Article update: Harden your Mac from malicious software attacks

Sorry if this is posted in the wrong place.

Article

Harden your Mac from malicious software attacks

Harden your Mac from malicious software attacks

Seems to be outdated. ( Changed the: July 12, 2013 19:28 46816 views )

It is the Firefox Mozilla Knowledge Base article

Note

  • This is the official site of support of Firefox that is bound to the User Interface of Firefox browsers.
  • This Mozilla document can not be an article on it, but still had 10s of thousands of views.

Is someone able to update this document or suggest other resources or document to include in the document of Mozilla?

Personally, I don't use a Mac.  One point which can be exceeded in the Apple support document some of the references to the clams.

Is ClamXav graphic version is no longer free?  (https://www.clamxav.com/changetocommercialsoftware)

There is also now a product available from how Malwrebyes 2015 is considered within the Apple community.
(Yes I realize that as Linux and Android, you will have less malware and adware issues than the MS OS)

It's free and (probably) equivalent Windows software is well regarded in the Mozilla community.

Thanks in advance,

John

Mac users often ask if they should install "anti-virus" (AV) or software "anti-malware". The answer is 'no', but it can give the false impression that there is no threat of what is loosely called 'virus '. There is a threat.

1. it is a comment on what you should - and should not-do to protect you from malicious software ("malware") that runs on the Internet and gets onto a computer as an unintended consequence of the user's actions.

It does not apply to the software, such as keyloggers, which can be installed deliberately by an intruder who has convenient access to the computer, or who has been able to take control of it remotely. This threat is in a different category, and there is no easy way to defend against it. AV software is not intended to and does not, to defend against these attacks.

The comment is long because the issue is complex. The essential points are in articles 5 and 11.

OS X implements now three levels of integrated protection specifically against malware, not to mention the protections of runtime such as quarantine the file, execute disable, sandbox, protecting the integrity of system, System Library randomization and randomized address space layout , which can also prevent other kinds of exploits.

2. all versions of Mac OS X 10.6.7 were able to detect the malware Mac known in downloaded files and block non-secure web plugins. This feature is transparent to the user. Apple calls internally it "XProtect."

The malware used by XProtect recognition database is automatically updated. However, you should not count on it, because the attackers are still at least a day before the defenders.

The following restrictions apply to XProtect:

☞ circumvented by some third-party network software, such as the BitTorrent clients and Java applets.

☞ It applies only to software downloaded on the network. Software installed from a CD or other media is not verified.

As new versions of Mac OS X are available, it is not clear whether Apple will continue indefinitely maintain the older versions such as 10.6 XProtect database. Versions of obsolete systems security may eventually be affected. Updates to security for the code of obsolete systems will be stop being released at any given time, and which can leave them open to other types of attack in addition to malware.

3. starting with the OS X 10.7.5, there was a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and installation packages downloaded from the network will be run only if they are digitally signed by a developer to a certificate issued by Apple. Certified software in this way has not been checked for safety by Apple, unless it comes to the App Store, but you can be reasonably sure that it has not been changed by someone other than the developer. His identity is known to Apple, so it could be held legally responsible if it distributes malicious software. Which may not mean much if the developer lives in a country with a weak legal system (see below).

Access controller does not depend on a database of known malware. He has, however, the same limitations as XProtect and in addition the following:

☞ It can easily be turned off or overridden by the user.

☞ A malware attacker could find a way around it, or could take control of a certificate of signing of code under false pretenses or could simply ignore the consequences of the distribution of malware Tryggvason.

☞ Developer App store could find a way around the Apple control, or the control may fail due to human error.

Apple took too long to revoke some known attackers codesigning certificates, thus diluting the value of the keeper and the program developer ID. These variances do not involve the App Store products, however.

For the reasons given, App Store, and, to a lesser extent - other applications recognized by signed Gatekeeper, are safer than others, but they cannot be considered to be absolutely sure. "Sand" applications could make to access to private data, such as your contacts, or for access to the network. Think that before granting access. Security sandbox is based on user input. Never click through any application for leave without thinking.

4. by starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background. He checks and removes, malware that corresponds to a database of recognition held by Apple. To ensure that MRT will be executed when the database is updated, the App Store tab in system preferences and check the box marked

Install the system data files and security updates

If it is not already done.

As XProtect, MRT is effective against known threats, but not against strangers. It alerts you if it detects malware, but otherwise, it has no user interface.

5. the built-in Mac OS x security features reduce the risk of malware attack, but they are not and will never be complete protection. Malware is a problem of human behavior, not a behavior machine, and none only of technological solution will solve. Software protect you from trust only will make you more vulnerable.

The best defense is always going to be your own intelligence. Except perhaps feats of Java, all the known malware, circulating on the Internet wearing reached a completely setting installation to update to OS X 10.6 or later takes the form of so-called "Trojans", which may have no effect if the victim is deceived in their execution. The threat thus amounts to a battle of wits between you and cybercriminals. If you are better informed, they think you are, you win. In effect, it means that you always stay in the shelter of practical computing. How do you know when you leave the safe harbor? Here are a few signs warning of danger.

Software from a reliable source

☞ Software with a brand, such as Adobe Flash Player, does not come directly from the Web site. Don't be fooled an alert of any website for updating Flash, or your browser, or other software. A real alert that Flash is outdated and blocked is shown on this support page. In this case, follow the instructions on the support page. Furthermore, assume that the alert is false and that someone is trying to rip you off to install malicious software. If you see these alerts on more than one Web site, ask for instructions.

☞ Software any is distributed via BitTorrent or Usenet, or on a Web site that distributes pirated music and movies.

☞ Rogue sites Web such as CNET Download MacUpdate, Soft32, Softonic and SourceForge distribute free applications that have been packaged in a superfluous "install".

☞ The software is advertised through spam or intrusive web ads. Any announcement, on any site, which includes a direct link to a download should be ignored.

Software that is clearly illegal or doing something illegal

Commercial software ☞ high-end such as Photoshop is "cracked" or "free."

☞ An application helps you violates copyright law, for example to circumvent the copy protection on a commercial software, or streamed media recording to be reused without permission. All the 'YouTube downloaders' are in this category, but not all are necessarily malicious.

Conditional or unsolicited offer from strangers

☞ A phone calling or a web page you indicates that you have a "virus" and offers to remove. (Some reputable sites warned visitors who have been infected with the malware "DNSChanger" legitimately. The exception to this rule applies.)

☞ A web site offers a free content like music or video, but for use, you must install a "codec", 'plug-in', 'player' 'Downloader', 'extractor', or 'certificate' which comes from the same site, or a stranger.

☞ You win a prize in a competition that you are never entered.

☞ someone on a forum like this is eager to help you, but only if you download an application of your choice.

☞ a 'FREE WI - FI!' network presents itself in a public place like an airport, but is not provided by management.

☞ Online everything that you expect to pay is 'free '.

Unexpected events

☞ a file is downloaded automatically when you visit a web page, without any further action on your part. delete any file without opening it.

☞ You open what you think, it is a document and you receive an alert that it is "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you must always remove any download that is not what you expected it to be.

☞ An application does something you don't expect, such as permission to access your contacts, your location or the Internet without obvious reason.

☞ Software is attached to the email you na not ask, even if it is (or seems to come) by a person of trust.

I do not leave the safe harbour that once will necessarily lead to disasters, but make a habit of it will weaken your defenses against malicious software attacks. None of the above scenarios must, at the very least, make you uncomfortable.

The emergence of data "ransomware" for Mac was part of the defense against the attacks of backup all data. Since an infected machine could destroy its own backups, at least a backup unit must always be in offline mode. For example, you could turn your backup drives, keeping one with you or another site. This strategy also protects against a physical threat such as a fire or theft.

6. Java on the Web (not to be confused with JavaScript, to which it is not related, despite the similarity of names) is a weak point in the security of any system. Java is, among other things, a platform to run complex applications in a web page. That was always a bad idea, and Java developers have proved unable to apply it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been a type virus Windows affecting OS X. simply load a page with Java malicious content could be harmful.

Fortunately, client-side Java on the Web is outdated and largely disappeared. Only a few outdated sites still use it. Try to accelerate the process of extinction by avoiding these sites, if you have a choice. Forget to play games or other uses not Java essentials.

Java is not included in OS X 10.7 and later versions. Discrete Java installers are distributed by Apple and Oracle (the developer of Java). Do not use one unless you need it. Most of the people don't. If Java is installed, turn it off- not the JavaScript in your browser.

Whatever the version, experience has shown that Java on the Web is not reliable. If you must use a Java applet for a job on a specific site, Enable Java only for the site in Safari. Never activate Java for a public Web site that carries the third-party advertising. Use only on websites that are well known, protected by login and secure without ads. In Safari 6 or later, you will see a padlock icon in the address bar when you visit a secure site.

7. another perennial weak point is Adobe Flash Player. Like Java, Flash is declining well deserved, but content Flash is still much more widespread than the contents of Java on the Web. If you choose to install the Flash plugin, you can reduce your exposure to Flash by checking the box marked

Stop the plug-ins to save energy

in the Advanced tab of the preferences of Safari window, if not already done. Consider also installing an extension Safari as "ClickToFlash" or "ClickToPlugin." They will prevent the Flash content automatically load and are initially not Flash video is substituted for Flash on YouTube and perhaps a few other sites. I tested the extensions and found them safe, but you should always do your own research before you decide whether to trust any third party software.

8. remain within the sphere of security, and you will be as safe from malware you can be practically. The rest of this comment is what you must do to protect you.

Although it may seem counterintuitive, you should never install any AV or products 'Internet security' for Mac if you have a choice, because they are all worse than useless. If you are required by a (wrong) institutional policy to install some kind of AV, choose one of the free apps in the Mac App Store, nothing else.

Why you should not use products AV?

☞ To recognize malware, software depends on a database of known threats, which is always at least one day to day. This technique is a proven failure, as a major supplier of AV software has admitted. Most of the attacks are "zero-day" - that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry comes to realize that the traditional AV software is worthless.

☞ design is based generally on the nonexistent threat that malware can be injected at any time, anywhere in the file system. Malware is downloaded from the network; He is not of the blue leaves. To meet this threat does not exist, a commercial AV software changes or low level functions of the operating system, which is a waste of resources and a frequent cause of instability, bugs, poor performance, and duplicates.

☞ changing the operating system, the software can also create weaknessesthat could be exploited by malicious attackers.

☞ especially, a false sense of security is dangerous. This fact relates to all AV software it will never be any changes elsewhere.

Using the software AV defines you for double exploitation: by hackers, malicious software, that the software does not protect you and the actual AV industry. The latter will often try to hang with a product free of appeal , so it can charge you for "improvements" later.

9. a free AV product from the Mac App Store is safe as long as you don't let it delete or move files. Ignore all the warnings that it can give you on "heuristic" or "phishing." These warnings, if they are not simply false positives, see the text of e-mail messages or updates cached web pages, not malware. Also ignore any attempt to upsell you to a paid version of the product.

An AV application is not necessary and may not be invoked for protection against malware for OS X. It is useful, or even not at all, only to detect malware Windows and even for this use it is not really effective, because the new Windows malware makes its appearance much faster than OS X malware.

Windows malware cannot hurt you directly (unless, of course, you use Windows). Just do not pass to someone else. A malicious link in the e-mail is usually easy to recognize by the name alone. A concrete example:

     London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe

You don't need software to tell you it's a horse Trojan for Windows. Software may be able to tell what trojan is, but who cares? In practice, there is no reason to use a recognition software, unless an organizational strategy requires. Malware Windows is so widespread that you must assume that it is in each attachment until proof to the contrary.

A free AV product on the App Store can serve a purpose if it fulfills a misinformed network administrator that requires to have some sort of application AV. An App Store product will not change the operating system; in fact, it does nothing, unless you run it.

If you are just curious to know if a file is recognized as malware by the AV engines, you can download it from the "VirusTotal" site, where it will be tested against most of them. A negative result is evidence of what whether, for the reasons given above. I do not recommend doing this with a file that may contain private information.

10. There seems to be a common belief that the firewall Application acts as a barrier to infection, or prevents operation of malware. He does not. It blocks incoming connections to some network services you are using, such as file sharing. It is disabled by default, and you should leave it like that if you're behind a router on a private home or office network. Activate only when you are on an untrusted network, for example a public Wi - Fi hotspot, where you do not want to provide services. Disable services that you don't use in the sharing preferences window. All are disabled by default.

11. as a Mac user, you don't have to live in fear that your computer may be infected whenever you install the software, read emails, or visit a web page. But nor can you assume that you will always be free from exploitation, no matter what you do. Internet browsing, it's like walking the streets of a big city. It can be as safe or as dangerous that you choose to do so. The greatest harm done by software AV is precisely its selling point: it makes people feel safe. They can then feel sufficiently safe to take risks, which the software does not protect them. Nothing can reduce the need for safe computing practices.

Tags: Mac OS & System Software

Similar Questions

  • I was downloading a video and a pop up came saying that my mac may be exposed to attacks from malicious software due to the unsafe browser extension. What should I do?

    I try so not to panic, but this pop up window came. I got my mac three months ago, so I don't know what to do.

    honestly don't worry I went on the site and got the same thing, it's a virus that they want you to download. Your mac is safe and has its own security system so it is almost impossible to get a virus, don't forget not to download anything that your uncertain of.

  • Updates to Windows for the malicious software removal tool. Can I watch it install and then look at the scan

    Updates Windows 7 for malicious software removal tool. When the download of the update can I watch it install and then watching the ongoing comprehensive analysis

    Thank you for Pingu70

  • How can I report an attack from malicious software by using your video download? Avast has refused to let it download and then survey myself, it was as an attack.

    An update for Mozilla video appeared when I opened Mozilla this morning. I clicked Yes, because the videos have been seriously lagging behind. Avast flashed immediately that it was a virus, so I stopped it download. After returning from lunch, it does the same thing. The download shows as Video.exe and Avast is described as: URL: hxxp://69.4.238.156/14/NewVideoPlayerSetup.exe and Infection: URL: wrong I don't know enough about software, nothing to do with this, but thought you should be informed that I very rarely get attacks of Mozilla. As a side note, somehow a program called optimizer Pro seemed to drag on my computer at the same time and tries to download himself with the virus.

    Thanks for all the work you do. Mozilla is my favorite browser and you guys are doing a great job with it.

    SRoss62

    More all products that Mozilla has are to say a mozilla.org site link.

    https://mozillalabs.com/en-us/projects/
    https://www.Mozilla.org/en-us/products/

    The only real video related Mozilla, it's https://wiki.mozilla.org/Shumway and more info on http://mozilla.github.io/shumway/

    The site that you downloaded this NewVideoPlayerSetup.exe of was a scam because it uses the inexperience of users and the popularity of Mozilla and Firefox browser to trick people to install this kind of things.

    Next time if you are unsure, you should ask someone will then tell you if it is legitimate or not for example.

  • There are ten virus adware and malicious software attempting to invade my files; If you follow prompt to "remove all", nothing happens. How can I solve this problem?

    There are ten virus adware and malware that have file names tries to invade the following files: my dovument (7), Shared (6) and Local C drive files (78); If you follow prompt to "remove all", nothing happens.  There are three flashing warning signs alert me of evil potentiial for files named above. How can I solve this problem?

    Hello

    We need more information. What antivirus do you use? Don't forget to contact support
    and forums. If the MSE a response - MSE here on answers forum. What version of Windows
    you use. It might also help if you named the malware involved.

    Please provide all the information we need to help us help you.

    How to ask a question
    http://support.Microsoft.com/kb/555375

    ===============================================================

    This troubleshooting is for Windows 7 - Vista is similar - for XP using RUN instead of
    Start - Search.

    If you need search malware here's my recommendations - they will allow you to
    scrutiny and the withdrawal without ending up with a load of spyware programs running
    resident who can cause as many questions as the malware and may be harder to detect as
    the cause.

    No one program cannot be used to detect and remove any malware. Added that often easy
    to detect malicious software often comes with a much harder to detect and remove the payload. Then
    its best to be thorough than paying the high price later now too. Check with them to one
    extreme overkill point and then run the cleaning only when you are sure that the system is clean.

    It can be made repeatedly in Mode safe - F8 tap that you start, however, you must also run
    the regular windows when you can.

    TDSSKiller.exe. - Download the desktop - so go ahead and right-click on it - RUN AS ADMIN
    It will display all the infections in the report after you run - if it will not run changed the name of
    TDSSKiller.exe to tdsskiller.com. If she finds something or not does not mean that you should not
    check with the other methods below.
    http://support.Kaspersky.com/viruses/solutions?QID=208280684

    Download malwarebytes and scan with it, run MRT and add Prevx to be sure that he is gone.
    (If Rootkits run UnHackMe)

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN

    Malwarebytes - free
    http://www.Malwarebytes.org/products/malwarebytes_free

    SuperAntiSpyware Portable Scanner - free
    http://www.SUPERAntiSpyware.com/portablescanner.HTML?tag=SAS_HOMEPAGE

    Run the malware removal tool from Microsoft

    Start - type in the search box-> find MRT top - right on - click RUN AS ADMIN.

    You should get this tool and its updates via Windows updates - if necessary, you can
    Download it here.

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN
    (Then run MRT as shown above.)

    Microsoft Malicious - 32-bit removal tool
    http://www.Microsoft.com/downloads/details.aspx?FamilyId=AD724AE0-E72D-4F54-9AB3-75B8EB148356&displaylang=en

    Microsoft Malicious removal tool - 64 bit
    http://www.Microsoft.com/downloads/details.aspx?FamilyId=585D2BDE-367F-495e-94E7-6349F4EFFC74&displaylang=en

    also install Prevx to be sure that it is all gone.

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN

    Prevx - Home - free - small, fast, exceptional CLOUD protection, working with others
    security programs. It is a single scanner, VERY EFFICIENT, if it finds something to come back
    here or use Google to see how to remove.
    http://www.prevx.com/   <-->
    http://info.prevx.com/downloadcsi.asp?prevx=Y  <-->

    Choice of PCmag editor - Prevx-
    http://www.PCMag.com/Article2/0, 2817,2346862,00.asp

    Try the demo version of Hitman Pro:

    Hitman Pro is a second scanner reviews, designed to save your computer from malicious software
    (viruses, Trojans, rootkits, etc.). who infected your computer despite safe
    what you have done (such as antivirus, firewall, etc.).
    http://www.SurfRight.nl/en/hitmanpro

    --------------------------------------------------------

    If necessary here are some free online scanners to help the

    http://www.eset.com/onlinescan/

    -----------------------------------

    Original version is now replaced by the Microsoft Safety Scanner
    http://OneCare.live.com/site/en-us/default.htm

    Microsoft safety scanner
    http://www.Microsoft.com/security/scanner/en-us/default.aspx

    ----------------------------------

    http://www.Kaspersky.com/virusscanner

    Other tests free online
    http://www.Google.com/search?hl=en&source=HP&q=antivirus+free+online+scan&AQ=f&OQ=&AQI=G1

    --------------------------------------------------------

    There may be necessary sanitation - which some depends on your version of Windows.
    RUJ SFC/scannow and checkdisk (CHKDSK) - if necessary to do a repair installation. For
    more information on these methods require responses - Windows Forums for your version of
    Windows.

    Answers - Windows Forums
    http://answers.Microsoft.com/en-us/Windows

    Also, be sure to provide all the information we need to help us to help you:

    How to ask a question
    http://support.Microsoft.com/kb/555375

    =======================================

    For extreme cases:

    Norton Power Eraser - eliminates deeply embedded and difficult to remove crimeware
    This traditional antivirus analysis does not always detect. Because the Norton Power Eraser
    uses aggressive methods to detect these threats, there is a risk that it can select some
    legitimate programs for removal. You should use this tool very carefully and only after
    you have exhausted other options.
    http://us.Norton.com/support/DIY/index.jsp

    ================================

    If you are in North America, you can call 866-727-2338 for virus and spyware help
    infections. See http://www.microsoft.com/protect/support/default.mspx for more details. For
    international information, see your subsidiary local Support site.

    Microsoft support - Virus and Security Solution Center
    http://support.Microsoft.com/contactus/cu_sc_virsec_master?ws=support#TAB0

    I hope this helps.

    Rob Brown - Microsoft MVP<- profile="" -="" windows="" expert="" -="" consumer="" :="" bicycle="" -="" mark="" twain="" said="" it="">

  • How to remove malicious software "starnet.md" isp 89.28.119.48

    Malwarebytes found malware "outgoing" of "Starnet.md" ISP 89.28.119.48 and blocks, but I can't remove it.  All scans of MS does not at all.  Any suggestions?

    Hello

    If you need search malware here's my recommendations - they will allow you to
    scrutiny and the withdrawal without ending up with a load of spyware programs running
    resident who can cause as many questions as the malware and may be harder to detect as
    the cause.

    No one program cannot be used to detect and remove any malware. Added that often easy
    to detect malicious software often comes with a much harder to detect and remove the payload. Then
    its best to be thorough than paying the high price later now too. Check with them to one
    extreme overkill point and then run the cleaning only when you are sure that the system is clean.

    It can be made repeatedly in Mode safe - F8 tap that you start, however, you must also run
    the regular windows when you can.

    TDSSKiller.exe. - Download the desktop - so go ahead and right-click on it - RUN AS ADMIN
    It will display all the infections in the report after you run - if it will not run changed the name of
    TDSSKiller.exe to tdsskiller.com. If she finds something or not does not mean that you should not
    check with the other methods below.
    http://support.Kaspersky.com/viruses/solutions?QID=208280684

    Download malwarebytes and scan with it, run MRT and add Prevx to be sure that he is gone.
    (If Rootkits run UnHackMe)

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN

    Malwarebytes - free
    http://www.Malwarebytes.org/products/malwarebytes_free

    SuperAntiSpyware Portable Scanner - free
    http://www.SUPERAntiSpyware.com/portablescanner.HTML?tag=SAS_HOMEPAGE

    Run the malware removal tool from Microsoft

    Start - type in the search box-> find MRT top - right on - click RUN AS ADMIN.

    You should get this tool and its updates via Windows updates - if necessary, you can
    Download it here.

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN
    (Then run MRT as shown above.)

    Microsoft Malicious - 32-bit removal tool
    http://www.Microsoft.com/downloads/details.aspx?FamilyId=AD724AE0-E72D-4F54-9AB3-75B8EB148356&displaylang=en

    Microsoft Malicious removal tool - 64 bit
    http://www.Microsoft.com/downloads/details.aspx?FamilyId=585D2BDE-367F-495e-94E7-6349F4EFFC74&displaylang=en

    also install Prevx to be sure that it is all gone.

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN

    Prevx - Home - free - small, fast, exceptional CLOUD protection, working with others
    security programs. It is a single scanner, VERY EFFICIENT, if it finds something to come back
    here or use Google to see how to remove.
    http://www.prevx.com/   <-->
    http://info.prevx.com/downloadcsi.asp  <-->

    Choice of PCmag editor - Prevx-
    http://www.PCMag.com/Article2/0, 2817,2346862,00.asp

    Try the demo version of Hitman Pro:

    Hitman Pro is a second scanner reviews, designed to save your computer from malicious software
    (viruses, Trojans, rootkits, etc.). who infected your computer despite safe
    what you have done (such as antivirus, firewall, etc.).
    http://www.SurfRight.nl/en/hitmanpro

    --------------------------------------------------------

    If necessary here are some free online scanners to help the

    http://www.eset.com/onlinescan/

    -----------------------------------

    Original version is now replaced by the Microsoft Safety Scanner
    http://OneCare.live.com/site/en-us/default.htm

    Microsoft safety scanner
    http://www.Microsoft.com/security/scanner/en-us/default.aspx

    ----------------------------------

    http://www.Kaspersky.com/virusscanner

    Other tests free online
    http://www.Google.com/search?hl=en&source=HP&q=antivirus+free+online+scan&AQ=f&OQ=&AQI=G1

    --------------------------------------------------------

    After the removal of malicious programs:

    Also follow these steps for the General corruption of cleaning and repair/replace damaged/missing
    system files.

    Run DiskCleanup - start - all programs - Accessories - System Tools - Disk Cleanup

    RUN - type in the box-

    sfc/scannow

    Then run checkdisk (chkdsk).

    RUN - type in the box-

    Chkdsk /f /r

    -----------------------------------------------------------------------

    If we find Rootkits use this thread and other suggestions. (Run UnHackMe)

    http://social.answers.Microsoft.com/forums/en-us/InternetExplorer/thread/a8f665f0-C793-441A-a5b9-54b7e1e7a5a4/

    ================================

    For extreme cases:

    Norton Power Eraser - eliminates deeply embedded and difficult to remove crimeware
    This traditional antivirus analysis does not always detect. Because the Norton Power Eraser
    uses aggressive methods to detect these threats, there is a risk that it can select some
    legitimate programs for removal. You should use this tool very carefully and only after
    you have exhausted other options.
    http://us.Norton.com/support/DIY/index.jsp

    ================================

    If you are in North America, you can call 866-727-2338 for virus and spyware help
    infections. See http://www.microsoft.com/protect/support/default.mspx for more details. For
    international information, see your subsidiary local Support site.

    I hope this helps.

  • I Virus: Win32 / Alureon.H I run full scans of the malicious software removal tool, Microsoft security essentials, and care.

    It is the only virus I have it please help I am so close to fixing my computer I managed comprehensive analyses on all programs that they detect this virus but I always eventually have and redirected to Web sites randomly please tell me if possible how do I manually remove this

    Hello

    If you need search malware here's my recommendations - they will allow you to
    scrutiny and the withdrawal without ending up with a load of spyware programs running
    resident who can cause as many questions as the malware and may be more difficult to detect as the
    cause.

    No one program cannot be used to detect and remove any malware. Added that often easy
    to detect malicious software often comes with a much harder to detect and remove the payload. Then
    its best to be thorough than paying the high price later now too. Check with them to one
    extreme overkill point and then run the cleaning only when you are sure that the system is clean.

    It can be made repeatedly in Mode safe - F8 tap that you start, however, you must also run
    the regular windows when you can.

    Download malwarebytes and scan with it, run MRT and add Prevx to be sure that he is gone.
    (If Rootkits run UnHackMe)

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN

    Malwarebytes - free
    http://www.Malwarebytes.org/

    Run the malware removal tool from Microsoft

    Start - type in the search box-> find MRT top - right on - click RUN AS ADMIN.

    You should get this tool and its updates via Windows updates - if necessary, you can
    Download it here.

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN
    (Then run MRT as shown above.)

    Microsoft Malicious - 32-bit removal tool
    http://www.Microsoft.com/downloads/details.aspx?FamilyId=AD724AE0-E72D-4F54-9AB3-75B8EB148356&displaylang=en

    Microsoft Malicious removal tool - 64 bit
    http://www.Microsoft.com/downloads/details.aspx?FamilyId=585D2BDE-367F-495e-94E7-6349F4EFFC74&displaylang=en

    also install Prevx to be sure that it is all gone.

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN

    Prevx - Home - free - small, fast, exceptional CLOUD protection, working with others
    security programs. It is a single scanner, VERY EFFICIENT, if it finds something to come back
    here or use Google to see how to remove.
    http://www.prevx.com/   <-->
    http://info.prevx.com/downloadcsi.asp  <-->

    Choice of PCmag editor - Prevx-
    http://www.PCMag.com/Article2/0, 2817,2346862,00.asp

    Try the demo version of Hitman Pro:

    Hitman Pro is a second scanner reviews, designed to save your computer from malicious software
    (viruses, Trojans, rootkits, etc.). who infected your computer despite safe
    what you have done (such as antivirus, firewall, etc.).
    http://www.SurfRight.nl/en/hitmanpro

    --------------------------------------------------------

    If necessary here are some free online scanners to help the

    http://www.eset.com/onlinescan/

    New Vista and Windows 7 version
    http://OneCare.live.com/site/en-us/Center/whatsnew.htm

    Original version
    http://OneCare.live.com/site/en-us/default.htm

    http://www.Kaspersky.com/virusscanner

    Other tests free online
    http://www.Google.com/search?hl=en&source=HP&q=antivirus+free+online+scan&AQ=f&OQ=&AQI=G1

    --------------------------------------------------------

    Also follow these steps for the General corruption of cleaning and repair/replace damaged/missing
    system files.

    Run DiskCleanup - start - all programs - Accessories - System Tools - Disk Cleanup

    Start - type this into the search-> find COMMAND to top box and RIGHT CLICK-
    RUN AS ADMIN

    Enter this at the command prompt - sfc/scannow

    How to analyze the log file entries that the Microsoft Windows Resource Checker
    (SFC.exe) program generates in Windows Vista cbs.log
    http://support.Microsoft.com/kb/928228

    Run checkdisk - schedule it to run at the next startup, then apply OK then restart your way.

    How to run the check disk at startup in Vista
    http://www.Vistax64.com/tutorials/67612-check-disk-Chkdsk.html

    -----------------------------------------------------------------------

    If we find Rootkits use this thread and other suggestions. (Run UnHackMe)

    http://social.answers.Microsoft.com/forums/en-us/InternetExplorer/thread/a8f665f0-C793-441A-a5b9-54b7e1e7a5a4/

    I hope this helps.

    Rob Brown - MS MVP - Windows Desktop Experience: Bike - Mark Twain said it right.

  • Why are there no update in September for Malicious Software Removal Tool?

    Why are there no update in September for Malicious Software Removal Tool?

    Hello

    My guess is that it is usually released the 2nd Tuesday of the month which is tomorrow 13/09/2011.

    For anyone needing a link - it is also available via Windows Update.

    Microsoft® Windows® malicious software removal tool (KB890830)
    http://www.Microsoft.com/download/en/details.aspx?displaylang=en&id=16

    I hope this helps.

    Rob Brown - Microsoft MVP<- profile="" -="" windows="" expert="" -="" consumer="" :="" bicycle=""><- mark="" twain="" said="" it="">

  • Receipt of phone call saying I had malicious software (Microsoft impersonation)

    Title: Funny original call

    I live in PA and received a phone call from someone who do not speak English as a first language by telling me I had malware and viruses on my computer and it was a Microsoft tech.  He asked if my computer was on... I said no... He told me to turn it on and he'll fix it.  sounded funny to me, so I asked what computer... He said mine... I said... it was still said to mine... I still once you said... which made me very suspicious.  I have 6 computers in my house... If he was from Microsoft and in fact is a problem, he could have told me that they... I hung up.  Fortunately for me, I worked on computers since 1982 and I have no banking services online for this reason and because he could not tell me that we (an error code would have given him my exact computer) and what operating system it used.

    Avoid scams that use the Microsoft name fraudulently

    Cybercriminals often include the names of well-known companies, such as ours, in their scams. They think it will convince you to give them money or your personal information. While they usually use e-mail to you wrong, that they sometimes use the phone instead.

    Common scams that use the Microsoft name

    • "You have won the Microsoft Lottery"
    • Microsoft "requires credit card information to validate your copy of Windows.
    • Microsoft sends unsolicited e-mail with attached security updates
    • A person of "Microsoft Support" calls to fix your computer

    Avoid these dangerous hoaxes

    We do not send unsolicited e-mail or make unsolicited telephone calls asking for personal information or financial or repair your computer.

    If you receive an unsolicited e-mail or phone call which is supposed to be from Microsoft, and request that you send personal information or click on the links,delete the email or hang up the phone .

    You did not win the "Microsoft Lottery".

    Microsoft customers are often the target of a scam that uses e-mail messages falsely promising money. Victims receive messages saying: 'You have won the Microsoft Lottery!' There is no Microsoft Lottery. Delete the message.

    If you have lost money to this scam, report it . You can also send the police report to Microsoft and we will use it to help law enforcement catch criminals who send these e-mails.

    For more information, see Microsoft report fraud Lottery . To protect yourself against these e-mail hoaxes, you can use the same general orientation you use to protect yourself from phishing scams to protect you from these e-mail hoaxes.

    Microsoft do not ask for credit card information to validate your copy of Windows

    We require that your copy of Windows is legitimate before you can obtain programs from the Microsoft Download Center and to receive software updates from Microsoft Update . Our online process that performs this validation is called the Genuine Advantage Program. at no time during the validation process we request your credit card information.

    In fact, we collect any information that can be used to identify you, such as your name, e-mail address or other personal information.

    For more information, read the Microsoft Genuine Advantage Privacy . To learn more about the program in general, see genuine Microsoft software .

    Microsoft sends no communication unsolicited on security updates

    When we publish information about a security software update or security incident, send us e-mail messages only to subscribers of our security communications program.

    Unfortunately, Cybercriminals have benefited from this program. They sent fake security messages that appear to come from Microsoft. Some messages to attract the recipients to Web sites to download spyware or other malicious software. Others include an attachment that contains a virus . Delete the message. Do not open the attachment.

    Legitimate security communications from Microsoft

    • Legitimate communications do not include software updates as attachments. We never attach software updates to our security communications. On the contrary, we refer customers to our Web site for more information on the update or the software security incident.
    • Legitimate communications are also on our websites. If we provide information about a security update, you can also find this information on our Web sites.

    = Microsoft has none of the unsolicited telephone calls to help you fix your computer

    In this type of scam cybercriminals are calling you and claim to be of Support technique Microsoft. They offer help with your computer problems. Once scammers have earned your trust, they try to steal and damage your computer with malicious software, including viruses and spyware.

    Although the law enforcement can trace phone numbers, often authors use pay telephones, disposable cell phones or stolen cellular phone numbers. Better avoid fooling themselves rather than try to repair the damage afterwards.

    Treat all unsolicited sceptically telephone calls. Don't provide personal information.

    ===========================================================
    If this post can help solve your problem, please click the 'Mark as answer"If you find it useful, mark it as useful by clicking the 'Useful' button at the top of this message. Marking a post as answer, or relatively useful, you help others find the answer more quickly.

  • Pilot 'currently is not available from the software update server' on Mac OSX 10.8 for Deskjet 3054

    I'm very computer savvy, but cannot get this printer is installed!  I get "driver"currently unavailable from the updateserver software "on Mac OSX 10.8 for Deskjet F3054".  Help, please?

    Hello

    Restart your Mac, then run the update of software and try to add the printer again.

    If it persists, what is the exact printer - Deskjet 3054 or Deskjet 3054 A model?

    http://support.HP.com/us-en/document/c03770424

  • Can not get updates from running Malicious Software Removal Tool

    I was not able to install updates from the Microsoft Windows running malicious software removal tool. Continue to be 800700005 unknown error. Why?

    OK, given that the MRT has not installed or ran from 29/12/2010, how he did cause the 80070005 error since you state that updates have been installed up to 12/02/2010 if you read the history of the update properly?

    Something is preventing the MRT of installation and execution if she has not installed or run from 29/12/2010.

    Strongly suggest that you run this tool, Kaspersky or do a scan with the Microsoft Security Scanner as the most likely something is also a malware, unless you are down to install and run it or installed security software is in conflict with it.

  • How you software creative cloud completely from your mac?

    OK, so I seriously need help. then I played with photoshop a month ago and I messed up the settings, so I got rid of him. (I didn't even have it for a day.) Then I wanted to once again, so somehow I got it. but then smart me again deleted because I made the same mistake. but I really want to go back to use "a full 30 day trial" because I had only one chance to try it for 8 hours before it ruin. so today, I made a new account from adobe. and I can't get it because this creative cloud is always on my mac. I tried everything to get rid of it and literally, it won't work and I really want this back. Help, please

    Hello

    You can try the steps below to completely remove the creative cloud of your Mac.

    1: go to: Application/utilities/Adobe installer

    2: double-click an Adobe CC product to uninstall one by one.

    3: follow the on-screen instructions.

    4: download and run Adobe Cleaner tool using link below.

    Use the CC cleaning tool to resolve installation problems. CC, CS3 - CS6

    5: If you do not have a product from Adobe installed on your computer, you can manually delete the folders of Adobe down the location.

    * Library/Application Support/Adobe

    * Mac HD/Users //Library/Application Support/Adobe

    6: restart the computer once.

  • Continues to receive updates beta of MAC OS x in the App Store even if I reconnect my mac from the public beta program

    Hello

    I'm still getting updates beta of MAC OS x in the App Store even if I reconnect my mac from the public beta program. The option to receive these updates beta is no longer available in my preferences system, as shown here:

    https://www.igeeksblog.com/stop-OS-x-beta-software-update-notifications-in-Mac-a pp-store.

    Any suggestions?

    Thank you

    Restart your Mac, then see if these updates appear again.

  • Not got a response from the software update server (macone.local).

    I get this question whenever I click to find updates on my App Store. For this reason, I was not able to update any app and other.

    This forum is for any questions about the update from Apple for Windows software. What version of Mac OS X you are running?

    Take a look at How to use the update service software in OS X Server to update your Mac - Apple Support clients up-to-date.

    TT2

  • Malicious software removal tool update problems the last few months. Suspended for a very long time. Vista Home Premium 32 bit SP2

    Hello

    The last 3 months when the download and installation of my updates for Windows Vista, it gets stuck for hours on the malicious software removal tool. I have to cancel it. Restart the computer and reinstall. Then he moved very well and quickly according to historical updates. Last month, it was really difficult to cancell it well. He finally got through it. Here is a little history on my machine. I'm very very well with this computer. Each week, I do disk Cleanup, then defrag with diskeeper, virus scan with Microsoft Security Essentials. And every six months, I run a very large disk check and I said to correct errors and try to fix bad sectors. More than 3 years, I only had 2 minor bluescreens. I always make sure I have all my products Microsoft put updated. When I first got this computer I had a guy I.T. (a neighbor) out of the box and clean all the useless garbage out of it and it partitioned the hard drive. More than 3 years, he managed as a champion. Always very fast and all.

    I hope that I'm not the only person having problems with this. Just start with the month of June, then July, then August.

    P.S. I have 2 laptops running XP sp3, one is 9 years old and the other is 11 years old, he had 2000 top PRO, but I just put XP sp3 on it last month. They run too much like fields. I take good care of my computers with a little help from my friend IT. They have the same programs as this one and I do the same things to them, but they do not have this same problem with the release of the MSRT tool. Which leads me to think that it is specific to Vista only, I have a Windows 7 computer yet, so I can't speak for seven.

    Any suggestions or ideas? We are scratching our heads on this one.

    Thank you in advance for your time and help

    Tim Kerr

    Your misguided use of registry cleaners could have caused this behavior! If you ever think that your registry database must be cleaned, repaired, amplified, to the point, cured, twisted, fixed or optimized (it isn't), read http://aumha.net/viewtopic.php?t=28099 and draw your own conclusions.

    See also http://blogs.technet.com/markrussinovich/archive/2005/10/02/registry-junk-a-windows-fact-of-life.aspx

    ~~~~~~~~~~~~~~~~~~~~~~~

    Your use of Revo Uninstaller and the foregoing notwithstanding, applications, (Norton and McAfee) are known to not uninstall (or upgraded) themselves.

    1. download the Norton Removal Tool, save it to your desktop: ftp://ftp.symantec.com/public/english_us_canada/removal_tools/Norton_Removal_Tool.exe

    2. close all open applications (that is, anything with an icon on the taskbar).

    3. click right on the file saved in #1 above, and then select run as administrator to run the utility. DO TAP not your keyboard until the race ends, then restart.

    4. open IE (only) to http://support.microsoft.com/kb/971058 & run it in DEFAULT and modes difficulty then AGGRESSIVE. [1]

    5. restart & test (i.e. the or shortly after seven 14-10 when the next MRT is scheduled to be released).

    ~~~~~~~~~~~~~~~~~~~~~~~~
    [1] full Disclosure: the difficulty operating in AGGRESSIVE mode will remove your update history but not the list of installed updates.

    ~ Robear Dyer (PA Bear) ~ MS MVP (that is to say, mail, security, Windows & Update Services) since 2002 ~ WARNING: MS MVPs represent or work for Microsoft

Maybe you are looking for