avast! Free Antivirus is a free complete ICSA certified antivirus software for home noncommercial use. avast! obtained VB100% awards in 2002/4 Virus Bulletin comparative reviews under Windows.
avast! Free Antivirus includes the following components:
* On Demand Scanner - with Skinnable Simple Interface - just select what do you want to scan in which way and press the Play button.
* On Access Scanner - resident scanning of all files being opened, read and written and behavior blocker monitoring dangerous actions of viruses.
* E-mail scanner easily integrates with most mail clients and it checks both incoming and outgoing mails, it provides heuristic analysis of mail content to protect against new Worms.
* Network Shield - scans traffic for malicious content - lightweight Firewall.
* Resident protection for IM programs (e.g. MSN Messenger, ICQ) and P2P programs (e.g. Kazaa, DirectConnect).
* Boot Time Scanner - scans disks in the same way and in the same time as Windows CHKDSK does (on NT/2000/XP only).
* Explorer Scanner - right click on the object allows you to scan it.
* Screen Saver Scanner - scans PC during your coffee breaks.
* Virus Chest - safety isolated folder to store infected, suspicious and even some system files - to restore them.
True incremental updates of size under 100 KB are available at least twice a week and within couple of hours in the case of emergency of new virus. avast! automatically checks for new updates - downloads, installs and loads them without restart or logoff. Program upgrades are available time to time, they are incremental too (about 300 KB).
avast! Free Antivirus is available in English, French, German, Italian, Japaneese, Polish, Portuguese, Russian, Spanish and other languages - check http://www.avast.com/eng/down_home.html to download avast! in your language.
Note:FREE registration is required after 30 days. A FREE license key is easily obtained from the convenient registration form within the program interface.
Visit website | Download
Tuesday, October 25, 2011
McAfee AVERT Stinger 10.0.1.934
McAfee AVERT Stinger is a stand-alone utility used to detect and remove specific viruses. It is not a substitute for full anti-virus protection, but rather a tool to assist administrators and users when dealing with an infected system. Stinger utilizes next generation scan engine technology, including process scanning, digitally signed DAT files, and scan performance optimizations.
Windows ME/XP/Vista users:
Disabling System Restore
Windows utilizes a restore utility that backs up selected files automatically to the C:_Restore folder. This means that an infected file could be stored there as a backup file, and VirusScan will be unable to delete these files. You must disable the System Restore Utility to remove the infected files from the C:_Restore folder. For detailed help, read this.
Visit website | Download (7.87 Mb)
Windows ME/XP/Vista users:
Disabling System Restore
Windows utilizes a restore utility that backs up selected files automatically to the C:_Restore folder. This means that an infected file could be stored there as a backup file, and VirusScan will be unable to delete these files. You must disable the System Restore Utility to remove the infected files from the C:_Restore folder. For detailed help, read this.
Visit website | Download (7.87 Mb)
Thursday, October 20, 2011
How to update offline NOD32 Anti virus
Download file NOD32 Update Generator.
So here goes, NOD32 Update Generator that, just like the definition of computer software makers that NOD32 was already updated .. Then extract using the software and distribute definition updates to computers that require, meaning not connected to the internet directly (offline).
1. Use the offline update tool on the internet connected computer and use the AV NOD322
for example, to search for the latest update NOD32 like this:
2. Run the tool, then input the path where you want to store the update files offline NOD 32. (Such as picture 1), then click the Generate button to download.
3. then save the update is already in the downlaod of computers that connect to the internet, "NUP file" like this picture.
Update is offline now run on computers
1. Open NOD 32 as in picture. NOD --- 32 ---- Update Setup. then enter the path to the folder you just downloaded in the column on the Server
2. Let the update run automatically
3. Done
So here goes, NOD32 Update Generator that, just like the definition of computer software makers that NOD32 was already updated .. Then extract using the software and distribute definition updates to computers that require, meaning not connected to the internet directly (offline).
1. Use the offline update tool on the internet connected computer and use the AV NOD322
for example, to search for the latest update NOD32 like this:
2. Run the tool, then input the path where you want to store the update files offline NOD 32. (Such as picture 1), then click the Generate button to download.
3. then save the update is already in the downlaod of computers that connect to the internet, "NUP file" like this picture.
Update is offline now run on computers
1. Open NOD 32 as in picture. NOD --- 32 ---- Update Setup. then enter the path to the folder you just downloaded in the column on the Server
2. Let the update run automatically
3. Done
Sunday, October 16, 2011
How to Download Norton Anti Virus Update
Update anti-virus is used to update the anti virus to be able to immediately recognize and take a commission variant of the new viruses. So, if your anti virus rarely updated it will be less potent to eradicate the virus and often can not remove a virus that attacks. So to maintain the efficacy of an anti-virus is obligatory to keep up to date.
To download antivirus updates norton or Symantec, follow these steps to update Symantec antivirus following:
1. From the browser type in www.google.com
2. Type the keyword, "download norton antivirus update" or "download Symantec anti-virus updates". Google search results will look like the picture below (it also turned out), which is important make sure that the site is open symantec.com and usually the title Virus Definitions & Security Updates:
3. In this case select the number 2 from above search results (you can also change), until the following display:
4. Look at Dowload Defenitions by Product, highlight the Select Product menu, then click Norton Antivirus for Windows 2000/XP/Vista. Will appear as follows:
5. Options update match you with anti-virus version, for this example I use the 2003 version of norton anti virus s / d 2007. For the above version of norton anti virus 2007, you select the number 2 above are marked in red.
6. Next click the 20090114-017-i32.exe (will change according to the date updater) to download the antivirus updates. Till the display appears as follows:
7. Click Save File, wait until the file is finished downloading.
8. When finished downloading, the next step live update your norton anti virus. The trick double-click the file you just downloaded and wait until the file extraction process is complete.
9. Refresh your computer and usually will take a few minutes to update in action.
Ok, that he step by step updates norton antivirus or Symantec.
May be useful!
To download antivirus updates norton or Symantec, follow these steps to update Symantec antivirus following:
1. From the browser type in www.google.com
2. Type the keyword, "download norton antivirus update" or "download Symantec anti-virus updates". Google search results will look like the picture below (it also turned out), which is important make sure that the site is open symantec.com and usually the title Virus Definitions & Security Updates:
3. In this case select the number 2 from above search results (you can also change), until the following display:
4. Look at Dowload Defenitions by Product, highlight the Select Product menu, then click Norton Antivirus for Windows 2000/XP/Vista. Will appear as follows:
5. Options update match you with anti-virus version, for this example I use the 2003 version of norton anti virus s / d 2007. For the above version of norton anti virus 2007, you select the number 2 above are marked in red.
6. Next click the 20090114-017-i32.exe (will change according to the date updater) to download the antivirus updates. Till the display appears as follows:
7. Click Save File, wait until the file is finished downloading.
8. When finished downloading, the next step live update your norton anti virus. The trick double-click the file you just downloaded and wait until the file extraction process is complete.
9. Refresh your computer and usually will take a few minutes to update in action.
Ok, that he step by step updates norton antivirus or Symantec.
May be useful!
Monday, October 10, 2011
How to Update Avast Manual February 2011
Update it offline mostly done by computer people who rarely or almost never connected to the internet, but want antivirus is always up to date. Due to always update the antivirus viruses attack the new will be addressed by the antivirus.
Right away, for you who want to update offline Avast 5, just download the update file below.
Once downloaded, run the file, wait a few moments, it will automatically installed on your Avast and Avast you are up to date.
The Online Update Avast Avast can be done with this set. Follow these steps:
1. Open the Avast program. You can open the Avast antivirus program by clicking Start>> All Programs>> Avast! Antivirus. Once opened, Avast will first scan your computer to check the presence of the virus.
2. In Avast program, click the Settings menu>> Update (Basic). You will be given the option "Automatic" or "Ask When update is available"
Download:
Download Update Avast 5 Manual February 2011 (36 mb)
OR
Download Update Avast 5 Manual February 2011 part 1 (10)
Download Update Avast 5 Manual February 2011 part 2 (10)
Download Update Avast 5 Manual February 2011 part 3 (10)
Download Update Avast 5 Manual February 2011 part 4 (10)
Or for those of you who still use Avast 4 version can download updates below:
Download Update Avast 4 Manual February 2011 (38 mb)
OR
Download Update Avast 4 Manual February 2011 part 1 (10 mb)
Download Update Avast 4 Manual February 2011 part 2 (10 mb)
Download Update Avast 4 Manual February 2011 part 3 (10 mb)
Download Update Avast 4 Manual February 2011 part 4 (8 mb)
Remember, you are at the latest antivirus updates once a week. It aims to optimize the performance of antivirus to keep your computer from virus attacks are growing in number every day.
Update Avast Offline March 2011
Update Avast Offline April 2011
Update AVAST Antivirus May 2011 Offline
Update Avast Definitions Manual June 2011
Download AVAST Update 16 June 2011
Download Avast 6 Update July 2011
Download AVAST August 2011
Right away, for you who want to update offline Avast 5, just download the update file below.
Once downloaded, run the file, wait a few moments, it will automatically installed on your Avast and Avast you are up to date.
The Online Update Avast Avast can be done with this set. Follow these steps:
1. Open the Avast program. You can open the Avast antivirus program by clicking Start>> All Programs>> Avast! Antivirus. Once opened, Avast will first scan your computer to check the presence of the virus.
2. In Avast program, click the Settings menu>> Update (Basic). You will be given the option "Automatic" or "Ask When update is available"
Download:
Download Update Avast 5 Manual February 2011 (36 mb)
OR
Download Update Avast 5 Manual February 2011 part 1 (10)
Download Update Avast 5 Manual February 2011 part 2 (10)
Download Update Avast 5 Manual February 2011 part 3 (10)
Download Update Avast 5 Manual February 2011 part 4 (10)
Or for those of you who still use Avast 4 version can download updates below:
Download Update Avast 4 Manual February 2011 (38 mb)
OR
Download Update Avast 4 Manual February 2011 part 1 (10 mb)
Download Update Avast 4 Manual February 2011 part 2 (10 mb)
Download Update Avast 4 Manual February 2011 part 3 (10 mb)
Download Update Avast 4 Manual February 2011 part 4 (8 mb)
Remember, you are at the latest antivirus updates once a week. It aims to optimize the performance of antivirus to keep your computer from virus attacks are growing in number every day.
Update Avast Offline March 2011
Update Avast Offline April 2011
Update AVAST Antivirus May 2011 Offline
Update Avast Definitions Manual June 2011
Download AVAST Update 16 June 2011
Download Avast 6 Update July 2011
Download AVAST August 2011
Wednesday, October 5, 2011
Configuration for McAfee Internet Security Suite Antivirus
Configure Automatic Updates
One of the primary truths about the antivirus products in use today is that they are only as good as their last update. You can install antivirus software and configure it perfectly, but if a new virus comes out two days from now and you don't update your antivirus software, you may as well not have any installed.
It used to be enough to update your antivirus software once a month or so. Then it became once a week. Now sometimes it seems that daily, or even multiple times a day may be necessary depending on how busy the malware authors are.
To configure how and when McAfee Internet Security Suite 2005 gets updated, select the Updates link at the upper right of the main Security Center console and click the Configure button.
There are four options available:
I highly recommend that you leave the first option selected. There have been rare occasions with rare situations where an antivirus update may cause conflicts with the system and create problems, but they are rare enough that most users, particularly home users, should just let the software update automatically so that the antivirus protection is maintained without any help from the user.
One of the primary truths about the antivirus products in use today is that they are only as good as their last update. You can install antivirus software and configure it perfectly, but if a new virus comes out two days from now and you don't update your antivirus software, you may as well not have any installed.
It used to be enough to update your antivirus software once a month or so. Then it became once a week. Now sometimes it seems that daily, or even multiple times a day may be necessary depending on how busy the malware authors are.
To configure how and when McAfee Internet Security Suite 2005 gets updated, select the Updates link at the upper right of the main Security Center console and click the Configure button.
There are four options available:
- Install the updates automatically and let me know when the product is updated
- Download the updates automatically and notify me when they are ready to be installed
- Notify me before downloading any updates
- Disable automatic updating and let me manually check for updates
I highly recommend that you leave the first option selected. There have been rare occasions with rare situations where an antivirus update may cause conflicts with the system and create problems, but they are rare enough that most users, particularly home users, should just let the software update automatically so that the antivirus protection is maintained without any help from the user.
Friday, September 30, 2011
AVIRA Antivirus Update
AVIRA Automatic Update
To perform an automatic update Avira can only be done if your computer can be connected directly to the internet. The way you just right-clicking the icon tray antivir in the corner of your windows, then select "Start Update". You can just wait for the process is complete.
AVIRA Manual Update
How to update Avira Personal (Free Edition) is a way to manually downloaded IVDF file-Incremental-Virus Definition File, sort of a collection of virus data base.
Steps to download and update Avira VDF file is as follows:
1. Download VDF (Virus Definition File)
Click dl.antivir.de/package/fusebundle/win32/int/vdf_fusebundle.zip or dl.antivir.de/package/fusebundle/win32/int/vdf_fusebundle.zip (for Avira 10 Win 7, Vista 32 Bit, XP & 2000)
or dl.antivir.de/down/vdf/ivdf_fusebundle_9x_en.zip (for Avira 7 98, 98 SE dan ME)
read the testimony in www.avira.com/en/support/vdf_update.html
2. Click the icon tray Avira existing corner windows, usually near the clock
3. After the display Avira pops up, click "Update"
4. Select the manual update
5. Then came the explorer bar to search the location where to save your Avira update, then click "open"
6. Then just wait for the update process was completed
Unfortunately, Avira IVDF has a weakness that there is no daily or weekly version, so we have to download the file rather sizable cumulative, around 13 MB.
Do not forget to love a comment if you are successful, encounter difficulties or fail to update antivir. May be useful.
Note For Avira Antivirus:
1. Make sure the manual update file that you downloaded it perfectly
2. If the antivirus through a period of activation, an update that you do not succeed (fail)
3. Can use more than one antivirus, such as Avira, AVG and Ansav
4. When downloading use software Free Download Manager or Internet Download Manager.
To perform an automatic update Avira can only be done if your computer can be connected directly to the internet. The way you just right-clicking the icon tray antivir in the corner of your windows, then select "Start Update". You can just wait for the process is complete.
AVIRA Manual Update
How to update Avira Personal (Free Edition) is a way to manually downloaded IVDF file-Incremental-Virus Definition File, sort of a collection of virus data base.
Steps to download and update Avira VDF file is as follows:
1. Download VDF (Virus Definition File)
Click dl.antivir.de/package/fusebundle/win32/int/vdf_fusebundle.zip or dl.antivir.de/package/fusebundle/win32/int/vdf_fusebundle.zip (for Avira 10 Win 7, Vista 32 Bit, XP & 2000)
or dl.antivir.de/down/vdf/ivdf_fusebundle_9x_en.zip (for Avira 7 98, 98 SE dan ME)
read the testimony in www.avira.com/en/support/vdf_update.html
2. Click the icon tray Avira existing corner windows, usually near the clock
3. After the display Avira pops up, click "Update"
4. Select the manual update
5. Then came the explorer bar to search the location where to save your Avira update, then click "open"
6. Then just wait for the update process was completed
Unfortunately, Avira IVDF has a weakness that there is no daily or weekly version, so we have to download the file rather sizable cumulative, around 13 MB.
Do not forget to love a comment if you are successful, encounter difficulties or fail to update antivir. May be useful.
Note For Avira Antivirus:
1. Make sure the manual update file that you downloaded it perfectly
2. If the antivirus through a period of activation, an update that you do not succeed (fail)
3. Can use more than one antivirus, such as Avira, AVG and Ansav
4. When downloading use software Free Download Manager or Internet Download Manager.
Sunday, September 18, 2011
AVG Antivirus Update
AVG Antivirus Automatic Update
In doing an automatic update AVG Antivirus can only be done if your computer can be connected directly to the internet. The way you just right-click the AVG Antivirus icon in the corner of your windows, then select "Check for Updates", then click "Internet". You can just wait for the process is complete.
How to manually update AVG Antivirus?
1. Click the icon AVG Antivirus so it appears like the image below
2. Select and click "Update from directory ..." will appear next picture
3. Click Folder and locate the folder where you save the file "*. bin" then click Ok waited until the process is complete
In doing an automatic update AVG Antivirus can only be done if your computer can be connected directly to the internet. The way you just right-click the AVG Antivirus icon in the corner of your windows, then select "Check for Updates", then click "Internet". You can just wait for the process is complete.
AVG Antivirus Manual Update
1. Click the icon AVG Antivirus so it appears like the image below
Thursday, September 15, 2011
History of Computer Viruses:
Anyone that owns a computer dreads the words "Computer Virus." A computer virus is a damaging program that gets into your system, replicates itself and continues to do damage. There are many ways that a computer virus can get into your system and there are just as many ways that a computer virus can do its damage.
The First Computer Viruses:
The first known computer virus was written in 1982 by a man named Rich Skrenta. This virus was termed Elk Cloner, and was the first computer virus to show up outside of the computer it was created in. Elk Cloner worked by attaching itself to the Apple DOS operating system and was spread to other computers by means of a floppy disk.
The next well known computer virus was a PC virus called Brain. This virus was a boot sector virus that was created by two brothers Basit and Amjad Farooq Alvi in 1986. Basit and Amjad claim to have not created this virus to intentionally infect other operating systems, but instead claim that they had created the virus and attached it to software they had written in order to prevent pirated copies of their work from being created.
How Viruses Began to Spread:
Before the Internet became so widely accessible, computer viruses were generally spread through means of hardware, like floppy disks or other removable media. Though it's hard to imagine now, people used to exchange a lot of information on floppy disks regularly, since most people did not have access to the Internet to share files. If a floppy disk was infected, it could easily spread around pretty quickly. Many of these viruses spread by attaching themselves to information and programs that were stored on these floppy disks. Other viruses were already on the disks and installed themselves onto the operating system when the disk was booted up.
As the Internet became more widely used and technology became more advanced, computer viruses continued to grow and become more common. Most computer virus threats these days come in the form of information transferred on the Internet, such as downloadable files and emails. There are even viruses that can be spread through instant messaging programs.
How to Stop Viruses:
Fortunately, as computer virus technology continues to grow, so does the technology for anti-virus systems. With proper anti-virus software in place, such as Norton Antivirus, NOD32 Antivirus, or Kaspersky Antivirus, most people never have to deal with the damage that a computer virus can cause. Computer viruses can be extremely annoying and damaging to those they infect, and history has shown us they can cause a great deal of damage very quickly. Hopefully someday, computer viruses will be a thing of the past, and only be found in the history books...
Source: antivirusdownload.com
The First Computer Viruses:
The first known computer virus was written in 1982 by a man named Rich Skrenta. This virus was termed Elk Cloner, and was the first computer virus to show up outside of the computer it was created in. Elk Cloner worked by attaching itself to the Apple DOS operating system and was spread to other computers by means of a floppy disk.
The next well known computer virus was a PC virus called Brain. This virus was a boot sector virus that was created by two brothers Basit and Amjad Farooq Alvi in 1986. Basit and Amjad claim to have not created this virus to intentionally infect other operating systems, but instead claim that they had created the virus and attached it to software they had written in order to prevent pirated copies of their work from being created.
How Viruses Began to Spread:
Before the Internet became so widely accessible, computer viruses were generally spread through means of hardware, like floppy disks or other removable media. Though it's hard to imagine now, people used to exchange a lot of information on floppy disks regularly, since most people did not have access to the Internet to share files. If a floppy disk was infected, it could easily spread around pretty quickly. Many of these viruses spread by attaching themselves to information and programs that were stored on these floppy disks. Other viruses were already on the disks and installed themselves onto the operating system when the disk was booted up.
As the Internet became more widely used and technology became more advanced, computer viruses continued to grow and become more common. Most computer virus threats these days come in the form of information transferred on the Internet, such as downloadable files and emails. There are even viruses that can be spread through instant messaging programs.
How to Stop Viruses:
Fortunately, as computer virus technology continues to grow, so does the technology for anti-virus systems. With proper anti-virus software in place, such as Norton Antivirus, NOD32 Antivirus, or Kaspersky Antivirus, most people never have to deal with the damage that a computer virus can cause. Computer viruses can be extremely annoying and damaging to those they infect, and history has shown us they can cause a great deal of damage very quickly. Hopefully someday, computer viruses will be a thing of the past, and only be found in the history books...
Source: antivirusdownload.com
Saturday, September 10, 2011
What is a Computer Virus?
A Computer Virus is a relatively small software program that is attached to another larger program for the purpose of gaining access to information or to corrupt information within a computer system. Some computer viruses may be relatively harmless. For example, some of them just cause a certain message to pop up on a user's computer screen. Other viruses can be deadly to the computers they infect, erasing information and hard drives, stealing data, and slowing down the entire computer system. Like other software programs, someone must create and write a computer virus; once they are created, viruses can multiply rapidly and spread themselves from computer to computer.
Computer Virus Definition & Characteristics:
A Computer Virus is a program that can copy itself and infect a computer without the permission or knowledge of the user. A computer virus has 2 major characteristics: the ability to replicate itself, and the ability to attach itself to another computer file. Every file or program that becomes infected can also act as a virus itself, allowing it to spread to other files and computers. The term "computer virus" is often used incorrectly as a catch-all phrase to include all types of Malware such as Computer Worms, Trojan Horses, Spyware, Adware, and Rootkits - all of which are slightly different than Computer Viruses.
A computer virus needs another program in order to be able to be activated and infect other computers files. Essentially, a computer virus rides piggyback on another file into your computer - once it is executed, the virus will continue to replicate and attach itself to other program files and continue to spread.
A Brief History of Computer Viruses:
Although computer scientists were aware of the theoretical possibility of computer viruses for decades, it was not until the 1980s that viruses began to gain a hold and multiply in large numbers. With the advent of the personal computer, floppy disk drives, and other portable information storage devices, it became easier to program and transfer viruses from one machine to another. Fred Cohen is often cited as the first person to use the term "computer virus" in an academic paper in 1984, although some suggest that he may have learned it from his mentor Leonard Adleman (more info: History of Computer Viruses).
Does My Computer Have a Virus?
Of course, if you ask anyone the question “what is a Computer Virus?”, the reply is likely going to be a bit jumbled. There are many different forms of computer viruses, although many have the same goal; to slow the infected computer system, steal and/or copy information from the computer, and attach itself to sent files and attachments in order to spread to other computer systems. The following are a few telltale signs that your computer might have a virus:
• Slow response and slow program execution
• Random hard drive crashes and restarts
• Distorted graphics and text
• Files that have mysteriously vanished
• Extensive pop-up ads
• Inability to open files with existing passwords
How Can I Protect My Computer from a Virus?
It is far better to avoid computer viruses and take proactive measures to protect your computer system than it is to clean up after them once they have gotten into your computer and caused damage. The following tips will help increase your odds of avoiding infection from a computer virus:
• Download programs only from trusted, reputable websites
• Install a quality Internet firewall
• Do Not open suspicious emails or email attachments
• MOST IMPORTANTLY — Make sure you have a trusted anti-virus program installed on your computer - such as Norton Antivirus, NOD32 Antivirus, or Kaspersky Antivirus.
Source: antivirusdownload.com
Computer Virus Definition & Characteristics:
A Computer Virus is a program that can copy itself and infect a computer without the permission or knowledge of the user. A computer virus has 2 major characteristics: the ability to replicate itself, and the ability to attach itself to another computer file. Every file or program that becomes infected can also act as a virus itself, allowing it to spread to other files and computers. The term "computer virus" is often used incorrectly as a catch-all phrase to include all types of Malware such as Computer Worms, Trojan Horses, Spyware, Adware, and Rootkits - all of which are slightly different than Computer Viruses.
A computer virus needs another program in order to be able to be activated and infect other computers files. Essentially, a computer virus rides piggyback on another file into your computer - once it is executed, the virus will continue to replicate and attach itself to other program files and continue to spread.
A Brief History of Computer Viruses:
Although computer scientists were aware of the theoretical possibility of computer viruses for decades, it was not until the 1980s that viruses began to gain a hold and multiply in large numbers. With the advent of the personal computer, floppy disk drives, and other portable information storage devices, it became easier to program and transfer viruses from one machine to another. Fred Cohen is often cited as the first person to use the term "computer virus" in an academic paper in 1984, although some suggest that he may have learned it from his mentor Leonard Adleman (more info: History of Computer Viruses).
Does My Computer Have a Virus?
Of course, if you ask anyone the question “what is a Computer Virus?”, the reply is likely going to be a bit jumbled. There are many different forms of computer viruses, although many have the same goal; to slow the infected computer system, steal and/or copy information from the computer, and attach itself to sent files and attachments in order to spread to other computer systems. The following are a few telltale signs that your computer might have a virus:
• Slow response and slow program execution
• Random hard drive crashes and restarts
• Distorted graphics and text
• Files that have mysteriously vanished
• Extensive pop-up ads
• Inability to open files with existing passwords
How Can I Protect My Computer from a Virus?
It is far better to avoid computer viruses and take proactive measures to protect your computer system than it is to clean up after them once they have gotten into your computer and caused damage. The following tips will help increase your odds of avoiding infection from a computer virus:
• Download programs only from trusted, reputable websites
• Install a quality Internet firewall
• Do Not open suspicious emails or email attachments
• MOST IMPORTANTLY — Make sure you have a trusted anti-virus program installed on your computer - such as Norton Antivirus, NOD32 Antivirus, or Kaspersky Antivirus.
Source: antivirusdownload.com
Monday, August 15, 2011
10 Most Dangerous Computer Virus 2011
Top 10 Most Dangerous Computer Virus World and Indonesia in the last year. Where growth variants threat or threat of computer viruses and the like are increasingly sophisticated and widespread. Not only for one platform only, but to other operating systems besides Windows. This becomes the cause of the increased activity associated with the virtual world.
Threat level of growth in various forms to achieve a high level and almost dangerous to human life even predicted to trigger a cyber war. Stuxnet virus, for example, entered into SCADA systems commonly used in various infrastructure facilities such as power plant automation systems, industrial machinery, and so on. In fact, Stuxnet also infiltrate into the office of Iran's nuclear facilities and potentially a small mistake can trigger a nuclear hazard.
The following are the top 10 malware roaming in cyberspace Indonesia and the world are successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.
1. Win32/Conficker.AA
Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm entered into a computer by exploiting a vulnerability in Server Service. After Conficker.AA successfully, the sending computer will perform remote control of the victim's computer has been infected and to download.
2. Win32/Conficker.AE
Win32/Conficker.AE is a worm which is also one variant of Conficker.AA, with the modus operandi resembles the way the spread spread Conficker.AA
3. Win32/Agent
According to the description of ESET NOD32 as malware malware detection is generic, which is known among the large family of malware with the user's ability to steal data from infected PCs. To do this malware is usually going menperbanyak him then putting yourself in a temporary folder and add the keys in the registry similar to the malware file or similar to the files to copy themselves at random that was then put yourself in the system folders other operations so that malware can "work" at any time the system starts up.
The malware is capable of mutating into a series of other threat, spread through a series of intermediaries that it's almost impossible to remove it just by using one way only. To prevent this, use a good security device with a complete anti-malware, do not forget to always patch, disable Autorun, and no less importantly, think carefully before you click on something.
4. Win32/Conficker.Gen
Win32/Conficker.Gen is one variant of Conficker that have similarities in the modus operandi of infecting the victim's computer. Similarly, also exploited the same vulnerability is a vulnerability in Server Service.
5. Win32/Conficker.X
Threat this one is a worm that attacks a network computer and spreads by exploiting vulnerabilities in Windows operating system from Microsoft. The vulnerability specifically on the RPC subsystem and can be entered remotely by the attacker. Attackers can launch attacks without using a valid identity. Threat is able to make contact with the web server to download malicious programs to another by using the domain name has not been authorized.
6. Win32/VB
Worm Win32.VB created with Visual Basic programming language and is able to spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because of the risk posed was not large, most cases can be handled Win32/VB by user by using antivirus or security device to stop the movement in corporate gateways. Malware made in the country many are included in this type.
7. INF/Conficker
INF / Conficker is the autorun.inf files that spread Conficker worm. Detection results are also used to parse a set of malware that uses the file autorun.inf as a way to enter and infect personal computers. These files contain information about the program that was developed to be able to run it as a mobile device (eg USB flash disks) and other similar devices accessed by users who use Windows-based PCs.
8. Win32/Alman.NAB
Viruses that infect files. EXE, and spreads through the media that are used together in a computer network. When the virus is active, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB also has another name, namely: Downloader.Agent.LZM, Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe, W32/QQPass.ADW.worm, W32/Rectix.A
9. Win32/Stuxnet.A
Win32/Stuxnet.A is a worm that spreads widely through mobile media devices. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerabilities that are exploited in CVE-2010-2568. Stuxnet is one type of malware with a specific target (targeted malware) is quite popular in the year 2010 as targeted in the automation SCADA systems are widely used in industry.
10. INF/Autorun.gen
Deteksi terhadap INF/Autorun.Gen digunakan untuk menguraikan serangkaian malware yang menggunakan file autorun sebagai cara untuk mengonfirmasi komputer-PC target yang berhasil diserang. File tersebut berisikan informasi program yang dikembangkan untuk mampu melakukan run secara saat perangkat bergerak (misal USB flash disk dan perangkat lain yang sejenis diakses oleh user yang menggunakan PC berbasis Windows.
Source: wayjar.com
Threat level of growth in various forms to achieve a high level and almost dangerous to human life even predicted to trigger a cyber war. Stuxnet virus, for example, entered into SCADA systems commonly used in various infrastructure facilities such as power plant automation systems, industrial machinery, and so on. In fact, Stuxnet also infiltrate into the office of Iran's nuclear facilities and potentially a small mistake can trigger a nuclear hazard.
The following are the top 10 malware roaming in cyberspace Indonesia and the world are successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.
1. Win32/Conficker.AA
Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm entered into a computer by exploiting a vulnerability in Server Service. After Conficker.AA successfully, the sending computer will perform remote control of the victim's computer has been infected and to download.
2. Win32/Conficker.AE
Win32/Conficker.AE is a worm which is also one variant of Conficker.AA, with the modus operandi resembles the way the spread spread Conficker.AA
3. Win32/Agent
According to the description of ESET NOD32 as malware malware detection is generic, which is known among the large family of malware with the user's ability to steal data from infected PCs. To do this malware is usually going menperbanyak him then putting yourself in a temporary folder and add the keys in the registry similar to the malware file or similar to the files to copy themselves at random that was then put yourself in the system folders other operations so that malware can "work" at any time the system starts up.
The malware is capable of mutating into a series of other threat, spread through a series of intermediaries that it's almost impossible to remove it just by using one way only. To prevent this, use a good security device with a complete anti-malware, do not forget to always patch, disable Autorun, and no less importantly, think carefully before you click on something.
4. Win32/Conficker.Gen
Win32/Conficker.Gen is one variant of Conficker that have similarities in the modus operandi of infecting the victim's computer. Similarly, also exploited the same vulnerability is a vulnerability in Server Service.
5. Win32/Conficker.X
Threat this one is a worm that attacks a network computer and spreads by exploiting vulnerabilities in Windows operating system from Microsoft. The vulnerability specifically on the RPC subsystem and can be entered remotely by the attacker. Attackers can launch attacks without using a valid identity. Threat is able to make contact with the web server to download malicious programs to another by using the domain name has not been authorized.
6. Win32/VB
Worm Win32.VB created with Visual Basic programming language and is able to spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because of the risk posed was not large, most cases can be handled Win32/VB by user by using antivirus or security device to stop the movement in corporate gateways. Malware made in the country many are included in this type.
7. INF/Conficker
INF / Conficker is the autorun.inf files that spread Conficker worm. Detection results are also used to parse a set of malware that uses the file autorun.inf as a way to enter and infect personal computers. These files contain information about the program that was developed to be able to run it as a mobile device (eg USB flash disks) and other similar devices accessed by users who use Windows-based PCs.
8. Win32/Alman.NAB
Viruses that infect files. EXE, and spreads through the media that are used together in a computer network. When the virus is active, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB also has another name, namely: Downloader.Agent.LZM, Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe, W32/QQPass.ADW.worm, W32/Rectix.A
9. Win32/Stuxnet.A
Win32/Stuxnet.A is a worm that spreads widely through mobile media devices. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerabilities that are exploited in CVE-2010-2568. Stuxnet is one type of malware with a specific target (targeted malware) is quite popular in the year 2010 as targeted in the automation SCADA systems are widely used in industry.
10. INF/Autorun.gen
Deteksi terhadap INF/Autorun.Gen digunakan untuk menguraikan serangkaian malware yang menggunakan file autorun sebagai cara untuk mengonfirmasi komputer-PC target yang berhasil diserang. File tersebut berisikan informasi program yang dikembangkan untuk mampu melakukan run secara saat perangkat bergerak (misal USB flash disk dan perangkat lain yang sejenis diakses oleh user yang menggunakan PC berbasis Windows.
Source: wayjar.com
Thursday, August 4, 2011
Subscribe to:
Comments (Atom)
















