Tuesday, October 25, 2011

Viruses Circulating in Twitter Tweet Viewer




Want to know anyone who saw your profile on Twitter? Do not be easily fooled by 'tempting offer' like that. The problem now many circulating virus that has taken advantage of Twitter spammers are touting lose now you can see who has visited your profile.

Even some of the spam that contain words such as:

"WOW! You can see the WHO visits your Twitter profile. That's cool! - Http://bitly/tweetviewer "

(Wow! You can see who is visiting your Twitter profile. Cool! Http://bitly/tweetviewer)

"I just viewed my Top20 Profile stalkers. I Can not believe my EX is still checking me every day "

(I just see 20 profiles the top stalker. I can not believe that my ex still checking my profile every day)

Spam spam-tweet like that even have flooded Twitter tweet as much as 159 per minute. Applications mentioned are able to see who has visited your profile has become a predator that is right for the users of Twitter are really curious who have seen their personal profiles. When you try to access this application, users are asked to fill in a form that contains the Twitter OAuth and then the authorization is used without your knowledge. The application contains this virus can even change your account password as well.

This application can even run without visible when it is able to access your Twitter account. Well, for your regular twitter's should never click on an application that is not clear asalanya or to lure the ability to be able to see anyone who has seen your twitter.

This application was recommended through the link: http://bit.ly/tweetviewer, but very quickly the Bit.ly immediately block access to those links. At least 15,700 times a link has been visited based on the info from the Bit.ly. Beware, could have sprung up again later on a similar link with different names ready to target your Twitter account.

Monday, October 24, 2011

Gaps in Internet Explorer could let hackers to access files on the computer




On Wednesday, Microsoft warned of a gap in the browser Internet Explorer made ​​they can make an attacker to access files stored on computers in certain conditions.

"So far our investigations show if a user is using a version of Internet Explorer that does not run in Protected Mode, then chances are the attacker can access files that were previously known to the location and name," according to Microsoft as the security advisory.

There is a vulnerability the attacker would require knowledge of the file name they are going to access.

This information was last security issue in IE. Last month, an unpublished vulnerability found in IE 6 is used to attack more than 20 American companies, including Google, which then blame China. But then Microsoft to fix it.

The attack happened makes Google announced last week will not support IE ​​6, beginning from Google Apps and Google Sites in March.

IE Vulnerability announced Wednesday, and some versions of IE are vulnerable it is Internet Explorer 5.01 and IE 6 on Windows 2000; IE 6 on Windows 2000 Service Pack 4; and IE6, IE 7, and IE 8 in Windows XP and Windows Server 2003.

"Protected Mode prevents exploitation of this vulnerability and run by default for versions of Internet Explorer in Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008," said Microsoft.

Microsoft has not seen an attack that mengksploitasi gaps that exist and have not yet decided whether to improve the existing gap through their monthly security patch release or through emergency updates.

Friday, October 21, 2011

6 Myths Computer Virus




Tips on Overcoming Impaired Computer Device. THERE six myths about computer viruses. 

1. Monitor blinks 

This is one form of misunderstanding about the virus. Also some people think hardware damage caused by a virus. Though the virus is not part of the hardware. 

If one of the devices connected to the computer and do not function well mean having to be brought to a service center for repair or replacement. 

2. Blue screen 

When the screen appears the blue screen of death (BSOD), does not mean your computer is infected with a virus. It could be it is caused by damage to hardware or virtual memory. The best solution is not to reinstall Windows. 

All you need to do is write down the error code and look for ways of improvement in the Google search page. 

3. Svchost.exe processes running simultaneously 

Svchost.exe (Generic Host Process for Win32 Services) is an integral part of the Windows operating system and not a virus. This process manages system services that run from dynamic-link libraries (file extensions). 

For example Automatic Updates, Windows Firewall, Plug and Play, Fax Service, Windows Themes. Under normal conditions, some examples of Svchost.exe run concurrently. 

4. Each restart problem 

Getting error message in Windows when restart does not necessarily mean your computer is infected. Before doing the formatting system, you should see MSCONFIG.EXE to startup. 

5. Firewall must wear safety 

The firewall has nothing to do with a virus or trojan. Firewalls are designed to allow or deny the transmission network based on the rules and protect against unauthorized network access. 

6. Install antivirus virus free 

There is no antivirus that guarantees 100% protection. You should make sure to not download questionable material or go to the site in question.

Thursday, October 20, 2011

3 Ways to distinguish genuine or fake antivirus




Products of anti-malware (antivirus) fake / bogus is the type of malware that development is very fast. Sunbelt Software website recorded more than 760 anti-malware have been discovered over the last four years.

We will have no trouble recognizing the products antivirus / antispyware fake it, because they generally have names that seem 'wow', such as: "CoreGuard Antivirus 2009," "Malware Catcher 2009," and "Fast Antivirus 2009."

Usually we get this fake antivirus through direct download or a 'passenger' in another program and once it is in our computer then the task now is to inform the victim that his computer had been infected by the virus. The victim will get a pop up window appears on the computer screen with a message like: "YOUR COMPUTER IS Infected". This pop-up window also leads victims to scan the computer to ensure no malware / viruses that infect, but it also will be guided to buy their antivirus product by pointing to one website link.

Do not worry because the creator of this fake antivirus products simply scare it. If the victim to meet the wishes of the fake antivirus makers then surely he bought just a waste product - not a real antivirus. And what's worse is when the victim decided to buy the fake antivirus by using a credit card then the credit card information he could sell on the black market internet.

Create a home computer users may be somewhat difficult to tell which antivirus antivirus genuine and which fake.

Actually we do not find it difficult to tell which antivirus antivirus genuine and which false, 3 steps below to give us the knowledge to distinguish it.

1. Knowing the list of fake antivirus

One website that we can make to find information about a fake antivirus is http://rogueantispyware.blogspot.com/. In this blog is explained with detailed lists of fake antivirus and an explanation.

2. Look through the websites that provide information about the official antivirus products

To determine whether an antivirus is really official or not then we can look for the manufacturers. Here is a list of antivirus products and their official company name is taken from the VirusTotal website.
  • AhnLab (V3)
  • Antiy Labs (Antiy-AVL)
  • Aladdin (eSafe)
  • ALWIL (Avast! Antivirus)
  • Authentium (Command Antivirus)
  • AVG Technologies (AVG)
  • Avira (AntiVir)
  • Cat Computer Services (Quick Heal)
  • ClamAV (ClamAV)
  • Comodo (Comodo)
  • CA Inc.. (Vet)
  • Doctor Web, Ltd.. (DrWeb)
  • EMSI Software GmbH (a-squared)
  • Eset Software (ESET NOD32)
  • Fortinet (Fortinet)
  • FRISK Software (F-Prot)
  • F-Secure (F-Secure)
  • G DATA Software (GData)
  • Hacksoft (The Hacker)
  • Hauri (ViRobot)
  • Ikarus Software (Ikarus)
  • INCA Internet (nProtect)
  • K7 Computing (K7AntiVirus)
  • Kaspersky Lab (AVP)
  • McAfee (VirusScan)
  • Microsoft (Malware Protection)
  • Norman (Norman Antivirus)
  • Panda Security (Panda Platinum)
  • PC Tools (PCTools)
  • Prevx (Prevx1)
  • Rising Antivirus (Rising)
  • Secure Computing (SecureWeb)
  • BitDefender GmbH (BitDefender)
  • Sophos (SAV)
  • Sunbelt Software (Antivirus)
  • Symantec (Norton Antivirus)
  • VirusBlokAda (VBA32)
  • Trend Micro (TrendMicro)
  • VirusBuster (VirusBuster)
In addition, there are specialized companies that provide certification of antivirus products, such as http://www.westcoastlabs.org/. We can find the certificate of antivirus makers in there.

3. Looking for information on the Internet

This method is a conventional but effective way to find an antivirus product is genuine or fake. Simply type in fake antivirus products that make us hesitate, for example: "Malware Catcher 2009" and soon will come a lot of information about this fake antivirus.

Wednesday, October 19, 2011

Polymorphic Malware




Malicious programs that can change shape rapidly, polymorphic, are known to spreadaggressively. The spread occurs via email.

This report is the result of research and analysis of Symantec.cloud MessageLabsIntelligence Report and the Symantec State of Spam & Phishing Report.

Polymorphic malware types flooded up to the range of 72 percent of all malware that spreads via email in September 2011. Previously, the diffusion rate reaches 23.7 percent(July) and 18.5 percent (August).

Paul Wood, Senior Intelligence Analyst of Symantec.cloud say this has never happened before. Alleged cyber criminals increasingly aggressive in exploiting the weaknesses oftraditional protection.

There was also an effort of social engineering malware masquerading as emails from theprinter / scanner. Wood said, is actually not a printer or scanner are exploited in this attack.

What does it disguise malware authors are exploiting the increasing number of print-scanclever device that can be used to send emails. Users who do not carefully think there arecolleagues who can send the document.

Tuesday, October 18, 2011

AVI + Clamav: Thousands Prevent Attacks




One of the advantages AVI is the presence of add-ons (plugins). Thanks to this facility, the ability of AVI can be upgraded easily. One of the newest add-on is owned AVI Clamsav. This is the Clamav database add-on that integrates into the AVI database. That way, AVI now can ward off tens of thousands of types of attacks, both locally and internationally. One that makes a great antivirus in detecting computer viruses is the number of definitions of threats he had. The more definition, the better the antivirus in facing various threats that try to get into the computer.

AVI is one of the local antivirus that has a limited amount of threat definition. During this time, the database contains more AVI local viruses. This limitation is because the number of new viruses reported AVI users ranged only from Indonesia alone. This is why many people consider a local antivirus virus only powerful to overcome local residents.

Vice versa, beyond just antivirus powerful viruses overcome the outside only. Based on these facts, many people end up installing two antivirus at the same time: one local antivirus, antivirus another one outside.

But the AVI has a clever solution to overcome it. AVI now have add-ons (plugins) that integrates a new AVI with Clamav antivirus engines. What is Clamav? Clamav antivirus which is developed by the developers of the open source community http://www.clamav.net GPL (General Public License). You can get more information about the Clamav on his official website. Currently the number of threats that can be recognized definition Clamav approximately 49 thousand mostly dominated by the threat of viruses out. Now, by combining the original database and Clamav AVI, AVI is now able to recognize approximately 50 thousand threat!

Monday, October 17, 2011

Javascript is a "Weapon Spammers"




Javascript is reportedly increasingly popular technology used by the perpetrators of the spread of spam. Javascript used to hide them.

That is one of the results delivered by Symantec Intelligence Report for the periodSeptember 2011.

Through Javascript, according to the report, spammers can hide their web pages or to trick the direction in which the victim will be misled.

The web page that has been hidden by Javascript is then distributed via email toprospective victims of spammers.

Paul Wood, Senior Intelligence Analyst of Symantec.cloud said this increases the lifetime of the site due to fool the spammers who hijacked the site administrator.

In addition, Symantec found the exploitation of loopholes in WordPress to hijack a web site that runs the content management system. WordPress site itself is said not affectedby these actions.

Sunday, October 16, 2011

"Microsoft" 1 of 14 downloads Dangerous




CALIFORNIA - Never underestimate the warnings that appear in your browser when they wanted to download a program. Technology giant Microsoft is claiming at least one of the 14 programs that are downloaded Windows users turned out to contain harmful viruses. 

Despite growing attention to the current browser security by alerting users to potentially contain software viruses, but Microsoft noted there are still 5 percent of users who ignore the warning. 

Today, increasingly savvy disseminators of the virus spreading threats to other Internet users. Rather than hijack a browser, such as might be done five years ago, they tend to drive users to access their own virus. Send a link is not clear and encouraging users to download new software to access it is the mode of spread of the virus that was prevalent at this time. This mode alone is referred to as social-engineering. 

"The virus spreaders are aware it is not difficult to direct Internet users to download Trojan virus," said Alex Stamos, co-founder of a computer security consultant, ISEC Partners. 

Social-engineering hackers also often hijack home page and displays fake antivirus alerts. Users who fooled with the warning that antivirus software will download the suggested, without knowing that the program was actually a virus. 

In the world of enterprise, social-engineering technique called spearphishing this is a serious problem. The reason, the hackers are willing to take the time to create a specific program or document that is believed will make the user want to open it. 

Symantec Security Response Manager Joshua Talbot added that the hackers are going to take advantage of any momentum to spread malware. For example, by spreading false links about marriage between Prince William and Kate Middleton or death of Osama bin Laden.

Saturday, October 15, 2011

AVI: Antivirus InfoKomputer can block a million viruses!

Although long enough AVI update server is not active. The problems that we face are often experiencing server overload facing a flood of user update requests AVI. Every time we add power, each time the server must "give up" lost. 

But now we have found a solution. Taking the momentum of cloud computing, we also put the AVI update server on the network Infinys System. As we've said in previous editions, Infinys System is one of the first cloud computing service providers in Indonesia, the network and the reliability has been very evident. By putting in their infrastructure server updates, we are confident will be a powerful AVI to serve the needs of its loyal users. 

Once active, Server AVI will provide auto-update service. That is, the AVI which has been installed on your computer will automatically perform the update if there are any new updates. As for Clamav database will always be updated every day, so you do not have to wait next month to get the latest AVI. 

The technical updates we provide are divided into three kinds: 
  1. Full update. An update is called "full" when all components of the AVI need to experience the renewal of the core engine to a database. 
  2. Patch updates. This update occurs when only a few components that need to be updated. In this case, the auto-update does not need to download the entire data, but only few data are needed.
  3. DB update. AVI can perform database updates automatically. Database updates or update DB is divided into 2 types: Full and delta. Called full update when the database is updated by means overwrite the old DB to new DB. In Clamsav plugin, it can happen on the daily updates that have been more than a week is not updated. It should be noted, full update usually takes a lot of bandwidth. There is also a delta update happens when the database updates happen by partial differentiation algorithm. This method saves bandwidth usage because only the parts needed to update it. By default, the plugin Clamsav using this technique. 
In addition to auto-update service, AVI server is also used to download the latest updates. This is very useful if you want to do an update but does not have its own connection, so you can download it via a connection from the outside as from the cafe. 

AVI we provide updates on the server is equipped with a plugin Clamsav. This plugin adds the ability AVI able to detect hundreds of thousands of foreign viruses, so it currently has about 1 million more viruses that can be detected. AVI servers we also make the repository so you can get the AVI from the old version to the latest version.Every update, we will not remove the old version until the last 5 versions. This is useful when there is an incompatibility between versions, making it easier for us to do the troubleshooting for the purpose of fixing bugs. 

Going forward, we will also make this update server as a gathering place of the AVI plugin, so you can download separately between AVI and its plugins. 

To get the AVI, please download here (44MB). If the size is too large, you can get the AVI in DVD InfoKomputer each month. 

If you want to follow the development of AVI, please join the channel in www.mindtalk.com AVI-Antivirus. There will be available frequently asked questions, bug reports, or tips and tricks to overcome the problems associated with computer viruses. 

Friday, October 14, 2011

Virus Attack U.S. Combat Robot




A virus was found seeping into the military's weapons systems the United States. Not to steal data, but these malicious programs designed to control the fighting machine.

Viruses are not yet identified his name was known to have two weeks to sneak into the system controlling Unmanned Aerial Vehicle (UAV), which is a system for controlling aircraft as pilotless drones or predators.

The virus creators are designed to record all commands performed by the pilot. And it is not impossible, these malicious programs can take over control of the vehicle.

Although already known, but the UAV Squadron located at Creech Air Force Base, Nevada, United States pleaded not easy to tame the virus. They must remove the entire contents of hardsik then reinstall the entire system.

Not yet known what the impact caused by the virus, but a clear and predator drones that attacked U.S. soldiers were used to perform tasks of state secrets.

Thursday, October 13, 2011

Conspiracy theories manufacture and commercialization of anti-virus virus




A computer virus is no death, always emerging new viruses and new variants of existing viruses are ready to spread the threat to us.

If there there is also a computer virus antivirus and that's our main weapon in dealing with computer viruses malignancy.

Has it ever occurred to us why the hell there are people who diligently creating computer viruses? Does he want to be famous or he wants to be called 'elite' for his expertise to make a virus? Does he have enough to do, or maybe that was the job?

This paper appears because I was wondering if there might be some kind of conspiracy due to the mutually beneficial symbiosis between the creator of the virus by the antivirus industry so that the virus / antivirus remain crowded until now.

Conspiracy

Suppose one of the emerging new types of viruses quickly and one of the antivirus vendors to identify and clean up a computer from new viruses while the other antivirus vendors are so confused and slow to recognize this new virus.

From the above case could be one of the antivirus vendor employee A contact / cooperation with the virus creator to make a virus with the criteria he had set earlier, in the sense of making a booking virus. And so the antivirus vendor A is known as the antivirus vendors are quick and can clear the virus 'order' is.

Thought the above arise because I observed that the virus rarely seem consistent with the results of his work, but the early scene in some time just disappeared.

Conspiracy theories over just thinking of me just after it, and until now this conspiracy theory was never proven.

Commercialization antivirus

One time our computer got a virus when we've been installing antivirus therein. Antivirus on the computer can do nothing even to 'running' was not. We are definitely confused when faced with such situations.

From the illustration above, we will wonder why we install the antivirus can not do anything to prevent computer virus attack.

Apparently the problem is antivirus is updated regularly will be more robust in providing protection against the virus than an antivirus that is never updated at all. That is why we are encouraged to always update the antivirus.

For this one I got the idea from one of the forum on the internet why antivirus updates that must be regularly performed and why the antivirus vendors can survive / grow.

Current commercial antivirus generally works with a method called blacklisting and the plot as follows:

1. The new virus is found.
2. Virus "signature" is identified and placed in the blacklist.
3. Antivirus software to check files on our computer with what is in blacklist: if there is a match then the antivirus will take a certain action.

Such was the approach that has been used by antivirus vendors, but there are two big problems in it if you use such an approach:

1. Antivirus software and also we will always depend on antivirus companies continuously to update the blacklist. We will still be attacked by a new virus which antivirus companies have yet to find or create a file "signature" to it. We will not and will never be protected from the threat of new viruses because viruses are not discovered until there is an infected computer. If your computer has not got a virus that was because of luck and the fact that the antivirus companies have done an excellent job preparing the honeypot (computers that are open to new viruses and help mengindetifikasinya) that provides early warning when a new virus is spread. Most of us are lucky if there is arguably a new virus that has not infect our computers.

2. Due to the thousands of new viruses spread every year then the blacklist will continue to evolve. This means that antivirus software will be spending more and more computer resources (cpu time, hard drive space) which will affect the performance. The increase in cpu speed, memory and hard drive space will alleviate the problem (just do not try to run the latest version of Norton on the old computer). The fact that there is indeed if we run a commercial antivirus software then our computer will become slower.

The biggest problem is that users will always be bound by antivirus software because it must continue to renew the existing blacklist and there is the key why the antivirus vendors can continue to survive and thrive.

This method is essentially blacklisting antivirus software will say "no" to something that should not exist in our computer and the opposite is the method in which greenlisting than busy keeping anything that should not exist in our computer so it will keep the method greenlisting what should be in our computer.

If this greenlisting method employed by the antivirus makers course that users benefit because the user does not need to update and too dependent on the antivirus. Which eventually antivirus companies will not grow.

Wednesday, October 12, 2011

12 reasons why people create computer virus




Almost the majority of computer users do not want to name a computer virus. A computer virus is in the sense of a diverse program of its kind that is harmful, disruptive, annoying and dangerous, malware, spyware, adware, worms and Trojans.

That does not make us believe that is the reason why there are people in this world, the "fun" computer viruses computer users so angry.

There are many reasons why someone would invent a computer virus, for personal reasons, motives matter until the subject to make a spy for the odors. Let's look at the 12 or the reason why someone, a computer virus.

1. Anger

If anyone angry, I could not do that and if so, who are furious that a computer programmer who can make a computer virus. Imagine if the developer who is angry with a company employee who was angry with him because he is incompetent, a program for the company and finally to anger by a computer virus, the whole team attacks in the channel company.

2. Do it for 'pleasure'

Interestingly, if there are people who create computer viruses for fun or satisfaction of staff. People like this feel happy and pleased to see that their work was reported largely by print and electronic media and the "elite", which managed to destroy many teams.

3. Espionage

Espionage is the act of collecting information for any purpose other than to steal identities or their wealth. They usually work in the intelligence world, and make information for people who are above their target. Many people with hardware manufacturers in China are concerned, are concerned, there are backdoors into the hardware is intentionally planted by the Chinese government or the government of India with the RIM BlackBerry worried and called for a universal decryption key for all devices BB in the land is sold.

4. Gang online

A series of cyber-criminals in the alley. Turns out the band online was really real and it exists in cyberspace. For the sake of the prestige of his band, usually competing with others online rail street fight for the predicate best line.

5. Instinct hackers

Someone with the mindset of the hacker would have a strong interest in one thing and not easily satisfied, if he had his own practice. As an example, he wanted about the weaknesses of an operating system with HP to find a small program and I wanted to know how much influence the program ujicobakan little people around.

6. Money 

Besides personal satisfaction, apart from the dominant themes for the money. Many cyber criminals who are hired with a certain amount of money for spamming, DDoS, botnets and other can.

7. Policy 

Virus attacks, worms and DDoS attacks can be performed by a group of political reasons. I usually try to seek the public's attention to their existence and their desires, albeit in a negative way.

8. Story of romance and drama

Love can give strength to a phrase that is for lovers. But what if love aka love is not rejected, if they offer strength as well?

If love is a computer programmer or knowledge in this area and dark eyes, maybe even going to channel their emotions in a computer virus in a poem or message for fans who can not be your best man . There is a feeling like that?

9. Sabotage 

To mobilize perhaps under the pretext of revenge or competition, a person or company the ability to paralyze the whole system of other people's information, which is to destroy through the spread of a virus or other means to ensure credibility of the person or business rival. And this practice is a dirty practice that are classified as criminals.

10. Intellectual Challenge

The ego can be number one in something behind a person, a computer virus. Take the case only if anti-virus company anti-virus products, the movement to eliminate all types of computer virus is right, then people want to prove that it is the only person in the world, the virus that could not be detected do you put in place by the anti-virus.

11. Blackmail

Some people use their expertise to make a computer virus to blackmail others. They call it a virus Vundo/Antivirus2009/Antivirus360 receive the message "You are infected! Give sixty U.S. dollars in the U.S. and'll fix it!"

12. As a 'curriculum vitae'

Want to get a job at the company anti-virus? Just try a computer virus that is difficult to clean and have a way to clean it, then puts antivirus companies. It was exactly the same as creating a resume, but this time is that they are recognized and used by antivirus companies through the sale of "work" in the form of virus, they so wish.

Tuesday, October 11, 2011

Do not open the link for chat on Yahoo Messenger




It was an interesting day I received a few message Yahoo Messenger from a friend with a link to the web site address.

This phenomenon not only happens to me, but a friend had experienced the same thing, sent his friend a complete message with a link to them through Yahoo Messenger.

Examples of message like this:

(10:38:25) multea_id: Photos: http://foto-spaces.com/image.php D

(10:59:31) wina_06: Photos: http://msnlmages.com/image.php D

YM's friend has suddenly sends a message like that, I suppose, gave me the opportunity of their computers infected with viruses or their YM account by someone else, because these two possibilities have been kidnapped in the same situation, our IM account to automatically adjust their messages to friends of friends in YM.

So if you are our friend, despite being very good friend that a complete message and a link to the example above, you should not click on them directly, I ask in advance what you meant to send a link.

Monday, October 10, 2011

Tips to remove a virus that can not be handled Anti virus




There is a very powerful tips to remove the virus, if the various Anti Virus that we use completely helpless against it (probably only be able to detect, but can not delete it). To do this would require a bootable CD that contains a minimum of File Manager program, such as Ultimate Boot CD, BartPE and the like. Some programs are DOS based and others are windows based. Or it could also use a Linux Live CD, like Knoppix, Ubuntu Live CD and others. In general, the following steps: 
  1. Find the location of the virus, especially the origin of the virus is running on the computer (the host). If you are having difficulty.
  2. Once obtained, note (note) information such as file size, date (although the virus can change the size and date, but most always the same size and date. It could look similar file and note its location.
  3. Once obtained, use one of the Bootable CD and restart the computer to boot from the CD (you may need to set its BIOS to boot first before the CD / DVD-ROM).
  4. Open the file manager program, which is available. If windowsnya NT, XP or above, make sure the program supports reading NTFS format.
  5. Find the file / virus and delete or if still in doubt, rename it from *. exe to *. VRS example.To convince, use the search facility to find files with the same size or nearly the same date. If found to be rename
  6. Back restart the computer and check again.

Sunday, October 9, 2011

Clean Time Uninstallasi Antivirus with "AppRemover"




Uninstall process security software such as antivirus software is not really different from others, but not rare in the uninstall antivirus difficult, or when it's in good uninstall often leaves residual files or settings on the computer, so when want to install another antivirus is often problematic. To overcome this, we can use AppRemover. 

AppRemover is a free software that were created especially to remove the antivirus (uninstall) that exist on the computer and will try to clean all the remnants are usually left behind when the process uninstallasi uninstallasi usual or when the process is not successful. 

In addition to supporting tens Antivirus, AppRemover also able to remove Antispyware products. The list is also constantly updated in line with this software updates itself. Here are some products that are supported by AppRemover: 
AppRemover can run on Windows 2000, 2003, XP (32/64 bit), Vista (32/64 bit), 2008, Windows 7 (32/64 bit). Programs that have a size of about 5.2 MB is not necessary to the installation (Portable), so after the download can be directly executed. 

Use of AppRemover 

Use of this software is relatively easy, Appremover.exe previous download (5.2 MB), then immediately after the run. After the first display window, just click Next. Here we can choose two options: 

Remove Security Application. choose if we want to uninstall the antivirus (security products) 

Clean Up Failed Uninstall. Select if you have to uninstall but did not succeed (fail). Or also to remove the remnants of which are in the uninstall antivirus that may be left on the computer. 

Once we choose one of the above, then the scan or check the software installed on your computer. which then can we choose to uninstall or remove it (more information at http://www.appremover.com/)

Saturday, October 8, 2011

Download Avira Free Antivirus 2012




Based on the latest antivirus test of av-comparatives, Avira is one antivirus that has a virus detection (malware) is high. In addition to AVG and Avast, Avira is also one that provides antivirus free version with Avira Free Antivirus her. 

Through a press release, Avira explain some new features in this 2012 version, among others: 

Display (user interface) is a new, more sleek and modern look. Options are set by function, and automation when there is conflict when installing software. Simplified the installation process, some components in changing his name to let users more easily use without having to read the manual. In addition there is an additional one-click button "Fix Problems" to fix any problems that might harm the computer user. 

Smart Code, Avira has improved the detection ability of malware (virus) to outwit antivirus malware that hide from ordinary, including hiding deeper in the operating system 

Stronger Detection, Avira also offers a more robust detection such as being able to walk without a lot of keys in the registry, a better defense of the virus either from destruction or removal, etc. 

For premium products, increased customer support issues by providing a direct connection with the technical side. 

In addition to these features, considering that running 2 security software (antivirus) can be a negative effect on the stability and performance of computer, automatic detection and removal of incompatible software Avira added in the installation process, but to still include the option to the user. 

Through the forum, http://forum.avira.com, for Avira Free Antivirus 10 users update to the new 2012 version is available starting on October 13, 2012. But if you want to immediately use or replace with Avira Free Antivirus 2012, can directly download the installer it through the pages download free avira antivirus 2012 and then stay installed, if there is an older version will automatically upgrade. 

To be able to use Avira Free Antivirus 2012, which required a minimum operating system is Windows XP SP3 32bit or 64bit Windows XP SP2 or Windows Server 2003 SP2. Under the operating system version is not supported (Windows Vista and 7 of course supported) 

Thursday, October 6, 2011

Prevent Malware on Mac OS X




Recently been discovered a new type of Trojan that attacks Mac OS X platform Threat targeting the Macintosh computer and appears as a Mandarin-language PDF files. In addition, there are also malware to infiltrate through the Adobe Flash installer false. If the Trojan is detected as a form of a PDF file OSX / Revir.A and OSX / Imuler.A, this Trojan identified as OSX / Flashback. 

To prevent the risk of the Threat, here are some recommended ways to researchers at the Lab ESET Malware Intelligence. 

1. Never open attachments or e-mail attachment that you do not want to accept it, unless it has been no confirmation first. Make sure that you only receive emails with attachments that have been confirmed by the sender. This might be a bit complicated, but think about the implications for your security. 

2. When downloading files online, do not believe it to sites that have no reputation.Moreover, no authority as an outlet to distribute content. 

3. Run the antivirus program / antivirus software to the Internet on all devices that can be connected to the Internet. For example ESET Cyber ​​Security for the Mac which successfully detected the Trojan and identify it as OSX / Revir.A and OSX / Imuler.A. 

4. In the case of OSX malware / malware Flashback.A although it's not a big threat, but to the users need to be reminded again to carry out preventive measures. Namely download Adobe Flash and Acrobat software only from the Adobe.com site, turn off the Safari settings so as not to open a new file is downloaded automatically and the latter, run an antivirus program or antivirus software for the internet in realtime and always updated.

Friday, September 30, 2011

Eradicate the virus with free software CaSIR




Most of us probably have experienced often or how much hassle and not easily eradicate the virus, some virus may be eradicated by antiviral used. But not infrequently there is a virus (malware) is quite powerful and not easily eradicated by ordinary means.There is a small software that we can try, his name CaSIR. 

CaSIR (Common And stubborn Infections Remover) was formerly a paid software, but now turned into a free (Freeware). Small software which no more than a half megabytes (MB) is a tool that can be used for cleaning computers already infected with viruses, malware and the like. In a special design to handle a stubborn virus, and usually on a computer virus has been ineffective or even have the infection. 

This application should be used if the various alternatives for removing the virus is no longer effective (last alternative). Use existing antivirus first, and if there is a problem with blank screen after using this software. In addition to clean / remove a stubborn virus, including registry entries, and the rest are abandoned, CaSIR also do the following: 
  • Restore some of the settings are turned off due to virus
  • Removing applications (services / processes) used by malware illegal
  • Trying to identify and directly off the process (application) that is running and unknown (invalid)
  • Delete code, registry or road which allows the malware to run automatically (autorun)
  • Can be used to perform scans at various other storage media
  • Cleaning the registry of entries that are harmful
  • Malware database can be updated
How to use this software is fairly easy, once downloaded, extract the two files in the zip, ie CaSIR39.exe (main application, the name corresponds to the version, here CaSIR version 3.9) and casirdef.cas (file / database of malware definitions). Next run CaSIR39.exe in normal conditions, then click the Start button, wait a minute and if it detects malware (viruses) or setting that is not standard, the computer will automatically restart to fix the computer. 

Because CaSIR is a software security related files and registry systems and applications (services / processes) that are running, then it must be run with administrator privileges, including turning off or disabling UAC first (especially for Windows Vista and 7). And maybe there is an antivirus that detect / block these applications. CaSIR Do not run in Safe mode, because the work will not be optimal. If the computer is connected in a network, disconnect or unplug the network cable first before running CaSIR. 

There are also CDS Jobs button that serves to conduct more in-depth scan by comparing with a database of malware. (CDS = CaSIR Deep Scanner). This feature can be used if the Start button has been tried, but the results still did not agree with what we expect. 

Tools can be used for Windows XP, Windows Vista, Windows 7 (32Bit). So if you use a 64bit system, you should not try to run this application. Download the latest version and more information, please visit the website CaSIR

Alternative download: CaSIR - Box.net or CaSIR - 4shared (167 KB)

Wednesday, September 28, 2011

Download the latest version, Free Avast Antivirus 6.0




Avast is an antivirus that is quite popular, especially for the category of free antivirus.Not only because of the free, but the features included relatively abundant, even in its free version though. Preceding the other antivirus products, Avast has just released a new version of antivirus products, Avast Antivirus 6.0. This new version features and certainly gives a new look, so for users of version 5, should not miss this new version. 

Free Avast Antivirus 6.0 provides features quite a lot, which is usually only given in other products in the paid version, this is certainly encouraging news, especially those that have limited funds and have not been able to buy a paid antivirus. Some new features or advantages Avast Antivirus 6.0 include: 
  1. Auto Sanbox - the first automatic virtualization feature for categorical Antivirus. AutoSanbox identify malicious applications (suspicious) and automatically displays a message to the user whether to run these applications in a secure virtual machine. If the application is malicious then the virtual machines will avast shutdown and the computer / PC will remain safe.
  2. WebRep - the reputation of a website is a guide and malware. WebRep will blend with the search results on search engines, by combining information from the community as well as existing data suda, to declare the reputation of a website if it is safe or not to visit.
  3. More Internet Protection - Additional options for internet protection. Avast includes protection for both Web and script protection, protecting both the level and the level of the HTTP web browser, including to block certain websites.
  4. Know what's bad - Recognize and stop billions of malware (virus). The development of malware / virus is very fantastic, and Avast has stopped about 1.2 billion virus until January 2011. Avast get 12 000 unique virus samples every day from the information users.
  5. Avast get pretty good ratings in some recent antivirus tests. Avast Antivirus 6.0 and also maintain the scan speed and performance.
  6. Free - The free version includes all these features are provided, as well as a variety of key features from previous versions. 
General Features: 

In addition to the above new features, overall, Free Avast Antivirus 6.0 provides a variety of features, among others, as follows: 
  • Engine Antivirus and Antispyware
  • Real-time anti-rootkit protection
  • Avast WebRep (new)
  • Avast CommunityIQ
  • Boot time scanner
  • AutoSandbox
  • Intelligent Scanner
  • Green computing
  • File system shield
  • Mail Shield
  • P2P Shield / IM Shield
  • Network shield
  • Script Shield
  • Behaviour shield
  • Supports 64bit system
  • Heuristic Engine 
For explanation and more information, please visit the website directly Avast Free Antivirus. To run a Free Avast Antivirus 6.0, the computer needed a minimum of a Pentium 3 with 128 MB RAM and 300 MB hard drive. Can run on Windows XP (SP 2 or higher), Windows Vista (except Starter Edition) and Windows 7. 

Tuesday, September 27, 2011

3 New Features Norton Internet Security 2012




Total losses from cyber crime were reached hundreds of billions of dollars. It was so 'whip' for the manufacturer of anti virus, including Norton, to provide a more capable security system. 

"The total loss caused by cyber crime reached USD 388 billion. The money was issued for the recovery of the laptop, the purchase of new devices, and others," said Effendy Ibrahim, Internet Safety Advocate & Director, Asia, Consumer Business, Symantec at the Grand Hyatt Jakarta Hotel, on Thursday (09/22/2011). 

Recognizing an increasing number of crimes in cyberspace which along with the increasing number of users of smartphones and tablet computers, made by Symantec's Norton released her new products: Norton Internet Security and Norton Antivirus 2012

In the Norton 2010 security product, Norton brings a new key features to allow users to gain a stronger shield, among them: 

Norton Indentity Safe in the Cloud - It protects personal and financial information from the user cybercrooks. Users also are protected from accessing fraudulent Web sites are gathering popularity. 

A simpler UI, ease of login and the ability to store passwords in clouds (cloud) in the new Norton product is claimed to allow a user in the access it from any computer that has installed Norton Internet Security 2012. 

Norton Management - new Web-based functionality allows users to manage their Norton products from anywhere. This management includes the addition of Norton products, managing security settings and improvement of long-distance subscriptions. 

Norton Insight - an exclusive Norton security technologies that make use of reputation-based software patterns pengadposian anonymously from millions of Symantec users.He will automatically identify and block malicious software foreigners. 

In addition to the above key features, Norton also added Download Insight to check every downloaded file before installation. 

Then with Norton Secured, Security Badge, the user who likes 'googling' will receive notice of a reputation with the search results display a rating in the search result.

How to Login Email Account Safe from Hackers




Each of us is going to open an email we should be vigilant and careful not to carelessly login at any place without mempehitungkan security aspects. Negligence may result in your password can be known by others either experienced or inexperienced. Usually, the hacker / cracker email address that has managed to get the password and get into the victim's e-mail will read personal email, delete email, change the settings, sending nasty emails, and even change the password and may also delete your email address for ever. For that we must be careful in maintaining the confidentiality of the password e-mail us. 

There are several things to consider to keep our passwords are not known by others:

1. Change your email passwords that are difficult to guess
Avoid using passwords that are short and common words found in dictionaries, good dictionaries Indonesian and English. Usually the email hacker will try one by one the words in the dictionary to open our emails. We recommend using a password that consists of 6 characters or more. Longer is better, but lest we forget our own passwords. Then insert or insert characters instead of letters or numbers into our password. Can also combine uppercase and lowercase letters in passwords. 

2. Be careful when opening email address from public places
If we open the e-mail from the office, cafe, friends house, home Sodara, neighbors, and so on that are not our own personal computers we should not type in passwords directly through the keyboard. Sometimes people we know or not know to install and install spy programs that can see what you type on the keyboard and send it to email that has been set. The fix is ​​a can with a keyboard maouse program in Windows XP or can one make or bring their own from the floppy or CD from the mouse or keyboard online on the internet. How to use it is to click the buttons available on perogram is intended to form the password field. Another way is to copy and paste from an existing or tilisan we have prepared. Do not forget to randomize the password rather not be legible and understandable to others who read it. Create a simple website or blog-edged codes that only you can understand it. Then copy and paste any of the codes which will form the password e-mail address. 

3. Be careful opening email on your personal computer
Run anti-virus programs or anti-spyware that is updated no more than 2-3 months. Plus the program always run a firewall when surfing the internet to block connections that are not desirable either from within or from outside our computers which are usually aimed bad to us. The program sets that I recommend adalan AVG anti-virus, anti-spyware Ad-Aware and McAfee firewall. Frequently run the application by definition updates and patches to eliminate any possibility of viruses and spyware that we do not want. 

4. Change your passwords periodically email address
By replacing a regular basis it will be difficult for people who want to take over your email. But once again do not be reckless, so forget your passwords. 

5. Distinguish email account passwords with one another
Contains so then when one of our email accounts fall into the hands of hackers then we have a long email backup we use. 

6. Log on the website right 
Look at our browser whether the address to log into our email is correct. Do not let us enter passwords at websites that deliberately similar to trap us. Understand the true path system naming the url address that we usually pass. If you suspect you should not log on and check with others who are more familiar. 

7. Diligent Search for Information 
Diligently seek out developments in e-mail hacking websites, or in the mailing list. From time to time, the hackers will discover and refine techniques to make you miserable evil of losing access to the e-mail us. 

If you have lost access to enter the email address you will use a recovery technique by inserting the data in question and click on the links that were ordered e-mail service provider. If you forget the data or the data has been changed by hackers, then immediately say bye-bye and good-bye to your old email address and immediately create a new email address.

Monday, September 26, 2011

One Norton, Antivirus Multi Tool




This is a personal service that will protect Norton users who have more than one device, so they have the option to combine the appropriate solutions to them. In addition the service also reduces the hassle and worry in the securing and manjaga user's PC or mobile device devices have generally been connected to the Internet. 

One is Norton's own service plan will be launched in the first quarter in 2012. Currently all devices such as desktop computers or PCs, laptops, tablets, mobile phones and many other home devices that are connected via the internet. 

All devices mentioned above require security from online threats, but protection must now give than just basic security and must meet the different needs of all households connected devices. 

"One is Norton's first membership-based products industry that includes multiple operating systems and security devices. Starting from PCs, Macs and mobile devices. One of the best advantages is that this service can be managed from a single user interface with a single access and can be accessed from a distance further, provided that is connected to the Internet, "Jason Mok, Consumer Sales Manager (Malaysia, Indonesia and Thailand), Symantec, at the Hotel Intercontinental, Jakarta.

While Effendy Ibrahim, Director for Consumer Business in Asia, Symantec manegungkapkan Indonesa is a very potential market for Symantec as Internet users in Indonesia is very high and optimistic Symantec to launch Norton One which is a membership subscription by giving users the option with only one access only.

Target Cyber ​​Crime Victims




Crime in cyberspace is a threat to Internet users. But who among all users who are most vulnerable to becoming victims of cybercrime? 

According to the survey by security firm Symantec in 24 countries earlier this year, the men are the users with the most potential victims. Collection of 20,000 respondents, 72% of victims of cyber crime are men, while the proportion of women remains below 65%. 

There are several reasons for this. After Effendy Ibrahim's statement as a lawyer and director of Internet Security, Asia, Symantec Consumer Business, this is because older people use the Internet than women. 

"In the virtual world, many men an activity that" endanger, said, "how to access online gambling sites with pornographic content," Effendy Norton 2012 Press Launch Event at the Grand Hyatt in Jakarta on Thursday ( 09/22/2011). 

Cybercrime claimed the lives of many of the incredible 1 million victims each day, or 50,000 deaths per hour. This figure, when the number of babies born each day which compares the number twice. 

Presented by Effendy addition, in the case of cyber crime, malware and virus remains a "tool" of the most used by criminals. 

Besides revealing the fact that men are more likely to victims of cybercrime, which are potentially the crimes of this type are those between 18-32 years. Unfortunately, respondents who were investigated by Norton, 41% say they have no security software.

Sunday, September 25, 2011

Understanding and TYPES OF ANTI-VIRUS




Antivirus is a type of software that is used to detect and remove computer viruses from computer systems. Also called Virus Protection Software. This application can determine whether a computer system has been infected with a virus or not. Generally, this software runs in the background and do a scan of all files that are accessed (opened, modified, or when saved). Most of the antivirus to work with some of the methods as below:
  • Detection using virus signature database (virus signaturedatabase): The workings of this antivirus is a widely used approachby the traditional antivirus, which look for signs of the presence of the virus by using a fraction of the virus code that has been analyzed by antivirus vendor, and has dikatalogisasi according to its type, size, power destruction and several other categories. This method is particularly fast and can reliably detect viruses that have been analyzed by the vendor antivirus, but it can not detect the new virus until the virus database. The new signature is installed into the system. Virus signature database is can be obtained from antivirus vendors and generally can be obtained free of charge via download or via subscription (subscription).
  • Detection by the way how the virus works: How it works antivirus Such an approach borrowed from the new technologies applied in the Intrusion Detection System (IDS). This method is often referred to as Behavior-blocking detection. This uses a policy (policy) that should be applied to detect the presence of a virus. If there behavior of software that is "not reasonable" according to the policy being applied, as well as software that tries to access address book to send a mass e-mails to e-mail list who are in the address book (the way it is often used by viruses to transmit the virus through e-mail), then the antivirus will stop the process that performed by the software. Antivirus also can isolate the code-code that is suspected as a virus until the administrator determines what will do next. The advantage of this method is the antivirus can detect any new viruses that have not been recognized by the virus database signature. The drawback, obviously because of the antivirus monitor the workings of the device software as a whole (not monitor the file), then the frequency of antiviral making a false alarm or "False Alarm" (if the configuration of the antivirus too "Hard"), or even allow the virus to multiply in the sistem (If the configuration of the antivirus too "soft"), false positives occur. Some manufacturers call this technique as a heuristic scanning. Antivirus which uses behavior-blocking detection are still few in number, but in the foreseeable future, most likely all the antivirus will use this way. Some antivirus also uses two methods above are well
The following table contains some antivirus products on the market and Web Sites:

AntiVirus Anyware = http://www.helpvirus.com
AVG Anti-Virus = http://www.grisoft.com
Vexira Antivirus = http://www.centralcommand.com
Antivirus wave =  http://www.cyber.com
Spider Guard = http://www.dials.ru
F-Prot Antivirus =  http://www.f-prot.com
F-Secure Anti-virus = http://www.fsecure.com
RAV AntiVirus =  http://www.rav.ro
AntiVir and AntiVir Personal Edition = http://www.antivir.de
ViRobot, DataMedic, Live-Call = http://www.hauri.co.kr
WinProof and ExcelProof  =  http://www.hiwire.com.sg
Kaspersky Anti-Virus (AVP) = http://www.kaspersky.com
VirusBuster II =  http://www.leprechaun.com.au
Email scanning services  =  http://www.messagelabs.com/viruseye
MKS Vir  =  http://www.mks.com.pl
McAfee Anti-Virus and McAfee Virus Scan  =  http://www.mcafee.com or http://www.nai.com
AV InVircible  =  http://www.invircible.com
Norman Virus Control  =  http://www.norman.no
Panda AntiVirus  =  http://www.pandasoftware.com

Virus Striker Delphi Applications Based Evolved




The evolution of malicious programs (computer viruses and malware) judged likely to increase not only in intensity and escalation, but also the ability, mode, and the level of losses incurred. 

According to security firm Eset, it is increasingly asserted that cyber criminals develop increasingly serious malware. One of the unique virus were detected Eset is a new variant virus that infects the Delphi programming language that is Win32/Induc.C. 

"Unlike its predecessor, the C variant has a payload of malware that can infect files, and able to replicate themselves," said Eset. 

Eset own previously Win32/Induc.A review about viruses, which infect files Delphi.Although technically the information is not detailed, Eset find interesting aspects and unusual aspect of the virus is not directly attack the files that can diexecute, but instead makes a list of standards in the Delphi programming environment as a target objective. 

As a result, all applications are in the Delphi IDE will be infected and likely inspired the developers of a paper written by Ken Thompson, who elaborated on the method of infection by modifying the C compiler 

"Even if the malware is really only infects applications with Delphi installed, malware will quickly spread to areas where there are applications written with Delphi programming language. Where ironically some malware is also written in Delphi," said Eset. 

But beyond the issue of interest is the mechanism of infection, Induc.A not have a malicious payload. Unfortunately, two years later everything changed, with the emergence of new variants of Variant C. 

Induc.B version Eset were detected in July 2011 did not have significant differences with the previous version that is not too distracting, but the code is being rewritten on Induc.B experienced some development that needs to be addressed: 
  • Just as in Win32/Induc.A, Win32/Induc.B infect ranging from Delphi version 4.0 to version 7.0. Induc.B also, a little more savvy in finding a place where the programming environment installed directory and contains the name of the company. 
  • In addition to making Delphi as a target, Induc also able to infect the Borland Developer Studio (BDS) and Codegear BDS. 
  • Several anti-debugging techniques introduced. 
  • Some simple XOR encryption began to be used to modify the code, making it difficult analysis of the code. 
The latest variant of the virus known as Win32/Induc.C, appearance has undergone a far more dramatic changes. Eset first time succeeded in identifying the version of C in August 2011. Code in C variant, is entirely different from its predecessor, the similarity is only found in its function alone is equally infect Delphi. 

According to them, although the mechanism of infection has undergone a change and it only infects Delphi applications, the new variant has also been equipped with new vectors to infect all. Exe file. 

The most significant changes is the addition of functions downloader. Induc.C will create a backdoor for other malware can be downloaded and activated, thus its malware capabilities will increase. 

By comparing the versions of the virus, more apparent that the first version of Induc is a Beta version or still the development stage, in which the writer was doing experiment with various methods according innovative infection.

Saturday, September 24, 2011

CIMB Niaga So Target Customer Data Theft




Jakarta - A bogus email circulating on behalf of Bank CIMB Niaga. For reasons of security, potential victims are asked to change the data used in internet banking services that led to the theft of sensitive information. 

According to Alfons Tanujaya, antivirus and internet security experts from Vaksincom, the action is quite clever. Perpetrators are no longer using a particular domain, but rather an extension attachment .Mnt attached in an email.

"Appendix that when opened as a web CIMBclicks but are local (computer users). It is clear that local is false, and if the login credentials directly brushed" said Alfons.

Files ending in. Mht is true. Mhml are usually used to archive a website. Facility is utilized actors to make fake bank's site actually lies in the Temporary Internet Files folder.

Here are excerpts email sent to a number of perpetrators of Internet users, including customers outside the bank CIMB Niaga.

Attention Dear Valued Customer,

We have received complaints from clients on related matters and Internet banking because of this complaint, we have decided to change our Internet Banking Server to the UK-based servers for better security. 

With the help of our partner banks, we have decided to change our banking server using 3D Authentication and is highly recommended that the program is effectively active in your account within the next 24 hours. Any account not run this program after 24 hours will be suspended. 

Download the attached file and follow the instructions to proceed. 

This message is for CIMB customers only and you are advised to follow the instructions carefully. 

Thank you for your time. 

Internet Security Department 
CIMB NAIGA

List of Most Dangerous Computer Virus Year 2010




VBScript type virus attack is still very high, as is evident from the many reports that complain about this kind of script viruses. One virus that soared high into the first sequence is Discusx.vbs. If you still remember with these viruses, the Virus Top-10 March 2008 issue of the past, viruses Discusx.vbs was in the order of 5, but this time he shot up to first order. The following list details: 

Spoiler for virus 1: 
1. Discusx.vbs 
VBScript viruses on this one, has a size of approximately 4,800 bytes. He will try to infect the multiple drives in your computer, including flash disk drive, which if infected will create the file autorun.inf and System32.sys.vbs on the root drive. In addition, he will change the caption of Internet Explorer into ".: Iscus-X SAY MET LEBARAN! [HAPPY LEBARAN ?!]::.". 

Spoiler for viruses 2: 
2. Reva.vbs 
Again, the virus types that VBScript pretty much complained of by some readers. He will try to spread itself to every drive on your computer including flash disk drive. In the infected drive will reva.vbs files, autorun.inf, and shaheedan.jpg. In addition, he will change the default page of Internet Explorer to point to other sites 

Spoiler for virus 3: 
3. XFly 
PC Media Antivirus identifies two variants of this virus, namely XFly.A and XFly.B. Just like most other local viruses, he created using Visual Basic. Has a body size of 143,360 bytes with no in-compress. And he can masquerade as folders, MP3 files with WinAmp or any other way directly change the existing icon resource in the body. It would be more difficult for the layman user to recognize it. At the infected computer, when running Internet Explorer, its caption will change to "..:: ::..", x-fly and when you start Windows will display a message from the maker of the virus in the default browser. Or every time show at 12:30, 16:00, or 20:00, the virus will display a black screen that also contains a message from the virus creator. 

Spoiler for virus 4: 
4. Explorea 
Viruses that are compiled using Visual Basic comes with a size of about 167,936 bytes, without being compressed. Using the standard Windows folder icon similar to defraud victims. This virus will attack your Windows Registry to change the default open of several extensions such as. LNK,. PIF,. BAT, and. COM. At the infected computer, in times when certain error messages sometimes appear, for example when opening the System Properties. 

Spoiler for virus 5: 
5. Gen.FFE 
Gen.FFE or manufacturer named Fast Firus Engine is one of the locally made program Virus Generator. By simply using this program, did not take long to create a virus / new variant. Viruses of the output of this program using the icon-like image standard default Windows folder. He also will block access to Task Manager, Command Prompt, and eliminate some of the menu in the Start Menu. He will also read the caption of an active program, if there are strings associated with the antivirus program will soon be closed by it. 

Spoiler for virus 6 to 10: 
6. Empty 
Viruses are also created using Visual Basic and had a folder icon has a size of about 110,592 bytes, without being compressed. Lots of changes he made in Windows, such as the Registry, File System, and so forth, which can even cause Windows can not be used as appropriate. On computers that are infected by this virus, when you start Windows will display a message from the virus creator. 
7. Raider.vbs 
VBScript virus type size is approximately 10,000 bytes, if the virus file is opened with Notepad for example, it is not a lot of strings that can be read because of the encrypted condition. In the Registry, he also gave recognition to create a new key in HKLM \ Software under the same name as the name of the computer name, the contents of a string value as a virus, Raider, and the date of the first computer is infected. 
8. ForrisWaitme 
Viruses are created with Visual Basic using the Windows default folder icon similar to the disguise. Some of his actions was to swap the functions of the left with the right mouse button, removes the Folder Options menu, create a file the message "read saya.txt" on the drive is infected, and there are still others. 
9. Pray 
Local virus was created using Visual Basic. We found two variants of this virus, for variant Pray.A not have an icon, while for variant Pray.B use Windows Explorer-like icons. If your computer is infected by this virus, when the computer clock on the show at 05:15, 13:00, 16:00, 18:30, or 19:45, the virus displays a message reminding the user to perform prayers. 
10. Rian.vbs 
VBScript virus has a size of 3788 bytes. When infected, it will create new files autorun.inf and RiaN.dll.vbs on each root drive that is installed on the victim's computer, including the Flash Disk. Computers that are infected by this virus, the caption of Internet Explorer will change to "Rian P2 Cantiq PR.

Popular Posts