Tuesday, January 10, 2012

Detect And Remove Trojans And Boot Sector Viruses

One can only understand a boot virus once they understand the boot sector.. All disks and hard drives are divided into small sectors. The first sector is called the boot sector... In this area the Master Boot Record (MBR) is located and this device contains information concerning the location of partitions on the drive and as well as the reading on the bootable operating system partition. Thus a boot sector virus is one which infects the first sector, or the boot sector. Once you have discovered a boot sector virus on your computer system, there are several steps that you must take to disinfect the boot virus. First the best idea is to use antivirus software, which is able to detect the boot sector (as well as any other existing) virus and eliminate it by either quarantining it or removing it from the system altogether.

Regardless of whether you use antivirus software or another method to disinfect the boot sector virus, you should remember to always create a system disk, and once the disk is created, it should be write protected in order to avoid infection. A good way to determine which is the best antivirus software for your particular situation is to use a antivirus software review or doing an antivirus software comparison. An antivi rus software review will inform customer comments and the basics of the particular piece of software, while a comparison will include the comparison of two or more products to allow you to decide which is better..

What Are Some Harmful Trojans That Have Infected Boot Sectors And Caused Damage?

There have been many harmful Trojan viruses in the past that have infected boot sectors and caused damage, and the most important thing to recognize here is how a virus such as the Trojan virus works. It is fundamentally important to understand how it spreads throughout the computer system. What happens is that each virus consists of a set of instructions, and in these there are instructions for their r eproduction. Therefore, if the program containing the virus is executed, the virus will become active and can then spread and distribute itself further. After this, each virus will generally carry out own separate and specific command, depending on the type of virus that is involved, and all viruses must attach themselves to other programs to be able to reproduce themselves.

The objective of antivirus software is to protect your computer against viruses and these types of software work by alerting you if there is any virus present on your computer...In that case you will be notified and can then carry the essential task of having the virus file quarantined or removed completely from your computer. This is a task which most antivirus software programs are able to decide on their own. Good antivirus programs offer a combination of three methods which are: checking programs for modifications.. Almost all virus detection programs operate in this method. . Checking whether the virus' signature occur s somewhere in a file; and checking the instructions carried out by a particular program are the modus operandi.. For instance if the end of a program contains a series of instructions that would copy portions of the file to another file, or that would format a hard disk; then it is most likely that this program has been infected with a virus.

When deciding on which form or type of antivirus protection software to go with, there are many options.
However you must be prudent in choosing the one that is right for you. Some of the important ones include mac antivirus, freeware antivirus, and antivirus software download. You can find help in making your decision by using components like an antivirus software review, an antivirus software comparison, antivirus software ratings, antivirus software reviews, or by simply using the best free antivirus software or best antivirus program at that particular time. However remember that you should never purchase antivirus software simply because it is popular. On the contrary you must use these positive opinions and then do a research on your own, to determine if the piece of software is good.

How To Detect And Remove Trojans And Boot Sector Viruses
With regards to how to detect and remove Trojans and boot sector viruses, there are basic steps in volved in this process. Generally, to remove Trojan viruses, you will need to delete the actual program files. There is no cleaning required. The basic steps involved in this process include some of these... Shut down your computer immediately, as doing this will ensure that the virus can not stay in the memory,, create a bootable floppy disk,, boot off of the floppy disk,, run a program called tdclear or wdclear, maxblast.. Similarly use any program which will completely wipe everything from your computer, including RAM and MBR..Then finish by reinstalling Windows.

Anti virus updates to keep track of advanced security

Effective Protection With Updated Virus Definitions

An antivirus update is an update which you provide to your computer. Thi has relavance to any existing antivirus programs that are already downloaded onto your system, and this antivirus update is used to know about the antivirus program that you have up-to-date. An antivirus update is a type of software that you install to your computer so that your computer will be safe and guarded against worms, viruses, Trojan horses, and other uninvited programs and bugs. Update virus definitions can help by cleaning your computer, which will free your computer system from existing viruses, and with whichever type of antivirus software you have installed you can use this frequently to maintain the cleanliness of your computer system. As new viruses have the power to destroy hardware as well, only frequent updations of anti virus can save hardware like hard disks or label printer.

The Importance Of Antivirus Updates
Antivirus updates are incredibly important. Similiarly the key related issues are virus definitions, computer virus definitions, Symantec virus definitions, antivirus update of virus definitions, antivirus downloads, and antivirus free downloads. Antivirus updates keep your computer system up-to-date on the new and technologically advanced matters, and this is essential to take the fullest precautions in keeping your computer guarded against viruses, bugs, and malicious software. In fact one of the most important things to remember about antivirus software is that you check and see if there are any updates as frequently as you can, so that you can get the latest computer virus definitions installed into that software program. After all, there is really no point in having the antivirus software at all if you are not going to update it when it is necessary to.

Regardless of whether the actual antivirus program was free or not, the updates are usually costless, and so it is not much of a hassle to take the little time that is necessary to update your program...Once you have installed the antivirus program to your computer, you want to make sure that you are using it correctly. It is incredibly surprising how many computer users assume that they are using the software properly and that everything is fine when actualy there is nothing protecting their computer at all. Your computer should be set so that the antivirus software will automatically turn on as soon as you boot your computer.

The Purpose Of Virus Defination Files
The matter of virus definitions is also incredibly important in this matter. Virus definition files contain the patterns used to identify viruses, and they also tell the scanner what to look for to be able to spot viruses in infected files.
Typically, all commercial virus scanners today use virus definition updates on a monthly basis, which is incredibly important, especially when you consider that there are new viruses found all the time, and thus that there needs to be new and more innovative ways to deal with them constantly. some programs use not only virus definition files but parts of the scanner program itself. In viral removal and recovery, th is is an essential step, as despite the best methods and measures you may take, you are still not protected from a virus catch a virus on your computer.

Although in most cases all virus scanners will use that virus definition files which will include software that will be able to remove most viruses, i n many cases a scanner will be able to detect a virus but will not be able to actually remove it from the system. It is absolutely crucial to understand the methods that can be taken to combat files that are infected with viruses, and the most common results are either the file will be disinfected automatically or most viruses are able to be removed from files automatically or the file will require special disinfection or as some viruses can be removed and will require special tools to do so. Other possible results are that the file cannot be disinfected, and in this case, you will have to figure out and consider other options.

A firewall is an absolutely essential piece of software that any computer user should have installed on their computer, as it does is keep your computer system safe from other computers, viruses and bugs, on the Internet. A firewall is considered to be the best piece of software that you could ever install, and you can even find them for free. Virus checkers are also imp ortant, as these help to protect your computer from viruses by checking files, including attachments in emails. Considering the large majority of viruses that are sent through emails, this piece of software is obviously crucial.

Wednesday, January 4, 2012

Help protect your computer from viruses

Computer viruses are deadly. They often spread without any apparent contact and can be a nuisance, or worse, fatal to your computer. Individuals who create these viruses, estimated at 10-15 new day, the electronic version of terrorists. Their goal is to inflict havoc and destruction to many people as possible by disabling, steal, damage or destruction of computer and information resources. Often they have no specific target in mind, so no one is safe. If you access the Internet, share files or your computer with others, or load anything from diskettes, CDs or DVDs on your computer, you are vulnerable to viruses.

Fortunately there are good guys working just as hard as the hackers to develop cures for viruses as quickly as they send them off into cyberspace. And there are many things you can do to keep your computer from catching viruses in the first place.

Defining Viruses:
A virus is a small computer that can copy and spread from one computer to another, with or without the help of the user. However, viruses typically do more than just fruitful and multiply, which is bad enough in itself, because the pig system resources. Anything else viruses are programmed to do, from displaying annoying messages to destroying files, is called their payload. Often they can not deliver their cargo to an unsuspecting user does something to the virus to execute its programmed function. This could be as simple as clicking on an innocent looking file attachment with an. Exe (executable) extension.

Catching a Virus:
Most viruses are spread via e-mail attachments, because it's the easiest way to do it. Although Macintosh, Unix and Linux systems can catch viruses, hackers are particularly keen on exploiting the security weaknesses in anything Microsoft, particularly Microsoft Outlook and Outlook Express. Due to the popularity of this software, hackers maximum value for money, and they probably get some satisfaction from continually remind Microsoft that being big does not mean you're perfect.

Solution 1: Anti-virus software
The first line of defense is to install anti-virus software. Be extra safe, also install firewall software, now included in some anti-virus packages. This software can scan your disks for viruses and neutralize them. Here are some features in the evaluation of anti-virus software to consider.
- Compatibility with your operating system - Make sure the software works with your system, especially if you have an older operating system like Windows 98.
- Firewall software - If it is not included, find out if it is available. If you must buy it from another supplier.
- Automatic background protection - This means your software will constantly scan behind the scenes for infections and neutralize them as they appear. This provides some peace.
- Automatic, frequent updates - Because new viruses appear every day, you want regular updates. It's even better if they occur automatically when you connect to the Internet. If automatic update is not listed, you must meet the vendor's website and download updates yourself checked. This is vital, because you will not be protected against new viruses if your software is outdated.
- Disaster recovery - Software with a utility to help you get your system back to normal after a virus attack is always good to have.
- ICSA certification - The International Computer Security Associatioin has standards for the detection rates of anti-virus software. Make sure your software has the ICSA certification.
- Technical support - It's a good idea to package a free technical support, either online or via a freephone number offering select. If you're ever felled by a virus, you need it. Some anti-virus software vendors are Symantec Corporation (Norton AntiVirus), McAfee Corporation (McAfee VirusScan), Trend Micro Inc. (PC-cillin), and Zone Labs Inc. (Zone Alarm Suite).

Solution 2: The Virus Scan
If you have a particularly juicy attachment that you're dying to open, save it to your Windows desktop and run your anti-virus software at first. To do this, click once gently on the file to your desktop ... not really open ... Then right click and choose Scan with (Name of Anti-Virus Software) to activate a virus scan.
If it is infected, your anti-virus software to neutralize, or at least tell you the attachment is too dangerous to open. On the other hand, do not feel guilty if the thought of saving a potentially malicious file on your system is enough to make your eagerness to open it and make you immediately delete under control.

Solution 3: Delete first, ask questions later.
Any doubt about the origin of an e-mail, the best thing to do is to remove without opening or viewing. However, some viruses such as Klez, propagate by fishing in those address books and sending themselves from any contact they find to another random contact. You can use a virus just by people in your address book, even if you're not an e-mail them anything. She gets it from someone else in your address book, which really makes life confusing. Because of the proliferation of porn on the Internet, e-mail viruses often tempt victims by using sexual filenames, such nudes.exe. Do not fall for.
Solution 4: Beware of virus hoaxes
E-mails warning you about viruses are almost always hoaxes. You may be inclined to believe them, because you typically receive them from well-meaning friends, that they receive from friends, etc. These e-mails themselves usually no viruses, but some have actually fallen into the hands of hackers who loaded them with viruses and has happily on their way as a sick joke.

The proliferation of e-mails about virus hoaxes can become nearly as bad as a real virus. Think about it, if you obey an e-mail that tells you to forward to everyone in your address book, and they they do it, and it's long enough, you could bring the Internet to its knees. If you ever want to verify a virus warning, your anti-virus vendors have a list of hoaxes on the website. It is in the business of providing the fixes, so it will know which viruses are real.

Solution 5: Beware of file extensions
The extension of a file name of the three characters that come after the dot. Windows are now hidden by default filename extensions, but it's not a good idea. Just able to see a suspicious extension and deleting the file before opening it can save you from a virus infection.

To see file extensions in your directory listings on Windows XP desktop, click the Start button | Control Panel | Folder Options | View tab. Check the box for Hide extensions for known file types. Click Apply | OK. System files are still hidden, but you'll be able to extensions for all files you need to be concerned with seeing. Viruses often live on files with these extensions -. VBS, SHS, pif, Ink -... And they are almost never legitimately used for attachments.

Solution 6: Disable the SHS extension.
A dangerous extension you can easily switch is. SHS. Windows will not recognize him and will notify you before you attempt. SHS file. The extension is usually just used for "scrap object" files created in Word and Excel when you highlight text and drag it to the desktop for pasting into other documents. If this is not something you ever do, or you have Word and Excel 2000 or later, giving you up to 12 items on the Clipboard, click the Start button | Control Panel | Folder Options | File Types tab. Under Registered file types, scroll down and highlight the SHS extension. Click Delete | Yes | SignUp | OK.

Solution 7: Dealing with double extensions
When you turn on your extensions in Windows, you will be able to detect viruses that piggy-back on themselves innocent looking files with a double extension, such as happybirthday.doc.exe. Never trust a file with a double extension - it goes against nature.

Solution 8: Beware of unknown exe files.
A virus is a program to be executed for his dirty work, so it can. Exe extension. Unfortunately, this is the same extension used by legitimate program files. So, do not panic if you find files named Word.exe or Excel.exe on your system - giving your Microsoft software. Just do not ever open a file with a. Exe extension if you do not know what the file purpose.

Solution 9: Watch out for icons
Viruses in attachment files have been known to the shape of familiar looking icons of text or photo files, like the wolf in the henhouse to take. If you have an unexpected attachment, do not open it without first using your anti-virus software.

Solution 10: not available through the public newsgroups
What better place for a hacker to lurk and stick his virus than in the middle of a crowd? Sooner or later, someone is required to download the virus and to get things going. Not to download files and programs from newsgroups or bulletin boards, or open email attachments from strangers in chatrooms ("Let's exchange pictures!") Without first scanning with your anti-virus software.

Solution 11: Avoid bootleg software
This may seem like a no brainer, but sometimes that tiny price tag on a popular but expensive package can be too good to resist. Resist! Also be careful about accepting party software. You do not know where it is, and what may have started as a perfectly clean package could have become infected during installation on someone else's infected computer.

Solution 12: Protect macros in MS Word, Excel and Powerpoint
A common type of virus uses macros. Macros are sets of stored commands that users can save as shortcuts to perform long functions in just a few keystrokes. A macro virus may perform such mischief changing file types from text files or spreadsheets into templates, lock keyboards, and deleting files. Word, Excel and PowerPoint with protection against macro viruses. To make sure yours is activated, open each application, click on the Tools | Macro | Security. On the Security tab, make sure Medium or High is selected. Clcik OK. If you are already infected with a macro virus, you will notice that the steps of this procedure are unavailable because the virus has disabled them. In that case, a virus scan on your system to see if your anti-virus software can kill the virus.

Solution 13: Use passwords
If you share your computer, it's a good idea to assign everyone a password. Passwords must be a combination of letters and numbers no less than eight characters long, and preferably nonsensical. Never write passwords and stick them anywhere near the computer. Assign passwords in Windows XP, click the Start button | Control Panel | User Accounts. Follow the prompts to assign / change passwords.

Solution 14: Update Software
Microsoft releases patches for the constant security holes in its operating system and applications software. however not be drawn into complacency if you have Windows Update automatically checking things for you. Update checks for patches for bugs in the OS, not for security problems.
For the latest security hotfixes (as Microsoft calls them), visit http://www.microsoft.com and search for hotfixes for all your Microsoft software, particularly Outlook and Outlook Express.
Microsoft has a free downloadable package called Microsoft Baseline Security Analyzer (MBSA) that scans your system for missing hotfixes. It works with Windows 2000 and XP Home and Professional. It does not support Windows 95, 98 or ME.
To download the MBSA, go to the part of the Microsoft TechNet Web site. Be warned that the information is written in techie language, so you can be daunting.
Last words:
Now that you have a number of ways to prevent and deal with viruses do, let's wrap things with some solution you probably heard it before, but have ignored.
- Back up your files regularly - If a virus crashes your sytem, you'll feel much better if you back up all your important files. Make backups on one media from the computer, such as floppy disks, Zip disks or CD's. Scan for viruses before using them the way to ensure that they are not infected. If they are, they will do you no good if you ever have to use them because they simply pass the virus back to your computer.
- Create a boot disk - Create an emergency boot diskette before you have a problem, so you can start your computer after a serious security problem To make a boot disk with Windows XP, put a blank floppy in the drive. Open My Computer, right-click the floppy drive. Click Format. Format options, click on an MS-DOS startup disk. Click Start. Store the disk in a safe place. With a little luck, you'll never have to use.
- Turn off your computer - DSL and cable connections "always on" can be useful, but you should always turn the computer off when not in use. Hackers can not go to a machine off.

Virus Google

The Google redirect virus 2011 is one of the most common viruses that is currently circulating the Internet in 2011. The most common symptoms of the virus are:
Being redirected to other pages when clicking a search result in virus Google.
Having advertising popups appear at random intervals.

Being redirected to other websites even when typing them into the navigation bar of your browser.

Unfortunately the Google redirect virus 2011 can be particularly nasty and can pose various threats to your computer and its security, the most common being:
Getting redirected to malware ridden websites, these sites will attempt to install further malware onto your computer which can include key loggers and identity theft viruses.

Getting redirected to phishing websites. These sites will appear to be exactly the same as the normal site but will actually be used to steal your login information or even bank account details. Common phishing site clones include eBay, PayPal, Facebook and online banking websites.

Furthermore, the Google redirect virus might include features that will do the following:

Silently 'clickjack' in the background. This process involves your computer being used to click advertisements secretly in the background and fund the criminals behind the virus by providing them with false advertising revenue.
Allow your computer to become an open proxy server. This means your computer can be used by other hackers to access websites anonymously. It is possible this could be used for criminal activity such as buying goods online with stolen credit cards. Not only that but it can drain your bandwidth and cause your browsing experience to be very slow.

Prevent you from ever reaching the websites that you want to and completely ruining your browsing experience by redirecting you to fake and useless websites instead of the sites you've clicked on.

How to remove the Google redirect virus 2011
Removing the Google redirect virus 2011 can is generally not easy with conventional anti-virus and anti-malware software. This is because there are thousands of slightly different virus strings that prevent the virus from being detected. The creators of the virus will make it 'polymorphic', this means the virus code changes but the actual function of the virus remains intact.

The solution to the Google redirect virus 2011: Combofix (Fix Redirect Virus)
This is the most effective tool to remove the Google redirect virus 2011. It was designed to specifically target the virus and was coded to detect the string variations in the virus. Unlike tools such as Spybot, Malwarebytes and anti-virus vendors, it locates the specific registry keys, and dll files that the Google redirect virus infects. This makes the removal process quick and easy.

It also comes with 24/7 technical support in case you get stuck and also free updates for life (very important since virus creators are constantly creating new ways to infect machines). The program is a piece of cake to use even for the most novice of computer users. It's quick, easy and will ensure you never have to worry about the Google redirect virus again.