Yes, thanks for catching the typo.

James-Osbourne: Holmes

-----Original Message-----
From: Gaston [mailto:[email protected]]
Sent: Tuesday, May 08, 2001 9:06 AM
To: [email protected]
Subject: Re: CS>OFF TOPIC, but of value to most list memers: Simple, very
effective Security procedure.

Thanks James for the information about the two important programs:
Format.com and Fdisk.exe. Much appreciated.

Note: The address you have provided for the Nuts and Volts should
           probably read: www.nutsvolts.com instead of www.nutsvolst.com
           in case someone else is interested to visit the site.

=======================================================================

----- Original Message -----
From: "James Osbourne, Holmes" <[email protected]>
To: "Silver-List" <[email protected]>
Sent: Monday, May 07, 2001 11:34 PM
Subject: CS>OFF TOPIC, but of value to most list memers: Simple, very
effective Security procedure.

> You can disable the two DOS programs which evil hackers most often use to
> wipe out your hard drive data.  DOS is still there, running behind
windows;
> at least through Millennium Edition; I don't know about Win2K.
>
>  [Not all hackers are maleficent, quite the contrary; they are mostly the
> good guys. The media tells us they are all demons, and can launch ICBMs by
> simply whistling the correct series of tones into a telephone.  Remember;
it
> was hackers who gave us PGP]
>
> Rename the file extension of the two files fdisk.exe, and format.com, so
> that they are no longer executable; even if a worm or other cyberpathogen
> gets in it cannot use these utilities to do damage.
>
> 1.    Start, Programs, MS-DOS prompt.
>
> 2.    Note the command prompt: C:\>
>
> 3.    Type cd\windows\command  This takes you to the command directory
> [Remember, when we had to do stuff like this to do anything on our
> computer?]
>
> 4.    Type this:  rename format.com format.con     [then, hit return.]
>
> 5.    Then type:  rename fdisk.exe fdisk.exx     [then, hit return.]
>
> 6.    If you need to use these programs for the purpose for which they are
> intended, do the same procedure, only correct the changes back to .exe
and
> .com  Don't mix the extensions between the programs; fdisk is exe and
format
> is com
>
> 7.     If you have trouble, consult with someone who still remembers how
to
> use DOS commands.  Spacing and punctuation must be exact.  The change of
the
> file extension [the three letters to the right of the dot, does not
matter;
> you may use anything except .exe or .com.  For example .cox or .zzz or
> whatever.  Using the above characters will make it easier to remember the
> correct extension.  By convention, .com and .exe tell the operating system
> that the file is "executable", i.e. it is a program which will perform
some
> series of actions when called by the operating system or another program.
>
> I am not certain that I have every detail correct; you may need to do
other
> procedures in your machine to get to the right directory containing these
> files, but this is the basic principle.
>
> Do not be misled into thinking this will protect you from more
sophisticated
> attacks.  Keep your anti-virus programs armed and loaded with the latest
> updates, and still use caution opening attachments.
>
> This is courtesy of a gentleman named M.L. Shannon, and was swiped without
> guilt from the May 2001 edition of Nuts and Volts, an excellent
electronics
> print magazine.
>
> www.nutsvolst.com <http://www.nutsvolst.com/> .
>
> JOH
>
> James-Osbourne: Holmes
>
>


--
The silver-list is a moderated forum for discussion of colloidal silver.

To join or quit silver-list or silver-digest send an e-mail message to:
[email protected]  -or-  [email protected]
with the word subscribe or unsubscribe in the SUBJECT line.

To post, address your message to: [email protected]
Silver-list archive: http://escribe.com/health/thesilverlist/index.html
List maintainer: Mike Devour <[email protected]>