Cleanup Antivirus

Tuesday, August 30, 2011 |


A harmful virus can delete important files, alter user settings, corrupt your system registry and cause your computer to become otherwise inoperable.
Cleanup Antivirus can attach itself to your computer without your knowledge of being there. You probably won't even recall how it got in there in the first place. It spreads in your computer with the help of Trojans.

Instructions

1: Click the "Start" button, right-click on "My Computer" and select "Properties." Click the "System Restore" tab and check the "Turn off System Restore on all drives" box. Most anti-virus programs do not scan the System Restore volume, allowing viruses and other malware to later re-infect your system. Turning off the System Restore feature prevents this from occurring.

2: Download and install an anti-virus program. Anti-virus programs scan your computer's files for bits of code that match a virus definitions database. Anti-virus programs delete, quarantine or clean files containing malicious code according to the anti-virus program's default settings or your user preferences. See Resources for a list of available programs.

3: Update the anti-virus software. You should regularly update the database of virus definitions that the anti-virus program uses to determine if a file contains a virus. If your database of virus definitions is out of date, you are leaving your computer at risk for infection.

3: Run a "Complete" or "Deep" file scan to detect and remove the virus. Many anti-virus programs allow you to run a "Smart scan," which scans only recently changed or particularly virus-prone files on your computer. If the virus is dormant on your computer or resides in a directory not checked by the "Smart scan," the anti-virus program will not detect the virus. If possible, instruct the anti-virus program to scan all drives on the computer, including any removable media and flash drives. If prompted to delete or clean an infected file, opt to clean the file first. If the anti-virus program cannot clean the file, delete the file to permanently remove it from your computer.

5: Reboot your computer when the anti-virus scan is complete. Allow the operating system to load. Click the "Start" button, right-click on "My Computer" and select "Properties." Click on the "System Restore" tab and uncheck the "Turn off System Restore on all drives" box to re-enable the System Restore feature.

Look Out For the Rogue Antivirus

Monday, August 29, 2011 |


Most Internet users are very aware of the dangers of spyware, adware and malicious software and may have taken precautions against such attacks by installing suitable antivirus software. However another threat exists known as rogue antivirus, which is really a fake antivirus. You may find a search for free antivirus download for pc and free antivirus softwares download useful.

This fake scareware rogue antivirus appears to be genuine and even goes under the name of MS Antivirus or Spyware Protect 2009. (This is not to be confused with the legitimate Microsoft Antivirus and Windows LiveOneCare or the current genuine Microsoft Security Essentials anti-malware program).

MS Antivirus comes under many titles including Security Tool and Total Security, VistaAntiMalware2010, AntiSpyware2010, Internet Security2010, XP Antivirus and many more. Why not give free antivirus download for pc and free antivirus softwares download a try?

The whole aim of the false spyware is of course to lure the user into purchasing the software on offer.

MS Antivirus operates by running a scan on your computer, giving a false report regarding infections found then requesting you to click on a link to remove it. Whether you click on a button to cancel or remove, a download box will still pop up.

Everything is designed to scare the user to click on the purchase button. Pop-ups continually appear with a request to register to have them fixed.

While many variants of MS Antivirus do not usually harm your computer system, or steal your information, they do cause great inconvenience to the computer user.

Some variants however are quite harmful as they display popups as soon as the user attempts to start an application or navigate the hard drive. This is done by modifying the Windows registry and because the screen is clogged with continual popups, renders your computer unusable.

It can also disable genuine antivirus programs and block access to known spyware removal sites, as well as redirect you to a false Google search page. So what can you do about it?

1. Keep your ear to the ground and be alert to events and news about security.

2. It pays to be always vigilant to the point of paranoia when on the Internet and to be aware of suspicious activities, for example your computer unusually slow

Article Source: http://goo.gl/OFkcF

All about SmitFraud Antivirus ?

Monday, August 22, 2011 |


Smitfraud is essentially a virus that fakes as real and tries to trap you for purchasing an anti virus software. Those with UNIX based machines are the lucky ones, as this virus attacks the windows based machines only, also referred as W32. This virus generally pops up on when you try to download a video or an audio file, and creeps in to your system with codes like Pcodes, BrainCodes, and VideoKeyCodes. These codes pretend your system is under risk with virus and shows an automatic scanning of files and drives also leading to another fake threat on desktop background like a blue screen of threat (which happens when your system actually crashes). It prompts you to purchase their anti virus software like SpyAxe, SpySheriff or Spydawn. So their ultimate intention is to panic the user and capitalize this fear.

Now that we understand this virus is faked, it is also important to understand the actual threats by this virus if any, and the necessary remedial measures. This spy ware or ad ware process aim at faking risk to a window based system. It automatically runs a system scan, multiplies rapidly and keeps throwing pop up messages. If you send that particular audio or video file to someone else, it keeps growing to all system, forcing you to buy their software. If you get trapped into one of this, and use your credit card credentials to purchase one of them, there are chances of information theft as well. It is always recommended to do a general research on software you plan to download. In the worst case even if your system has got infected with this virus, you have remedies. You can download tools like SmitRem to remove SmitFraud or applications like SmitFraudFix or RogueRemover to remove the registry entries and uninstall this program respectively. Once you have downloaded this software, you can reboot your system in safe mode and run the file RunThis.bat. Following this, run SmitFraudFix and get back your system normal and healthy.

Source: http://goo.gl/i49kd

Get Online Antivirus | Install Antivirus

Friday, August 12, 2011 |


These days online antivirus installation is very famous because of the fact that it addresses one of the most important and very general problem faced by almost all of us who uses computers in day to day life. It also serves a basic purpose of help, keeping in view the need of help while installing the complicated executable software. We all know that there is certain software which can be installed on our computers by merely copy pasting because of the fact that they do not have complicated executable files but on the other hand there are some software which has complicated executable files like an antivirus software and hence it requires an online antivirus installation support from an expert.


Instructions

1: Double-click your downloaded AntiVirus installer, which is located in your Web browser's default download location unless otherwise specified. To find the download location, go into your Web browser options and find the "Downloads" folder.


2: Enter your product key on the Norton AntiVirus installation page. When you bought Norton AntiVirus online, the product key was provided at the time of purchase and included in an email to you. Click "Next" through the onscreen instructions to continue.

3: Read through the "User License Agreement."

4: Click "Agree & Install" to begin the installation process.

5: Open Norton AntiVirus to begin using the software. It will now be fully activated online.

Trojan Pop-Ups and Tracking Cookies Help

Thursday, August 4, 2011 |


When a trojan infects a computer, it can change settings, cause pop-ups to display, redirect search engine results or decrease a computer's performance. Users can cure current infections and prevent new ones with anti-virus software.

Identification

Trojans take their name from the historical Trojan horse because this type of file frequently poses as legitimate file, such as anti-virus software. Anti-virus programs can detect trojans even when the infection hides in a legitimate location. Anti-virus programs will also delete tracking cookies, or small text files that website servers exchange with the browser to provide information such as the user's location.
Solution

Users should install a full anti-virus program and run a scan to detect and remove trojans. Avast! and AVG both provide free anti-virus programs with frequent virus definition updates. In addition to this, anti-malware programs such as Spybot or Malwarebytes' Anti-Malware can scan for computer infections that may cause pop-ups and tracking cookies.

Considerations

Tracking cookies do not contain personally identifiable information such as names or addresses. They can be beneficial by providing custom content such as a local news feed. Some users, however, prefer to delete these cookies using an anti-virus program or browser utilities, and doing so does not impede Internet usage.

Read more: http://goo.gl/NtOb9

New virus bouncing around the Net

Sunday, July 24, 2011 |


An e-mail virus that is believed to have originated in Japan has been propagating around the Internet on Thursday morning, infecting thousands of computers.

The FBound-C virus is very similar to the FBound-A and FBound-B viruses, said Alex Shipp, senior antivirus technologist at e-mail outsourcing firm Messagelabs, which operates a virus scanning service for its customers. "It's just different enough to get past signature scanners," he told ZDNet UK.

However, Shipp added, antivirus companies are updating their signature files, and the fact that the virus was first discovered at 2:00 a.m. GMT means that companies and individuals in Europe, Africa and America should have time to update their software. "So although we've seen lot of copies this morning, we expect to see it nipped in the bud," said Shipp.

Antivirus firms say the virus is likely to have originated in Japan, or at least seems to be targeting Japanese users. "We started seeing it arrive from the Asia Pacific region," said Shipp. "First Japan, then China and Hong Kong."

Graham Cluley of antivirus company Sophos agreed. "Most viruses are monolingual," said Cluley. "This can make people less likely to open them. If you receive a virus from Belgium with a Belgian subject line, you're going to be more suspicious." FBound.C, said Cluley, was written in such a way that if it believes the recipient is in Japan it adds a Japanese subject line. Otherwise, the subject line says in English: "Important".

The virus is contained in an attachment called patch.exe, presumably designed to make people click on it believing that it is a software patch, said Cluley. "They're exploiting people's paranoia," he said. "But people really should have learnt by now not to click on email attachments. They should go to software companies for patches."

Shipp noted that the virus does not rate highly in the social engineering stakes, "but it seems to be doing quite well anyway." Within eight hours of first detecting the virus, Messagelabs had caught more than 2,000 copies. This indicates that the virus is spreading faster than the recent Myparty virus.

Read more: http://goo.gl/yudRB

How to Remove the Mass Mailing Worm ?

Monday, July 18, 2011 |

Mass mailing worms are perhaps the most frustrating types of malicious software to deal with. Not only are they almost impossible detect, but they affect your computer and the computers on your email contact list. Most high-quality anti-spyware and anti-virus software will get rid of the mass mailing worm. With most worms, running this software is the only answer

Instructions

Remove the worm with the native software on a Microsoft computer, the Malicious Software Removal Tool. Download the software from the Microsoft website or from your routine Microsoft Update. Run the program. Malicious Software Removal Tool automatically scans and removes harmful software.

Delete the worm with free anti-virus software that can be downloaded from the Internet, such as AVG or Avast! Download the software to your computer, run a full system scan and remove the malicious content detected on your computer.

Download Microsoft Security Essentials (MSE) or the Windows Defender program. These programs are free for licensed Microsoft users. Windows Daily News notes that MSE has been shown to detect and delete viruses as well as most popular commercial products.

Purchase anti-virus software such as Norton AntiVirus, McAfee VirusScan, eTrust Antivirus or Panda Titanium. Download the software to your computer.

Run a full system scan during which the software will detect worms, spyware and other viruses. When asked whether you would like to quarantine or delete worms, choose to delete all permanently.

Read more: http://goo.gl/7Gs8E