Kill The Messenger (Service)

You are familiar with the software applications that you run on your computer, but you may not be familiar with the dozens of programs running in the background on your computer. These programs, called "services" handle tasks like event logging, spooling files to the printer, and networking. One of these services, the Messenger Service, can be reconnoitered by spammers.

The original purpose of the Messenger Service was to allow system administrators to send a message to some or all of the users on a network. The message appears in a popup window to alert the users. Messenger Service is not instant-messaging. It does not allow the users to respond.

All Windows versions install Messenger Service and turn it on by default. A program freely available from the Internet allows spammers to control the Messenger Service on hundreds of thousands of computers on the Web. Users receive popup spam windows that are not generated by the website they are visiting.

If your computer is on a network behind a firewall, or you have a firewall application installed on your computer, it can be configured to block access to the Messenger Service. Most firewalls are configured by default to block access to the Messenger Service. If not, configure your firewall to block port 135, the port used by Messenger Service.

Microsoft, in their ignorance of computer security, likes to leave "back doors" to your computer open. But they finally wised up and Windows XP Service Pack 2 turns off the Messenger Service. If you are running Windows XP, your best bet would be to install Service Pack 2 to turn off the Messenger Service and close several other security holes.

If you are running Windows 2000, you can turn off the Messenger Service manually. Select "Run..." in the Start menu and in the "Open:" text box type services.msc, then click on the "OK" button. In the "Services" window that appears, right-click on "Messenger". In the "Properties" dialog box that appears, click on the "Stop" button and then in the "Startup Type" drop-down list select "Disabled". Then click on the "OK" button.

If you are running Windows NT, select "Services" in the "Adminstrative Tools" utility. Then disable the Messenger Service as described above. If you are running Windows 95/98/Me, you can't disable Messenger Service, you need to remove it. Use the "Add/Remove Programs" utility in Control Panel to view the details of "System Tools". Uncheck the box next to "WinPopUp".

Now, with the Messenger Service on your computer disabled or removed, spammers will have to go back to annoying you the old fashion way - with spam email.

--

Permission is granted for the below article to forward, reprint, distribute, use for ezine, newsletter, website, offer as free bonus or part of a product for sale as long as no changes are made and the byline, copyright, and the resource box below is included.

About The Author

Copyright(C)2004 Bucaro TecHelp. To learn how to maintain your computer and use it more effectively to design a Web site and make money on the Web visit bucarotechelp.com. To subscribe to Bucaro TecHelp Newsletter Send a blank email to bucarotechelp.com

shuttle from O'Hare Orland Park .. Lockport Chicago limo O’Hare
In The News:

FireSat is a satellite project designed to detect and track wildfires early, aiming to detect a fire that's the size of a classroom within 20 minutes.
Tech expert Kurt “CyberGuy" Knutsson reports that researchers have uncovered a Chrome vulnerability used in a cyber espionage campaign.
Preserving voicemails securely on Android: Tech expert Kurt “CyberGuy" Knutsson reveals easy methods to keep memories alive forever.
This phishing kit bypasses 2FA via session hijacking and real-time credential theft. Kurt “CyberGuy" Knutsson offers four ways to stay safe from Astaroth phishing attacks.
Tech expert Kurt “CyberGuy" Knutsson discusses Joby Aviation and Virgin Atlantic planning to launch 200-mph U.K. air taxis linking airports and cities.
Fake Apple virus warnings, security alerts and messages are tactics used to prompt you to call a number or click on a malicious link. The CyberGuy explains how to protect your devices.
The combination of artificial intelligence and neuroscience allows a paralyzed man to manipulate a robotic arm by using his brain to imagine movements.
With the help of artificial intelligence, sophisticated fraud techniques emerging today are virtually undetectable to the untrained eye.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents
If you need to free up space on your Mac, consider deleting duplicate photos in your image library. Apple makes it easy to do, and the CyberGuy explains the process.
Microsoft is discontinuing Skype in May after 22 years of service. Kurt the CyberGuy addresses other options for internet-based phone and video service.
Tron 1, a Chinese company's two-legged robot, is versatile and can walk, roll and pivot, even on rough terrain. Tron 1 stands 33 inches tall and weighs 44 pounds.
Hackers are tricking people into installing password-stealing malware by making them press keyboard shortcuts under the pretense of proving they're not bots.
Saving the voices of loved ones can be a comforting way to keep alive memories. Kurt "the CyberGuy" Knutsson explains how to preserve voicemail messages.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
The FBI warns that some free online document converters load malware onto people's computers, making their private information vulnerable to attack.
Toyota's compact electric FT-Me is designed to tackle challenges of city living while offering an accessible and eco-friendly transportation solution.
Kurt “CyberGuy" Knutsson says 23andMe's bankruptcy raises data privacy fears: Opt out, download and delete data now.
UBTech and Zeekr unite with AI robot swarms to make car manufacturing faster and smarter. Tech expert Kurt “CyberGuy" Knutsson explains how the process works.
Tech expert Kurt “CyberGuy" Knutsson says Apple's Passwords app had a three-month phishing flaw from iOS 18 to 18.2 patch.
Tech expert Kurt “CyberGuy" Knutsson discusses how this super-small electric mini-truck takes a big step toward production.
Artificial intelligence-generated images and videos that use someone’s likeness typically target women without their consent. The CyberGuy unpacks how to protect loved ones.
A humanoid robot developed in China has transformed from a nimble dancer to performing kung fu moves with surprising precision and balance.
To protect memories, documents and personal data, you should back up your information on personal drives, according to Kurt the CyberGuy.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents

Stop Spam: How To Escape The Spam Hell-Hole

If you're anything like me, you're pretty sick of it,... Read More

How You Can Avoid The New Dangers Of Spam

Until recently, spam has been an annoyance, a definite load... Read More

Stuffing the Spammers!

I'm really, truly fed up with spam. Every day when... Read More

Phishing for an Identity

Phishing is rapidly becoming on the largest threats to your... Read More

Customers Demand Internet Privacy

... and you'd better sit up and take notice! Customers... Read More

Bayesian Spam Filters Explained

In a word Bayesian spam filters are "intelligent". Bayesian spam... Read More

Internet Tip of the Week: Outsourcing

It's no secret that the US economy has slowed down,... Read More

Dealing With SPAM - An E-mail Address Strategy

With SPAM being such a problem it might seem the... Read More

Winning the War On Spam

For years I didn't worry much about spam.But lately it's... Read More

Spasms & Spamocidal Mania

Below is a letter I wrote to the following organizations:S.H.U.... Read More

Kill The Messenger (Service)

You are familiar with the software applications that you run... Read More

All About Spam

Spam is annoying. Period. Why people would want to send... Read More

Beware of the Newest Activity Online: Phishing

No. I'm not talking here about the outdoor activity enjoyed... Read More

Do You Know Whats in Your Trash?

A hearty welcome to all the spam fighting filters and... Read More

What Is Spam?

If you've been around the interenet any length of time... Read More

Blackhole or Fail - Which One Is Better For Your Mail Server?

Very often SPAMMERS take advantage of catch-all email setup on... Read More

What to Do to Avoid Getting Banned

How would you feel if you found a link on... Read More

The Anti Spam Challenge ? Minimizing False Positives

Email is the quintessential business communication tool, so when it... Read More

How to Fight Back BEFORE Youre Falsely Accused of Spam

A friend of mine received a chilling email message from... Read More

Email Spam and Phishing

It seems like the volume of email spam has doubled... Read More

What Exactly is Spam?

Spam, as defined in the context of computers, the Internet... Read More

Why Is Spam Such a Problem?

Spam can be a lot more damaging than you might... Read More

How To Identify Spam

Most of us have opened our email program and found,... Read More

Email Chain Letters - Harmless Fun or Not?

I'm sure I'm not the only person on the planet... Read More

Junk Mail Works!

Junk mail works. Why does it work? How does it... Read More

Lincoln Town Car rentals Addison ..