svchost.exe is often used as a host for viral worms, W32/CodeBlue being one example, where your 'port scanning' can be attributed to the virus doing it's thing.
First thing I would suggest; scan your machine online from...
<http://www.symantec.com/cgi-bin/securitycheck.cgi>
(Norton AV) which...
My favourites; Sygate Personal Firewall. I think the GUI's more intuitive then ZoneAlarm and the advanced rules are easy to build. It's free too, though I've bought the Pro' version which is a great product.
I did some extensive testing of AV products last year. I didn't test the AV...
Same basic loop with....
oListItem.Checked = true
in place of the
lCount = IIf(oListItem.Checked, lCount + 1, lCount)
statement would check every item in the list.
oListItem.Selected = True
would select (highlight) every item in the list
Legacy systems... don't ya love 'em. NOT!
Do you do VB thirty4d? If fancy formatting is the reasoning behind the use of Word then can I suggest a VB app, on a scheduler, running Crystal Reports exporting (as Ver7 and presumably later versions do) to a Word document?
I’ve not done this...
Private Sub Command1_Click()
Dim vRetVal As Variant
vRetVal = InputBox("Enter the Image List Number." & vbCrLf & "Between 1 and " & File1.ListCount & ".", "Image Number...?", "1")
If IsNumeric(vRetVal) Then
If vRetVal >...
Open the help and type...
Serial Communications in Win32
The first thing on the list will be a primer for an example program on the VB6 CDRom which does exactly this.
Public Function SumOfText(ByRef oForm As Form) As Double
Dim oControl As Control
Dim dblSum As Double
For Each oControl In oForm.Controls
If TypeOf oControl Is TextBox Then
dblSum = dblSum + CDbl(oControl.Text)
End If
Next
SumOfText = dblSum...
I Have to say that using Word like this sounds a bit crazy thirty4d. Using a word processor as a database reporting tool? If the documents have to be reported on using a Word document format, have you thought of embedding an Excel table within the document. If the Excel table has taken the...
Quick & Simple method:
Shell the DOS command PING 192.168.1.1 and write the response back to a text file. The DOS command is...
PING 192.168.1.1 > ping.txt
Look up the 'Shell' function in your VB help.
Next open the ping.txt file that youve just made, read through it and look for the 'Reply...
Private Sub Command1_Click()
MsgBox ListViewCheckCount(Form1.ListView1) & " Items Checked", vbOKOnly + vbInformation, "WHO DA MAN!"
End Sub
Public Function ListViewCheckCount(ByRef oListView As ListView) As Long
Dim oListItem As ListItem
Dim lCount As Long...
The WINXP Firewall is a major hole in itself. It stops outside sources from gaining access unless allowed as you would expect, but my understanding is it does not block traffic going out. You'll not be able to spot, or stop, any traffic from trojans like NIMDA. I suggest you use a more...
On the MMC, right click on the Web Proxy and click on Properties, then Permissions. I guess you’ve been here before. :-)
It's been a long while since I had to set this up but I seem to remember that the default settings, even with 'Enable Access Control' enabled was that everybody could use...
Hi Darren,
VPN security all depends on what form of encryption your using over the pipe. CHAP (Challenge Handshake Authentication Protocol) that MS uses as a default is pretty good but using IKE (Internet Key Exchange) with the keys and encryption algorithms being negotiated by dedicated...
I'm assuming nothing about people’s user bases, but what has that got to do with the subject anyway? We do the best job we possibly can to protect our user base because that’s our job.
I've already agreed that it’s impossible to protect idiot users from themselves, but as professionals if we...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.