This guide is intended to highlight the suspicious file named “Ndisuio.sys” that appears to control the 802.11 Wi-Fi interface on most Windows XP computer systems. It has come to my attention that when this file is active, there is a significant amount of traffic over the Local Area Network. Upon disabling the file, the amount of network traffic was almost halved! Also, after researching this system service on various BBS and forums, a discovery was made that this file was sending packets of unknown information to websites such as “Verizon.com”, “Microsoft.com” and even “Comcast.com”. Why would this file need to be sending information about the usage of my system to these people? This system file is loaded on Windows boot but can be disabled. Read below to find out how you can disable one of Microsoft’s many “suspicious” files.

The first thing you will need to do in order to disable this rather “curious” file, is click on the “Start” button and then open “Control Panel”. Once you have opened “Control Panel”, click the “Classic View” hyperlink on the left-hand side of the page if you haven’t done so previously.

 

Now, you will need to double-click the “Administrative Tools” icon and then select the “Services” shortcut. If you are not administrator then the following steps may not work, so be sure that you have administrator login details before proceeding. The Services Window should appear like so:

Finding the suspicious file 

 

Once you have accessed the “Services” shortcut and the “Services” window has opened you will need to scroll down to near the bottom of the list an find the text “Wireless Zero Configuration”. The text you need to find is highlighted in the image above.

 

You need to now double-click the “Wireless Zero Configuration” text to open the system process’s properties dialogue. The dialogue should look like this:

Wifi process dialogue window

 

All you need to do now is select “Disabled” from the drop-down box next to the text “Startup type:” and then click “Apply”. Once you have done this the final step is to click “OK”. You’re done, now whoever was at the other end listening will have a hard time listening now.

Be sure to send the link to this guide to everybody you know who uses their computer to store sensitive information, so that they to can avoid the rogues watching your activities. Enjoy your newfound Windows XP security knowledge.

Advertisements