Web browser and a unwanted “startfenster.de” (browser hijacker)

My start conditions : WIN 7, IE 11, Chrome 54.0
If you have “caught” a unwanted addition in your web browser, of type : ” http://www.startfenster.de/suche/ as the homepage”, here is what is to be done :
From “Control Panel” uninstall “Startfenster.de” program, as well as anything else which you have not installed (and what looks suspicious). It can mask itself as a VLC-Updater.
Go through the whole of your PC with a couple of different antivirus/addware/malware softwares, just in case.
I have tried the following :
–+Symantec – except for a few cookies, did not find anything
+++AdwCleaner (link) – found and got rid of my malware, but is specifically for this
–+PlumBytes Anti-malware (link found some additional badies, but sadly must be payed for.
SpyHunter (link) – could not install it.
–+Malwarebytes (link) – must be started as administrator, and you must set your proxy (if you have it). When it starts its phase of “check for updates” takes a looong time. It found some baddies, and full version must be payed for. And free version did not want to delete tha bad things.
Ad-Aware (link) – I have tried with (of course) a free version, but it can not install
+++EmsisoftAntiMalware (link) – can be freely tested for 30 days, must have a proxy defined before it does a update. It detected a backdoor which no other AV saw.
+++HerdProtect (link) – free and in a Cloud, so it is very portable, scans for a very long time. He found a couple of PUPs, and one other startfenster bit!!!
-++IObit Malware Fighter (link) – it will try to set you up with a DashLane SW for passwords, so take care ;-), has a free and Pro version (BitDefender goes only with the Pro version). It scanned for a long time (over night) and found two more Trojans.

Only when you scan with all the above, will you see what baddies you got 🙂
After the whole rigmarole, restart is a must.

How to clean up your browsers :
IE 11
1. Go to “Internet options”
2. Go to “Options”
3. Click on “Manage Add-ons”
4. Put your provider as default.
If your provider is not on the list, go to link and add it.
5. Delete ALL from browser history : history/cache/cookies/etc.
Link1 and link2 for the lists I followed.
Google Chrome
Remove unwanted search engines.
Delete all from browser history/cache/cookies/etc.
Put about:blank as your start page.
Remove unwanted add-ons

Good link about startfenster. But do not click on YAC for its removal, it is not a good one (link).
Some more good sites : link1 and link2.

PUP – potentially unwanted program

Posted in WIN | Tagged , , | Leave a comment

SQL queries

I am starting to work a bit with MS SQL.
Up until now all I have done were some small MySQL queries.
Good link for beginners, like me.
A few things to begin with :
SQL stands for Structured Query Language
SQL lets you access and manipulate databases
SQL is an ANSI (American National Standards Institute) standard
SQL keywords are NOT case sensitive
Some of The Most Important SQL Commands :
SELECT – extracts data from a database
UPDATE – updates data in a database
DELETE – deletes data from a database
INSERT INTO – inserts new data into a database
CREATE DATABASE – creates a new database
ALTER DATABASE – modifies a database
CREATE TABLE – creates a new table
ALTER TABLE – modifies a table
DROP TABLE – deletes a table
CREATE INDEX – creates an index (search key)
DROP INDEX – deletes an index
A regular form for a SQL query :
SELECT column_name1,column_name2 FROM table_name;
SELECT DISTINCT column_name,column_name FROM table_name;
In this case we are seeking a unique combination of both columns.
SELECT column_name,column_name FROM table_name WHERE column_name operator value;
And “WHERE” clause may be for any of the values from named columns :
select distinct Name,Surname,FatherName from dbo.EMPLOYEES where Name=’VESNA’;
Operators and their descriptions :
= Equal
<> Not equal. Note: In some versions of SQL this operator may be written as !=
> Greater than
< Less than >= Greater than or equal
<= Less than or equal
BETWEEN Between an inclusive range
LIKE Search for a pattern
IN To specify multiple possible values for a column
The AND operator displays a record if both the first condition AND the second condition are true.
The OR operator displays a record if either the first condition OR the second condition is true.
SELECT column_name, column_name FROM table_name ORDER BY column_name ASC|DESC, column_name ASC|DESC;
How to connect two tables from the same database, and show values from both, all in one query :
Tables are : Orders i Customers, and columns Orders.CustomerID i Customers.CustomerID are the same in both tables, and they are used to tie the tables together.
Query :
SELECT Orders.OrderID, Customers.CustomerName, Orders.OrderDate
FROM Orders
INNER JOIN Customers
ON Orders.CustomerID=Customers.CustomerID;
SQL joins are used to combine rows from two or more tables.
WildCards :
% A substitute for zero or more characters – used only with LIKE, not with =!!!!
_ A substitute for a single character – used only with LIKE, not with =!!!!
[charlist] Sets and ranges of characters to match
[^charlist] or [!charlist] Matches only a character NOT specified within the brackets
Connecting data from tables
An SQL JOIN clause is used to combine rows from two or more tables, based on a common field between them.
The most common type of join is: SQL INNER JOIN (simple join). An SQL INNER JOIN returns all rows from multiple tables where the join condition is met (link).
The INNER JOIN keyword selects all rows from both tables as long as there is a match between the columns in both tables.
The LEFT JOIN keyword returns all rows from the left table (table1), with the matching rows in the right table (table2). The result is NULL in the right side when there is no match.
The RIGHT JOIN keyword returns all rows from the right table (table2), with the matching rows in the left table (table1). The result is NULL in the left side when there is no match.
The FULL OUTER JOIN keyword returns all rows from the left table (table1) and from the right table (table2).
The FULL OUTER JOIN keyword combines the result of both LEFT and RIGHT joins.
Visually (taken from odavde) :

Posted in WIN | Tagged , | Leave a comment

Carrot cake

Ohh yes, and it turned out great!
Dough :
4 whole eggs
2 cups of flour
2 cups of sugar
1/2 cups of sunflower oil
grated carrot (I put about 1/2kg)
1 backing powder
100gr of raisins
2/3 cup of cut walnut
1 soup spoon of cinnamon
a bit of nutmeg (in powdered form, of course)

Bake in a oiled casserole, in a preheated oven, at 180C.
And here it is :
I added a chocolate topping (100gr of chocolate for backing, 100gr of margarine and 2 packets of vanilla sugar) :
Topping pour on a cake that is hot from the oven, and which you have already cut up, so that topping gets into the cake 😉

Posted in Kitchen | Tagged , | Leave a comment

Oracle > 10g, DBs in general – notes

A database schema (ERD) is the skeleton structure that represents the logical view of the entire database. It defines how the data is organized and how the relations among them are associated. It formulates all the constraints that are to be applied on the data.
It’s the database designers who design the schema to help programmers understand the database and make it useful.
Database schema is the skeleton of database, and it does not contain ANY DATA.
A database instance is a state of operational database with data at any given time. It contains a snapshot of the database.
A table typically has a column or combination of columns that contain values that uniquely identify each row in the table. This column, or columns, is called the primary key (PK) of the table and enforces the entity integrity of the table. A table can contain only one primary key constraint.
A foreign key (FK) is a column or combination of columns that is used to establish and enforce a link between the data in two tables. A FOREIGN KEY in one table points to a PRIMARY KEY in another table. The FOREIGN KEY constraint is used to prevent actions that would destroy links between tables.
Some abbreviations :
DBMS – Database Management System
Oracle CC > 10g has extra licenses for added packages, and users should note which ones they need. Also : in Standard Edition or Standard Edition One there are no management packs. These can be purchased only with the Enterprise Edition.
Also : licensing is considered on a CPU basis.
Some things that seem interesting (to me, at least) :
Oracle Diagnostics Pack provides automatic performance diagnostic and advanced system monitoring functionality. It includes :
Automatic Database Diagnostic Monitor (ADDM) – An automated tool that focuses on the database’s most intensive operations, drilling down into the performance to proactively determine root cause.
Automatic Workload Repository (AWR) – A repository that collects statistics at predetermined intervals on the workloads within the database. The AWR provides an historical reference for performance changes over time, including establishment of performance baselines, and adds great value to the capacity planning process.
Active Session History (ASH) – A key component of AWR, ASH samples session activity every second and stores it in views, replacing the need for more manual utilities such as SQL trace. DBAs typically use the v$active_session_history view to isolate performance problems with individual database sessions.
Data Dictionary Views – With some exceptions, data dictionary views beginning with dba_addm, dba_hist or dba_advisor are part of these management packs, and accessing them trigger a licensing event.
Oracle Tuning Pack provides database administrators with expert performance management for the Oracle environment, including SQL tuning and storage optimizations. Oracle Diagnostics Pack is a prerequisite product to Oracle Tuning Pack.
It includes :
SQL Access Advisor – Advice on how to optimize schema design in order to maximize query performance. This feature takes input from a variety of sources, including AWR, to analyze a workload and provides recommendations on index creation and deletion, partition creation, and materialized views creation.
SQL Tuning Advisor – Statistics analysis, SQL profiling, and access path analysis with recommendations on how to optimize SQL. There is also an automatic mode that allows the database to automatically implement recommendations for conditions in which at least a three-fold improvement would result.
Real-Time SQL Monitoring – The most frequent use of Tuning Pack is typically real-time SQL monitoring. If a production environment experiences a performance issue, this is the only way for a DBA to determine what SQL statements are running while the problem is occurring.
Data Dictionary Views – Access to the sql_monitor, and sql_plan_monitor views require Tuning Pack licenses.


Posted in Unix | Tagged , , | Leave a comment

Oracle 13 + Solaris, some notes

Oracle Solaris is optimized on both SPARC and x86 systems.
Processors in the x86 family are based on the CISC (Complex Instruction Set Computers) architecture, while the SPARC (Scalable Processor Architecture) processor is based on the RISC (Reduced Instruction Set Computers) architecture philosophy.
A CISC processor uses more complex instructions, which can take multiple CPU cycles to complete, to perform operations.
A RISC processor uses more simplified instructions that can be executed in a single CPU cycle. The RISC architecture is therefore built for speed.
RISC is also much easier and more effective to implement as a multi-threaded/multi-core architecture than CISC because each thread and core is simpler and requires fewer resources, both in silicon and within the OS.
Things that are specific for Solaris 11 :
SMF – Service Management Framework – Basically a replacement for init scripts
Projects – Resource controls
Zones – Kernel level virtual machines
ZFS – Volume manager/Pooled storage and file system all rolled into one
DTrace – Kernel/User debugging/monitoring utility
Oracle Solaris communicates with peripheral devices through device files or drivers. A “device driver” is a low-level program that allows the kernel to communicate with a specific piece of hardware. The driver serves as the OS’s “interpreter” for that piece of hardware.
If a driver is not loaded for a particular peripheral device, that device is not functional.

Posted in Unix | Tagged , | Leave a comment

CSI abbrevations

Or the ITIL Continual Service Improvement (CSI).
I have passed the ITIL SOA test 😉 (38/40!!!!!), and now onwards to the next one.
Since CSI has new words/terms/abbreviations, here are some of the most important ones :
Service dashboard – A graphical representation of overall IT service performance and availability. Gives data in real time.
The balanced scorecard is a strategic planning and management system that is used extensively in business and industry, government, and nonprofit organizations worldwide to align business activities to the vision and strategy of the organization, improve internal and external communications, and monitor organization performance against strategic goals.
This is always in the picture :
Process : a structured set of activities designed to accomplish a specific objective. A process takes one or more defined inputs and turns them into defined outputs.
Organizational culture : a set of shared values and norms that control the service provider`s interaction with stakeholders (customers, users, suppliers, staff etc).
Governance – the single overarching area that ties IT and the business together.
Governance is what defines the common directions, policies and rules that both the business and IT use to conduct business.
Governance ensures that policies and strategy are actually implemented, and that required processes are correctly followed.
A system – is a number of related things that work together to achieve an overall objective.
Key components of the system are the structure and processes that work together.
IT governance – a part of an organization’s corporate governance
The CSI manager is the chief advocate and owns all CSI issues.
These definitions were here from earlier exams, but bear repeating :
Data – a collection of facts
Information – the result of processing and organizing data in a way that adds to the knowledge of the person receiving it
Knowledge – information combined with experience, context, interpretation and reflection
Wisdom – the ability to make correct judgements and decisions
Assessments are the formal mechanisms for comparing the operational process environment
to the performance standards for the purpose of measuring improved process capability and/or to identify potential shortcomings that could be addressed.
Benchmarking is a specific type of assessment and is a process used in management, particularly strategic management, in which organizations evaluate various aspects of their processes in relation to best practice, usually within their own sector. It is used to compare performance between different organizations – or different units within a single organization – undertaking similar processes.
Metric is a scale of measurement defined in terms of a standard.
Metrics define what is to be measured.
And abbreviations themselves :
ad hoc – made/done for this situation only/for this case only
AMIS – availability management information system
BCM – business continuity management
BMP – best management practice
CFIA – component failure impact analysis
CMIS – capacity management information system
CMS – configuration management system
Downtime – time to restore service
ERP – enterprise resource planning
FTA – fault tree analysis
MTBF – mean time between failures
MTRS – mean time to restore
PIR – post implementation review
PSO – projected service outage
ROI – return on investment
SaaS – software as service
SBU – strategic business unit
SFA – service failure analysis
SIP – service improvement plan
SMART – specific, measurable, achievable, relevant and time-bound
SMS – service management system
TCO – total cost of ownership
TO – technical observation
TQM – total quality management
Uptime – time between failures
VOI – value on investment
YDT – Year to date, the period beginning at the start of the calendar year up to the current date.

Posted in ITIL | Tagged , | Leave a comment


Nice dumplings which may be combined with meat (chicken, burger…..), and you may add ketchup, cheese, mayo, sour cream, ajvar…..

Dough :
4 whole eggs
2 soup spoons of margarine
salt per taste
a bit of garlic
1dl of yogurt
1 tea spoon of dill (finely chopped)
1 tea spoon of parsley (finely chopped)
2 soup spoons of young white cheese
flour as needed, to get thicker dough

Dip a half-full soup spoon in boiling water. Use fork to pick dumplings up, when they float to the surface.
When all are done, put a bit of oil on them (so as not to stick) and a bit of finely chopped chive.

Posted in Kitchen | Tagged | Leave a comment

Crochet 54 : a small pelerine

I saw a beautiful pattern, and could not resist 😉
Not yet finished!
Patter I used :
Almost finished :
And finished, from front and back :

Posted in Relaxation | Tagged , | Leave a comment


I wanted waffles, so I made them 😉

Dough :
4 whole eggs
1 backing powder
2 soup spoons of fat (margarine could also be used)
1dl yoghurt
1 soup spoon of cinnamon
a bit of grinded nutmeg
sugar per taste (try the dough if it is sweet enough)
flour as needed, to get good thick dough

I made them in a waffle-maker, on max temperature :

Posted in Kitchen | Tagged | Leave a comment

Internet Explorer 11 and user+pass combo

What if I had changed a user+pass for some site_ Or if previously I did not want IE to remember them, but now I do?
Note : this (remembering user+pass for sites) is VEY unsafe, and I personally do it ONLY for testing purposes
There are a number of ways :
1. Start from the beginning
This is when you have only a few combos remembered
Open Internet Explorer
Click Tools, and then click Delete Browsing History.
In Delete Browsing History, click all
The next time you visit the site, it will ask again!

Posted in WIN | Leave a comment