2011/12/21

Send emails with attachment, from the command line, using the default email client


How to send email with attachments in a way programmed and automated by using the default e-mail client software whatever it is (Outlook, Outlook Express, Windows Live Mail, Thunderbird, etc.).?


Essentially there is the need to have a system to compose an email message containing: sender, recipient, title, subject and attachment files and to automatically open the default email client with the message pre-compiled so that the user has to carry only sending.
There are at least a couple of methods:

1. Yo can use the command mailto with the attachment parameter:
From a command prompt (click Start | Run, then type cmd and press enter) you can launch the default email client through a mailto hyperlink.
Please note that NOT all Email Clients support the parameter for attachments (such as Thunderbird does not accept it).
mailto:me@example.com?Subject=Hi&Body=See+attached+file&Attach="C:\readme.pdf" 

2. Or You can use SendToVB a small free command line utility software that allows you to send email with attachments by a programmed way using the default email client! SendToVb is compatible with ALL Client (Thunderbird included). Here is the screen that summarizes the commands and options available:
SendToVB command and options available

You can use the software with Windows command prompt.
The syntax is simple:
SendToVB -files <attachment file1> -body <text of mail> -to <email address> -subject <content>

Example:
SendToVB -file c:\readme.txt -body "Hello here the document for you" -to marc@example.com -subject "Important"

The commands (flags) are:
-files <file1>... <fileN> with which you can send multiple attachments in the same email.
-body <text> which is part of the body of the message enclosed in double quotes (").
-bodytext <bofyfile.txt> that can be used as an alternative to -body when the email must contain a very long message. It allows you to specify the text file that contains the body of the email.
-to <address1>; <address2> with which you can also specify multiple recipients separated by a semicolon (;)
-cc <address1>; <address2> with which one can point in Carbon Copy also multiple recipients separated by a semicolon (;)
-bcc <address1>; <address2> with which one can point in Blind Carbon Copy  even multiple recipients separated by a semicolon (;)
-subject <text> with which you assign the title of the email
-mailto with which to force SendToVB to use the mailto method (instead of the MAPI functions) but that may not work properly when inserting attachments!
All commands (flags) can be abbreviated with the first letter, eg -subject becomes -s



In addition, for those who experience problems with too many parameters and receive the message "command line too long" you can use a second method:

-list <listfile.txt> indicates where the text file that contains a single line with all specified commands to be used for sending mail


SendToVb automatically open your Default Email Client (for example Thunderbird) and compose the email like in Window.


Notes for software developers:

a. Since SendToVB is a small stand-alone tool, it can also be used by third-party software to automate the procedures for sending mail. A hypothetical third-party software written in Visual Basic. NET or C# might contain within it a line of code that calls a shell command within the SendToVB.

For example:

System.Diagnostics.Process.Start ("SendToVB -to you@example.com -file C:\readme.txt");



b. SendToVB is coded in Visual Basic 2005 and requires the installation of .NET Framework 2.0 runtime which is often already installed on new PCs. Internally it automatically uses MAPI functions when it have to send emails with attachments, and use the command mailto to send email without attachments.

Notes from the Author:



CHANGELOG:
Version 1.2 - Added -cc and -bcc parameters

Version 1.1 - The First !

[LINK] SendToVB is available here for download 

2011/10/12

E-Virus (Part III): I have a PC infected! Now as I clean it?

After confirming the presence of one or more e-virus on your PC,



... you should read up as much as possible about the characteristics of those viruses that are present (mode of distribution, payload, removal instructions). If you know your enemy it's easier to defeat him! 


In fact, if you know the name of the virus and how it is dangerous, it is possible to find a specific removal tool freely available from software companies like: Symantec, Kaspersky, McAfee, TrendMicro, etc.. 
For example, there are removal tools for the most common viruses such as: Melissa , Bagle , MyDoom, Sasser , Conficker, Zeus, etc.. 

Otherwise, you can use tools to remove general (broad spectrum) such as:
Obviously you can increase the benefits of these products by performing sequentially scanning of the PC by the use of different tools. 

Sometimes however, you might need to do multiple scans with different products but you can not install too many anti-virus simultaneously on the same PC due to speed and compatibility issues. Besides, the sequential installation and removal of different antivirus is a costly and long process, but you can avoid this using free online tools for virus scan and removal offered by some software companies (the only constraint is need to be online to scan).
Here there are some examples of online malware removal tools:
Of course, all these operations are feasible if the virus has not completely compromised  the access to your PC.

If you can't start the operating system then you can use antivirus software from a CD or bootable USB key (Rescue CD). These systems are typically available as .ISO images and you must create a CD / DVD or install it on bootable USB sticks, so you can operate apart from the operating system (Windows / Linux) that is installed on the infected PC . You have only to carefully verify that the BIOS first boot device is selected to the CD or USB external drive.
Some available tools are:
9) COMODO Rescue Disk CD
Once you start the CD you can scan the hard drive and require the deletion / correction of the infected files.

PERSONAL EXPERIENCE:
I have often used some of these tools along with excellent results. In particular ComboFix has been decisive with the most "insidious" viruses
Regarding the now infamous "worm" Conficker - Downadup, I can indicate the presence of specific free removal tools from almost all antivirus manufacturers. Among these however Bitdefender provides also a free removal tool that works on the whole LAN and not only on the individual PC ( Network Downadup Removal Tool ). 
Sometimes even after the virus removal, the operating system is "unstable" because it is partly damaged by the virus itself. In these cases a viable technique, apart from the total re-installation of the O.S., is to go back the System Restore a few days before the virus infection (feature available from Windows XP ).


2011/08/05

E-Virus (Part II): Maybe your PC is infected by an e-virus... how to verify its presence?

Depending upon the operation level of the PC you can work in various ways:

A) You can start the PC and enter your username and password.
In this case you can use some tools:

1) Using the free tool GMER you can both see if a rootkit is present, and disable or remove the indicted service / process (E-virus) from the memory and from the next boot starting process. To recognize the services / processes infected by E-viruses might be useful to look for files with very odd names (eg: rytrewxz.dll). GMER usually marks them in red and / or specifies the (*** hidden ***) attribute which means "file hidden to the user." In case that the message: "WARNING! GMER has found system modification, Which Might Have Been Caused by ROOTKIT activity. Do you want to fully scan your system? " appears, it is evident that GMER has identified a rootkit in the system and ask to start the full scan of your PC.


2) If you simultaneously press the keys CTRL + ALT + DEL and access to the Windows Task Manager you can see all the processes active in the PC memory and identify those that have random names such as those cited in case (1), possibly you can kill ("terminate") them, by temporarily removing them  from the memory.

3) Using the free tool McAfee Stinger you can identify and remove the most common e-VIRUSES. This is an automatic procedure since the tool detects both infections in place (memory files), and infected tracks and files in the analyzed hard drive. The tool shows which kind of many "problems" it could identify and provides eith their eradication.

4) Using the free tool Prevx you can identify both a rootkit either that kind of insidious virus that is installed in the MBR (Master Boot Record) of the hard disk. The free version detects and lists all the E-viruses present in the system but it does not eliminate them. However, it may be useful to detect the name of E-virus that infected your PC or the kind of epidemic in progress.

5) The free service OpenDNS for malware detection is totally automatic. When it detects a suspicious activity, the message  "Malware / Botnet Activity Detected" appears on the control panel of OpenDNS

6) Using the free software "Bitdefender 60-Second Virus Scanner" that precisely in 60 seconds performs a scan of your PC to check for viruses in memory or in "sensitive" areas of the Operating System. It uses cloud technology so you need an internet connection. 


B) If it is NOT possible to boot the system. 
In this case we can use some of the tools described in the following study; 
E-Virus (Part III): I have a PC infected! Now as I clean it?


Insights: 
E-Virus (part I) How to recognize the symptoms of a E-FLU or if your PC has got an E-VIRUS?

2011/07/20

FreeNAS - How to create a network drive free

FreeNAS is a free Linux distribution (specifically is FreeBSD) with which you can transform an old PC into a network drive. For the numerous security features available to you this is more properly a Network Attached Storage (NAS) so it can be used in business.

FreeNAS supports the following file systems NTFS (using NTFS-3G), Ext2, Ext3, ZFS, FAT16, FAT32, UFS and UFS2. Are possible installations with iSCSI and RAID.
The advantage you have with this distribution (in addition to giving a second life to older PCs) is the ease of expansion of hardware features. For example, you can easily increase the capacity of the disks (by adding new hard disk on your PC) or speed of access to the LAN (replacing the 100 Mbit network card with a 1000-Mbit or more), or simply the ease of maintenance (if something fails it is easy to replace it, as they are all standard components and cheap).
Currently the version 8 is coming out. That promises further improvements! As soon as possible I will try to test it!

PERSONAL EXPERIENCE: 
For years I use different PCs with different configurations transformed into FreeNAS, never having encountered any particular problems (in versions 6 and 7). In some cases they are "virtualized" or are virtual PCs (VMware FreeNAS).

See also: NAS4Free: the heir of FreeNAS 0.7, an Open Source Network Disk


STICKIES: notes and colors on desktop

Stickies is a free utility with which you can write reminders on your desktop (the equivalent of colored slip of paper and sticky going to attack anywhere).

Among the notable features the ability to point out: 
1) use different colors for each "package". 
2) use different fonts, sizes, font styles. 
3) store, discard, retrieve, export the package. 
4) include an alarm reminder to show only when appropriate.
5) insert images. 
6) customize the "themes" or "skin" of the leaflets. 

But the feature I like best is the ability to send reminders to other users connected to the same LANFrom the book of STIKIES you can choose to which and to how many users send reminders (with confirmation of receipt).Also you can update in real time the shared address book for all users stickies on the internal network. This enables some scenarios in companies with very large offices or arranged on different floors. For example: "I remember a meeting with my colleague in an office which is 3 floors below me and that is currently busy on the phone? Well then I send him a reminder using stickies!" 
Another feature allows you to send reminders by email

Update: 17-10-2014: Stickies version 8.0b add these new features:

  • Images can be inserted into text stickies
  • Stacks for desktop stickies
  • Friendly name hyperlinks
  • Periodic automatic full backups
  • Properties dialog added for all stickies in all categories
  • Screen grab directly to an image sticky
  • Skin browser dialog
  • Stored sticky category icons
  • Image undo levels can be configured
  • Restore from backup
  • 'Solo' a sticky to work with just that one
  • Option to offset screen position of new stickies to prevent overlap
  • New image editing operations: rotate, greyscale, invert, flip, mirror, border, blur, jitter, flood fill, border
  • Configurable tab stops
  • Feature to move data file location
  • Save image stickies as JPG
  • Show recurring parent
  • Default note content files for text and image notes


[LINK] Stickies

PERSONAL EXPERIENCE:
I use this software since version 5 (now we are at 7.1a), I'm excited and I think it useful to write reminders for myself and for other office users.
In one company than I knowm it is used "heavy" side by side with the utility "sticky server" that manages the shared address book for all users on the LAN.

OpenDNS - Replacement for improving DNS performance and security

OpenDNS is a free site that provides its own DNS (Domain Name Services) for resolving Internet names into IP addresses. 

The advantages are: 
1) Provides a faster navigation of Web sites. 
2) Identify fraudulent websites (phishing) and allows you to surf the Web safely. 
3) Corrects typos of Web sites identifying the correct site that you would like to visit. 

The operation to perform, to access the service, is to replace the primary and secondary DNS provided by your Internet provider with those of OpenDNS: 
1° DNS = 208.67.222.222
2° DNS = 208.67.220.220
In addition, by registering on the site and adding its own static IP address to the control panel you can perform additional tasks such as: 
4) to receive daily statistics on sites visited or the amount of traffic generated. 
5) receive reports on malware in your PC network (when the E-virus visit suspicious sites on the control panel appears written Malware / Botnet Activity Detected). 
6) prevent access to specific sites or categories of sites (such as games, social networking, sites for adults) by adopting the so-called "parental control". 

OpenDNS is also suitable for companies or in places where there is a LAN with many PCs that access the Internet through a single connection. In this case it is better to configure your Internet router (and not the individual PC) by entering the DNS of OpenDNS
For those who use Zeroshell as a router, here is the page explaining the steps to follow: http://www.zeroshell.net/opendns/ 
There is also a paid version that provides more advanced services and features. You can also install software to use OpenDNS even if you do not have a static IP address (such as happens to those who use not permanently internet connections).

PERSONAL EXPERIENCE:
I found this service very useful in business in order to prevent user access to entire categories of websites that are NOT of STRICTLY BUSINESS interest. In addition, the function of malware signaling was useful to discover the presence of viruses that even the antivirus on the PC were not able to find out! 

Zeroshell: an Italian Router - Firewall - Bridge

Zeroshell is an Italian free Linux distribution that can be installed on a standard PC and that provides the main network services a LAN normally requires (routers, bridges, Firewall, VPN, HTTP proxy, captive portal, etc..)



It is available in Live CD or Compact Flash image and you can configure and administer it via a web browser.
Anyone with a little familiarity with such hardware can reuse an old obsolete PC and turn it into the router (all at no cost!).

Among the many features provided by this tool I found very interesting:
1) The Net Balancer that can operate in two modes a) "Load Balancing and Failover" where the requests for access to the Internet are balanced automatically and in proportion to the weight of each gateway and, in the event of failure of one gateway, this is excluded from the Automatic balance  b) "Failover" only one link is active at a time (the one with highest weight among those who are not in the state of Fault). The others are in the state of Spare, ready to attend in case of interruption of the active link.

2) the Virtual Private Network (LAN-to-LAN),  the ability to create links encrypted (permanent and automatic) over networks points that are geographically dispersed (using Internet).

Updates:
July 15, 2014Zeroshell 3.1.0 is available. This new release improves the stability of the system and corrects many bugs. Among the new features, there are some nice additions such as:
  • The Installation Manager that allows you to install Zeroshell in an easy way, starting from the ISO/USB image or from an already running installation.
  • The Weighted Bonding used to distribute traffic proportionally to the capacity of the interfaces that are part of the bond.
  • The Monitoring and e-Mail/SMS Alerts Suite that warns you or a team of people to the occurrence of an event. The list of events can be extended with custom event handlers.
  • The CNTop Utility which shows the top list of the hosts with the highest number of connections. This is very useful if a DDoS is taking place to discover the IP address causing the problem.
Among other things, the Captive portal has been improved with a special tuning and now can handle many more simultaneous users.
If you already have the release 3.0.0 installed and the repository access enabled you can automatically upgrade to Zeroshell 3.1.0 without losing the configuration just by clicking on the package 53100. Do not forget instead, that if you are planning to use the Installation Manager all data on the target disk will be destroyed so you have to backup the profile and then restore it on the new release.
May 10, 2014Monitoring and e-Mail/SMS Alerts Suite is a new component that enable Zeroshell to keep under control some critical Events that could occur. To each event is assigned a Severity Level based on which the Recipients of eMail and SMS alerts are selected. The Severity Levels are: Info, Warning, Critical and Emergency.
This package is available for Zeroshell 3.0.0 as New Feature and is very reccomended in a production environment where some critical events may have to be handled very quickly.
January 25, 2014A new procedure to easily install Zeroshell on disk is available as New Feature for the release 3.0.0. The Install Manager automatically resize the profile partition to use the entire disk space. Keep in mind that in a production environment, you should always prefer the installed version of Zeroshell because faster and more reliable than the Live CD version.
Please read the page http://www.zeroshell.org/installation-manager for more details.
January 13, 2014The Weighted Bonding has been implented for Zeroshell 3.0.0 as new feature. Using the Weighted Bonding you can distribute traffic proportionally to the capacity of the interfaces that are part of the bond. Before the introduction of this feature, the traffic distribution was made by a simple Round-Robin load balancing that treated the interfaces in a uniform manner regardless of the actual available bandwidth on each of them. The direct consequence of this was that you could benefit from bonding only if the lines merged had a similar capacity . You could see that adding an ADSL line from 2Mb/s to a 7Mb/s one resulted in a bandwidth closed to 4Mbit/s. Far from the expeted 9Mb/s bandwidth.
Now with the Weighted Bonding, by assigning to the first ADSL line a weight of 2 and to the second one a weight equal to 7, you could see a bandwidth aggregation very close to the sum of the two lines members of the bonding.
Note that in the example has been intentionally omitted, for simplicity, to specify that the bonding of WAN lines only makes sense through the VPN bonding and that the weight should be assigned to the Layer 2 VPN interfaces.
January 13, 2014The Weighted Bonding has been implented for Zeroshell 3.0.0 as new feature. Using the Weighted Bonding you can distribute traffic proportionally to the capacity of the interfaces that are part of the bond. Before the introduction of this feature, the traffic distribution was made by a simple Round-Robin load balancing that treated the interfaces in a uniform manner regardless of the actual available bandwidth on each of them. The direct consequence of this was that you could benefit from bonding only if the lines merged had a similar capacity . You could see that adding an ADSL line from 2Mb/s to a 7Mb/s one resulted in a bandwidth closed to 4Mbit/s. Far from the expeted 9Mb/s bandwidth.
Now with the Weighted Bonding, by assigning to the first ADSL line a weight of 2 and to the second one a weight equal to 7, you could see a bandwidth aggregation very close to the sum of the two lines members of the bonding.
Note that in the example has been intentionally omitted, for simplicity, to specify that the bonding of WAN lines only makes sense through the VPN bonding and that the weight should be assigned to the Layer 2 VPN interfaces.
January 2, 2014Zeroshell 3.0.0 includes relevant new features such as the automatic update system that automatically applies security and bug fixes, and allows to upgrade to the next releases. Several bugs have been fixed and the security improved. The MRTG graphs no longer require an activation key to be viewed. There are several kernels optimized for different processors and a kernel compiled with PAE (Physical Address Extension) which allows you to use more than 4GB of RAM.
August 7, 2013With the release 2.0.RC3 of Zeroshell some security issues have been corrected. Specifically, now the DNS works as cache and accepts recursive queries only for local networks if not configured otherwise. Recently, the DNS fully opened are being used to carry out DDoS attacks resulting in bandwidth consumption. For this reason, the migration to 2.0.RC3 is strongly recommended.
No-IP has been added as a provider for dynamic DNS and the recognition of 3G USB modems has been enhanced. You can now disable the virus scan of web pages resulting in improved performance of the transparent proxy on modest hardware.
Several fixes have been applied on the procedure for Backup and Restore of the profiles.
November 21, 2012Zeroshell 2.0.RC2 improves the support for the load balancing and fault tolerance of multiple connections to the Internet. Particularly, this release allows to keep in Standby PPPoE (xDSL) and UMTS/HSDPA connections, activating the PPP protocol only in the event of absence of connectivity from other accesses. These connections are again placed in standby mode when connectivity is recovered from the default accesses. Improved the Failover mechanism with check in Layer 2 as well as with ICMP. Updated the VPN Bonding for bandwidth aggregation and failover of the LAN-to-LAN connections. Fixed several bugs in the system. In particular, it has been solved a problem that caused the freezing of the Captive Portal under high load.
July 25, 2012Zeroshell 2.0.RC1 has a new kernel (3.4.6) that enables a better recognition of the latest hardware. The Wi-Fi section, using the ath9k kernel module, supports the 802.11n standard (thanks to Arth for the contribution for the upgrade of the wifi-manager). The atheling's patch was included to allow to use QoS and network balancing simultaneously. In addition to OpenVPN and IPSec/L2TP you can use PPTP as a VPN protocol for users whose authentication can be delegated also to an external RADIUS. Several bugs were fixed with particular attention to the Captive Portal.

PERSONAL EXPERIENCE: 
I currently use the network load balancing function of Zeroshell with two ADSL balanced connections of different ISPs and different speeds.
On two other Zeroshell I use  a VPN LAN-to-LAN to easily connect a company that has two offices located in different cities using their ADSL connection.


Here are some of the most important features: 

- Balancing and Failover of multiple connections to the Internet; 
- UMTS / HSDPA 3G modem; 
- RADIUS Server 
- Captive Portal 
- Management of QoS (Quality of Service) 
- HTTP Proxy with ClamAV open source antivirus 
- Support for the functionality of the Wireless Access Point Multi SSID using WiFi network cards based on Atheros chipsets. 
- VPN LAN-to-host protocol L2TP/IPsec 
- VPN LAN-to-LAN with Ethernet encapsulation of SSL / TLS tunnel, 
- Router with static and dynamic 
- 802.1d bridge with Spanning Tree 
- Firewall Packet Filter and Stateful Packet Inspection (SPI) 
- Control through Firewall and QoS classification of traffic type P2P file sharing; 
- NAT (Network Address Translation) 
- TCP / UDP port forwarding (PAT) to create Virtual Server 
- Multizone DNS server with automatic management of the Reverse Resolution in-addr.arpa
- Multi subnet DHCP server with the ability to assign IP address based on MAC address of the applicant; 
- 802.1Q Virtual LAN (tagged VLAN) applicable on Ethernet interfaces on LAN-to-LAN VPN, VPN and bonding on the bridge consisting of Ethernet interfaces, VPN, VPN and bonds; 
- PPPoE client to connect to the WAN via ADSL, DSL and cable 
- Dynamic DNS client used to easily reach even when the WAN IP is dynamic. 
- Client Server and NTP (Network Time Protocol); 
- Syslog server for receiving and cataloging the system logs produced by the remote hosts including Unix systems, routers, switches, Wi-Fi access points, network printers and others compatible with the syslog protocol; 
- Kerberos 5 authentication using an integrated KDC and cross-domain authentication; 
- Authorization LDAP, NIS and RADIUS; 
- X.509 Certificate Authority for issuing and managing electronic certificates; 
- Integration between Unix and Windows Active Directory on a single system of authentication and authorization using LDAP and Kerberos 5 cross realm authentication.
© ALL RIGHTS RESERVED

2011/07/14

How to connect 2 PCs at the same monitor or display

There are at least two methods:

The first method of course is to use a graphic display that has 2 video inputs (2 VGA, 2 DVI ,or 1 DVI and 1 VGA).
Take the example of a display that has both VGA and DVI input, and the two computers have graphics cards with different outputs (the first PC with VGA output, the second PC with DVI output).
You can then connect the 2 cables (VGA and DVI) for 2 PCs simultaneously with the same monitor. Then you press the button that changes the "display source" (VGA or DVI) depending on the PC you want to use (see).
Of course this does not solve the problem of having to use double keyboards  and double mouse!
The second method involves the use of a Switch KVM (Keyboard, Video, Mouse), a device that connects a keyboard, a mouse and only a single display, but which has the double output cables ( or triple, etc..) tha connect the PCs to be controlled. The PCs should not be too far apart as the cables are quite short!
They are marketed both mechanical and electronic KVM switch, with different features (VGA, DVI, PS2 or USB keyboard, etc..) also KVM Switch exist for more than two PCs.

PERSONAL EXPERIENCE:
In the first case, the test was done for example with a Samsung SyncMaster 2243WM that has one entry VGA and one DVI, and it works!
In the second case currently I use a KVM switch (mechanical) that allows the use of one keyboard (PS2), one mouse (PS2) and a single display (VGA) connected to 2 PCs.

2011/01/13

E-Virus (part I) How to recognize the symptoms of a E-FLU or if your PC has got an E-VIRUS?

E-FLU (Electronic Fluence) and / or E-VIRUS (Electronic Virus) gather all the endless series of softwares that infect the PC by self-replicating and / or consuming its resources (i.e.: malwares, trojan horses, backdoors, spywares, rootkits, dialers, worms, viruses, etc.). 

HOW TO RECOGNIZE THE SYMPTOMS? 
1) The PC is unexpectedly slow: suddenly the speed of execution of any application, even the most banal, it slows down quite sharply. In parallel we see that the hard drive is still active (the LED is constantly lit). The feedback of the mouse or of the keyboard could be slowed. 
2) Problems with the browser: the browser's home page (Internet Explorer, Firefox, Chrome, Opera, etc..) has changed and is pointing to illegal Web sites, or, by opening the browser many pop-up windows appear and replicate indefinitely. 
3) Internet is too slow: suddenly, surfing the Internet has slowed down. 
4) The PC is inoperable: The computer starts but stops immediately with messages like "missing operating system" or "could not find command.com". The PC frequently restarts randomly and unexpectedly. 
5) Modified files: Some files, especially those with the extension. ".exe", ".com", ".dll" have been changed and are larger than usual. The hard drive space has been significantly reduced and / or many new files with unlikely names (such as: yutuewyt.dll, 823746.dll, wuyetur.dll) have appeared. 
6) The antivirus is down: The antivirus will not start functioning as usual and you can not re-install it or install a different one. In some cases you can not even reach the website of the leading antivirus vendors. 
7) New Softwares: new softwares that you have never installed, appear on your desktop or on the tray bar. 

These symptoms, taken individually, do not give you the certainty of the presence of an e-virus in your PC, but they can instill you doubts. Of course, if the symptoms are more than one, the probability of being in presence of an e-virus increases.


More inside: E-Virus (Part II): Maybe your PC is infected by an e-virus... how to verify its presence?


Versione Italiana di questo articolo:
 "E-virus (parte I): Come riconoscere i sintomi di un E-INFLUENZA ovvero quando il nostro PC si è preso un E-VIRUS?"