Tuesday, October 25, 2011

Viruses Circulating in Twitter Tweet Viewer




Want to know anyone who saw your profile on Twitter? Do not be easily fooled by 'tempting offer' like that. The problem now many circulating virus that has taken advantage of Twitter spammers are touting lose now you can see who has visited your profile.

Even some of the spam that contain words such as:

"WOW! You can see the WHO visits your Twitter profile. That's cool! - Http://bitly/tweetviewer "

(Wow! You can see who is visiting your Twitter profile. Cool! Http://bitly/tweetviewer)

"I just viewed my Top20 Profile stalkers. I Can not believe my EX is still checking me every day "

(I just see 20 profiles the top stalker. I can not believe that my ex still checking my profile every day)

Spam spam-tweet like that even have flooded Twitter tweet as much as 159 per minute. Applications mentioned are able to see who has visited your profile has become a predator that is right for the users of Twitter are really curious who have seen their personal profiles. When you try to access this application, users are asked to fill in a form that contains the Twitter OAuth and then the authorization is used without your knowledge. The application contains this virus can even change your account password as well.

This application can even run without visible when it is able to access your Twitter account. Well, for your regular twitter's should never click on an application that is not clear asalanya or to lure the ability to be able to see anyone who has seen your twitter.

This application was recommended through the link: http://bit.ly/tweetviewer, but very quickly the Bit.ly immediately block access to those links. At least 15,700 times a link has been visited based on the info from the Bit.ly. Beware, could have sprung up again later on a similar link with different names ready to target your Twitter account.

Monday, October 24, 2011

Gaps in Internet Explorer could let hackers to access files on the computer




On Wednesday, Microsoft warned of a gap in the browser Internet Explorer made ​​they can make an attacker to access files stored on computers in certain conditions.

"So far our investigations show if a user is using a version of Internet Explorer that does not run in Protected Mode, then chances are the attacker can access files that were previously known to the location and name," according to Microsoft as the security advisory.

There is a vulnerability the attacker would require knowledge of the file name they are going to access.

This information was last security issue in IE. Last month, an unpublished vulnerability found in IE 6 is used to attack more than 20 American companies, including Google, which then blame China. But then Microsoft to fix it.

The attack happened makes Google announced last week will not support IE ​​6, beginning from Google Apps and Google Sites in March.

IE Vulnerability announced Wednesday, and some versions of IE are vulnerable it is Internet Explorer 5.01 and IE 6 on Windows 2000; IE 6 on Windows 2000 Service Pack 4; and IE6, IE 7, and IE 8 in Windows XP and Windows Server 2003.

"Protected Mode prevents exploitation of this vulnerability and run by default for versions of Internet Explorer in Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008," said Microsoft.

Microsoft has not seen an attack that mengksploitasi gaps that exist and have not yet decided whether to improve the existing gap through their monthly security patch release or through emergency updates.

Friday, October 21, 2011

6 Myths Computer Virus




Tips on Overcoming Impaired Computer Device. THERE six myths about computer viruses. 

1. Monitor blinks 

This is one form of misunderstanding about the virus. Also some people think hardware damage caused by a virus. Though the virus is not part of the hardware. 

If one of the devices connected to the computer and do not function well mean having to be brought to a service center for repair or replacement. 

2. Blue screen 

When the screen appears the blue screen of death (BSOD), does not mean your computer is infected with a virus. It could be it is caused by damage to hardware or virtual memory. The best solution is not to reinstall Windows. 

All you need to do is write down the error code and look for ways of improvement in the Google search page. 

3. Svchost.exe processes running simultaneously 

Svchost.exe (Generic Host Process for Win32 Services) is an integral part of the Windows operating system and not a virus. This process manages system services that run from dynamic-link libraries (file extensions). 

For example Automatic Updates, Windows Firewall, Plug and Play, Fax Service, Windows Themes. Under normal conditions, some examples of Svchost.exe run concurrently. 

4. Each restart problem 

Getting error message in Windows when restart does not necessarily mean your computer is infected. Before doing the formatting system, you should see MSCONFIG.EXE to startup. 

5. Firewall must wear safety 

The firewall has nothing to do with a virus or trojan. Firewalls are designed to allow or deny the transmission network based on the rules and protect against unauthorized network access. 

6. Install antivirus virus free 

There is no antivirus that guarantees 100% protection. You should make sure to not download questionable material or go to the site in question.

Thursday, October 20, 2011

3 Ways to distinguish genuine or fake antivirus




Products of anti-malware (antivirus) fake / bogus is the type of malware that development is very fast. Sunbelt Software website recorded more than 760 anti-malware have been discovered over the last four years.

We will have no trouble recognizing the products antivirus / antispyware fake it, because they generally have names that seem 'wow', such as: "CoreGuard Antivirus 2009," "Malware Catcher 2009," and "Fast Antivirus 2009."

Usually we get this fake antivirus through direct download or a 'passenger' in another program and once it is in our computer then the task now is to inform the victim that his computer had been infected by the virus. The victim will get a pop up window appears on the computer screen with a message like: "YOUR COMPUTER IS Infected". This pop-up window also leads victims to scan the computer to ensure no malware / viruses that infect, but it also will be guided to buy their antivirus product by pointing to one website link.

Do not worry because the creator of this fake antivirus products simply scare it. If the victim to meet the wishes of the fake antivirus makers then surely he bought just a waste product - not a real antivirus. And what's worse is when the victim decided to buy the fake antivirus by using a credit card then the credit card information he could sell on the black market internet.

Create a home computer users may be somewhat difficult to tell which antivirus antivirus genuine and which fake.

Actually we do not find it difficult to tell which antivirus antivirus genuine and which false, 3 steps below to give us the knowledge to distinguish it.

1. Knowing the list of fake antivirus

One website that we can make to find information about a fake antivirus is http://rogueantispyware.blogspot.com/. In this blog is explained with detailed lists of fake antivirus and an explanation.

2. Look through the websites that provide information about the official antivirus products

To determine whether an antivirus is really official or not then we can look for the manufacturers. Here is a list of antivirus products and their official company name is taken from the VirusTotal website.
  • AhnLab (V3)
  • Antiy Labs (Antiy-AVL)
  • Aladdin (eSafe)
  • ALWIL (Avast! Antivirus)
  • Authentium (Command Antivirus)
  • AVG Technologies (AVG)
  • Avira (AntiVir)
  • Cat Computer Services (Quick Heal)
  • ClamAV (ClamAV)
  • Comodo (Comodo)
  • CA Inc.. (Vet)
  • Doctor Web, Ltd.. (DrWeb)
  • EMSI Software GmbH (a-squared)
  • Eset Software (ESET NOD32)
  • Fortinet (Fortinet)
  • FRISK Software (F-Prot)
  • F-Secure (F-Secure)
  • G DATA Software (GData)
  • Hacksoft (The Hacker)
  • Hauri (ViRobot)
  • Ikarus Software (Ikarus)
  • INCA Internet (nProtect)
  • K7 Computing (K7AntiVirus)
  • Kaspersky Lab (AVP)
  • McAfee (VirusScan)
  • Microsoft (Malware Protection)
  • Norman (Norman Antivirus)
  • Panda Security (Panda Platinum)
  • PC Tools (PCTools)
  • Prevx (Prevx1)
  • Rising Antivirus (Rising)
  • Secure Computing (SecureWeb)
  • BitDefender GmbH (BitDefender)
  • Sophos (SAV)
  • Sunbelt Software (Antivirus)
  • Symantec (Norton Antivirus)
  • VirusBlokAda (VBA32)
  • Trend Micro (TrendMicro)
  • VirusBuster (VirusBuster)
In addition, there are specialized companies that provide certification of antivirus products, such as http://www.westcoastlabs.org/. We can find the certificate of antivirus makers in there.

3. Looking for information on the Internet

This method is a conventional but effective way to find an antivirus product is genuine or fake. Simply type in fake antivirus products that make us hesitate, for example: "Malware Catcher 2009" and soon will come a lot of information about this fake antivirus.

Wednesday, October 19, 2011

Polymorphic Malware




Malicious programs that can change shape rapidly, polymorphic, are known to spreadaggressively. The spread occurs via email.

This report is the result of research and analysis of Symantec.cloud MessageLabsIntelligence Report and the Symantec State of Spam & Phishing Report.

Polymorphic malware types flooded up to the range of 72 percent of all malware that spreads via email in September 2011. Previously, the diffusion rate reaches 23.7 percent(July) and 18.5 percent (August).

Paul Wood, Senior Intelligence Analyst of Symantec.cloud say this has never happened before. Alleged cyber criminals increasingly aggressive in exploiting the weaknesses oftraditional protection.

There was also an effort of social engineering malware masquerading as emails from theprinter / scanner. Wood said, is actually not a printer or scanner are exploited in this attack.

What does it disguise malware authors are exploiting the increasing number of print-scanclever device that can be used to send emails. Users who do not carefully think there arecolleagues who can send the document.

Tuesday, October 18, 2011

AVI + Clamav: Thousands Prevent Attacks




One of the advantages AVI is the presence of add-ons (plugins). Thanks to this facility, the ability of AVI can be upgraded easily. One of the newest add-on is owned AVI Clamsav. This is the Clamav database add-on that integrates into the AVI database. That way, AVI now can ward off tens of thousands of types of attacks, both locally and internationally. One that makes a great antivirus in detecting computer viruses is the number of definitions of threats he had. The more definition, the better the antivirus in facing various threats that try to get into the computer.

AVI is one of the local antivirus that has a limited amount of threat definition. During this time, the database contains more AVI local viruses. This limitation is because the number of new viruses reported AVI users ranged only from Indonesia alone. This is why many people consider a local antivirus virus only powerful to overcome local residents.

Vice versa, beyond just antivirus powerful viruses overcome the outside only. Based on these facts, many people end up installing two antivirus at the same time: one local antivirus, antivirus another one outside.

But the AVI has a clever solution to overcome it. AVI now have add-ons (plugins) that integrates a new AVI with Clamav antivirus engines. What is Clamav? Clamav antivirus which is developed by the developers of the open source community http://www.clamav.net GPL (General Public License). You can get more information about the Clamav on his official website. Currently the number of threats that can be recognized definition Clamav approximately 49 thousand mostly dominated by the threat of viruses out. Now, by combining the original database and Clamav AVI, AVI is now able to recognize approximately 50 thousand threat!

Monday, October 17, 2011

Javascript is a "Weapon Spammers"




Javascript is reportedly increasingly popular technology used by the perpetrators of the spread of spam. Javascript used to hide them.

That is one of the results delivered by Symantec Intelligence Report for the periodSeptember 2011.

Through Javascript, according to the report, spammers can hide their web pages or to trick the direction in which the victim will be misled.

The web page that has been hidden by Javascript is then distributed via email toprospective victims of spammers.

Paul Wood, Senior Intelligence Analyst of Symantec.cloud said this increases the lifetime of the site due to fool the spammers who hijacked the site administrator.

In addition, Symantec found the exploitation of loopholes in WordPress to hijack a web site that runs the content management system. WordPress site itself is said not affectedby these actions.

Sunday, October 16, 2011

"Microsoft" 1 of 14 downloads Dangerous




CALIFORNIA - Never underestimate the warnings that appear in your browser when they wanted to download a program. Technology giant Microsoft is claiming at least one of the 14 programs that are downloaded Windows users turned out to contain harmful viruses. 

Despite growing attention to the current browser security by alerting users to potentially contain software viruses, but Microsoft noted there are still 5 percent of users who ignore the warning. 

Today, increasingly savvy disseminators of the virus spreading threats to other Internet users. Rather than hijack a browser, such as might be done five years ago, they tend to drive users to access their own virus. Send a link is not clear and encouraging users to download new software to access it is the mode of spread of the virus that was prevalent at this time. This mode alone is referred to as social-engineering. 

"The virus spreaders are aware it is not difficult to direct Internet users to download Trojan virus," said Alex Stamos, co-founder of a computer security consultant, ISEC Partners. 

Social-engineering hackers also often hijack home page and displays fake antivirus alerts. Users who fooled with the warning that antivirus software will download the suggested, without knowing that the program was actually a virus. 

In the world of enterprise, social-engineering technique called spearphishing this is a serious problem. The reason, the hackers are willing to take the time to create a specific program or document that is believed will make the user want to open it. 

Symantec Security Response Manager Joshua Talbot added that the hackers are going to take advantage of any momentum to spread malware. For example, by spreading false links about marriage between Prince William and Kate Middleton or death of Osama bin Laden.

Saturday, October 15, 2011

AVI: Antivirus InfoKomputer can block a million viruses!

Although long enough AVI update server is not active. The problems that we face are often experiencing server overload facing a flood of user update requests AVI. Every time we add power, each time the server must "give up" lost. 

But now we have found a solution. Taking the momentum of cloud computing, we also put the AVI update server on the network Infinys System. As we've said in previous editions, Infinys System is one of the first cloud computing service providers in Indonesia, the network and the reliability has been very evident. By putting in their infrastructure server updates, we are confident will be a powerful AVI to serve the needs of its loyal users. 

Once active, Server AVI will provide auto-update service. That is, the AVI which has been installed on your computer will automatically perform the update if there are any new updates. As for Clamav database will always be updated every day, so you do not have to wait next month to get the latest AVI. 

The technical updates we provide are divided into three kinds: 
  1. Full update. An update is called "full" when all components of the AVI need to experience the renewal of the core engine to a database. 
  2. Patch updates. This update occurs when only a few components that need to be updated. In this case, the auto-update does not need to download the entire data, but only few data are needed.
  3. DB update. AVI can perform database updates automatically. Database updates or update DB is divided into 2 types: Full and delta. Called full update when the database is updated by means overwrite the old DB to new DB. In Clamsav plugin, it can happen on the daily updates that have been more than a week is not updated. It should be noted, full update usually takes a lot of bandwidth. There is also a delta update happens when the database updates happen by partial differentiation algorithm. This method saves bandwidth usage because only the parts needed to update it. By default, the plugin Clamsav using this technique. 
In addition to auto-update service, AVI server is also used to download the latest updates. This is very useful if you want to do an update but does not have its own connection, so you can download it via a connection from the outside as from the cafe. 

AVI we provide updates on the server is equipped with a plugin Clamsav. This plugin adds the ability AVI able to detect hundreds of thousands of foreign viruses, so it currently has about 1 million more viruses that can be detected. AVI servers we also make the repository so you can get the AVI from the old version to the latest version.Every update, we will not remove the old version until the last 5 versions. This is useful when there is an incompatibility between versions, making it easier for us to do the troubleshooting for the purpose of fixing bugs. 

Going forward, we will also make this update server as a gathering place of the AVI plugin, so you can download separately between AVI and its plugins. 

To get the AVI, please download here (44MB). If the size is too large, you can get the AVI in DVD InfoKomputer each month. 

If you want to follow the development of AVI, please join the channel in www.mindtalk.com AVI-Antivirus. There will be available frequently asked questions, bug reports, or tips and tricks to overcome the problems associated with computer viruses. 

Friday, October 14, 2011

Virus Attack U.S. Combat Robot




A virus was found seeping into the military's weapons systems the United States. Not to steal data, but these malicious programs designed to control the fighting machine.

Viruses are not yet identified his name was known to have two weeks to sneak into the system controlling Unmanned Aerial Vehicle (UAV), which is a system for controlling aircraft as pilotless drones or predators.

The virus creators are designed to record all commands performed by the pilot. And it is not impossible, these malicious programs can take over control of the vehicle.

Although already known, but the UAV Squadron located at Creech Air Force Base, Nevada, United States pleaded not easy to tame the virus. They must remove the entire contents of hardsik then reinstall the entire system.

Not yet known what the impact caused by the virus, but a clear and predator drones that attacked U.S. soldiers were used to perform tasks of state secrets.

Thursday, October 13, 2011

Conspiracy theories manufacture and commercialization of anti-virus virus




A computer virus is no death, always emerging new viruses and new variants of existing viruses are ready to spread the threat to us.

If there there is also a computer virus antivirus and that's our main weapon in dealing with computer viruses malignancy.

Has it ever occurred to us why the hell there are people who diligently creating computer viruses? Does he want to be famous or he wants to be called 'elite' for his expertise to make a virus? Does he have enough to do, or maybe that was the job?

This paper appears because I was wondering if there might be some kind of conspiracy due to the mutually beneficial symbiosis between the creator of the virus by the antivirus industry so that the virus / antivirus remain crowded until now.

Conspiracy

Suppose one of the emerging new types of viruses quickly and one of the antivirus vendors to identify and clean up a computer from new viruses while the other antivirus vendors are so confused and slow to recognize this new virus.

From the above case could be one of the antivirus vendor employee A contact / cooperation with the virus creator to make a virus with the criteria he had set earlier, in the sense of making a booking virus. And so the antivirus vendor A is known as the antivirus vendors are quick and can clear the virus 'order' is.

Thought the above arise because I observed that the virus rarely seem consistent with the results of his work, but the early scene in some time just disappeared.

Conspiracy theories over just thinking of me just after it, and until now this conspiracy theory was never proven.

Commercialization antivirus

One time our computer got a virus when we've been installing antivirus therein. Antivirus on the computer can do nothing even to 'running' was not. We are definitely confused when faced with such situations.

From the illustration above, we will wonder why we install the antivirus can not do anything to prevent computer virus attack.

Apparently the problem is antivirus is updated regularly will be more robust in providing protection against the virus than an antivirus that is never updated at all. That is why we are encouraged to always update the antivirus.

For this one I got the idea from one of the forum on the internet why antivirus updates that must be regularly performed and why the antivirus vendors can survive / grow.

Current commercial antivirus generally works with a method called blacklisting and the plot as follows:

1. The new virus is found.
2. Virus "signature" is identified and placed in the blacklist.
3. Antivirus software to check files on our computer with what is in blacklist: if there is a match then the antivirus will take a certain action.

Such was the approach that has been used by antivirus vendors, but there are two big problems in it if you use such an approach:

1. Antivirus software and also we will always depend on antivirus companies continuously to update the blacklist. We will still be attacked by a new virus which antivirus companies have yet to find or create a file "signature" to it. We will not and will never be protected from the threat of new viruses because viruses are not discovered until there is an infected computer. If your computer has not got a virus that was because of luck and the fact that the antivirus companies have done an excellent job preparing the honeypot (computers that are open to new viruses and help mengindetifikasinya) that provides early warning when a new virus is spread. Most of us are lucky if there is arguably a new virus that has not infect our computers.

2. Due to the thousands of new viruses spread every year then the blacklist will continue to evolve. This means that antivirus software will be spending more and more computer resources (cpu time, hard drive space) which will affect the performance. The increase in cpu speed, memory and hard drive space will alleviate the problem (just do not try to run the latest version of Norton on the old computer). The fact that there is indeed if we run a commercial antivirus software then our computer will become slower.

The biggest problem is that users will always be bound by antivirus software because it must continue to renew the existing blacklist and there is the key why the antivirus vendors can continue to survive and thrive.

This method is essentially blacklisting antivirus software will say "no" to something that should not exist in our computer and the opposite is the method in which greenlisting than busy keeping anything that should not exist in our computer so it will keep the method greenlisting what should be in our computer.

If this greenlisting method employed by the antivirus makers course that users benefit because the user does not need to update and too dependent on the antivirus. Which eventually antivirus companies will not grow.

Wednesday, October 12, 2011

12 reasons why people create computer virus




Almost the majority of computer users do not want to name a computer virus. A computer virus is in the sense of a diverse program of its kind that is harmful, disruptive, annoying and dangerous, malware, spyware, adware, worms and Trojans.

That does not make us believe that is the reason why there are people in this world, the "fun" computer viruses computer users so angry.

There are many reasons why someone would invent a computer virus, for personal reasons, motives matter until the subject to make a spy for the odors. Let's look at the 12 or the reason why someone, a computer virus.

1. Anger

If anyone angry, I could not do that and if so, who are furious that a computer programmer who can make a computer virus. Imagine if the developer who is angry with a company employee who was angry with him because he is incompetent, a program for the company and finally to anger by a computer virus, the whole team attacks in the channel company.

2. Do it for 'pleasure'

Interestingly, if there are people who create computer viruses for fun or satisfaction of staff. People like this feel happy and pleased to see that their work was reported largely by print and electronic media and the "elite", which managed to destroy many teams.

3. Espionage

Espionage is the act of collecting information for any purpose other than to steal identities or their wealth. They usually work in the intelligence world, and make information for people who are above their target. Many people with hardware manufacturers in China are concerned, are concerned, there are backdoors into the hardware is intentionally planted by the Chinese government or the government of India with the RIM BlackBerry worried and called for a universal decryption key for all devices BB in the land is sold.

4. Gang online

A series of cyber-criminals in the alley. Turns out the band online was really real and it exists in cyberspace. For the sake of the prestige of his band, usually competing with others online rail street fight for the predicate best line.

5. Instinct hackers

Someone with the mindset of the hacker would have a strong interest in one thing and not easily satisfied, if he had his own practice. As an example, he wanted about the weaknesses of an operating system with HP to find a small program and I wanted to know how much influence the program ujicobakan little people around.

6. Money 

Besides personal satisfaction, apart from the dominant themes for the money. Many cyber criminals who are hired with a certain amount of money for spamming, DDoS, botnets and other can.

7. Policy 

Virus attacks, worms and DDoS attacks can be performed by a group of political reasons. I usually try to seek the public's attention to their existence and their desires, albeit in a negative way.

8. Story of romance and drama

Love can give strength to a phrase that is for lovers. But what if love aka love is not rejected, if they offer strength as well?

If love is a computer programmer or knowledge in this area and dark eyes, maybe even going to channel their emotions in a computer virus in a poem or message for fans who can not be your best man . There is a feeling like that?

9. Sabotage 

To mobilize perhaps under the pretext of revenge or competition, a person or company the ability to paralyze the whole system of other people's information, which is to destroy through the spread of a virus or other means to ensure credibility of the person or business rival. And this practice is a dirty practice that are classified as criminals.

10. Intellectual Challenge

The ego can be number one in something behind a person, a computer virus. Take the case only if anti-virus company anti-virus products, the movement to eliminate all types of computer virus is right, then people want to prove that it is the only person in the world, the virus that could not be detected do you put in place by the anti-virus.

11. Blackmail

Some people use their expertise to make a computer virus to blackmail others. They call it a virus Vundo/Antivirus2009/Antivirus360 receive the message "You are infected! Give sixty U.S. dollars in the U.S. and'll fix it!"

12. As a 'curriculum vitae'

Want to get a job at the company anti-virus? Just try a computer virus that is difficult to clean and have a way to clean it, then puts antivirus companies. It was exactly the same as creating a resume, but this time is that they are recognized and used by antivirus companies through the sale of "work" in the form of virus, they so wish.

Tuesday, October 11, 2011

Do not open the link for chat on Yahoo Messenger




It was an interesting day I received a few message Yahoo Messenger from a friend with a link to the web site address.

This phenomenon not only happens to me, but a friend had experienced the same thing, sent his friend a complete message with a link to them through Yahoo Messenger.

Examples of message like this:

(10:38:25) multea_id: Photos: http://foto-spaces.com/image.php D

(10:59:31) wina_06: Photos: http://msnlmages.com/image.php D

YM's friend has suddenly sends a message like that, I suppose, gave me the opportunity of their computers infected with viruses or their YM account by someone else, because these two possibilities have been kidnapped in the same situation, our IM account to automatically adjust their messages to friends of friends in YM.

So if you are our friend, despite being very good friend that a complete message and a link to the example above, you should not click on them directly, I ask in advance what you meant to send a link.

Monday, October 10, 2011

Tips to remove a virus that can not be handled Anti virus




There is a very powerful tips to remove the virus, if the various Anti Virus that we use completely helpless against it (probably only be able to detect, but can not delete it). To do this would require a bootable CD that contains a minimum of File Manager program, such as Ultimate Boot CD, BartPE and the like. Some programs are DOS based and others are windows based. Or it could also use a Linux Live CD, like Knoppix, Ubuntu Live CD and others. In general, the following steps: 
  1. Find the location of the virus, especially the origin of the virus is running on the computer (the host). If you are having difficulty.
  2. Once obtained, note (note) information such as file size, date (although the virus can change the size and date, but most always the same size and date. It could look similar file and note its location.
  3. Once obtained, use one of the Bootable CD and restart the computer to boot from the CD (you may need to set its BIOS to boot first before the CD / DVD-ROM).
  4. Open the file manager program, which is available. If windowsnya NT, XP or above, make sure the program supports reading NTFS format.
  5. Find the file / virus and delete or if still in doubt, rename it from *. exe to *. VRS example.To convince, use the search facility to find files with the same size or nearly the same date. If found to be rename
  6. Back restart the computer and check again.

Sunday, October 9, 2011

Clean Time Uninstallasi Antivirus with "AppRemover"




Uninstall process security software such as antivirus software is not really different from others, but not rare in the uninstall antivirus difficult, or when it's in good uninstall often leaves residual files or settings on the computer, so when want to install another antivirus is often problematic. To overcome this, we can use AppRemover. 

AppRemover is a free software that were created especially to remove the antivirus (uninstall) that exist on the computer and will try to clean all the remnants are usually left behind when the process uninstallasi uninstallasi usual or when the process is not successful. 

In addition to supporting tens Antivirus, AppRemover also able to remove Antispyware products. The list is also constantly updated in line with this software updates itself. Here are some products that are supported by AppRemover: 
AppRemover can run on Windows 2000, 2003, XP (32/64 bit), Vista (32/64 bit), 2008, Windows 7 (32/64 bit). Programs that have a size of about 5.2 MB is not necessary to the installation (Portable), so after the download can be directly executed. 

Use of AppRemover 

Use of this software is relatively easy, Appremover.exe previous download (5.2 MB), then immediately after the run. After the first display window, just click Next. Here we can choose two options: 

Remove Security Application. choose if we want to uninstall the antivirus (security products) 

Clean Up Failed Uninstall. Select if you have to uninstall but did not succeed (fail). Or also to remove the remnants of which are in the uninstall antivirus that may be left on the computer. 

Once we choose one of the above, then the scan or check the software installed on your computer. which then can we choose to uninstall or remove it (more information at http://www.appremover.com/)

Saturday, October 8, 2011

Download Avira Free Antivirus 2012




Based on the latest antivirus test of av-comparatives, Avira is one antivirus that has a virus detection (malware) is high. In addition to AVG and Avast, Avira is also one that provides antivirus free version with Avira Free Antivirus her. 

Through a press release, Avira explain some new features in this 2012 version, among others: 

Display (user interface) is a new, more sleek and modern look. Options are set by function, and automation when there is conflict when installing software. Simplified the installation process, some components in changing his name to let users more easily use without having to read the manual. In addition there is an additional one-click button "Fix Problems" to fix any problems that might harm the computer user. 

Smart Code, Avira has improved the detection ability of malware (virus) to outwit antivirus malware that hide from ordinary, including hiding deeper in the operating system 

Stronger Detection, Avira also offers a more robust detection such as being able to walk without a lot of keys in the registry, a better defense of the virus either from destruction or removal, etc. 

For premium products, increased customer support issues by providing a direct connection with the technical side. 

In addition to these features, considering that running 2 security software (antivirus) can be a negative effect on the stability and performance of computer, automatic detection and removal of incompatible software Avira added in the installation process, but to still include the option to the user. 

Through the forum, http://forum.avira.com, for Avira Free Antivirus 10 users update to the new 2012 version is available starting on October 13, 2012. But if you want to immediately use or replace with Avira Free Antivirus 2012, can directly download the installer it through the pages download free avira antivirus 2012 and then stay installed, if there is an older version will automatically upgrade. 

To be able to use Avira Free Antivirus 2012, which required a minimum operating system is Windows XP SP3 32bit or 64bit Windows XP SP2 or Windows Server 2003 SP2. Under the operating system version is not supported (Windows Vista and 7 of course supported) 

Thursday, October 6, 2011

Prevent Malware on Mac OS X




Recently been discovered a new type of Trojan that attacks Mac OS X platform Threat targeting the Macintosh computer and appears as a Mandarin-language PDF files. In addition, there are also malware to infiltrate through the Adobe Flash installer false. If the Trojan is detected as a form of a PDF file OSX / Revir.A and OSX / Imuler.A, this Trojan identified as OSX / Flashback. 

To prevent the risk of the Threat, here are some recommended ways to researchers at the Lab ESET Malware Intelligence. 

1. Never open attachments or e-mail attachment that you do not want to accept it, unless it has been no confirmation first. Make sure that you only receive emails with attachments that have been confirmed by the sender. This might be a bit complicated, but think about the implications for your security. 

2. When downloading files online, do not believe it to sites that have no reputation.Moreover, no authority as an outlet to distribute content. 

3. Run the antivirus program / antivirus software to the Internet on all devices that can be connected to the Internet. For example ESET Cyber ​​Security for the Mac which successfully detected the Trojan and identify it as OSX / Revir.A and OSX / Imuler.A. 

4. In the case of OSX malware / malware Flashback.A although it's not a big threat, but to the users need to be reminded again to carry out preventive measures. Namely download Adobe Flash and Acrobat software only from the Adobe.com site, turn off the Safari settings so as not to open a new file is downloaded automatically and the latter, run an antivirus program or antivirus software for the internet in realtime and always updated.

Popular Posts