Showing posts with label About Virus. Show all posts
Showing posts with label About Virus. Show all posts

Tuesday, August 11, 2009

How To Delete ALL Your Computer Virus FAST FREE & EASY (Full Tutorial)

. Tuesday, August 11, 2009
0 komentar

Klik disini untuk melanjutkan »»

How to remove a Trojan Horse Virus

.
0 komentar

Klik disini untuk melanjutkan »»

Thursday, July 2, 2009

How to Find and Remove Spyware,Trojans and Viruses

. Thursday, July 2, 2009
0 komentar


How to Find and Remove Spyware,Trojans and Viruses - Click here for the most popular videos

Klik disini untuk melanjutkan »»

Clean Viruses And Spyware From Registry!

.
0 komentar


Clean Viruses And Spyware From Registry! - For more amazing video clips, click here

Klik disini untuk melanjutkan »»

Monday, June 8, 2009

Computer Virus Threats

. Monday, June 8, 2009
0 komentar

Virus & Hacker Threats Should You React?

We've all had it happen, that moment of panic when you wonder if your computer has a virus. In that situation, we can make the wrong decisions by deleting or installing files. If your system is set up properly and you back up files on a regular basis, there is no reason to panic.
Most of us have received an email "from a friend" warning us of impending doom. Sometimes the warning is real and sometimes it's not. Usually the email begins "I found this on my computer and I think I may have accidentally sent it to you. Better check your computer. I'm really sorry." The email finishes up with urging you to send this message to EVERYONE in your address book.
Hoaxes can actually make you the virus by getting you to delete needed programs or files causing the system to bog down or crash. These hoaxes usually arrive in the form of an e-mail and contain false virus warnings. When in doubt, check a list of known
virus hoaxes. The best thing to do is to delete the email.
Some virus programs appear to have been sent by a friend or a company you have emailed before. Most come from unknown sources. Once opened they work by pulling names out of a computer's address book and using them to further spread the virus.
You can set your email to accept plain text only. Block or remove emails that contain file attachments. Some viruses are even programmed to instruct your pc to show you only the plain text but can still infect your computer with hidden malicious code.

Prevent Computer Virus Threats
Install Virus Protection Programs

Help prevent computer viruses by updating windows regularly and installing virus protection programs. Virus updates should be done at least once a week. Scheduled the task time to run automatically so that it won't interfere with your work. Set up your computer to automatically download updates, but install the updates manually.
If your system starts running very slowly for no reason, go online and get the system checked. A good scan of your entire operating system, memory, hard drive and boot sector is needed.
Trend Micro has a free online virus scanner.
Anti-virus programs hunt for viruses and cleans attachments if possible. When a file can't be cleaned, the anti-virus program will isolate the file. The anti-virus program uses the definition list you download from the program's website, or it matches up a general pattern of what a virus looks like.
The schedule with which the anti-virus definitions are updated can vary, and you may get caught in that window of vulnerability between the virus appearing and it getting updated to the list. Warning: The viruses will get in if you don't keep your anti-virus program updated.
Software companies use patches to correct a problem or a weakness that people can take advantage of. Patching is a necessity and will be an on going method for computer systems weakness prevention.The Internet is not always what you see. Scan all of your email attachments as you download them. This should be done with files you download directly from internet sites as well as music files, programs, e-books, games, etc. Be careful sharing files with others, such as MP3, videos, programs, pictures, etc. Downloadable data can contain malicious code that you download without knowing it, and will infect your computer.Downloading the latest patch for your system can stop some of these viruses. You need to get the most recent protection that is out there. Get them directly from the company site. Please note that sometimes you could receive false notifications of necessary update patches in your email, urging you to download a patch immediately to protect your computer. Microsoft does not send update notices by email. These are almost always viruses.
Trojan is a code that hides from you. Even banner ads can contain trojans. The banner ad displays another pop-up that would redirect you to another site and load the content on that page. This would allow the trojan to execute while you are distracted with the content of the page. Trojan programs do not seek out new computers to infect like a worm or virus.
A trojan has the ability to automatically infect a computer. The fact that no fix exists for it, makes the appearance of the trojan a problem. MooSoft developed
The Cleaner for detecting and removing trojans in your computer.
People can help protect themselves against Active X issues by changing their IE internet security zone settings to prompt them before running Active X components. If your not familiar with changing security settings, visit
PC Pitstop for a free scan to check for security vulnerabilities and automatically set your security controls.
Hackers use automated programs to break into systems and are used by virus writers who set out to damage or use a computer system. The use of a firewall will help prevent this. A firewall works by warning you when someone is trying to gain access to your computer. If someone gains access to your computer they can retrieve information that you have entered, such as passwords, bank accounts and credit card numbers.
Zone Labs offers a free basic firewall.
A computer worm hasn't been created to spread by instant messaging, however it provides a target. Experts say a computer worm transmitted by using instant messaging programs would infect as many as 1,000,000 computers in less than a minute. New threats to your computer are created on a regular basis.
Keeping informed and using good judgment is always the very best prevention.

Klik disini untuk melanjutkan »»

Tuesday, June 2, 2009

New Computer Virus List

. Tuesday, June 2, 2009
0 komentar

OPRAH WINFREY VIRUS: Your 200MB hard drive suddenly shrinks to 80MB, and then slowly expands back to 200MB.
AT&T VIRUS: Every three minutes it tells you what great service you are getting.
MCI VIRUS: Every three minutes it reminds you that you're paying too much for the AT&T virus.
PAUL REVERE VIRUS: This revolutionary virus does not horse around. It warns you of impending hard disk attack---once if by LAN, twice if by C:>.
POLITICALLY CORRECT VIRUS: Never calls itself a "virus", but instead refers to itself as an "electronic microorganism."
RIGHT TO LIFE VIRUS: Won't allow you to delete a file, regardless of how old it is. If you attempt to erase a file, it requires you to first see a counselor about possible alternatives.
ROSS PEROT VIRUS: Activates every component in your system, just before the whole darn thing quits.
MARIO CUOMO VIRUS: It would be a great virus, but it refuses to run.
TED TURNER VIRUS: Colorizes your monochrome monitor.
ARNOLD SCHWARZENEGGER VIRUS: Terminates and stays resident. It'll be back.
DAN QUAYLE VIRUS #2: Their is sumthing rong wit your komputer, ewe jsut cant figyour out watt!
GOVERNMENT ECONOMIST VIRUS: Nothing works, but all your diagnostic software says everything is fine.
NEW WORLD ORDER VIRUS: Probably harmless, but it makes a lot of people really mad just thinking about it.
FEDERAL BUREAUCRAT VIRUS: Divides your hard disk into hundreds of little units, each of which does practically nothing, but all of which claim to be the most important part of your computer.
GALLUP VIRUS: Sixty percent of the PCs infected will lose 38 percent of their data 14 percent of the time. (plus or minus a 3.5 percent margin of error.)
TERRY RANDALL VIRUS: Prints "Oh no you don't" whenever you choose "Abort" from the "Abort" "Retry" "Fail" message.
TEXAS VIRUS: Makes sure that it's bigger than any other file.
ADAM AND EVE VIRUS: Takes a couple of bytes out of your Apple.
CONGRESSIONAL VIRUS: The computer locks up, screen splits erratically with a message appearing on each half blaming the other side for the problem.
AIRLINE VIRUS: You're in Dallas, but your data is in Singapore.
FREUDIAN VIRUS: Your computer becomes obsessed with marrying its own motherboard.
PBS VIRUS: Your programs stop every few minutes to ask for money.
ELVIS VIRUS: Your computer gets fat, slow and lazy, then self destructs; only to resurface at shopping malls and service stations across rural America.
OLLIE NORTH VIRUS: Causes your printer to become a paper shredder.
NIKE VIRUS: Just does it.
SEARS VIRUS: Your data won't appear unless you buy new cables, power supply and a set of shocks.
JIMMY HOFFA VIRUS: Your programs can never be found again.
CONGRESSIONAL VIRUS #2: Runs every program on the hard drive simultaneously, but doesn't allow the user to accomplish anything.
KEVORKIAN VIRUS: Helps your computer shut down as an act of mercy.
IMELDA MARCOS VIRUS: Sings you a song (slightly off key) on boot up, then subtracts money from your Quicken account and spends it all on expensive shoes it purchases through Prodigy.
STAR TREK VIRUS: Invades your system in places where no virus has gone before.
HEALTH CARE VIRUS: Tests your system for a day, finds nothing wrong, and sends you a bill for $4,500.
GEORGE BUSH VIRUS: It starts by boldly stating, "Read my docs....No new files!" on the screen. It proceeds to fill up all the free space on your hard drive with new files, then blames it on the Congressional Virus.
CLEVELAND INDIANS VIRUS: Makes your 486/50 machine perform like a 286/AT.
LAPD VIRUS: It claims it feels threatened by the other files on your PC and erases them in "self defense".
CHICAGO CUBS VIRUS: Your PC makes frequent mistakes and comes in last in the reviews, but you still love it.
ORAL ROBERTS VIRUS: Claims that if you don't send it a million dollars, it's programmer will take it back>>
http://www.bsd.org

Klik disini untuk melanjutkan »»

Monday, May 25, 2009

Keeping the Worms Away. How to Minimize Virus Threats.

. Monday, May 25, 2009
0 komentar

by Bobette Kyle

The battle against computer viruses and worms has gone on since the dawn of the virtual age. Over time, worms and viruses are evolving and the numbers are growing.

According to the Computer Knowledge Website "there were over 50,000 computer viruses in 2000 and that number was then and still is growing rapidly. Sophos, in a print ad in June 2005 claims 'over 103,000 viruses.'"

Technical experts and risk specialists understand that worm attacks and viruses are here to stay, to the extent that predicting and preempting attacks has become an industry. For example, McAffee publishes an ongoing virus information calendar where you can track expected future attacks by day or view virus/worm attack history. By methods such as this, McAffee and other security companies protect their customers by trying to stay a step ahead of new variants.
Worms can directly and adversely affect you in many ways.

No small business or individual email user is exempt from exposure to worm / virus attacks. As the number and variations of viruses grow, so does the risk to any email user.

There are several ways worms and viruses can adversely affect you. A few of these are:

1. Email worms can "spoof" your email address (put your address as the sender of infected emails), making it look like you are sending spam and viruses even though you are not.
2. They can infiltrate your systems, sending out infected emails from your computer.
3. The more malicious viruses can erase your hard drive or completely disable your computer systems.
4. Some may install software on your system (remote access trojans - RATs) that allows others to access, steal, and/or change your computer files.

If you are a list owner, this deluge of worms could tarnish your reputation with some people who do not understand spoofing. Since your email address is likely to be in a lot of email address books, your address will invariably show up as the "from" address in many infected emails.

This results in lost productivity as you sift through unwanted email, update protection systems, shore up security holes, and repair/head off other damage.
How Worm Viruses Work

As technology evolves, viruses evolve as well. At first, most viruses spread through email attachments. Now - with the proliferation of broadband "always on" connections, file downloads, instant messaging, Bluetooth-enabled mobile devices and other communications technologies - the ways worms and viruses spread have evolved as well. Still, email viruses cause the most overall problems. In December 2005, for example, the Sober-Z virus accounted for 79% of all viruses (as reported by Sophos).

In general, a worm virus is a program with the ability to spread itself through email. When the worm infects a machine, it spreads itself by sending infected email to addresses in the computer's email address book. The worm also uses one of the addresses as the "from" address, making it appear to recipients that the email came from someone else.

When a worm or virus that spreads through email infects a machine, it sends infected email to addresses in the computer's email address book. Many worms also use one of the addresses as the "from" address, making it appear to recipients that the email came from someone else.

Some worms also deposit a bit of code on your computer, presumably designed to carry out some future maliciousness.

It is all more complicated than this, of course, but I'll let the technical experts explain the nuances. Here are some recent articles about worm viruses:

Data Security Summary - January to June 2005, from F-Secure Corporation, explains all types of computer security risks, including viruses.

RATs: Remote Access Trojans and how to help avoid them from Microsoft.

Top ten viruses and hoaxes reported to Sophos in December 2005
What you can do.

Short of abandoning email and staying away from the Internet, we are all at some risk. We can, however, minimize risk by arming ourselves with (a) knowledge, (b) updated protection / security systems, and (c) communication. Also, of course, don't open unknown email attachments.

Knowledge

Sign up for email alerts through a trusted security company or monitor alert pages often. Also, make it a habit to read up on the most prevalent attacks. This way, you can recognize the signs of attack.

Here are links to three comprehensive virus/security sites:

F-Secure Security Information Center, includes information about viruses, hoaxes and other security risks.

Symantec Security Alert, sends email alerts of high-level threats, how to remove/detect viruses, etc. Also has a Security Response section on the site at http://securityresponse.symantec.com/ where you can read about current viruses and check your computer for vulnerabilities.

McAfee Security sends out alerts and breaking news. Also posts news and current threats on the site.

Updated Protection and Security Systems

In today's email and Internet environment, protection systems are no longer optional. Each computer with Internet/network/email access should have a good anti-virus and Internet security system installed and updated regularly (most have a feature that will automatically check for updates).

Some attacks exploit weaknesses in Microsoft software, so keep your Windows software up-to-date as well. Here is a link:

Microsoft's Windows Update center checks the software on your Windows computer then gives you a chance to download critical updates.

There are many firewall and anti-virus programs out there. Two popular choices are:

Norton Internet Security includes a firewall, virus protection, and other Internet security functions.

McAfee pcsecuritysuite protects your computer against viruses, hackers, and identity thieves.

Communication

Explain to others the importance of secure, protected systems and guide them to more information. If you are a writer or publisher, remind your readers to stay up-to-date and knowledgeable.

Virus and worm attacks are here to stay. That does not mean, however, that they must be detrimental to your business. Diligently follow these three steps and you will be prepared for the next wave of new viruses.

Klik disini untuk melanjutkan »»

How Computer Viruses Work

.
0 komentar

by Marshall Brain
Strange as it may sound, the computer virus is something of an Information Age marvel. On one hand, viruses show us how vulnerable we are a properly engineered virus can have a devastating effect, disrupting productivity and doing billions of dollars in damages. On the other hand, they show us how sophisticated and interconnected human beings have become.
For example, experts estimate that the Mydoom worm infected approximately a quarter million computers in a single day in January 2004. Back in March 1999, the Melissa virus was so powerful that it forced Microsoft and a number of other very large companies to completely turn off their e-mail systems until the virus could be contained. The ILOVEYOU virus in 2000 had a similarly devastating effect. In January 2007, a worm called Storm appeared by October, experts believed up to 50 million computers were infected. That's pretty impressive when you consider that many viruses are incredibly simple.
When you listen to the news, you hear about many different forms of electronic infection. The most common are:
Viruses
A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs) or wreak havoc.
E-mail viruses
An e-mail virus travels as an attachment to e-mail messages, and usually replicates itself by automatically mailing itself to dozens of people in the victim's e-mail address book. Some e-mail viruses don't even require a double-click, they launch when you view the infected message in the preview pane of your e-mail software [source: Johnson].
Trojan horses
A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk). Trojan horses have no way to replicate automatically.
Worms
A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.

Klik disini untuk melanjutkan »»
 
Namablogkamu is proudly powered by Blogger.com | Template by o-om.com