Oran Park racer Tim Brook has zoomed his way to third position in the competitive Toyota 86 Racing Series
Continue reading “Tim Brook Toyota 86 Racing Series – News Update 11.10.2017”
Oran Park racer Tim Brook has zoomed his way to third position in the competitive Toyota 86 Racing Series
Continue reading “Tim Brook Toyota 86 Racing Series – News Update 11.10.2017”
Sydney racer Tim Brook is stepping up preparations ahead of the 2017 Toyota 86 Racing Series.
Continue reading “Tim Brook reunites with title winning crew for 2017 Toyota 86 Racing Series”
We are often asked , “Should I go NBN for my business? Its cheap and fast!”
Continue reading “Why NBN vs Business Grade Internet Solutions and comparisons.”
This Petya ransomware will kill the Master Boot Record making your hard disk useless. If this fails, it will then run a file-encypting program
Petya is an unusual ransomware threat that first popped up on security researchers’ radar in March. Instead of encrypting a user’s files directly, it encrypts the master file table (MFT) used by NTFS disk partitions to hold information about file names, sizes and location on the physical disk.
Before encrypting the MFT, Petya replaces the computer’s master boot record (MBR), which contains code that initiates the operating system’s bootloader. Petya replaces it with its own malicious code that displays the ransom note and leaves computers unable to boot.
However, in order to overwrite the MBR after it infects a computer, the malware needs to obtain administrator privileges. It does so by asking users for access via the User Account Control (UAC) mechanism in Windows.
In previous versions, if Petya failed to obtain administrator privileges, it stopped the infection routine. However, in such a case, the latest variant installs another ransomware program, dubbed Mischa, that begins to encrypt users’ files directly, an operation that doesn’t require special privileges.
The ransom that Mischa currently asks is approx 2 bitcoins, or around US$900
Another thing that sets Mischa apart is that it encrypts executable (.EXE) files in addition to documents, pictures, videos and other user-generated files typically targeted by ransomware programs. This has the potential to leave installed programs and the OS in a non-functional state, making it harder to pay the ransom from the affected system.
The installer for the Petya-Mischa combo is distributed via spam emails that pose as job applications.
These emails contain a link to an online file storage service that hosts a picture of the alleged applicant and a malicious executable file that masquerades as a PDF document.
If it’s downloaded and executed, the fake PDF file first tries to install Petya and if that fails, it installs Mischa.
There is currently no known way to restore files encrypted by Mischa without paying the ransom.
Having a problem getting audio sound redirected over terminal server or remote desktop server 2008 or 2012 to the client?
Here are a couple of things to check to enable audio redirect, even when server has no audio sound card.
When you connect the client to the server, it will redirect all sounds to be played via your local sound card however this may fail due to the following issues.
If you require further assistance or more technical information, please make comment and we will be happy to further assist.
If you cannot remember a complex password or more than one password, ask Sterling IT how we can assist you with a password manager that is secure.
Internet users continue to put their security at risk by using generic passwords such as “123456” and “password”, despite widespread advice to create more unique and secure codes.
Both “123456” and “password” have held the top two spots on SplashData’s annual list of leaked passwords since the first list in 2011 and data released by SplashData yesterday shows 2015 was no different.
The top 10 passwords on the 2015 list are dominated by numerical passwords, with football, baseball and ‘qwerty’ also among the least secure passwords being used online.
Go to Smart Company to READ MORE
Sterling IT have the solution to protect your passwords securely on phone and computers.
Source: smartcompany.com.au – Recommended by Sterling IT for all good businesses.