Sunday, June 30, 2013

Another discovery....


While sorting out another little problem, I came across a prolonged forum rant
about Generic Credentials and something called 'Virtualapp/Didlogical' in there with a cryptic unfamiliar password, enabling something or someone to do things to your files and folders. There was a long argument going on about whether or not this was planted by Microsoft to enable Windows Live features, like Mail and etc., but they never did seem to resolve that conclusively.

I found that same item in the Credentials Manager of my other PC, and noticed
that while it was there, my CPU activity was bouncing up and down at about 38% of full scale while I was doing absolutely nothing on the computer. And that, Dear Reader, has got to be suspicious. Microsoft created this system, so why would they have to plant a secret user file with generic credentials to make something work in it? That doesn't make any sense to me. 

So I checked this computer, which has just had both its operating systems installed within the past couple of days. I looked at the Windows 7 on here, 
specifically Control Panel -> Credentials Manager -> Generic Credentials and there's sweet essence of nothing in that section of it at all - zero - zip! And the CPU on this rig isn't bouncing up and down with constant activity at about an average of 38 to 40%. It's quite peaceful and happy at around 8% or 9% or even down as low as 4% or 5% even as I write this.

So the logical conclusion is that if you've got something in your Generic Credentials section of Credentials Manager, you've got a problem, and you'd better go in there, and highlight whatever it calls itself, and shred it or delete it.
You'll notice an immediate change in the amount of activity of your CPU, and that's got to be telling us something, because everything works very well without anything in that Generic Credentials section. It's your computer, and there shouldn't be any secret credentials for an unknown user in there. So please check yours to see what's what. This could explain how hackers get into our computers and where they start once inside.

No comments:

Post a Comment