Originally posted by PAH
View Post
- Visitors can check out the Forum FAQ by clicking this link. You have to register before you can post: click the REGISTER link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. View our Forum Privacy Policy.
- Want to receive the latest contracting news and advice straight to your inbox? Sign up to the ContractorUK newsletter here. Every sign up will also be entered into a draw to WIN £100 Amazon vouchers!
Help! ccsvchst.exe is killing my machine!
Collapse
X
-
Yep, although I didn't realise that wasn't in XP too. If you install a game you sometimes get a popup when you try to play online the first time, etc.Originally posted by MaryPoppinsI'd still not breastfeed a naziOriginally posted by vetranUrine is quite nourishing -
Get a mac
HTHBISID"Experience hath shewn, that even under the best forms of government those entrusted with power have, in time, and by slow operations, perverted it into tyranny. "
Thomas JeffersonComment
-
And if you do get a Mac, don't run Norton on it.Originally posted by Ruprect View PostGet a mac
(I don't know if it is still sold, but a few years ago I saws lots of reports that Norton for Mac was a resource hog)Behold the warranty -- the bold print giveth and the fine print taketh away.Comment
-
I guess it works fine, I've not had a virus since using it (admitedly the paid version though) for yearsOriginally posted by suityou01 View PostZone alarm stops outbound vectors so rogue processes can't dial home with your details. A router firewall only blocks inbound.Doing the needful since 1827Comment
-
I remember reading an article a few years ago in one of the computer magazines where they did a test for how true it was that the internet was awash with nasties trying to infect your home computer via an unsecured internet connection.
I think they had the PC connected to an unsecure connection for less that a day before they had all sorts of infections uploaded to it.
Of course, this could have been a stunt, or they could have been using the office network whose IP address is probably well known to the hacker community.
Maybe the story had 'advertisement for Zone Alarm' at the top.
Moral of the story: There's free protection available (usually out of the box) so may as well use it, as long as it doesn't hog too many resources.Feist - 1234. One camera, one take, no editing. Superb. How they did it
Feist - I Feel It All
Feist - The Bad In Each Other (Later With Jools Holland)Comment
-
I recall around the end of 2004 I helped a friend with a USB modem internet connection (which had no firewall) reinstall XP. By the time you had connected, mdownloaded and started installing updates, SP2 and anti-virus software it was infected i.e. within minutes of connecting. In the end I had to download XP SP2 and AVG from elsewhere and install offline in order to get the PC well protected enough before connecting.Originally posted by PAH View PostI remember reading an article a few years ago in one of the computer magazines where they did a test for how true it was that the internet was awash with nasties trying to infect your home computer via an unsecured internet connection.
I think they had the PC connected to an unsecure connection for less that a day before they had all sorts of infections uploaded to it.While you're waiting, read the free novel we sent you. It's a Spanish story about a guy named 'Manual.'Comment
-
Hope That Helps But I See I'm Dyslexic...?Originally posted by Ruprect View PostGet a mac
HTHBISIDComment
-
Originally posted by PAH View PostI remember reading an article a few years ago in one of the computer magazines where they did a test for how true it was that the internet was awash with nasties trying to infect your home computer via an unsecured internet connection.
I think they had the PC connected to an unsecure connection for less that a day before they had all sorts of infections uploaded to it.
Of course, this could have been a stunt, or they could have been using the office network whose IP address is probably well known to the hacker community.
Maybe the story had 'advertisement for Zone Alarm' at the top.
Moral of the story: There's free protection available (usually out of the box) so may as well use it, as long as it doesn't hog too many resources.SANS run a (semi) real time survival time chart tracking the time between connecting to the internet and the first attempted connection from a malicous source. Asuming an unpatched system the first attempt will almost certainly result in infection of the target. It generally hovers somwehere around 10 minutes.Originally posted by doodab View PostI recall around the end of 2004 I helped a friend with a USB modem internet connection (which had no firewall) reinstall XP. By the time you had connected, mdownloaded and started installing updates, SP2 and anti-virus software it was infected i.e. within minutes of connecting. In the end I had to download XP SP2 and AVG from elsewhere and install offline in order to get the PC well protected enough before connecting.
SANS Survival Time ChartLast edited by DaveB; 11 July 2011, 13:21."Being nice costs nothing and sometimes gets you extra bacon" - Pondlife.Comment
-
Originally posted by DaveB View PostIt generally hovers somwehere around 10 minutes.
Maybe ISPs should concentrate on filtering out this stuff at source. Every PC or hosted server has to connect to the internet somewhere, so first port of call should be firewalled against the scum.
Why should those at the end of the chain have to protect against those at the beginning?Feist - 1234. One camera, one take, no editing. Superb. How they did it
Feist - I Feel It All
Feist - The Bad In Each Other (Later With Jools Holland)Comment
-
A firewall that prevents outgoing connections is protecting the beginning of the chain.Originally posted by PAH View Post
Maybe ISPs should concentrate on filtering out this stuff at source. Every PC or hosted server has to connect to the internet somewhere, so first port of call should be firewalled against the scum.
Why should those at the end of the chain have to protect against those at the beginning?
ISPs randomly preventing people connecting to the net would break loads of legitimate things and probably not work. Even with deep packet inspection it would be trivial for malware writers to circumvent with encryption or steganography.While you're waiting, read the free novel we sent you. It's a Spanish story about a guy named 'Manual.'Comment
- Home
- News & Features
- First Timers
- IR35 / S660 / BN66
- Employee Benefit Trusts
- Agency Workers Regulations
- MSC Legislation
- Limited Companies
- Dividends
- Umbrella Company
- VAT / Flat Rate VAT
- Job News & Guides
- Money News & Guides
- Guide to Contracts
- Successful Contracting
- Contracting Overseas
- Contractor Calculators
- MVL
- Contractor Expenses
Advertisers
Contractor Services
CUK News
- JSL rules ‘are HMRC’s way to make contractor umbrella company clients give a sh*t where their money goes’ Today 07:42
- Contractors warned over HMRC charging £3.5 billion too much Feb 6 03:18
- Statutory Sick Pay (SSP) for umbrella company contractors: an April 2026 explainer Feb 5 07:19
- IR35: IT contractors ‘most concerned about off-payroll working rules’ Feb 4 07:11
- Labour’s near-silence on its employment status shakeup is telling, and disappointing Feb 3 07:47
- Business expenses: What IT contractors can and cannot claim from HMRC Jan 30 08:44
- April’s umbrella PAYE risk: how contractors’ end-clients are prepping Jan 29 05:45
- How EV tax changes of 2025-2028 add up for contractor limited company directors Jan 28 08:11
- Under the terms he was shackled by, Ray McCann’s Loan Charge Review probably is a fair resolution Jan 27 08:41
- Contractors, a £25million crackdown on rogue company directors is coming Jan 26 05:02

Comment