you to run out of space, or to have duplicate copies of your photos.

And Google still need to maintain Picasa-web-albums because there are a substantial number of Blogger users who choose to be anonymous:   Google+ photos simply will not work for them, because it absolutely depends on having the photos associated with an individual, named persons profile.   (And I'm pretty sure that there are no easy ways to transfer ownership of photos from one Google+ profile to another, either, in the event that you want to transfer ownership of your blog.)

Of course we don't know if this will last forever - but my best guess is that you can safely keep using Picasa-web-albums for a good while yet.




Related Articles

Transferring your blog to another Google account's ownership

What is Picasa vs Picasa-web-albums - a basic introduction

Creative-Kit photo editor works from Google+, if not from Picasa-web-albums

Options for showing photos in Blogger

Sunday, 21 July 2013

Where is the Blogger help forum now?

This quick-tip is about how to find the current version of Blogger's support forum.


quick-tips logo

27 July update:   I noticed yesterday that Google have changed the process back, and that Blogger's help link now leads directly to the summary page which includes a Community button.   I guess this means they listened - if not to me, then at least to everyone else who complained.




For as long as I have been using Blogger, Google have provided two types of support:
  • A set of support articles - some of which aren't up to date - that describe how to do standard things
  • A support forum, where people can ask questions, which are answered by other Blogger users. This forum has some people who are tagged as "Top Contributors" who have special rights, like being able to send questions to the Google staff who are also using the foru - but who obviously don't have the time to read all the posts.

Unlike some people, I don't have any problems with the peer-support model. It's 24x7. It supports lots of languages. It gives ordinary people a way to learn more about Blogger, by preparing answers to other people's questions.   It let me build up reputation as a helpful person, and so encouraged other helpers to help me when I got stuck.   It was also a place I could refer to in my own comment moderation policies:   I would rather that people asked for help with their blogs on a public, peer reviewed forum than here on Blogger-HAT where there is not regular review process.

I wasn't to thrilled about the move to a Google-groups based help forum. I can see why using a standard tool is good, but the Group software just doesn't work so well on my small netbook.

And I'm less-than-happy about the way that Google seems to be making it ever-harder to find the forum: a few weeks back they added another click to the process (Gear-wheel > Blogger Help > Community), and now I see there's yet another one (Gear-wheel > Blogger Help > More (the down-arrow at the bottom of the page) Blogger).

So here's a quick link, which I'm going to keep up to date, and put on my sidebar too. Click it to go straight to the Blogger help/product forum:      https://productforums.google.com/forum/#!forum/blogger

Thursday, 18 July 2013

How to Download Pandora Music on Your Android Device

Two months ago, I have written an article which shows you 5 best Free Music Downloader App for Android and Today I will continue to introduce you how to download Pandora music on android. We all know that Pandora is a website that provides streaming Internet radio and let you plays music you'll love. Many people can listen to music radio through Pandora but are not able to download them for offline listening. I am a lucky dog. I've found an even easier way to do Pandora music download. There are the top 3 Pandora music recorder and downloader tools:

1.  Streaming audio recorder
All you need is the Streaming Audio Recorder. It is a professional audio recorder for music lovers to record any audio and music on Windows OS, including Pandora.

The program could detect and record music automatically and help you record streaming music from Pandora freely. If you have a Mac, just check the streaming audio recorder for mac.

2.  Orbit Downloader
It’s a video downloader running on Windows computers and is free to download. As reported, the Orbit Downloader can download music from almost any social music websites including Pandora.

3.  Free Music Zilla
The music downloader also is a free one and is designed in specialty for Pandora music downloading.

After downloading Pandora music on your pc, you can share files instantly from your pc to android phone or android tablets. So, what’s your choice? If you have any other good idea about download Pandora music, please show with us.


Sunday, 14 July 2013

DevCorner: Open (Game Art) Bundle

An interesting mixture to "pay what you want" and "ransom funding" has recently surfaced with the Open Bundle:



You can buy all the offered game art and use them under the CC-by license and if the total threshold is reached (10k, 1 day remaining, 9.3k already pledged) all the game art (2d sprites and music) will be officially released under the CC0. A split of the funds is btw. shared with the EFF and Creative Commons.

For those wondering: no, it is not done by our friends of OpenGameArt.org, but they think it is a good project anyways. Interestingly the creator is also thinking of expanding the idea:
Do you want to host your own "public domain ransom"?
I'd love to help you! Email me at nick@commonly.cc
P.S.: While we are on last day notices: Today ends the registration period for the Unvanquished summer tournament. Also check out their latest Alpha 17.

Saturday, 13 July 2013

What is Google Friend Connect

This article describes Google Friend Connect, and how it can be used at the moment.



Google Friend Connect (GFC) was one of Google's earlier social-networking attempts, introduced in 2008.

Originally (you can still see the full description here), GFC promised a range of social features that website-owners, including bloggers, could include on their sites. including:
  • Add GFC features to a website by installing snippets of HTML code onto the site, or or using the  API.
  • Users sign in to your website, using GFC with an existing account (e.g. Google, Yahoo, AOL)
  • Users can create or import profiles (e.g. Twitter), discover other users, and send private messages to each other.
  • Social gadgets, eg for posting comments and links, rating and reviews, that you could add to your site, which your visitor could use once they had logged in with GFC.
  • Website owners can set up questions to be asked when a user used GFC to join their site. The idea was for them to find out their member's interests - and that the information would be on the member's GFC profile.
  • Tools to create, manage and send website newsletters, which could be personalised, based on the answers that members gave when joining the community.
  • Matching AdSense ads on shown to users looking at your website site to the interests they had listed on their GFC profile.
  • Tools to look at your user's interests and your site's membership statistics.
Effectively, Google Friend Connect was a group of tools, and some stuff in the background to make them work together:  The tools were for website owners who wanted to grow a community, and for "information consumers"  (that means people who read blogs and websites) who wanted to sign-up to their favourites sites.

You can find out more about how they were supposed to work in this video - for as long as it's still available on YouTube:




What happened

Less than four years after the launch, Google announced that Friend Connect would be "retired for all non-blogger sites in March 2012".   Their announcement was light on details about what exactly this meant, but reading various blog posts it seems that:
  • The GFC dashboard, where users could manage their profiles was turned off
  • The site where website owners could get the code to install the GFG gadget  (and do other things like send newsletter or get statistics) was turned off.
  • Blogger users could still add teh GFC gadget to their blogs   (until the widget was removed in ... not sure exactly when, but it's not available now).
  • Updates from non-blogger sites were no longer sent through GFC.
  • Updates from Blogger sites were still send through GFC, and users could continue to get them through Google Reader (until it was turned off in July 2013) or the Blogger Dashboard.

Google didn't provide give any options for moving GFC user or relationship data into any other tools.

And why?

Overall, my guess is that GFC didn't get enough users - or perhaps it just didn't give Google with enough of a platform for the social features that they wanted.  Possibly this was because:
  • The things which Google Friend Connect promised a number of privacy / security questions. I can't put my finger on exactly what worried me - but somehow it just sounds wrong to me..
  • People asked "Why would I want to share all my interests with someone just because I read their website? I can maybe understand it for a blog, but not for websites in general."


So why did anyone bother - and why is the GFC Followers gadget still on some blogs.


Obviously there were problems with Google Friend Connect:   Personally, I never quite understood it, despite using Blogger long before GFC was introduced.   Even when I started Blogger-HAT in late 2009, GFC just never stood out as something that was important-enough for me to understand.

But some people did use it - and in particular enough Blogger users that Google decided not to turn it off for Blogger.

I noticed that other people had a GFC gadget on their blogs, so I added one to Blogger-HAT - as much as anything because I use it as a test-site to try out features to see how the might work on my other sites.

Finally today, the penny dropped when I saw this a comment "some people that they used their GFC/Blogger Dashboard in place of something like Google Reader" here while I was researching this article.   What it means is that if you signed up to a blog/sites using the GFC-Follow gadget, then you can use the bottom part of the Blogger dashboard instead of an RSS reader.

Today, readers can still sign up for websites which have the Follow on Google Friend Connect gadget on them, but the gadget cannot be added to any new sites, at least not using Blogger's standard tools for adding a gadget to your blog.

The Blogger-dashboard is still being updated with posts from Blogger-based sites that you've signed up to using GFC.

Lots of people are speculating that sooner or later this will be turned off, but no one knows exactly when that will happen.



Related Articles:

How to add a gadget to your blog

Where to find the HTML code for popular gadgets

Linking your blog to the social networks

Putting a Facebook Page badge into Blogger

Tuesday, 9 July 2013

41-Megapixel Nokia Lumia 1020: Everything (we think) we know so far

Which phone has been your favorite so far? Samsung Galaxy S4, HTC One or iPhone 5? Certainly these devices are so hot and sell well around the world. It means a lot but it doesn’t mean everything. Now you have a new choice. How about Nokia's new Lumia 1020? Ahead of the formal announcement in New York on Thursday, details are leaking about the Finnish company's latest device for the U.S. market. Nokia Lumia 1020 is getting a lot of attention for its impressive 41 MP camera. Here’s what we know:
1.  Specs
The device will have a 4.5-inch display and quad-core microchip. It features optical image stabilization, an FM radio, near-field communication tech, 2GB of memory and 32GB of non-expandable flash storage, per the previous link. Oh, and wireless charging will be an option.

2.  Color – Yellow, Black and White
According to Windows Phone Central, Nokia Lumia 1020 will come in white, yellow and black colors.

3.  Mobile Name – Lumia 1020
Over the weekend, Microsoft Windows Phone manager Joe Belfiore posted on Flickr a series of sample images from different Lumia Windows Phones — two of which were shot with a phone tagged as the "Lumia 1020." So this smartphone will launch as the Nokia Lumia 1020. And it will be a Windows Phone, per this unconfirmed press photo and unconfirmed field photo.

4.  Camera – 41 Megapixels
Its differentiating feature will be a camera. Nokia gave us "41 million reasons to zoom in" a few weeks ago, and the company in February introduced a 41-megapixel camera. That was followed by a Guardian report saying it would be taking that tech to Windows Phone handsets.
Additionally, the Lumia 1020 will use Nokia’s Pureview sensor (also featured on the 920 and 808) to take high quality images in low light situations.  The 1020’s camera is also expected to include sophisticated (if not new) photography options like: Optic Image Stabilization, LED and Xenon flash, a “lossless zoom” feature, and settings for ISO, white balance, manual focus, and shutter speed. Its camera "takes the image in 32MP and 5MP at the same time in 16:9," according to Windows Phone Central, and "shoots 38MP in 4:3."

Rumors have also been circulated that the Lumia 1020 has appeared on AT&T’s inventory list.  This all but confirms that the device will be officially announced and demonstrated this Thursday, and indicates we’ll most likely be able to buy it within the next month.

Cataclysm: Dark Days Ahead, funded!

The self described open-source rogue-like survivalcraft / driving game in a sci-fi zombie apocalypse has successfully reached its goal on Kickstarter, and one of the developers will now be able to work on it full-time for a few months to implement for example a back-end for proper graphics.

But see and hear about it yourself:


The first stretch-goal is close too, with 12 days remaining to pledge money towards this cool project.

Less rosy does it look for the previously featured Data Dealer project. With only 48 hours to go, but still about 10k missing it will be a close finish if at all. They got some remarkable press lately though and jumped up about 10k in the last days, so it is still possible. So if you haven't done it yet, pledge here.

Basic view component checkbox

Basic view component Button -2

Sunday, 7 July 2013

How to Delete a Blogger / Blogspot Blog without Deactivating the Google Account

When i was a novice blogger, i created some blog which are not good for long term business and not preferred by Google. So i decided to delete those blogger / blogspot blogs after some time. At that i was not able to find the option to delete the blog. At that time i decided to delete all posts in that blog so that my blogger / google account is not harmed. But now bestrix.blogspot.com know the way to delete a blogger / blogspot blog without deactivating the Google account.

How to Delete a Blogger / Blogspot Blog

Its not a tough task to delete a blogger blog. You just need to go to the correct menu option to delete it. Usually we try to find it in the blogger dashboard, where list of all blogs appear. Previously i tried to find it here but got nothing. So i decided to check other options. Here is the direct method to delete a blogger blog.

Steps to delete a blogger blog

Blogger Dashboard
  • Go to Blogger dashboard.

  • Go to the Settings of the blog that you want to delete.
  • Now go to "Others" option in settings.
  • Here you will find a link named "Delete Blog".

Delete Blogger Blog
Once you delete the blog, it will show you an option to download all posts in that blog. so if you want to save the data in those posts, then you can do it. Else you can continue with deleting the blog.
The blogs deleted by you will remain in "Deleted Blogs" section of your blogger dashboard for 90 days. So if you want to recover that blog due to some reason then you can do it.


Saturday, 6 July 2013

AdWords external keywords research tool is going to be retired

This quick article shares an observation about the likelihood that Google's free Keywords Research Tool is being turned off.


Most SEO advice says that if SEO is important for your blog, then you should use a keyword research tool to find out the words and phrases that people are actually searching for, and then use these words (so-called "keywords") a lot, because they are most likely to get more visitors for your blog.

There are many tools that can be used to look for keywords, but Google's own keywords research tool is often recommended:  it's free, and no one knows more about key-words than Google does.

The tool is provided as part of the AdWords product (ref AdSense vs AdWords what's the difference).

Usually, you need to sign in to an AdWords account to use their tools.   An AdWords account may be based on your usual Google account, but because it can be used to buy advertising, Google ask you to put a small amount of money into it, so you can use it to pay for advertising campaigns immediately.    (They don't charge you immediately, they just want your account to have a positive balance, so it's able to be used.)

However their Search-based Keywords tool (announced back in 2009) and it's upgraded version, the Keywords-tool ( http://www.adwords.google.com/keywordtool or https://adwords.google.com/select/KeywordToolExternal - both which currently re-direct to https://adwords.google.com/o/Targeting/Explorer?__c=1000000000&__u=1000000000&ideaRequestType=KEYWORD_IDEAS ) have been available without logging in, provided you complete a simple captcha-text .

Today, though, I've noticed this announcement at the top of the page:
In the coming months, the external Keyword Tool will no longer be available. To get keyword ideas, sign in to your AdWords account and try Keyword Planner.

I cannot see any announcements about this in the AdWords blog.   But this actually has very little information about the keywords tool anyway, most of what is there dates from 2008/09, and they haven't used "keyword" as a label for their posts.  

Google aren't in the habit of putting up notices like that which are wrong, so my guess is that, sooner or later, this tool is going to be removed, and their only keywords-research option will be the Keyword Planner, which isn't free .

So maybe it's time to start finding a new favourite free keyword research tool.   Some reviews to get started with:

Or maybe bloggers should just forget about keyword research, and focus SEO-basics, and then on writing good quality, natural-language, unique content.



Related Articles


AdSense vs AdWords what's the difference

 Five reasons why SEO is irrelevant for your blog

Getting started with SEO for Blogger users

Thursday, 4 July 2013

Top 5 Best Web Browsers for Android in 2013

Tired of using the default web browser on your android phone? Well, my friend, it’s time for an upgrade! There are a good number of web browsers available for Android, but which is the web browser for your android device? In this post, I am going to list download 5 best web browsers for android which will make your web browsing faster and more comfortable.

Chrome Browser – Google
Google Chrome is the best and most reliable web browsers for desktop, my favorite. And Google Chrome for android is one of the most powerful web browsers for android. It has various powerful features like fast searching and navigates fast, sync function etc. which will customize your chrome experience. It lets you take the bookmarks and saved passwords from your desktop Chrome to mobile Chrome.

Opera Mini web browser
Opera Mini is another best web browser for the Android platform. Opera Mini uses Opera's servers to compress Web pages so they load faster. You also save money on data charges since it uses as little as a tenth of the data of normal browsers. It has one great feature called Smart Page. It gives you instant updates from your social networks, along with the latest news, entertainment, and sports.

Firefox Browser for Android
The official Mozilla Firefox android browser is fast, easy to use, & customizable, with the latest security and privacy features to help you stay safe on the internet. Main features:
Fast— Access, browse, and search the web at blazing speeds
Smart— Keep your favorite sites and mobile videos at your fingertips with smart searching, easy-to-use tabs, and desktop-to-mobile Sync features
Safe— Make sure your Android web browser stays safe & private with extensive security settings, add-ons, and features like Do Not Track

Dolphin Browser
Dolphin makes mobile browsing easy, adapting to the way you want to browse with a personalized home screen, voice and gesture control, customizable settings and sharing features. Some of the important features which make this browser different from the rest are: Webzine (Fast Web page loading, with no ads), Speed dial, sidebars and interesting add-ons.

UC Browser for Android
UC Browser for Android provides you fast and smooth Web surfing experience. It's a totally free app. Adaptable configuration helps you adjust your way of browsing under different network connections, allowing you to reduce data costs and speed up page loading with compression.

There you have it: your picks for the five best web browsers available for Android. Now it's time to decide which one is the best overall.

Basic Malware Cleaning



Last year in September I wrote an article for Hakin9 on how to detect, identify and of course disinfect a machine from malware.

I've decided to publish it on my blog as well, you can also download it from the following links in PDF format:
http://www.mediafire.com/?gz7qic8h7xcgyst
http://www.mijnbestand.nl/Bestand-KGJYA43TA3BP.pdf (mirror)


Here's the article:




Basic Malware Cleaning

Malware is common nowadays. Each day, machines get infected with viruses, spyware, Trojans, keyloggers, rogueware, ransomware, rootkits, … The list continues with more advanced malware like Conficker, Duqu, Stuxnet, Flame, …

The malware scenario on itself has also drastically changed. Where in the past, malware was created for showing off your skills or gaining your 15 minutes of fame (remember LoveLetter?), it is now almost solely used for the purpose of making money.

If you are reading this article, you have already helped someone getting rid of malware infestations, or you at least have an interest in the basics on how to clean malware from an infected machine.


What you will learn...

  • Identifying malicious processes, terminating these processes and how to properly prevent them from running
  • Identifying malicious startup entries and system modifications
  • Identifying related malicious files, meaning droppers and payload
  • Identifying the malware source and effectively tackling it


What you should know...

  • Basic computer knowledge and common sense
  • Use a proper environment for testing purposes



About the author

The author has been working as a technical support engineer in the antivirus industry for several years and is also involved in performing malware research and malware analysis, intended primarily for improving his own skills and raising awareness amongst every computer user, whether it would be home or business users. You can follow him on Twitter: @bartblaze




Introduction

Before we begin, I’d like to make clear that if you want to test your skills after reading this article or want to test malware in general, you should set up a proper testing environment. Make sure you are using a Virtual Machine if testing on your own machine, or create a machine for the sole use of testing malware and antimalware tools. In either case, it’s a good idea to use a separate network or use a DMZ should you have one. Personally I recommend having the machine connected to the internet, so the malware can do its evil work to its maximum potential and you will be able to carefully study and dissect its workings completely. I’ve made a post on my blog as well on how to build your own malware analysis lab: http://bartblaze.blogspot.com/2013/06/basics-for-malware-analysis-lab.html


More tips can be found in the section On The Web in the last paragraphs of this article.



In the next paragraphs, we will see three possible malware scenarios:

  •  Rogueware
  •  Trojan horse
  •  Rootkit



For each malware scenario or case study, a sample was executed and the machine was consequently rebooted to view the malware’s effects. Each case study will be outlined with the necessary tools and steps to take on how to completely eradicate the above infection types. Note that after performing manual clean-up, it is advised to perform a scan with an (preferably) online antimalware or antivirus product. Most antivirus companies offer a free online scan and automatic removal.

We will be making use of the following tools:

  • Autoruns
  • GMER
  • Process Explorer
  • RootkitRevealer
  • Rootkit Unhooker




First case study - Rogueware

Rogueware is probably one of the most known types of malware nowadays. The reason is simple: when one gets infected with rogueware, annoying pop-ups will appear all over the screen, urging to buy their precious Antivirus, which has found enough infections on your machine to completely toast it – if they were real. Rogueware is simply blatant enough to appear fully on your screen, whereas most other types of malware will (try to) work silently in the background.


In this first case study we will only make use of the tools Process Explorer and Autoruns, both created by Sysinternals.

After running our first sample and rebooting the machine, we receive several messages that the machine is infected and we should take immediate action. A screenshot of this specific rogueware:







Figure 1. Rogueware called ‘Live Security Platinum’ running on our machine




Let’s start Process Explorer and see what’s running!



 Figure 2. Process responsible for Live Security Platinum


What can you make of this screenshot? There are indicators this is indeed malware:

  • Random filename
  • No file description
  • No company name

Explaining why there is a random filename:
trying to evade specific antimalware tools which focus only on names the malware uses – for example, I remember a specific rogueware family from back in 2009 that always placed the same DLL in the System32 folder: win32extension.dll


Tip: If you’re in doubt whether a process is malicious, simply right-click it in Process Explorer and select Search Online...
Most of the times, Google will have a history of this filename. If the search is turning up zero results, it’s an extra confirmation that it concerns a malicious process.


Explaining why there is no file description or company name is simple: in earlier days – the days of Windows XP to be exact – the basic Task Manager did not display any file description or company name. So basically, there was no use in including it since it wasn’t displayed anyway. In Windows Vista, Windows 7 and soon Windows 8 Task Manager is improved.


This malware hides in %appdata%, which is a system variable for the Application Data folder of the currently logged on user. What else can we deduct from this screenshot? The rogueware uses a Microsoft icon, thus trying to trick the user to indicate it’s nothing malicious. An effective trick indeed, but considering the previous factors, we can be sure this is a malicious process which needs to be terminated.


A useful setting in Process Explorer is through Options > Verify Image Signatures. With this option, you’ll be able to quickly determine if a file claiming to be from Microsoft is indeed so or not. Note that these may be forged. 


There are three color codes important for us:

  • Green – new process
  • Red – killed process
  • Purple – process with images that are packed. Intention: hiding strings, evading antivirus detections


By right-clicking the process and choosing Properties, we can gather more intelligence about the file. A short overview of the tabs useful for our malware identification:

  • Image – image file properties
  • Strings – strings loaded into the image or memory 



Figure 3. Image Tab details



Thanks to the Image tab, we are able to view the file location, any command line arguments there may be, but also if the file has a valid Image Signature and the current directory from where the file is executed.


Moving over to the Stringstab, where we may find interesting information about the file and its behavior. An example:


Figure 4. Payform.html, which is the rogueware’s own webpage to order its ‘product’



Let’s close this and start with the cleaning of this type of malware.



First step is killing the rogueware by right-clicking the process in Process Explorer and choosing Kill Process. The rogueware will disappear like snow in the sun. Note that some rogueware is protecting or guarding each other’s process, so it’s possible you will have to Suspend a process first before killing its guardian. Afterwards you can kill the first process and the rogueware will not re-appear again.





Second step is of course disabling the rogueware from starting up with Windows. In order to do so, we will be using Autoruns:



Figure 5. Autoruns Logon tab view



Navigate to the Logon tab and choose to delete it. Click Yes to confirm. Close Autoruns. If you are unsure about a Logon entry, simply untick the checkbox first instead of deleting it.


A trick that is often utilized by malware authors is to hijack several antivirus processes to, for example, svchost.exe or to their own malicious program. They do this to prevent antivirus software from running and making sure their malicious program will be executed. Sometimes, Task Manager, Regedit, the Command Prompt(CMD) and other tools are hijacked as well. I’m sure you have encountered before that you were unable to run any of these built-in Windows features. The reason is Image Hijacks.


We will now be using the same trick against them, by creating our own Image Hijack or, as Microsoft calls it: Image File Execution Options. To do so, we will use Regedit:



Figure 6. Image Hijacks can be added under: HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options


In order to add an Image Hijack, right-click on the Image File Execution Options key and select to create a new Key. This key must be the exact same name as the malware name. In our first case study, this means: 529C50D8212C2CDD6A42F365D151FC4E.exe


We subsequently create a new String Value under this key with Value Name: Debugger and Value Data: svchost.exe. Now, even when the rogueware is still on the system, it cannot start since it will be forced to start svchost instead.


You can also do this faster by using the following small piece of code and running it by clicking on Start > Run and pasting it in the message box. Replace XXX.exe by the name of the malware:


reg add "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\XXX.exe" /v Debugger /d "svchost.exe" /f



In our first case study, for the ‘Live Security Platinum’rogueware, this would be:


reg add "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\529C50D8212C2CDD6A42F365D151FC4E.exe" /v Debugger /d "svchost.exe" /f




Tip: in Autoruns there’s a useful tab called Image Hijacks which will display any present modifications to this key:



Figure 7. Check if there are any Image Hijacks present


Have you completed all these steps, reboot the machine. If nothing seems to pop up or alarm you, you can visit the folder where the rogueware resides and delete the malicious file. Note that you might have to enable Hidden files, folders or drives, and to unhide Protected Operating System files. You can do this via Windows Explorer:
  • For Windows XP: Tools > Folder Options > View
  • For Windows Vista and Windows 7: Organize > Folder and Search Options > View





This concludes our first case study. Be sure to remember it, as we will be using the same tools for our next malware family:
a Trojan horse.







Second case study – Trojan horse

Trojan horses or Trojans are typically data stealers and can copy themselves on your machine. They may also turn your machine into a zombie, which is basically a computer part of a botnet.


Trojans often disguise themselves as legitimate programs; for example an upgrade of Adobe Flash Player, a crack or key generator for a game or Microsoft Office and many more.


After executing our sample and rebooting the machine, we don’t see anything malicious in Process Explorer. Actually, we are seeing something strange. A Firefox instance was running even though we didn’t start Firefox. When starting Firefox manually, it gets loaded under Explorer. In this case, it was not loaded under Explorer, but started as a separate process:



Figure 8. Malicious Firefox process loaded. As you can see, svchosts.exe is injected into Firefox


The Trojan has loaded a malicious version of a Firefox process, to effectively hide itself from users. After all, who would suspect a Firefox process to be malicious? You can search for Handles or DLLs via the menu Find. Svchosts.exe is the Trojan on itself, which we will see below. Note: for this reason, the Trojan has rootkit capabilities, which we will discuss in the next case study.


If we verify any system modifications with Autoruns, there are two new entries added in the Logontab:



Figure 9. Two new entries in the Logon tab of Autoruns. We will now discuss some characteristics





In Figure 9 there are two entries highlighted: one under HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit, while the other one can be found under HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run.

The Trojan has attached itself to the Userinit value, which will ensure that it starts right after a user logs in to Windows. It has also placed an entry in the Run key, as an extra check to start up with Windows.


If we take a look at the Trojan’s file information:



Figure 10. Trojan’s file information


There are a few things that should get your alarm bells ringing:

  • The file is only 188 kB
    --> files with a small size are more likely to contain malware
  • The filename is svchosts.exe and resides in C:\Windows--> malware imitating legit Microsoftfiles is not uncommon
    --> the legit file is named svchost.exeand resides in C:\Windows\system32
    --> most, but not all, malware hides in C:\Windows or C:\Windows\system32
  • The file description reads “deine mutter-->  which is German for “your mother” and is considered an insult in some countries
  • The icon of a microphone is used into tricking you this might be legit software--> voice or audio recording software for example



Let’s move on and start disinfecting the machine step by step. First step is to Kill the malicious Firefox process with Process Explorer.




Next, open up Regedit and navigate to the following key: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon



Figure 11. Hijacked Userinit value




Restore the default Userinit value by double-clicking on the value and entering as Value data (this is the default Value data for Userinit):

c:\windows\system32\userinit.exe


Open Autoruns again or should you not have closed it, refresh. You will see the first entry has disappeared. Now simply delete the other value.



Tip: did you know you can easily access the Registry via Autoruns? Right-click an entry, select Jump To…and you will be taken there instantly. Very useful in cases where the Userinit, Winlogon or Shell Valuekeys are hijacked or altered.



At this point, reboot the machine and verify with Process Explorerthat there aren’t any malicious processes still present, or a malicious Firefox process. Verify with Autoruns that all startup entries are removed. Navigate to the folder where the malware hides and delete the responsible file(s).



This concludes our second case study. In the next case study we will see how to handle a rootkit infection.



Third case study - Rootkit

Rootkits are a type of malware apart. Rootkits are software which can hide processes, files & folders, drivers, registry keys and much more from the Operating System, antivirus software and many security tools. Rootkits can also be used to gain and retain administrator privileges on a machine.

Typically, you can divide rootkits into two categories or types:

  • User mode or user land rootkits
  • Kernel mode or kernel land rootkits





Figure 12. Figure of protection rings. Rings are mechanisms to protect data and functionality from
faults and malicious behavior. (Image source: Wikipedia)




User mode rootkits: operate in Ring 3, together with user applications

Kernel mode rootkits: operate in Ring 0, with the highest Operating System privileges



Rootkits can perform many tasks, besides hiding themselves, they can also disable antivirus components, perform DLL injection (inject and run code in the address space of another process), hide other malware, download additional malware, provide an attacker access to the machine, turn the machine into a zombie, …. You get the point.


In this case study, we will see the infamous TDL3 rootkit (which is a ring 0 rootkit), more specifically the “4DW4R3” rootkit. It was dubbed the 4DW4R3 rootkit because of the strings found in the associated DLLs. (associated files for this malware also start with 4DW4R3 and attached 10 random letters after it, for example: 4DW4R3vDqMXSvfxR.dll)



After executing the sample, it gets deleted immediately. Let’s reboot the machine at this point and document our findings.


Firing up Process Explorer and Autoruns still works normally, but there doesn’t seem to be anything suspicious. In this case, we will need to run some more specialized tools in order to uncover the rootkit’s modifications to the system.


When encountering a rootkit infection, it is recommended to run at least three different anti-rootkit tools. Why?

  • Anti-rootkits can produce false positives
  • The rootkit may have used hooking to prevent certain anti-rootkit tools from running or
    even displaying incorrect results





The first anti-rootkit tool we will be using is RootkitRevealer, another Sysinternals tool:



Figure 13. RootkitRevealer found four files hidden from the Windows API. This means you won’t be able to view them, not even
when having the option on to view hidden files and folders, or protected operating system files


Note that we will only focus on the highlighted changes for now. The others are also from rootkit modifications, where it is denying access on certain registry keys for RootkitRevealer.


Now that we have uncovered associated files from the rootkit, we can use Process Explorer again to verify if there has been any DLL injection. In our second case study, we have already briefly seen this occurrence.




Figure 14. Through the menu Find > Find handle or DLL… We discover that 4DW4R3vDqMXSvfxR.dll is injected into svchost.exe








Besides injecting into svchost.exe, the rootkit will also (attempt to) inject itself in newly created processes, for example firefox.exe

Result is you will be redirected to a shady search engine whenever you are trying to search something on Google, Yahoo or other search engines. This can be verified by opening the 4DW4R3vDqMXSvfxR.dllfile in Process Explorer and selecting the Strings tab
(be sure to select Memory):



Figure 15. Search results on Bing, Google, Yahoo, AOL,… Will all be redirected to another (malicious) search engine







When using Rootkit Unhooker, it notifies us of Possible Rootkit Activity. When reading the log, we see the following lines:


==============================================

Stealth



Unknown page with executable code

Address: 0xF889C8BB

Size: 1861



This indicates there’s something stealth, which may be malicious, at address space F889C8BB. The code at this address space is probably used to prevent the scanning of registry keys by certain anti-rootkit tools, as was the case with RootkitRevealer.




When using GMER, it starts a scan of the system right away and will state whether or not there’s an infection:



Figure 16. The 4DW4R3 rootkit has also been discovered by GMER



Let’s review what GMER has found as system modifications:

 Code     F889BEB5      ZwCallbackReturn

 Code     F889B979     ZwEnumerateKey

 Code     F889B96F     ZwSaveKey

 Code     F889B974     ZwSaveKeyEx

 Code     F889BBD2     IofCompleteRequest



ZwCallbackReturn: ensure communication between user mode malware components and the kernel mode rootkit

ZwEnumerateKey: hide registry keys, prevent anti-rootkits from scanning the registry

ZwSaveKey & ZwSaveKeyEx: prevent some anti-rootkits from scanning the registry or detecting mischief

IofCompleteRequest: hide and protect rootkit files


Let’s review what GMER has found as service modifications:

·     Service  C:\WINDOWS\system32\drivers\4DW4R3nKkNtexUqD.sys (*** hidden *** )  [SYSTEM] 4DW4R3      <-- rootkit="">


It is obvious by now the machine is infected with a rootkit. We will be using GMER to fully disinfect the machine. Right-click the service and choose Delete Service. If you receive an error, choose Disable Service. Reboot the machine.


Now that the service is deleted (or disabled) we are able to view the files the rootkit has placed. Simply delete them and reboot:



 
 Figure 17. The rootkit’s associated DLLs and drivers


This concludes our third case study. In the next paragraphs you’ll be able to find additional information on how to handle a malware incident.





Signals of infection

In most cases, it’s pretty obvious when facing an infection like rogueware or ransomware: pop-ups and annoying messages all over the screen. There are other symptoms which may not always seem originating from malware:
  • Failing of Windows Firewall, Windows Security Center warnings. Microsoft Update malfunctioning.
  • Not being able to execute antimalware tools. Not being able to visit websites from antivirus vendors.
  • Redirections taking place in your browser to shady search engines.
  • Severe slowdown of the machine. More bandwidth usage than usual.
  • Suddenly finding software on your machine you never installed or never gave permission to.
    These are called Potentially Unwanted Programs (PUP) or Adware.
  • Unexpected Blue Screens (BSOD). This might be due to a badly written rootkit for example.
  • Unexpected errors or malfunctioning of antivirus and antimalware programs.







General tips and tricks

In this section I’ll add some extra tips and tricks for problems you might encounter during the disinfection process:


  • If a tool is refusing to run, try renaming it to explorer.exeor svchost.exe. Some rogueware families will block all applications, but will allow system processes to run.

  •  If a tool is refusing to run, and you already tried above trick, try renaming to SomeName.com. It’s possible all EXEfiles are disallowed from running. There’s a tool called exeHelper which will restore the default values for PE (executable) files.

  • Another useful tip is trying to boot the machine in Safe Mode. Some malware will only place a value in HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run, which is ignored when booting in Safe Mode.
    Note that malware X won’t do much in Safe Mode, but can actually still be downloading additional malware if you decide to boot in Safe Mode with Networking.

  • Rootkits can interrupt the execution of several anti-malware tools, where even above tricks won’t be able to help. In that case, you should try fixing the permissions of those tools. A very useful tool for this is Inherit. Just drag and drop the tool or program you want to execute on Inherit. Wait for the message box “OK” to pop up and you should be able to run it.

  • Also in case of a rootkit or any other malware infection, it is advisable to change your most important passwords after fully cleaning the machine. Remember that when having encountered a rootkit infection and cleaning the machine, it is possible there are still infection leftovers. In case of doubt, reinstall Windows completely. In case of a bootkit, which infects the MBR, you need to boot the machine from the Windows installation CD, choose the Recovery Console, and type the command fixmbr in the command prompt. Press Enter and the MBR or Master Boot Recordwill rebuild.

  • In some cases, the machine is infected so badly that it’s almost unworkable to run any tool. It’s also possible you cannot boot into Windows anymore. In such cases, you can use a boot CD or safe CD from an antivirus vendor. An alternative is the Sardu Multiboot CD or DVD and USB creator, which combines several antivirus rescue CDs. Or you can completely reinstall the machine. Tip: take regular back-ups of important files and folders!






Prevention tips and tricks

I’m guessing most of you already know how to protect yourself against mischief, though I’ll repeat some general tips once again. Repetition is key. Some do’s and don’ts:


Do install an antivirus program – yes, you never use antivirus and you’ve never been infected before. Still, using antivirus reduces the chance even more.

Do uninstall applications you don’t need – examples are Java and Adobe. If you do need them, update them frequently.

Do uninstall browser extensions you don’t need. If you do need them, check for updates frequently.

Do your updates. This includes Windows updates, antivirus updates, browser updates and any other software you may be using.

Do use layered protection if possible – Firewall at hardware level (router), HIPS, antivirus, antimalware …





Don't open email attachments from unknown senders - ever.

Don’t click on everything on the internet. Meaning: use common sense when browsing the web.

Don’t trust everything on the internet. If it looks too good to be true, it probably is!

Don’t fill in your personal information or email address on random websites.

Don't use the same password for each and every website! Implement proper password security.

Don’t panic if you suspect you’ve been infected. Read the tips below on what to do if you are.





Help! I’m infected!

What could be the best procedure if you suspect to be infected? Suggested model:

·          Stay calm, don’t panic. Disconnect yourself from the network.

·          Identify and kill malicious processes.

·          Identify and delete malicious autorun entries.

·          Reboot and repeat the previous steps.

·          Delete associated files and folders.

·          Run a full scan with your installed antivirus product.

·          If disinfection is applied successfully, connect to the network again. If possible, connect to a separate network first to verify everything is indeed back to normal or not. Perform an online scan with another antivirus product than the one you have installed.




If you’re in a corporate network, what could be the best procedure if you suspect to be infected? Suggested model:

·          Stay calm, don’t panic. Disconnect yourself from the network & contact your network administrator.

·          Write down useful information:

o    What were you doing at the time? Did you notice anything special? What was the time and date anyway?

o    Why do you believe your machine is infected? Which steps did you take already, if any? Did your antivirus prompt?

o    Inform your co-workers you’re going for a coffee break.






Summary

This concludes our three case studies – rogueware, Trojan Horse and rootkit. I do hope that you have enjoyed reading the article and going carefully through each step.

We have seen three different case studies as described above, but it is totally not uncommon to have all three types of malware on the same machine. For example, certain families of rogueware have been seen to dropthe infamous TDL4 rootkit variant. Goal is to ensure the persistence of the payload on the machine. Therefore, it is advised to always use an anti-rootkit as well.

Remember that some malware is more advanced than others, and it might take you some time to fully disinfect a machine. Sometimes it’s easier, quicker and cleaner to perform a reinstallation of the operating system. If you’re ever stuck, there are many forums out there specifically for helping you in cleaning malware off an infected computer.

As quickly as malware is evolving, so are the people who are constantly battling them – whether this would be antivirus companies, independent malware or security research folks, agencies and governments… Join our cause in making this world a malware-free environment and educate everyone around you, each day.

Should you have any further questions, comments or remarks, I am always available for feedback. You can contact me via Twitter:
@bartblaze .










Glossary

Address space – in this context, memory address of a process.
Botnet – a group of computers infected with malware and controlled by the so called bot herder. Botnets can be used to launch DDoS attacks, send spam …
Dropper – a dropper is a program that installs or downloads additional malware on a system.
LoveLetter – also known as ILOVEYOU worm – spread mostly via email, infected millions of machines.
Master Boot Record – first 512 bytes at the first sector of a hard drive.
Payload – modifications or damage done by malware.
Zombie – computer infected with malware and possibly compromised by a hacker. Zombies are typically part of a botnet.