This website uses cookies to ensure you have the best experience. Learn more

Microsoft Hidden Files Essay

2005 words - 8 pages

Introduction:

There are folders on your computer that Microsoft has tried hard to keep
secret. Within these folders you will find two major things: Microsoft
Internet Explorer has been logging all of the sites you have ever visited --
even after you've cleared your history, and Microsoft's Outlook Express has
been logging all of your e-mail correspondence -- even after you've erased
them from your Deleted Items bin. (This also includes all incoming and
outgoing file attachments.) And believe me, that's not even the half of it.

When I say these files are hidden well, I really mean it. If you don't have
any knowledge of DOS then don't plan on finding these files on your own. I
say this because these files/folders won't be displayed in Windows Explorer at
all -- only DOS. (Even after you have enabled Windows Explorer to "view all
files.") And to top it off, the only way to find them in DOS is if you knew
the exact location of them. Basically, what I'm saying is if you didn't know
the files existed then the chances of you running across them is slim to
slimmer.

It's interesting to note that Microsoft does not explain this behavior
adequately at all. Just try searching on microsoft.com.I know there are some
people out there that are already aware of some of the
things I mention. I also know that most people are not. The purpose of this
tutorial is teach people what is really going on with Microsoft's products and
how to take control of their privacy again. This tutorial was written by me,
so if you see a mistake somewhere then it is my mistake, and I apologize.

Thanks for reading.

INDEX:

1) DEFINITIONS AND ACRONYMS
2) WHY YOU SHOULD ERASE THESE FILES
3) HOW TO ERASE THE FILES ASAP
3.1) If You Own Microsoft Internet Explorer
3.2) Clearing Your Registry
3.3) If You Own Outlook Express
3.4) Slack files
3.5) Keeping Microsoft's Products
4) STEP-BY-STEP GUIDE THROUGH YOUR HIDDEN FILES (For the savvy.)

1. DEFINITIONS AND ACRONYMS

Well, the best definition I have been able to come up with is the following:

I) A "really hidden" file/folder is one that cannot be seen in Windows
Explorer after enabling it to "view all files," and cannot be seen in MS-DOS
after receiving a proper directory listing from root.

a) There is at least one loophole to enabling Windows Explorer to see them.
b) There is at least one loophole to enabling MS-DOS to see them.

(Interesting to note that the "Find: Files or Folders" utility cannot even
search through one of these folders. It doesn't even exist on the [Browse]
menu.)

II) Distinguishes "really hidden" file/folders from just plain +h[idden] ones,
such as your "MSDOS.SYS" or "Sysbckup" folder.

III) Distinguishes from certain "other" intended hidden files, such as a file
with a name with high ascii characters (eg, "Ÿë靖").

DOS = Disk Operating System
MSIE =...

Find Another Essay On Microsoft Hidden Files

Analyzing Windows Memory Essay

1339 words - 5 pages terminated or which have been hidden by Direct Kernel Object Manipulation techniques (Schuster). Quite often data in memory is extremely fragmented. This is unlike most data on a disk as part of keeping a hard drive in good working order is defragmentation in Windows (Carvey). Therefore determining the logical order of pages utilizing the Page Table may be impossible to reconstruct files. If we are able to reconstruct the order of the pages it may

History of Operating Systems Essay

2549 words - 11 pages on multitasking and interface design. History of Linux Operating System Linux is an open source operating system where the popularity can compete with Microsoft and Apple. In the beginning, there was UNIX created by Ken Thompson and Dennis Ritchie of Bell Labs in 1969. By the early 1980s, proprietary software development has been becoming popular, source code of the software had kept secret and hidden as Microsoft. In 1983, a man

Virtual Private Networks

989 words - 4 pages (Microsoft Press, 2000). Least network lines are expensive and VPNs reduce then need for extra data connections. This in turn also aids in reducing the amount of overhead associated with managing a network. The added security benefits for a network include encrypted transmission of network data and user authentication. Passing datagrams across the Internet between sites can cause major security risk. When a datagram is passed internally within

Topic: Web Security (Internet Banking)

1054 words - 4 pages any document/file or program. It may be possible to open a browser and a Trojan can be hidden.^ Recently, "a Trojan came in the form of an e-mail message that included attachments claiming to be Microsoft security updates, but turned out to be viruses that attempted to disable antivirus and firewall software" [4]. When a Trojan is downloaded into your computer, it can compile information such as your usernames and passwords. Therefore, all these

Network Attributes, Roles and Protocols

1339 words - 5 pages network operating system, new users may come across a few problems, as a brief understanding of the syntax used is essential.         Linux is an open source operating system, which means you have the freedom to change the coding. Windows NT however keeps all the code hidden to stop users tampering with it.         Microsoft Windows NT and Linux can be broken down into two groups: Traditional and Distributed

Computer Viruses

1225 words - 5 pages Viruses The word virus can be very disheartening, especially when computers are involved. A digital virus is a computer code composed of instructions hidden inside a program. These instructions can either be malicious or more stealthy, not letting their presence be known until it is too late. Regardless of the type you have encountered or will encounter either purposely or on accident, there is help. Software companies have been and will

The State of PC Security

3791 words - 15 pages browsing, e-mail, word processing, spreadsheets, presentations, photos, music and video. The Mac version of Microsoft Office can handle Windows Office files with ease, and it produces files that Office for Windows handles effortlessly.But if you already have a windows computer (this includes 90% of today's computer users) switching platforms will include an enormous learning curve, is expensive, and will scare a lot of people. So if you're sticking

File system overview - FAT, NTFS, EXT3

3508 words - 14 pages as special to that driver.Index Root Used to implement folders and other indexes.Index Allocation Used to implement folders and other indexes.Bitmap Used to implement folders and other indexes.Volume Information Used only in the $Volume system file. Contains the volume version.Volume Name Used only in the $Volume system file. Contains the volume label.NTFS includes several system files, all of which are hidden from view on the NTFS volume. A

Health and safety report on a standalone computer

4552 words - 18 pages over running processes. It is expected that there are no processes running without the users authorisation.2.1.2 Rootkit Detectors2.1.2.1 Test 1 RootkitRevealerFigure 4: RootkitRevealer (Refer to Reference List)Goal & ScopeRootkitRevealer is an application that checks and reveals the number of hidden or invisible roots in a number of directories.Test(s) & Expected OutcomeRootkitRevealer will show the number of files that are visible after

Viruses

2593 words - 10 pages system’s memory and may replicate itself further.  Macro viruses are currently the most commonly found viruses. They infect files run by applications that use macro languages, like Microsoft Word or Microsoft Excel. The virus looks like a macro in the file, and when the file is opened, the virus can execute commands understood by the application’s macro language.  Multipartite viruses have characteristics of both boot

Windows 2000 Advanced Server

1491 words - 6 pages messenger programs can be hidden when the remote desktop is maximized. With multiple monitors, it is easier to view such messages and reduces the amount of scrolling needed to navigate through windows that are all on the same monitor.Removable Storage allows rarely used files to be automatically moved to removable media when the amount of free space on a drive reaches a specified level. When the files are needed, they are then read from the removable

Similar Essays

The Anti Trust Essay

909 words - 4 pages , not a separate product. On December 11, U.S. District Court Judge Thomas Penfield Jackson ordered Microsoft to give OEMs (Original Equipment Manufacturers) the option of bundling Window's 95 without IE. Microsoft is appealing the ruling insisting that IE is a feature designed to improve Window's 95.It appears that Gates has given in a bit, he has offered a version of Window's 95 with the IE icon hidden, which allows OEM's to install the retail

Comp Midterm Essay

910 words - 4 pages Randomization) and DEP (Data Execution Prevention), BitLocker encryption, and secure Internet Explorer and the cons are Windows Firewall, Hidden File Extensions and XP mode virtualization. The Address Space Layout Randomization (ASLR) protects configuration files and functions executables of the system by placing them in complicated locations. Data Execution Prevention prevents buffer overflow attacks happening on Windows 7 PCs. "Sophos Senior Security

Unix Vs. Windows Essay

3158 words - 13 pages Windows based. One reason for these differences is that in general Windows comes fully loaded with multiple systems, only a few of which the average user actually requires. UNIX advocates might also point out that UNIX code is leaner and more efficient than Windows code.File ProcessingUnderstanding how an operating system processes all of its data, especially critical files such as system or hidden files, is important since data processes are the

Unix Vs Windows Essay

2119 words - 8 pages COSTThe cost of a UNIX system compared with that of the Microsoft Windows 2003 is very inexpensive. The cost of using Windows 2003 in a company with a hundred plus employees is going to be well over the $300,000.00 mark that we would be need to get our organization off the ground and operation. The IT department would need to also consider whether it is going to need to overhaul the hardware that is already has available or buy upgrade packages