Office Live Workspace
yes it is,you mean on sky drive?
Web Browser
Software that helps get work done such as documents and spreadsheets. Examples are Microsoft Office and OpenOffice.
This laptop ships with Microsoft Windows XP Professional, which includes standard software such as Internet Explorer, Microsoft Works, etc.
The most popular software to make documents with is Microsoft Word.
Web Browser
There are many different software companies that provide templates for documents. One of the most well known is from the company Microsoft. They are one of the leaders in the industry.
The are literally thousands of software applications. Two of them are Microsoft Internet Explorer and Mozilla Firefox both of which are used on the internet.
You can host a live meeting over the internet by downloading Microsoft software for internet live conferencing. This software is available on their website.
The Internet Explorer software for Mac computers can be easily found as a download on the Internet. This software is available for free, however it should be noted that it is no longer operated by Microsoft.
There are a number internet security software packages available to purchase for a broker. One can get software from 'Beyond Trust', 'Dream Broker' and 'Microsoft'.
COMMON LOCATIONS AND AUTO START ENTRY POINTS(ASEP) OF VIRUSSystem Registry Run Keys• System Registry Run Keys - Certain registry keys may contain values used to load applications (including malware) when Windows is started. The values to examine are located in subkeys Run, RunOnce, RunServices, and RunServicesOnce, located in either of the following registry keys:• HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Startup Folder• The Windows Startup folder can include shortcuts, documents, executables, or other types of files and programs to be launched when Windows is started. The current logged on user can view startup folder inclusions through the Start menu:• Start | Programs | Startup• The common startup folder, applicable to all users, correlates to:• %ALLUSERSPROFILE%\Start Menu\Programs\StartupWinlogon• Winlogon is responsible for supporting the DLL responsible for managing the interactive logon when Windows starts. Pre-Vista, that DLL provides a customizable user interface and authentication process.• Malware that hooks into Winlogon can be particularly difficult to remove, as even booting into Safe Mode will not deactivate it. The string values that customize the Winlogon process are located in the following registry key:• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinlogonASEP Loading SequenceThe order in which Windows processes the autostart entry points is as follows:• RunServices / RunServicesOnce - HKEY_LOCAL_MACHINE and HKEY_CURRENT_USER RunServices/RunServicesOnce will be launched concurrently. In the event of a conflict, precedent is given to HKEY_LOCAL_MACHINE. These ASEPS may continue loading during and after the login dialog.• Login Dialog (Winlogon)• RunOnce / Run for HKEY_LOCAL_MACHINE hive• Run key in HKEY_CURRENT_USER hive• Startup Folder• RunOnce in HKEY_CURRENT_USER hiveSome Advanced Loading points which are identified recently with rootkit enabled malwares• C:\Documents and Settings\• C:\Documents and Settings\\Application Data\• C:\Documents and Settings\• C:\Documents and Settings\Default User\Local Settings\Temporary Internet Files\Content.IE5• C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5• C:\Windows\Temp• C:\WINDOWS\system32\config\ systemprofileStartup and Winlogon• HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run• HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce• HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices• HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServicesOnce• HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce• HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnceEx• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServicesOnce• HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon• HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler• HKEY_CLASSES_ROOT\comfile\shell\open\command• HKEY_CLASSES_ROOT\piffile\shell\open\command• HKEY_CLASSES_ROOT\exefile\shell\open\command• HKEY_CLASSES_ROOT\txtfile\shell\open\commandServices• HKLM\SYSTEM\CurrentControlSet\Services\• Active Setup Stub Keys (These are disabled if there is a twin in HKCU)• HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\• ICQ Agent Autostart• HKCU\Software\Mirabilis\ICQ\Agent\Apps• If you suspect that a system is infected, then examine each of these keys. Determine whether Value Name or Value Data, including the (Default) value, refers to a suspicious file.Internet Explorer (To check for IE threats)• HKLM\Software\Microsoft\Internet Explorer\Main, Start Page• HKCU\Software\Microsoft\Internet Explorer\Main: Start Page• HKLM\Software\Microsoft\Internet Explorer\Main: Default_Page_URL• HKCU\Software\Microsoft\Internet Explorer\Main: Default_Page_URL• HKLM\Software\Microsoft\Internet Explorer\Main: Search Page• HKCU\Software\Microsoft\Internet Explorer\Main: Search Page• HKCU\Software\Microsoft\Internet Explorer\SearchURL: (Default)• HKCU\Software\Microsoft\Internet Explorer\Main: Window Title• HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings: ProxyOverride• HKCU\Software\Microsoft\Internet Connection Wizard: ShellNext• HKCU\Software\Microsoft\Internet Explorer\Main: Search Bar• HKCU\Software\Microsoft\Internet Explorer\URLSearchHooks• HKLM\Software\Microsoft\Internet Explorer\Search, CustomizeSearch =• HKCU\Software\Microsoft\Internet Explorer\Search, CustomizeSearchIdentify Rootkit InfectionsMSconfig -> Boot.ini tab -> Check /BOOTLOGRestart the computer.Go to c:\windows and open the file c:\windows\ntbtlog.txtCheck for any suspicious entries.Program Removal• Click on start->control panel->add/remove programs icon.• Discuss with customer about any new program which is installed. If customer does not know about a particular program, follow the steps below -o Click on start->My computer->Local drive C:-> Program files.o Right click on the particular program folder-click on properties and check date created. Repeat the same to all new programs and close the program window.Physical Location• c:\program files• c:\program files\common files• C:\documents & Settings\User\Application DataRegistry• H_Key_Local_Machine\Software• H_Key_Current_User\Software• H_Key_Local_Machine\Software\Microsoft\Windows\Current Version\UninstallFile Removal GUI Mode• Delete - Right click -> Delete or Higlight the file and hit the Delete button on the keyboard• Rename - Right click -> Rename or Highlight the file -> Press F2 -> Type a new name -> Hit enter• Move - Right click->Cut->Right click and paste it on the desire location• Removing Permissions - Right click on file ->Go to properties ->Click on Security Tab ->Click Advanced -> Uncheck the box "Inherit from parent control…." -> Click Remove ->Click OK