Author Archive

How to fix a corrupt Windows user profile

Posted by

Activate Hidden Administrator Windows userIf you are typing your password and press Enter and see the error message “The User Profile Service failed the logon” and “The user profile cannot be loaded”, and then are returned to the logon screen, your Windows user profile may have become corrupt.

A Windows user profile is a collection of settings that make the computer look and work the way you want it to. The Windows user profile contains your personalized settings for desktop backgrounds, screen savers, mouse pointer preferences, sound settings, and other Windows features.

While it is hard to say exactly why Windows user profiles become corrupt there are a few more common reasons that this happens. The antivirus software on the computer could have corrupted to profile by running a scan before the user profile was actually logged into the computer. Another reason the user profile can be corrupted is malware has messed up the registry settings for the user profile, and it no longer works and has become corrupt.

If you have recently attempted to log on to Windows and received an error message that says that your user profile might be corrupted, there are a few steps you can try to repair it.

WARNING: You should create a backup of your user files before attempting to fix your user profile. Contact a local computer repair store if you need help to backup your data.

Try a reboot

The first attempt you can try to fix your Window user profile is to simply reboot the computer. Sometimes a reboot will fix the issue, and you will be able to log in to the profile when the computer is completely rebooted.

Try creating an alternative user profile

If rebooting the computer doesn’t seem to fix the corrupt user profile, then a quick and easy fix is to create a new user profile on the Windows computer, and then copy the files from the existing profile to the new one. While this should get you back up and running you will lose all of the Windows user personalized settings by doing this such as the desktop, screensaver, etc. You will have all of your user files ie. Documents, Videos, Pictures, Music, etc.

To accomplish creating a new Windows user you will need to log in to an administrator account on the computer. If you have another administrator user account already created you could log in to this account, however if you only had one administrator account on the computer you will need to activate the default Windows user account.

First boot the computer into Safe Mode by pressing F8 during bootup. On the Windows loading screen choose Safe Mode from the menu. When the Windows desktop is launched, choose the start menu and search for cmd. When the computer finds the command prompt program right click and run the program as administrator.

When the command prompt program is launched type in the command: net user administrator /active:yes

This will activate the “hidden” administrator account on the computer after the computer is rebooted.

You should see a message that the command completed successfully. Log out, and reboot the computer and you’ll now see the Administrator account as a choice.

Log in with the new Administrator account. If you are prompted for a password it is probably not set and by not typing anything in the password input should log into the account.

When you are logged in as the Administrator account:

  1. Open User Accounts by clicking the Start button Picture of the Start button, clicking Control Panel, clicking User Accounts and Family Safety, and then clicking User Accounts.
  2. Click Manage another account. Administrator permission required If you’re prompted for an administrator password or confirmation, type the password or provide confirmation.
  3. Click Create a new account.
  4. Type the name you want to give the user account, click an account type, and then click Create Account.
  5. Restart the PC.

When the computer has rebooted

  1. Log on as the administrator user.
  2. Open the My Documents folder by clicking the Start button Picture of the Start button, and then clicking Computer. Double-click the hard disk drive that Windows is installed on (it’s usually your C: drive), double-click Users, double-click the folder with the name of the corrupt user profile account, and then double-click My Documents.
  3. Click the Tools menu, and then click Folder Options.
  4. If you don’t see the Tools menu, press Alt.
  5. Click the View tab, and then click Show hidden files, folders, and drives.
  6. Clear the Hide protected operating system files check box, click Yes to confirm, and then click OK.
  7. Locate the C:\Users\Old_Username folder, where C is the drive that Windows is installed on, and Old_Username is the name of the profile you want to copy files from.
  8. Select all of the files and folders in this folder, except the following files:

    Ntuser.dat

    Ntuser.dat.log

    Ntuser.ini
  9. Click the Edit menu, and then click Copy.
  10. If you don’t see the Edit menu, press Alt.
  11. Locate the C:\Users\New_Username folder, where C is the drive that Windows is installed on, and New_Username is the name of the new user profile you created.
  12. Click the Edit menu, and then click Paste.
  13. If you don’t see the Edit menu, press Alt.
  14. Log off, and then log back on as the new user.
  15. If you have e‑mail messages in an e‑mail program, you must import your e‑mail messages and addresses to the new user profile before you delete the old profile. If everything is working properly, you can delete the old profile.

    Attempt to salvage the corrupt user profile

    If you want to attempt to salvage your old Windows user profile, you can try this more complex solution:

    Restart your PC and boot into Safe mode by pressing F8 before you see the Windows loading screen and choosing Safe Mode from the menu that appears.

    1. To fix the user profile, click Start and type regedit into the search box and press Enter.
    2. In Registry Editor navigate to:
      HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList
    3. Click each S-1-5 folder and double-click the ProfileImagePath entry to find out which user account it relates to.
    4. Once you have located the folder for the corrupt profile (and it doesn’t have a .bak ending), double-click RefCount and change the Value data to 0 and click Ok.
    5. Now double-click on State and make sure the Value data is again 0 and click Ok.
    6. Close regedit and restart your PC. You should now be able to log into your account.

    If you continue to get the corrupt user profile message you will need to attempt to create an alternative user profile and copy the data from the corrupt user profile into it.

    If you are unable to successfully create a new user profile, bring your computer to South City Computer or a local computer repair store near you.

Alderman Vaccaro Says “Be Careful of Scams!”

Posted by

Joe Vaccaro PictureJoe Vaccaro is the Alderman of the 23rd Ward in Saint Louis City. He is very involved with the community and frequently passes on tips and information about dangers to people in the community.

Below is an email that we received explaining how peope will try to trick you. Given these are pretty unsophisticated examples that the average person would simply laugh off as a scam. But hackers oftentimes will use more sophisticated techniques like the “You Qualify for a Lower Rate” credit card scam.

Joe Vaccaro
23rd Ward Alderman
cell number 314-718-0131
Ward 23 Website

Yesterday I received a phone call from someone that was told that they needed to go to Walgreen’s and bring $452 in cash to avoid being arrested for failure to appear for grand jury duty. He is not even on the grand jury. This was a scam and I told him not to pay this. I also ran into someone at St Joan of arc’s fish fry that told me they received a call from someone claiming to be with the IRS also asking for money to avoid arrest. DON,T BE TAKEN IN BY THESE SCAMS. If you get a call like this do not react. you can call the police and ask them if this is a scam. 231-1212 is the non emergency number. I talked to the captain of the second district and he told me there is many variations of this scam going around. Please pass this along to to your neighbors especially the elderly who seem to fall victim to this kind of scam.

Joe Vaccaro
6227 hancock
st louis Missouri 63139
United States

I am so glad I walked into South City Computer!

Posted by

I walked in a desperate situation having been told by big tech support chain that i would need to spend the cost of a new computer to fix mine and be without it for 2 weeks. I was advised to get a second opinion by a friend and I am so glad I walked into South City Computer! Not only were they able to restore my computer the fix didn’t cost the price of a new one!! If there were more than 5 stars I would give them!!! Amazing service!!!! Thank you South City Computer!

Protecting Computers with OSSEC

Posted by

OSSEC is a five letter acronym for security. It stands for Open Source Security. OSSEC is free, host-based intrusion detection system (HIDS) that can help to protect your computers and servers from a variety of attacks. OSSEC analyzes your computers logs for attack signatures, performs integrity checking on your files, monitors the Windows registry, assists in rootkit detection, time-based alerting, and active response. It provides intrusion detection for most operating systems, including Linux, OpenBSD, FreeBSD, Mac OS X, Solaris and Windows. OSSEC’s centralized, cross-platform architecture allowing multiple systems and operating systems to be easily monitored and managed. It was written by Daniel B. Cid and made public in 2004.

We are currently experimenting with deploying OSSEC on some systems to determine if it is possible to adopt it for our customers’ systems. Since it is a distributed platform the more people who employ it the smarter it gets at preventing attacks on the network.

Don’t fall for Phishing Scams

Posted by

Bank Phishing WebsitePhishing, pronounced like “fishing”, is where a malicious website is set up in order to trick users into divulging personal information such as log in credentials, credit card, banking, or other private information. These website can look very convincing, mimicking a bank website, or a credit card website, or even a social media website log in. The website is meant to fool the user into divulging private information. Many of the sites will actually take in the information that is typed in the form, and then send the user over to the real login website, so that the user thinks that they just didn’t put in their log in information correctly, and never realize that they just gave away their personal information to a scammer.

Most phishing starts via the email inbox. Compromised email accounts will send out hoax emails that contain links to phishing websites that try to mimic a legitimate website. The messages will vary, such as faux emails about “A Recent Money Transfer”, “Account Overdraft Notice”, “Urgent Message from your Bank”, or something like “Your recent purchase at eBay”. Some of the emails even appear very realistic, and often times contain logos and colors that the actual company uses. The emails almost always contain links that take the user to a phishing website where their personal information is “fished” right out of their unsuspecting victims head. Always be on the look out for suspicious emails that don’t seem legitimate, or possibly don’t make sense.

In order to avoid this scam, always be sure that you are on a legitimate website domain. Check the URL bar for inconsistencies such as misspellings or mangling of the real domain like “bank0famericas.in” or “usbank.com.baddomain.cn” or “faceb00k.ru”. Also always check for domain TLDs to ensure you are on a .com, .org, .net and NOT a .cn, .ru, or .in to name a few of the most commonly seen scams.

Another way to protect yourself from Phishing scams is to always ensure that the website your are logging into is secured via HTTPS. Most phishing websites will not have a valid SSL certificate and this is a dead give away that somebody is trying to do something nasty to you!

Some email links look suspicious however turn out to be legitmate. A great example of such a situation is the Healthcare.gov email notices that come from a third party company known as govdelivery.com. The emails appear to look like the Healthcare.gov logo and color schemes however the links in the emails go to “govdeliver.com”. This company tracks the link clicks from the emails before sending the user over to the healthcare.gov website. It appears very “phishy”, however has been verified as trusted by the US government. So you can see how confusing this area of internet security can sometimes become.

If you think you have been the victim of a recent phishing scam then you should be proactive about securing your accounts. Try to remember what log in information or personal information you divulged. Change your account passwords. Contact your bank if you notice any fraudulent behavior with your bank account. Contact the police or FBI if you think you are a victim of identity theft. Seek the advice of a computer repair expert if you think you may have installed malicious software or programs onto your computer by visiting a phishing website.

It is difficult to know for sure if you are dealing with a real website or a fake website. As with all Internet activity, keep your “street smarts” about you at all times. If it seems fake or out of the ordinary, then it IS!

How to fix Proxy Server Isn’t Responding issue

Posted by

Fix the proxy server isn't respondingOne of the more common computer issues we see because of malware is a misconfiguration Proxy Server connection setting in the browser. You may be able to do a quick fix to get your Internet connection back up and running, however if this has gotten set and you don’t recall doing it, this is probably because your computer is infected with malware or a virus.

NOTE: This may only temporarily fix your Internet connection issue and malware may change this setting back on reboot. It is recommended you get professional computer repair services.

In Windows Search type inetcpl.cpl.

Right click and choose to Run as administrator.

Click the Connections tab, and then click LAN settings button.

Un-check the Use a proxy server for your LAN check box.

Make sure Automatically Detect Settings is checked.

If you have already attempted this fix, and are still getting a Proxy Internet connection issue then you may need computer repair service. Bring your computer to South City Computer or to a local computer repair service and support provider near you.

Why is the Proxy Server Setting enabled?

While every issue is different, malware is usual the culprit behind this proxy setting being changed on a computer. The setting allows for all Internet traffic to be rerouted and monitored through another computer. This is likely in order to serve pop-ups and/or search your Internet traffic for usernames, emails, credit card numbers,and passwords.

Tips to avoid getting hacked

Posted by

Tips to avoid getting hackedWhile there is no fool proof way to avoid being hacked, here is a list of tips in order to avoid from getting hacked.

Never use easy to guess passwords. While “puppy” may seem like a fun password, it is an easily guessed password. A dictionary brute force attempt could guess the password “puppy” in under a second. While there is no real good way to know if your password is fool proof, most security experts recommend using a mixed letter, number, and symbol password combination of a length of 8 or more digits. Try to avoid using easy to guess words or dates.

Try to use different passwords for different website user accounts. Having the same password for all of your user accounts makes it easier for a hacker to gain more access and cause more issues for you.

If you think your password has become compromised, change it right away!

Never share your username or password. It seems pretty straight forward, but some people can be deceived into divulging their username and password by a hacker pretending to be a computer support technician, or somebody from the company IT department.

Never write your password down and leave it near your computer. Lots of people hate to remember their password and therefore write the password down on a sticky note, or piece of paper near their computer. This allows anybody who uses the computer to see your password in plain sight.

Always use password secured login on your computer. Even though Windows will let you just log in without a password, it is best to use a password based login on your computer. Don’t make it as easy as logging right in without a password.

Keep your computer free of viruses, spamware and malware. Most malicious programs will try to proxy your Internet connection or use key-logger programs in order to monitor all the network traffic to phish out usernames and passwords. Any computer that has become compromised by malicious virus should not be trusted with any username and passwords.

Never use a public computer to log into your bank account or other private accounts. Public computer are like public toilets, they are dirty and unsanitary and should not be trusted since you cannot be sure what programs have been installed on the computer, and could have malicious software or keyloggers installed waiting for your input.

Make sure nobody is watching you type your username and password. While it seems like it would be really hard for someone to watch your keystrokes in order to gain access to your password, it is absolutely possible.

Do not believe anyone who calls you and requests your username and password to gain access to your computer. A lot of recent tech scams involve a person calling you claiming they are from “Microsoft” and have detected a virus on your computer. They will request your username and password to login to the computer in order to remove the virus. If you haven’t guessed already, the person on the other end does not really work for Microsoft, and is just trying to cause you havoc.

Always check the url of the website you are logging into for authenticity. Fake emails that look authentic will oftentimes contain links that take unsuspecting victims to phishing website. These are websites that look similar if not identical to bank account login pages. If one looks at the URL bar though, they will notice that they are on another domain such as bankofamerica.hackeddomain.com. Always ensure you are actually putting your password into a trusted website.

Never log in over an unsecured connection or network. While it may seem like a good idea to jump on any open wifi network, just know that somebody could be listening to your network traffic as well. There are programs that allow a hacker to monitor all network traffic on an open network in order to search or usernames and passwords.

Try to change your password on a regular basis for best security measures. If you change your password on a regular basis, you are always staying one step ahead of the game of cat and mouse. It is recommened that users change their password at least once a year, and some banking website will force users to make this change as a security policy.

Anthem data breach could be largest in history

Posted by

Anthem hackedAs banks have beefed up their cyber security in the recent months after a JP Morgan Chase announced a data breach, hackers seemed to have turned their sights onto healthcare providers and insurance companies. Last week medical insurance company Anthem publicly apologized to its customers for a data breach that could have leaked over 80 million records that included names, addresses, phone numbers, and social security numbers. The company has described the data breach as a “very sophisticated external cyber-attack”. Anthem is still investigating whether the hackers were able to obtain any sensitive medical records or patient history. The data breach could be one of the largest in history.

The data breach recently came to light after an employee at Anthem notice suspicious activity of their user account. The data breach is currently being investigated by the Federal Bureau of Investigation and a private security firm that Anthem hired to help audit the data breach.

The Anthem data breach echos President Obama’s recent State of the Union address where he pledged to spend more money on cyber-security in the United States. However most security experts agree that most data breaches are the result of basic flaws in computer security, social deception, failure to protect user names and passwords properly, or failure to encrypt sensitive data, and not the result of weak or faulty computer security methods currently in place.

Internet Explorer error ‘Do you want to view only the webpage content that was delivered securely?’

Posted by

Do you want to view only the webpage content that was delivered securely?Are you getting a pop-up in Internet Explorer with the following:

Security Warning

Do you want to view only the webpage content that was delivered securely?
This webpage contains content that will not be delivered using a secure HTTPS connection, which could compromise the security of the entire webpage.

Why is this pop-up showing?
The Security Warning pop-up is telling you that not all the content you are browsing is secured over HTTPS encryption. It is likely that some of the images or scripts may be coming from different website sources and not all are encrypted. It probably does not mean that somebody is doing something malicious to your computer.

Do I have a virus?
Probably not. This Security Warning pop-up probably has nothing to do with having a virus on your computer, and is actually a normal Internet Explorer pop-up message.

Should I be concerned?
Maybe, if you are just checking an email account at yahoo.com or gmail.com, or visiting a website like facebook.com, twitter.com, then there is probably nothing to be concerned about at this time. However, if you are getting this message while using your online banking website or if you are sharing credit card or private information on the website, then you should probably be concerned. It may be a good idea to contact the website owner to notify them of the message so that they can fix this issue.

How should I answer this Security Warning pop-up?
It depends on what you are doing on the website, and if you need totally secure browsing. If you want the pop-up to go away just click “NO” to view the webpage even though some of the content will not be secured.

How do I get rid of this Security Warning pop-up for good?
You can disable this Internet Explorer pop-up alert by:

  1. Go to Tools->Internet Options->Security
  2. Select the Security tab
  3. Click on the Internet zone icon at the top of the tab page
  4. Click the Custom Level button
  5. In the Miscellaneous section change Display mixed content to Enable
  6. Repeat steps 1 – 5 for the Local intranet and Trusted sites zones
// //
//