Windows genuine advantage notifications occur when your computer hasn’t passed the validation test. The validation test can be failed due to being sold a pirated (non-genuine) copy of XP, or because you have changed your XP product key to a software-generated key, or sometimes it just happens for no reason at all. The failed validation installs three types of notifications on your computer: one on the log in screen, one log in timer, and one balloon. It also stops updates from Microsoft and disables your ability to install IE7 and Windows Media Player 11. This solution can get rid of all three notifications, even though you will still not be able to update through Windows Update. You will not be able to download things from Microsoft that requires a valid license either.

Steps

1. If you have only just installed Windows Genuine Advantage notifications, simply using the system restore function will remove the program. Then refuse to accept the WGA update next time Windows updates… Otherwise, proceed as detailed below. (NOTE: If you try these steps while you are in “Safe Mode,” step #8 is unnecessary).

2. Open System32 by either A or B of the following methods:

* a)
Click “Start”, “Run”, then type-in “System32”. Click “Okay”.
* b) Find System32 manually by clicking “Start” > “My Computer” > “(X:)” (Replacing “X” with the drive letter of the host of Windows) > “Windows” > “System32”.

3. In “System32”, go to “Tools” > “Folder options” > click on the tab, “View” > Uncheck “Hide extensions for known file types”. Now you can begin…

4. Check to make sure the window that comes up has a full screen of various files. The files are in alphabetical order, which makes it easier to locate the specific file.

5. Find “WgaLogon.dll” and rename it “WgaLogon.dll.bak”.

6. Create an empty copy of WgaLogon.dll:

*
Right click on a blank space in System32 and select “New” > “Text Document”.
* Leave the text document empty and label it “WgaLogon.dll”. Press Enter (on your keyboard).
*
You may get a warning from the above step that says, “If you change a file name extension, the file may become unusable. Are you sure you want to change it?”. Click “Yes” on this warning.

7. Be ready to complete the next two steps very quickly! Find “WgaTray.exe” in “System32” and delete it. You will then have 5 seconds to find “WgaTray.exe” in the Task Manager (the next step). NOTE: If you remove the files mentioned above while you are in “Safe Mode,” step #8 is unnecessary.

8.Immediately open Task Manager. You can do this by pressing the Ctrl, Shift, and Esc keys simultaneously, pressing the Ctrl, Alt, and Delete keys simultaneously, or right clicking the Taskbar and selecting “Task Manager”. Click on the process tab and click end process when “WgaTray.exe” is selected. Note: If you take longer, do NOT panic! All that will happen is that “WgaTray.exe” will keep reapearing in the processes list (i.e. you won’t be able to delete it as required). To remove the notifications after this, return to system32. You will find two files:”WgaLogon.dll.bak” (the one you renamed) and an Application Extension (0KB) called “WgaLogon.dll”. Delete the Application Extension, rename “WgaLogon.dll.bak” to “WgaLogon.dll” and repeat the steps from the fifth one onwards (at a greater speed!!).

9. Restart your computer once you have finished. All the notification messages should be gone.

Explore More

How to “become” a google bot

What you’ll need: Firefox, The Modify Headers extension for firefox. What you can do: Many sites allow google to look into their forums, in order to get more traffic by

fimap v.0.9 released

fimap is a little python tool which can find, prepare, audit, exploit and even google automaticly for local and remote file inclusion bugs in webapps. fimap should be something like

Critical SQL Injection in www.kmd.com KMD Group of Companies

PlanetCreator.Net’s Security Team Member Info Freakzz <infofreakzzz(at)gmail.com> has reported another critical SQL Injection (vulnerability) on http://www.kmd.com.sg owned by KMD Group of Companies These are some information from Vulneral Site http://www.kmd.com.sg