Microsoft Outlook Auto Complete

What is email address auto complete?

When an email address is configured in Microsoft Outlook, All the email addresses from the composed emails will be stored in .NK2 (Auto Complete List File). When you compose the email to same recipient again, the email address will automatically appear by typing few initial characters in the email address.

Where it is located in the computer?

Windows XP
Drive:\Documents and Settings\Username\Application Data\Microsoft\Outlook

Windows Vista and later versions

Why should i back it up?

When you migrate to a new computer or move the outlook to another computer, you need .NK2 file to have your auto complete list to appear

How to backup .NK2 file?

Go to the file location select the file copy and paste it in your backup media

How to restore .Nk2 file?

You need the file only when you change your computer or move the outlook to a new computer. Once outlook is configured in the new computer, copy and paste the .NK2 file from the backup media into its location

CryptoLocker Virus

What is CryptoLockerVirus

CryptoLocker is a ransomware trojan which targets computers running Microsoft Windows, When activated, the malware encrypts certain types of files stored on local and mounted network drives using RSA public-key cryptography, with the private key stored only on the malware’s control servers. The malware then displays a message which offers to decrypt the data if a payment (through either Bitcoin or a pre-paid voucher) is made by a stated deadline, and threatens to delete the private key if the deadline passes. If the deadline is not met, the malware offers to decrypt data via an online service provided by the malware’s operators, for a significantly higher price in Bitcoin.

Source of Attack

Main source of attack is through spam emails that use social engineering tactics to try and entice opening of the attached zip file.


The severity is very high. If files are encrypted by Cryptolocker and you do not have a backup of the files, it is likely that the files are lost.


Follow information security best practices and always backup your files. Keep your systems up to date with the latest virus definitions and software patches. Refrain from opening any suspicious unsolicited emails.