I have what appears to be a virus/malware/Trojan horse

and it is located near Microsoft security essentials and is listed as a serious threat, but it is allowed. I never allowed that and I can't get rid of it?

Search for malware:

Download, install, execute, update and perform analyses complete system with the two following applications:

Remove anything they find.  Reboot when necessary.  (You can uninstall one or both when finished.)

Search online with eSet Online Scanner.

The less you have to run all the time, most things you want to run will perform:

Use Autoruns to understand this all starts when your computer's / when you log in.  Look for whatever it is you do not know using Google (or ask here.)  You can hopefully figure out if there are things from when your computer does (or connect) you don't not need and then configure them (through their own built-in mechanisms is the preferred method) so they do not - start using your resources without reason.

You can download and use Process Explorer to see exactly what is taking your time processor/CPU and memory.  This can help you to identify applications that you might want to consider alternatives for and get rid of all together.

Do a house cleaning and the dust of this hard drive:

You can free up disk space (will also help get rid of the things that you do not use) through the following steps:

Windows XP should take between 4.5 and 9 GB * with * an Office suite, editing Photo software, alternative Internet browser (s), various Internet plugins and a host of other things installed.

If you are comfortable with the stability of your system, you can delete the uninstall of patches which has installed Windows XP...
http://www3.TELUS.NET/dandemar/spack.htm
(Especially of interest here - #4)
(Variant: http://www.dougknox.com/xp/utils/xp_hotfix_backup.htm )

You can run disk - integrated into Windows XP - cleanup to erase everything except your last restore point and yet more 'free '... files cleaning

How to use disk cleanup
http://support.Microsoft.com/kb/310312

You can disable hibernation if it is enabled and you do not...

When you Hibernate your computer, Windows saves the contents of the system memory in the hiberfil.sys file. As a result, the size of the hiberfil.sys file will always be equal to the amount of physical memory in your system. If you don't use the Hibernate feature and want to reclaim the space used by Windows for the hiberfil.sys file, perform the following steps:

-Start the Control Panel Power Options applet (go to start, settings, Control Panel, and then click Power Options).
-Select the Hibernate tab, uncheck "Activate the hibernation", and then click OK. Although you might think otherwise, selecting never under "Hibernate" option on the power management tab does not delete the hiberfil.sys file.
-Windows remove the "Hibernate" option on the power management tab and delete the hiberfil.sys file.

You can control the amount of space your system restore can use...

1. Click Start, right click my computer and then click Properties.
2. click on the System Restore tab.
3. highlight one of your readers (or C: If you only) and click on the button "settings".
4 change the percentage of disk space you want to allow... I suggest moving the slider until you have about 1 GB (1024 MB or close to that...)
5. click on OK. Then click OK again.

You can control the amount of space used may or may not temporary Internet files...

Empty the temporary Internet files and reduce the size, that it stores a size between 64 MB and 128 MB...

-Open a copy of Microsoft Internet Explorer.
-Select TOOLS - Internet Options.
-On the general tab in the section 'Temporary Internet files', follow these steps:
-Click on 'Delete the Cookies' (click OK)
-Click on "Settings" and change the "amount of disk space to use: ' something between 64 MB and 128 MB. (There may be many more now.)
-Click OK.
-Click on 'Delete files', then select "Delete all offline content" (the box), and then click OK. (If you had a LOT, it can take 2 to 10 minutes or more).
-Once it's done, click OK, close Internet Explorer, open Internet Explorer.

You can use an application that scans your system for the log files and temporary files and use it to get rid of those who:

CCleaner (free!)
http://www.CCleaner.com/
(just disk cleanup - do not play with the part of the registry for the moment)

Other ways to free up space...

SequoiaView
http://www.win.Tue.nl/SequoiaView/

JDiskReport
http://www.jgoodies.com/freeware/JDiskReport/index.html

Those who can help you discover visually where all space is used.  Then, you can determine what to do.

After that - you want to check any physical errors and fix everything for efficient access"

CHKDSK
How to scan your disks for errors* will take time and a reboot.

Defragment
How to defragment your hard drives* will take time

Cleaning the components of update on your Windows XP computer

While probably not 100% necessary-, it is probably a good idea at this time to ensure that you continue to get the updates you need.  This will help you ensure that your system update is ready to do it for you.

Download and run the MSRT tool manually:
http://www.Microsoft.com/security/malwareremove/default.mspx
(Ignore the details and download the tool to download and save to your desktop, run it.)

Reset.

Download/install the latest program Windows installation (for your operating system):
(Windows XP 32-bit: WindowsXP-KB942288-v3 - x 86 .exe )
(Download and save it to your desktop, run it.)

Reset.

and...

Download the latest version of Windows Update (x 86) agent here:
http://go.Microsoft.com/fwlink/?LinkId=91237
... and save it to the root of your C:\ drive. After you register on the root of the C:\ drive, follow these steps:

Close all Internet Explorer Windows and other applications.

AutoScan--> RUN and type:
%SystemDrive%\windowsupdateagent30-x86.exe /WUFORCE
--> Click OK.

(If asked, select 'Run'). --> Click on NEXT--> select 'I agree' and click NEXT--> where he completed the installation, click "Finish"...

Reset.

Now reset your Windows with this FixIt components update (you * NOT * use the aggressive version):
How to reset the Windows Update components?

Reset.

Now that your system is generally free of malicious software (assuming you have an AntiVirus application), you've cleaned the "additional applications" that could be running and picking up your precious memory and the processor, you have authorized out of valuable and makes disk space as there are no problems with the drive itself and your Windows Update components are updates and should work fine - it is only only one other thing you pouvez wish to make:

Get and install the hardware device last drivers for your system hardware/system manufacturers support and/or download web site.

Tags: Windows

Similar Questions

  • What is the prevalence of viruses, malware, etc., to be hidden and undetectable by anti-virus software?

    • As before, when my computer when my computer has been infected, I get a svchost.exe error, repeatedly, whenever I restart the computer. The infection has been discovered that the last time by my anti-virus software, because it was hidden.  It was a computer expert on this forum who told me my computer was infected by svchost.exe repeated error messages that I received.  I ran my Avast software, anti-malware software from MSFT Security Center, Win Defender, etc. this time, and it has detected no infections.  (Yes, I know what to do to pass this message means not necessarily my computer is infected, but the tech guy said that it is likely, given that the error message appeared on several occasions).  How detect and destroy the virus/malware hidden, etc?
    • Also, if anyone can answer another question... I was told that it is not recommended that I have two programs of anti-virus software, which I do - Win Defender and Avast (I guess they may conflict).  I tend to want to keep Avast, but would like to know if I have to keep Win Defender instead, because it is a Win a Win system program.  If I've got this me getting rid of one of them, is it recommended that I both uninstall and then reinstall one of them?

    A person help would be appreciated!

    Thnx, Dharma

    WHAT I HAVE: Win XP Media Center, MS Office 7 Professional (used at home), IE8, Outlook 7, HP w / 32-bit dual core processor, latest version of Avast & Win Defender, Srvc Pack 2 and 3 (although I know that I don't need 3 because I have not upgraded to Win 7, but it won't let me uninstall it!) and regularly updates Win.

    PS Please ask questions if you have, before you answer, so it will be less likely that I'll get the wrong answers that don't relate directly my questions! (Can say you that has already happened?  (LOL).

    You pouvez have a type of rootkit of malware infection.  Rootkits can transform and change of identity on your OS (and are difficult to detect and remove) and many computing professionals recommend a reinstall of the operating system in order to ensure that the rootkit is removed.

    Follow the suggestions in the Brian - post.  The link that he provided is an excellent reference.   If you have a rootkit, TDSS Killer or one of the other programs listed pourrait be able to remove it.

    You can also:

    You can get free help in the removal of malware from MS Support here: http://supportservices.microsoft.com/support/services/virus_malware_removal

    If you are in North America, you can call the MS Support to 866-727-2338 for help with infections of virus and spyware.

    For international information see your subsidiary local technical support site.

    Or get assistance from Avast at: http://www.avast.com/support

    You have SP3 on your Win XP OS and if you plan to switch to Win 7 make sure that your processor and RAM will manage Win 7... with your history of technology issues a reformatting/clean install of Win 7 would be a good idea.  Because of the possibility of conflicts, I do not recommend using Windows Defender with Avast or any other resident AV program.  Suggest uninstall you Windows Defender in Control Panel.  MSE and several other AV programs require the removal of Windows Defender in XP (or disabling the Defender in Vista and Win 7).

    Kind regards...

  • Original title: Thinkpoint virus _ Trojan.Horse.Win32.PAV.64___

    Original title: Thinkpoint virus Trojan.Horse.Win32.PAV.64

    Hello, this morning I received the popup described in:

    http://www.Malekal.com/Rogue_Faux_MicrosoftSecurityEssentials.php

    I allowed him to take action, just as described.  However, now when I try to login, I get Windows Thinkpoint sweep that won't let me do anything but a 'safe start', which includes a computer full scan which cannot be cancelled except ctrl-alt-delete.  After a disconnection and reboot, it is still there.  I was also unable to log my other profiles user - simply says the passwords are incorrect.

    Hello

    ThinkPoint is a fake antivirus, a scam to get you to pay for it, while it has no advantage at all.

    How to remove ThinkPoint (uninstall Guide)<-- read="">
    http://deletemalware.blogspot.com/2010/10/how-to-remove-ThinkPoint-uninstall.html

    How to remove ThinkPoint - short YouTube video
    http://www.YouTube.com/watch?v=HbOUYgmKxo8

    It can be made repeatedly in Mode safe - F8 tap that you start, however you must also run them
    the Windows when you can.

    Download malwarebytes and scan with it, run MRT and add Prevx to be sure that he is gone. (If Rootkits run UnHackMe)

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN

    Malwarebytes - free
    http://www.Malwarebytes.org/

    Run the malware removal tool from Microsoft

    Start - type in the search box-> find MRT top - right on - click RUN AS ADMIN.

    You should get this tool and its updates via Windows updates - if necessary, you can download it here.

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN
    (Then run MRT as shown above.)

    Microsoft Malicious - 32-bit removal tool
    http://www.Microsoft.com/downloads/details.aspx?FamilyId=AD724AE0-E72D-4F54-9AB3-75B8EB148356&displaylang=en

    Microsoft Malicious removal tool - 64 bit
    http://www.Microsoft.com/downloads/details.aspx?FamilyId=585D2BDE-367F-495e-94E7-6349F4EFFC74&displaylang=en

    also install Prevx to be sure that it is all gone.

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN

    Prevx - Home - free - small, fast, exceptional CLOUD protection, working with other security programs. It comes
    a scan only, VERY EFFICIENT, if it finds something to come back here or use Google to see how to remove.
    http://www.prevx.com/   <-->
    http://info.prevx.com/downloadcsi.asp?prevx=Y  <-->

    Choice of PCmag editor - Prevx-
    http://www.PCMag.com/Article2/0, 2817,2346862,00.asp

    Try the demo version of Hitman Pro:

    Hitman Pro is a second scanner reviews, designed to save your computer from malicious software (viruses, Trojans,
    Rootkits, etc.) that has infected your computer despite all the security measures that you have taken (such as
    the anti-virus software, firewall, etc.).
    http://www.SurfRight.nl/en/hitmanpro

    --------------------------------------------------------

    If necessary here are some free online scanners to help the

    http://www.eset.com/onlinescan/

    New Vista and Windows 7 version
    http://OneCare.live.com/site/en-us/Center/whatsnew.htm

    Original version
    http://OneCare.live.com/site/en-us/default.htm

    http://www.Kaspersky.com/virusscanner

    Other tests free online
    http://www.Google.com/search?hl=en&source=HP&q=antivirus+free+online+scan&AQ=f&OQ=&AQI=G1

    --------------------------------------------------------

    For Vista:

    Follow these steps to remove corruption and missing/damaged file system repair or replacement.

    Run DiskCleanup - start - all programs - Accessories - System Tools - Disk Cleanup

    Start - type in the search box - find command top - RIGHT CLICK – RUN AS ADMIN

    sfc/scannow

    How to analyze the log file entries that the Microsoft Windows Resource Checker (SFC.exe) program
    generates in Windows Vista cbs.log
    http://support.Microsoft.com/kb/928228

    Then, run checkdisk - schedule it to run at next boot, then apply OK your way out, then restart.

    How to run the check disk at startup in Vista
    http://www.Vistax64.com/tutorials/67612-check-disk-Chkdsk.html

    --------------------------------

    For Windows 7:

    Follow these steps to remove corruption and missing/damaged file system repair or replacement.

    Run DiskCleanup - start - all programs - Accessories - System Tools - Disk Cleanup

    Start - type in the search box - find command top - RIGHT CLICK – RUN AS ADMIN

    sfc/scannow

    How to fix the system files of Windows 7 with the System File Checker
    http://www.SevenForums.com/tutorials/1538-SFC-SCANNOW-Command-System-File-Checker.html

    Then run checkdisk (chkdsk).

    How to run check disk in Windows 7
    http://www.SevenForums.com/tutorials/433-disk-check.html

    -----------------------------------------------------------------------

    If we find Rootkits use this thread and other suggestions. (Run UnHackMe)

    http://social.answers.Microsoft.com/forums/en-us/InternetExplorer/thread/a8f665f0-C793-441A-a5b9-54b7e1e7a5a4/

    I hope this helps.

    Rob Brown - MS MVP - Windows Desktop Experience: Bike - Mark Twain said it right.

  • I think that my page has been hacked I uninstalled reinstalled same prob got viruses and Trojan horses open now uninstalled but I still want u

    When I opened Firefox last week another page came to the top of the home page could not remove the new homepage or mine recover (Google) anti viruses picked up 2 Trojans I uninstalled and reinstalled after put scan quarantine of the articles same thing happened, but got 3 Trojan horses and a virus could not GET normal page search engine (yahoo7) Impossible to get any page other then I uninstalled again now, I use it is to say that I don't like, but am afraid to reinstall Mozilla in the case where the same thing

    Hello terbow181, try the following steps after reinstalling firefox:

    1. Reset firefox (this will keep your bookmarks and passwords)
    2. then go to firefox > addons > extensions and where there are still extensions listed there, disable them.
    3. Finally, run a full scan of your system with security tools like the free version of malwarebytes and adwcleaner to ensure that adware is not present in other parts of your system as well.

    Fix Firefox problems caused by malicious software

  • My Windows Xp proffesional always tells me that I have randomly appears '38 of the virus' ads and said buy Xp anti-spyware how to fix?

    These things keep popping up and saying: I have the virus randomly they restart my computer and Xp anti-spyware says I virus. It won't let me uninstall things download and save my files. It is also said that Malware is attacking my computer. He also says that my files are infected. I do not have access to the administrator, and it is "infected" it too. Also my documents all went to I don't know where they all are and I have no ideas and can not find them

    Hmm, I would recommend to go in safe mode by pressing the F8 key for the system to start. When the list appears highlight the line that says safe mode and you'll get a bunch of lines on the screen, then it will continue in safe mode. Click Yes in the box that asks if you are sure you want to enter in safe mode, and then run FixNCR.reg. You may need to right-click on the file and then select run as administrator.

    I hope this helps.

    Jim

  • Virus Malware Trojans and other junk

    Okay, so, it is true that I am not a Mac person, gasp, but here comes a true unbiased.

    I helped a member of the family rebuild a MacBook Pro using a USB stick to boot and install the latest version of El Capitan.  I was helping to restore the data literally 48 hours later and to my surprise, that the machine was infected with two pieces of malware (which was visible) 'Advanced Mac Cleaner' and 'ZipClould '.  It is interesting ZipCloud himself had placed in the dock bar, replacing a similar looking cloud storage service.

    So clearly the machine has been compromised, and it was easier to rebuild than to go on the road to 'cleaning up' at this stage.

    How can I avoid this happening again?  I can't look over the shoulder 24 x 7, but there should be a way to avoid this.

    Mac users often ask if they should install "anti-virus" (AV) or software "anti-malware". The answer is 'no', but it can give the false impression that there is no threat of what is loosely called 'virus '. There is a threat.

    1. it is a comment on what you should - and should not-do to protect you from malicious software ("malware") that runs on the Internet and gets onto a computer as an unintended consequence of the user's actions.

    It does not apply to the software, such as keyloggers, which can be installed deliberately by an intruder who has convenient access to the computer, or who has been able to take control of it remotely. This threat is in a different category, and there is no easy way to defend against it. AV software is not intended to and does not, to defend against these attacks.

    The comment is long because the issue is complex. The essential points are in articles 5 and 11.

    OS X implements now three levels of integrated protection specifically against malware, not to mention the protections of runtime such as quarantine the file, execute disable, sandbox, protecting the integrity of system, System Library randomization and randomized address space layout , which can also prevent other kinds of exploits.

    2. all versions of Mac OS X 10.6.7 were able to detect the malware Mac known in downloaded files and block non-secure web plugins. This feature is transparent to the user. Apple calls internally it "XProtect."

    The malware used by XProtect recognition database is automatically updated. However, you should not count on it, because the attackers are still at least a day before the defenders.

    The following restrictions apply to XProtect:

    ☞ circumvented by some third-party network software, such as the BitTorrent clients and Java applets.

    ☞ It applies only to software downloaded on the network. Software installed from a CD or other media is not verified.

    As new versions of Mac OS X are available, it is not clear whether Apple will continue indefinitely maintain the older versions such as 10.6 XProtect database. Versions of obsolete systems security may eventually be affected. Updates to security for the code of obsolete systems will be stop being released at any given time, and which can leave them open to other types of attack in addition to malware.

    3. starting with the OS X 10.7.5, there was a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and installation packages downloaded from the network will be run only if they are digitally signed by a developer to a certificate issued by Apple. Certified software in this way has not been checked for safety by Apple, unless it comes to the App Store, but you can be reasonably sure that it has not been changed by someone other than the developer. His identity is known to Apple, so it could be held legally responsible if it distributes malicious software. Which may not mean much if the developer lives in a country with a weak legal system (see below).

    Access controller does not depend on a database of known malware. He has, however, the same limitations as XProtect and in addition the following:

    ☞ It can easily be turned off or overridden by the user.

    ☞ A malware attacker could find a way around it, or could take control of a certificate of signing of code under false pretenses or could simply ignore the consequences of the distribution of malware Tryggvason.

    ☞ Developer App store could find a way around the Apple control, or the control may fail due to human error.

    Apple took too long to revoke some known attackers codesigning certificates, thus diluting the value of the keeper and the program developer ID. These variances do not involve the App Store products, however.

    For the reasons given, App Store, and, to a lesser extent - other applications recognized by signed Gatekeeper, are safer than others, but they cannot be considered to be absolutely sure. "Sand" applications could make to access to private data, such as your contacts, or for access to the network. Think that before granting access. Security sandbox is based on user input. Never click through any application for leave without thinking.

    4. by starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background. He checks and removes, malware that corresponds to a database of recognition held by Apple. To ensure that MRT will be executed when the database is updated, the App Store tab in system preferences and check the box marked

    Install the system data files and security updates

    If it is not already done.

    As XProtect, MRT is effective against known threats, but not against strangers. It alerts you if it detects malware, but otherwise, it has no user interface.

    5. the built-in Mac OS x security features reduce the risk of malware attack, but they are not and will never be complete protection. Malware is a problem of human behavior, not a behavior machine, and none only of technological solution will solve. Software protect you from trust only will make you more vulnerable.

    The best defense is always going to be your own intelligence. Except perhaps feats of Java, all the known malware, circulating on the Internet wearing reached a completely setting installation to update to OS X 10.6 or later takes the form of so-called "Trojans", which may have no effect if the victim is deceived in their execution. The threat thus amounts to a battle of wits between you and cybercriminals. If you are better informed, they think you are, you win. In effect, it means that you always stay in the shelter of practical computing. How do you know when you leave the safe harbor? Here are a few signs warning of danger.

    Software from a reliable source

    ☞ Software with a brand, such as Adobe Flash Player, does not come directly from the Web site. Don't be fooled an alert of any website for updating Flash, or your browser, or other software. A real alert that Flash is outdated and blocked is shown on this support page. In this case, follow the instructions on the support page. Furthermore, assume that the alert is false and that someone is trying to rip you off to install malicious software. If you see these alerts on more than one Web site, ask for instructions.

    ☞ Software any is distributed via BitTorrent or Usenet, or on a Web site that distributes pirated music and movies.

    ☞ Rogue sites Web such as CNET Download MacUpdate, Soft32, Softonic and SourceForge distribute free applications that have been packaged in a superfluous "install".

    ☞ The software is advertised through spam or intrusive web ads. Any announcement, on any site, which includes a direct link to a download should be ignored.

    Software that is clearly illegal or doing something illegal

    Commercial software ☞ high-end such as Photoshop is "cracked" or "free."

    ☞ An application helps you violates copyright law, for example to circumvent the copy protection on a commercial software, or streamed media recording to be reused without permission. All the 'YouTube downloaders' are in this category, but not all are necessarily malicious.

    Conditional or unsolicited offer from strangers

    ☞ A phone calling or a web page you indicates that you have a "virus" and offers to remove. (Some reputable sites warned visitors who have been infected with the malware "DNSChanger" legitimately. The exception to this rule applies.)

    ☞ A web site offers a free content like music or video, but for use, you must install a "codec", 'plug-in', 'player' 'Downloader', 'extractor', or 'certificate' which comes from the same site, or a stranger.

    ☞ You win a prize in a competition that you are never entered.

    ☞ someone on a forum like this is eager to help you, but only if you download an application of your choice.

    ☞ a 'FREE WI - FI!' network presents itself in a public place like an airport, but is not provided by management.

    ☞ Online everything that you expect to pay is 'free '.

    Unexpected events

    ☞ a file is downloaded automatically when you visit a web page, without any further action on your part. delete any file without opening it.

    ☞ You open what you think, it is a document and you receive an alert that it is "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you still need to delete any file that is not what you expected it to be.

    ☞ An application does something you don't expect, such as permission to access your contacts, your location or the Internet without obvious reason.

    ☞ Software is attached to the email you na not ask, even if it is (or seems to come) by a person of trust.

    I do not leave the safe harbour that once will necessarily lead to disasters, but make a habit of it will weaken your defenses against malicious software attacks. None of the above scenarios must, at the very least, make you uncomfortable.

    6. Java on the Web (not to be confused with JavaScript, to which it is not related, despite the similarity of names) is a weak point in the security of any system. Java is, among other things, a platform to run complex applications in a web page. That was always a bad idea, and Java developers have proved unable to apply it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been a type virus Windows affecting OS X. simply load a page with Java malicious content could be harmful.

    Fortunately, client-side Java on the Web is outdated and largely disappeared. Only a few outdated sites still use it. Try to accelerate the process of extinction by avoiding these sites, if you have a choice. Forget to play games or other uses not Java essentials.

    Java is not included in OS X 10.7 and later versions. Discrete Java installers are distributed by Apple and Oracle (the developer of Java). Do not use one unless you need it. Most of the people don't. If Java is installed, turn it off- not the JavaScript in your browser.

    Whatever the version, experience has shown that Java on the Web is not reliable. If you must use a Java applet for a job on a specific site, Enable Java only for the site in Safari. Never activate Java for a public Web site that carries the third-party advertising. Use only on websites that are well known, protected by login and secure without ads. In Safari 6 or later, you will see a padlock icon in the address bar when you visit a secure site.

    7. another perennial weak point is Adobe Flash Player. Like Java, Flash is declining well deserved, but content Flash is still much more widespread than the contents of Java on the Web. If you choose to install the Flash plugin, you can reduce your exposure to Flash by checking the box marked

    Stop the plug-ins to save energy

    in the Advanced tab of the preferences of Safari window, if not already done. Consider also installing an extension Safari as "ClickToFlash" or "ClickToPlugin." They will prevent the Flash content automatically load and are initially not Flash video is substituted for Flash on YouTube and perhaps a few other sites. I tested the extensions and found them safe, but you should always do your own research before you decide whether to trust any third party software.

    8. remain within the sphere of security, and you will be as safe from malware you can be practically. The rest of this comment is what you must do to protect you.

    Never install any AV or products 'Internet security' for Mac if you have a choice, because they are all worse than useless. If you are required by a (wrong) institutional policy to install some kind of AV, choose one of the free apps in the Mac App Store, nothing else.

    Why you should not use products AV?

    ☞ To recognize malware, software depends on a database of known threats, which is always at least one day to day. This technique is a proven failure, as a major supplier of AV software has admitted. Most of the attacks are "zero-day" - that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry comes to realize that the traditional AV software is worthless.

    ☞ design is based generally on the nonexistent threat that malware can be injected at any time, anywhere in the file system. Malware is downloaded from the network; He is not of the blue leaves. To meet this threat does not exist, a commercial AV software changes or low level functions of the operating system, which is a waste of resources and a frequent cause of instability, bugs, poor performance, and duplicates.

    ☞ changing the operating system, the software can also create weaknessesthat could be exploited by malicious attackers.

    ☞ especially, a false sense of security is dangerous. This fact relates to all AV software it will never be any changes elsewhere.

    9. a free AV product from the Mac App Store is safe as long as you don't let it delete or move files. Ignore all the warnings that it can give you on "heuristic" or "phishing." These warnings, if they are not simply false positives, see the text of e-mail messages or updates cached web pages, not malware.

    An AV application is not necessary and may not be invoked for protection against malware for OS X. It is useful, or even not at all, only to detect malware Windows and even for this use it is not really effective, because the new Windows malware makes its appearance much faster than OS X malware.

    Windows malware cannot hurt you directly (unless, of course, you use Windows). Just do not pass to someone else. A malicious link in the e-mail is usually easy to recognize by the name alone. A concrete example:

         London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe

    You don't need software to tell you it's a horse Trojan for Windows. Software may be able to tell what trojan is, but who cares? In practice, there is no reason to use a recognition software, unless an organizational strategy requires. Malware Windows is so widespread that you must assume that it is in each attachment until proof to the contrary. Nevertheless, a free AV product on the App Store can serve a purpose if it fulfills a misinformed network administrator that says you must have some sort of application AV. An App Store product will not change the operating system; in fact, it does nothing, unless you run it.

    If you are just curious to know if a file is considered malware by the AV engines, you can download it from the "VirusTotal" site, where it will be tested against most of them without charge. A negative result is evidence of what whether, for the reasons given above. I do not recommend doing this with a file that may contain private information.

    10. There seems to be a common belief that the firewall Application acts as a barrier to infection, or prevents operation of malware. He does not. It blocks incoming connections to some network services you are using, such as file sharing. It is disabled by default, and you should leave it like that if you're behind a router on a private home or office network. Activate only when you are on an untrusted network, for example a public Wi - Fi hotspot, where you do not want to provide services. Disable services that you don't use in the sharing preferences window. All are disabled by default.

    11. as a Mac user, you don't have to live in fear that your computer may be infected whenever you install the software, read emails, or visit a web page. But nor can you assume that you will always be free from exploitation, no matter what you do. Internet browsing, it's like walking the streets of a big city. It can be as safe or as dangerous that you choose to do so. The greatest harm done by software AV is precisely its selling point: it makes people feel safe. They can then feel sufficiently safe to take risks, which the software does not protect them. Nothing can reduce the need for safe computing practices.

  • How I with what appears to be a false security Mac WARNING?

    When I load Safari I have what appears to be a security warning false telling me to connect to iskbusinesstechnology.com.433 and call 1-888-442-8745 for immediate assistance.  Is this a scam or what?

    Of course, it's a scam.

    Try simply clear your cache first:

    1. Safari menu
    2. Clear history...
    3. 'all history' > clear history
    4. Close the page or tab with the warning
    5. Load a new page and see the problem disappears

    If the problem persists, you will need to look at your home page settings, your search engine settings and extensions that you have installed.

  • Have a virus/malware and cannot open windows mail and how export/copy the measages

    I should have gotten a virus/malware/trojan, which affects the connection and does not allow me to open the control panel, or windows mail.

    I need to know how to copy/backup/export the e-mail messages that are still there. Of course, I can't use the export function since I can't open windows mail.

    Hello

    • You receive an error message when opening Control Panel or Windows mail?
    • What were the changes made before the issue occur?

    You can view these methods:

     
    Method 1:
     
    I suggest you make a system full scan just to be sure and check.
    http://www.Microsoft.com/security/scanner/en-us/default.aspx
     
    Note:
    The data files that are infected must be cleaned only by removing the file completely, which means that there is a risk of data loss.
    Method 2:
    NOTE:
    Change the settings of the REGISTRY can cause serious problems that may prevent your computer from starting properly. Microsoft cannot guarantee that problems resulting from the REGISTRY settings configuration can be solved. Changes to these settings are at your own risk.
    You might try the following and see if it helps to get Windows Mail open.
    You can delete all entries in the registry for Windows Mail. The junk e-mail filter information have been corrupted.
     
    a. Click Start, in the search box, type regedit. Then choose continue to leave and then read the help file.
     
    b. then highlight this registry key:
    HKEY_CURRENT_USER\Software\Microsoft\Windows Mail
    right-click and choose export to back it up. You can save it to your desktop. It will save the key as a measure of protection.
     
    c. make sure that Windows Mail is closed and right click on the key again, and then choose Remove.
    d. then try to start Windows Mail and see if it is now open.
  • McFee software has detected some viruses and Trojans

    Buy laptop 2 days ago and installed the software McFee (as recommended). Computer said McFee scan is free of viruses and any problems found.
    Problem is that I have different warnings on POPs ups saying system has up to 23 viruses and Trojan horses detected 'system is broken. "

    Anyone know what is happening?

    > Buy laptop 2 days ago and installed the software McFee (as recommended).
    Just out of curiosity, WHO recommends to install McFee?

    I put t know what's wrong here, but perhaps this McFee has detected something specific to Toshiba and has determined that the virus. I put t know which is listed as a virus.

    Contact the manufacturer of McFee and ask for help. Toshiba doesn't support this third part software.

  • Is there a free application to detect the virus and Trojans on my iMac?

    I think I have an evil entity of some sort on my computer.  It is not malware.  Is there a free app to download to search for viruses and Trojan horses to an iMac, OSX 10.9.5?

    Thanks for the recommendations.

    You don't need anti-virus software and must not install, free or not. They are unnecessary and a waste of your money. If you have advertising software problems:

    Remove the browser pop up problems

    Malwarebytes | Free Anti-Malware Detection & removal software for

    Apple Macintosh computers

    Adblock more 1.8.9, GlimmerBlocker, or AdBloc k

    Remove the adware that displays pop-up ads and graphics on your Mac

    How to remove adware FlashMall of OS X

    Stop advertising and pop-up advertising windows in Safari - Apple Support

    2.11 DetectX

  • Hi, I just bought a new iMac machine and I have problems to open my CS4. Whenever I click on the app, it is what appears... «license for this product has stopped working...»  ' Error: 150:30 ' Please help!

    Hi, I just bought a new iMac, and I have problems to open my CS4. Whenever I click on the app, it is what appears...

    «license for this product has stopped working...»  ' Error: 150:30 ' Please help!

    Hello

    See help here https://helpx.adobe.com/x-productkb/global/error-licensing-stopped-mac-os.html

    ^ Ani

  • Page will go full screen, jump autour and the toolbar will appear/disappear and page continues to change constantly. No virus/malware after scanning

    I have a laptop and I'm going on my home page (or go to another site from this page), the toolbar will back down in full screen. I'll go into 'tools' and disable the mode full screen (F11), then the entire screen "travel" up to down and will not stop. The toolbar will start to appear, and then back again and again, do not allow me to access anything whatsoever. It will last until I have completed the task with the future manager. I ran AVG, Spybot and malware (who, after working, I uninstalled) held, and nothing was found

    It started about a week ago, and to at about the same time I started having the ' does not ' when loading a page. This has never happened before, and there is no notice of virus/malware. I think to potential problems with the keyboard of the computer laptop, but computer says everything is functioning normally.

    If anyone has any ideas, it would be appreciated. I got the microphone. Security Essentials on my system, and tried to uninstall think there could be a problem there (computer ran incredibly slow, and this problem started a week after installation), and this shows it is not completely uninstalled and I get the error message whenever I start.

    Thank you and hope that someone knows something that can help.

    I have the same problem. Need help it fixing nothing I do works. I found another case of this in 2008 but does not say how it was resolved.

  • I received an e-mail from 'e' of what appears to be a microsoft Web site, ask for password of account etc, false or true

    I received an e-mail from 'e' of what appears to be a microsoft Web site, they tell me my site will be closed down if I don't provide them with certain information, including the password etc, grammar seems somewhat imperfect, something on the network running slow and they (you) will have to clean (check) accounts This note was sent, I ignored the original e-mail from 'e' weeks but just received a notice/final warning that if I don't answer to my account will be closed to the down and out, it's from Microsoft. Thank you, Bill Collins

    http://www.Microsoft.com/security/online-privacy/msName.aspx

  • I received an email from my address in my junkbox subsequently, I deleted without opening and tried to block without result. Is what kind of scam or virus?

    An email from my address!

    I received an email from my address in my junkbox subsequently, I deleted without opening and tried to block without result. Is what kind of scam or virus? How is it hotmail allows this weird deliveries?

    Hello

    Answers is a peer group supported and unfortunately has no real influence on Hotmail.

    HotMail has its own Forums, so you can ask your questions there.

    Windows Live Solution Center - HotMail - HotMail Forums Solutions
    http://windowslivehelp.com/

    Hotmail - Forums
    http://windowslivehelp.com/forums.aspx?ProductID=1

    Hotmail - Solutions
    http://windowslivehelp.com/solutions.aspx?ProductID=1

    How to contact Windows Live Hotmail Support
    http://email.about.com/od/hotmailtips/Qt/et_hotmail_supp.htm

    Windows Live Hotmail Top issues and Support information
    http://support.Microsoft.com/kb/316659/en-us

    Error message "your account has been locked" when trying to connect
    http://windowslivehelp.com/thread.aspx?ThreadId=77be7d82-a0e9-49c7-b46d-040ec654a9e2

    Compromised account - access unauthorized account - how to recover your account
    http://windowslivehelp.com/solution.aspx?SolutionID=6ea0c7b3-1473-4176-b03f-145b951dcb41

    Hotmail hacked? Take these steps
    http://blogs.msdn.com/b/securitytipstalk/archive/2010/07/07/Hotmail-hacked-take-these-steps.aspx

    ============================================================

    Proceed to a very thorough check for malware and then change your password by e-mail.

    It is possible for a person to send the email that 'seems' to be of your
    account but that is not really - called "Spoofing." That means its 'Possible' emails
    were not really you, although they may have your contact list. Have someone
    who receives the e-mails to check the header to see where he is actually sent by and
    NOT only the answer to the address.

    How to read the message headers
    http://www.emailaddressmanager.com/tips/header.html

    What Email Headers can tell you about the origin of Spam
    http://email.about.com/cs/spamgeneral/a/spam_headers.htm

    E-mail spoofing
    http://en.Wikipedia.org/wiki/E-mail_spoofing

    E-mail spoofing and Phishing
    http://www.mailsbroadcast.com/email.broadcast.FAQ/46.email.spoofing.htm

    Understanding E-mail Spoofing
    http://www.windowsecurity.com/articles/email-spoofing.html

    Fraudulent emails (false)
    http://pages.eBay.com/education/spooftutorial/

    Google search - email Spoofing
    http://www.Google.com/search?hl=en&EI=FB1nS9DiNo7CsQPNhKGdAw&SA=X&Oi=spell&resnum=0&CT=result&CD=1&ved=0CAgQBSgA&q=email+spoofing&spell=1

    =============================================

    If you need search malware here's my recommendations - they will allow you to
    scrutiny and the withdrawal without ending up with a load of spyware programs running
    resident who can cause as many questions as the malware and may be more difficult to detect as the
    cause.

    No one program cannot be used to detect and remove any malware. Added that often easy
    to detect malicious software often comes with a much harder to detect and remove the payload. Then
    its best to be thorough than paying the high price later now too. Check with them to one
    extreme overkill point and then run the cleaning only when you are sure that the system is clean.

    It can be made repeatedly in Mode safe - F8 tap that you start, however, you must also run
    the regular windows when you can.

    Download malwarebytes and scan with it, run MRT and add Prevx to be sure that he is gone.
    (If Rootkits run UnHackMe)

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN

    Malwarebytes - free
    http://www.Malwarebytes.org/products/malwarebytes_free

    Run the malware removal tool from Microsoft

    Start - type in the search box-> find MRT top - right on - click RUN AS ADMIN.

    You should get this tool and its updates via Windows updates - if necessary, you can
    Download it here.

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN
    (Then run MRT as shown above.)

    Microsoft Malicious - 32-bit removal tool
    http://www.Microsoft.com/downloads/details.aspx?FamilyId=AD724AE0-E72D-4F54-9AB3-75B8EB148356&displaylang=en

    Microsoft Malicious removal tool - 64 bit
    http://www.Microsoft.com/downloads/details.aspx?FamilyId=585D2BDE-367F-495e-94E7-6349F4EFFC74&displaylang=en

    also install Prevx to be sure that it is all gone.

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN

    Prevx - Home - free - small, fast, exceptional CLOUD protection, working with others
    security programs. It is a single scanner, VERY EFFICIENT, if it finds something to come back
    here or use Google to see how to remove.
    http://www.prevx.com/   <-->
    http://info.prevx.com/downloadcsi.asp  <-->

    Choice of PCmag editor - Prevx-
    http://www.PCMag.com/Article2/0, 2817,2346862,00.asp

    Try the demo version of Hitman Pro:

    Hitman Pro is a second scanner reviews, designed to save your computer from malicious software
    (viruses, Trojans, rootkits, etc.). who infected your computer despite safe
    what you have done (such as antivirus, firewall, etc.).
    http://www.SurfRight.nl/en/hitmanpro

    --------------------------------------------------------

    If necessary here are some free online scanners to help the

    http://www.eset.com/onlinescan/

    -----------------------------------

    Original version is now replaced by the Microsoft Safety Scanner
    http://OneCare.live.com/site/en-us/default.htm

    Microsoft safety scanner
    http://www.Microsoft.com/security/scanner/en-us/default.aspx

    ----------------------------------

    http://www.Kaspersky.com/virusscanner

    Other tests free online
    http://www.Google.com/search?hl=en&source=HP&q=antivirus+free+online+scan&AQ=f&OQ=&AQI=G1

    --------------------------------------------------------

    Also follow these steps for the General corruption of cleaning and repair/replace damaged/missing
    system files.

    Run DiskCleanup - start - all programs - Accessories - System Tools - Disk Cleanup

    Start - type this into the search-> find COMMAND to top box and RIGHT CLICK-
    RUN AS ADMIN

    Enter this at the command prompt - sfc/scannow

    How to analyze the log file entries that the Microsoft Windows Resource Checker
    (SFC.exe) program generates in Windows Vista cbs.log
    http://support.Microsoft.com/kb/928228

    Run checkdisk - schedule it to run at the next startup, then apply OK then restart your way.

    How to run the check disk at startup in Vista
    http://www.Vistax64.com/tutorials/67612-check-disk-Chkdsk.html

    -----------------------------------------------------------------------

    If we find Rootkits use this thread and other suggestions. (Run UnHackMe)

    http://social.answers.Microsoft.com/forums/en-us/InternetExplorer/thread/a8f665f0-C793-441A-a5b9-54b7e1e7a5a4/

    I hope this helps.

    Rob Brown - Microsoft MVP<- profile="" -="" windows="" expert="" -="" consumer="" :="" bicycle="" -="" mark="" twain="" said="" it="">

  • Hello I am downloading from my site and my characters are messy. I type an e (taken glyphs-window), but what appears is an and the copyright sign? can someone tell me how I get rid off this

    Hello I am downloading from my site and my characters are messy. I type an e (taken glyphs-window), but what appears is an and the copyright sign? can someone tell me how I get rid off this?

    I tried a lot of things, but nothing seems to make a difference.

    In my view, they have already done for you...

    The site seems OK now. Hooray !

    But let's dig down to the serious things of this.

    If the browser needs a statement of character. Probably ' UTF-8 ', but another or an older one would be as well, as long as it's cheap, and it respects the method of characterization of the Web page.

    This statement can be provided by (1) the web server itself (its default value), (2) the htaccess file in your web root directory server, or (3) on each web page. Where there are several and contradictory statements perhaps, the older in the command above rules. But in the case where the Server and the htaccess do not provide a statement of character and your web page later on, it shouldn't be a problem.

    Your provider said that they do not have a such context in their web server, and it wasn't a htaccess file in your root folder (Muse is not create it for you). Once again: do not worry, it should always be no problem, because all your web pages provides the declaration as well (thanks to Muse). We have checked that, no doubt.

    That is where their claim is not accurate. BTW: many tips are on the Internet on the common practice in this area and they all advice that the htaccess is not the place more obvious to the declaration. The page is the best place to put it.

    W3C (the 'boss' of http and html)

    some general information:

    Choosing & applying a character encoding

    putting in a .htaccess file:

    Definition of charset in .htaccess information

    and finally, put on the page:

    Declaring character encodings in HTML

    But what is even more strange: I checked the web server of your provider to access this service online, and it seems that their server is to provide a framework (and it is UTF-8, fortunately). It's the opposite of what they have been say...

    Now I have the idea of some personal provider noticed this morning that their server wasn't working properly (maybe after a failure of server or another incident or failure), serving the pages with a wrong setting. Then maybe they quickly corrected, and not to let you know that, they tell you to put in place this htaccess file (which makes no difference, just as the declaration of your page also could not prevail in the setting of the server).

    So now, you are done with all the three statements: a parameter, a htaccess in your Web site folder and that of your server page. As long as they all say and expect the same (UTF-8) you don't have to worry about this.

    Problem solved, three times!

    PS: many accommodation providers (and I'm afraid that yours as well) tend to declaring that whatever they do is 'standard' and 'obvious'. While in many situations, it's always a little different and certainly not the standard, not to mention obvious...

Maybe you are looking for