SECURE YOUR WINDOWS STARTUP
RegRun II is easy to use, and is helpful to those who are exposed to
sources of viruses and trojans (e.g. Internet surfers, E-mail
recipients, those who buy "safe" software on CD's, or those who receive data
on floppy disks), and for the experienced users who need to adjust their
startup configurations.
This extraordinary software consists of eight sub-systems which work together to provide exceptional control over programs that load from the registry, Windows system files, downloads, or user selection. By closely tracking and managing all processes, RegRun II can effectively detect hidden trojan horses, viruses, or other unauthorized programs. RegRun II begins its activity before startup other programs, analyzes the Windows registry and initialization files, and warns the user if any changes occurred. The user can prevent unwanted programs from loading, choose his own startup profile, or debug the startup process using a "sanitized" startup of Windows.
RegRun II is especially designed for the newest Microsoft Windows platforms: Windows ME and Windows 2000, and use their powerful resources.
RegRun II is active from startup through shutdown, and sequentially utilizes eight
subgroups of programs:
"SECURE START". Active before Windows starts up, Secure Start:
- Analyzes the Windows registry, initialization files and warns the user if any changes occurred. Secure Start is activated BEFORE Windows startup, during the DOS (autoexec.bat) phase.
- Uniquely allows advanced users to change the startup managers before utilization. This option is particularly valuable to those who want to deactivate a troublesome program after a crash . Experienced users can use RegRun II at this point during restart, instead of going up in Safe mode, using Win configuration manager, then rebooting again. This saves a lot of time.
- Provides optional password protection early in the boot up process, protecting windows and DOS.
"START CONTROL" - Analyzes the startup managers, and warns the user if any changes occurred since your last check. Provides an unusually friendly interface to users, who can easily and quickly provide detailed information about; suspend, resume, alter, or delete any of the programs within the startup managers. Start Control can also restore badly damaged or altered files to the previous condition. Start Control works on Windows 95,98 and Windows NT.
"STARTUP PROFILER" - Creates a special designed file, called startup profile, that contains all startup information. The user may create own profiles and restore them in WINDOWS and DOS. "STARTUP PROFILER" has a unique feature for startup troubleshooting - "Clean Boot". Using the "Clean Boot", user will boot in really clean Windows.
"WATCH DOG" - Provides silent monitoring of the startup managers during your Windows working session. Watchdog may be configured to check the startup managers at Windows startup, Windows shutdown, and as recurrent check with specified time interval. If one of these scans detects a change, you are notified with a popup window and a start up of Start Control, along with the option to restore the affected file. Watch Dog operates only in the Windows mode.
"ANTIVIRUS MONITORING"
This is not signature scanning, but rather "infection scanning". During the session, RegRun II opens and monitors a number of "bait" program and macro files which are vulnerable to infection by any active virus. If any of these files change, RegRun II will advise you, and facilitate your communication with your antivirus supplier by providing you before and after samples.
"PROCESS CONTROL" allows to analyze and control the all processes and
modules that are running on computer.
"FILE PROTECTION" - is one of the most useful functions serving to protect from viruses, trojans and malfunctioning programs.
"APPLICATION DATABASE" includes the desciption of many often used programs. Watch Dog automatically checks database and detects dangerous programs.
"REGISTRY BOOKMARK" allows instant access to any key in the registry.
Merely copy a registry key to the clipboard, and RegRun II will take you there! The user can create own bookmarks or use the special designed packet for improving performance, Windows enhancement and troubleshooting.
"SYSTEM FILES EDITOR" - Looks like a Microsoft SysEdit but it is more handy and allows you to automatically open your files subset.
RegRun II monitors:
Registry:
HKLM\Software\Microsoft\Windows\CurrentVersion\Run
HKLM\Software\Microsoft\Windows\CurrentVersion\RunEx
HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices
HKCU\Software\Microsoft\Windows\CurrentVersion\RunServices
HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnce
HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnceEx
HKLM\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce
HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce
Others:
StartUp Folder
Common StartUp Folder
Win.ini
Wininit.ini
Winstart.bat
autoexec.bat
config.sys
wininit.ini
system.ini
NT services
VxD & Drivers
We think that each user should have complete control of what is started or not started in his/her system. This program, RegRun II helps you achive this!
RegRun II against Back Orifice 2000
What is Back Orifice?
This is the famous that allows remote operate any computer on a local network or from Internet. On the controlled computer, the program "server" is established which is typically started automatically together with start of Windows. On the controlling computer it is possible to receive complete information about the controlled computer (the information on disks, files, passwords, local network etc) using the trojan program - client. Also it is possible to copy any file, to send a message, to reload the computer, to start any program. Back Orifice is an excellent program for remote operation. But it is typically used for mercenary purposes and to cause you damage.
How it is possible to catch Back Orifice?
Simply to start one file. The file can be disguised under useful. Be careful with start of files of a unknown origin.
Why the traditional ways of protection do not work?
The majority of antiviruses checks only on viruses specifically known to them.
Back Orifice is distributed free-of-charge along with source code. It is therefor easy for create a new version of the program and the antivirus will not find it.
RegRun II uses a large weakness of trojans. The trojan program should automatically be started together with Windows. Otherwise it is not dangerous!
RegRun II with the first start remembers what programs are started automatically and considers these as safe. We recommend you review these programs the first time using RegRun II. After that, any new program that is started will be automatically detected and you will be notified about it.
Read examples of detection the Back Orifice 2000 on the computer with Windows 98 (or Windows 95) and Windows NT in RegRun II documentation.
RegRun II easy detects and terminates trojan "I love you" and all clones.
WatchDog will reveal changes in registry.
Look at the list "Current User Run" and search:
MSKernel32
Win32DLL
Suspend run or delete these entries.
download evaluation version
order