<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-5129907773329456318</atom:id><lastBuildDate>Sat, 05 Oct 2024 02:02:13 +0000</lastBuildDate><category>Most Dangerous Viruses</category><category>Avast</category><category>1.BitDefender</category><category>2.Kaspersky</category><category>3. AVG 8</category><category>latest new viruses</category><category>4.Norton AntiVirus</category><category>4.Norton AntiVirus 2009</category><category>5.Webroot Antivirus</category><category>6.Panda Antivirus</category><category>7. Rising Antivirus</category><category>AntiVirus for MAC</category><category>Antivirus Review 2010</category><category>Attacks</category><category>Best One</category><category>Computer problems</category><category>E-mail servers</category><category>Life is beautiful</category><category>Privacy and Security</category><category>TrojanHorse</category><category>Viruses and worms</category><category>computer news</category><category>how to fix</category><category>latest viruses</category><category>mobile</category><category>security updates</category><category>spyware</category><category>tech news</category><category>threat explorer</category><category>virus</category><category>virus definitions</category><category>virus removal tools</category><category>windows</category><title>Top Antivirus News</title><description></description><link>http://topavn.blogspot.com/</link><managingEditor>noreply@blogger.com (TOPGUN)</managingEditor><generator>Blogger</generator><openSearch:totalResults>42</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5129907773329456318.post-5251622423841566946</guid><pubDate>Tue, 23 Nov 2010 05:51:00 +0000</pubDate><atom:updated>2010-11-22T21:54:07.083-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Avast</category><title>FREE license key for Avast 5 Antivirus</title><description>&lt;p style=&quot;font-family: georgia; text-align: justify;&quot;&gt;Avast 5 &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD1&quot;&gt;Antivirus&lt;/span&gt; is fully functional for 30 days and after that it requires a serial key in order to continue using it. &lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;font-family: georgia; text-align: justify;&quot;&gt;&lt;img src=&quot;http://blog.eches.net/wp-content/uploads/2010/11/avast-5-logo.jpg&quot; alt=&quot;&quot; title=&quot;&quot; class=&quot;alignnone size-full wp-image-3943&quot; height=&quot;317&quot; width=&quot;375&quot; /&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;font-family: georgia; text-align: justify;&quot;&gt;The license key can be obtained by simply registering with Avast over at this &lt;strong&gt;&lt;a href=&quot;http://www.avast.com/registration-free-antivirus.php&quot;&gt;page&lt;/a&gt;&lt;/strong&gt;.  Fill up all the information required and submit. You should get 1 year  free license key in your inbox almost instantly. Bear in mind, the  license code only works for Avast Free Antivirus (home user).&lt;/p&gt;</description><link>http://topavn.blogspot.com/2010/11/free-license-key-for-avast-5-antivirus.html</link><author>noreply@blogger.com (TOPGUN)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5129907773329456318.post-4466817058155005273</guid><pubDate>Mon, 01 Nov 2010 09:40:00 +0000</pubDate><atom:updated>2010-11-01T02:50:03.884-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">latest new viruses</category><title>Top threats</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyZza0t9KwHm8yYhKyq3WX4dgi5jP3Quq_HoVkaDjNs75E-CvgYZ_bRbdJIPqOYz1-acoYpxzPTrRCG8c0YKUdsEuIF1EASyJPgXCkMOrlvK8vcVLmgbvZbhthB9YQ8-97IDgZaCESMGPG/s1600/qmark.jpg&quot;&gt;&lt;img style=&quot;display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 256px; height: 320px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyZza0t9KwHm8yYhKyq3WX4dgi5jP3Quq_HoVkaDjNs75E-CvgYZ_bRbdJIPqOYz1-acoYpxzPTrRCG8c0YKUdsEuIF1EASyJPgXCkMOrlvK8vcVLmgbvZbhthB9YQ8-97IDgZaCESMGPG/s320/qmark.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5534516141423838194&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;ol style=&quot;text-align: justify;&quot; class=&quot;TopThreats&quot;&gt;&lt;li&gt;&lt;a href=&quot;http://www.microsoft.com/security/portal/Entry.aspx?name=Worm:Win32/Conficker.B&quot;&gt;Worm:Win32/Conficker.B&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.microsoft.com/security/portal/Entry.aspx?name=Virus:Win32/Sality.AM&quot;&gt;Virus:Win32/Sality.AM&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.microsoft.com/security/portal/Entry.aspx?name=Worm:Win32/Conficker.C&quot;&gt;Worm:Win32/Conficker.C&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.microsoft.com/security/portal/Entry.aspx?name=Virus:Win32/Bamital.F&quot;&gt;Virus:Win32/Bamital.F&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.microsoft.com/security/portal/Entry.aspx?name=PWS:Win32/Verweli.A&quot;&gt;PWS:Win32/Verweli.A&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.microsoft.com/security/portal/Entry.aspx?name=Virus:VBS/Ramnit.B&quot;&gt;Virus:VBS/Ramnit.B&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.microsoft.com/security/portal/Entry.aspx?name=Trojan:Win32/Rimecud.A&quot;&gt;Trojan:Win32/Rimecud.A&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.microsoft.com/security/portal/Entry.aspx?name=Virus:Win32/Ramnit.gen%21A&quot;&gt;Virus:Win32/Ramnit.gen!A&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.microsoft.com/security/portal/Entry.aspx?name=PWS:Win32/Zbot.gen%21Y&quot;&gt;PWS:Win32/Zbot.gen!Y&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.microsoft.com/security/portal/Entry.aspx?name=Backdoor:Win32/FlyAgent.F&quot;&gt;Backdoor:Win32/FlyAgent.F&lt;/a&gt;&lt;/li&gt;&lt;/ol&gt;</description><link>http://topavn.blogspot.com/2010/11/top-threats.html</link><author>noreply@blogger.com (TOPGUN)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyZza0t9KwHm8yYhKyq3WX4dgi5jP3Quq_HoVkaDjNs75E-CvgYZ_bRbdJIPqOYz1-acoYpxzPTrRCG8c0YKUdsEuIF1EASyJPgXCkMOrlvK8vcVLmgbvZbhthB9YQ8-97IDgZaCESMGPG/s72-c/qmark.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5129907773329456318.post-4645680851476040724</guid><pubDate>Wed, 29 Sep 2010 08:17:00 +0000</pubDate><atom:updated>2010-09-29T01:33:26.599-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Best One</category><title>Invest in Antivirus Software for Safer Surfing</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0llS-b6ogRpzZqoLnbE-pVoedextf-dJfFx7j4e34-57RBmJe6G8auniTwnt8B3kc2wcOu8QeAgxpvcjXZNigNFa1JQQZ_5rcabXt5_ufqXcB20bmULdvamFzOiPyyNG1JYd0QwEy28ma/s1600/antivirus.gif&quot;&gt;&lt;img style=&quot;float: left; margin: 0pt 10px 10px 0pt; cursor: pointer; width: 320px; height: 288px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0llS-b6ogRpzZqoLnbE-pVoedextf-dJfFx7j4e34-57RBmJe6G8auniTwnt8B3kc2wcOu8QeAgxpvcjXZNigNFa1JQQZ_5rcabXt5_ufqXcB20bmULdvamFzOiPyyNG1JYd0QwEy28ma/s320/antivirus.gif&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5522250611434786370&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;p style=&quot;font-family: webdings; text-align: justify;&quot;&gt;Advertising feature. The Internet is a tool that has changed our  lives and, without doubt, the way that most of us communicate.  Unfortunately, it has also greatly facilitated the spread of computer  viruses. But is there any way to combat this threat? Investing in &lt;a href=&quot;http://www.kaspersky.co.uk/kaspersky_anti-virus&quot;&gt;antivirus software&lt;/a&gt; may be the answer.&lt;br /&gt;&lt;br /&gt;A virus is a malicious computer program which can cause absolute chaos  to whole networks of computers at the same time. The effect of a virus  differs depending on its intent: whether it was created to modify,  delete or steal data or to cause real destruction to a hard drive.&lt;br /&gt;&lt;br /&gt;Other more sophisticated viruses are designed to allow their creators  control over your PC. This enables them to hack into your computer and  access your information.&lt;br /&gt;&lt;br /&gt;The term &lt;a href=&quot;http://www.google.co.uk/url?sa=t&amp;amp;source=web&amp;amp;cd=2&amp;amp;ved=0CCAQFjAB&amp;amp;url=http://news.bbc.co.uk/2/hi/uk_news/6906414.stm&amp;amp;rct=j&amp;amp;q=inurl:.bbc%20compter%20virus&amp;amp;ei=POmQTLWIAom6jAeTstTnDA&amp;amp;usg=AFQjCNGix-6worrhAqMbwqIiafvpnK-Nsw&amp;amp;cad=rja&quot;&gt;computer virus&lt;/a&gt;  was coined because the viruses share some traits with biological  viruses. A computer virus passes from one computer to another, for  example, in much the same way as a biological virus passes from person  to person.&lt;br /&gt;&lt;br /&gt;A computer virus must ‘piggyback’ on top of another program or document  in order to attach itself. Once it is running, it can then infect other  programs or documents. Viruses can be opened in emails, attack through  downloaded files or simply appear when you access a website.&lt;br /&gt;&lt;br /&gt;Virus creators always have tricks up their sleeves so that users will  open their files. With viruses like Trojan horses, for example, they  hide them within a harmless-looking file such as a picture of a  celebrity. This makes it easier for the malicious software to be  installed onto a computer.&lt;br /&gt;&lt;br /&gt;There are many different types of viruses being created all the time.  The Worm is a particularly nasty type, because it can replicate and  spread itself over an entire network. They can also sit on your machine  for months or even years before being triggered at a certain date or  time to wreak havoc. Worms are becoming increasingly common and are  among the biggest troublemakers on the Internet.&lt;br /&gt;&lt;br /&gt;After reading this, you will probably never want to turn on your  computer again, let alone open any files or emails! As more and more of  these viruses are changing and becoming more advanced, the need for  protection has become that much greater.&lt;br /&gt;&lt;br /&gt;But don’t despair, as there are many reliable versions of antivirus  software out there which you can download to maximise the security of  your PC. Even better, there are many different versions of &lt;a href=&quot;http://www.kaspersky.co.uk/trials&quot;&gt;free antivirus&lt;/a&gt; software that you can download to protect your computer against malicious threats without incurring any cost.&lt;br /&gt;&lt;br /&gt;There is also good news for Apple Mac users, as they have slightly less  to worry about; in terms of viruses, there aren’t so many floating  around which target Macs. That isn’t to say that things won’t change,  however. Recent reports have seen more and more cyber criminals turning  to the Mac platform as more people begin using it than ever before.&lt;br /&gt;&lt;br /&gt;As this trend is likely to continue, it is recommended that you invest in some &lt;a href=&quot;http://www.kaspersky.co.uk/kaspersky-anti-virus-for-mac&quot;&gt;Mac antivirus&lt;/a&gt;  software to protect against the threat. Antivirus software for Mac is  in limited supply, but there is still plenty to choose from.&lt;br /&gt;&lt;br /&gt;Mobile phone-based viruses are also new. Many antivirus software  developers are addressing this threat with new mobile antivirus products  that can run on your mobile.&lt;br /&gt;&lt;br /&gt;Depending on how much money you spend on PC antivirus software, you will  get various extras that offer additional protection. Whichever method  of antivirus software you choose to invest in, however, they will all  still work on the same basic principles.&lt;br /&gt;&lt;br /&gt;Antivirus software is designed to keep your PC free from the malicious  computer viruses and worms mentioned already. This is done by scanning  your PC’s files for known viruses; if one of these is detected, then the  software will inform you of the situation before taking steps to remove  the threat.&lt;br /&gt;&lt;br /&gt;Good antivirus software will also automatically check any files being  transferred to and from your computer, and at a minimum should scan all  attachments on incoming emails (even if this option has been disabled).&lt;br /&gt;&lt;br /&gt;There is one thing that you must remember about PC virus protection:  hackers are developing new bugs all the time, so it is important to  regularly update your antivirus software. If you don’t download the new  versions, you won’t be protected against the latest dangers.&lt;br /&gt;&lt;br /&gt;Most antivirus companies release weekly updates of their databases to  help keep you safe. Your antivirus software uses these weekly updates,  also known as virus signatures or definitions file, to identify newly  discovered viruses.&lt;br /&gt;&lt;br /&gt;If you scan your computer with a definitions file which is out of date,  the software may not detect a problem lurking in the background. A good  way of making sure nothing slips through the net is to set up an  ‘on-demand’ scan. This will see your virus scanner checking through all  your files on your hard drive once a week with all of the latest  updates. You can’t be too careful with these crafty viruses!&lt;br /&gt;&lt;br /&gt;It is also important to get your virus protection from a reputable  company; where would get your updates from if the company went bankrupt  in six months time?&lt;br /&gt;&lt;br /&gt;Having antivirus software installed on your computer may not keep you  100 per cent protected against every virus attack, but it will certainly  protect you a lot better than if you didn’t have it at all. You can  enhance your protection even further by having multiple antivirus  software products and by always remaining vigilant online.&lt;br /&gt;&lt;br /&gt;As well as having antivirus software installed on your computer, you can  also take steps to protect your PC against attack. This can be as  simple as being on guard when opening unknown email attachments, only  downloading software from known websites and keeping your logins  different for lots of sites. Taking these precautions will help to keep  your computer protected against malicious threats and viruses.&lt;br /&gt;&lt;br /&gt;So long as computer viruses change and evolve as rapidly as they do,  there will never be a program that will be able to cure everything, but  you can certainly still go a long way to keeping yourself safe.&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;   &lt;/div&gt;&lt;p style=&quot;font-family: webdings; text-align: justify;&quot; class=&quot;box_400_article_date&quot;&gt; Published by &lt;a href=&quot;http://www.timesandstar.co.uk/&quot;&gt;http://www.timesandstar.co.uk&lt;/a&gt; &lt;/p&gt;</description><link>http://topavn.blogspot.com/2010/09/invest-in-antivirus-software-for-safer.html</link><author>noreply@blogger.com (TOPGUN)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0llS-b6ogRpzZqoLnbE-pVoedextf-dJfFx7j4e34-57RBmJe6G8auniTwnt8B3kc2wcOu8QeAgxpvcjXZNigNFa1JQQZ_5rcabXt5_ufqXcB20bmULdvamFzOiPyyNG1JYd0QwEy28ma/s72-c/antivirus.gif" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5129907773329456318.post-5793004516959303899</guid><pubDate>Wed, 25 Aug 2010 04:05:00 +0000</pubDate><atom:updated>2010-08-24T21:22:10.230-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Life is beautiful</category><title>Life is beautiful Virus</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhp1Z4lm7hrAl6UShL1ScsYaQ6nbyuzVMhseR1lCSCuh9iO7N6fY-DTSlSWCmmZePZPrWB44BILUbBQk5zCYY4bWwD4K0mZFB451P09lXjN_5-JVkezC9Pdye5tva7NVMuSmZxka_b2VVSx/s1600/life+is+beautiful.jpg&quot;&gt;&lt;img style=&quot;float: left; margin: 0pt 10px 10px 0pt; cursor: pointer; width: 190px; height: 320px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhp1Z4lm7hrAl6UShL1ScsYaQ6nbyuzVMhseR1lCSCuh9iO7N6fY-DTSlSWCmmZePZPrWB44BILUbBQk5zCYY4bWwD4K0mZFB451P09lXjN_5-JVkezC9Pdye5tva7NVMuSmZxka_b2VVSx/s320/life+is+beautiful.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5509197834043762658&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;</description><link>http://topavn.blogspot.com/2010/08/life-is-beautiful-virus.html</link><author>noreply@blogger.com (TOPGUN)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhp1Z4lm7hrAl6UShL1ScsYaQ6nbyuzVMhseR1lCSCuh9iO7N6fY-DTSlSWCmmZePZPrWB44BILUbBQk5zCYY4bWwD4K0mZFB451P09lXjN_5-JVkezC9Pdye5tva7NVMuSmZxka_b2VVSx/s72-c/life+is+beautiful.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5129907773329456318.post-7496807571736068828</guid><pubDate>Tue, 06 Jul 2010 04:28:00 +0000</pubDate><atom:updated>2010-07-05T21:36:40.139-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Computer problems</category><category domain="http://www.blogger.com/atom/ns#">how to fix</category><category domain="http://www.blogger.com/atom/ns#">windows</category><title>&quot;If you change a filename extension,the file may become unusable&quot;</title><description>&lt;strong&gt;Trouble:&lt;/strong&gt;  &lt;p&gt;“&lt;strong&gt;If you change a filename extension,the file may become  unusable. Are you sure you want to change it?”&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;&lt;em&gt;Warning can be seen in snapshot below.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;img src=&quot;file:///C:/DOCUME%7E1/SHAHBA%7E1/LOCALS%7E1/Temp/moz-screenshot-1.png&quot; alt=&quot;&quot; /&gt;&lt;img src=&quot;file:///C:/DOCUME%7E1/SHAHBA%7E1/LOCALS%7E1/Temp/moz-screenshot-2.png&quot; alt=&quot;&quot; /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisopXpk8LLRdijMtIrKeb0AxaVpQyfFg6bwLzdJAu2gXEQWEsv8a1TclEg0SoHPbQMCRF36xEau9ItL5ydlqOoYI6T9KOIxhLBxqE-OcF8D4e_dgO5qNkzqcycSl0GmFvcUBY6vLtKO2cb/s1600/rename-warning-thumb.jpg&quot;&gt;&lt;img style=&quot;float: left; margin: 0pt 10px 10px 0pt; cursor: pointer; width: 320px; height: 113px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisopXpk8LLRdijMtIrKeb0AxaVpQyfFg6bwLzdJAu2gXEQWEsv8a1TclEg0SoHPbQMCRF36xEau9ItL5ydlqOoYI6T9KOIxhLBxqE-OcF8D4e_dgO5qNkzqcycSl0GmFvcUBY6vLtKO2cb/s320/rename-warning-thumb.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5490646070316721666&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;The simplest way to fix such issue is to make the file extensions  hidden. When you do that, windows will take care that the file  extensions are not changed while renaming the file. To make the file  extensions hidden, follow the below steps:&lt;/p&gt; &lt;blockquote&gt;&lt;p&gt;&lt;span style=&quot;color:#292929;&quot;&gt;1. Open My Computer, go to Tools  &gt; Folder Options &gt; View&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;color:#292929;&quot;&gt;2. Check the option “Hide extensions for know  file types”.&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;color:#292929;&quot;&gt;3. Click Apply and OK.As seen in image below.&lt;/span&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgM3y21yAqZdhWhJFHoQ_U8jC88NYLqDY3kEdHnbFsSh8PVIwHPpRlv40IsKE0lyzEsh8adr8-uOgD9-evKahlrlvXdn1jEf2lokvvZvy0K5l_SYGTLG0WD_NxMXtbnqRJ4EsXQSM1JGTFH/s1600/hide-extension-thumb.jpg&quot;&gt;&lt;img style=&quot;float: left; margin: 0pt 10px 10px 0pt; cursor: pointer; width: 258px; height: 320px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgM3y21yAqZdhWhJFHoQ_U8jC88NYLqDY3kEdHnbFsSh8PVIwHPpRlv40IsKE0lyzEsh8adr8-uOgD9-evKahlrlvXdn1jEf2lokvvZvy0K5l_SYGTLG0WD_NxMXtbnqRJ4EsXQSM1JGTFH/s320/hide-extension-thumb.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5490646426663559202&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;strong&gt;&lt;em&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;strong&gt;&lt;em&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;strong&gt;&lt;em&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;strong&gt;&lt;em&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;strong&gt;&lt;em&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;strong&gt;&lt;em&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;strong&gt;&lt;em&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;strong&gt;&lt;em&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;strong&gt;&lt;em&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;strong&gt;&lt;em&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Method 2 :&lt;/p&gt; &lt;p&gt;Always provide the extension to the file explicitly as it was  previously. For example if you want to rename a zip file from old name  file1 to new name file2, make sure you rename the file from file1.zip to  file2.zip. This means you have to type the extension manually.&lt;/p&gt; &lt;p&gt;We hope this helps to understand why the warning got flashed&lt;/p&gt;&lt;p&gt;Source: &lt;a href=&quot;http://www.troublefixers.com&quot;&gt;http://www.troublefixers.com&lt;/a&gt;&lt;br /&gt;&lt;/p&gt;</description><link>http://topavn.blogspot.com/2010/07/if-you-change-filename-extensionthe.html</link><author>noreply@blogger.com (TOPGUN)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisopXpk8LLRdijMtIrKeb0AxaVpQyfFg6bwLzdJAu2gXEQWEsv8a1TclEg0SoHPbQMCRF36xEau9ItL5ydlqOoYI6T9KOIxhLBxqE-OcF8D4e_dgO5qNkzqcycSl0GmFvcUBY6vLtKO2cb/s72-c/rename-warning-thumb.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5129907773329456318.post-1297161668031372317</guid><pubDate>Thu, 24 Jun 2010 07:41:00 +0000</pubDate><atom:updated>2010-06-24T00:46:59.882-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Privacy and Security</category><title>LastPass Password Manager  1.68.2</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEM6t-n-43eBkuFgFrSy_cLXjf-zsUa0OXpp7qFLuZPQZtDUcVodfaSf1HvdfsLi8mNQIqYMSlhJ_voRVBDbxWvTRXl0e2iLXnr5-wPNXDn2r9F70NGusKiqzevbDOa9eKGwV1wvohK6Gt/s1600/26093.png&quot;&gt;&lt;img style=&quot;float: left; margin: 0pt 10px 10px 0pt; cursor: pointer; width: 200px; height: 150px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEM6t-n-43eBkuFgFrSy_cLXjf-zsUa0OXpp7qFLuZPQZtDUcVodfaSf1HvdfsLi8mNQIqYMSlhJ_voRVBDbxWvTRXl0e2iLXnr5-wPNXDn2r9F70NGusKiqzevbDOa9eKGwV1wvohK6Gt/s320/26093.png&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5486242316231416082&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: verdana;font-size:100%;&quot; &gt;LastPass is a free online password manager and Form Filler that makes  your web browsing easier and more secure.   LastPass supports IE and  Firefox as Plugins (Opera, Safari, Chrome, iPhone, Opera Mini via  Bookmarklets), allows you to import from every major password storage  vendor and export too, captures passwords that other managers won&#39;t  including many AJAX forms, and allows you to make strong passwords  easily.  Your sensitive data is encrypted _locally_ before upload so  even LastPass cannot get access to it.  One Time Passwords &amp;amp; Screen  Keyboard help protect your master password.&lt;/span&gt;&lt;br /&gt;&lt;h3&gt;More about this add-on&lt;/h3&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;LastPass is the last password you will ever need.  It allows you to:&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;-  Create strong passwords, knowing you only have to remember one.&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;-  Automatically fill out forms to save you time&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;- Log into your  favorite sites with a single click&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;- Access and manage your data from  multiple computers seamlessly&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;- Share logins with friends and let  others share logins with you&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;- Use One Time Passwords, and a Screen  Keyboard to help keep you safe while on the road.&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;- Supports IE as  well, so if you switch browsers you&#39;re always in sync, as well as when  you switch computers&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;- Supports Opera, Google Chrome, Safari, iPhone,  Opera Mini, via Bookmarklets&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;- Supports importing passwords from  other password managers such as Roboform, Keepass, PasswordSafe,  MyPasswordSafe, Sxipper, TurboPasswords, PassPack, Firefox and IE&#39;s  built in password manager&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;- Exporting your data always available in  plugin and the website, even back to Firefox.&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;- In windows, helps you  recover lost passwords stored on your computer&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;- Capture passwords  that other password managers will not capture like those done in AJAX  logins, and multi-step logins like Bank Of America, and frustrating  sites like ING bank using the &#39;Save All Entered Data&#39; feature.&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;- Make  moving to a new computer or using multiple computers much easier&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;-  Works with any platform that has Firefox&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;- Mobile access at &lt;a href=&quot;http://outgoing.mozilla.org/v1/3c64b15652bfd32b79f8f7d7a0fc470b62c80844/http%3A//m.lastpass.com&quot;&gt;http://m.lastpass.com&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Your  sensitive data is encrypted locally with AES, then uploaded to allow  syncing with other computers or browsers (IE is also supported), and  every browser is supported in the &#39;web access&#39; mode at LastPass.com&lt;br /&gt;&lt;/span&gt;&lt;h4&gt;Image Gallery&lt;/h4&gt;               &lt;a class=&quot;screenshot thumbnail&quot; rel=&quot;jquery-lightbox&quot; href=&quot;https://addons.mozilla.org/img/uploads/previews/full/24/24882.png?modified=1219118581&quot; title=&quot;Add Site Process with replace existing&quot;&gt;             &lt;img src=&quot;https://addons.mozilla.org/img/uploads/previews/thumbs/24/24882.png?modified=1219118581&quot; alt=&quot;&quot; /&gt;         &lt;/a&gt;               &lt;a class=&quot;screenshot thumbnail&quot; rel=&quot;jquery-lightbox&quot; href=&quot;https://addons.mozilla.org/img/uploads/previews/full/24/24883.png?modified=1219118787&quot; title=&quot;Expanded version of the plugin&quot;&gt;             &lt;img src=&quot;https://addons.mozilla.org/img/uploads/previews/thumbs/24/24883.png?modified=1219118787&quot; alt=&quot;&quot; /&gt;         &lt;/a&gt;               &lt;a class=&quot;screenshot thumbnail&quot; rel=&quot;jquery-lightbox&quot; href=&quot;https://addons.mozilla.org/img/uploads/previews/full/24/24884.png?modified=1219118929&quot; title=&quot;Generating strong passwords&quot;&gt;             &lt;img src=&quot;https://addons.mozilla.org/img/uploads/previews/thumbs/24/24884.png?modified=1219118929&quot; alt=&quot;&quot; /&gt;         &lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Source: https://addons.mozilla.org/en-US/firefox/addon/8542/&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://topavn.blogspot.com/2010/06/lastpass-password-manager-1682.html</link><author>noreply@blogger.com (TOPGUN)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEM6t-n-43eBkuFgFrSy_cLXjf-zsUa0OXpp7qFLuZPQZtDUcVodfaSf1HvdfsLi8mNQIqYMSlhJ_voRVBDbxWvTRXl0e2iLXnr5-wPNXDn2r9F70NGusKiqzevbDOa9eKGwV1wvohK6Gt/s72-c/26093.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5129907773329456318.post-4851605395241581689</guid><pubDate>Sun, 16 May 2010 15:27:00 +0000</pubDate><atom:updated>2010-05-16T08:35:46.947-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Antivirus Review 2010</category><title>Purchase of Antivirus Softwares</title><description>&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Why Buy Antivirus Software?&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Today, an unprotected computer isn’t just vulnerable, it’s probably already infected. New viruses, spyware, trojans, worms, and other malware are created every day. New threats are disguised to bypass other security measures, and specifically designed to catch you and your PC off guard.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;The virus landscape has also changed; viruses that used to be annoying pranks have evolved into pernicious threats capable of not only destroying your computer, but stealing your information and identity.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;The benefits of installing a basic security solution on your PC are obvious, but the cost in system slowdown used to make it tough to bear. Luckily, modern &lt;strong&gt;antivirus software&lt;/strong&gt; haven’t just improved their level of protection, they’ve significantly improved resource efficiency and overall speed. You can have ultimate protection without giving up your resources. With advanced technologies and straightforward usability, antivirus software is more effective than ever, and doesn’t require constant maintenance from you. Say goodbye to annoying security warnings and noticeable slowdown; current antivirus programs deliver constant protection and can actually speed up your computer.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;The last generation of antivirus software brought advanced heuristic detection into the mix. Continuing to improve, the 2010 lineup of antivirus products often incorporate further developed proactive protection with better behavior checking and even file reputation analysis. Several of the software incorporate ‘in the cloud’ security and other advanced technologies to increase safety and convenience. From gamer modes, to battery saving settings, to integrated web link scanners; antivirus applications are more versatile and have upped the ante for features and functionality.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;On this site you’ll find a side-by-side comparison of the best antivirus software, helpful articles, security tips and tricks, buying guides, videos, and comprehensive reviews to help you make an informed decision on which security software is right for you.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;a href=&quot;http://anti-virus-software-review.toptenreviews.com/antivirus-software-c20-video-4.html&quot;&gt;How to Remove/Prevent Viruses  &lt;/a&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;a href=&quot;http://anti-virus-software-review.toptenreviews.com/top-rogue-scanners-to-avoid.html&quot;&gt;Top Rogue Scanners to Avoid&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;a href=&quot;http://anti-virus-software-review.toptenreviews.com/viruses-and-worms.html&quot;&gt;Worm or Virus…What’s the Difference?&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;a href=&quot;http://anti-virus-software-review.toptenreviews.com/is-antivirus-software-enough-bitdefender-products-compared.html&quot;&gt;Is Antivirus Software Enough?&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;At TopTenREVIEWS We Do the Research So You Don’t Have To.™&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;h3 style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;What to Look For in Antivirus Software&lt;/span&gt;&lt;/h3&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;All security software is not created equal. Like all consumer products, antivirus software has the good, the bad, and the mediocre. The choices for antivirus protection are many and varied. Although we haven’t reviewed each and every product available, we feature the absolute best antivirus software available today from a number of providers (including big-hitters, lesser-knowns, and new-comers), and compare them so you can match your needs with the right software.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Remember when it really comes down to it, effectiveness and usability can either make or break antivirus software. Security programs are only as good as their level of protection, and if you can’t figure out how to use it, you won’t. Our top-ranked antivirus software combine optimal security with user-friendly features and tools.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Below are the criteria TopTenREVIEWS uses to evaluate and compare antivirus software:&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;margin-left: 40px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;strong&gt;Scope of Protection&lt;/strong&gt;&lt;br /&gt;While most security solutions tout “multi-layered” protection, “360 degree” defense and/or even “100%” security, some are certainly more thorough than others. The best antivirus solutions will include traditional protection from viruses, worms, Trojans and spyware, but should also include defense from keyloggers, phishing scams, email-borne threats and rootkits. While antivirus programs are by no means full-blown internet security suites, they should protect from as many threats on as many fronts as they can.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;margin-left: 40px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;strong&gt;Effectiveness&lt;/strong&gt;&lt;br /&gt;Antivirus is specifically designed to protect your computer, so if it doesn’t do that well, what good is it? All the features, bells and whistles, or sleek interface can’t make up for poor performance. We look at results from the industry-standard security software testers and professional security organizations to find the most effective software available and evaluate overall effectiveness. In general, our highest ranked programs are also the most effective.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;margin-left: 40px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;strong&gt;Ease of Installation and Setup&lt;/strong&gt;&lt;br /&gt;Security software shouldn’t be a chore to install, and should have you protected as soon as possible. From download to install, to the first scan; implementing antivirus software should be quick and easy.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;margin-left: 40px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;strong&gt;Ease of Use&lt;/strong&gt;&lt;br /&gt;Antivirus software is complex stuff, but shouldn’t require a degree in computer security. The best security programs have all the features security experts want, but are just as easily used by a beginner. Everyday computer users want a security solution that they can install and forget about; software that doesn’t require constant maintenance or have annoying interruptions. The best antivirus software is flexible enough to do exactly what you want to (even if that means running by itself).&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;margin-left: 40px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;strong&gt;Features&lt;/strong&gt;&lt;br /&gt;A well-rounded feature set takes a security solution from good to great. More than bells and whistles, added features provide security, usability and performance benefits.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;margin-left: 40px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;strong&gt;Updates&lt;/strong&gt;&lt;br /&gt;Security software is only as good as its latest update. Viruses are being identified and added to signature databases all the time, so it’s important that your virus definition list updates accordingly. Modern antivirus software are equipped with automatic updates that perform regularly enough that you get faster updates that don’t slow down your system. The best security providers even “push” updates to you as soon as they’re available.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;margin-left: 40px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;strong&gt;Help &amp;amp; Support&lt;/strong&gt;&lt;br /&gt;The best software doesn’t require reading an in-depth manual to use, but still has one available. For specific questions, troubleshooting, and additional help, the best antivirus manufacturers provide superior product support online and off. Additional support for software may come in the form of assistance over the phone, email, live chat, or through a number of additional resources (knowledgebase, FAQs, tutorials).&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;A well-balanced antivirus solution is effective, efficient, and easy to use. Combining all the right features with a usable interface; our top &lt;strong&gt;antivirus software&lt;/strong&gt; choices deliver the best security and usability without a serious investment in time, money, or system resources.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-size:78%;&quot;&gt;&quot;Virus Protection Software, McAfee, F-Secure, Kaspersky, Bit Defender, ESET Nod32, AVG, Trend Micro, antivirus review, Norton AntiVirus, CA Antivirus, Norman Antivirus, best antivirus software, antivirus aoftware review, best antivirus, anti-virus, bitdefnder, top 10 antivirus, top antivirus, top ten antivirus&quot;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Source:http://anti-virus-software-review.toptenreviews.com/&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;</description><link>http://topavn.blogspot.com/2010/05/purchase-of-antivirus-softwares.html</link><author>noreply@blogger.com (TOPGUN)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5129907773329456318.post-2990652764314468105</guid><pubDate>Tue, 04 May 2010 09:55:00 +0000</pubDate><atom:updated>2010-05-04T03:03:23.631-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Attacks</category><category domain="http://www.blogger.com/atom/ns#">computer news</category><category domain="http://www.blogger.com/atom/ns#">E-mail servers</category><category domain="http://www.blogger.com/atom/ns#">tech news</category><category domain="http://www.blogger.com/atom/ns#">Viruses and worms</category><title>New virus infects PCs, whacks SCO</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;b&gt;A mass-mailing virus that quickly spread through the Internet on  Monday planted a file that will instruct infected computers to attack  the SCO Group&#39;s Web server with a flood of data on Feb. 1.&lt;/b&gt;&lt;/span&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt; The virus--known as MyDoom, Novarg and as a &lt;a title=&quot;New Mimail mixes  tricks for PayPal scam -- 2004-01-16T13:13:00Z&quot; href=&quot;http://news.cnet.com/New-Mimail-mixes-tricks-for-PayPal-scam/2100-7349_3-5142647.html&quot;&gt;variant  of the Mimail virus&lt;/a&gt; by different antivirus companies--arrives in an  in-box with one of several different random subject lines, such as  &quot;Mail Delivery System,&quot; &quot;Test&quot; or &quot;Mail Transaction Failed.&quot; The body of  the e-mail contains an executable file and a statement such as: &quot;The  message contains Unicode characters and has been sent as a binary  attachment.&quot;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&quot;It&#39;s huge,&quot; said &lt;a title=&quot;The virus hunter -- 2004-01-26T12:30:00Z&quot; href=&quot;http://news.cnet.com/The-virus-hunter/2008-7355_3-5147477.html&quot;&gt;Vincent  Gullotto&lt;/a&gt;, vice president of security software maker Network  Associates&#39; antivirus emergency response team. &quot;We have it as a  high-risk outbreak.&quot;  &lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt; In one hour, Network Associates itself received 19,500 e-mails bearing  the virus from 3,400 unique Internet addresses, Gullotto said. One large  telecommunications company has already shut down its e-mail gateway to  stop the virus. &lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt; Once the virus infects a Windows-running PC, it installs a program that  allows the computer to be controlled remotely. The program primes the PC  to send data to the SCO Group&#39;s Web server, starting Feb. 1, a virus  researcher said on the condition of anonymity. &lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt; The SCO Group has incurred the wrath of the Linux community for &lt;a title=&quot;SCO suit now seeks $3 billion from IBM -- 2003-06-16T21:20:00Z&quot; href=&quot;http://news.cnet.com/SCO-suit-now-seeks-3-billion-from-IBM/2100-1016_3-1017965.html&quot;&gt;its  claims&lt;/a&gt; that important pieces of the open-source operating system  are covered by SCO&#39;s Unix copyrights. IBM, Novell and other Linux  backers &lt;a title=&quot;Linux lab hires lawyers for Torvalds --  2003-11-13T21:40:00Z&quot; href=&quot;http://news.cnet.com/Linux-lab-hires-lawyers-for-Torvalds/2100-7344_3-5107419.html&quot;&gt;strongly  dispute&lt;/a&gt; the claims.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Source: http://news.cnet.com/new-virus-infects-pcs-whacks-sco/&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;</description><link>http://topavn.blogspot.com/2010/05/new-virus-infects-pcs-whacks-sco.html</link><author>noreply@blogger.com (TOPGUN)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5129907773329456318.post-3551590448951217927</guid><pubDate>Wed, 31 Mar 2010 08:10:00 +0000</pubDate><atom:updated>2010-03-31T01:51:56.083-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">mobile</category><category domain="http://www.blogger.com/atom/ns#">Most Dangerous Viruses</category><title>10 Most Dangerous Virus Mobile</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;img src=&quot;file:///C:/DOCUME%7E1/SHAHBA%7E1/LOCALS%7E1/Temp/moz-screenshot-2.jpg&quot; alt=&quot;&quot; /&gt;Virus in the same hp as computer viruses. &lt;a href=&quot;http://cumaini.com/2009/12/various-applications-bugs-phone-and-sms/&quot; target=&quot;_self&quot;&gt;Should&lt;/a&gt; a virus program, ie programs that can install themselves, they can cause damage either directly or indirectly. &lt;a href=&quot;http://cumaini.com/2009/12/how-to-install-operating-system-google-chrome-google-chrome-operating-system/&quot;&gt;Although&lt;/a&gt; there are a few of them that do not cause damage, but they still cause damage. &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Here’s a list of 10 most dangerous viruses &lt;a href=&quot;http://cumaini.com/2009/12/download-new-digsby-offline-installer/&quot; target=&quot;_self&quot;&gt;ever found&lt;/a&gt; in mobile phones:&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;1. Cabir&lt;/strong&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Found: Jun 2004&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Nickname: SymbOS / Cabir.A, EPOC / Cabir.A, Worm.&lt;a title=&quot;Symbian&quot; href=&quot;http://cumaini.com/&quot;&gt;Symbian&lt;/a&gt;.Cabir.a, Caribe&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Target: &lt;a href=&quot;http://cumaini.com/2009/11/free-download-gmail-application-software-for-blackberry/&quot; target=&quot;_self&quot;&gt;Mobile Symbian&lt;/a&gt; S60V2&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Scattered through: Bluetooth&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Damage: slow performance of mobile&lt;br /&gt;Cabir is a worm that spreads via a Bluetooth connection and into the inbox messages with an interesting name. If the file will be opened and installed, Cabir will start looking for other mobile targets that are open access his Bluetooth connections to spread. Cabir Bluetooth will enable a periodic basis, about 15-20 minutes, to get other mobile targets. There is no danger of damage, but the hp battery will run out more quickly because of continuous use bluetooth.&lt;br /&gt;&lt;span id=&quot;more-703&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;2. Skulls&lt;/strong&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Discovered: November 2004&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Nickname: &lt;a href=&quot;http://cumaini.com/2009/11/download-updates-avg-anti-virus-november-14-2009/&quot; target=&quot;_self&quot;&gt;SymbOS&lt;/a&gt;.skulls, skulls.sis, Extenhded theme.sis&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Target: Symbian mobile phone&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Scattered through: Internet&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Damage: mobile phones can not be used again except to call and receive calls.&lt;br /&gt;When installed, Skull H will display notification message: “Install beta_092_free-sms-RM8″ and Skull S displays the message “Install BlueNum Stealer”, and some &lt;a href=&quot;http://cumaini.com/2009/11/free-download-partition-master-411-server-edition-retail-software/&quot; target=&quot;_self&quot;&gt;other weird messages&lt;/a&gt;. These types of Trojans and system damage caused icon menu icon changed into a skull. Not only can change the icons, &lt;a href=&quot;http://cumaini.com/2009/11/free-download-software-wakeup-%e2%80%93-106/&quot; target=&quot;_self&quot;&gt;Skull can damage&lt;/a&gt; all the applications that his icon has been changed. Usually when an infected &lt;a title=&quot;application&quot; href=&quot;http://cumaini.com/&quot;&gt;application&lt;/a&gt; is opened it will appear is the error message.&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;3. CommWarrior&lt;/strong&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Found: Jan 2005&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Nickname: random&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Target: Mobile Symbian S60V2&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Scattered through: Bluetooth and MMS&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Damage: Sending virus replication through MMS to any number in contacs, spent a pulse.&lt;br /&gt;These viruses are often not being recognized because the name he used was not sure. This type of virus attacks vary widely, but the most common is the virus will spread through Bluetooth. Several variants of this virus will also send MMS to random numbers stored in contacs. The last variant was found Commwarrior T. that infects the Symbian 8.1 (S60V2) or previous versions. This virus will spread and sometimes to open the HTML page containing a message like this:&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;“Introduction Surprise! Your phone infected by CommWarrior worm v3.0. Matrix has you, CommWarrior inside. No panic please, it is very interesting to have mobile virus at own phone. This worm does not bring any harm to your phone and your significant data. About CommWarrior worm for Nokia Series60 provides automatic real-time protection against harmful content Anti-Virus. CommWarrior is free &lt;a title=&quot;software&quot; href=&quot;http://cumaini.com/category/software/&quot;&gt;software&lt;/a&gt; and is distributed in the hope that it will be useful, without any warranty. Thank you for using CommWarrior. CommWarrior © 2005 -2006 by e10d0r. ”&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;4. Locknut&lt;/strong&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Found: Mar 2005&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Nickname: unknown&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Target: Symbian s60&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Scattered through: Internet download&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Damage: crashing phone system (ROM)&lt;br /&gt;Locknut or SymbOS.Locknut is a backdoor Trojan that uses the Symbian S60 system. The virus is dangerous because it can change the binary data (file extension. Bin) in the phone ROM from the system, and cause the cell phone operating system stops. Locknut E, one variant of this virus, will destroy important files in the system and cause the application Symbian infected can not be opened. In this way, over time will be locked phone in total.&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;5. Fontal&lt;/strong&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Discovered: April 2005&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Nickname: unknown&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Target: Symbian s60&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Scattered through: Internet download&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Damage: Lock the phone since the first fired and could not be used.&lt;br /&gt;If the phone lock Locknut gradually, it will lock the phone Fontal since it first started.&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;6. RommWar&lt;/strong&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Found: –&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Nickname: theme.sis, xxx.sis, Britney_.sis, or the names of other exciting fishing for installation&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Target: Symbian s60&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Scattered through: Bluetooth, MMS, and internet&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Damage: causes phone can not boot, restarts itself often&lt;br /&gt;When the installation process running, the screen will display a message like this: “Install Stoper by WarriorMarrior?”&lt;br /&gt;RommWar consists of 4 variants namely A, B, C and D which all have functions can cause the phone not boot, restarts itself often, turn off the power button, and prevent the mobile to light when lit.&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;7. DoomBoot&lt;/strong&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Found: –&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Nickname: Doom_2_wad_kracked_by_DFT_S60_v.1.0.sis (disguised as a mobile games Doom 2), exoVirusStopv2.13.19 (disguised as antivirus programs)&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Target: symbian s60&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Scattered through: Bluetooth&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Damage: create corrupted files, preventing phone reboot, if successful reboot it should be hard-reset melakukkan&lt;br /&gt;Doomboot including Trojan viruses. Many variants have been discovered, such as Doomboot A, C, L, F, G, and P. Make Doomboot A corrupted file, and after infecting a file, it will put other viruses such as CommWarrior.B into the mobile phone. Damaged file will prevent the phone to run the reboot. In addition, this virus also causes the battery will quickly run out due to constant use bluetooth connection.&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;8. CardTrap&lt;/strong&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Found: –&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Nickname: masquerading as famous as kingkong &lt;a title=&quot;game&quot; href=&quot;http://cumaini.com/category/game/&quot;&gt;game&lt;/a&gt;, Half Life, Battlefield 2, etc.. Sometimes also disguised as an application example SeleQ 1.7 - kracked TNT.sis&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Target: Symbian S60 mobile phone and Windows-based PC&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Scattered through: memory cards&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Damage: causes important applications to malfunction, chaos systems, damaging the function of some buttons&lt;br /&gt;The first mobile phone virus created to also attack Windows-based computers. He will put the virus into 2 files in memory cards for mobile phones. Many variants have been found, such as CardTrap P, Q, R, S to double alphabets like CardTrap AA, AG, AJ, etc.. Cardtrap damage your system by turning off some important applications, especially anti-virus applications. If the memory card to be infected with the virus is connected to a PC, it will grow CardTrap himself to the PC and they will spread themselves.&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;9. PBStealer&lt;/strong&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Found: –&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Nickname: ChattingYuk.sis, PBCompressor.sis&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Target: Symbian s60 phone&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Scattered through: Bluetooth&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Damage: exploiting the number of contacts, to-do list, database and notepad&lt;br /&gt;PBStealer is mobile viruses from Indonesia, we take pride in Indonesia. This virus will copy important data on our mobile phones such as contacs, to-do list, notes, etc. into the format. Txt and then will spread to other mobile phones such as Bluetooth. Brief look harmless but what if there are important data we are disseminated and used for criminal purposes?.&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;10. AppDisabler&lt;/strong&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Found:&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Nickname: –&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Target: Symbian&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Scattered through: Bluetooth, MMS&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Damage: install other viruses are dangerous as well, such as Locknut, Cabir and Skulls, causing the entire operating system to a halt.&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Source: http://cumaini.com/2010/01/10-most-dangerous-virus-mobile/&lt;br /&gt;&lt;/p&gt;</description><link>http://topavn.blogspot.com/2010/03/10-most-dangerous-virus-mobile.html</link><author>noreply@blogger.com (TOPGUN)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5129907773329456318.post-3368193332480359057</guid><pubDate>Wed, 23 Dec 2009 05:19:00 +0000</pubDate><atom:updated>2009-12-22T21:30:59.668-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">latest new viruses</category><category domain="http://www.blogger.com/atom/ns#">latest viruses</category><category domain="http://www.blogger.com/atom/ns#">security updates</category><category domain="http://www.blogger.com/atom/ns#">spyware</category><category domain="http://www.blogger.com/atom/ns#">threat explorer</category><category domain="http://www.blogger.com/atom/ns#">virus</category><category domain="http://www.blogger.com/atom/ns#">virus definitions</category><category domain="http://www.blogger.com/atom/ns#">virus removal tools</category><title>Symantec Security Response</title><description>&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial, helvetica, sans-serif; font-size: 14px; color: rgb(85, 85, 85); line-height: 21px; &quot;&gt;Symantec Security Response provides customers with comprehensive, global, 24X7 Internet security expertise to guard against today&#39;s complex Internet threats. Choose one of the two tailored Symantec site offerings that best meets your needs. In the future, consider bookmarking that page so you can get there directly next time and skip this page entirely.&lt;/span&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot;    style=&quot;font-family:arial, helvetica, sans-serif;font-size:130%;color:#555555;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 14px; line-height: 21px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot;    style=&quot;font-family:arial, helvetica, sans-serif;font-size:130%;color:#555555;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 14px; line-height: 21px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 12px; line-height: 14px; &quot;&gt;&lt;div class=&quot;Global_GreyBdyWrapTop&quot; style=&quot;display: block; background-image: initial; background-repeat: initial; background-attachment: initial; -webkit-background-clip: initial; -webkit-background-origin: initial; background-color: transparent; background-position: initial initial; &quot;&gt;&lt;div class=&quot;Global_GreyBdyWrapgs2&quot; style=&quot;display: block; overflow-x: hidden; overflow-y: hidden; height: 1px; background-image: initial; background-repeat: initial; background-attachment: initial; -webkit-background-clip: initial; -webkit-background-origin: initial; background-color: rgb(174, 174, 174); border-top-width: 0px; border-right-width: 2px; border-bottom-width: 0px; border-left-width: 2px; border-top-style: solid; border-right-style: solid; border-bottom-style: solid; border-left-style: solid; border-top-color: rgb(174, 174, 174); border-right-color: rgb(174, 174, 174); border-bottom-color: rgb(174, 174, 174); border-left-color: rgb(174, 174, 174); margin-top: 0px; margin-right: 3px; margin-bottom: 0px; margin-left: 3px; background-position: initial initial; &quot;&gt;&lt;/div&gt;&lt;div class=&quot;Global_GreyBdyWrapgs3&quot; style=&quot;display: block; overflow-x: hidden; overflow-y: hidden; height: 1px; background-image: initial; background-repeat: initial; background-attachment: initial; -webkit-background-clip: initial; -webkit-background-origin: initial; background-color: rgb(174, 174, 174); border-top-width: 0px; border-right-width: 1px; border-bottom-width: 0px; border-left-width: 1px; border-top-style: solid; border-right-style: solid; border-bottom-style: solid; border-left-style: solid; border-top-color: rgb(174, 174, 174); border-right-color: rgb(174, 174, 174); border-bottom-color: rgb(174, 174, 174); border-left-color: rgb(174, 174, 174); margin-top: 0px; margin-right: 2px; margin-bottom: 0px; margin-left: 2px; background-position: initial initial; &quot;&gt;&lt;b&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;Global_GreyBdyWrapgs4&quot; style=&quot;display: block; overflow-x: hidden; overflow-y: hidden; background-image: initial; background-repeat: initial; background-attachment: initial; -webkit-background-clip: initial; -webkit-background-origin: initial; background-color: rgb(174, 174, 174); border-top-width: 0px; border-right-width: 1px; border-bottom-width: 0px; border-left-width: 1px; border-top-style: solid; border-right-style: solid; border-bottom-style: solid; border-left-style: solid; border-top-color: rgb(174, 174, 174); border-right-color: rgb(174, 174, 174); border-bottom-color: rgb(174, 174, 174); border-left-color: rgb(174, 174, 174); height: 2px; margin-top: 0px; margin-right: 1px; margin-bottom: 0px; margin-left: 1px; background-position: initial initial; &quot;&gt;&lt;b&gt;&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;Global_GreyBdyWrapHdr&quot; style=&quot;padding-top: 0px; padding-right: 0px; padding-bottom: 2px; padding-left: 20px; background-image: url(http://www.symantec.com/images/masthead/table_header_bg.gif); background-repeat: repeat-x; border-right-width: 1px; border-right-style: solid; border-right-color: rgb(174, 174, 174); border-left-width: 1px; border-left-style: solid; border-left-color: rgb(174, 174, 174); &quot;&gt;&lt;h3 style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0.2em; padding-left: 0px; width: 443px; font: normal normal bold 1.2em/normal arial, helvetica, sans-serif; color: rgb(255, 255, 255); font-size: 1.25em; font-weight: bold; &quot;&gt;IT Professionals&lt;/h3&gt;&lt;/div&gt;&lt;div class=&quot;Global_GreyBdyWrapBdy&quot; style=&quot;border-right-width: 1px; border-right-style: solid; border-right-color: rgb(174, 174, 174); border-left-width: 1px; border-left-style: solid; border-left-color: rgb(174, 174, 174); background-color: rgb(255, 255, 255); padding-bottom: 1.2em; &quot;&gt;&lt;div class=&quot;Global_GreyBdyWrapTxt&quot; style=&quot;padding-top: 20px; padding-right: 20px; padding-bottom: 3px; padding-left: 20px; background-color: rgb(255, 255, 255); &quot;&gt;&lt;div style=&quot;float: left; width: 160px; &quot;&gt;&lt;a href=&quot;http://www.symantec.com/business/security_response/index.jsp&quot; style=&quot;color: rgb(216, 71, 4); text-decoration: none; &quot;&gt;&lt;img src=&quot;http://www.symantec.com/content/en/us/global/images/security_response/a-segment-redesign_itprof.jpg&quot; alt=&quot;IT Professionals&quot; title=&quot;IT Professionals&quot; width=&quot;160&quot; height=&quot;160&quot; style=&quot;border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; &quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;cbType21&quot; style=&quot;font: normal normal normal 0.92em/normal arial, helvetica, sans-serif; color: rgb(85, 85, 85); float: left; width: 240px; margin-left: 20px; &quot;&gt;&lt;div style=&quot;color: rgb(34, 34, 34); line-height: 16px; &quot;&gt;&lt;b&gt;Choose If You:&lt;/b&gt;&lt;ul class=&quot;listSQbl&quot; style=&quot;margin-top: 0.2em; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; clear: both; &quot;&gt;&lt;li style=&quot;list-style-position: outside; list-style-type: none; padding-left: 0.8em; background-image: url(http://www.symantec.com/images/masthead/squareBL.gif); background-repeat: no-repeat; background-attachment: initial; -webkit-background-clip: initial; -webkit-background-origin: initial; background-color: initial; background-position: 0px 0.5em; &quot;&gt;Are responsible for others&#39; online security&lt;/li&gt;&lt;li style=&quot;list-style-position: outside; list-style-type: none; padding-left: 0.8em; background-image: url(http://www.symantec.com/images/masthead/squareBL.gif); background-repeat: no-repeat; background-attachment: initial; -webkit-background-clip: initial; -webkit-background-origin: initial; background-color: initial; background-position: 0px 0.5em; &quot;&gt;Work in corporate IT security&lt;/li&gt;&lt;li style=&quot;list-style-position: outside; list-style-type: none; padding-left: 0.8em; background-image: url(http://www.symantec.com/images/masthead/squareBL.gif); background-repeat: no-repeat; background-attachment: initial; -webkit-background-clip: initial; -webkit-background-origin: initial; background-color: initial; background-position: 0px 0.5em; &quot;&gt;Want in-depth, detailed information&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;b&gt;Quick Links:&lt;/b&gt;&lt;ul class=&quot;listSQor&quot; style=&quot;margin-top: 0.2em; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; clear: both; &quot;&gt;&lt;li style=&quot;list-style-position: outside; list-style-type: none; padding-left: 0.8em; background-image: url(http://www.symantec.com/images/masthead/squareOR.gif); background-repeat: no-repeat; background-attachment: initial; -webkit-background-clip: initial; -webkit-background-origin: initial; background-color: initial; background-position: 0px 0.5em; &quot;&gt;&lt;a href=&quot;http://www.symantec.com/business/security_response/threatexplorer/index.jsp&quot; style=&quot;color: rgb(216, 71, 4); text-decoration: none; &quot;&gt;Threat Explorer&lt;/a&gt;&lt;/li&gt;&lt;li style=&quot;list-style-position: outside; list-style-type: none; padding-left: 0.8em; background-image: url(http://www.symantec.com/images/masthead/squareOR.gif); background-repeat: no-repeat; background-attachment: initial; -webkit-background-clip: initial; -webkit-background-origin: initial; background-color: initial; background-position: 0px 0.5em; &quot;&gt;&lt;a href=&quot;http://www.symantec.com/business/theme.jsp?themeid=threatreport&quot; style=&quot;color: rgb(216, 71, 4); text-decoration: none; &quot;&gt;Internet Security Threat Report&lt;/a&gt;&lt;/li&gt;&lt;li style=&quot;list-style-position: outside; list-style-type: none; padding-left: 0.8em; background-image: url(http://www.symantec.com/images/masthead/squareOR.gif); background-repeat: no-repeat; background-attachment: initial; -webkit-background-clip: initial; -webkit-background-origin: initial; background-color: initial; background-position: 0px 0.5em; &quot;&gt;&lt;a href=&quot;http://www.symantec.com/business/theme.jsp?themeid=state_of_spam&quot; style=&quot;color: rgb(216, 71, 4); text-decoration: none; &quot;&gt;State of Spam&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;a href=&quot;http://www.symantec.com/business/security_response/index.jsp&quot; style=&quot;color: rgb(216, 71, 4); text-decoration: none; font-size: 1.1em; &quot;&gt;&lt;b&gt;Enterprise Security Response&lt;/b&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;clear: both; &quot;&gt;&lt;/div&gt;&lt;div class=&quot;hr imgMrgnTopLG imgMrgnBtmLG&quot; style=&quot;display: block; clear: both; height: 1px; background-image: url(http://www.symantec.com/images/line_ccc.gif); background-repeat: repeat; background-attachment: initial; -webkit-background-clip: initial; -webkit-background-origin: initial; background-color: initial; margin-top: 1.6em; margin-bottom: 1.6em; background-position: initial initial; &quot;&gt;&lt;/div&gt;&lt;div style=&quot;clear: both; &quot;&gt;&lt;/div&gt;&lt;div class=&quot;cbType21&quot; style=&quot;font: normal normal normal 0.92em/normal arial, helvetica, sans-serif; color: rgb(34, 34, 34); line-height: 16px; &quot;&gt;&lt;h3 style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 12px; padding-left: 0px; width: 423px; font: normal normal bold 12px/normal arial, helvetica, sans-serif; color: rgb(34, 34, 34); &quot;&gt;Spam Trends&lt;/h3&gt;&lt;a href=&quot;http://www.symantec.com/business/security_response/weblog/&quot; style=&quot;color: rgb(216, 71, 4); text-decoration: none; &quot;&gt;&lt;img src=&quot;http://www.symantec.com/content/en/us/global/images/security_response/a-srr-brightmail-image.jpg%20.jpg&quot; alt=&quot;Weblog&quot; title=&quot;Weblog&quot; class=&quot;imgFltLft   imgMrgnRgtMD  &quot; width=&quot;60&quot; height=&quot;60&quot; style=&quot;border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; margin-top: 0px; margin-right: 0.8em; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; float: left; &quot; /&gt;&lt;/a&gt;Our Brightmail IQ Services deliver comprehensive worldwide spam data, tools, and analysis to keep your organization informed and protected.&lt;a href=&quot;http://www.symantec.com/business/security_response/landing/spam/index.jsp&quot; class=&quot;chevronR&quot; style=&quot;color: rgb(216, 71, 4); text-decoration: none; padding-top: 0px; padding-right: 0.8em; padding-bottom: 0.2em; padding-left: 0px; background-image: url(http://www.symantec.com/images/masthead/chevronOR.gif); background-repeat: no-repeat; background-attachment: initial; -webkit-background-clip: initial; -webkit-background-origin: initial; background-color: initial; background-position: 100% 50%; &quot;&gt;Learn more&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;cbType21&quot; style=&quot;font: normal normal normal 0.92em/normal arial, helvetica, sans-serif; color: rgb(34, 34, 34); line-height: 16px; &quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;cbType21&quot; style=&quot;font: normal normal normal 0.92em/normal arial, helvetica, sans-serif; color: rgb(34, 34, 34); line-height: 16px; &quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;cbType21&quot; style=&quot;font: normal normal normal 0.92em/normal arial, helvetica, sans-serif; color: rgb(34, 34, 34); line-height: 16px; &quot;&gt;Source-link:&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: rgb(0, 0, 0); font-family: arial, sans-serif; font-size: medium; line-height: normal; &quot;&gt;&lt;a href=&quot;http://www.symantec.com/security_response/index.jsp&quot; class=&quot;l&quot; onmousedown=&quot;return clk(this.href,&#39;&#39;,&#39;&#39;,&#39;res&#39;,&#39;2&#39;,&#39;&#39;,&#39;0CAwQFjAB&#39;)&quot; style=&quot;color: rgb(85, 26, 139); &quot;&gt;Symantec &lt;em style=&quot;font-weight: bold; font-style: normal; &quot;&gt;AntiVirus&lt;/em&gt; Research Center&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</description><link>http://topavn.blogspot.com/2009/12/symantec-security-response.html</link><author>noreply@blogger.com (TOPGUN)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5129907773329456318.post-5323510708138149595</guid><pubDate>Sun, 22 Nov 2009 13:44:00 +0000</pubDate><atom:updated>2009-11-22T05:50:32.613-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">7. Rising Antivirus</category><title>Rising antivirus 2009</title><description>&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; color: rgb(53, 53, 53); font-size: 12px; line-height: 19px; &quot;&gt;&lt;p style=&quot;text-align: justify;margin-top: 0px; margin-right: 0px; margin-bottom: 17px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; font-weight: inherit; font-style: inherit; font-size: 12px; font-family: inherit; vertical-align: baseline; line-height: 19px; width: auto; &quot;&gt;&lt;img src=&quot;http://i.i.com.com/cnwk.1d/i/tim/20090402/6484a3ad0a0f8bec39346bccec7ec80c_1Rising_Antivirus1_362x272.PNG&quot; alt=&quot;Click to see larger images&quot; /&gt;Rising Antivirus protects your computers against all types of viruses, Trojans, Worms, Rootkits and other malicious programs. Easy to use, Active Defense technology, Patented Unknown Virus Scan and Clean technology and Patented Smartupdate technology make RISING Antivirus install and forget product and entitles you to focus on your own jobs with your computer. Key Features:Zero day protection with Rising Cloud Security; Rising Cloud Security users communicate with the Rising virus lab to form a rapid response network which quickly catches Trojans and other malware. Antivirus &amp;amp; Antispyware Protection; Protection from Trojans, worms, rootkits and other malware. With unparalleled expertise in combating Asian malware, Rising offers you actual protection against today&#39;s cyber threats without putting a strain on your computer&#39;s resources. Advanced System Protection; File Monitor,automatically detects viruses in active files and prevents them from infecting your computer.Email Monitor,scans inbound (POP3) and outbound (SMTP) emails for malware. Smart Active Defense; System Reinforcement, Monitors and protects OS vulnerabilities against attacks by malware. Application Control, Monitor the operational status of applications and block suspicious activities. Malicious Behavior Interceptor, Monitors programs in the system for possible malicious behavior. USB/CD/DVD Monitor, Blocks malware on USB storage media, CDs/DVDs and network drives. Embedded Scan, Provides integrated protection for instant messengers, download managers and other popular tools. Web Trojan Defense, Automatically blocks malicious web scripts and viruses while you are browsing the web. Self-Protection, Prevents malware from making changes to the Rising Antivirus software.&lt;/p&gt;&lt;p style=&quot;text-align: justify; margin-top: 0px; margin-right: 0px; margin-bottom: 17px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; font-weight: inherit; font-style: inherit; font-size: 12px; font-family: inherit; vertical-align: baseline; line-height: 19px; width: auto; &quot;&gt;Version 21.55.12 may include unspecified updates, enhancements, or bug fixes.&lt;/p&gt;&lt;p style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 17px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; font-weight: inherit; font-style: inherit; font-size: 12px; font-family: inherit; text-align: left; vertical-align: baseline; line-height: 19px; width: auto; &quot;&gt;&lt;/p&gt;&lt;div id=&quot;whatsnew&quot; style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; font-weight: inherit; font-style: inherit; font-size: 12px; font-family: inherit; text-align: left; vertical-align: baseline; &quot;&gt;&lt;p style=&quot;text-align: justify; margin-top: 0px; margin-right: 0px; margin-bottom: 17px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; font-weight: inherit; font-style: inherit; font-size: 12px; font-family: inherit; vertical-align: baseline; line-height: 19px; width: auto; &quot;&gt;&lt;b style=&quot;font-weight: bold; &quot;&gt;What&#39;s new in this version:&lt;/b&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify; &quot;&gt;Version 21.55.12 may include unspecified updates, enhancements, or bug fixes.&lt;/div&gt;&lt;/div&gt;&lt;/span&gt;</description><link>http://topavn.blogspot.com/2009/11/rising-antivirus-2009.html</link><author>noreply@blogger.com (TOPGUN)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5129907773329456318.post-3770359805305673361</guid><pubDate>Sun, 11 Oct 2009 15:02:00 +0000</pubDate><atom:updated>2009-10-11T08:11:02.855-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Most Dangerous Viruses</category><title>New Folder.exe Virus Removal Tool</title><description>&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Virus also known as- IT University Sohanad W32.HLLW.Ssdx newfolder.exe&lt;br /&gt;If this virus infected in you computer, It will Disable the following …&lt;br /&gt;Task Manager, Registry Editor, Folder Options, Run in start menu&lt;br /&gt;And it will create exes like the icon of folders. If this virus is running it &lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;will use more than 50 % of your processor&lt;br /&gt;Download following tools to remove new folder.exe virus&lt;br /&gt;&lt;/span&gt;&lt;a href=&quot;http://download.bleepingcomputer.com/sUBs/ComboFix.exe&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Download Tool 1&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-size:85%;&quot;&gt; &lt;/span&gt;&lt;a href=&quot;http://downloads.andymanchesta.com/RemovalTools/SDFix.exe&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Download Tool 2&lt;/span&gt;&lt;/a&gt;&lt;a href=&quot;http://downloads.andymanchesta.com/RemovalTools/SDFix.exe&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt; &lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;( run tools In safe mode )&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;/span&gt; &lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Manually remove it (new folder.exe Fix)&lt;br /&gt;Delete File named svichossst.exe&lt;br /&gt;[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System]“@”=[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]“Yahoo Messengger”=&lt;br /&gt;[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]“Shell”=”Explorer.exe “&lt;br /&gt;&lt;/span&gt;&lt;a href=&quot;http://tec-updates.blogspot.com/2009/09/autorun-virus-fix-microsoft-patch.html&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Microsoft patch to prevent spreading Virus through removable medias : KB971029&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://tec-updates.blogspot.com/2009/06/list-of-windows-updates-since-sp3.html&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;list of windows updates since sp3 KB936929&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt; &lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Source: &lt;/span&gt;&lt;a href=&quot;http://www.ask.com/bar?q=new+folder+virus&amp;amp;page=1&amp;amp;qsrc=0&amp;amp;ab=0&amp;amp;u=http%3A%2F%2Ftec-updates.blogspot.com%2F2007%2F10%2Fnew-folderexe-virus-removal-tool.html&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;http://www.ask.com/bar?q=new+folder+virus&amp;amp;page=1&amp;amp;qsrc=0&amp;amp;ab=0&amp;amp;u=http%3A%2F%2Ftec-updates.blogspot.com%2F2007%2F10%2Fnew-folderexe-virus-removal-tool.html&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;</description><link>http://topavn.blogspot.com/2009/10/new-folderexe-virus-removal-tool.html</link><author>noreply@blogger.com (TOPGUN)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5129907773329456318.post-3780533307187724255</guid><pubDate>Thu, 17 Sep 2009 14:20:00 +0000</pubDate><atom:updated>2009-09-17T07:32:08.904-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">4.Norton AntiVirus</category><title>Norton Antivirus demands</title><description>&lt;div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Norton Antivirus:&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Computers have become the necessity of life transforming the way we all used to do things earlier. Now everything can be done with the help of computers and that is why they need protection and safety tool to protect your documents and files. The need of anti virus is needed because in this world there are few people who can use computers from destructive purposes. They create viruses when the people accidentally open them. Due to this threat experts are under process to come out with different anti virus software to protect such malicious software from destroying your computer files and hardware.   One of the best softwares to combat such viruses is Norton anti virus. This software was developed by Symantec Corporation which detects and removes viruses, spyware, adware and other possible risks to computers. This software can be easily installed in your computer as a program. This software was first released in the year 1990 and one of its rival was central point anti virus. CPAV was licensed as the Microsoft anti virus utility.    Norton anti virus  prevents viruses and other malicious software from penetrating with your PC. This software works without interfering with regular use of your computer and nor does it interfere with internet surfing, music or any other download and online services. Norton keeps on coming with its improvised versions to give more protection and safety to the consumers. The latest version of Norton is Norton anti virus 2008. This anti virus software is available for free for fifteen days so that people can test the effectiveness of this software. After that you can purchase this software for $39.99.   In order to get this software in your computer, you should be having windows XP or Windows Vista. The installation of Norton software is really easy. Simply install the CD in your CD drive and the installation process will start automatically. In fact the installer will ask whether you want a pre-install scan of your computer for viruses. After its competition your installation will begin. After installation you will be directed online and get up-to-date virus definitions. Don’t ignore this step as this is essential for good performance of the software.   Norton anti virus has become the default choice of the large masses because it has the power and ability to scan and delete malicious virus and software quickly and efficiently.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Summary:&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Norton is recognized to be the best anti virus software because of the presence of unique features. This software is widely used by the populace and is increasingly in demand these days.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Article Source: http://www.articlesbase.com/software-articles/norton-antivirus-1110085.html&lt;/div&gt;</description><link>http://topavn.blogspot.com/2009/09/norton-antivirus-demands.html</link><author>noreply@blogger.com (TOPGUN)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5129907773329456318.post-9213188837029638986</guid><pubDate>Mon, 14 Sep 2009 16:35:00 +0000</pubDate><atom:updated>2009-09-14T09:39:46.490-07:00</atom:updated><title>Panda Security unveils 2010 line-up and 80% performance gains</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiq3QKjUUMLURTRZl7XEMPFz7jIjRsTEZvP-I9KnDczyJI1fLet8qCf1nLwwIRYjd23gEFX26Jtl6UwwzvpfkVL4qJBKdFKEdW2Vpg2HdeI5mWJdjc4wbbo75AyDZMOqLv9oQ3WkWP44LnM/s1600-h/panda_globalprotection_xl.gif&quot;&gt;&lt;img style=&quot;text-align: justify;float: right; margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 10px; cursor: pointer; width: 150px; height: 235px; &quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiq3QKjUUMLURTRZl7XEMPFz7jIjRsTEZvP-I9KnDczyJI1fLet8qCf1nLwwIRYjd23gEFX26Jtl6UwwzvpfkVL4qJBKdFKEdW2Vpg2HdeI5mWJdjc4wbbo75AyDZMOqLv9oQ3WkWP44LnM/s320/panda_globalprotection_xl.gif&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5381363463458826082&quot; /&gt;&lt;/a&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot;   style=&quot; color: rgb(51, 51, 51);  line-height: 18px; font-family:arial;font-size:13px;&quot;&gt;&lt;p style=&quot;text-align: justify;padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 15px; margin-left: 0px; line-height: 16px; &quot;&gt;Panda Security has this week launched its 2010 line-up of security products and the focus this year seems to be on performance.&lt;/p&gt;&lt;p style=&quot;text-align: justify;padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 15px; margin-left: 0px; line-height: 16px; &quot;&gt;There are four versions of the latestprotection including:&lt;/p&gt;&lt;ul&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;Panda Antivirus for Netbooks ($39.95)&lt;/li&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;Panda Antivirus Pro 2010 ($39.95 one PC, $49.95 three PCs)&lt;/li&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;Panda Internet Security 2010 ($59.95 one PC, $79.95 three PCs)&lt;/li&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;Panda Global Protection 2010 ($69.95 on PC, $89.95 three PCs)&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;text-align: justify;padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 15px; margin-left: 0px; line-height: 16px; &quot;&gt;Each version takes advantage of a cloud computing solution Panda call Collective Intelligence. Using that has helped the company minimise the resources required to protect your machine and boast just an 8MB memory footprint while running. Panda are also claiming an 80% performance improvement over previous editions, 60% improved browsing speed, and 40% improved downloading speed.&lt;/p&gt;&lt;p style=&quot;text-align: justify;padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 15px; margin-left: 0px; line-height: 16px; &quot;&gt;In the same way &lt;a href=&quot;http://www.geek.com/articles/news/kaspersky-targets-netbooks-with-ultra-portables-suite-20090616/&quot; style=&quot;color: rgb(9, 43, 137); text-decoration: none; cursor: pointer; &quot;&gt;Kaspersky introduced its Ultra Portables solution&lt;/a&gt; earlier this month; Panda has decided to target netbooks with one of its Antivirus SKUs giving antivirus, anti-spyware, firewall, ID protection, anti-phishing, and anti-rootkit protection for mobile users.&lt;/p&gt;&lt;p style=&quot;text-align: justify;padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 15px; margin-left: 0px; line-height: 16px; &quot;&gt;For those not using a netbook there are three options. The Pro suite gives you a basic range of protection, Internet Security adds 2GB of online backup and recovery tools, anti-spam, parental controls, Web Filter, and Information Filter technology. Global Protection takes the online backup storage to 5GB, adds CD/DVD backups, and introduces PC tune-up.&lt;/p&gt;&lt;p style=&quot;text-align: justify;padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 15px; margin-left: 0px; line-height: 16px; &quot;&gt;All Panda Security 2010 products are now available to buy via the &lt;a href=&quot;http://www.pandasecurity.com/homeusers/solutions/&quot; style=&quot;color: rgb(9, 43, 137); text-decoration: none; cursor: pointer; &quot;&gt;Panda Security website&lt;/a&gt;.&lt;/p&gt;&lt;p style=&quot;text-align: justify;padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 15px; margin-left: 0px; line-height: 16px; &quot;&gt;Read more at the &lt;a href=&quot;http://www.pandasecurity.com/homeusers/media/press-releases/viewnews?noticia=9732&amp;amp;ver=22&amp;amp;pagina=&amp;amp;numprod=&amp;amp;entorno=&quot; style=&quot;color: rgb(9, 43, 137); text-decoration: none; cursor: pointer; &quot;&gt;Panda Security press release&lt;/a&gt;&lt;/p&gt;&lt;p style=&quot;padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 15px; margin-left: 0px; line-height: 16px; &quot;&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold; &quot;&gt;Matthew’s Opinion&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;There seem to be three trends appearing with security vendors at the moment: performance, cloud computing, and netbook support. All three of those are very welcome focus points in my opinion.&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 15px; margin-left: 0px; line-height: 16px; &quot;&gt;Netbooks are a growing market, but have limited performance so a lightweight security solution is going to help keep them performing well while remaining protected. Performance of any security solution is always key and most vendors have come a long way with their latest solutions, for example, &lt;a href=&quot;http://www.geek.com/articles/chips/review-norton-internet-security-2009-not-ready-2008101/&quot; style=&quot;color: rgb(9, 43, 137); text-decoration: none; cursor: pointer; &quot;&gt;Norton 2009 was a vast improvement&lt;/a&gt; over earlier editions.&lt;/p&gt;&lt;p style=&quot;text-align: justify;padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 15px; margin-left: 0px; line-height: 16px; &quot;&gt;Cloud computing is still relatively new in terms of providing protection, but it is clearly a growing trend. Signature-based solutions alone are just not going to be good enough in the future and an online database and constant update/checking system is going to be key over the next few years.&lt;/p&gt;&lt;p style=&quot;text-align: justify;padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 15px; margin-left: 0px; line-height: 16px; &quot;&gt;Panda’s latest products seem to offer everything you need, but it looks like you need to buy at least Internet Security 2010 if you don’t want to rely on other security software as well. I don’t appreciate them charging extra for a three PC license though and I hope they revise that so the one PC license price becomes the three PC license price.&lt;/p&gt;&lt;p style=&quot;text-align: justify;padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 15px; margin-left: 0px; line-height: 16px; &quot;&gt;Source:&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px; &quot;&gt;&lt;a href=&quot;http://www.geek.com/articles/news/panda-security-unveils-2010-line-up-and-80-performance-gains-20090626/&quot;&gt;http://www.geek.com/articles/news/panda-security-unveils-2010-line-up-and-80-performance-gains-20090626/&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;/span&gt;</description><link>http://topavn.blogspot.com/2009/09/panda-security-unveils-2010-line-up-and.html</link><author>noreply@blogger.com (TOPGUN)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiq3QKjUUMLURTRZl7XEMPFz7jIjRsTEZvP-I9KnDczyJI1fLet8qCf1nLwwIRYjd23gEFX26Jtl6UwwzvpfkVL4qJBKdFKEdW2Vpg2HdeI5mWJdjc4wbbo75AyDZMOqLv9oQ3WkWP44LnM/s72-c/panda_globalprotection_xl.gif" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5129907773329456318.post-5016806976585407594</guid><pubDate>Mon, 14 Sep 2009 16:29:00 +0000</pubDate><atom:updated>2009-09-14T09:34:34.396-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">3. AVG 8</category><title>AVG decides iTunes is a virus</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;    style=&quot;font-family:arial;font-size:100%;color:#333333;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px; line-height: 16px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;    style=&quot;font-family:Georgia;font-size:130%;color:#000000;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 16px; line-height: normal;&quot;&gt;&lt;img src=&quot;http://www.geek.com/wp-content/uploads/2009/07/avg_logo.png&quot; alt=&quot;avg_logo&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;    style=&quot;font-family:arial;font-size:100%;color:#333333;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px; line-height: 16px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;    style=&quot;font-family:Georgia;font-size:130%;color:#000000;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 16px; line-height: normal;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial; color: rgb(51, 51, 51); font-size: 13px; line-height: 16px; &quot;&gt;If you are a user of AVG and iTunes then you might have had an issue over the weekend. An update to the AVG antivirus database was released on Friday, but for some reason it made AVG view some of the files used by iTunes as malicious&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot;    style=&quot;font-family:arial;font-size:100%;color:#333333;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px; line-height: 16px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px; &quot;&gt;&lt;blockquote&gt;&lt;p style=&quot;text-align: justify;padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 15px; margin-left: 0px; line-height: 16px; &quot;&gt;&lt;em&gt;I just woke my computer (Windows Vista, AVG 8.5) from standby, plugged in my iPod Touch, and it complains that one of the iTunes DLLs is infected with the “Small.BOG” Trojan.&lt;/em&gt;&lt;/p&gt;&lt;em&gt;&lt;/em&gt;&lt;p style=&quot;text-align: justify;padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 15px; margin-left: 0px; line-height: 16px; &quot;&gt;&lt;em&gt;I hit “Heal” and all was well. iTunes wouldn’t run, obviously. So I downloaded and ran up the latest iTunes installer to repair the installation, and got “Multiple threat detection” and a list of all of the iTunes Localisation dlls.&lt;/em&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;p style=&quot;text-align: justify;padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 15px; margin-left: 0px; line-height: 16px; &quot;&gt;A similar thread also appeared on the &lt;a href=&quot;http://discussions.apple.com/thread.jspa?threadID=2092831&quot; style=&quot;color: rgb(9, 43, 137); text-decoration: none; cursor: pointer; &quot;&gt;Apple forums&lt;/a&gt; as the number of users experiencing the problem started to grow. AVG reacted quickly though, admitted it was a false alarm, and issued a “&lt;a href=&quot;http://www.avg.com.au/index.cfm?section=support&amp;amp;action=tech_bulletins&amp;amp;feature=179&quot; style=&quot;color: rgb(9, 43, 137); text-decoration: none; cursor: pointer; &quot;&gt;How to fix&lt;/a&gt;” bulletin on Saturday. Anyone suffering with this problem can take the following steps to solve the issue:&lt;/p&gt;&lt;ul&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;Update AVG&lt;/li&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;If iTunes does not work after that open the AVG user interface.&lt;/li&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;Choose “Virus Vault” option from the “History” menu.&lt;/li&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;Locate the iTunes file that was incorrectly removed and select it (one click).&lt;/li&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;Click on the “Restore” button.&lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Source:&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: rgb(0, 0, 0); font-family: Georgia; font-size: 16px; line-height: normal; &quot;&gt;&lt;a href=&quot;http://www.geek.com/articles/apple/avg-decides-itunes-is-a-virus-20090728/&quot;&gt;http://www.geek.com/articles/apple/avg-decides-itunes-is-a-virus-20090728/&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</description><link>http://topavn.blogspot.com/2009/09/avg-decides-itunes-is-virus.html</link><author>noreply@blogger.com (TOPGUN)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5129907773329456318.post-202670600069262586</guid><pubDate>Sun, 06 Sep 2009 04:57:00 +0000</pubDate><atom:updated>2009-09-05T22:00:31.221-07:00</atom:updated><title>Autorun Virus Remover 2.3 build 1006</title><description>&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial; color: rgb(53, 53, 53); font-size: 12px; line-height: 19px; &quot;&gt;&lt;div class=&quot;downloadNow&quot; style=&quot;margin-top: 20px; margin-right: 0pt; margin-bottom: 20px; margin-left: 0pt; padding-top: 0pt; padding-right: 10px; padding-bottom: 0px; padding-left: 0pt; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; font-weight: normal; font-style: normal; font-size: 18px; font-family: Georgia, &#39;Times New Roman&#39;, Times, serif; text-align: left; vertical-align: top; font-variant: normal; line-height: normal; width: 340px; float: left; &quot;&gt;&lt;a href=&quot;http://dw.com.com/redir?edId=3&amp;amp;siteId=4&amp;amp;oId=3000-2239_4-10855225&amp;amp;ontId=2239_4&amp;amp;spi=3ace8bcd0982eee93c782897f8ad130f&amp;amp;lop=btn&amp;amp;ltype=dl_dlnow&amp;amp;pid=10892036&amp;amp;mfgId=6309546&amp;amp;merId=6309546&amp;amp;pguid=kPfQ7woPjAQAAGChM7IAAAAD&amp;amp;destUrl=http%3A%2F%2Fdownload.cnet.com%2F3001-2239_4-10855225.html%3Fspi%3D3ace8bcd0982eee93c782897f8ad130f&quot; class=&quot;dlNowIcon&quot; style=&quot;text-align: justify;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; font-weight: inherit; font-style: inherit; font-size: 18px; font-family: inherit; vertical-align: baseline; color: rgb(30, 91, 126); text-decoration: none; cursor: pointer; float: left; &quot;&gt;&lt;img src=&quot;http://i.i.com.com/cnwk.1d/i/tron/download/dlNowGrn.gif&quot; style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; font-weight: inherit; font-style: inherit; font-size: 18px; font-family: inherit; text-align: left; vertical-align: baseline; border-style: initial; border-color: initial; border-style: initial; border-color: initial; &quot; /&gt;&lt;/a&gt;&lt;div class=&quot;dlText&quot; style=&quot;text-align: justify;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; font-weight: inherit; font-style: inherit; font-size: 18px; font-family: inherit; vertical-align: baseline; &quot;&gt;&lt;a href=&quot;http://dw.com.com/redir?edId=3&amp;amp;siteId=4&amp;amp;oId=3000-2239_4-10855225&amp;amp;ontId=2239_4&amp;amp;spi=3ace8bcd0982eee93c782897f8ad130f&amp;amp;lop=link&amp;amp;ltype=dl_dlnow&amp;amp;pid=10892036&amp;amp;mfgId=6309546&amp;amp;merId=6309546&amp;amp;pguid=kPfQ7woPjAQAAGChM7IAAAAD&amp;amp;destUrl=http%3A%2F%2Fdownload.cnet.com%2F3001-2239_4-10855225.html%3Fspi%3D3ace8bcd0982eee93c782897f8ad130f&quot; style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 10px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; font-weight: inherit; font-style: inherit; font-size: 26px; font-family: inherit; text-align: left; vertical-align: baseline; color: rgb(30, 91, 126); text-decoration: none; cursor: pointer; &quot;&gt;Download Now &lt;/a&gt;(1.13MB)&lt;/div&gt;&lt;span style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 2px; padding-right: 6px; padding-bottom: 2px; padding-left: 11px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; font-weight: bold; font-style: inherit; font-size: 12px; font-family: Arial, sans-serif; text-align: left; vertical-align: baseline; &quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia; font-size: 18px; font-weight: normal; &quot;&gt;&lt;span style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 2px; padding-right: 6px; padding-bottom: 2px; padding-left: 11px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; font-weight: bold; font-style: inherit; font-size: 12px; font-family: Arial, sans-serif; text-align: left; vertical-align: baseline; &quot;&gt;Tested spyware free&lt;/span&gt; &lt;a href=&quot;http://www.cnet.com/1991-13403_1-6722508-4.html&quot; class=&quot;toolTipElement&quot; style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; font-weight: inherit; font-style: inherit; font-size: 18px; font-family: inherit; text-align: left; vertical-align: baseline; color: rgb(30, 91, 126); text-decoration: none; cursor: pointer; &quot;&gt;&lt;img src=&quot;http://i.i.com.com/cnwk.1d/i/tron/icon/info12.gif&quot; style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; font-weight: inherit; font-style: inherit; font-size: 18px; font-family: inherit; text-align: left; vertical-align: baseline; border-style: initial; border-color: initial; border-style: initial; border-color: initial; &quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;/span&gt;&lt;/div&gt;&lt;h2 style=&quot;text-align: justify;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 2px; padding-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 2px; border-left-width: 0px; border-style: initial; border-color: initial; font-weight: normal; font-style: inherit; font-size: 18px; font-family: Georgia, &#39;Times New Roman&#39;, Times, serif; vertical-align: baseline; color: rgb(23, 23, 23); display: block; background-image: initial; background-repeat: initial; background-attachment: initial; -webkit-background-clip: initial; -webkit-background-origin: initial; background-color: transparent; border-bottom-style: solid; border-bottom-color: rgb(63, 149, 8); &quot;&gt;&lt;span style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 5px; padding-bottom: 0px; padding-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; font-weight: inherit; font-style: inherit; font-size: 18px; font-family: inherit; text-align: left; vertical-align: baseline; &quot;&gt;Publisher&#39;s description&lt;/span&gt;&lt;/h2&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;From &lt;a href=&quot;http://download.cnet.com/windows/autorunremover/3260-20_4-6309546.html&quot; style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; font-weight: inherit; font-style: inherit; font-size: 12px; font-family: inherit; text-align: left; vertical-align: baseline; color: rgb(30, 91, 126); text-decoration: none; cursor: pointer; &quot;&gt;AutorunRemover&lt;/a&gt; :&lt;/div&gt;&lt;p style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 17px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; font-weight: inherit; font-style: inherit; font-size: 12px; font-family: inherit; text-align: left; vertical-align: baseline; line-height: 19px; width: auto; &quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;margin-top: 0px; margin-right: 0px; margin-bottom: 17px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; font-weight: inherit; font-style: inherit; font-size: 12px; font-family: inherit; vertical-align: baseline; line-height: 19px; width: auto; &quot;&gt;Autorun Virus Remover provides protection against any malicious programs trying to attack via USB drive. When a USB device is inserted into your computer, Autorun Virus Remover will automatically scan it, block and delete autorun virus, trojans, and malicious code. Also, it can detect and remove USB virus such as autorun.inf virus in your computer.&lt;/p&gt;&lt;p style=&quot;text-align: justify;margin-top: 0px; margin-right: 0px; margin-bottom: 17px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; font-weight: inherit; font-style: inherit; font-size: 12px; font-family: inherit; vertical-align: baseline; line-height: 19px; width: auto; &quot;&gt;Autorun Virus Remover can also remove the autorun virus due to which you can&#39;t open your hard disk and USB drive (Pen drive, Memory card) by double clicking. Autorun Virus Remover USB antivirus software to permanently protect offline computer against any USB virus without the need for signature updates. This light and easy to use solution is compatible with all software and doesn&#39;t slow down your computer at all. Version 2.3 build 1006 includes unspecified updates.&lt;/p&gt;&lt;p style=&quot;text-align: justify;margin-top: 0px; margin-right: 0px; margin-bottom: 17px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; font-weight: inherit; font-style: inherit; font-size: 12px; font-family: inherit; vertical-align: baseline; line-height: 19px; width: auto; &quot;&gt;Source:&lt;a href=&quot;http://download.cnet.com/Autorun-Virus-Remover/3000-2239_4-10855225.html&quot;&gt;http://download.cnet.com/Autorun-Virus-Remover/3000-2239_4-10855225.html&lt;/a&gt;&lt;/p&gt;&lt;p style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 17px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; font-weight: inherit; font-style: inherit; font-size: 12px; font-family: inherit; text-align: left; vertical-align: baseline; line-height: 19px; width: auto; &quot;&gt;&lt;/p&gt;&lt;div id=&quot;ads_catDiv&quot; style=&quot;margin-top: 0px; margin-right: 10px; margin-bottom: 20px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; font-weight: inherit; font-style: inherit; font-size: 8pt; font-family: Verdana, Arial, Helvetica, sans-serif; text-align: left; vertical-align: baseline; color: rgb(68, 68, 68); width: 260px; float: left; &quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;http://i.i.com.com/cnwk.1d/Ads/common/spon-warrow.gif&quot; width=&quot;68&quot; height=&quot;10&quot; style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; font-weight: inherit; font-style: inherit; font-size: 11px; font-family: inherit; text-align: left; vertical-align: baseline; &quot; /&gt;&lt;/div&gt;&lt;div class=&quot;ads_catTitle&quot; style=&quot;text-align: justify;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; font-weight: inherit; font-style: inherit; font-size: 11px; font-family: inherit; vertical-align: baseline; font: normal normal bold 1em/normal Arial, Verdana, Helvetica, sans-serif; &quot;&gt;&lt;a href=&quot;http://adlog.com.com/adlog/c/r=13327&amp;amp;s=869255&amp;amp;o=20%3a2023%3a2239%3a&amp;amp;h=cn&amp;amp;p=2&amp;amp;b=6&amp;amp;l=en_US&amp;amp;site=4&amp;amp;pt=3000&amp;amp;nd=2239&amp;amp;pid=&amp;amp;cid=10892036&amp;amp;pp=100&amp;amp;e=3&amp;amp;rqid=00c18-ad-e124AA33A6D2E910&amp;amp;orh=&amp;amp;oepartner=&amp;amp;epartner=&amp;amp;ppartner=&amp;amp;pdom=&amp;amp;cpnmodule=&amp;amp;count=&amp;amp;ra=119.152.26.41&amp;amp;pg=kPfQ7woPjAQAAGChM7IAAAAD&amp;amp;t=2009.09.06.04.57.12/http://download.cnet.com/F-Secure-Internet-Security/3000-18510_4-10205368.html?part=s-cs&quot; target=&quot;_top&quot; style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; font-weight: inherit; font-style: inherit; font-size: 11px; font-family: inherit; text-align: left; vertical-align: baseline; color: rgb(0, 102, 204); text-decoration: none; cursor: pointer; &quot;&gt;F-Secure Internet Security&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;ads_catCopy&quot; style=&quot;text-align: justify;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; font-weight: inherit; font-style: inherit; font-size: 11px; font-family: inherit; vertical-align: baseline; font: normal normal normal 1em/normal Arial, Verdana, Helvetica, sans-serif; &quot;&gt;Complete and easy-to-use internet security software for your PC.&lt;/div&gt;&lt;div class=&quot;ads_catURLLink&quot; style=&quot;text-align: justify;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 1px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; font-weight: normal; font-style: inherit; font-size: 11px; font-family: inherit; vertical-align: baseline; background-image: url(http://i.i.com.com/cnwk.1d/Ads/common/CatSpot/shuttleCock11x11.gif); background-repeat: no-repeat; background-attachment: initial; -webkit-background-clip: initial; -webkit-background-origin: initial; background-color: initial; background-position: 0% 50%; &quot;&gt;&lt;a href=&quot;http://adlog.com.com/adlog/c/r=13327&amp;amp;s=869255&amp;amp;o=20%3a2023%3a2239%3a&amp;amp;h=cn&amp;amp;p=2&amp;amp;b=6&amp;amp;l=en_US&amp;amp;site=4&amp;amp;pt=3000&amp;amp;nd=2239&amp;amp;pid=&amp;amp;cid=10892036&amp;amp;pp=100&amp;amp;e=3&amp;amp;rqid=00c18-ad-e124AA33A6D2E910&amp;amp;orh=&amp;amp;oepartner=&amp;amp;epartner=&amp;amp;ppartner=&amp;amp;pdom=&amp;amp;cpnmodule=&amp;amp;count=&amp;amp;ra=119.152.26.41&amp;amp;pg=kPfQ7woPjAQAAGChM7IAAAAD&amp;amp;t=2009.09.06.04.57.12/http://download.cnet.com/F-Secure-Internet-Security/3000-18510_4-10205368.html?part=s-cs&quot; target=&quot;_top&quot; style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 17px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; font-weight: inherit; font-style: inherit; font-size: 11px; font-family: inherit; text-align: left; vertical-align: baseline; color: rgb(0, 102, 204); text-decoration: none; cursor: pointer; &quot;&gt;Download Now&lt;/a&gt;  &lt;/div&gt;&lt;/div&gt;&lt;/span&gt;</description><link>http://topavn.blogspot.com/2009/09/autorun-virus-remover-23-build-1006.html</link><author>noreply@blogger.com (TOPGUN)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5129907773329456318.post-1714562771257803924</guid><pubDate>Thu, 03 Sep 2009 10:12:00 +0000</pubDate><atom:updated>2009-09-03T03:15:55.861-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">AntiVirus for MAC</category><title>About iantivirus for MAC</title><description>&lt;img src=&quot;http://www.iantivirus.com/res/images/logo.gif&quot; /&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial; color: rgb(68, 68, 68); font-size: 24px; font-weight: bold; -webkit-border-horizontal-spacing: 10px; -webkit-border-vertical-spacing: 10px; &quot;&gt;About&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial; color: rgb(68, 68, 68); font-size: 12px; -webkit-border-horizontal-spacing: 10px; -webkit-border-vertical-spacing: 10px; &quot;&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:georgia;&quot;&gt;Introduction&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:georgia;&quot;&gt;With PC Tools iAntiVirus™ you are protected against the most nefarious cyber-threats attempting to gain access to your Mac and personal information.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:georgia;&quot;&gt;Once your computer has been infected, a virus or worm will usually attempt to spread itself to your friends, family and associates by accessing your email contacts and networked PCs. The infection may also allow hackers to access files on your Mac, use it to launch attacks against other computers and websites or to send mass SPAM email.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:georgia;&quot;&gt;PC Tools iAntiVirus™ provides real-time protection and comprehensive system scanning to ensure your Mac remains safe and virus free.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:georgia;&quot;&gt;Protection against Mac specific threats&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:georgia;&quot;&gt;The iAntiVirus™ database has been designed from the ground up to detect and remove Mac specific threats. This enables a high level of protection whilst keeping memory footprint and resource usage at a minimum. The iAntiVirus™ database is not cluttered with signatures for Windows specific threats which your Mac is immune against.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:georgia;&quot;&gt;Simple to use&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:georgia;&quot;&gt;iAntiVirus™ has been designed with the user in mind. The user interface is purely functional, making it simple to scan for, remove and manage infections.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;   style=&quot;font-family:georgia;font-size:100%;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial; font-size: 12px; &quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;span class=&quot;Apple-style-span&quot;   style=&quot;font-family:georgia;font-size:100%;&quot;&gt;&lt;h1&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Features&lt;/span&gt;&lt;/h1&gt;&lt;p&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;A variety of scan options&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;You may perform a variety of scan types using iAntiVirus™, this allows you to strike a balance between the time taken to complete a scan, and its thoroughness.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Real-time protection&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;IntelliGuard protects your Mac against infections in real time. Whenever an infection is detected and blocked, an alert is displayed below the system menu bar. IntelliGuard automatically places detected infections in quarantine, works silently in the background and uses minimal system resources.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Quarantine&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;iAntiVirus™ quarantines all detected infections, allowing you to easily view and restore items in the case of a false positive (for example: when scanning with engine heuristics set to high).&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Automatic Smart Updates&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Frequent updates to detect and guard computers against new threats and viruses as well as provide enhancements to iAntiVirus™ are automatically installed and downloaded through the Smart Update function. Threat signatures are updated within hours of a high risk malware outbreak to protect you from the latest online threats.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Low resource usage&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;When in monitoring mode iAntiVirus™ has been designed to work silently in the background, threats are blocked and removed without any system impact, while only a small alert window is displayed to advise you that your Mac has been protected against an attack.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-size:100%;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;Source:&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 12px; &quot;&gt;&lt;a href=&quot;http://www.apple.com/downloads/macosx/networking_security/avastantivirusmacedition.html&quot;&gt;http://www.apple.com/downloads/macosx/networking_security/avastantivirusmacedition.html&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot;   style=&quot;font-family:georgia;font-size:100%;&quot;&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;/div&gt;</description><link>http://topavn.blogspot.com/2009/09/about-iantivirus-for-mac.html</link><author>noreply@blogger.com (TOPGUN)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5129907773329456318.post-1316713103327260291</guid><pubDate>Thu, 03 Sep 2009 09:55:00 +0000</pubDate><atom:updated>2009-09-03T03:04:25.712-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Avast</category><title>avast! antivirus Mac Edition 2.74</title><description>&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Lucida Grande&#39;; color: rgb(85, 85, 85); font-size: 12px; line-height: 18px; &quot;&gt;&lt;div class=&quot;column first&quot; style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 11px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; float: left; width: 220px; &quot;&gt;&lt;p style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 18px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; &quot;&gt;&lt;b style=&quot;font-weight: bold; &quot;&gt;About avast! antivirus Mac Edition&lt;/b&gt;&lt;br /&gt;The avast! multi-award winning technology is now available on the Mac platform to protect both your Mac and your Windows PC using friends and co-workers from the lastest malware threats.&lt;br /&gt;&lt;br /&gt;Winner of both the European AND US best anti-virus product, as well as winning the European best anti-malware category outright in last year&#39;s coveted SC Awards, avast! technologies can now be deployed to make your Mac safer against the ever-increasing malware threats being deployed against the platform, and in stopping malware threats being passed on to PC&#39;s in your office, particularly more vunerable Microsoft OS platforms.&lt;/p&gt;&lt;p style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 18px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; &quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 18px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; &quot;&gt;Source:&lt;a href=&quot;http://www.apple.com/downloads/macosx/networking_security/avastantivirusmacedition.html&quot;&gt;http://www.apple.com/downloads/macosx/networking_security/avastantivirusmacedition.html&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;div class=&quot;column last&quot; style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 11px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; float: right !important; width: 300px; &quot;&gt;&lt;img src=&quot;http://images.apple.com/downloads/macosx/networking_security/images/avastantivirusmacedition_20080102171214.jpg&quot; alt=&quot;avast! antivirus Mac Edition&quot; width=&quot;300&quot; height=&quot;103&quot; border=&quot;0&quot; class=&quot;across&quot; style=&quot;border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; margin-top: 2px; margin-right: 0px; margin-bottom: 16px; margin-left: 0px; &quot; /&gt;&lt;div class=&quot;sysreq macuniv&quot; style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 1.4em; margin-left: 0px; padding-top: 0px; padding-right: 120px; padding-bottom: 0px; padding-left: 0px; font-size: 11px; overflow-x: hidden; overflow-y: hidden; min-height: 70px; background-image: url(http://www.apple.com/downloads/images/mac+universal20070611.gif); background-repeat: no-repeat; background-attachment: initial; -webkit-background-clip: initial; -webkit-background-origin: initial; background-color: initial; background-position: 100% 0px; &quot;&gt;&lt;h4 style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-size: 1em; font-weight: bold; font-style: normal; line-height: 18px; color: rgb(85, 85, 85); &quot;&gt;System Requirements&lt;/h4&gt;&lt;ul style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; list-style-type: none; list-style-position: outside; list-style-image: initial; &quot;&gt;&lt;li style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0.2em; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; &quot;&gt;Mac OS X 10.5 or later&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div class=&quot;details&quot; style=&quot;margin-top: 0px; margin-right: -1px; margin-bottom: 1.8em; margin-left: -1px; padding-top: 0px; padding-right: 1px; padding-bottom: 0px; padding-left: 1px; font-size: 11px; border-bottom-width: 1px; border-bottom-style: solid; border-bottom-color: rgb(229, 229, 229); &quot;&gt;&lt;h4 style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-size: 1em; font-weight: bold; font-style: normal; line-height: 18px; color: rgb(85, 85, 85); &quot;&gt;Download Details&lt;/h4&gt;&lt;dl style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; display: inline; &quot;&gt;&lt;dt style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: -1px; padding-top: 0.5em; padding-right: 0px; padding-bottom: 0px; padding-left: 1px; float: left; border-top-width: 1px; border-top-style: solid; border-top-color: rgb(229, 229, 229); clear: left; width: 90px; &quot;&gt;Company:&lt;/dt&gt;&lt;dd style=&quot;margin-top: 0px; margin-right: -1px; margin-bottom: 0px; margin-left: 0px; padding-top: 0.5em; padding-right: 1px; padding-bottom: 0px; padding-left: 0px; float: left; border-top-width: 1px; border-top-style: solid; border-top-color: rgb(229, 229, 229); width: 210px; text-align: right; &quot;&gt;&lt;a href=&quot;http://www.avast.com/&quot; onclick=&quot;s_objectID=&amp;quot;http://www.avast.com/_1&amp;quot;;return this.s_oc?this.s_oc(e):true&quot; style=&quot;color: rgb(0, 136, 204); text-decoration: none; &quot;&gt;ALWIL Software&lt;/a&gt;&lt;/dd&gt;&lt;dt style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: -1px; padding-top: 0.5em; padding-right: 0px; padding-bottom: 0px; padding-left: 1px; float: left; border-top-width: 1px; border-top-style: solid; border-top-color: rgb(229, 229, 229); clear: left; width: 90px; &quot;&gt;Version:&lt;/dt&gt;&lt;dd style=&quot;margin-top: 0px; margin-right: -1px; margin-bottom: 0px; margin-left: 0px; padding-top: 0.5em; padding-right: 1px; padding-bottom: 0px; padding-left: 0px; float: left; border-top-width: 1px; border-top-style: solid; border-top-color: rgb(229, 229, 229); width: 210px; text-align: right; &quot;&gt;2.74&lt;/dd&gt;&lt;dt style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: -1px; padding-top: 0.5em; padding-right: 0px; padding-bottom: 0px; padding-left: 1px; float: left; border-top-width: 1px; border-top-style: solid; border-top-color: rgb(229, 229, 229); clear: left; width: 90px; &quot;&gt;Post Date:&lt;/dt&gt;&lt;dd style=&quot;margin-top: 0px; margin-right: -1px; margin-bottom: 0px; margin-left: 0px; padding-top: 0.5em; padding-right: 1px; padding-bottom: 0px; padding-left: 0px; float: left; border-top-width: 1px; border-top-style: solid; border-top-color: rgb(229, 229, 229); width: 210px; text-align: right; &quot;&gt;January 2, 2008&lt;/dd&gt;&lt;dt style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: -1px; padding-top: 0.5em; padding-right: 0px; padding-bottom: 0px; padding-left: 1px; float: left; border-top-width: 1px; border-top-style: solid; border-top-color: rgb(229, 229, 229); clear: left; width: 90px; &quot;&gt;License:&lt;/dt&gt;&lt;dd style=&quot;margin-top: 0px; margin-right: -1px; margin-bottom: 0px; margin-left: 0px; padding-top: 0.5em; padding-right: 1px; padding-bottom: 0px; padding-left: 0px; float: left; border-top-width: 1px; border-top-style: solid; border-top-color: rgb(229, 229, 229); width: 210px; text-align: right; &quot;&gt;Demo&lt;/dd&gt;&lt;dt style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: -1px; padding-top: 0.5em; padding-right: 0px; padding-bottom: 0px; padding-left: 1px; float: left; border-top-width: 1px; border-top-style: solid; border-top-color: rgb(229, 229, 229); clear: left; width: 90px; &quot;&gt;File Size:&lt;/dt&gt;&lt;dd style=&quot;margin-top: 0px; margin-right: -1px; margin-bottom: 0px; margin-left: 0px; padding-top: 0.5em; padding-right: 1px; padding-bottom: 0px; padding-left: 0px; float: left; border-top-width: 1px; border-top-style: solid; border-top-color: rgb(229, 229, 229); width: 210px; text-align: right; &quot;&gt;12MB&lt;/dd&gt;&lt;dt style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: -1px; padding-top: 0.5em; padding-right: 0px; padding-bottom: 0px; padding-left: 1px; float: left; border-top-width: 1px; border-top-style: solid; border-top-color: rgb(229, 229, 229); clear: left; width: 90px; &quot;&gt;URL Type:&lt;/dt&gt;&lt;dd style=&quot;margin-top: 0px; margin-right: -1px; margin-bottom: 0px; margin-left: 0px; padding-top: 0.5em; padding-right: 1px; padding-bottom: 0px; padding-left: 0px; float: left; border-top-width: 1px; border-top-style: solid; border-top-color: rgb(229, 229, 229); width: 210px; text-align: right; &quot;&gt;Download&lt;/dd&gt;&lt;dt style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: -1px; padding-top: 0.5em; padding-right: 0px; padding-bottom: 0px; padding-left: 1px; float: left; border-top-width: 1px; border-top-style: solid; border-top-color: rgb(229, 229, 229); clear: left; width: 90px; &quot;&gt;Download ID:&lt;/dt&gt;&lt;dd style=&quot;margin-top: 0px; margin-right: -1px; margin-bottom: 0px; margin-left: 0px; padding-top: 0.5em; padding-right: 1px; padding-bottom: 0px; padding-left: 0px; float: left; border-top-width: 1px; border-top-style: solid; border-top-color: rgb(229, 229, 229); width: 210px; text-align: right; &quot;&gt;16744&lt;/dd&gt;&lt;/dl&gt;&lt;div class=&quot;clearer&quot; style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; clear: both; display: block; height: 0px; line-height: 1px; font-size: 1px; &quot;&gt; &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/span&gt;</description><link>http://topavn.blogspot.com/2009/09/avast-antivirus-mac-edition-274.html</link><author>noreply@blogger.com (TOPGUN)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5129907773329456318.post-1916425840885303348</guid><pubDate>Sun, 23 Aug 2009 10:47:00 +0000</pubDate><atom:updated>2009-08-23T03:48:00.802-07:00</atom:updated><title>What is spoofing?</title><description>&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial; -webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px; &quot;&gt;&lt;p class=&quot;content&quot; style=&quot;text-align: justify;margin-top: 0px; margin-right: 0px; margin-bottom: 15px; margin-left: 0px; &quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:verdana;&quot;&gt;If you are receiving bounce back messages from emails that you HAVEN&#39;T sent you have probably been &#39;spoofed&#39;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;content&quot; style=&quot;text-align: justify;margin-top: 0px; margin-right: 0px; margin-bottom: 15px; margin-left: 0px; &quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:verdana;&quot;&gt;Email spoofing is when the sender changes the name in an outgoing email so that it looks like the email came from somewhere or someone else. This practice is often used by spammers to stop people finding out who they are. It also means that when the spam mail is rejected by the addressee&#39;s mail server, the bounce back message goes to whoever was specified in the outgoing mail rather than to the spammer themselves.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;content&quot; style=&quot;text-align: justify;margin-top: 0px; margin-right: 0px; margin-bottom: 15px; margin-left: 0px; &quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:verdana;&quot;&gt;At present there is nothing we can do to avoid this nuisance. If you have been spoofed, please simply delete the bounce back messages. It doesn&#39;t mean that anyone has accessed your email account. You will probably find you receive a few for a short while and then they will stop.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;content&quot; style=&quot;text-align: justify;margin-top: 0px; margin-right: 0px; margin-bottom: 15px; margin-left: 0px; &quot;&gt;&lt;span class=&quot;Apple-style-span&quot;   style=&quot;font-family:verdana;font-size:100%;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;Source: &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial; font-size: 16px; &quot;&gt;&lt;a href=&quot;http://www.inf.aber.ac.uk/advisory/faq/133/&quot;&gt;http://www.inf.aber.ac.uk/advisory/faq/133/&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/span&gt;</description><link>http://topavn.blogspot.com/2009/08/what-is-spoofing.html</link><author>noreply@blogger.com (TOPGUN)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5129907773329456318.post-4772253667763452573</guid><pubDate>Sun, 23 Aug 2009 10:43:00 +0000</pubDate><atom:updated>2009-08-23T03:44:09.470-07:00</atom:updated><title>Virus-writing hackers are biggest threat</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:verdana;&quot;&gt;We&#39;re in trouble when the two meet - &quot;It isn&#39;t rocket science,&quot; says expert&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:verdana;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial; &quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-size:100%;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:verdana;&quot;&gt;Hackers who crossover into virus writing territory present the biggest danger to corporate computer systems as they perfect the &#39;blended threat&#39; seen in recent virus outbreaks such as Sobig. &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:verdana;&quot;&gt;That&#39;s the assertion of Sarah Gordon, senior research fellow at Symantec Security Response, who has worked with the White House and the FBI to research the psychological profile of hackers and virus writers. &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:verdana;&quot;&gt;Gordon told silicon.com that hackers are driven by the motivation to complete a technology challenge and are usually not interested in the basic task of writing viruses and worms. &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:verdana;&quot;&gt;&quot;There are people in the virus writing community who hack and people in the hacking community who write viruses but for the most part they are very separate communities. The virus writers are seen at the lower end of the food chain,&quot; she said. &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:verdana;&quot;&gt;But Gordon warned that creating a virus such as Sobig or Bugbear, only with much more damaging payloads, is well within the capabilities of even the most inexperienced hacker. &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:verdana;&quot;&gt;&quot;Many of the threats are the result of the crossover between hackers and virus writers. Erasing a hard drive is a couple of key strokes. It isn&#39;t rocket science. A hacker of any skill level could write a self-replicating program but most find it too boring,&quot; she said. &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:verdana;&quot;&gt;And it seems the traditional stereotype of a spotty teenager hacking away in a dark bedroom is nothing more than a myth from the movies. &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:verdana;&quot;&gt;&quot;The population is diverse. It just takes the ability to manipulate a computer system. It is not guys sat in a basement with piercings everywhere. It could be the 50-year-old accountant because she is bored, or the boss&#39; 15-year-old daughter, or your 9-year-old nephew,&quot; she said. &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:verdana;&quot;&gt;There is also a distinct difference between hackers and virus writers, according to Gordon&#39;s research. &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:verdana;&quot;&gt;&quot;Virus writers have normal relationships with peers and families. Hackers tend to be more introverted. Hacking is a very personal thing. One is power and control and the other is letting go.&quot; &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:verdana;&quot;&gt;Although Gordon works for a security software company, she says &#39;ethics&#39; education at an early age would help prevent children and teenagers using their computer knowledge to cause damage. &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:verdana;&quot;&gt;&quot;One thing that is important is introducing ethics in technology at an early age. On the computer there is less context and security. Teaching them that there&#39;s a person on the end of that modem is important,&quot; she said &lt;/span&gt;&lt;/div&gt;&lt;/span&gt;&lt;/span&gt;</description><link>http://topavn.blogspot.com/2009/08/virus-writing-hackers-are-biggest.html</link><author>noreply@blogger.com (TOPGUN)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5129907773329456318.post-905550946135816905</guid><pubDate>Sat, 22 Aug 2009 10:13:00 +0000</pubDate><atom:updated>2009-08-22T03:17:15.407-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Most Dangerous Viruses</category><title>The World&#39;s Most Dangerous Virus</title><description>&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial; color: rgb(51, 51, 51); font-size: 12px; &quot;&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:verdana;&quot;&gt;&lt;b&gt;The World&#39;s Most Dangerous Virus: by Michael Robertson&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:verdana;&quot;&gt;Imagine if a computer virus emerged that secretly attached itself to one of the most popular software programs ever. Imagine if the largest media outlets unwittingly praised this secret pairing, encouraging millions of people to install it. Imagine if none of the major antivirus programs would detect it. Imagine if once installed, it could alter anything on your computer without your consent or knowledge. Imagine if the virus was at the control of a greedy entity that has repeatedly trampled on consumers and smaller companies to advance its corporate agenda. Imagine if it could force everyone who wanted to communicate with you to also carry the virus so it would insidiously spread person to person. Sound like a scary sci-fi plot? It&#39;s not science fiction. This week MO3 will be released on the world. Here&#39;s how to detect it in your neighborhood and what you can do to protect yourself&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana; font-size: 13px; font-weight: bold; &quot;&gt;The Trojan Horse&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:verdana;&quot;&gt;Press outlets will blanket the world with stories about Microsoft Office 2003. Most articles will tout seemingly innocuous features and feel good quotes from Microsoft like &quot;this is our most important product release ever.&quot; Unfortunately the press won&#39;t talk about the dangerous software buried inside this release - MO3. This code will give Microsoft the ability to change anything on your computer at anytime they wish with no notification to you.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:verdana;&quot;&gt;&lt;b&gt;The Security Ploy&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:verdana;&quot;&gt;Post 9/11, few people question actions taken under the guise of &quot;improved security&quot; and this is how MO3 will be foisted onto computer users - as a feature to &#39;make you safer.&#39; Computer users have understandably tired of the near daily worm and virus warnings, as well as the time-consuming patch process due to Microsoft&#39;s lax software standards and its focusing not on building secure products, but products that secure its monopoly market positions. To improve the predicament which they&#39;ve created, Microsoft is forcing consumers to accept MO3 embedded into every computer. Listen closely and you&#39;ll hear Microsoft mouth pieces speak of &quot;turning software into a service&quot; which really means they will be changing the software on your computer whenever they feel like it. They will slowly limit your ability to run non-Microsoft software. They will restrict choices on your computer to only those products they approve. They will make changes which cripple other software programs or reduce their ability to interoperate with your computer so you will be forced to use exclusively Microsoft approved products.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:verdana;&quot;&gt;&lt;b&gt;History Repeats Itself&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:verdana;&quot;&gt;Microsoft may use this newfound power to fix some holes in their software, but they will also abuse this power to further their corporate monopoly and increase their control and profits. Microsoft has already embedded the MO3 virus into another operating system they have deployed, called Xbox. They now have the power at anytime to change all existing Xboxes which connect to the Internet, and they are already misusing it. They have deleted files from users&#39; computers without their knowledge or permission. They have added software which has removed the ability to run competitor&#39;s software. They have been changing users&#39; systems without their consent and notification. They will do the same on Microsoft Windows based computers once MO3 is installed.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:verdana;&quot;&gt;Microsoft management has shown to be deceitful and dishonest and will continue this behavior. Twice Microsoft has been found guilty by the Federal government of using illegal tactics to drive competitors out of business and extend their monopoly. December 1st, 2003 a trial will take place in Seattle Washington where more of Microsoft&#39;s past behaviors will come to light.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:verdana;&quot;&gt;&lt;b&gt;Infecting Friends&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px; &quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:verdana;&quot;&gt;Microsoft Word (.doc) file open in StarOffice 7 &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:verdana;&quot;&gt;To stop the advance of competing products and to force users into purchasing new software with the MO3 virus, Microsoft is making certain Microsoft Office 2003 files unreadable by all older versions of Microsoft Office and all competing office suites. Products like Sun&#39;s StarOffice are getting extremely good at interoperating with Microsoft word processing, presentation and spreadsheet files making it possible for people to spend close to $50 for an office suite instead of giving $400 or more to Microsoft. To blunt this and force users of older versions of Microsoft Office to buy new software, Microsoft has changed the specifications for some files.&lt;/span&gt;&lt;/div&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:verdana;&quot;&gt;Again under the umbrella of &quot;security,&quot; Microsoft is implementing features which limit who can open and edit documents to further thwart competition. Microsoft Office 2003 gives its users the ability to control who can read and edit certain documents, but only if they use the latest Microsoft software. If one user within an office uses this feature, all others will be unable to use any other office suite to access that document. They will not be permitted to run Linux software, they will be required to purchase and run additional copies of Microsoft Office 2003. Since documents are frequently emailed around via the Internet, this will force others to accept Microsoft&#39;s software or be unable to communicate. Microsoft refers to this as IRM for &quot;information rights management,&quot; but it&#39;s really an &quot;infection relay method&quot; designed to force everyone to adopt MO3. They will be using scare tactics about leaked memos or misdirected emails to persuade unwitting computer users to deploy this technology. Doing so will create a viral growth of MO3 which will give MS unlimited power over every computer.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:verdana;&quot;&gt;Universal MO3&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:verdana;&quot;&gt;MO3 will not only come with Microsoft Office 2003, but with future Microsoft products as well. The same technology will be embedded into the next version of Microsoft&#39;s operating system software so all users will have to accept it with their new computer. Latest estimates indicate this new software will not ship until 2006, so between now and then, watch for Microsoft to secretly embed MO3 into updates or security patches that they promote for their existing product line.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:verdana;&quot;&gt;&lt;b&gt;Protect Yourself&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px; &quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:verdana;&quot;&gt;Microsoft Excel (.xls) file open in StarOffice 7 &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:verdana;&quot;&gt;There are precautionary measures you can take to fend off MO3. First off, do not purchase and install Microsoft Office 2003. Also, discourage those around you from purchasing Microsoft Office as well, since one infection will quickly grow. If you need a new office suite, check out the solid and affordable StarOffice 7.0 which runs equally well on Microsoft Windows or Linux computers, and can be purchased online and immediately downloaded and installed. Encourage those penning articles and reviews to fully inform their readers of the dangers of Microsoft Office 2003. Finally, encourage them to do in-depth reviews of Microsoft Office 2003 vs. Sun&#39;s StarOffice 7.0 so people can make informed decisions about the benefits and risks of either product.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:verdana;&quot;&gt;Article Source: &lt;a href=&quot;www.auctionhints.com&quot;&gt;www.auctionhints.com&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;/span&gt;</description><link>http://topavn.blogspot.com/2009/08/worlds-most-dangerous-virus.html</link><author>noreply@blogger.com (TOPGUN)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5129907773329456318.post-2898306557830053865</guid><pubDate>Sat, 22 Aug 2009 10:05:00 +0000</pubDate><atom:updated>2009-08-22T03:13:11.172-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Most Dangerous Viruses</category><title>The Most Dangerous Computer Viruses in History</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhN3Ye41rGBoIjVyAk1gkemNNtEK0HZVm221ZkzrBjbTuH4QWCF9JQZTuM0dNNSmhEfk65kJcNBgVqYCqQZKLgWhCRmHT3iiLUiZMXWIdpujozsEwF8gaW3VmxX7GQH6dC6H_inDPnugpiR/s1600-h/computer-virus-alert.jpg&quot;&gt;&lt;img style=&quot;text-align: justify;float: left; margin-top: 0px; margin-right: 10px; margin-bottom: 10px; margin-left: 0px; cursor: pointer; width: 300px; height: 225px; &quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhN3Ye41rGBoIjVyAk1gkemNNtEK0HZVm221ZkzrBjbTuH4QWCF9JQZTuM0dNNSmhEfk65kJcNBgVqYCqQZKLgWhCRmHT3iiLUiZMXWIdpujozsEwF8gaW3VmxX7GQH6dC6H_inDPnugpiR/s320/computer-virus-alert.jpg&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5372728395319900690&quot; /&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana; font-size: 12px; line-height: 17px; &quot;&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;http://www.infoniac.com/computer-viruses.html&quot; style=&quot;color: rgb(0, 70, 140); &quot;&gt;&lt;strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Computer viruses&lt;/span&gt;&lt;/strong&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt; have a relatively short history by the damages caused by some of the most dangerous viruses pushed cyber-experts to open a chapter that includes a huge database on computer viruses and the cost of damages caused along with companies, government and universities highly affected by malware.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Here are some of the most dangerous computer viruses in history:&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Jerusalem - 1988&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;This is one of the first &lt;/span&gt;&lt;strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;MS-DOS&lt;/span&gt;&lt;/strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt; viruses in history that caused enormous destructions, affecting many countries, universities and company worldwide. On Friday 13, 1988 the computer virus managed to infect a number of institutions in Europe, America and the Middle East. The name was given to the virus after one of the first places that got &quot;acquainted&quot; with it - the &lt;/span&gt;&lt;strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Jerusalem University&lt;/span&gt;&lt;/strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Along with a number of other computer viruses, including &lt;/span&gt;&lt;strong&gt;&lt;em&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&quot;Cascade&quot;&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;, &lt;/span&gt;&lt;strong&gt;&lt;em&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&quot;Stoned&quot;&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;, &lt;/span&gt;&lt;strong&gt;&lt;em&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&quot;Vienna&quot;&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt; the Jerusalem virus managed to infect thousands of computers while still remaining unnoticed. Back then the &lt;/span&gt;&lt;a href=&quot;http://www.infoniac.com/search/index.html?q=antivirus+programs&amp;amp;cx=partner-pub-3262283838900528%3Aujk9fhos9r8&amp;amp;cof=FORID%3A10#1022&quot; style=&quot;color: rgb(0, 70, 140); &quot;&gt;&lt;strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;anti-virus programs&lt;/span&gt;&lt;/strong&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt; were not as advanced as they are today and a lot of users had little belief of the existence of computer viruses.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Morris (a.k.a. Internet Worm) - November 1988&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;This computer virus infected over 6,000 computer systems in the United States, including the famous&lt;/span&gt;&lt;strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;NASA research Institute&lt;/span&gt;&lt;/strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;, which for some time remained completely paralyzed. Due to erratic code, the worm managed to send millions of copies of itself to different network computers, being able to entirely paralyze all network resources. The damages caused by the Morris computer virus were estimated at $96 millions.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;To be able to spread the computer virus used errors in such operating systems as Unix for VAX and Sun Microsystems. There were a number of other interesting ideas used by the virus - for example it could pick user passwords.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Solar Sunrise - 1998&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;A decade later the situation didn&#39;t change, it might have gotten even got worse. Using a computer virus, hackers, in 1998, penetrated and took control of over 500 computers systems that belonged to the army, government and private sector of the United States. The whole situation was dubbed &lt;/span&gt;&lt;strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Solar Sunrise&lt;/span&gt;&lt;/strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt; after the popular vulnerabilities in computers that run on the operating system called Sun Solaris. Initially it was believed that the attacks were planed by the operatives in Iraq. It was later revealed that the incidents represented the work of two American teenagers from California. After the attacks, the Defense Department took drastic actions to prevent future incidents of this kind.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Melissa - 1999&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;For the first time computers got acknowledged with Melissa computer virus on March 26, 1999, when the virus shut down &lt;/span&gt;&lt;strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Internet mail system&lt;/span&gt;&lt;/strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;, which got blocked with e-mails infected by the worm. It is worth mentioning that at first Melissa was not meant to cause any harm, but after it overloaded servers the virus led to unpredictable problems. For the first time it spread in the &lt;/span&gt;&lt;strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Usenet&lt;/span&gt;&lt;/strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt; discussion group alt.sex. Melissa was hidden within a file called &lt;/span&gt;&lt;em&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&quot;List.DiC&quot;&lt;/span&gt;&lt;/em&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;, which featured passwords that served as keys to unlocking 80 pornographic websites. The original form of the virus was sent through e-mail to different users.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Melissa computer virus was developed by &lt;/span&gt;&lt;strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;David L. Smith&lt;/span&gt;&lt;/strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt; in Aberdeen Township, New Jersey. Its name comes from a lap dancer that the programmer got acknowledged with while in Florida. After being caught, the creator of the virus was sentenced to 20 months in federal prison and ordered to pay a fine of $5,000. The arrest represented a collaboration of FBI, New Jersey State Police and &lt;/span&gt;&lt;strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Monmouth Internet&lt;/span&gt;&lt;/strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Melissa had the ability to multiply on Microsoft Word 97 and Word 2000, as well as Microsoft Excel 97, 2000 and 2003. In addition, the virus had the ability to mass-mail itself from Microsoft Outlook 97 or Outlook 98.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;I Love You - May 2000&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Using a similar method as the Melissa, the computer virus dubbed &lt;/span&gt;&lt;strong&gt;&lt;em&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&quot;I Love You&quot;&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt; managed to infect millions of computers around the world in just one night. Just like Melissa this computer virus sent passwords and usernames, which were stored on the attacked computers, back to the developer of the virus. After authorities traced the virus they found that a young Filipino student was behind the attack. The young man was released due to the fact that the &lt;/span&gt;&lt;strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Philippines&lt;/span&gt;&lt;/strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt; did not have any law that would prevent hacking and spreading malware. This situation served as one of the premises for creating the&lt;/span&gt;&lt;strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;European Union&#39;s global Cybercrime Treaty&lt;/span&gt;&lt;/strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;The Code Red worm - July 2001&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;This 21st century computer virus managed to penetrate tens of thousands of systems that ran Microsoft Windows NT as well as Windows 2000 server software. The damages caused by the Code Red computer virus were estimated at a total of &lt;/span&gt;&lt;strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;$2 billion&lt;/span&gt;&lt;/strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;. Core Red was developed to use the power of all computers it infected against the official website of the &lt;/span&gt;&lt;strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;White House&lt;/span&gt;&lt;/strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt; at a predetermined date. In collaboration with different virus hunters and tech firms, the White House managed to decipher the code of the Code Red virus and stop traffic as the malware started its attacks.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Nimda - 2001&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Shortly after the September 11 tragedy this computer virus infected hundreds of thousands of computers worldwide. Nimda was considered to be &lt;/span&gt;&lt;strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;one of the most complicated viruses&lt;/span&gt;&lt;/strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;, having up to &lt;/span&gt;&lt;strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;5 different methods of infecting&lt;/span&gt;&lt;/strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt; computers systems and duplicating itself.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Downadup - 2009&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;The latest and most dangerous virus is the &lt;/span&gt;&lt;strong&gt;&lt;em&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&quot;downadup&quot;&lt;/span&gt;&lt;/em&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt; worm&lt;/span&gt;&lt;/strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;, which was also called &lt;/span&gt;&lt;em&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&quot;Conficker&quot;&lt;/span&gt;&lt;/em&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;. The computer security company &lt;/span&gt;&lt;strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;F-Secure&lt;/span&gt;&lt;/strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt; stated that the computer virus has infected 3.5 million computers worldwide. This malicious program was able to spread using a &lt;/span&gt;&lt;strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;patched Windows flaw&lt;/span&gt;&lt;/strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;. Downadup was successful in spreading across the Web due to the fact that it used a flaw that Microsoft patched in October in order to distantly compromise computers that ran unpatched versions of Microsoft&#39;s operating system. But the greatest power of the worm is believed to be the ability of computers, infected with the worm, to download destructive code from a random drop point. F-Secure stated that three of the most affected countries were China, Brazil and Russia.&lt;/span&gt;&lt;/p&gt;&lt;strong&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Article Source:  &lt;/span&gt;&lt;a href=&quot;http://www.infoniac.com/&quot; style=&quot;color: rgb(0, 70, 140); &quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;www.infoniac.com&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;/strong&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;/span&gt;</description><link>http://topavn.blogspot.com/2009/08/most-dangerous-computer-viruses-in.html</link><author>noreply@blogger.com (TOPGUN)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhN3Ye41rGBoIjVyAk1gkemNNtEK0HZVm221ZkzrBjbTuH4QWCF9JQZTuM0dNNSmhEfk65kJcNBgVqYCqQZKLgWhCRmHT3iiLUiZMXWIdpujozsEwF8gaW3VmxX7GQH6dC6H_inDPnugpiR/s72-c/computer-virus-alert.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5129907773329456318.post-6837976067003925530</guid><pubDate>Thu, 20 Aug 2009 11:12:00 +0000</pubDate><atom:updated>2009-08-20T04:17:06.300-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Most Dangerous Viruses</category><title>6 ever Most Dangerous Computer pc viruses and worms</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 21px; &quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;Viruses and worms are a cause for thousands of losses all over the world. There are number of &lt;/span&gt;&lt;/span&gt;&lt;strong style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; &quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;viruses and worms&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt; created. Below i have listed &lt;/span&gt;&lt;/span&gt;&lt;strong style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; &quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;6 most dangerous&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt; and havoc creating viruses that affected millions of computer users over the world. The order of viruses is not important.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot;   style=&quot;font-family:Arial;font-size:100%;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 12px; line-height: 21px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: normal; &quot;&gt;&lt;h2 style=&quot;text-align: justify;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 4px; padding-right: 4px; padding-bottom: 4px; padding-left: 4px; font-weight: normal; line-height: 1.2em; border-bottom-color: rgb(221, 221, 221); border-bottom-width: 1px; border-bottom-style: solid; &quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;Most dangerous computer viruses :&lt;/span&gt;&lt;/h2&gt;&lt;p style=&quot;text-align: justify;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; line-height: 1.8em; &quot;&gt;&lt;strong style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; &quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;1. ILOVEYOU :&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; line-height: 1.8em; &quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal; &quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;This ILOVEYOU worm is considered to be most dangerous worm ever created. It was written in VBScript. It was first noticed in Philippines on May 4 2000 and then spread all over world in just one day, affecting 10% internet users and causing loss of about $5.5 billion. The worm arrived in email inbox with subject “ILOVEYOU”. Hence, called ILOVEYOU worm. It had an attachment “LOVE-LETTER-FOR-YOU.TXT.vbs” . The worm overwrote many important files, with music, multimedia files with a copy of itself attached to each file. Also, it sent the worm to everyone on victim contact list. Thus, worm spread very fast. Only windows users were affected.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; line-height: 1.8em; &quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: normal; &quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; line-height: 1.8em; &quot;&gt;&lt;strong style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; &quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;2. Mydoom :&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; line-height: 1.8em; &quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;Mydoom , a computer virus affected Microsoft Windows. After it was first noticed on January 26, 2004, it became fastest spreading computer virus ever, breaking record of Sobig worm. Mydoom was designed to send junk emails from infected computers. The actual worm programmer is still unknown.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; line-height: 1.8em; &quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: normal; &quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; line-height: 1.8em; &quot;&gt;&lt;strong style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; &quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;3. Virut virus :&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; line-height: 1.8em; &quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;This Virut virus infects executable portable files such as .exe and .scr andeach time it propagates it uses Polymorphism - to evade detection. On infected machine, virus opens a backdoor connecting with an IRC server which is prespecified by virus programmer. This backdoor allow attacker to download additional malware to victim computer. This virus affected and shut down court system computers of Texas this February.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; line-height: 1.8em; &quot;&gt;&lt;strong style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; &quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;4. Blaster worm :&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; line-height: 1.8em; &quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;This Blaster worm - a computer worm that affected computers running Microsoft operating systems. But, the spread of this worm was limited by filtering of ISP and its publicity. The worm was designed to start a SYN Flood on Aug 15, 2003 against port 80 of windowsupdate.com, intended to create a distributed DDoS attack against this site.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; line-height: 1.8em; &quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;If the worm detects an internet connection, the system would become unstable and after displaying a message for 60 seconds, the system used to restart. The message displayed looked like:&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; line-height: 1.8em; &quot;&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 16px; &quot;&gt;“I just want to say LOVE YOU SAN!!”&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;“billy gates why do you make this possible? Stop making money&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;and fix your software!!”&lt;/div&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; line-height: 1.8em; &quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: normal; &quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; line-height: 1.8em; &quot;&gt;&lt;strong style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; &quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;5. Sobig worm :&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; line-height: 1.8em; &quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;This worm ws detected in Aug 2003 which affected millions of internet connected windows operating systems. The worm was written using Microsoft Visual C++ compiler and compressed using tElock. The most destructive version was Sobig.F .&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; line-height: 1.8em; &quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;This worm was worm as it replicated itself and also a Trojan Horse as it appeared other than malware. The programmer of this worm is still not known.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; line-height: 1.8em; &quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: normal; &quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; line-height: 1.8em; &quot;&gt;&lt;strong style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; &quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;6. Conficker virus :&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; line-height: 1.8em; &quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;This virus came into role in November 2008 and affected millions of computer. Basically, its a worm capable of replicating itself and thus can spread fast. The worm spreads itself primarily through a buffer overflow vulnerability in the Server Service on Windows based computers.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; line-height: 1.8em; &quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;When this worm is executed on a computer, it is capable of disabling Windows services such as Windows Update, Windows Defender, Windows Security Center and even Windows Error reporting.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; line-height: 1.8em; &quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;But, the threat due to this worm is reduced as most antiviruses are now detecting this worm and its further spread is thus prevented. This worm is mainly spreading in China, followed by Argentina, Brazil, Russia, and India - where software update is done to less extent.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; line-height: 1.8em; &quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;So friends, this is all about viruses. These are most dangerous viruses or worms that affected millions of worldwide computers. I just wanted to say that keep your antiviruses updated to prevent yourself from being affected by such &lt;/span&gt;&lt;strong style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; &quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;viruses and worms&lt;/span&gt;&lt;/strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;. If you think any other virus or worm needs mention over here, please mention it in comments section. I will update the article.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; line-height: 1.8em; &quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;Enjoy…..&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; line-height: 1.8em; &quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;Article Source: &lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: normal; &quot;&gt;&lt;a href=&quot;http://computer-bloggingtricks.today.com/2009/03/12/6-ever-most-dangerous-computer-pc-viruses-and-worms/&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;color:#000000;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;http://computer-bloggingtricks.today.com/2009/03/12/6-ever-most-dangerous-computer-pc-viruses-and-worms/&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;/span&gt;&lt;/div&gt;</description><link>http://topavn.blogspot.com/2009/08/6-ever-most-dangerous-computer-pc.html</link><author>noreply@blogger.com (TOPGUN)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5129907773329456318.post-6537873980455911068</guid><pubDate>Thu, 20 Aug 2009 09:27:00 +0000</pubDate><atom:updated>2009-08-20T04:10:10.460-07:00</atom:updated><title>Top Ten Most Dangerous Viruses</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://news.softpedia.com/news/Sophos-announces-new-Tiger-version-of-their-leading-Mac-OS-X-anti-virus-solution-1563.shtml&quot; style=&quot;text-decoration: none; &quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;color:#000000;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;Sophos&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt; recently published the top ten most dangerous and most active viruses that were spotted online in November. Sadly, the results of this chart aren&#39;t very flattering for security experts worldwide as this particular month has seen a record number of malware riding the online waves. This was also a prolific time for one of the Sober variants, Sober-Z having &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana; &quot;&gt;&lt;div class=&quot;article_ad&quot; align=&quot;center&quot; style=&quot;text-align: justify;float: right; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 10px; margin-right: 0px; margin-bottom: 10px; margin-left: 10px; &quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;text-decoration: underline;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;real chances of becoming the number one virus this year.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;The report has been put together thanks to the Sophos global network of monitoring stations and it proves that even if Sober-Z was spotted near the end of the month it managed to spread so fast and on a wide scale that it made up for its late entry and in the end accounted for one in every 13 emails sent.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;/span&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://news.softpedia.com/news/Sober-Makes-A-Comeback-and-Swamps-5-of-Online-Traffic-13401.shtml&quot; style=&quot;text-decoration: none; &quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;color:#000000;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;Sober&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt; took the Internet by storm and also managed to take the lead of the Sophos virus chart, while Netsky-P, the worm written by convicted German teenager Sven Jaschan, fell to second position after dominating the number one spot for the past four months. The new variant of Sober has been &quot;awarded&quot; with a 42.9% share of all spotted viruses and it spreads as an email attachment. Once installed it attempts to block antivirus software and it scans the computer for email addresses in order to automatically forward itself to the new destination.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;The November top virus chart includes three different families, Netsky, Mytob and &lt;/span&gt;&lt;/span&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://news.softpedia.com/news/Zafi-D-is-April-s-most-active-worm-1577.shtml&quot; style=&quot;text-decoration: none; &quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;color:#000000;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;Zafi&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;, which proves virus authors are still inclined to make new variants of malware that has been around for some time.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;The complete top 10 most dangerous viruses in November is the following:&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;1. Sober-Z&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;2. NetSky-P&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;3. Mytob-GH&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;4. Mytob-EX&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;5. Zafi-D&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;6. Mytob-BE&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;7. Zafi-B&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;8. Mytob-AS&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;9. NetSky-D&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;10. Mytob-&lt;/span&gt;C&lt;/div&gt;&lt;/span&gt;&lt;/span&gt;</description><link>http://topavn.blogspot.com/2009/08/top-ten-most-dangerous-viruses.html</link><author>noreply@blogger.com (TOPGUN)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5129907773329456318.post-4847567721864712191</guid><pubDate>Sun, 16 Aug 2009 06:27:00 +0000</pubDate><atom:updated>2009-08-15T23:36:12.437-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Avast</category><title>Avast Home Edition 4.8.1335</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTcQhOWkqXaPKGeFJCuhNhUyzJHBexXj4BhxnicCQKo1xYdL4uWwl9S0h5Ma_G6e9ECFC4MyOeVL7tE0ND4HFCcEYYI8OmV4oMQXlH5VtWl7bJqdQOZxkzU9cBkX0jLDwpyijdWzjHYlYC/s1600-h/18__avast.png&quot;&gt;&lt;img style=&quot;float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 32px; height: 32px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTcQhOWkqXaPKGeFJCuhNhUyzJHBexXj4BhxnicCQKo1xYdL4uWwl9S0h5Ma_G6e9ECFC4MyOeVL7tE0ND4HFCcEYYI8OmV4oMQXlH5VtWl7bJqdQOZxkzU9cBkX0jLDwpyijdWzjHYlYC/s320/18__avast.png&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5370446000274623970&quot; /&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;tr&gt;&lt;td valign=&quot;middle&quot; face=&quot;Arial, Helvetica, sans-serif&quot; size=&quot;10pt&quot; style=&quot;  &quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-style: italic; &quot;&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://www.avast.com/eng/avast_4_home.html&quot; style=&quot;color: rgb(2, 94, 179); text-decoration: none; &quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Alwil Software&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt; - 29.81MB (Non-Commercial Freeware)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold; &quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Description:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot; color: rgb(34, 34, 34); line-height: 18px; &quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;avast! antivirus Home Edition represents the best free antivirus protection currently available on the market. This edition is FREE OF CHARGE for non-commercial &amp;amp; home use. Its features include:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;color:#222222;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;color:#222222;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;table style=&quot;text-align: justify; &quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;padding-top: 0px; padding-right: 0px; padding-bottom: 8px; padding-left: 8px; vertical-align: top; &quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Title:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/td&gt;&lt;td style=&quot;padding-top: 0px; padding-right: 0px; padding-bottom: 8px; padding-left: 8px; vertical-align: top; &quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Avast! Home Edition 4.8.1335&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style=&quot;padding-top: 0px; padding-right: 0px; padding-bottom: 8px; padding-left: 8px; vertical-align: top; &quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Filename:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/td&gt;&lt;td style=&quot;padding-top: 0px; padding-right: 0px; padding-bottom: 8px; padding-left: 8px; vertical-align: top; &quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;setupeng.exe&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style=&quot;padding-top: 0px; padding-right: 0px; padding-bottom: 8px; padding-left: 8px; vertical-align: top; &quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;File size:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/td&gt;&lt;td style=&quot;padding-top: 0px; padding-right: 0px; padding-bottom: 8px; padding-left: 8px; vertical-align: top; &quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;29.81MB (31,262,848 bytes)&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style=&quot;padding-top: 0px; padding-right: 0px; padding-bottom: 8px; padding-left: 8px; vertical-align: top; &quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Requirements:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/td&gt;&lt;td style=&quot;padding-top: 0px; padding-right: 0px; padding-bottom: 8px; padding-left: 8px; vertical-align: top; &quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Windows (All Versions)&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style=&quot;padding-top: 0px; padding-right: 0px; padding-bottom: 8px; padding-left: 8px; vertical-align: top; &quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;License:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/td&gt;&lt;td style=&quot;padding-top: 0px; padding-right: 0px; padding-bottom: 8px; padding-left: 8px; vertical-align: top; &quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Non-Commercial Freeware&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style=&quot;padding-top: 0px; padding-right: 0px; padding-bottom: 8px; padding-left: 8px; vertical-align: top; &quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Date added:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/td&gt;&lt;td style=&quot;padding-top: 0px; padding-right: 0px; padding-bottom: 8px; padding-left: 8px; vertical-align: top; &quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;February 6, 2009&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style=&quot;padding-top: 0px; padding-right: 0px; padding-bottom: 8px; padding-left: 8px; vertical-align: top; &quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Author:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;  color: rgb(34, 34, 34); line-height: 18px; &quot;&gt;&lt;ul&gt;&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Anti-spyware built-in&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Web Shield&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Anti-rootkit built-in&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Automatic updates&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Strong self-protection&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Virus Chest&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Antivirus kernel&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;System integration&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Simple User Interface&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Integrated Virus Cleaner&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Resident protection&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Support for 64-bit Windows&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;P2P and IM Shields&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Internationalization&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Network Shield&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Article Source:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot;   style=&quot;  color: rgb(34, 34, 34); line-height: 18px; font-family:Verdana;font-size:12px;&quot;&gt;&lt;a href=&quot;http://www.filehippo.com/download_avast_antivirus/tech/&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt; Avast Home (FileHipo)&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;table style=&quot;text-align: left;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;padding-top: 0px; padding-right: 0px; padding-bottom: 8px; padding-left: 8px; vertical-align: top; &quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:georgia;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/td&gt;&lt;td style=&quot;padding-top: 0px; padding-right: 0px; padding-bottom: 8px; padding-left: 8px; vertical-align: top; &quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;</description><link>http://topavn.blogspot.com/2009/08/avast-home-edition-481335.html</link><author>noreply@blogger.com (TOPGUN)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTcQhOWkqXaPKGeFJCuhNhUyzJHBexXj4BhxnicCQKo1xYdL4uWwl9S0h5Ma_G6e9ECFC4MyOeVL7tE0ND4HFCcEYYI8OmV4oMQXlH5VtWl7bJqdQOZxkzU9cBkX0jLDwpyijdWzjHYlYC/s72-c/18__avast.png" height="72" width="72"/><thr:total>0</thr:total></item></channel></rss>