Posts Tagged virus

BitDefender: Free virus scanning

Version 10 of Bitdefenders Free version is out and available to download for Windows. While an on-demand and not an on-access scanner, there are other ‘better’ versions in the Free range (like Grisofts AVG), BitDefender appears to have a slightly better scanning engine and definition database, so it could be used as a secondary step when scanning files from known dubious sources.

HOW TO MAKE MONEY ONLINE Related Websites
  • Wordpress Backup OptionsWordpress Backup Wordpress Backup is an essential plugin for all Wordpress blog administrators by the Blog Traffic Exchange. It performs regular backups of your upload (images) current theme, and plugin directories. Backup files are available for download and optionally emailed to a specified email. Don't get caught without a recent backup of......
  • BLOGFORMSearch Engine Optimization For Dummies Many people have said to me that they can't afford to employ a SEO company, but they would still like to get better search results on Google, Yahoo and MSN searches. Are there any basic rules that they can follow to improve their ranking on search engine results pages (SERPs)?......
  • Get A FREE Reading Now!Psychic Access PsychicAccess.com Click Here To Get Your Free Reading At PsychicAccess Right NowBecoming a Psychic Access psychic is not an easy task. We are highly selective, accepting only the best of the best psychics for our team. Approximately one in eight applicants make it to the interview stage, and out......

, , , ,

No Comments

Microsoft admits scanning your computer?

According to a post by PC Pro UK, Microsoft admits to scanning system files of Microsoft Windows users during Software Updates.

The article is specifically about the botnet infection rise, but Microsoft apparently discloses that the way they can gather these stats is by scanning the files of users computers looking for specific infections before applying updates and fixes.

While I am a fan of server based updates and mass security patches to tackle the surge of malicious software, being a staunch privacy advocate I believe Microsoft should acknowledge exactly what they do during this procedure and even offer users the choice to just receive mandated patches rather than a full remote scan.

Personal privacy is now beginning to fall back into the hands of users who are forced to look for third-party solutions to keep their private data out of reach from the OS provider. Regardless of what fancy tools Microsoft will integrate into its OS’ to help a user manage and store data, if we don’t know exactly what Microsoft looks at remotely we must use additional tools such as remote file storage and encryption utilities to keep our data for our eyes only.

HOW TO MAKE MONEY ONLINE Related Websites
  • BLOGFORMA Guide To Picking A Website Hosting Service Website hosting services allow individuals and organisations to make their own website accessible to the world web, by using space on a server either owned or leased by them, for the clients use. With internet connectivity as a data centre, they are also able to provide data centre space for......
  • nationalunion3 Reasons to Use Coin Software with Your Collection Just like every other industry, the coin collecting industry has gone high tech. You can buy and sell coins online. You can also use software to grade and keep track of the value of your collection. There are those out there who are resistant to these changes. They prefer the......
  • toolsMust Have Blogging Tools Blogging has developed a serious place for itself in the internet community for many different purposes including personal use and business uses. As a result, it has evolved into becoming a truly essential tool for people who want to build communications, deliver up to date news and information and otherwise......

, , , , , , , ,

No Comments

A trojan that will cost you all your money

The Mail Online reported an outbreak of a trojan called Zeus V3 that specifically targets a certain banks online facilities and waits for infected users to log in when it copies their credentials. The thieves then proceed to empty the accounts.

According to Wikipedia a trojan is:

A Trojan horse, or Trojan, is malware that appears to perform a desirable function for the user prior to run or install but instead facilitates unauthorized access of the user’s computer system. “It is a harmful piece of software that looks legitimate. Users are typically tricked into loading and executing it on their systems”, as Cisco describes.[1] The term is derived from the Trojan Horse story in Greek mythology.

So the user must install some infected piece of software on their computer for this to work.

To protect yourself from these types of threats:

  • Only use online banking that requires a secondary method of authentication (typically a token or random number generator) not a username and password alone
  • Only log into your bank account on your personal computer or computers where you control any software installations
  • Stay away from cracked software. Not only is it illegal, but it could be hiding some malware you might regret later
  • Use anti-virus software to check anything you download and install on your computer
  • Keep your operating system (OS) fully updated with the latest security updates from the OS provider
HOW TO MAKE MONEY ONLINE Related Websites
  • WordPress In DepthWordPress in Depth Need a Manual for WordPress? WordPress has grown into the number 1 blogging tool in its category: several million bloggers have downloaded this powerful open source software, and millions more are using WordPress.com’s hosted services. Thirty-two of Technorati’s Top 100 blogs now use WordPress. WordPress InDepth, 2nd edition is a......
  • Screenshot of ClamTk 3.08 running on Ubuntu 8....Park Your Virus Impervious Smugness Mac (and Linux) Users [/caption] I use linux. I prefer it over Windows for many reasons. It's more resistant to viruses, less of a target, but that doesn't mean that malware or other viruses are impossible. If someone were to trick me into running something and even worse, trick me into using my administrator......
  • BLOGFORMNetwork Security guide for the home or small business network - Part 8 - Don't be afraid to ask for help Deep breath time. We've covered a lot of good topics and it's important at this point to take a close look at what we've talked about and think. "Am I overwhelmed?" If so that's fine. Maybe you don't have enough time to think about all of this network security stuff.......

, , , , ,

No Comments

India now biggest producer of computer diseases

Symantec has published its research findings and reveals India is now the largest exporter of viruses. Security watchdog blogged the warning last week with the news that the UK has dropped down in the list.

Russia follows in number 2 while the US still leads as the worlds largest exporter of spam.

HOW TO MAKE MONEY ONLINE Related Websites
  • BLOGFORMPoll of the Day: Who Is Your Favorite News Host? Whether liberal or conservative, there is someone for everyone in the cable news market.  I personally enjoy The Glenn Beck Program (The special today was great!) and The O'Reilly Factor, and Huckabee on the weekend.  Which newser (Is that a word?) is your favorite?  Vote in today's poll of the......
  • What's in the News- Edition 4 Welcome to this week’s edition of What’s in the News. If something strikes a cord with you, please feel free to start a discussion in our forum. 5 Earth Sized Planets in Our Galaxy- I have always found space fascinating and enjoyed watching documentaries on it. The cool thing about......
  • BLOGFORMReview of The Program: The Brain-Smart Approach to the Healthiest You: The Life-Changing 12-Week Method There are a lot of different books out there looking to help you live a better life. The majority of the books on the market are little more than self-help books written by self-help gurus. It is rare that a book will come along which is written about a program......

, , ,

No Comments