Blackmail Trojans Attack

Posted in , , , | Posted on 5:45 PM Bookmark and Share

0

A harmful virus is currently in circulation that disconnects computers from the Internet and only releases the connection again after a code has been entered that can only be obtained from an expensive premium SMS service. Avira has been aware of the malware for some time and protects its users accordingly.

The blackmail Trojan currently being reported by the media is disguised as an installation program for a download manager. If a user runs the program, however, all he will see is a message in Russian claiming he has violated the conditions for use. The malware then blocks the computer’s Internet connection and requires the user to obtain a release code using a costly premium SMS service.

Spyware Doctor 2010 7.0.0.508 + Patch

Posted in , , , | Posted on 1:13 AM Bookmark and Share

0

Spyware Doctor provides three-way spyware protection for your PC through real-time threat blocking, advanced system scanning and immunization against known browser infections. Spyware Doctor is a multi-award winning spyware removal utility that detects, removes and protects your PC from thousands of potential spyware, adware, Trojans, keyloggers, spybots and tracking thrats. Protect your privacy and computing habits from prying eyes and virtual trespassers with the help of Spyware Doctor.

Anti-virus software and firewalls do not fully protect your system against the majority of spyware and privacy threats. Because spyware is commonly bundled with software downloads, attached to e-mails, or transmitted through networks it can appear to be legitimate software, but once installed it can be nearly impossible to detect and remove without the help of a dedicated spyware removal tool like Spyware Doctor.

Download Kaspersky Internet Security 2010 Cracked

Posted in , , , , , , , | Posted on 11:51 PM Bookmark and Share

0

Kaspersky Internet Security 2010 automatically protects you and your family at all times – whether you work, bank, shop or play online.

Kaspersky Internet Security 2010 has everything you need for a safe and secure Internet experience.

All the features and technologies of Kaspersky Anti-Virus 2010 are included in this product.

Kaspersky Internet Security stops your PC being slowed down by cybercriminals and delivers unsurpassed on-line safety whilst protecting your files, music and photos from hackers:

How to Protect Your Mobile Phone from Viruses?

Posted in , , , , , , | Posted on 5:34 PM Bookmark and Share

0

As mobile phones evolve so too do the malicious software, situations, and perpetrators of such that they can fall prey to. It is imperative that all users of mobile phones remember that other people can and will use your cell phone to invade your privacy and personal space without ever even dialing your mobile phone number.

Because mobile phones have the marvelous talent for keeping a record of all calls made and received, they have become an obvious target for unscrupulous activity. Back in 2006, a number of reports appeared on the internet regarding a company that was marketing a piece of software capable of embedding itself in a mobile phone and remotely transmitting this "call log" to someone else's server.

Getting Trojan Infected Victims

Posted in , , , , , | Posted on 8:40 AM Bookmark and Share

0

There are basically 3 ways for you to attempt to get vic's:
1. Trick them into running the server themselves
2. Physically install the server yourself
3. Scan for vic's already infected

The easiest method is method 3. Use an AOL IP range, and you will find victims almost instantaneously. Most likely you will tire of these victims quickly, as there is no challenge in this method and also no challenge in the victim's themselves (reason being they use AOL, 'nuff said).

The hardest method is method 2. I won't go into details with this method, use your imagination if you attempt this method. Method 1 is the most popular method, and without method 1, method 3 would not be as productive as it is. To use method 1, you need to hide the trojan server in another file and convince the future victim to run this file. To hide the server, you need to use a binder program. I recommend Joiner. Joiner allows you to bind your server to an exe fileor a jpeg.

Joiner is very easy to use; just tell it the 2 files you want to bind and it will leave a copy of the new file in the joiner folder. You may want to use a program such as Microangelo to change the icon of the new file so as not to appear suspicious.

As soon as the future victim runs this file, whether it be a picture or a game, the server will install itself onto their PC without them knowing. Okay, so what happens after the victim runs the file? He gets online, he gets scanned by someone else who connects to him and he is theirs. So all of your efforts are wasted unless you edit the server before binding it. Most of the popular trojans offer an edit server program. Run this program (NEVER run the server itself) to set options such as if you want to be notified by ICQ,IRC or email when the victim gets online, if you want the server to be password protected, and other options to ensure the victim is yours and cannot be claimed by someone else.

One problem with the servers that offer all these options is they are usually pretty large files, meaning it would be almost impossible to bind them with a jpeg and convince someone to actually run it. If you are on ICQ, and someone sends you a pic, but it takes 2 minutes to download, would you run it? This can be solved quite easily. You want to infect the future victim with Sub7.

Sub7's server is fairly large. Go download a tiny trojan like the Thing or MiniCommand. These small trojans don't offer much more than upload, download, and run file capabilities. They are tiny. Bind their server using Joiner to a file and tell Joiner to notify you by ICQ when the victim goes online. Once you are notified, use the client for the Thing or MiniCommand, connect to the server, and upload the Sub7 server. Once you upload the sub7 server, run it. Now you can delete the first mini server and connect with your Sub7 client.(authormg.virtualave.net.)

Microsoft Security Essentials

Posted in , , , , , | Posted on 9:13 PM Bookmark and Share

0

Microsoft Security Essentials provides real-time protection for your home PC that guards against viruses, spyware, and other malicious software.

Microsoft Security Essentials is a free* download from Microsoft that is simple to install, easy to use, and always kept up to date so you can be assured your PC is protected by the latest technology. It’s easy to tell if your PC is secure — when you’re green, you’re good. It’s that simple.

Microsoft Security Essentials runs quietly and efficiently in the background so that you are free to use your Windows-based PC the way you want—without interruptions or long computer wait times.

Download Microsoft Security Essentials for XP | Microsoft Security Essentials for Vista 32bit

The National ID Trojan Horse

Posted in , , , , | Posted on 9:44 PM Bookmark and Share

0

The U.S. House of Representatives passed a national ID bill last week that masqueraded as “immigration reform.” The bill does nothing to address immigration policy, however, nor does it propose deporting a single illegal alien already in our country. It does nothing to address the porous border between the U.S. and Mexico, which is the fundamental problem. In reality, the bill is a Trojan horse. It pretends to offer desperately needed border control in order to con a credulous Congress into sacrificing more of our constitutionally protected liberty.

Supporters claim the national ID scheme is voluntary. However, any state that opts out will automatically make non-persons out of its citizens. The citizens of that state will be unable to have any dealings with the federal government because their ID will not be accepted. They will not be able to fly or to take a train. In essence, in the eyes of the federal government they will cease to exist. It is absurd to call this voluntary, and the proponents of the national ID know that every state will have no choice but to comply.

Federal legislation that nationalizes standards for drivers’ licenses and birth certificates creates a national ID system pure and simple. It is just a matter of time until those who refuse to carry the new licenses will be denied the ability to
drive or board an airplane. Such domestic travel restrictions are the hallmark of authoritarian states, not free republics.

This bill establishes a huge, centrally-coordinated database of highly personal information about American citizens: at a minimum their name, date of birth, place of residence, Social Security number, and physical and possibly other characteristics. The bill even provides for this sensitive information of American citizens to be shared with Canada and Mexico! Imagine a corrupt Mexican official selling thousands of identity files, including Social Security numbers, to criminals!
This legislation gives authority to the Secretary of Homeland Security to expand required information on drivers’ licenses, potentially including such biometric information as retina scans, finger prints, DNA information, and even Radio Frequency Identification (RFID) radio tracking technology. Including such technology as RFID means the federal government, as well as the governments of Canada and Mexico, could know where American citizens are at all times.

What will this mean for us? When this new program is implemented, every time we are required to show our drivers’ license we will, in fact, be showing a national identification card. We will be handing over a card that includes our personal and likely biometric information, information which is connected to a national and international database. This will further degrade our precious privacy, which is the hallmark of a civilized society. As Ayn Rand said, the “Savage’s whole existence is public.” A national ID card will have the same effect as gun control laws: criminals will ignore it, while law abiding people lose freedom. A national ID card offers us nothing more than a false sense of security, while moving us ever closer to a police state. The national ID proposal should die a well-deserved death in the Senate, and it should be denounced as authoritarian and anti-American.

Simple way to removal of Generic.PWS.j Trojan

Posted in , , , , | Posted on 5:40 PM Bookmark and Share

0

You need to download "HiJackThis" tools to assist you in removal of this "hard to die" trojan.

Spent 2 days to study its infection mode before i can successfully killed it off.
It infect USB thumbdrive too.. thus it would infect others via USB mass storage devices..

My approach as followed:
==================
First I "write protect" the infected local drive's autorun files to
point it to a harmless text file.
I wrote a batch file to simplify removal if many PCs was infected
prior to acknowlegement of its existence.

@echo off
cls
if exist c:\autorun.inf attrib -h -a -s -r c:\autorun.inf
if exist d:\autorun.inf attrib -h -a -s -r d:\autorun.inf
if exist e:\autorun.inf attrib -h -a -s -r e:\autorun.inf
if exist f:\autorun.inf attrib -h -a -s -r f:\autorun.inf

REM Replace with harmless autorun.inf
REM ==================================
if exist c:\autorun.inf echo "[autorun]" > c:\autorun.inf
if exist d:\autorun.inf echo "[autorun]" > d:\autorun.inf
if exist e:\autorun.inf echo "[autorun]" > e:\autorun.inf
if exist f:\autorun.inf echo "[autorun]" > f:\autorun.inf

REM Make it read-only to prevent trojan from replacing its own copy.
REM
=============================================================
if exist c:\autorun.inf attrib +r c:\autorun.inf
if exist d:\autorun.inf attrib +r d:\autorun.inf
if exist e:\autorun.inf attrib +r e:\autorun.inf
if exist f:\autorun.inf attrib +r f:\autorun.inf

if exist c:\auto.exe attrib -h -a -s -r c:\auto.exe
if exist d:\auto.exe attrib -h -a -s -r d:\auto.exe
if exist e:\auto.exe attrib -h -a -s -r e:\auto.exe
if exist f:\auto.exe attrib -h -a -s -r f:\auto.exe

if exist c:\auto.exe echo "0"> c:\auto.exe
if exist d:\auto.exe echo "0"> d:\auto.exe
if exist e:\auto.exe echo "0"> e:\auto.exe
if exist f:\auto.exe echo "0"> f:\auto.exe
if exist c:\auto.exe attrib +r c:\auto.exe

if exist d:\auto.exe attrib +r d:\auto.exe
if exist e:\auto.exe attrib +r e:\auto.exe
if exist f:\auto.exe attrib +r f:\auto.exe

Run Hijack this to remove all unwanted trojans related to "Generic.PWS.j" Check the below files to get some ideas which files are related to this trojan.

There may be additional files, and these files are created in series, thus u could include latest *.EXE and *.DLL files found in C:\WINNT (or C:\WINDOWS) with respect
to the timestamp of files below.

"DIR /OD C:\WINNT"
"DIR /OD C:\WINNT\SYSTEM32"

Save this below text file in your local drive before reboot to safe
mode command-line

REM Deletion of the core trojan files:
REM ==================================
c:
cd %windir%
if exist DiskMan32.exe attrib -h -a -s -r DiskMan32.exe
if exist Kvsc3.exe attrib -h -a -s -r Kvsc3.exe
if exist AVPSrv.exe attrib -h -a -s -r AVPSrv.exe
if exist mppds.exe attrib -h -a -s -r mppds.exe
if exist MsIMMs32.exe attrib -h -a -s -r MsIMMs32.exe
if exist NVDispDrv.exe attrib -h -a -s -r NVDispDrv.exe
if exist cmdbcs.exe attrib -h -a -s -r cmdbcs.exe
if exist upxdnd.exe attrib -h -a -s -r upxdnd.exe
if exist DbgHlp32.exe attrib -h -a -s -r DbgHlp32.exe
if exist msccrt.exe attrib -h -a -s -r msccrt.exe
if exist DiskMan32.exe del DiskMan32.exe
if exist Kvsc3.exe del Kvsc3.exe
if exist AVPSrv.exe del AVPSrv.exe
if exist mppds.exe del mppds.exe
if exist MsIMMs32.exe del MsIMMs32.exe
if exist NVDispDrv.exe del NVDispDrv.exe
if exist cmdbcs.exe del cmdbcs.exe
if exist upxdnd.exe del upxdnd.exe
if exist DbgHlp32.exe del DbgHlp32.exe
if exist msccrt.exe del msccrt.exe

c:
cd %windir%
cd system32
if exist mppds.dll attrib -h -a -s -r mppds.dll
if exist upxdnd.dll attrib -h -a -s -r upxdnd.dll
if exist DiskMan32.dll attrib -h -a -s -r DiskMan32.dll
if exist cmdbcs.dll attrib -h -a -s -r cmdbcs.dll
if exist Kvsc3.dll attrib -h -a -s -r Kvsc3.dll
if exist DbgHlp32.dll attrib -h -a -s -r DbgHlp32.dll
if exist AVPSrv.dll attrib -h -a -s -r AVPSrv.dll
if exist MsIMMs32.dll attrib -h -a -s -r MsIMMs32.dll
if exist NVDispDrv.dll attrib -h -a -s -r NVDispDrv.dll
if exist msccrt.dll attrib -h -a -s -r msccrt.dll
if exist mppds.dll del mppds.dll
if exist upxdnd.dll del upxdnd.dll
if exist DiskMan32.dll del DiskMan32.dll
if exist cmdbcs.dll del cmdbcs.dll
if exist Kvsc3.dll del Kvsc3.dll
if exist DbgHlp32.dll del DbgHlp32.dll
if exist AVPSrv.dll del AVPSrv.dll
if exist MsIMMs32.dll del MsIMMs32.dll
if exist NVDispDrv.dll del NVDispDrv.dll
if exist msccrt.dll del msccrt.dll
============================================================

Reboot, and run Hijackthis to check if trojan is active, once cleared, you could safely remove the autorun.inf and auto.exe files.
Hope this helps...
Sharing is Caring...

Download Hijackthis V2.0.2

Does Trojans Vundo Fix Actually Work?

Posted in , , , , | Posted on 8:42 AM Bookmark and Share

0

If you get infected with Trojan Vundo, removal of it often becomes a very difficult
task. You will probably find that a lot of people will suggest that you can get rid of it by downloading and running VundoFix, but does it really work? You might be surprised to learn the truth.

Vundo is one the most common spyware infections making its rounds onto computers all over the world, and it is also one of the most difficult to get rid of. It consists of a Trojan downloader that will download and display popup advertisements over and over again but it has also been known to download and install more malicious files that can cause much more harm to your computer. If you suspect you are infected with this pesky spyware, what should you do?

Many people will tell you (most of which are unqualified to be offering spyware removal advice) that you can do any combination of the following things – install and run Search and Destroy or Ad-Aware, and if that doesn’t fix it there is a tool written specifically to remove Vundo called VundoFix that is supposed to do the trick
if the others fail.

The only problem with this type of advice is that it doesn’t work.
Go ahead and check your favorite spyware forum or group and look and see if anybody has successfully completely removed Vundo using any or all of the above recommendations. I guarantee you will not find one. You will find someone who thinks he may have gotten rid of it, but lab tests have proven time and time again that simple free spyware removers and Vundofix do not completely eliminate this frustrating Trojan downloader because they cannot stay current its dynamic nature -
it is constantly changing and downloading new files so you’ll simply be left fighting
a never ending battle.

What you need is a spyware removal tool that does 2 things:
1. Is proactive in scanning your computer with real time protection
2. Scans your computer against a spyware definitions database that is frequently updated

Using antispyware software that does not incorporate these two crucial features will
only prolong the agony you are experiencing trying to completely rid your computer
of Vundo.

So if you get infected with it or suspect you might be infected with it, remember
that Trojan Vundo removal can be one of the most difficult tasks you partake in,
unless you follow my advice and use a spyware remover with the two features listed
above – you’ll be glad you did.

Use Spyware Doctor and Anti Trojans Elite << Download free + patch

Free Trojan Removers - Download, Scan and Destroy

Posted in , , , , | Posted on 1:02 AM Bookmark and Share

0

What Is A Trojan And How Can Is Ruin Your Pc?
A Trojan (or Trojan Horse) is considered a type of malicious software that appears to a user as a safe legitimate action, but in fact performs a dangerous function that threatens your computer's security. Malicious trojans can be very dangerous.
Trojans can erase your computer's data, corrupt files, install and spread viruses and there are many more security threats.

How Can You Protect Your Computer Against Trojans and other forms of Spyware?
Fortunately there are a great range of effective Trojan/Spyware Removers available that can combat trojans, which are very powerful at cleaning and protecting your
computer from future attacks. We've reviewed a huge range of trojan removers on the market and put them through their paces using an infected test computer loaded with trojans and other forms of malicious spyware.

What is The Most Effective Way to Remove a Trojan?
Adware Alert is obviously the best choice. It detects and eliminates all Trojan Viruses and many other forms of Spyware, Adware and Malware. Adware Alert has regular
updates that continue to protect your computer against future attacks. We were extremely impressed! Thats why we recommend Adware Alert to remove nasty trojan viruses.

Download Adware Alert And Serial key

Report Us

Posted in | Posted on 4:11 AM Bookmark and Share

0

Hello,
Do you have a problem with computer viruses, spam, spyware, malware, trojans, etc.?

Report what is happening here, tell me with details of symptoms and the effects. how to provide comments on the post "Report Us".

And we'll find the best solution may be applied, Thank you.

Virus Thread's Team

Removing Computer Trojans in 3 Quick and Effective Steps

Posted in , , , , | Posted on 9:32 AM Bookmark and Share

0

Removing computer Trojans is not usually achieved easily through a standard anti virus program due to the sneaky way they attach themselves onto your computer. For this reason they are referred to as Trojans (like Trojan Horse). Once these parasites install on your PC, they can be incredibly difficult to remove without a quality repair utility.

Two of the most common ways which Trojans install on computers are through spyware
and adware. Some of the virus programs can detect the files but most have a miserable
time removing them.

Trojans can be noticed through a variety of symptoms. Below are some of the commonones:
1. Files opening on their own
2. Slow computer problems exist
3. You are directed to websites that you did not ask for
4. Your default homepage gets hijacked and is replaced with off-color sites
5. Pop-ups and autoload toolbars are automatically placed on your PC
6. Cursor leaves a trail
7. Buttons such as the Windows start button are invisible
8. Your computer shuts down on its own, or reboots at will
9. Alt + Control + Delete is not responding
10. Your web surfing is incredibly slow

Doing your own computer Trojan removals through the use of articles posted on the web (without software) is not advised if you are not confident about working with executable files. Trojan removal can be completed through the following steps without causing additional problems on your computer.

The Three Steps for the Removal of Computer Trojans:

Step One: Document All of the Problems that You Are Currently Experiencing It is said that 95 percent of the cure is through knowing what the true problems are. By writing down all of the issues that you are currently experiencing, you will give yourself a baseline measure of how well your repair (later steps) addressed the problems you were experiencing.

If your computer is dragging, write down when slow computer problems are the worst for you. For example, if your computer is slowest while using the internet, write that down on your list. Get it all down on paper. You can start with the above symptom list.

Step Two: Complete a Free Scan with a Best Trojan Remover Software There are a variety of great tools to remove computer Trojans effectively for you. The difference is only slight between the top quality products. The top products can perform well across many major categories.

When you are making a decision about software to complete the free scan through,
choose products that are simple to comprehend, one that offers complete help files,
software that provides a huge definitions (solutions) database, and look for solid reviews without a bunch of negative coverage on the internet.

Removal of Trojans, spyware, adware and malware begins with understand the current threats and levels of severity of those threats on your computer. You will then know if a repair is needed immediately.

Step Three: If Severe Threats are Found Invest in the Repair Function of the Software The same software that scanned your computer can be utilized for repair of the system. The download and the scan take the longest in the process, which makes the cleaning of the computer Trojans the most uneventful but important part of the process. Year round maintenance is recommended including a good anti spyware software, Windows registry software, and a good general virus scan. Between these three products, you will greatly reduce performance and security issues on your PC. It is a good practice to scan and repair your system at steady intervals (at least weekly).

To remove spyware, adware, malware, and computer Trojans, look for a product with an extensive definitions database (as mentioned prior). After the repair is complete, restart your computer to ensure that changes have taken place. After rebooting, review your initial list of problems against the changes that you notice on your computer after the repair. If errors still exist, do not hesitate to run the scan and repair again. It also could be good to look into a registry cleaner or general virus scan as added weapons (as mentioned prior). Your computer should be performing like new again after one or two repair rounds.(Daryl Moore)

See also..
Download Antivirus | Anti Trojans | Anti Spyware

Trojan Vundo Removal and Solution

Posted in , , , | Posted on 9:47 PM Bookmark and Share

0

Trojan Vundo Removal
I tried a number of programs, including HijackThis, Trend's online virus scanner, Panda Software's online virus scanner, Symantec's FixVundo.exe and manual instructions and nothing worked! I thought I had it when I ran SpyBot Search and Destroy's software, but it only discovered 4 occurrences of the Vundo when actually there were 6.

Out of all the programs, only Adware Alerts spyware & adware detector and destroyer was able to detect all the infected files! The online virus scan site is located at:
Adware Alert and is a new free services designed to help you detect and keep your computer clean. It's very cool, speeds up your pc and is worth checking out!

Having a full list of objects infected with trojan Vundo, I compared them to the ones discovered by the other antispyware packages and was left with two. Those two
infected objects pointed to c:\windows\help\mui\accas.dll I should note here that Microsoft's Windows Defender was unable to remove the files or detect all infected files.

Trojan Vundo Solution
I found the solution by inserting a Windows XP CD into the drive and booting from it. I then chose the repair option which landed me at a command prompt. From here, I navigated to c:\windows\help\mui\accas.dll and renamed the file. Commands: c: cd\windows\help\mui ren accas.dll accas.old I then rebooted the computer and used Windows Defender to remove the remaining files infected by Vundo which in the end was an easy solution, but nowhere to be found!

I hope this works for you as well and if not, perhaps the process of finding a solution to Vundo will help. If your having problems getting rid of Trojan Vundo
from your Pc, get Adware Alert free Scan and wipe your pc or laptop clean of this nasty virus Adware Alert.

How to prevent your PEN drive from VIRUS

Posted in , , , , | Posted on 5:26 PM Bookmark and Share

0

Friends many of your PC/laptop's normally gets virus because of Pen Drives or USB devices (Even PC's who are not connected to network ). Some Virus like Ravmon Virus , Heap41a worm which are not detected by anti virus normally spreads mostly by the Pen Drives . In such a case what can you do to prevent your PC from getting infected with Virus that spreads through USB devices or Pen Drives ?

You can protect your PC by just following the simple steps below . It won't take much time.

· Connect your Pen Drive or USB drive to your computer .

· Now a dialogue window will popup asking you to choose among the options as shown
in the figure. Don't choose any of them , Just simply click Cancel.

· *Now go to Start--> Run and type cmd to open the Command Prompt window .
· *Now go to My Computer and Check the Drive letter of your USB drive or Pen
Drive
. ( E.g. If it is written Kingston (I:) , then I: will be the drive letter .)
· *In the Command Window ( cmd ) , type the drive letter: and Hit Enter .
· *Now type dir/w/o/a/p and Hit Enter
· *You will get a list of files . In the list , search if anyone of the following do exist
· 1. Autorun.inf
· 2. New Folder.exe
· 3. Bha.vbs
· 4. Iexplore.vbs
· 5. Info.exe
· 6. New_Folder.exe
· 7. Ravmon.exe
· 8. RVHost.exe or any other files with .exe Extension .
·
· If you find any one of the files above , Run the command attrib -h -r -s -a *.* and Hit Enter.
· Now Delete each File using the following Command del filename ( E.g del
autorun.inf ) .
· That's it . Now just scan your USB drive with the anti virus you have to ensure that you made your Pen Drive free of Virus .

This virus is very very common now...
To know whether ur system is infected just type C:\heap41a in the address bar...
if there is a folder named heap41a, then ur system is infected...
(AVAST antivirus is the best solution for this worm...) symantec also works.
(SANDY)

F-Secure Internet Security 2009 9.50 for Windows 7 + Patch

Posted in , , , | Posted on 9:49 AM Bookmark and Share

0

F-Secure Internet Security 2009 provides you with everything that is necessary to protect your computer against the internet threats and viruses that are out there today. This security software offers complete protection against malicious software with many high quality features that will make sure that your computer is up-to-date with the latest virus information and other online threats that arise continuously.

This is especially made possible with its key feature, a new technology, F-Secure DeepGuard 2.0, that will constantly monitor the activities of your computer ensuring complete virus protection also against unknown viruses that are born every day. This software also includes features like award-winning antivirus, easy-to-use personal firewall, an improved antispyware. Additionally, the software filters unwanted and so called phishing attempts from your eMail. With the parental control you can control which websites are accessible from your computer and block the websites with questionable content.

Key Features

* Complete virus protection software against worms and unknown attacks
* Detects and removes spyware from your computer
* Protects your computer against hackers
* Helps you stay free from eMail and phishing attempts
* Protects your children against unwanted Internet content.

* Quicker where it matters
NEW! Quick and easy installation, faster boot-up times and faster scanning and cleaning of files.
* Protects your computer against viruses, worms and unknown attacks
With automatically updated virus protection from the world-renowned F-Secure Data Security Laboratory and the new F-Secure DeepGuard 2.0 technology that instantly protects you against zero-day attacks and other future threats, you can safely use your computer, now and tomorrow.
* Detects and removes spyware from your computer
F-Secure Internet Security detects and removes secretly installed software from your computer better than ever before, ensuring that your system is running smoothly and clean of spyware.

* Protects your computer against hackers
You can keep your private data to yourself with the personal firewall that stops hackers from breaking into your computer.
* Helps you stay free from e-mail and phishing attempts
F-Secure Internet Security filters unwanted and e-mail schemes designed to steal your private information.
* Protects your children against unwanted Internet content
F-Secure Internet Security ensures that your children or teenagers do not enter objectionable sites or surf the Internet when you are not around.

Download F-Secure Internet Security 2009 And Patch

W32/Conficker.worm Infection Cycle

Posted in , , , , , , , | Posted on 6:54 AM Bookmark and Share

0

The W32/Conficker.worm can infect systems via three infection vectors, via exploit MS08-067, an Autorun mechanism or by exploiting weak passwords. In addition the worm has an auto update routine to update previously infected systems .

These Infections are all multi stage processes. Involving the initial compromise,
copy files and then executing the malware.

Exploit Vector
Local network is scanned for susceptible computers. Once a susceptible computer is located the exploit is then attempted against the machine. If successful the process is hijacked and malware is copied from remote attacking machines HTTP server (random port # is used) to the localhost. At this point the machine is compromised.

Malware is then dropped onto the system and a new service created and started. The machine is now infected. Cleaning requires an On Demand Scan (ODS) anda reboot, possibly another ODS run to clean any dormant infected files or reinfection style files from the system. Machine must be patched and rebooted.

Weak Passwords
An infected machine attempts to access other remote systems shares using the password list that is listed in the VIL description. If you have a lockout policy in place, accounts will become locked as the thresholds are exceeded. Upon a weak password being found, files are copied to the system, generally at#.job file to the tasks folder and a dll to the system32 folder. System is now compromised. Upon execution of the scheduled job, rundll32.exe is used to load the dll file which then creates the malware service and starts it.

System is now infected. Cleaning requires an On Demand Scan (ODS) and a reboot, possibly another ODS run to clean any dormant infected files or reinfection style files from the system. Weak passwords need to changed.

Autorun Worm Vector
Two files are dropped by an infected host onto root of accessible shares or piece of removable writable media (USB stick for example). Autorun.inf (described in detail below) xxxxxxx.vmx (xxxxxxx = random name) These shares or pieces of media are now in a compromised state.

When the share or media is accessed and autorun mechanism is enabled on the remote system, the autorun.inf file is opened and the rundll32.exe process is used to load the malware from the recycled folder in the root of the share or piece of media. Rundll32.exe will then load the dll and the dll will create the malware service and
start it.

Download Antivirus Internet Security And Firewall Software

Fake Antivirus Remover, Use to Clean Fake Antivirus

Posted in , , , , | Posted on 1:30 AM Bookmark and Share

0

We have more and more antivirus, free antivirus can we download on the Internet. But with so many free antivirus presence we need to be aware, many anti-virus which was spreading a virus or trojan.

Remove fake Antivirus is a simple tool that serves to remove the antivirus, fake antivirus that may have infected your computer.

Here's a list of fake antivirus that can be detected by Fake Antivirus Remove:
1. Cyber Security
2. Alpha Antivirus
3. Braviax
4. Windows Police Pro
5. Antivirus Pro 2010
6. PC Antispyware 2010

7. FraudTool.MalwareProtector.d
8. Winshield2009.com
9. Green AV
10. Windows Protection Suite
11. Total Security 2009
12. Windows System Suite
13. Antivirus BEST
14. System Security
15. Personal Antivirus
16. System Security 2009
17. Malware Doctor
18. Antivirus System Pro
19. WinPC Defender
20. Anti-Virus-1
21. Spyware Guard 2008
22. System Guard 2009
23. Antivirus 2009
24. Antivirus 2010
25. Antivirus Pro 2009
26. Antivirus 360 and
27. MS Antispyware 2009

Download Remove fake Antivirus

Download Free ESET Smart Security 4.0.314 + Serial Key

Posted in , , , , , , , | Posted on 10:47 PM Bookmark and Share

0

ESET Smart Security was designed to be complete solution in the field of computer protection against infiltrations and attacks. Eset Smart Security offers more than just a sum of its parts ? it is synergy that matters most. If all components are used simultaneously, the effectiveness of the whole program is multiplied. ESET Smart Security unifies all its functions to create a complex security solution.

ESET Smart Security is based on three basic pillars:
ESET NOD32 Antivirus + Antispyware
· This component is in fact an improved version of the award-winning scanning engine of NOD32 Antivirus v2.7. With respect to program's unprecedented scanning speed, the following improvements have been made:
· Improved system of cleaning and deleting infiltrations. The antivirus system now intelligently cleans and deletes infiltrations with no need for user interaction.
· Computer scan can be run in background in order to use only a part of system resources. Thus scanning will not affect the performance of your computer and you will be able to work on it as usual.
· The resident protection supports archive scanning.
· Update optimization, smaller update package size than in version 2.7, more effective management and protection of update files against damage.
· Email protection for users of Outlook Express.

ESET Personal Firewall
· Firewall monitors all traffic between a protected computer and other computers in the local network and in the Internet. High quality protection is provided by the following functions:
· Scanning of application protocols HTTP and POP3 (used for Internet browsing and for retrieving email from servers) for infiltrations.
· Checking low-level network communication which helps to avoid many of various remote attacks.
· Ability to recognize the character of network connections established by various types of infiltrations and ability to automatically terminate them.
· Filtering of incoming and outgoing communication based on user defined rules.
· Monitoring changes in executable files.
· Interactive and automatic mode. The former enables you to create your own filtering rules, the latter filters all communication automatically.

ESET Anti Spam
· ESET Anti Spam serves to filter unsolicited email, which makes your work with email more effective. The key features of the ESET Anti Spam are:
· Support for the RCF email format
· Supports several scanning techniques including the combination of Bayesian filter, virus signatures and user defined rules.
· Supports the creation of Blacklist and Whitelist.
· Integration with the Microsoft Outlook messaging and collaboration client.
· Ability to control multiple messages simultaneously.

Features of "ESET Smart Security":
· Integrated firewall and antispam module
· Improved graphical user interface
· 2 operating modes for common and advanced users
· Improved and automatised cleaning
· True incremental updates
· Export / import settings

What's New :
· General
· Added support for SSL under Microsoft Windows 2000
· Improved support for Microsoft Windows Live Mail v4 (beta)
· Added import and export of root SSL certificates for Microsoft Internet Explorer, Mozilla Firefox and Opera Software Opera web browsers
· Added ability to edit user-defined servers for threat signature updates
· Added "Smart Filtering" of logs to provide improved view of data
· Antivirus & Antispyware
· Exclusions now supported for mapped network drives (both the mapped and the UNC paths must be specified)
· Added "Smart Scan" option for quick and effective scans (parameters will be adjusted in future versions)
· ESET Personal Firewall
· Added support for UAC under Microsoft Windows Vista and Windows Server 2008
· Added 1863/TCP for Windows Live Messenger/MSN Messenger for Rules under Local Settings
· ESET SysRescue
· Added ability to include external programs on ISO images

System Requirements
Processor Architecture: 32-bit (x86) / 64-bit (x64), AMD®, Intel® or other 100% compatible
Operating Systems: Microsoft®Windows® 2000/ XP/ Vista®

Download ESET Smart Security and Multile Serial key

DIFFERENCE FIREWALL, ANTIVIRUS AND IDS

Posted in , , , , , , | Posted on 9:57 PM Bookmark and Share

0

IDS (Intrusion Detection system)
IDS is an acronym for Intrusion Detection System. An intrusion detection system detects intruders; that is, unexpected, unwanted or unauthorized people or programs on my computer network.

There are many forms of IDS. Network IDS and Host IDS are the example. Network IDS will Generally Capture all Traffic on the network Host will Capture Traffic for Individual Host IDS detects attempted attacks using Signature and Patterns much like an Anti Virus App will.

Anti Virus
Antivirus software (sometimes spelled Anti-Virus or anti-virus with the hyphen) are computer programs that attempt to identify, neutralize or eliminate malicious software. The term "antivirus" is used because the earliest examples were designed exclusively to combat computer viruses; however most modern antivirus software is now designed to combat a wide range of threats, including worms, phishing attacks, rootkits, Trojans, often described collectively as malware They will capture attempted Infections of Files or email, the general infection will be a Trojan and/or Virus/Malware.

Firewall
Not limited to a Perimeter of a Network, Firewalls can be Sophisticated. Firewall will scan TCP/IP packets based on Source and Destination then check again a list ( ACL ) and block/Allow traffic accordingly, some firewalls can provide Layer 7 Traffic Scanning ( Deep Packet Inspection) for instance rules can be setup for Applications.

A firewall has got holes to let things through: without it, you wouldn't be able to
access the Internet or send or receive emails. Anti-virus systems are only good at detecting viruses they already know about. And passwords can be hacked, stolen or left lying about on post-its.

That's the problem. You can have all this security, and all you've really got is a false sense of security. If anything or anyone does get through these defenses, through the legitimate holes, it or they can live on your network, doing whatever they want for as long as they want. And then there's a whole raft of little known vulnerabilities, known to the criminals, who can exploit them and gain access for fun, profit or malevolence. A hacker will quietly change your system and leave a back door so that he can come and go undetected whenever he wants. A Trojan might be designed to hide itself, silently gather sensitive information and secretly mail it back to source. And you won't even know it's happening - worse, you'll believe it can't be happening because you've got a firewall, anti-virus and access control.

Unless, that is, you also have an intrusion detection system. While those other defenses are there to stop bad things getting onto your network, an intrusion detection system is there to find and defeat anything that might just slip through
and already be on your system. And in today's world, you really must assume that things will slip through - because they most certainly will. From the outside, you will be threatened by indiscriminate virus storms; from hackers doing it for fun (or training); and more worryingly from organized criminals specifically targeting you for extortion, blackmail or saleable trade secrets.

From the inside, you will have walk-in criminals using social engineering skills to obtain passwords to, or even use of, your own PCs; from curious staff who simply want to see what their colleagues are earning; and from malcontents with a grievance.

What you really mustn't assume is that this is fanciful, or that you don't have anything worth stealing. According to experts in the field even something as basic as stored HR data on your employees is worth $10 per person on the black market. Search for 'FBI' on this site, and see the variety of attacks and dangers that exist; and how often there is a degree of success despite firewalls and antivirus and access control. You still need all of those defenses - but you also need an intrusion detection system.

Download Antivirus | Firewall Software

How to remove Conficker and prevent re-infection

Posted in , , , , | Posted on 7:17 PM Bookmark and Share

0

Symptoms of Conficker infection include the following:
- Access to security-related sites is blocked
- Users are locked out of the directory
- Traffic is sent through port 445 on non-Directory Service (DS) servers
- Access to admininistrator shared drives is denied
- Autorun.inf files are placed in the recycled directory, or trash bin

The following steps to remove W32/Conficker.worm and prevent it from spreading:

- Install Microsoft Security Update MS08-067:
http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx

- Clean the infected systems, and reboot
Use anti-malware solutions such as McAfee VirusScan Plus or ToPS for Endpoint to clean the infection. Use behavioral detection techniques like the buffer overflow protection in Host IPS to prevent future infections. This is important because - - - Conficker can propagate via portable media such as infected USB drives. As the media are accessed, the system processes autorun.inf and executes the attack.

- Identify other systems at risk of infection
You need to identify which systems are at risk. The list includes systems that either are not patched against Microsoft vulnerability MS08-067 or do not have proactive protection controls to mitigate the vulnerability. McAfee Vulnerability Manager and ePolicy Orchestrator can identify systems that are vulnerable and not protected.

- Limit the threat’s ability to propagate
Using network IPS at strategic points in your network will quickly limit the ability of the threat to spread. This gives you time to either update your client anti-virus signatures or modify policies to block the threat using the behavioral controls.

Download McAfee

Download Free McAfee VirusScan Enterprise

Posted in , , , , , , , , | Posted on 5:38 PM Bookmark and Share

0

McAfee VirusScan Enterprise protects your desktop and file servers from a wide range of threats, including viruses, worms, Trojan horses, and potentially unwanted code and programs.

This version provides these new or improved features:
- Support for 64-bit operating systems.
These features or products are not supported on
64-bit operating systems:

- Buffer Overflow Protection.
- Scanning of Lotus Notes databases.
- Alert Manager 4.7.1.

- Quarantine Manager Policy. Configure a policy to
manage quarantined items. Before the on-access
or on-demand scanner cleans or deletes a file,
it creates a backup copy of the original file
and registry value in the quarantine directory.
These backed-up items can be automatically
deleted after a specified number of days. You
can also selectively restore, delete, and rescan
quarantined items.

- 5100 series scanning engine. This product
release provides these engine enhancements:

- Incremental engine component updates. Allows
engine components to be updated without
updating the entire engine. The engine
version, displayed in the VirusScan
Enterprise "About" dialog box, shows both the
engine series and the latest incremental
update version. For example, 5100.0194.

- Two versions of the 5100 series engine; a
32-bit version and a 64-bit version. The
VirusScan Enterprise About dialog box
displays the 32-bit engine version number and
if the 64-bit engine is used, it also
displays the 64-bit engine version number.

- Ability to use different sets of detection
definition (DAT) files at the same time. For
example, the engine can access the
anti-virus, buffer overflow, and access
protection DAT files simultaneously. This
provides more efficient scanning and
detection of threats.

- Detection of rootkits in memory. The on-demand
scanner can be configured to scan system memory
for installed rootkits. Rootkits conceal running
processes and files or system data, and are a
threat if an intruder uses the rootkit to
maintain access to a system without the user’s
knowledge.

- Enhanced Access Protection. This feature
prevents unwanted changes by restricting access
to specified ports, files and folders, shares,
registry keys and values. The rules have been
enhanced to expand exclusion capability and
provide better protection:

- Access Protection rule configuration options
include "Processes to include" and "Processes
to exclude." See the Access Protection
section of the VirusScan Enterprise Product
Guide for details.

- Rules have been separated into Anti-virus,
Common, Outbreak, and User-defined
categories.

- Protection levels. When you install the
product, you choose whether to enable
"Standard Protection" or "Maximum Protection"
rules as the default.

- Standard Protection. Anti-virus and common
rules that protect some critical settings
and files from modification, but
generally allow installation and
execution of legitimate software.

- Maximum Protection. Anti-virus and common
rules that protect most critical settings
and files from modification. These rules
provide more protection, but might also
prevent you from installing software. If
you are prevented from installing
legitimate software, we recommend that
you disable the Access Protection feature
before installing software, then enable
it again after installation.

You can change which rules are enabled and
disabled after VirusScan Enterprise is
installed.

Download Here

Protect Computer Offline With USB Disk Security

Posted in , , , | Posted on 7:32 AM Bookmark and Share

0

USB Disk Security provides 100% protection against any threats via USB drive, however, the majority of other products are unable even to guarantee 90% protection. USB Disk Security is the best antivirus software to permanently protect offline computer without the need for signature updates, but other antivirus software should update signature database regularly, and they cannot effectively protect offline computer. This light and easy to use solution is 100% compatible with all software and doesn't slow down your computer at all. You pay USB Disk Security once and get it all, however, other antivirus products should be paid for updates every year.

Product Highlights:

100% protection against any malicious programs via USB storage

The best solution to protect offline computer

Other antivirus software should update signature database regularly, and they cannot effectively protect offline computer that is not connected to the Internet. When new viruses, worms and other malicious attacks strike, traditional signatures are insufficient. Every minute one waits for a virus signature update creates a window of vulnerability that could have devastating consequences. USB Disk Security uses advanced proactive detection techniques, requires no signature updates, and closes the window of vulnerability left open by other reactive, signature-based responses.

The world's fastest and smallest antivirus software

With USB Disk Security, it’s not necessary to sacrifice speed for detection and scanning. Compare antivirus software and you'll discover that USB Disk Security is by far one of the smallest applications in the industry. For example, the v5.0 of USB Disk Security installer is just 1 MB. The program utilizes approximately 1 to 7 MB of RAM.

100% compatible with all software

Incompatibility between antivirus programs is an issue. In the vast majority of cases, installing two antivirus programs from different vendors on one machine (for increased protection) is technically impossible, as the two programs will disrupt each other's functioning. However, USB Disk Security is 100% compatible with all software, including Windows Vista.

Simple to use

USB Disk Security has been specifically designed to perform effectively regardless of the user’s level of computer expertise. Just install and forget it

System Requirement

100MHz Processor or more, 16MB RAM or more. The operating system should be Windows 95, Windows 98, Windows 2000, Windows XP, Windows NT 4.0, Windows ME, or Vista

Download here

Download Free PC Tools Firewall Plus 6.0.0.66

Posted in , , , , , , , | Posted on 10:03 PM Bookmark and Share

0

A personal firewall that protects your computer from intruders and controls the network traffic in and out of your PC.

PC Tools Firewall Plus is a powerful personal firewall for Windows that protects your computer from intruders and controls the network traffic in and out of your PC. By monitoring applications that connect to the network Firewall Plus can stop Trojans, backdoors, keyloggers and other malware from damaging your computer and stealing your private information.

PC Tools Firewall Plus is advanced technology designed specially for people, not experts. Powerful prevention against attacks and known exploits is activated by default and advanced users can also easily create their own packet filtering rules to customize the network defenses. All you need to do is install it for immediate and automatic ongoing protection.

That’s why PC Tools Firewall Plus provides world-leading protection, backed by regular Smart Updates, OnGuard real-time protection and comprehensive network shielding to ensure your system remains safe and hacker free.

PC Tools applications are trusted and used by millions of users everyday to protect their business and home systems against online threats.

Here are some key features of "PC Tools Firewall Plus":

• Protects your PC as you are working, surfing and playing.
• Intelligent automatic protection without all the questions.
• Easy to use. Designed for both, novice and expert users.
• Advanced rules to protect your PC against common attacks.

What's New:
• Password Protection – the end user has been empowered to protect critical areas of Firewall Plus with a password. These include changing or modifying Applications, Advanced Rules, Settings and Product Uninstall. When set, any attempt to make changes to these areas or uninstall the product will require a password.
• Important - Please do NOT forget your password. A Password hint is provided to assist in recovering lost passwords. PC Tools cannot recover your Password, nor will any PC Tools employee EVER ask you to reveal your Password.
• Full Screen Mode – the end user can instruct Firewall Plus to behave in a different manner when a program which requires use of a Full Screen is in operation. This ensures that programs such as Games, Movies or Presentations are not interrupted by Firewall Plus messaging. The user can set Firewall Plus to run in two modes (a) Secure (temporarily BLOCK requests) and (b) Flexible (temporarily ALLOW requests).
• Network Layer Enhancements – invisible

Download for free here

How to Get Rid of Google Virus Fix

Posted in , , , | Posted on 9:37 PM Bookmark and Share

0

Infecting users via internet exposure and nooks and crannies found in unsecured browsers are the main causes of the redirect virus. So where does one inject the use of Google redirect virus fix? In order to properly employ its use first it is essential to understand what this threat is and what it does. The redirect mal ware lives up to its name, the infection causes a hijacking of any search or website visit a user plans to make. Instead of finding their site of choice the virus redirects them to fake websites containing ads and even corrupted pages.

The following fake errors are displayed by the vius
· Internet explorer cannot open web page
· filename.exe is not a valid win32 application
· Setup files are corrupted Please obtain new copy of program

Being a browser hijacking utility it manages to infect browsers like IE and Firefox and then redirects internet users to the following malicious sites.
· clearask.com
· brittaniasearch.com
· go.Google.com
· web-analytics.Google.com

The redirect threat is capable of disabling activated firewalls and security software which can then lead to a remotely accessible system. This allows hackers to have access over personal information such as login names, passwords, financial records etc.

What are the symptoms to consider when one wants to implement a Google redirect virus fix?
· An unknown change of desktop background
· Changes homepage
· Browsers such as IE and Firefox slows down noticeably
· Corruption of registry files thus resulting to the dreaded "Blue Screen of Death"
· Contamination of messengers, freeware and email attachments are also sure signs.

How does Google redirect virus fix work?
1. Select Show Hidden Devices under Hardware Device Manager in your Windows Control Panel.
2. Search for "TD SSserv.sys" right click Disable. Do not select Uninstall otherwise the infection will reappear once the computer is restarted.
3. Reboot the pc.
4. Immediately update antivirus software and the Google redirect virus will cease to exist in your workstation.

It pays to be vigilant and alert when using the internet. Avoid malicious sites and constantly scan your system and update your security tool to avoid contaminations. It is also best not to rely on one antivirus software alone having another reliable application can help sift through the threats that the other was incapable of detecting.

Tired of viruses infecting your computer and slowing down PC performance? Do you want to do Google redirect virus fix in safe and fast way? You can scan your computer for free and fix them with the best spyware removal the market. After scanning and fixing your PC, you will be surprise how fast your computer is.

How to identify and Avoid the USB drive affected with virus

Posted in , , , , , , | Posted on 5:41 PM Bookmark and Share

0

Virus and worms are easily spread by carrying it on a removable medium such as ,USB drive , I-Pod, CD, Floppy. USB drive is otherwise called as “Flash Drive”,”Thumb Drive” ,”Memory stick” ,”External USB Hard Disk”. Even though we have very good Antivirus , New Viruses are one step Ahead than Antivirus. We cannot restrict USB Drive , but we can avoid spreading of virus and worms through USB Drive. So we have to be little bit careful while working with USB Drive, some precautionary steps are follows.

How to identify the USB drive affected with virus

After Inserted USB drive

This screen shot shows the USB drive which is affected with virus


How to Enable Hidden files and folders

• Goto Tools -> Folder options -> click view tab
• Under view tab goto -> Advanced settings -> Hidden files and folders
• Click radio button “show hidden files and folders”
• Remove check mark “Hide extension for known file types”
• “Hide protected operating system files”
• Click Apply , ok.


After Enabled the hidden files you can view the virus in the USB drive

What is inside the Autorun.inf?

Autorun.inf script

;2wKsL0qj9D5s91DaJdDkiakaaq22ww
[AutoRun]
;jU3wwLJ34ik9roLjds8ra21SdLsSwiDI2qijKpKKjq0
s03okaSDafSskKDKDrswaLa81l4
open=p83gjy.exe
;wkkLKi8sSdkL24
shell\open\Command=p83gjy.exe
;Ld4faAj21fw2lss0aasasA6pJooskL9
shell\open\Default=1
;dO4ias5k3rHkwscwr
shell\explore\Command=p83gjy.exe
;aL0Hd8rZdaiU4qwaaJr1ojAowini32o321s4


NOTE: Script & exe files may vary

How to avoid ???

STEP 1:
Don’t allow the USB Drive to Auto Play after plug in, cancel it.

STEP 2:
Go to My computer
Devices with Removable storage
Do not Double click the USB Drive
Note the drive letter assigned to USB Drive as mentioned in the Fig
Here E:

STEP 3:
• Go to -> Start -> Run -> Type E:

• Now you can view the Contents of your USB Drive

• Copy the necessary files
• Repeat the Process while using USB Drive
• Now your Laptop is free from viruses & worms.
• It is a time consuming process, but no other way to avoid the virus.

Exploits Facebook - The Facebook fan check Virus

Posted in , , , , | Posted on 12:30 AM Bookmark and Share

0

The Facebook fan check Virus has been running absolutely rampant today. Analysts estimate 237,000 accounts have already been compromised by the Facebook fan check Virus and over a million will be compromised by the Facebook fan check Virus in the next 48 hours.

The Facebook fan check Virus is a new virus that exploits Facebook's ability to add
applications. It steals the user's login data and locks them out of their account.
Then Facebook fan check Virus sends messages to every friend on the compromised account and attempts to infect them with the Facebook fan check Virus. The friends then open the message an automatically become infected.

Facebook has not released any official statements at this time, but staff has recommended several precautions, albeit standard precautions, stating to not allow any applications you are not familiar with. They are currently revamping their FBML API in order to stop the Facebook fan check Virus from running rampant.

For more up-to-date information about the Facebook fan check virus, check out the official Virus Alerts: Facebook fan check Virus Prevention page for verified tools that will remove the Facebook fan check Virus and immunize systems to prevent them from getting the virus.

Slow Start-up Windows XP When Using Norton Internet Security

Posted in , , , , , | Posted on 9:50 PM Bookmark and Share

0

If you are using Norton Internet Security, and are experiencing slow start-up of XP, (i.e. you can see the desktop with icons etc. but it takes 30-60sec before you can start using the computer), this fix might help:

· Click on Start button.
· Select Control Panel.
· Open "Network Connections".
· Under "LAN and High-Speed Internet", right-click on your "Local Area Connection" and select "Properties".

· Under "General" tab, select "Internet Protocol (TCP/IP)" and select "Properties".
· Select "Use the following IP address:".
· Under "IP address" enter following : 192.168.0.1
· Under "Subnet Mask:" enter following : 255.255.255.0
· Click "Ok".

Download Norton Internet Security 2009

Windows Defender in Windows Vista

Posted in , , , , , , | Posted on 6:13 PM Bookmark and Share

0

Windows Defender is Microsoft’s anti-spyware program, which it purchased from Giant and re-badged. An examination of the effectiveness of this product is beyond the scope of this article. One excellent feature, however, is that WD (who else wishes they had called it Windows Malware Defender – WMD?) does tell the user in good
detail every time a program (even a legitimate one) takes certain actions, such as writing to the registry. For the informed user, this is useful information.

What is most interesting, though, is that despite all of the other measures taken in Vista to preserve system integrity and reduce the attack surface for malicious exploiters, there is still a need for a standalone (albeit bundled) application
which is dedicated exclusively to dealing with undesirable programs. This, more than any other indication, is tantamount to an admission that Microsoft does not believe
that the new security controls in Vista are going to solve ‘the virus problem’.

The fact that Microsoft is also now firmly in the anti-virus game with its repackaged version of RAV, is another tacit recognition of this fact.

SO FAR, SO GOOD ... SO WHAT?

So, what is the impact of the new security features on ‘the virus problem’? Windows Defender will clearly have some impact – as will user access control. It may also be the case (as it was with Windows 9x and Windows NT) that, initially, a large tranche of older malware will be rendered useless on the Vista platform. Clearly that is a good thing, but history shows us that eventually the bad guys catch up, and soon it’s
business as usual in the malware creation world.

In recent years there has been a massive trend towards criminal exploitation of malware, and this has meant huge amounts of money being invested in malware development. Just as, in the laboratories of every anti-malware software vendor on the planet, there are many people scurrying around trying to get a product out that will work on Vista, there are as many people (maybe even more) out there who
have the money to create their own infrastructure and hire malware authors with the express purpose of bringing Vista to its knees.

Recently we have seen direct malicious exploitations of zero-day vulnerabilities in MS Word and MS Excel, and there is no slowdown in the number of vulnerabilities being
found. It is almost a certainty that in Windows Vista (as in any sufficiently large piece of code) there are vulnerabilities waiting to be found, or perhaps which have already been found, and are now waiting hungrily for a few bytes of exploit code.

If the end result of the laudable new measures in Windows Vista is that the user feels, like so many misguided GNU/Linux and Mac OS users, invulnerable to attack from
either viruses or the plethora of other undesirable software attacks, particularly ones that employ social engineering techniques, then we will have moved backward rather than forward.

Users of any operating system have a responsibility to educate themselves about the dangers of using their systems, and the realistic possibility that, if they do not, at some point they will fall prey to an attack.

Fix Stop 0x00000050 Error With Registry Cleaner

Posted in , , , | Posted on 3:10 AM Bookmark and Share

0

What is a stop 0x00000050 error? Stop error 0x00000050 is an error that stops windows from working properly. It comes from the core of windows and most likely because of registry errors and invalid entries. In most cases, You may receive a stop 0x00000050 error message with the following format:

STOP Error 0x00000050: PAGE_FAULT_IN_NONPAGED_AREA

To resolve the issue, you will need to fix corrupt registry.The registry is basically a big database which lies at the core of windows. It's responsible for storing all the settings and options for all the programs on your computer, allowing your PC to "remember" a number of different things even if it's turned off. This is great, but because Windows is constantly using 100's of registry files, it actually ends up saving many of them in totally the wrong way. This makes them corrupt and damaged, making them extremely hard to read, making your computer slower and causing errors.

Registry cleaners fix stop 0x00000050 errors by scanning every registry file on your PC, but in order to be sure that registry has been cleaned the most, you need to be able to rely on the best windows registry cleaner. Registry Cleaner is an award-winning registry repair software.It has quickly become extremely popular, thanks to its several unique and powerful features which allow it to clean out the most registry problems on your system. For your convenience and protection, Registry Cleaner also provides a backup mechanism for any repaired files so that you can easily recover any changes if required. They are so easy, you only need make a few clicks. Registry Cleaner will make your Windows computer faster and more stable.

Download Registry Cleaner

How do I protect myself from hackers

Posted in , , , , | Posted on 6:58 AM Bookmark and Share

0

The term hacker was once used to describe a clever programmer. Today, it’s applied to those who exploit security vulnerabilities to break into a computer system. You can think of it as electronic burglary. Hackers regularly break into both individual computers and large networks. Once they have access, they may install malicious programs, steal confidential data, or perhaps use compromised computers to distribute spam.

Today’s computer software is very complex, comprised of thousands of lines of code. Since software is written by humans, it’s hardly surprising that they contain programming mistakes, known as vulnerabilities. These loopholes are used by hackers to break into systems; they are also used by authors of malicious code to launch their programs automatically on your computer.

Hackers are like electronic burglars, who use loopholes in your programs - vulnerabilities - to break into your computer system. You can protect yourself from hackers by using a firewall. A firewall program, which often comes as part of an anti-virus software package, protects a PC by detecting potential intruders and making the PC invisible to hackers.

Identification A Phishing Email or a Real Email

Posted in , , , , , | Posted on 12:42 AM Bookmark and Share

0

One of the problems about trying to teach people to avoid Phishing attacks is that the banks often use the exact same tactics that the phishers use. It is mind-numbingly stupid of them to do so, but still we see emails from banks that contain links in them. As a rule I tell people not to click on the links in these emails, but rather to log into their account by typing in the address of their bank by hand.

I had a question for my credit union about one of my accounts with them. The response came back and contained a link that I had to follow in order to reply. The email specifically said not to reply to the email because it wouldn’t be read. So, how do I know this isn’t a phishing attack? First of all I looked at exactly who the email came from. Believe me, this is far from foolproof. Email addresses can be spoofed. The more important sign was that when I followed the link I was not asked for any information at all. I did not have to login, I did not have to verify anything. In addition to this, the email came in response to an inquiry that I initiated and not out of the blue. The reply was relevant to the question I had asked.

I am a little dumbfounded by the approach the bank used. If I was using my Comcast email account with the configuration that Comcast specifies as being valid for use with a wireless network, then someone could have intercepted the contents of the email and responded to the bank on my behalf.

Between security ignorant ISPs, such as Comcast, and banks using emails with some of the same significant attributes that phishers use, it is no wonder that so many people fall for phishing attacks and have accounts compromised.

So, do as I say and not as I do! Don’t click on the links in the emails. The proper thing for me to have done would have been to call my credit union and responded. I did file another comment asking them to stop teaching people to fall for phishing attacks. I wonder what they’ll say!

To tell the truth, I am seriously considering publishing their reply, including the public link that can be used to reply back to them on my behalf!

Anyone want to tell them not to send links to their customers in email?
(Randy Abrams - Director of Technical Education)