Monday, May 31, 2010

Process Explorer: Windows Task manager alternative


Process Explorer v11.33 is a freeware from Microsoft showing information about which handles and DLLs process have opened or loaded. We all would hit Ctrl +alt+delete when PC hangs up and to kill the current process running and bring up the task manager. some power users may click CPU column twice to see which processes are sucking up most of the CPU's power. Alternatively we may scan the process list for suspicious items. Here i saw this pretty useful tool from Microsoft simplifying task manager and even gives more granular details about a process including its icon, command line, full mage path, memory statistics, user account, security attributes and more.
Process Explorer
Process explorer showing system information details in graphical representation

Process explorer with system information
Process explorer with system information
The Process Explorer display consists of two sub-windows. The top window always shows a list of the currently active processes, including the names of their owning accounts, whereas the information displayed in the bottom window depends on the mode that Process Explorer is in: if it is in handle mode you'll see the handles that the process selected in the top window has opened; if Process Explorer is in DLL mode you'll see the DLLs and memory-mapped files that the process has loaded.Process Explorer also has a powerful search capability that will quickly show you which processes have particular handles opened or DLLs loaded.
The unique capabilities of Process Explorer make it useful for tracking down DLL-version problems or handle leaks, and provide insight into the way Windows and applications work. You can right -click and kill a process as in Task Manager, with the obligatory warning that killing a process can destabilize the system. Process Explorer's added ability to kill a process and all of its descendant processes may forestall stability problems. Process Explorer can also suspend a process's execution and resume it later. Say you've got a number-crunching utility that's tying up the CPU and you want to stop for a minute while you check your e-mail. With Process Explorer, you can suspend the app briefly without going through the hassle of shutting it down and starting all over again after checking your mail.


Task Manager helps you figure out what program a given process represents by displaying its internal description, if available. Process Explorer goes a step farther by adding the company name. Still puzzled? Double-click the process and click the "Strings" tab in the resulting properties dialog—it lists all text strings found embedded in the process's executable file. The properties dialog also reveals the full pathname and command-line for the process, lists and graphs performance statistics, and even displays TCP/IP activity.
Selecting the process corresponding to an on-screen window is a snap—just drag the utility's  icon onto the window. You can also enable a lower pane that lists all DLLs used by the selected process or all handles opened by that process. And a search option makes it easy to get a list of all programs currently using a specific DLL or identify which program is holding a certain file open.

Process explorer showing information about skype process running
Process explorer showing information about skype process running

Process explorer showing a process string
Process explorer showing a process string

Friday, May 28, 2010

Iphone Hack ban


I guess apple have found their Iphone OS now frequently hacked. Almost like Windows, apple had trouble facing the sophisticated hacks and weekly patches are not enough to protect their OS. So apple seems to come up with a defensive idea of locking the hackers account. Just days after a scrappy young iPhone hacked discovered an unlock exploit for OS 3.1.3 baseband 05.12.01, Sherif Hashim received an ominous message on his iPhone after attempting to log into iTunes: “This Apple ID has been disabled for security reasons.” Proving that this is not an isolated incident, fellow hacker iH8sn0w responded to Hashim to let him know the very same thing happened to him after he released an exploit known as XEMN. Perhaps most puzzlingly, however, is the fact that Hasim’s exploit was never publicly released having only been given to the iPhone Dev-Team who plan to incorporate it into their next release. Obviously Apple could claim that its actions were in response to the violation of their intellectual property as well as a breach of the iPhone’s end-user license agreement, but one has to wonder just how far a notoriously heavy-handed company like Apple might go in the future if it is unable to gain the upper hand over hackers like Hashim.
iPhone developer and hacker, Sherif Hashim, claims to receive a warning showing he’d been denied access to the App Store for “security reasons”, see image above.
The move sparked concerns that Apple might ban all jailbroken iPhones was accessing the App Store. However, such a move would prevent Apple's application developers from selling to the millions of users of jailbroken devices and would be especially bad politicsfollowing the launch of the Wholesale Applications Community at the Mobile World Congress conference earlier this week.
This seems to be a strong message indicating that known iPhone hackers may get into trouble but at the same time there is no indication that Apple are refusing access to the App Store for anyone who merely makes use of available software to jailbreak or unlock their iPhone or iPod Touch handsets, the message is clear: publicly release an exploit for the iPhone OS and expect to lose your App Store privileges.

Checking brand name availability


Its common for most of us to have a virtual name in the internet. And we tent to have that name across the internet and that becomes our  identity. There are chances that your username/virtual name/your identity may be used by some one anywhere in the internet (heavily possible).  having the same username across every website makes you to easily remember  and helps you be recognizable across multiple networks without the need to link your accounts. I started browsing to find a way to customize a brand name and check how unique it is. thank fully i  found great solutions in order to verify the availability of our username across multiple social media websites for free.
This is a free site allows you to check for the use of your brand, product, personal name or username instantly on over 350 popular and emerging social media websites. It lets us to secure your brand before someone else does.

With a click of a button it lets us to search for the availability of a username across more than 350 popular social networking websites. All you need to do is is enter your desired brand username in the search box and click “Check it”. KnowEm will then come up with a list of all the social media networks along with the availability of your username. If you wish to sign up simply click on “Available” to jump to the sign up page of any particular website and get registered.
KnowEm also constantly updates and adds new sites to their vast database of social sites. The next Facebook, Twitter or MySpace is already out there or could be coming soon - do you know which one it will be? KnowEm offers a subscription service (Brand Protection Program) to ensure that you and your brand will not have to worry about it. As new sites emerge we will make sure that your flag is already planted and you will not have to worry about dealing with a squatter or someone who is misrepresenting your social media identity.

Is Your Name Available?

The basic free version of KnowEm makes it easy to find out if your favorite username is still available on the 350 social media services. Just type in your favorite username and KnowEm will check if your name is still available on these sites. Given how closely our online identities are often tied to one single username, it only makes sense to claim the same username on every site and to ensure that somebody else isn't impersonating you. Other services that offer similar free features include Namechk (148 sites) and Usernamecheck.com (68 sites).

Premium Services

The new premium services extend KnowEm's portfolio by giving businesses additional services for claiming and monitoring their brands. For users of the Corporate Edition ($349), KnowEm will create profiles on 150 social media sites and populate them with photos, bios and descriptions. A cheaper version of this services ($99) only includes the signup process, and users will have to populate their profiles by hand. For an additional $49 per month, KnowEm will also register your name or brand on new social media services as they launch.
Namechk is an worthy alternative to KnowEm with almost similar features. It checks for desired username or vanity URL's that are still available at dozens of popular social networking and social bookmarking websites. It helps to promote your brand name constantly by registering a username that is still available on the majority of popular websites.
NameChk is completely free to use, it seems to be supported by Google Adsense adverts, but these are small and don’t get in the way. It’s a very useful website and a real joy to use! NameChk is perfect for anyone that struggles to find good usernames on a number of the social networking sites. It is becoming more difficult so this is a great idea. It is also good for companies who are trying to build their brand image; they can use this tool to find a name which is available on most of the platforms and then register it to promote their products.
Namechk Features
  • Check usernames on 106 different social networking sites
  • Register by clicking on the buttons
  • Find usernames which are available on all platforms
  • Build your brand image
A simple service that might nonetheless come in handy sometime, the suitably-titled UsernameCheck will let you find out where is your username registered in a more or less instant way. If you claim  “Do I have my username registered across every site that I should?”. That is a valid question, because how would you feel if the next Internet humiliation that comes along happens to share the same username that you have been using since the dawn of the web?
This site, then, will let you check where you username is registered just by supplying it and hitting the “check” button. A service by service rundown is then carried out, and you will then find out whether your back is covered or not.

Tuesday, May 18, 2010

Zues, IM threats


A new threat to instant Messaging (IM) has been identified with a previously well known trojan called Zues attacking users of AOL Instant Messaging and stealing passwords.Zues is one of the best-selling Trojan kit on the black market today  and become the popular choice among cybercriminals because it’s easy to set up and control, and can be used for a variety of purposes. And, like popular commercial software, Zeus comes in a standard version (costing a minimum of $1000) and a professional version with extra features such as a large library of target templates.
[ad#Google Adsense Text only 728-90]
So What is Zues is?


Zues network of affected computers
Zues also known as Zbot is an threat organised by army of attackers (known as Zeus builders) who pay thousands for the latest zues builder to make sure they distribute the most up-to-date undetectable bot builds. But they are also available for free in various black market and web sites such as file sharing web sites.
Zeus/Zbot samples are distributed every day in alarming rate. It's kind of an attack  where multiple modifications of the bot are being produced in-the-wild, packed and encrypted on top with all sorts of packers, including modified, hacked, or private packer builds. Before being released, every newly generated and protected bot is uploaded into popular multi-AV scanner services to make sure it is not detected by any antivirus vendor. Hence, quite a bit of a problem in terms of its distribution scale.
latest generation Zues are capable of using the rootkit techniques to hide its presence on a customer machine.
The bot uses covert methods of injecting additional fields into online Internet banking websites, asking users to answer questions that the authentic website would not ask. The collected details are then silently delivered to remote websites, and added into remote databases. The databases are then sold to other criminal elements down the chain who specialize in withdrawing the funds. The money laundering groups anonymously hire physical people to withdraw money from their personal accounts - in the criminal world these people are called "drops", and their accounts are called "drop accounts".
Current Threat to Instant Messengers (IM)
People using the popular instant messaging platform receive an email message announcing an update and are then prompted to click through to download what appears to be a legitimate file, aimupdate_7.1.6.475.exe. However, the so-called update is actually the Zeus installer, which can then transfer itself onto the victim's machine, whether or not the AIM user clicks on the link to download the executable file.
"It opens an IFRAME to a site that attempts to use vulnerable versions of Adobe Reader to push the Zeus keylogger down to the victim's computer, then executes it within a few moments of the page loading. The fake web page to which victims are brought appears to be an AOL site, but a close look reveals inconsistencies to an authentic web page. Notably,
  • a true AIM installer has a digital signature from parent company AOL attached. This one does not contain that signature.
  • Further, the URL used for the download begins with a legitimate-seeming address, “update.aol.com”,
  • but that is followed by a six- to seven random-character word followed by .com.pl.
"The exploit opens, in an IFRAME, a page hosted on the IP address in the Vishclub network, which in turn loads a fairly large (15,628 byte) blob of obfuscated JavaScript," according to the Webroot blog post. "The script invokes the browser to load Adobe Reader, then pushes a file called 'pdf.pdf' down to the Reader. That file is built to attack the Collab overflow exploit, the util.printf overflow exploit, and the getIcon exploit in order to force the operating system to download and execute files."
Webroot Advices
Webroot advises that to avoid this particular exploit focused on AIM, users turn off Adobe Reader's embedded JavaScript. "There's almost no circumstance where JavaScript is required," Brandt said. Turning it off will give web users an extra prompt should they encounter a site that calls for Java, at which point they can make a choice.
Brandt also said that he recommends web surfers use the Firefox browser with the NoScript plug-in extension.
Known facts about Zues:
  • The ZEUS Trojan will commonly use names like below so search your PCs for files with this names:
  1. NTOS.EXE,
  2. SDRA64.exe
  3. LD08.EXE,
  4. LD12.EXE,
  5. PP06.EXE,
  6. PP08.EXE,
  7. LDnn.EXE
  8. PPnn.EXE
  • Typical size for Zues be 40KBytes and 150Kbytes .
  • Additionally look for folder with the name WSNPOEM, this is also a common sign of infection for the ZEUS Trojan.
  • Finally, check the Registry looking for RUN keys referencing any of these names.
  • Do not assume because your antivirus or internet security suite does not show any signs of infection that your PC does not have the ZEUS Trojan infection.

Sample Zues infection diagram from Trend Micro
Ways to remove Trojan manually

I found this information on Spyware techie's blog as manual removal method for techie computer users. Unknown Trojan manual removal may be difficult and time consuming to remove. There’s no guarantee that Unknown Trojan will be removed completely. So read the Unknown Trojan removal steps carefully and good luck.

Before you start: Close all programs and Internet browsers and back up your computer incase if something goes wrong.
  1. Uninstall Unknown Trojan Program
    Click on Start > Settings > Control Panel > Double-click on Add/Remove Programs. Search for and uninstall Unknown Trojan if found.
  2. To stop Unknown Trojan processes
    Go to Start > Run > type taskmgr. The click the Processes tab and you’ll see a list of running processes.
    Search and stop these Unknown Trojan processes:
    There are no processes.
    For each unwanted process, right-click on it and then select “End task”.
  3. To Unregister Unknown Trojan DLLs .To find how to delete DLL filesclick here
    Search and unregister these Unknown Trojan DLLs: There are no dll's.
    To locate the Unknown Trojan DLL path, go to Start > Search > All Files or Folders. Type Unknown Trojan and in the Look in: select either My Computer or Local Hard Drives. Click the Search button.
    Once you have the Unknown Trojan DLL path, go to Start and then click on Run. In theRun command box, type cmd, and then click on OK.
    To locate the exact DLL path, type cd in order to change the current directory. To display the contents of the directory, use the dir command. To remove the DLL file typeregsvr32 /u FILENAME.dll (FILENAME is the name of the file that you want to unregister).
  4. To unregister Unknown Trojan registry keys To know about how to remover register keys click here
    Go to Start > Run > type regedit > press OK.
    Edit the value (on the right pane) by right-clicking on it and selecting the Modify option. Select the Delete option.
    Search and delete these Unknown Trojan registry keys:
    There are no registry keys.
  5. If your homepage has been changed, go to Start > Control Panel > Internet Options> click on the General > click Use Default under Home Page. Add the your desired default homepage, then click Apply > click OK. Open a new web browser to check that you have your desired default homepage.
  6. Remove Unknown Trojan Directories.
    To find Unknown Trojan directories, go to Start > My Computer > Local Disk (C:) >Program Files > Show the contents of this folder.
    Search and delete the following Unknown Trojan directories:
    There are no directories.
    Right-click on the Unknown Trojan folder and select Delete.A message will appear saying ‘Are you sure you want to remove the folder Unknown Trojan and move all its contents to the Recycle Bin?’, click Yes.
    Another message will appear saying ‘Renaming, moving or deleting Unknown Trojan could make some programs not work. Are you sure you want to do this?’, click Yes.
  7. To remove Unknown Trojan icons on your Desktop, drag and drop them to the Recycle Bin.

Friday, May 14, 2010

Voice Encryption


Voice Encryption, almost more than 65% of worlds population uses mobile phone and mobile phone business is in multi million dollars.   We use mobile phone to even book online tickets using Credit card number, personal details and so many occasions we tend to have one or few of these details as our password just to keep it simple. As a general user we assume our telephone conversations are secure and no one else hearing out conversation other than the person we are speaking to.Law enforcement agencies can tap your call but they wont do it unless it is very necessary .
But the reality is any one with basic technical skills and financially motivated.
Statistics show Government agencies on average conduct 50,000 legal wiretaps per year (legal= those where a court order is required), (Let’s not forget Echelon http://tinyurl.com/yetrajm ) another 150,000 phones are illegally tapped by private detectives, spouses and boyfriends and girlfriends trying to catch a potential cheater.  Another estimate shows up to 100,000 phones are wiretapped by companies and private industry in some form of industrial espionage. It is happening and it is a big business.
It's indeed becomes essential for us to know the ways to secure at least understand the risk of the potential exploit. I saw this article with  technical explanation containing how secure the voice encryption products are..  According to infosecurityguard.com
I knew if I was able to compromise the security I just had to decide if it was as, less or more effective than breaking the encryption and which method was the most efficient. Unfortunately for almost all of  solutions they failed and I was able to simply compromise their security, intercept a phone call in real-time bypassing the entire encryption. The really surprising element was, how extremely simple it is.
All of the products have basic system requirements (i.e. OS, data connection etc) Well, they also all depend on the spoken voice being fed into the microphone.  This is the basic concept of some of the commercial wiretapping tools available on the market, so I thought I would take the same approach.
At what point does the software begin to encrypt the voice input and audio output ? So lets capture it before that happens.   This way I do not have to bother or worry about what encryption algorithms or key exchanges are being used, it really becomes a non issue.
To read more about the technical voice encryptions click here
Lack of voice encryption opens world of attack opportunities with readily available wiretapping utility, costing as little as $100, as well as his own ‘homemade’ Trojan, Notrax was able to bypass the encryption and eavesdrop by capturing conversations from the microphone and speaker in real time. By suppressing any rings, notifications or call logs, these attacks go completely undetected. And while Trojans can be installed manually by someone with access to the phone, they could equally be delivered via email, SMS or a mobile application.
List of Software solutions available with their tested status
The list of tested solutions includes:
  • Caspertec (Software) - Intercepted / insecure
  • CellCrypt (Software) - Intercepted / insecure
  • Cryptophone (Hardware) - Intercepted / insecure
  • Gold-Lock (Software) - Intercepted / insecure
  • Illix (Software) - Intercepted / insecure
  • No1.BC (Hardware SD-Card) - Intercepted / insecure
  • PhoneCrypt (Software) - Secure
  • Rode&Swarz (Hardware Bluetooth) - Secure
  • Secure-Voice (Software) - Intercepted / insecure
  • SecuSmart (Hardware SD-Card) - Intercepted / insecure
  • SecVoice (Software) - Intercepted / insecure
  • SegureGSM (Software) - Intercepted / insicure
  • SnapCell (Hardware) - Secure
  • Tripleton (Hardware) - Still Under Review
  • Zfone (Software) - Intercepted / insecure
  • ZRTP (Software) - Intercepted / insicure.
Phone Crypt,  and Rode&Swarz are two products considered secure and i can find product reviews on
PhoneCrypt
Phone Crypt is an innovative solution based in military grade encryption (RSA 4096 bits and AES 256 bits), the same technology used by FBI and CIA, which effectively protects your landline, mobile and PBX phones from access of intruders. IT also protects against trojan horse.

PhoneCrypt Features

• RSA 4096 bit & AES 256 bit Encryption;
• Diffie-Helman (DH) Key Exchange;
• MD5 & SHA512 Hash for voice integrity;
• Protection Agents detects, alerts and defends against attacks;
• Excelent voice quality;
• Easy to use and intuitive interface for users - the user doesn't need knowledge in security or technology;
• Voice encryption, immediate and automatic message, without any need of interaction from the user;
• The software uses internet connectivity through 3G, UMTS, HSPA, W-CDMA, EDGE, GPRS and WiFi to data transmission;
• Completely safe –  no secure data it is saved in the device at any time;
• No user intervention is required in security procedures;
• Less requirement use for processor (less than150 MHz);
• Works in devices with Windows Mobile systems without modify or inhibit any other function;
• Encrypt communication in landline and mobile phones;
• Advanced detector of phone calls;
• Superior voice quality (QOS).
To get an detail technical insight of phonecrypt, click here
I urge you to read the interesting article/demo from infosecurityguard.com to gain more understanding on voice encryption products.
Some recent news development about Cell Phone Security:

Tuesday, May 11, 2010

List of common windows error codes


System error codes will appear in software programs and in various areas within the Windows operating system after certain errors occur. Unfortunately, sometimes you'll only be shown the error code number but nothing about what the error code means! Knowing what a system error code means is necessary to troubleshoot the error.
Error #1  System error code 1 means "Incorrect function." This error code may also display as "ERROR_INVALID_FUNCTION" or as the value 0x1.
Error #2 System cannot find specified file. This error code may also display as "ERROR_FILE_NOT_FOUND" or as the value 0x2.
Solution: You should reinstall NCP & DUN
Error #3  System error code 3 means "The system cannot find the path specified." This error code may also display as "ERROR_PATH_NOT_FOUND" or as the value 0x3
Error #4  "The system cannot open the file." This error code may also display as "ERROR_TOO_MANY_OPEN_FILES" or as the value 0x4
Error #5 Access Denied
Solution:
1. Ensure that you have entered the right username and password in the field labeled domain for NT/2k.
2. Check that the option accept any authentication including clear text is activated.
Error #5 Invalid Procedure Call
Solution: Dialup and Network components must be installed again
Error #6 Stack Overflow
Solution:
1. Try cold booting your computer.
2. If this does not work, the problem might come from your RAM or the Swap file.
Error #20 The system cannot find the specified device
Solution:
1. Ensure that the right modem has been selected.
2. If it does not respond, try to reinstall it.
3. You can also try to reinstall NCP/DUN/RAS.
Error #71 No more connections is allowed
Solution:
1. Someone else might have connected under your account.
2. If you have been ghosted on the server, your Internet Service Provider can bump the ghost program off.
Error # 100 System error code 100 means "Cannot create another system semaphore." This error code may also display as "ERROR_TOO_MANY_SEMAPHORES" or as the value 0x64

Error Code 101 System error code 101 means "The exclusive semaphore is owned by another process." This error code may also display as "ERROR_EXCL_SEM_ALREADY_OWNED" or as the value 0x65.

Error Code 102 System error code 102 means "The semaphore is set and cannot be closed." This error code may also display as "ERROR_SEM_IS_SET" or as the value 0x66.
Error Code 103 System error code 103 means "The semaphore cannot be set again." This error code may also display as "ERROR_TOO_MANY_SEM_REQUESTS" or as the value 0x67.
Error Code 104 System error code 104 means "Cannot request exclusive semaphores at interrupt time." This error code may also display as "ERROR_INVALID_AT_INTERRUPT_TIME" or as the value 0x68.
Error Code 105 System error code 105 means "The previous ownership of this semaphore has ended." This error code may also display as "ERROR_SEM_OWNER_DIED" or as the value 0x69.
Error Code 106 System error code 106 means "Insert the diskette for drive %1." This error code may also display as "ERROR_SEM_USER_LIMIT" or as the value 0x6A.
Error Code 107 System error code 107 means "The program stopped because an alternate diskette was not inserted." This error code may also display as "ERROR_DISK_CHANGE" or as the value 0x6B.
Error Code 108 System error code 108 means "The disk is in use or locked by another process." This error code may also display as "ERROR_DRIVE_LOCKED" or as the value 0x6C.
Error Code 109 System error code 109 means "The pipe has been ended." This error code may also display as "ERROR_BROKEN_PIPE" or as the value 0x6D.
Error #380 Invalid Proper Value
Solution:
1. Autodial should be pointed to the correct dialer.
2. Else, set up the dialer again.
Error #600 An operation is pending
Solution:
1. You should first try to reboot your computer.
2. Ensure that no other program is using your modem.
3. Else press Ctrl-Alt-Delete and if RNAAPP loads, contact a technician to fix this problem.
4. Make sure that your computer is Spyware free.
Error #601 The port handle is invalid
Solution:
1. Select the modem's COM port and under the Diagnosis section, open more Info. You should reboot your computer if you are able to get Atl responses. Hence, remove the erroneous init string or enter ATZ as the init.
2. You can also reinstall your modem
3. Else press Ctrl-Alt-Delete and if RNAAPP loads, contact a technician to fix this problem.
4. Your Dialup Networking should be installed again together with its components
5. Your modem might not be working properly. You should then consult your computer manufacturer.
Error #602 The port is already open
Solution:
1. Try to reboot your computer
2. Ensure that no other program is using the modem
3. Else press Ctrl-Alt-Delete and if RNAAPP loads, contact a technician to fix this problem
4. Try uninstalling the AOL Adapters in the Network Control panel and reboot your computer. Install your Dialup Adapter again.
5. Remove the erroneous init string or enter ATZ as the init.
6. If you have Quicken 2000, deactivate the Quicken Download Manager.
7. You should maybe install your modem again.
8. Make sure that your computer is Spyware free.
Error #603 Callers buffer is too small
Solution:
1. Ensure that your port speed is not configured to a low speed
2. In your Port Settings, ensure that FIFO is not set to low.
3. Your Dialup Networking should perhaps be installed again together with its components
4. If you are still having problems, contact your computer manufacturer.
Error #604 Wrong information specified.
Solution:
1. Ensure that the are no outages within your area
2. Try to enter the username and password again
3. Set up the dialer again
4. Your Dialup Networking should be installed again together with its components
5. You can also try to reinstall your modem
Error #605 Cannot set port information.
Solution:
1. Ensure that the are no outages within your area
2. Try to enter the username and password again
3. Set up the dialer again
4. Your Dialup Networking should be installed again together with its components
5. You can also try to reinstall your modem
Error #606 The port is not connected.
Solution:
1. Select the modems COM port and under the Diagnosis section, open More Info. You should reboot your computer if you are able to get Ati responses. Hence, remove the erroneous init string or enter ATZ as the init.
2. You can also reinstall your modem
3. Else press Ctrl-Alt-Delete and if RNAAPP loads, contact a technician to fix this problem.
4. Your modem might not be working properly. You should then consult your computer manufacturer if the problem persists.
Error #607 The event is invalid.
Solution:
1. If this problem arises while dialing up to the internet, verify that the settings of the event log have been correctly set.
2. Try rebooting your system and ensure that the dialer/network settings have been correctly configured
3. Else, install RAS/DUN again.
Error #608 The device does not exist.
Solution:
1. Check that the right modem is set in the dialer
2. Ensure that you are using the right modem drivers by checking the modem diagnostics. If its not the case, set up the correct drivers.
3. Remove and install the dialer again
4. Your modem might not be working properly; try to install it again.
5. You should then consult your computer manufacturer if the problem persists.
Error #609 The device type does not exist.
Solution:
1. Check that the right modem is selected in the dialer
2. Ensure that you are using the right modem drivers by checking the modem diagnostics. If its not the case, set up the correct drivers.
3. Your modem might not be working properly; try to install it again.
4. You should then consult your computer manufacturer if the problem persists.
Error #610 The buffer is invalid.
Solution:
1. Ensure that your port speed is set to low in the modem properties.
2. In your Port Settings, check that FIFO is not set to low.
3. Remove and install the dialer again.
4. Else, install RAS/DUN again.
5. You should then consult your computer manufacturer if the problem persists.
Error #611 The route is not available.
Solution:
1. Try to reboot your computer
2. Ensure that you set the right configurations for the dialer and network settings.
3. Else, install the network components again.
4. If you are using a LAN connection, consult your system administrator.
Error #612 The route is not allocated.
Solution:
1. Reboot your computer
2. Ensure that you set the right configurations for the dialer and network settings.
Error #613 Invalid compression specified.
Solution:
1. Try to reboot your computer
2. Else, add &K3 to the extra settings.
3. If this still does not solve the problem, add &K0.
4. You can also try to reinstall the modem.
Error #614 Out of buffers.
Solution:
1. Ensure that our port speed is not too low.
2. Try to install your modem again.
Error #615 The port was not found.
Solution: Try to install your modem drivers.
Error #616 An asynchronous request is pending.
Solution:
1. Reboot your computer.
2. Try to install your modem drivers again.
Error #617 The port or device is already disconnecting
Solution:
1. Wait until your modem disconnects properly.
2. If this operation is taking too long, reboot your computer.
Error #618 The port is not open.
Solution:
1. Reboot your computer
2. Ensure that no other program is making use of the modem.
Error #619 The port is disconnected.
Solution:
1. Reboot your computer
2. Ensure that no other program is making use of the modem.
Error #621 Cannot open the phone book file.
Solution: Install Blue Frog connection software again.
Error #622 Cannot load the phone book file.
Solution: Install Blue Frog connection software again
Error #623 Cannot find the book entry.
Solution: Install Blue Frog connection software again
Error #626 Cannot load a string
Solution:
1. Try to reboot your system.
2. Install Blue Frog connection software again
Error #627 Cannot find key
Solution: Install Blue Frog connection software again
Error #628 The port was disconnected
Solution:
1. Install Blue Frog connection software again
2. Try to install your modem drivers again.
Error #629   The port was disconnected by the remote machine.
Solution:
1. Install Blue Frog connection software again
2. Try to enter an alternate Access Number
3. Try to install your modem drivers again.
Error #630 The port was disconnected due to hardware failure.
Solution:
1. Install Blue Frog connection software again
2. Try to reinstall your modem drivers.
3. Try to use an alternate modem.
4. Else, replace your current modem with a new one.
Error #631 The port was disconnected by the user.
Solution:
1. Ensure that the right Access Number is being dialed.
2. Try to reboot your computer.
Error #632 The structure size is incorrect.
Solution:
1. Try to reboot your computer
2. Install Blue Frog connection software again
Error #633 The port is already in use or is not configured for Remote Access dialout.
Solution:
Try to reboot your computer
Else try to reinstall your modem drivers.
Error #634 Cannot register your computer on the remote network
Solution:
Try to check your network settings and modify your computer name.
Install the network control panel again.
Error #635 Unknown Error
Solution:
1. Try to reboot your computer
2. Install Blue Frog connection software again
3. Else try to reinstall your modem drivers.
Error #636 The wrong device is attached to the port
Solution: Check in your settings if you have chosen the right modem.
Error #637 The string could not be converted
Solution:
Try to reboot your computer
Install Blue Frog connection software again
Error #638 The request has timed out.
Solution:
Try to reboot your computer
Install Blue Frog connection software again
Error #645 Internal authentication error.
Solution:
1. Try to reboot your computer
2. Install Blue Frog connection software again
3. Else try to reinstall your modem drivers.
Error #650 The Remote Access server is not responding.
Solution:
Check that your connection and network settings have correctly been configured.
Ensure that the modem has been correctly set up and look for updated drivers.
Set FIFO buffers to a lower speed and ensure that you have unchecked the option Only connect at this speed.
Error #676 The line is busy
Solution: Ensure that your Access Number is still active and is correctly dialed.
Error #678   There is no answer.
Solution:
1. First of all check that your phone lines are correctly plugged in.
2. Ensure that the Access Number is correct
3. Else, try another Access number
4. If you are trying to make use of your connection in a bad weather, this might be the source of the problem. Wait until it calms down and try again.
5. Else, install your modem drivers again.
6. If the problem persists, you might need to contact your ISP.
Error #680 There is no dial tone.
Solution:
First of all check that your phone lines are correctly plugged in.
The phone lines might be damaged. Replace them and try again.
Else, install your modem drivers again.
If the problem persists, you might need to contact your ISP or a technician.
Error #691 Access denied because username and/or password is invalid on the domain.
Solution:
1. Ensure that you have entered the right username and password.
2. Make sure that your account is active and turned on.
3. You might also try to enter another Access Number.
4. If the problem persists, you might need to contact your ISP.
Error #692 Hardware failure in port or attached device.
Solution:
Browse for and remove any Blue Frog init strings.
Install Blue Frog connection software again
Else, install your modem drivers again.
Error #718 PP Timeout
Solution:
1. Try to reboot your computer
2. Ensure that you have entered the right username and password
3. You might try another Access Number
4. Install Blue Frog connection software again
5. Else, install your modem drivers again.
Error #721 Remote PPP peer is not responding.
Solution: For Windows 2000/XP/Vista operating systems, ensure that the security setting for the dialer reads Allow unsecured Password
Error #734 The PPP link control protocol terminated.
Solution: For Windows 2000/XP/Vista operating systems, ensure that the security setting for the dialer reads Allow unsecured Password
Error #777 The connection attempt failed because the modem on the remote computer is out of order.
Solution:
1. Install Blue Frog connection software again
2. Try an alternate modem
3. Install your modem drivers again
4. Else, install a new modem
Error #778   It was not possible to verify the identity of the server.
Solution:
1. Ensure that you are dialing the correct phone number
2. Verify the connection and Network settings
3. ensure that you do not have any outrage on the phone number
4. Ensure that you have correctly installed your modem and check for updated drivers.
5. Set FIFO buffers to a lower speed and ensure that you have unchecked the option Only connect at this speed.
Error #779 To dial out using this connection, you must use a smart card.
Solution:
1. Ensure that all auth is allowed in your connection settings in the Security section.
2. Verify that you have correctly set the other dialer settings.
3. Else, create the dialer again.
4. You might need to use the Smart Card Reader as initially setup by the Network Administrator.
Error #780 An attempted function is not valid for this connection.
Solution: Ensure that the dialer, not the one set up for LAN use though, has been properly installed and has the right settings.
Error #781 The encryption attempt failed because no valid certificate was found.
Solution: You have to get a valid certificate by registering to the website here
Error #782 Network Address Translation (NAT) is currently installed as a routing protocol, and must be removed before enabling Internet Connection Sharing
Error #783 Internet Connection Sharing cannot be enabled. The LAN connection selected as the private network is either not present, or is disconnected from the network. Please ensure that the LAN adapter is connected before enabling Internet Connection Sharing.
Error #784 You cannot dial using this connection at logon time, because it is configured to use a user name different than the one on the smart card. If you want to use it at logon time, you must configure it to use the user name on the smart card.
Error #785 You cannot dial using this connection at logon time, because it is not configured to use a smart card. If you want to use it at logon time, you must edit the properties of this connection so that it uses a smart card.
Error #786   The L2TP connection attempt failed because there is no valid machine certificate on your computer for security authentication.
Error #787 The L2TP connection attempt failed because the security layer could not authenticate the remote computer.
Error #788 The L2TP connection attempt failed because the security layer could not negotiate compatible parameters with the remote computer.
Error #789 The L2TP connection attempt failed because the security layer encountered a processing error during initial negotiations with the remote computer.
Error #790 The L2TP connection attempt failed because certificate validation on the remote computer failed.
Error #791 The L2TP connection attempt failed because security policy for the connection was not found.
Error #792 The L2TP connection attempt failed because security negotiation timed out.
Error #793 The L2TP connection attempt failed because an error occurred while negotiating security.
Error #794 The Framed Protocol RADIUS attribute for this user is not PPP.

Error #795
 The Tunnel Type RADIUS attribute for this user is not correct.
Error #796 The Service Type RADIUS attribute for this user is neither Framed nor Callback Framed
Error #797 A connection to the remote computer could not be established because the modem was not found or was busy.
Error #798 A certificate could not be found that can be used with this Extensible Authentication Protocol.
Error #799 Internet Connection Sharing (ICS) cannot be enabled due to an IP address conflict on the network. ICS requires the host be configured to use 192.168.0.1. Please ensure that no other client on the network is configured to use 192.168.0.1
Error #800 Unable to establish the VPN connection. The VPN server may be un-reachable, or security parameters may not be configured properly for this connection
Solution:
1. Check your ADSL line as it is probably not synched.
2. Verify that your Security Options are correctly set in your connection options.
3. Either your Network Card or your modem might not work properly. Contact a technician if the problem persists.
Error #994 means "Access to the extended attribute was denied." This error code may also display as "ERROR_EA_ACCESS_DENIED" or as the value 0x3E2
Error #995 means "The I/O operation has been aborted because of either a thread exit or an application request." This error code may also display as "ERROR_OPERATION_ABORTED" or as the value 0x3E3.
Error #996  means "Overlapped I/O event is not in a signaled state." This error code may also display as "ERROR_IO_INCOMPLETE" or as the value 0x3E4.

Error #997  means "Overlapped I/O operation is in progress." This error code may also display as "ERROR_IO_PENDING" or as the value 0x3E5
Error #998  means "Invalid access to memory location." This error code may also display as "ERROR_NOACCESS" or as the value 0x3E6.
Error #999  System error code 999 means "Error performing inpage operation." This error code may also display as "ERROR_SWAPERROR" or as the value 0x3E7.
Error #1382 Maximum length exceeded.
Error #1793 Error Message: Account expired.
Error #2250 Network connection does not exist.
The following sections describe error messages that you may receive when you run the Setup procedure and how to resolve some of the behaviors.
  • SU0010 Setup has detected a Boot Manager partition on your computer. If you set up Windows, you will not be able to use Boot Manager. For more information, quit Setup, and read SETUP.TXT on Setup Disk 1 or the Windows CD-ROM.
  • SU0011 Setup has detected a password-protected partition on your hard disk. To set up Windows 95 (or Windows 98), you first need to remove the password protection. For more information, see SETUP.TXT on Setup Disk 1 or the Windows CD-ROM.
  • SU0012 Setup detected an OS/2 or Windows NT file system partition on your hard disk. Files on this partition will not be available when you use Windows 95 (or Windows 98). For more information, see SETUP.TXT on Setup Disk 1 or the Windows CD-ROM.
  • SU0013 Setup could not create files on your startup drive and cannot set up Windows. If you have HPFS or Windows NT file system, you must create an MS-DOS boot partition. If you have LANtastic server or SuperStor compression, disable it before running Setup. See SETUP.TXT on Setup Disk 1 or the Windows CD-ROM.
  • SU0014 Setup has found a hardware device on your computer that is not responding. To try this device again, click Continue.
  • SU0015 Setup detected a Windows NT file system partition on your hard disk. Files on this partition will not be available when you use Windows 95 (or Windows 98).
  • SU0016  Setup has detected OS/2 files on your computer. If you set up Windows 95 (or Windows 98), you may not be able to use OS/2. For more information, quit Setup and read SETUP.TXT on Setup Disk 1 or the Windows CD-ROM.
  • SU0018 Setup could not create files on your startup drive and cannot set up Windows.
    There may be too many files in the root directory of your startup drive, or your startup drive letter may have been remapped by network or compression software. For more information, see SETUP.TXT on Setup Disk 1 or the Windows CD-ROM.
  • SU0019 Setup has found commands in your AUTOEXEC.BAT or CONFIG.SYS files that are not compatible with Windows.
  • SU0129 Setup was unable to determine your computer's hardware configuration. Setup cannot continue and will now close.
  • SU0130 Please make sure that your User name, Beta ID, and Password are correct.
  • SU0133 Setup was unable to determine your system configuration by using full detection. Would you like to try again using minimal detection?
  • SU0135 Setup was unable to properly identify all your hardware. To confirm your hardware settings, click Change Computer Settings.
  • SU0136 Setup was unable to initialize Windows Help. Help may not be available during Windows Setup.
  • SU0139 The directory you specified contains a version of Windows with a different character set. Setup cannot upgrade this version. Please choose a different directory.
  • SU0141 Setup could not copy files needed for your startup disk. You can still continue with Setup without creating the startup disk. Click OK to continue.
  • SU0142 Setup did not find enough free directory entries in the root of the following drives. Please delete some files or directories to make enough room. Setup needs at least more free entries on drive.
  • SU0147 Setup did not find enough free directory entries in the root of your startup drive. Please delete some files or directories to make enough room, and then run Setup again. Setup needs at least X more free entries on this drive. Where "X" is a replaceable parameter.
  • SU0151 Setup could not verify that your computer has the minimum amount of memory (RAM) required to run Windows 95 (or Windows 98). Do you want to continue with Setup?
  • SU0152 Your computer has X bytes of memory (RAM). Windows 95 (or Windows 98) requires a minimum of X bytes. You must install more memory before setting up Windows 95 (or Windows 98).
  • SU0153 Drive X, the host drive for the compressed X drive, must have at least X bytes free to set up Windows. Free some disk space, and then run Setup again.
  • SU0156 Setup has found Pen Extensions 1.0 installed on your computer. If you proceed with Setup, these will be removed. To continue with Setup, click OK. To quit Setup, click Cancel.
  • SU0159 The directory X you specified contains a Windows NT installation. Setup cannot install Windows in this directory. Please choose a different directory.
  • SU0160 The directory X which is needed to install Windows into already contains a Windows installation. Please choose a different installation directory.
  • SU0161 The directory X which is needed to install Windows into already contains a Windows installation. Setup will choose a directory for you, which you can change later.
  • SU0162 The directory X contains a Windows NT installation. Setup cannot install into this directory. Setup will choose a directory for you, which you can change later.
  • SU0163 The directory X you specified contains an MS-DOS installation. Please choose a different directory.
  • SU0164 Setup cannot upgrade the version of Windows in %1, because you are running Windows from a different directory. Please choose a different directory.
  • SU0165 The specified path contains an invalid character (for example, \344, \374, \366, \350, \343, \346). Please specify a valid path.
  • SU0167 The specified directory contains a directory named 'desktop' that you must move or rename before Setup can continue. For more information, see SETUP.TXT on Setup Disk 1 or the Windows CD-ROM.
  • SU0168 Your computer already has an operating system installed, which cannot be upgraded by this version of Setup. Please obtain the Windows 95 (or Windows 98) Upgrade.
  • SU0325 Windows Millennium setup cannot continue.
    This issue can be caused by a corrupted .cab file that has been copied to the hard disk. This corruption can be caused by a virus or by failing hardware, but is most likely to be caused by a scratched, dirty, or damaged CD-ROM.
  • SU0335 Setup could not determine your hardware settings. There may be a missing or damaged Setup file or there may not be enough memory to continue. Free some memory and then run Setup again.
  • SU0343 Setup could not create X. Make sure you specified a valid drive letter and directory name. Also make sure the directory name does not conflict with existing files on your drive.
  • SU0344 The Windows directory X you have specified does not currently exist. Please verify that the path is correct.
  • SU0346 Setup cannot upgrade Windows. The directory X does not contain a valid Windows installation. Please specify another directory.
  • SU0347 Setup cannot upgrade Windows <version number> in <directory name>. You must have version 3.0 of Windows or later in order to upgrade. Specify another directory in the New Directory box.
  • SU0349 A mismatched SETUPX.DLL is loaded. Setup cannot continue. Quit all Windows and MS-DOS-based programs, and then try again. Or quit Windows and then run Setup from MS-DOS.
  • SU0350 Setup was unable to display the Nondisclosure Agreement. Setup will now close.
  • SU0358 Setup detected one or more MS-DOS-based programs running on your computer. Close your MS-DOS programs, and then click OK to continue. Or, click Cancel to quit Setup.
  • SU0360 Setup could not create X. Type a drive letter and directory name to specify where you want to set up Windows 95 (or Windows 98). An example of a valid entry is C:\WINDOWS.
  • SU0361 A Windows registry file was found. If Windows 95 (or Windows 98) is installed in another directory, continuing with Setup will disable it. Do you want to continue?
  • SU0362 It is not recommended that Setup continue without the proper amount of disk space free. If you continue, Setup may run out of disk space and not complete successfully.
For list of windows update error codes Click here