Posts Tagged virus

BitDefender: Free virus scanning

Version 10 of Bitdefenders Free version is out and available to download for Windows. While an on-demand and not an on-access scanner, there are other ‘better’ versions in the Free range (like Grisofts AVG), BitDefender appears to have a slightly better scanning engine and definition database, so it could be used as a secondary step when scanning files from known dubious sources.

HOW TO MAKE MONEY ONLINE Related Websites
  • BLOGFORMSearch Engine Optimization For Dummies Many people have said to me that they can't afford to employ a SEO company, but they would still like to get better search results on Google, Yahoo and MSN searches. Are there any basic rules that they can follow to improve their ranking on search engine results pages (SERPs)?......
  • Free Email Marketing SoftwareFree Email Marketing Software Every once in a while I come across something brilliant online and today is one of those days. I found this free email marketing software by Atlantic Software called Email Marketing Pro 2011, which is perfect for small businesses who don't have a website with email marketing software built in,......
  • BLOGFORMItems To Contemplate Before Starting A Weblog If you are starting a blog, what things must you consider first? Well, here is a collection to get you going, taking you from why you are blogging to blogging security. Why do you want to blog? – It seems daft, but put a reason to it now. Are you......

, , , ,

No Comments

Microsoft admits scanning your computer?

According to a post by PC Pro UK, Microsoft admits to scanning system files of Microsoft Windows users during Software Updates.

The article is specifically about the botnet infection rise, but Microsoft apparently discloses that the way they can gather these stats is by scanning the files of users computers looking for specific infections before applying updates and fixes.

While I am a fan of server based updates and mass security patches to tackle the surge of malicious software, being a staunch privacy advocate I believe Microsoft should acknowledge exactly what they do during this procedure and even offer users the choice to just receive mandated patches rather than a full remote scan.

Personal privacy is now beginning to fall back into the hands of users who are forced to look for third-party solutions to keep their private data out of reach from the OS provider. Regardless of what fancy tools Microsoft will integrate into its OS’ to help a user manage and store data, if we don’t know exactly what Microsoft looks at remotely we must use additional tools such as remote file storage and encryption utilities to keep our data for our eyes only.

HOW TO MAKE MONEY ONLINE Related Websites
  • BLOGFORMA Guide To Picking A Website Hosting Service Website hosting services allow individuals and organisations to make their own website accessible to the world web, by using space on a server either owned or leased by them, for the clients use. With internet connectivity as a data centre, they are also able to provide data centre space for......
  • toolsMust Have Blogging Tools Blogging has developed a serious place for itself in the internet community for many different purposes including personal use and business uses. As a result, it has evolved into becoming a truly essential tool for people who want to build communications, deliver up to date news and information and otherwise......
  • BLOGFORMWindows Vista Beta notes... What follows are some notes that I've taken on the Vista beta that I installed into a VM. I've got a lot of toying around yet to do with it (and at least one Internet Explorer bug I want to mention.) But... I'll go ahead and post this. [warning -......

, , , , , , , ,

No Comments

A trojan that will cost you all your money

The Mail Online reported an outbreak of a trojan called Zeus V3 that specifically targets a certain banks online facilities and waits for infected users to log in when it copies their credentials. The thieves then proceed to empty the accounts.

According to Wikipedia a trojan is:

A Trojan horse, or Trojan, is malware that appears to perform a desirable function for the user prior to run or install but instead facilitates unauthorized access of the user’s computer system. “It is a harmful piece of software that looks legitimate. Users are typically tricked into loading and executing it on their systems”, as Cisco describes.[1] The term is derived from the Trojan Horse story in Greek mythology.

So the user must install some infected piece of software on their computer for this to work.

To protect yourself from these types of threats:

  • Only use online banking that requires a secondary method of authentication (typically a token or random number generator) not a username and password alone
  • Only log into your bank account on your personal computer or computers where you control any software installations
  • Stay away from cracked software. Not only is it illegal, but it could be hiding some malware you might regret later
  • Use anti-virus software to check anything you download and install on your computer
  • Keep your operating system (OS) fully updated with the latest security updates from the OS provider
HOW TO MAKE MONEY ONLINE Related Websites
  • BLOGFORMThe Basics Of SEO Services In Philippines How could that be if you're searching for a few crucial paperwork, posts or everything on manyfavourite internet search engine like Google, Yahoo and Bing. and each time you receive forwarded to some ineffective web site?? Pulling hairs, cursing that search results and site, is it not? But, due to......
  • BLOGFORMHow to Remove SoftSoldier | Soft Soldier Removal Guide Soft Soldier is yet another entry in the long wini line of rogue antivirus applications. ( TrustFighter TrustFighter Removal Guide, TrustSoldier removal guide and the following others... SafeFighter (Safefighter Removal), TrustCop (TrustCop Removal Guide), SecureWarrior (SecureWarrior Removal), SecurityFighter (SecurityFighter Removal), SecuritySoldier (SecuritySoldier Removal) and it also has gone under other......
  • BLOGFORMCrimeware Defined and Explained Crimeware is malicious software used to initiate a crime that is typically Internet-based. During the past two years, crimeware attacks have increased at a far greater rate than the normal virus. International gangs of virus writers, hackers and spammers are joining forces to steal information and collect huge profits......

, , , , ,

No Comments

India now biggest producer of computer diseases

Symantec has published its research findings and reveals India is now the largest exporter of viruses. Security watchdog blogged the warning last week with the news that the UK has dropped down in the list.

Russia follows in number 2 while the US still leads as the worlds largest exporter of spam.

HOW TO MAKE MONEY ONLINE Related Websites
  • santamonicapierFishing Report: August 05, 2011 Lake fishing has been good for bass, catfish and some trout Anderson: Using spinnerbaits and crankbaits will get you some great catches here. While bass is the best catch in this lake, you will still get a few occasional surprise trout on your line. Jigging is the best method to......
  • BLOGFORMWebOS to get Adobe Flash in less than 45 Days It looks like WebOS will be first mobile operating system to support Adobe Flash - and it's coming quickly. Adobe says: A prerelease version of Flash Player 10.1 is now available for Windows, Macintosh and Linux operating systems. A beta is expected to be available for Palm webOS later this......
  • BLOGFORMReview of The Program: The Brain-Smart Approach to the Healthiest You: The Life-Changing 12-Week Method There are a lot of different books out there looking to help you live a better life. The majority of the books on the market are little more than self-help books written by self-help gurus. It is rare that a book will come along which is written about a program......

, , ,

No Comments