<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-3659770485807886238</atom:id><lastBuildDate>Mon, 02 Sep 2024 09:20:52 +0000</lastBuildDate><category>Anti Virus</category><category>Knowledge</category><category>Anti Malware</category><category>Anti Trojan</category><category>Virus Removal</category><category>Update</category><category>Worms</category><category>cookies</category><title>Virus Contra</title><description>Computer virus, trojan, malware and anti of them</description><link>http://viruscontra.blogspot.com/</link><managingEditor>noreply@blogger.com (btvideo)</managingEditor><generator>Blogger</generator><openSearch:totalResults>18</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3659770485807886238.post-5691988025197845398</guid><pubDate>Thu, 10 Nov 2011 13:08:00 +0000</pubDate><atom:updated>2011-11-10T05:13:02.191-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Anti Malware</category><category domain="http://www.blogger.com/atom/ns#">cookies</category><title>How to Remove Popup Ads Text-Enhance Cookie from Your Computer</title><description>&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Text-Enhance cookie was appeared at your computer because some reasons:&lt;/div&gt;&lt;ul&gt;&lt;li&gt;You have directly visited text-enhance.com or a website that you have visited uses some of the components (pages, files, images, and so on) of the enhance.com website&lt;/li&gt;
&lt;li&gt;A software application with Internet-enabled functionality that had previously accessed the enhance.com website was running on your PC (in this case, the text-enhance.com cookie will be saved in Internet Explorer, Mozilla and other browser)&lt;/li&gt;
&lt;/ul&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://wafflesatnoon.com/wp-content/uploads/2011/10/Text-Enhance.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://wafflesatnoon.com/wp-content/uploads/2011/10/Text-Enhance.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
You can detect the presence of the enhance.com cookie in your system using some antimalware application. This way, the detection and removal will be performed automatically. Alternatively, you can choose to perform the following steps, depending on the browser you are using:&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Internet Explorer 7 (IE7)&lt;/b&gt;&lt;/div&gt;&lt;ul&gt;&lt;li&gt;From the Tools menu, or the Tools list in the upper right section, select Internet Options&lt;/li&gt;
&lt;li&gt;Under Browsing History, click Settings&lt;/li&gt;
&lt;li&gt;Click View Objects or View Files&lt;/li&gt;
&lt;li&gt;Check if for the enhance.com cookie is present on the list&lt;/li&gt;
&lt;/ul&gt;&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;b&gt;Internet Explorer 5.x-6.x (IE5-IE6)&lt;/b&gt;&lt;/div&gt;&lt;ul&gt;&lt;li&gt;From the Tools menu, select Options or Internet Options&lt;/li&gt;
&lt;li&gt;In the General tab, click Settings&lt;/li&gt;
&lt;li&gt;Select View Files&lt;/li&gt;
&lt;li&gt;You can identify the enhance.com cookie files by checking the file names beneath the Name or Internet Address column. The files will contain the Cookie: enhance.com element.&lt;/li&gt;
&lt;/ul&gt;&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;b&gt;Mozilla Firefox (FF)&lt;/b&gt;&lt;/div&gt;&lt;ul&gt;&lt;li&gt;From the Tools menu, select Options&lt;/li&gt;
&lt;li&gt;In the upper section of the Options window, click Privacy&lt;/li&gt;
&lt;li&gt;In the Cookies tab, click Show Cookies or remove individual cookies link&lt;/li&gt;
&lt;li&gt;In the Cookies window, enter enhance.com in the Search field and run a search, or you can scroll down the list to check whether the enhance.com cookie is present there.&lt;/li&gt;
&lt;/ul&gt;&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;br /&gt;
And below, you will find instructions on how to block the enhance.com cookie permanently in the different browsers.&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;b&gt;To block enhance cookie in Internet Explorer&lt;/b&gt;&lt;/div&gt;&lt;ul&gt;&lt;li&gt;From the Tools menu of Internet Explorer, select Internet Options&lt;/li&gt;
&lt;li&gt;Select the Privacy tab, and then click Sites. The Per site privacy actions window will be displayed&lt;/li&gt;
&lt;li&gt;In the Per site privacy actions window, enter enhance.com in the Address of Web site field&lt;/li&gt;
&lt;li&gt;Click Block&lt;/li&gt;
&lt;/ul&gt;&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;b&gt;To block enhance cookie in Mozilla Firefox&lt;/b&gt;&lt;/div&gt;&lt;ul&gt;&lt;li&gt;From the Tools menu, select Options&lt;/li&gt;
&lt;li&gt;In the upper section of the Options window, click Privacy&lt;/li&gt;
&lt;li&gt;In the Cookies tab, click Exceptions&lt;/li&gt;
&lt;li&gt;In the new Exceptions - Cookies window, enter text-enhance.com and textsrv.com in the Address of Website field and click Disable&lt;/li&gt;
&lt;/ul&gt;&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;b&gt;Removing Add-Ons/Extensions&lt;/b&gt;&lt;br /&gt;
In &lt;i&gt;Google Chrome&lt;/i&gt;, click on the wrench at the top right, then select &lt;b&gt;Tools-&amp;gt;Extensions&lt;/b&gt; and remove something called “&lt;b&gt;Facetheme&lt;/b&gt;” or “&lt;b&gt;Better Links&lt;/b&gt;” there. The add-on called “Facetheme” was the one on my computer that was directly linked to text-enhance.com. “Better Links” was a similar add-on we found on a different computer, but worked essentially the same as text enhance.&lt;br /&gt;
In IE, go into &lt;b&gt;Tools-&amp;gt;Manage Add-Ons&lt;/b&gt; to remove it there. In &lt;b&gt;Firefox&lt;/b&gt;, go into &lt;b&gt;Tools-&amp;gt;Add Ons&lt;/b&gt;. While you’re in there, remove any unwanted add-ons. There’s a good chance you’ll see some you don’t recognize or want.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Add/Remove Programs&lt;/b&gt;&lt;br /&gt;
We actually found “Facetheme” in our add/remove programs section of Windows. So, remove it from your computer. The removal process seemed to work this way as well.&lt;br /&gt;
&lt;/div&gt;</description><link>http://viruscontra.blogspot.com/2011/11/how-to-remove-popup-ads-text-enhance.html</link><author>noreply@blogger.com (btvideo)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3659770485807886238.post-6513880321788988775</guid><pubDate>Fri, 02 Oct 2009 07:21:00 +0000</pubDate><atom:updated>2009-10-02T00:46:48.777-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Anti Trojan</category><category domain="http://www.blogger.com/atom/ns#">Anti Virus</category><title>PCMAV 2.1a (October 2009 Update)</title><description>&lt;span style=&quot;font-family:verdana;&quot;&gt;The new update of PCMAV has been released on this October 2009. In this new version, 2.1a, PCMAV able to detect and remove 2.954 the famous viruses.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrjZtouM-yJqvCyrBD0OMm4CTSIHkxoySlAAm8XOslKXYw613XzPqGd6OEC7HAT-hfnGdZoCbi1mmEsCklDnkzMOH_jtW8RTYrOw-r1INdLeySErOFBMYywfZKl8iWcligWsrl4jaeoqS6/s1600-h/pcmav21a.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 203px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrjZtouM-yJqvCyrBD0OMm4CTSIHkxoySlAAm8XOslKXYw613XzPqGd6OEC7HAT-hfnGdZoCbi1mmEsCklDnkzMOH_jtW8RTYrOw-r1INdLeySErOFBMYywfZKl8iWcligWsrl4jaeoqS6/s320/pcmav21a.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5387900429122260482&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Whats new in PCMAV 2.1a:&lt;br /&gt;&lt;/span&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;    UPDATED! Added to database, scanner and cleaner of 71 local viruses/new variants that reported by users in Indonesia and Asia. Total 2954 viruses and its variants, including new variant of Conficker virus.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;    IMPROVED! Added the special cleaner for virus smansa.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;    IMPROVED! Heuristic engine for detect new variant of some complex polymorphic viruses.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;    And other bug fixed and some improvisations.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5DWOUPzZeYcJQ3MweAAFZh2iPIMM2RTv4A-OYZoDtUe31W-pNEA9e587CAWt17Ubkw64UeTORtizk07GcQ_eTb6ZF6SgpxK8QX1ysC0GuPrSxnOTl4AlBmXUzeXp8VqVYNqWxsRkcfumv/s1600-h/pcmav21a-2.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 162px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5DWOUPzZeYcJQ3MweAAFZh2iPIMM2RTv4A-OYZoDtUe31W-pNEA9e587CAWt17Ubkw64UeTORtizk07GcQ_eTb6ZF6SgpxK8QX1ysC0GuPrSxnOTl4AlBmXUzeXp8VqVYNqWxsRkcfumv/s320/pcmav21a-2.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5387901106992874466&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Download this great and small Anti Virus at &lt;a href=&quot;http://rapidshare.com/files/287654230/PCMAV-2.1a-build-3.rar&quot;&gt;Here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://viruscontra.blogspot.com/2009/10/pcmav-21a-october-2009-update.html</link><author>noreply@blogger.com (btvideo)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrjZtouM-yJqvCyrBD0OMm4CTSIHkxoySlAAm8XOslKXYw613XzPqGd6OEC7HAT-hfnGdZoCbi1mmEsCklDnkzMOH_jtW8RTYrOw-r1INdLeySErOFBMYywfZKl8iWcligWsrl4jaeoqS6/s72-c/pcmav21a.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3659770485807886238.post-164081701657028840</guid><pubDate>Mon, 11 May 2009 02:46:00 +0000</pubDate><atom:updated>2009-05-10T20:16:13.700-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Anti Trojan</category><category domain="http://www.blogger.com/atom/ns#">Anti Virus</category><title>PC Media Antivirus (PCMAV) 2.0b - Valkyrie</title><description>&lt;span style=&quot;font-family:verdana;&quot;&gt;PC Media Antivirus (PCMAV) 2.0b - Valkyrie&lt;br /&gt;&lt;br /&gt;New Release May 9, 2009&lt;br /&gt;&lt;br /&gt;Kill all Brontok virus, Conficker and all its variants without damaging Operating System and your files&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://klikajadeh.com/gambar/images/pcmedia.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 451px; height: 290px;&quot; src=&quot;http://klikajadeh.com/gambar/images/pcmedia.jpg&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;&lt;br /&gt;Whats New&lt;br /&gt;&lt;/span&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;a. Improved! Added a database and virus cleaning 60 local / foreign / new variants have been spread. Total 2720 virus with variannya, including virus Conficker sophisticated, a lot of outstanding and has been known in this version 2.0b by core engine PCMAV.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;b. BuG fixed! In the previous version of RTP running less perfect in Windows XP / Vista, which in some cases to result in some applications can not run perfectly.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;c. BuG fixed! Routine scan memory does not fail again in detecting some types of script viruses.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;d. BuG fixed! Heuristic engine is now more accurate in detecting the suspected file.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;e. NEW! Additional advanced heuristic engine that can detect polymorphic variants of the virus spread much.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;f. BuG fixed! Scan through the right-click &quot;Scan with PCMAV&quot; can now be integrated in Vista without problems.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;g. Improved! Display splash screen Realtime Cleaner and Protector.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;h. BuG fixed! Error detection (false alarm) heuristik on some programs and scripts.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;i. Updated! README.TXT&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;j. Improved! Several name changes the virus has found a new variant.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;k. Improved! Some minor improvements and bug improvised code to ensure that internal PCMAV can still be pride.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;&lt;br /&gt;&lt;br /&gt;Minimal System Requirement&lt;br /&gt;&lt;br /&gt;Processor: Pentium&lt;br /&gt;RAM: 256 MB&lt;br /&gt;Operating systems: - Windows XP 32-bit&lt;br /&gt;- Window Vista 32-bit&lt;br /&gt;- Windows 7 32-bit&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Download this AntiVirus for free at &lt;a href=&quot;http://www.ziddu.com/download/4697133/PCM4VV4lkyr13.rar.html&quot;&gt;Here&lt;/a&gt; or &lt;a href=&quot;http://rapidshare.com/files/231562918/__PCM4V_V4lkyr13__.rar&quot;&gt;Here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://viruscontra.blogspot.com/2009/05/pc-media-antivirus-pcmav-20b-valkyrie.html</link><author>noreply@blogger.com (btvideo)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3659770485807886238.post-8664016086881716287</guid><pubDate>Fri, 14 Nov 2008 04:33:00 +0000</pubDate><atom:updated>2008-11-13T20:36:26.604-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Anti Trojan</category><category domain="http://www.blogger.com/atom/ns#">Anti Virus</category><title>Update: PCMAV 1.9</title><description>&lt;span style=&quot;font-family:verdana;&quot;&gt;PCMedia AntiVirus 1.9&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJ8DVlyO8Av6sGQa4RRIuyU-cgovHUy37Gb1nUzN5b2WVEboeGdPxKEpJHOZ-o4EXM9lcMV6Q6PA170HyNFyevGUGAPifZ_D1jnuvqGUNAmUe5lBhgsTZ-3_XgqhWwFXDvf0b1q4PhqWF-/s1600-h/pcmav1.9-muziek4u.png&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 147px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJ8DVlyO8Av6sGQa4RRIuyU-cgovHUy37Gb1nUzN5b2WVEboeGdPxKEpJHOZ-o4EXM9lcMV6Q6PA170HyNFyevGUGAPifZ_D1jnuvqGUNAmUe5lBhgsTZ-3_XgqhWwFXDvf0b1q4PhqWF-/s320/pcmav1.9-muziek4u.png&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5268367138282826418&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;The new PCMAV 1.9 has capable to detect and remove new 2254 viruses and its variant that reported and found in the world.&lt;br /&gt;&lt;br /&gt;Whats Changed:&lt;br /&gt;&lt;/span&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Added, cleaner and removal database for new 95 viruses&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Added, special cleaner for virus Bungas.vbs&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Fixed, false alarm (heuristhic miss detection) for some application and script&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Updated, chanhes for virus names according their new variants&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Fixed, few minor bugs found and internal code improved.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2D7C5_c_BXgLYg353JyGzYqXHIlJD05BsU8ESwJwobALeqR7XiSgp0-F8rygQHqCiR4AKPFbIeMYeUf4y54XV2LAjToKh9jC090QfWmDknVFZXHlXvQ6JcpfqCGehvClTG_6orRCwZH3y/s1600-h/pcmav1.9-viruscontra.png&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 250px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2D7C5_c_BXgLYg353JyGzYqXHIlJD05BsU8ESwJwobALeqR7XiSgp0-F8rygQHqCiR4AKPFbIeMYeUf4y54XV2LAjToKh9jC090QfWmDknVFZXHlXvQ6JcpfqCGehvClTG_6orRCwZH3y/s320/pcmav1.9-viruscontra.png&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5268367320391131090&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Download at &lt;a href=&quot;http://5349196712486.usercash.com/&quot;&gt;Here&lt;/a&gt; or &lt;a href=&quot;http://3091632090974.usercash.com/&quot;&gt;Here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://viruscontra.blogspot.com/2008/11/update-pcmav-19.html</link><author>noreply@blogger.com (btvideo)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJ8DVlyO8Av6sGQa4RRIuyU-cgovHUy37Gb1nUzN5b2WVEboeGdPxKEpJHOZ-o4EXM9lcMV6Q6PA170HyNFyevGUGAPifZ_D1jnuvqGUNAmUe5lBhgsTZ-3_XgqhWwFXDvf0b1q4PhqWF-/s72-c/pcmav1.9-muziek4u.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3659770485807886238.post-3569692943458422576</guid><pubDate>Tue, 11 Nov 2008 00:35:00 +0000</pubDate><atom:updated>2010-03-28T00:14:40.737-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Anti Virus</category><category domain="http://www.blogger.com/atom/ns#">Virus Removal</category><title>W32/Sality Virus: Description and How to Remove It</title><description>&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;iframe align=&quot;left&quot; frameborder=&quot;0&quot; marginheight=&quot;0&quot; marginwidth=&quot;0&quot; scrolling=&quot;no&quot; src=&quot;http://rcm.amazon.com/e/cm?t=altblo-20&amp;amp;o=1&amp;amp;p=8&amp;amp;l=bpl&amp;amp;asins=B002IT9H50&amp;amp;fc1=000000&amp;amp;IS2=1&amp;amp;lt1=_blank&amp;amp;m=amazon&amp;amp;lc1=0000FF&amp;amp;bc1=000000&amp;amp;bg1=FFFFFF&amp;amp;f=ifr&quot; style=&quot;height: 245px; padding-right: 10px; padding-top: 5px; width: 131px;&quot;&gt;&lt;/iframe&gt;Sality is a virus that has backdoor capabilities and executes keylogger and may infect executable files by putting its code to host files. Once it is installed, Sality virus will infect local executable files and delete all files that are associated with &lt;a href=&quot;http://www.amazon.com/Virus-Spyware-AntiVirus-Computer-Software/dp/B00399WQYW?ie=UTF8&amp;amp;tag=altblo-20&amp;amp;link_code=btl&amp;amp;camp=213689&amp;amp;creative=392969&quot; target=&quot;_blank&quot;&gt;anti-virus&lt;/a&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;1&quot; src=&quot;http://www.assoc-amazon.com/e/ir?t=altblo-20&amp;amp;l=btl&amp;amp;camp=213689&amp;amp;creative=392969&amp;amp;o=1&amp;amp;a=B00399WQYW&quot; style=&quot;border: medium none ! important; margin: 0px ! important; padding: 0px ! important;&quot; width=&quot;1&quot; /&gt; and &lt;a href=&quot;http://www.amazon.com/Symantec-PC-Tools-Spyware-Antivirus/dp/B002SRP9R2?ie=UTF8&amp;amp;tag=altblo-20&amp;amp;link_code=btl&amp;amp;camp=213689&amp;amp;creative=392969&quot; target=&quot;_blank&quot;&gt;anti-spyware&lt;/a&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;1&quot; src=&quot;http://www.assoc-amazon.com/e/ir?t=altblo-20&amp;amp;l=btl&amp;amp;camp=213689&amp;amp;creative=392969&amp;amp;o=1&amp;amp;a=B002SRP9R2&quot; style=&quot;border: medium none ! important; margin: 0px ! important; padding: 0px ! important;&quot; width=&quot;1&quot; /&gt; applications, as well as firewalls. After this, Sality runs a keylogging module that gathers all system and network information, records passwords and login names, steals all sensitive information and sends all this collected data to a predefined email address.&lt;br /&gt;
&lt;br /&gt;
In addition, Sality opens a backdoor that allows the remote attacker to get the full control over the infected computer and this places any financial or banking information stored on your computer in severe jeopardy and represents a serious security risk.&lt;br /&gt;
&lt;br /&gt;
Also known as: W32/Sality (McAfee), Virus.Win32.Sality.aa (Kaspersky), W32.Sality.AE (Symantec), Virus:Win32/Sality.AM (MS OneCare), PE_SALITY.EM (Trend)&lt;br /&gt;
&lt;br /&gt;
W32/Sality is a parasitic virus that infects Win32 PE executable files. It is a polymorphic virus that attempts to spread by file infection. It looks for Win32 PE executable files with .EXE or .SCR file extensions, and infects any such files found on the system by appending the virus body to the host file.&lt;br /&gt;
&lt;br /&gt;
The virus also attempts to propagate by copying itself with a random filename to network drives, including all removable disk drives. Sality.AA also creates an &lt;span style=&quot;color: #cc0000;&quot;&gt;&quot;autorun.inf&quot;&lt;/span&gt; file in these drives so that the virus executes when it is accessed.&lt;br /&gt;
&lt;br /&gt;
Upon execution, it drops the following files into the Windows system directory:&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;%Windir%\System32\Hdaudprop.dll&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;%Windir%\System32\Hdaudpropres.dll&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;%Windir%\System32\Hdaudpropshortcut.exe&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;%Windir%\System32\drivers\Hdaudbus.sys&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;%Windir%\System32\drivers\Hdaudio.sys&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;%Windir%\System32\drivers\portcls.sys&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Creates the following registry keys:&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\WMI_MFC_TPSHOCKER_80&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;HKEY_LOCAL_MACHINE\System\ControlSet001\Enum\Root\IPFILTERDRIVER&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system\EnableLUA&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\GlobalUserOffline&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;
and it downloads further malware from the following domains:&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;bpowqbvcfds677.info&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;aapowqbvcfds677.info&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;abpowqbvcfds677.info&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;d98dc9.bpowqbvcfds677.info&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;bmakemegood24.com&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;d99395.bmakemegood24.com&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;bbeakemegood24.com&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;bperfectchoice1.com&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;d998b6.bperfectchoice1.com&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;cbparfectchoice1.com&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;cbpbrfectchoice1.com&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;bcash-ddt.net&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;d9aab7.bcash-ddt.net&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;pzrk.ru&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;dbcabh-ddt.net&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;bddr-cash.net&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;ebddrbcash.net&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;
It also modifies the following registry entries:&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Setting\&quot;GlobalUserOffline&quot; = &quot;0&quot;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system\&quot;EnableLUA&quot; = &quot;0&quot;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;
and this virus also deletes entries in the following registry subkeys:&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;HKEY_CURRENT_USER\System\CurrentControlSet\Control\SafeBoot&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;
Sality.AA bypasses the system firewall by executing the command:&lt;br /&gt;
&lt;span style=&quot;color: #990000; font-style: italic;&quot;&gt;netsh firewall set opmode disable&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
It may also disable settings related to system security. It does this by adding the following registry entries:&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;HKLM\SOFTWARE\Microsoft\Security Center\AntiVirusOverride = dword:00000001&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;HKLM\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify = dword:00000001&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;HKLM\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify = dword:00000001&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;HKLM\SOFTWARE\Microsoft\Security Center\FirewallOverride = dword:00000001&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;HKLM\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify = dword:00000001&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;HKLM\SOFTWARE\Microsoft\Security Center\UacDisableNotify = dword:00000001&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;HKLM\SOFTWARE\Microsoft\Security Center\Svc\AntiVirusOverride = dword:00000001&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;HKLM\SOFTWARE\Microsoft\Security Center\Svc\AntiVirusDisableNotify = dword:00000001&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;HKLM\SOFTWARE\Microsoft\Security Center\Svc\FirewallDisableNotify = dword:00000001&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;HKLM\SOFTWARE\Microsoft\Security Center\Svc\FirewallOverride = dword:00000001&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;HKLM\SOFTWARE\Microsoft\Security Center\Svc\UpdatesDisableNotify = dword:00000001&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;HKLM\SOFTWARE\Microsoft\Security Center\Svc\UacDisableNotify = dword:00000001&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;
The virus sets the following registry entry so that hidden folders and files are not displayed in Windows Explorer view:&lt;br /&gt;
&lt;span style=&quot;color: #cc0000; font-size: 85%;&quot;&gt;HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Hidden = 2&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
It also disables Registry Editor and Task Manager by adding these registry entries:&lt;br /&gt;
&lt;span style=&quot;font-size: 85%;&quot;&gt;&lt;span style=&quot;color: #990000;&quot;&gt;HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\system\DisableTaskMgr = dword:00000001&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #990000;&quot;&gt;HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\system\DisableRegistryTools = dword:00000001&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;iframe align=&quot;left&quot; frameborder=&quot;0&quot; marginheight=&quot;0&quot; marginwidth=&quot;0&quot; scrolling=&quot;no&quot; src=&quot;http://rcm.amazon.com/e/cm?t=altblo-20&amp;amp;o=1&amp;amp;p=8&amp;amp;l=bpl&amp;amp;asins=B002I0HJRM&amp;amp;fc1=000000&amp;amp;IS2=1&amp;amp;lt1=_blank&amp;amp;m=amazon&amp;amp;lc1=0000FF&amp;amp;bc1=000000&amp;amp;bg1=FFFFFF&amp;amp;f=ifr&quot; style=&quot;height: 245px; padding-right: 10px; padding-top: 5px; width: 131px;&quot;&gt;&lt;/iframe&gt;Sality.AA terminates all anti virus routine services running on the system, and prevent access to Websites that contain its names, like &lt;span style=&quot;font-style: italic;&quot;&gt;sality_remove, &lt;a href=&quot;http://www.amazon.com/VIRUSCAN-Professional-S-V8-CD-ROM/dp/B0000CG48I?ie=UTF8&amp;amp;tag=altblo-20&amp;amp;link_code=btl&amp;amp;camp=213689&amp;amp;creative=392969&quot; target=&quot;_blank&quot;&gt;viruscan&lt;/a&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;1&quot; src=&quot;http://www.assoc-amazon.com/e/ir?t=altblo-20&amp;amp;l=btl&amp;amp;camp=213689&amp;amp;creative=392969&amp;amp;o=1&amp;amp;a=B0000CG48I&quot; style=&quot;border: medium none ! important; margin: 0px ! important; padding: 0px ! important;&quot; width=&quot;1&quot; /&gt;, &lt;a href=&quot;http://www.amazon.com/Sophos-acquires-anti-spam-specialist-ActiveState/dp/B0008E1YY4?ie=UTF8&amp;amp;tag=altblo-20&amp;amp;link_code=btl&amp;amp;camp=213689&amp;amp;creative=392969&quot; target=&quot;_blank&quot;&gt;sophos&lt;/a&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;1&quot; src=&quot;http://www.assoc-amazon.com/e/ir?t=altblo-20&amp;amp;l=btl&amp;amp;camp=213689&amp;amp;creative=392969&amp;amp;o=1&amp;amp;a=B0008E1YY4&quot; style=&quot;border: medium none ! important; margin: 0px ! important; padding: 0px ! important;&quot; width=&quot;1&quot; /&gt;, &lt;a href=&quot;http://www.amazon.com/McAfee-Total-Protection-User-2010/dp/B002GUUO5I?ie=UTF8&amp;amp;tag=altblo-20&amp;amp;link_code=btl&amp;amp;camp=213689&amp;amp;creative=392969&quot; target=&quot;_blank&quot;&gt;mcafee&lt;/a&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;1&quot; src=&quot;http://www.assoc-amazon.com/e/ir?t=altblo-20&amp;amp;l=btl&amp;amp;camp=213689&amp;amp;creative=392969&amp;amp;o=1&amp;amp;a=B002GUUO5I&quot; style=&quot;border: medium none ! important; margin: 0px ! important; padding: 0px ! important;&quot; width=&quot;1&quot; /&gt;, &lt;a href=&quot;http://www.amazon.com/Navarre-EAVH-N1-1-1-RBX-Nod32-Antivirus-V-4-0/dp/B0024M19PW?ie=UTF8&amp;amp;tag=altblo-20&amp;amp;link_code=btl&amp;amp;camp=213689&amp;amp;creative=392969&quot; target=&quot;_blank&quot;&gt;eset.com&lt;/a&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;1&quot; src=&quot;http://www.assoc-amazon.com/e/ir?t=altblo-20&amp;amp;l=btl&amp;amp;camp=213689&amp;amp;creative=392969&amp;amp;o=1&amp;amp;a=B0024M19PW&quot; style=&quot;border: medium none ! important; margin: 0px ! important; padding: 0px ! important;&quot; width=&quot;1&quot; /&gt;, &lt;a href=&quot;http://www.amazon.com/Kaspersky-Internet-Security-2010-3-User/dp/B002I0HJRM?ie=UTF8&amp;amp;tag=altblo-20&amp;amp;link_code=btl&amp;amp;camp=213689&amp;amp;creative=392969&quot; target=&quot;_blank&quot;&gt;kaspersky&lt;/a&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;1&quot; src=&quot;http://www.assoc-amazon.com/e/ir?t=altblo-20&amp;amp;l=btl&amp;amp;camp=213689&amp;amp;creative=392969&amp;amp;o=1&amp;amp;a=B002I0HJRM&quot; style=&quot;border: medium none ! important; margin: 0px ! important; padding: 0px ! important;&quot; width=&quot;1&quot; /&gt;, onlinescan&lt;/span&gt;, and more...&lt;br /&gt;
&lt;br /&gt;
The device driver is not dropped and installed onto the system unless there is an active internet connection.&lt;br /&gt;
&lt;br /&gt;
The virus may prevent execution of applications that perform an integrity self-check as a result of them being infected.&lt;br /&gt;
&lt;br /&gt;
So my dear friend the easiest way to tackle this virus is to Remove above mention Virus Entry Doors from registry and Delete those .DLL files from system.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-weight: bold;&quot;&gt;Sality Manual Removal Instructions&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Below is a list of Sality manual removal instructions and Sality components listed to help you remove Sality from your PC. Backup Reminder: Always be sure to back up your PC before making any changes.&lt;br /&gt;
&lt;br /&gt;
Note: This manual removal process may be difficult and you run the risk of destroying your computer.&lt;br /&gt;
&lt;br /&gt;
Step 1 : Use Windows File Search Tool to Find Sality Path&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Go to Start &amp;gt; Search &amp;gt; All Files or Folders.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;In the &quot;All or part of the the file name&quot; section, type in &quot;Sality&quot; file name(s).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;To get better results, select &quot;Look in: Local Hard Drives&quot; or &quot;Look in: My Computer&quot; and then click &quot;Search&quot; button.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;When Windows finishes your search, hover over the &quot;In Folder&quot; of &quot;Sality&quot;, highlight the file and copy/paste the path into the address bar. Save the file&#39;s path on your clipboard because you&#39;ll need the file path to delete Sality in the following manual removal steps.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;
Step 2 : Use &lt;a href=&quot;http://www.amazon.com/Secrets-Windows-Command-Prompts-Exposed/dp/1553951905?ie=UTF8&amp;amp;tag=altblo-20&amp;amp;link_code=btl&amp;amp;camp=213689&amp;amp;creative=392969&quot; target=&quot;_blank&quot;&gt;Windows Command Prompt&lt;/a&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;1&quot; src=&quot;http://www.assoc-amazon.com/e/ir?t=altblo-20&amp;amp;l=btl&amp;amp;camp=213689&amp;amp;creative=392969&amp;amp;o=1&amp;amp;a=1553951905&quot; style=&quot;border: medium none ! important; margin: 0px ! important; padding: 0px ! important;&quot; width=&quot;1&quot; /&gt; to Unregister Sality DLL Files&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;To open the Windows Command Prompt, go to Start &amp;gt; Run &amp;gt; type cmd and then click the &quot;OK&quot; button.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Type &quot;cd&quot; in order to change the current directory, press the &quot;space&quot; button, enter the full path to where you believe the Sality DLL file is located and press the &quot;Enter&quot; button on your keyboard. If you don&#39;t know where Sality DLL file is located, use the &quot;dir&quot; command to display the directory&#39;s contents.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;To unregister &quot;Sality&quot; DLL file, type in the exact directory path + &quot;regsvr32 /u&quot; + [DLL_NAME] (for example, :&lt;span style=&quot;color: #cc0000; font-style: italic;&quot;&gt;C\Spyware-folder\&amp;gt; regsvr32 /u Sality.dll&lt;/span&gt;) and press the &quot;Enter&quot; button. A message will pop up that says you successfully unregistered the file.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Search and unregister &quot;Sality&quot; DLL files: &lt;span style=&quot;color: #cc0000; font-style: italic;&quot;&gt;syslib32.dll, sysdll.dll, oledsp32.dll&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;
Step 3 : Detect and Delete Other Sality Files&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;To open the Windows Command Prompt, go to Start &amp;gt; Run &amp;gt; type cmd and then press the &quot;OK&quot; button.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Type in &quot;dir /A name_of_the_folder&quot; (for example, C:\Spyware-folder), which will display the folder&#39;s content even the hidden files.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;To change directory, type in &quot;cd name_of_the_folder&quot;.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Once you have the file you&#39;re looking for type in &quot;del name_of_the_file&quot;.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;To delete a file in folder, type in &quot;del name_of_the_file&quot;.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;To delete the entire folder, type in &quot;rmdir /S name_of_the_folder&quot;.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Select the &quot;Sality&quot; process and click on the &quot;End Process&quot; button to kill it.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Remove the &quot;Sality&quot; processes files: &lt;span style=&quot;color: #cc0000;&quot;&gt;syslib32.dll, sysdll.dll, oledsp32.dll, oledsp32.dll, sysdll.dll, syslib32.dll&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;
Other simple way, you can use Sality Removal Tool from &lt;a href=&quot;http://www.amazon.com/AVG-Anti-Virus-Anti-Spyware-Version-License/dp/B002ZUPVY8?ie=UTF8&amp;amp;tag=altblo-20&amp;amp;link_code=btl&amp;amp;camp=213689&amp;amp;creative=392969&quot; target=&quot;_blank&quot;&gt;Grisoft &lt;/a&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;1&quot; src=&quot;http://www.assoc-amazon.com/e/ir?t=altblo-20&amp;amp;l=btl&amp;amp;camp=213689&amp;amp;creative=392969&amp;amp;o=1&amp;amp;a=B002ZUPVY8&quot; style=&quot;border: medium none ! important; margin: 0px ! important; padding: 0px ! important;&quot; width=&quot;1&quot; /&gt;by downloading at &lt;a href=&quot;http://www.ziddu.com/download/3032379/rmsality.rar.html&quot;&gt;Here&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;</description><link>http://viruscontra.blogspot.com/2008/11/w32sality-virus-description-and-how-to.html</link><author>noreply@blogger.com (btvideo)</author><thr:total>5</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3659770485807886238.post-8577588670953540500</guid><pubDate>Mon, 03 Nov 2008 09:04:00 +0000</pubDate><atom:updated>2008-11-03T01:08:27.356-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Anti Virus</category><title>Autorun Virus Remover v2.3</title><description>&lt;span style=&quot;font-family:verdana;&quot;&gt;Autorun Virus Remover can detect and clean hundreds of usb/autorun viruses and it will block viruses and trojans trying to attack when USB device is inserted.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://pic80.picturetrail.com/VOL2068/11506078/20394508/335834767.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 500px; height: 268px;&quot; src=&quot;http://pic80.picturetrail.com/VOL2068/11506078/20394508/335834767.jpg&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Autorun Virus Remover provides 100% protection against any malicious programs trying to attack via USB storage(USB driveUSB stickpen drive flash drive flash card secure digital card removable storage portable storage;ipod media player).&lt;br /&gt;&lt;br /&gt;Compare Autorun Virus Remover with other antivirus solutions, you will find out its highlights:&lt;br /&gt;&lt;/span&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Autorun Virus Remover provides 100% protection against any threats via USB drive, however, the majority of other products are unable even to guarantee 90% protection. &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Autorun Virus Remover can detect and clean the usb virus/worm/trojan such as Ravmon,auto.exe in your computer or usb drive,it could solve the problem that unable to open a drive by double clicking. It also removes the leftovers of virus by removing the autorun.inf files and cleaning up your system registry, so you won’t see the autoplay item anymore.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://pic80.picturetrail.com/VOL2068/11506078/20394508/335834769.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 433px; height: 296px;&quot; src=&quot;http://pic80.picturetrail.com/VOL2068/11506078/20394508/335834769.jpg&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Features:&lt;br /&gt;&lt;/span&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;100% protection against any threats via USB drive&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;The best solution to protect offline computer&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;The world’s fastest and smallest antivirus software&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Require no signature updates&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;100% compatible with all software&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Easy to use&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;&lt;br /&gt;Btw, you can download this antivirus at &lt;a href=&quot;http://5181556788273.usercash.com&quot;&gt;here&lt;/a&gt; or at &lt;a href=&quot;http://7040842996910.usercash.com&quot;&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://viruscontra.blogspot.com/2008/11/autorun-virus-remover-v23.html</link><author>noreply@blogger.com (btvideo)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3659770485807886238.post-7214337302335520017</guid><pubDate>Wed, 22 Oct 2008 09:31:00 +0000</pubDate><atom:updated>2008-10-22T03:10:53.998-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Anti Malware</category><category domain="http://www.blogger.com/atom/ns#">Knowledge</category><title>All You Have Know About Spyware</title><description>&lt;span style=&quot;font-family:verdana;&quot;&gt;There are a lot of PC users that know little about &quot;Spyware&quot;, &quot;Mal-ware&quot;, &quot;adware&quot;, &quot;hijackers&quot;, &quot;Dialers&quot; and many more. This will help you avoid pop-ups, spammers and all those baddies.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigIlDmtyhASFfieNIKU4QZkAWXn2KNExukJfFTO_yK6oi6FvpKCmoxK4iyk1mVaQvza9X_oqLcAAzy_3EaUTafQNRyBGFXJHG7NXlDrW7wJcwoPfeP0-L3BE-IAT7w9iks5S_acnbEr4fd/s1600-h/Malware-VirusContra.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigIlDmtyhASFfieNIKU4QZkAWXn2KNExukJfFTO_yK6oi6FvpKCmoxK4iyk1mVaQvza9X_oqLcAAzy_3EaUTafQNRyBGFXJHG7NXlDrW7wJcwoPfeP0-L3BE-IAT7w9iks5S_acnbEr4fd/s320/Malware-VirusContra.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5259917934657188978&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;What is Spy-ware?&lt;/span&gt;&lt;br /&gt;Spy-ware is Internet jargon for Advertising Supported software (Ad-ware). It is a way for shareware authors to make money from a product, other than by selling it to the users. There are several large media companies that offer them to place banner ads in their products in exchange for a portion of the revenue from banner sales. This way, you don&#39;t have to pay for the software and the developers are still getting paid. If you find the banners annoying, there is usually an option to remove them, by paying the regular licensing fee.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic; font-weight: bold;&quot;&gt;Known spywares&lt;/span&gt;&lt;br /&gt;There are thousands out there, new ones are added to the list everyday. But here are a few:&lt;br /&gt;Alexa, Aureate/Radiate, BargainBuddy, ClickTillUWin, Conducent Timesink, Cydoor, Comet Cursor,  Zula/KaZaa Toptext, Flashpoint/Flashtrack, Flyswat, Gator, GoHip, Hotbar, ISTbar, Lions Pride Enterprises/Blazing Logic/Trek Blue, Lop (C2Media), Mattel Brodcast, Morpheus, NewDotNet, Realplayer, Songspy, Xupiter, Web3000, WebHancer, Windows Messenger Service, DownloadAccel, Flyswat, freeNsafe, Naviant, Net Perceptions. You can get more names of spyware at &lt;a href=&quot;http://www.grc.com/oo/spyware.htm&quot;&gt;GRC | OptOut&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_hyLkUhSVvv89ozWht9CiYSLXpe1FlAIJ4ZaoVwhn0YwHFNdz-yUYYU4kdBunwKWZcI5Y2D6WT1eY4HnCo3JWI8Zy80mC2oohlMVxYrcw3o85dZE-zQMIY3prYxavq7ULdn1RyKh1y1eP/s1600-h/spyware.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_hyLkUhSVvv89ozWht9CiYSLXpe1FlAIJ4ZaoVwhn0YwHFNdz-yUYYU4kdBunwKWZcI5Y2D6WT1eY4HnCo3JWI8Zy80mC2oohlMVxYrcw3o85dZE-zQMIY3prYxavq7ULdn1RyKh1y1eP/s320/spyware.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5259918492489905474&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;How to check if a program has spyware?&lt;br /&gt;The is this &lt;a href=&quot;http://www.spywareguide.com/product_search.php&quot;&gt;Little site&lt;/a&gt; that keeps a database of programs that are known to install spyware.&lt;br /&gt;&lt;br /&gt;If you would like to block pop-ups (IE Pop-ups), there tons of different types out there, but these are the 2 best I think. Try to use &lt;a href=&quot;http://toolbar.google.com/&quot;&gt;Google Toolbar&lt;/a&gt;. This program is Freeware or you can use s&lt;/span&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;hareware program like &lt;/span&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;&lt;a href=&quot;http://www.admuncher.com/&quot;&gt;AdMuncher&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;If you want to remove the &quot;spyware&quot; use this freeware from Lavasoft, &lt;a href=&quot;http://www.lavasoftusa.com/&quot;&gt;Ad-Aware&lt;/a&gt;. This software is a multi spyware removal utility, that scans your memory, registry and hard drives for known spyware components and lets you remove them. The included backup-manager lets you reinstall a backup, offers and multi language support. Or you can try to get &lt;a href=&quot;http://www.safer-networking.org/&quot;&gt;Spybot-S&amp;amp;D&lt;/a&gt; that can be get for free too. This anti malware application will detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer. Blocks ActiveX downloads, tracking cookies and other threats. Over 10,000 detection files and entries, and provides detailed information about found problems.&lt;br /&gt;&lt;br /&gt;Or you can try &lt;a href=&quot;http://www.bulletproofsoft.com/spyware-remover.html&quot;&gt;BPS Spyware and Adware Remover&lt;/a&gt;. This shareware program have Adware, spyware, trackware and big brotherware removal utility with multi-language support. It scans your memory, registry and drives for known spyware and lets you remove them. Displays a list and lets you select the items you&#39;d like to remove.&lt;br /&gt;&lt;br /&gt;Other shareware anti malware is &lt;a href=&quot;http://www.webroot.com/wb/products/spysweeper/index.php&quot;&gt;Spy Sweeper v2.2&lt;/a&gt;.  It can detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer. The best scanner out there, and updated all the time.&lt;br /&gt;&lt;br /&gt;The favorite spyware removal utility is &lt;a href=&quot;http://en.wikipedia.org/wiki/HijackThis&quot;&gt;HijackThis&lt;/a&gt;. HijackThis is a tool, that lists all installed browser add-on, buttons, startup items and allows you to inspect them, and optionally remove selected items.&lt;br /&gt;&lt;br /&gt;If you would like to prevent &quot;spyware&quot; being install, you can try &lt;a href=&quot;http://www.wilderssecurity.net/spywareblaster.html&quot;&gt;SpywareBlaster&lt;/a&gt;. This program is Freeware. SpywareBlaster doesn`t scan and clean for so-called spyware, but prevents it from being installed in the first place. It achieves this by disabling the CLSIDs of popular spyware ActiveX controls, and also prevents the installation of any of them via a webpage.&lt;br /&gt;&lt;br /&gt;Or you can use &lt;a href=&quot;http://www.wilderssecurity.net/spywareguard.html&quot;&gt;SpywareGuard&lt;/a&gt;.  SpywareGuard provides a real-time protection solution against so-called spyware. It works similar to an anti-virus program, by scanning EXE and CAB files on access and alerting you if known spyware is detected. Another freeware for this is &lt;a href=&quot;http://www.xp-antispy.org/&quot;&gt;XP-AntiSpy&lt;/a&gt;, a small utility to quickly disable some built-in update and authentication features in WindowsXP that may rise security or privacy concerns in some people.&lt;br /&gt;&lt;br /&gt;If you would like more Information about &quot;spyware&quot;, you can find at these sites:&lt;br /&gt;&lt;a href=&quot;http://www.spychecker.com/&quot;&gt;Spychecker&lt;/a&gt;, &lt;a href=&quot;http://www.spywareguide.com/&quot;&gt;Spyware Guide&lt;/a&gt;, &lt;a href=&quot;http://www.cexx.org/adware.htm&quot;&gt;Cexx&lt;/a&gt; and &lt;a href=&quot;http://www.thiefware.com/links/&quot;&gt;Thief Ware&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;All these softwares will help remove and prevent evil spammers and spywares attacking your PC. I recommend getting &quot;spyblaster&quot; &quot;s&amp;amp;d spybot&quot; &quot;spy sweeper&quot; &amp;amp; &quot;admuncher&quot; to protect your PC. A weekly scan is also recommended.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://viruscontra.blogspot.com/2008/10/all-you-have-know-about-spyware.html</link><author>noreply@blogger.com (btvideo)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigIlDmtyhASFfieNIKU4QZkAWXn2KNExukJfFTO_yK6oi6FvpKCmoxK4iyk1mVaQvza9X_oqLcAAzy_3EaUTafQNRyBGFXJHG7NXlDrW7wJcwoPfeP0-L3BE-IAT7w9iks5S_acnbEr4fd/s72-c/Malware-VirusContra.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3659770485807886238.post-4461246388123810509</guid><pubDate>Sat, 18 Oct 2008 17:09:00 +0000</pubDate><atom:updated>2008-10-18T10:22:48.900-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Anti Trojan</category><category domain="http://www.blogger.com/atom/ns#">Anti Virus</category><title>Update: PC Media AntiVirus 1.8 (PCMAV)</title><description>&lt;span style=&quot;font-family:verdana;&quot;&gt;As I wrote on last posts at &lt;a href=&quot;http://viruscontra.blogspot.com/2008/09/pcmav-free-antivirus-from-indonesia.html&quot;&gt;here&lt;/a&gt; and &lt;a href=&quot;http://viruscontra.blogspot.com/2008/09/pcmedia-antivirus-17-update.html&quot;&gt;here&lt;/a&gt;, PCMAV or PCMedia Antivirus is free antivirus software that made by Indonesian developer. PCMAV support or compatible with engine Clamav 0.93 (the new generation of antivirus clamav engine).&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://img410.imageshack.us/img410/3535/pcmav18im5.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px;&quot; src=&quot;http://img410.imageshack.us/img410/3535/pcmav18im5.jpg&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Now, this new version come with more power for attacking and removing the new viruses and trojans.&lt;br /&gt;&lt;br /&gt;Download this new version at &lt;a href=&quot;http://3993445474654.usercash.com/&quot;&gt;Here&lt;/a&gt; or &lt;a href=&quot;http://8144182574935.usercash.com/&quot;&gt;Here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;Note:&lt;/span&gt; No need to install, just extract from archive to your harddisk.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://viruscontra.blogspot.com/2008/10/update-pc-media-antivirus-18-pcmav.html</link><author>noreply@blogger.com (btvideo)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3659770485807886238.post-8802135221854625777</guid><pubDate>Sat, 18 Oct 2008 13:23:00 +0000</pubDate><atom:updated>2008-10-18T06:28:41.394-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Knowledge</category><title>Firewall on Your Computer</title><description>&lt;span style=&quot;font-family:verdana;&quot;&gt;Firewalls are filters that filter any information passing from and into your computer when you are surfing the Internet. It is up to you to set a filtration level where you can say what information gets in and what gets out. Many people believe that the firewalls are the first level of security and they are not far from the truth. There are many benefits of using firewalls.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2Ty1yvoKDKHfzQrLhWXsQ3zd3j2ltOeTynLgMnNS_k0VsIkkFWk7GTw2M4fXraEOEl0-Mf5a5gz5caP1QXn2FHmgJPZKjGpVJrN1tQ_SO4RM8V1-DFYT1qA8k55wj2ZxSTiXnSSquGepW/s1600-h/firewall_viruscontra.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2Ty1yvoKDKHfzQrLhWXsQ3zd3j2ltOeTynLgMnNS_k0VsIkkFWk7GTw2M4fXraEOEl0-Mf5a5gz5caP1QXn2FHmgJPZKjGpVJrN1tQ_SO4RM8V1-DFYT1qA8k55wj2ZxSTiXnSSquGepW/s320/firewall_viruscontra.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5258485224038828738&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;If you are using a computer at home or office, it is important to have a firewall. The thing is that most large organizations have very complex firewalls which are relatively impenetrable. These firewalls prevent employees from sending out sensitive company data through emails. They also prevent employees from accessing sites which could be harmful to the organization&#39;s network or stop the employees from being productive. In addition, firewalls prevent other computers from accessing the company&#39;s network.&lt;br /&gt;&lt;br /&gt;The benefits of using a firewall are immense for an organization and that is why it is in such great demand. There are many different levels of configuration possible with firewalls and any organization using them would require trained IT employees to oversee and maintain them.&lt;br /&gt;&lt;br /&gt;When we talk about computers at home, the firewall used is not as complex as that used in an organization. Here the firewall just has to protect your home PC and network from malicious software like viruses and spyware. A firewall on your home computer does not allow traffic to enter or go out other than what has been programmed. So, if a program entering your computer is infected with virus and does not conform to the preset criteria stipulated on your firewall, it will block it.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://viruscontra.blogspot.com/2008/10/firewall-on-your-computer.html</link><author>noreply@blogger.com (btvideo)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2Ty1yvoKDKHfzQrLhWXsQ3zd3j2ltOeTynLgMnNS_k0VsIkkFWk7GTw2M4fXraEOEl0-Mf5a5gz5caP1QXn2FHmgJPZKjGpVJrN1tQ_SO4RM8V1-DFYT1qA8k55wj2ZxSTiXnSSquGepW/s72-c/firewall_viruscontra.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3659770485807886238.post-5695503123792934277</guid><pubDate>Wed, 24 Sep 2008 17:55:00 +0000</pubDate><atom:updated>2008-09-24T11:01:34.955-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Knowledge</category><category domain="http://www.blogger.com/atom/ns#">Worms</category><title>Worms that attack instant messenger</title><description>&lt;span style=&quot;font-family:verdana;&quot;&gt;An IRC worm is usually a standalone program that uses IRC networks to spread itself. Such worm either tries to spread itself by establishing connection to an IRC server or it can drop specific scripts to an IRC client directory. The most affected IRC client is &lt;a href=&quot;http://www.mirc.org/&quot;&gt;mIRC&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixze0egUQbC8TseXlMN3shMZCepggZWd8hBcHrRWByp7dwxzAuwrYuZvZlKjffA2TYHV641gsTRLCxv9v0aF40j7euNWTz1Ahqu3hgzI5LsKmFIfIxyIYgBrp9pqB_Lby7stmNE9TORCMC/s1600-h/mirc.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixze0egUQbC8TseXlMN3shMZCepggZWd8hBcHrRWByp7dwxzAuwrYuZvZlKjffA2TYHV641gsTRLCxv9v0aF40j7euNWTz1Ahqu3hgzI5LsKmFIfIxyIYgBrp9pqB_Lby7stmNE9TORCMC/s320/mirc.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5249649423098381858&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Usually an IRC worm replaces some INI files in mIRC directory with its own scripts and when a user connects to an IRC server and joins any channel, these scripts instruct a client to send a worm&#39;s executable file to everyone in that channel. Some IRC worms have backdoor and trojan capabilities.&lt;br /&gt;&lt;br /&gt;Instant messaging attacks originated in the abuse of the &lt;a href=&quot;http://www.mirc.co.uk/&quot;&gt;mIRC&lt;/a&gt; /DCC Send command. This command can be used to send a file to users connected to a particular discussion channel. Normally, attackers modify a local script file, such as script.ini used by mIRC to instruct the instant messaging client to send a file to a recipient any time a new participant joins a discussion.&lt;br /&gt;&lt;br /&gt;Modern implementations of IRC (Internet Relay Chat) worms can connect dynamically to an IRC client and send messages that trick the recipient into executing a link or an attachment. In this way, the attacker can avoid modifying any local files.&lt;br /&gt;&lt;br /&gt;For example, the W32/Choke worm uses the &lt;a href=&quot;http://www.msn.com/&quot;&gt;MSN Messenger&lt;/a&gt; API to send itself to other instant messaging participants as a &quot;shooter game&quot;27. Although several instant messenger software programs require the user to click a button to send a file, worms can enumerate the dialog boxes and &quot;click&quot; the button, so the actual user does not have to click. It is also expected that computer worms will exploit buffer overflow vulnerabilities in instant messenger software. For example, certain versions of &lt;a href=&quot;http://www.aol.com/&quot;&gt;AOL Instant Messenger&lt;/a&gt; software allow remote execution of arbitrary code via a long argument in a game request function&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://viruscontra.blogspot.com/2008/09/worms-that-attack-instant-messenger.html</link><author>noreply@blogger.com (btvideo)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixze0egUQbC8TseXlMN3shMZCepggZWd8hBcHrRWByp7dwxzAuwrYuZvZlKjffA2TYHV641gsTRLCxv9v0aF40j7euNWTz1Ahqu3hgzI5LsKmFIfIxyIYgBrp9pqB_Lby7stmNE9TORCMC/s72-c/mirc.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3659770485807886238.post-5468301458684700092</guid><pubDate>Tue, 16 Sep 2008 10:23:00 +0000</pubDate><atom:updated>2008-09-16T04:44:10.797-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Anti Virus</category><category domain="http://www.blogger.com/atom/ns#">Update</category><title>PCMedia Antivirus 1.7 Update</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-Vni89T7ZaKcx6gR5vRiu1QhVyfPPUBeOEQn_tKJ0v_C8mQm7miob4IRSjO55T5ITxEnHUy7reyd7Fzq0E7m3an6GIMg0Okl_v_y9r3Ytg03Bd1P3NmiUytjtOjYaJUqJXSvdLT_nvvVK/s1600-h/pcmav1.7.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-Vni89T7ZaKcx6gR5vRiu1QhVyfPPUBeOEQn_tKJ0v_C8mQm7miob4IRSjO55T5ITxEnHUy7reyd7Fzq0E7m3an6GIMg0Okl_v_y9r3Ytg03Bd1P3NmiUytjtOjYaJUqJXSvdLT_nvvVK/s320/pcmav1.7.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5246577296355503314&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Whats changed and added:&lt;br /&gt;&lt;/span&gt;&lt;ol&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Added, 118 new viruses/variant scanner and cleaner.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Fixed, error of rotine buffering when scanning file.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Added, special cleaner for virus VBScript FourTwoOne.vbs.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Added, special cleaner for virus Windx-Maxtrox that infects EXE file. &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Added, special cleaner for virus Microso that injects DLL file.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Fixed, false alarm heuristik of any program/script.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Updated, name of some virus according new variants found.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Fixed of some minor bugs improvisation internal code of PCMAV Cleaner &amp;amp; PCMAV RealTime Protector.&lt;/span&gt;&lt;/li&gt;&lt;/ol&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;&lt;br /&gt;Download this new PCMAV at &lt;a href=&quot;http://5819705568253.usercash.com&quot;&gt;Here&lt;/a&gt; or &lt;a href=&quot;http://8287320146802.usercash.com/&quot;&gt;Here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://viruscontra.blogspot.com/2008/09/pcmedia-antivirus-17-update.html</link><author>noreply@blogger.com (btvideo)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-Vni89T7ZaKcx6gR5vRiu1QhVyfPPUBeOEQn_tKJ0v_C8mQm7miob4IRSjO55T5ITxEnHUy7reyd7Fzq0E7m3an6GIMg0Okl_v_y9r3Ytg03Bd1P3NmiUytjtOjYaJUqJXSvdLT_nvvVK/s72-c/pcmav1.7.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3659770485807886238.post-578710616838240620</guid><pubDate>Wed, 10 Sep 2008 20:43:00 +0000</pubDate><atom:updated>2008-09-10T13:58:52.269-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Anti Virus</category><title>PCMAV, Free Antivirus from Indonesia</title><description>&lt;span style=&quot;font-family:verdana;&quot;&gt;PCMAV or PCMedia Antivirus now support or compatible with engine Clamav 0.93 (the new generation of antivirus clamav engine). With this engine, Antivirus PCMAV 1.6 capable to scan 3 times more faster than before. Feel the different. PCMAV 1.4 can integrated as usual with engine Clamav 0.93 if your Window OS supported library MSVCRT80 (&lt;span style=&quot;font-style: italic;&quot;&gt;Microsoft.VC80.CRT.manifest, msvcm80.dll, msvcp80.dll, and msvcr80.dll&lt;/span&gt;).&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhyphenhyphenIY0PN8il8i99jtWY6fRDBvCqAtiwQyAUV7WMJ2B4azJZuM3X-xzrUmB4wrwhbGTLWIOv7-tCBMAUFfxhIiOVMi29vu-0_E4JTlisWUTrY9bfGA9WYouSu5RVb8dVZhSz8EGvEvF8kzS/s1600-h/pcmav16.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhyphenhyphenIY0PN8il8i99jtWY6fRDBvCqAtiwQyAUV7WMJ2B4azJZuM3X-xzrUmB4wrwhbGTLWIOv7-tCBMAUFfxhIiOVMi29vu-0_E4JTlisWUTrY9bfGA9WYouSu5RVb8dVZhSz8EGvEvF8kzS/s320/pcmav16.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5244496902971809314&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;And now, PCMAV RTP (Real Time Protection) works more accurate to block any virus from vbscript type. Included in memory: Special virus cleaner added for virus Revublik.vbs and more improvisation...&lt;br /&gt;&lt;br /&gt;Whats changed and added on new version of PCMAV is 1.6 that released on this month:&lt;br /&gt;&lt;/span&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;79 virus cleaner added on local/international/new variant virus in Indonesia. Total 2064 virus.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Bug fixed on engine heuristic.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Wrong detection in several application has been fixed by USB Disk filtering as Virus Suspected.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Bug on engine GetUpdates fixed.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;False alarm fixed on several program or script.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Improvisation, engine heuristic for Virus Suspected (RD). Now more accurate.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Improvisation, user-interface from USB Disk Filtering.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;You can download PCMAV 1.6 for free at &lt;a href=&quot;http://rapidshare.com/files/144210435/PCMAV1.6.zip&quot;&gt;Here&lt;/a&gt; or &lt;a href=&quot;http://www.ziddu.com/download/2132074/PCMAV1.6.zip.html&quot;&gt;Here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://viruscontra.blogspot.com/2008/09/pcmav-free-antivirus-from-indonesia.html</link><author>noreply@blogger.com (btvideo)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhyphenhyphenIY0PN8il8i99jtWY6fRDBvCqAtiwQyAUV7WMJ2B4azJZuM3X-xzrUmB4wrwhbGTLWIOv7-tCBMAUFfxhIiOVMi29vu-0_E4JTlisWUTrY9bfGA9WYouSu5RVb8dVZhSz8EGvEvF8kzS/s72-c/pcmav16.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3659770485807886238.post-1905581374619337641</guid><pubDate>Wed, 10 Sep 2008 19:51:00 +0000</pubDate><atom:updated>2008-09-10T13:02:08.453-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Anti Malware</category><category domain="http://www.blogger.com/atom/ns#">Anti Virus</category><category domain="http://www.blogger.com/atom/ns#">Virus Removal</category><title>Virus W32/Alman and its removal</title><description>&lt;span style=&quot;font-family: verdana;&quot;&gt;Beware of new virus W32/Alman. This malware kind virus is not easy to remove or destroy. This virus, size 40kb, run as windows services and run on windows startup too. The virus infects all write accessible Windows executable files (PE-EXE) on all disks on the victim computer and in accessible network folders once it active.&lt;br /&gt;&lt;br /&gt;AVG Antivirus can not heal this virus, but Grisoft has released the virus removal application for clean it. The removal has 2 files, rmalman.exe and rmalman.nt, so &lt;a href=&quot;http://free.grisoft.com/doc/virus-removal/us/frt/0/ndi/67799&quot;&gt;download&lt;/a&gt; these files and save to one folder. You can run rmalman.exe to scan and clean W32/Alman virus.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://viruscontra.blogspot.com/2008/09/virus-w32alman-and-its-removal.html</link><author>noreply@blogger.com (btvideo)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3659770485807886238.post-4107823104964017690</guid><pubDate>Tue, 09 Sep 2008 21:08:00 +0000</pubDate><atom:updated>2008-09-09T14:13:40.376-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Anti Malware</category><title>Malwarebytes&#39; Anti-Malware 1.27</title><description>&lt;span style=&quot;font-family:verdana;&quot;&gt;Malwarebytes&#39; Anti-Malware is an anti-malware application that can thoroughly remove even the most advanced malware. It includes a number of features, including a built in protection monitor that blocks malicious processes before they even start.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://www.besttechie.net/pix/products/mbam256.png&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px;&quot; src=&quot;http://www.besttechie.net/pix/products/mbam256.png&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Malwarebytes&#39; Anti-Malware monitors every process and stops malicious processes before they even start. The Realtime Protection Module uses our advanced heuristic scanning technology which monitors your system to keep it safe and secure. In addition, we have implemented a threats center which will allow you to keep up to date with the latest malware threats.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://img398.imageshack.us/img398/4898/malwarebytesantimalwarekd2.png&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px;&quot; src=&quot;http://img398.imageshack.us/img398/4898/malwarebytesantimalwarekd2.png&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Malwarebytes&#39; Anti-Malware is considered to be the next step in the detection and removal of malware. We compiled a number of new technologies that are designed to quickly detect, destroy, and prevent malware. Malwarebytes&#39; Anti-Malware can detect and remove malware that even the most well-known Anti-Virus and Anti-Malware applications on the market today cannot.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Key Features:&lt;br /&gt;&lt;/span&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Support for Windows 2000, XP, and Vista.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Light speed quick scanning.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Ability to perform full scans for all drives.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Malwarebytes&#39; Anti-Malware Protection Module. (requires registration)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Database updates released daily.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Quarantine to hold threats and restore them at your convenience.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Ignore list for both the scanner and Protection Module.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Settings to enhance your Malwarebytes&#39; Anti-Malware performance.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;A small list of extra utilities to help remove malware manually.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Multi-lingual support.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Works together with other anti-malware utilities.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Command line support for quick scanning.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Context menu integration to scan files on demand.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;&lt;br /&gt;More info about this product can be reached at &lt;a href=&quot;http://www.malwarebytes.org/&quot;&gt;its site&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://viruscontra.blogspot.com/2008/09/malwarebytes-anti-malware-127.html</link><author>noreply@blogger.com (btvideo)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3659770485807886238.post-7471947679499751220</guid><pubDate>Tue, 09 Sep 2008 20:59:00 +0000</pubDate><atom:updated>2008-09-09T14:08:22.349-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Anti Malware</category><category domain="http://www.blogger.com/atom/ns#">Anti Trojan</category><category domain="http://www.blogger.com/atom/ns#">Anti Virus</category><title>Anti-Trojan Elite 4.1.5</title><description>&lt;span style=&quot;font-family:verdana;&quot;&gt;Anti-Trojan Elite™ (ATE) is a malware remover, it can detect and clean malware in disk or memory. Malware is software designed specifically to damage or disrupt a system, such as a trojan horse, a spyware or a keylogger. ATE contains a Real-Time File Firewall, it monitor system and clean malwares immediately. It is also a system security tools, you can view and control processes and TCP/IP network connections.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuZSEhG7iN24M-73-M7mcXljpRSIrPZGznHf_S4e3_yCoXqatxaNco0k84E9eU8OmLAS4eEcd_Bpw6UUrn8jYiKbTUB_1LL87QmJLTJbbUhBOormlaXwSQe9r-rkgwzPwWNDNNE6JG6pFC/s1600-h/ate1.gif&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuZSEhG7iN24M-73-M7mcXljpRSIrPZGznHf_S4e3_yCoXqatxaNco0k84E9eU8OmLAS4eEcd_Bpw6UUrn8jYiKbTUB_1LL87QmJLTJbbUhBOormlaXwSQe9r-rkgwzPwWNDNNE6JG6pFC/s320/ate1.gif&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5244130763909529586&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Anti Trojan Elite provide a real-time malware firewall for user, once a trojan or keylogger would been loaded, the ATE can detect, block and then clean it in time. The ATE can detect more than 35000 trojans, worms and keyloggers currently, and the number of malware ATE could clean is growing up very quickly, we collect world-wide malwares, user can using our auto live update feature to get the power to clean these new malwares in time.&lt;br /&gt;&lt;br /&gt;Anti Trojan Elite has some useful utilities especially. The network utility can been used to disconnect suspicious TCP connections; The process utility can been used to kill suspicious processes even the process has the system privilege, even it has the ability to unload suspicious modules in all processes; The registry repair utility can been used to repair registry altered by malware; The registry monitor utility can been used to repair any change of important registry keys and values with real time.&lt;br /&gt;&lt;br /&gt;The Reasons Choose Anti-Trojan Elite™:&lt;br /&gt;&lt;/span&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Real-time malware firewall, protecting user&#39;s computer in real-time.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Detecting and cleaning binded malware, doesn&#39;t hurt normal file and clean the malware.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Detecting and cleaning no process malware, some malware don&#39;t have a EXE file, they are only some DLL files and running as some threads in other process, ATE can detect and clean this type of malware even it&#39;s running.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Free tools. View the information of Tcp/Ip states and processes informations.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;&lt;br /&gt;More Features:&lt;br /&gt;&lt;/span&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Disk and memory scan supported.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Real-time malware firewall.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Compressed files (RAR ZIP CAB) scan supported.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Backup module: Backup trojan files before killing.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Network Manager. View the tcp/udp states and the processes they belonged to. User can disconnect any tcp connection and stop the opposite process.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Process manager. View the processes and its DLL modules&#39; information. User can terminate any process and unload any DLL module.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Internet Explorer and registry repair utility.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Updating online supported, and auto check updates when ATE starts.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Real-time registry monitor utility.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;&lt;br /&gt;Anti-Trojan Elite™ works best on Microsoft Windows 98, ME, 2000, XP, 2003 and  VISTA.&lt;br /&gt;More info about Anti-Trojan Elite™ can be reached at &lt;a href=&quot;http://www.remove-trojan.com/&quot;&gt;Here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://viruscontra.blogspot.com/2008/09/anti-trojan-elite-415.html</link><author>noreply@blogger.com (btvideo)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuZSEhG7iN24M-73-M7mcXljpRSIrPZGznHf_S4e3_yCoXqatxaNco0k84E9eU8OmLAS4eEcd_Bpw6UUrn8jYiKbTUB_1LL87QmJLTJbbUhBOormlaXwSQe9r-rkgwzPwWNDNNE6JG6pFC/s72-c/ate1.gif" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3659770485807886238.post-3934980711160475219</guid><pubDate>Tue, 09 Sep 2008 19:56:00 +0000</pubDate><atom:updated>2008-09-09T13:28:21.701-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Knowledge</category><title>The Difference of Virus, Worm and Trojan</title><description>&lt;span style=&quot;font-family:verdana;&quot;&gt;Viruses, worms and Trojan Horses are all malicious programs that can cause damage to your computer, but there are differences among the three, and knowing those differences can help you to better protect your computer from their often damaging effects.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSUUT2OrpMHYTOr47wj7Px05iuLUk0I5e2FRUwT3eHoMOg0wo-TmLOjdu0JACAzAqGyt-T1IzWHRcBgztW1iaQluakNMLGKXHyT_cpn93YdY4WM6sNwhiQIucQPVwSxYlbXPL2j7bqeloC/s1600-h/TrojanWorm.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSUUT2OrpMHYTOr47wj7Px05iuLUk0I5e2FRUwT3eHoMOg0wo-TmLOjdu0JACAzAqGyt-T1IzWHRcBgztW1iaQluakNMLGKXHyT_cpn93YdY4WM6sNwhiQIucQPVwSxYlbXPL2j7bqeloC/s320/TrojanWorm.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5244120851076406034&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;A computer virus attaches itself to a program or file so it can spread from one computer to another, leaving infections as it travels. Much like human viruses, computer viruses can range in severity: Some viruses cause only mildly annoying effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going.  People continue the spread of a computer virus, mostly unknowingly, by sharing infecting files or sending e-mails with viruses as attachments in the e-mail.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRVEhfe5mR1bcNHxyr0SumV7vbm3AAtB4H8UUXAaMAhhgAGzEGzabgiDdEy-0UKqo06N6uWW9Hn1IzWz6yLjwDLrgMejzUTnEsaedOpO9ug0xyx5DOsj9GryYCimY5ozdnHxZ-PQvpxwJw/s1600-h/worm.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRVEhfe5mR1bcNHxyr0SumV7vbm3AAtB4H8UUXAaMAhhgAGzEGzabgiDdEy-0UKqo06N6uWW9Hn1IzWz6yLjwDLrgMejzUTnEsaedOpO9ug0xyx5DOsj9GryYCimY5ozdnHxZ-PQvpxwJw/s320/worm.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5244121036315298962&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;A worm is similar to a virus by its design, and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any help from a person. A worm takes advantage of file or information transport features on your system, which allows it to travel unaided. The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect. One example would be for a worm to send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyone listed in each of the receiver&#39;s address book, and the manifest continues on down the line. Due to the copying nature of a worm and its capability to travel across networks the end result in most cases is that the worm consumes too much system memory (or network bandwidth), causing Web servers, network servers and individual computers to stop responding. In more recent worm attacks such as the much-talked-about .Blaster Worm., the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely.&lt;br /&gt;&lt;br /&gt;A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer.  Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source.  When a Trojan is activated on your computer, the results can vary. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.&lt;br /&gt;&lt;br /&gt;Added into the mix, we also have what is called a blended threat. A blended threat is a sophisticated attack that bundles some of the worst aspects of viruses, worms, Trojan horses and malicious code into one threat. Blended threats use server and Internet vulnerabilities to initiate, transmit and spread an attack. This combination of method and techniques means blended threats can spread quickly and cause widespread damage. Characteristics of blended threats include: causes harm, propagates by multiple methods, attacks from multiple points and exploits vulnerabilities.&lt;br /&gt;&lt;br /&gt;To be considered a blended thread, the attack would normally serve to transport multiple attacks in one payload. For examplem it wouldn&#39;t just launch a DoS attack — it would also install a backdoor and damage a local system in one shot. Additionally, blended threats are designed to use multiple modes of transport. For example, a worm may travel through e-mail, but a single blended threat could use multiple routes such as e-mail, IRC and file-sharing sharing networks. The actual attack itself is also not limited to a specific act. For example, rather than a specific attack on predetermined .exe files, a blended thread could modify exe files, HTML files and registry keys at the same time — basically it can cause damage within several areas of your network at one time.&lt;br /&gt;&lt;br /&gt;Blended threats are considered to be the worst risk to security since the inception of viruses, as most blended threats require no human intervention to propagate.&lt;br /&gt;&lt;/span&gt;</description><link>http://viruscontra.blogspot.com/2008/09/difference-of-virus-worm-and-trojan.html</link><author>noreply@blogger.com (btvideo)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSUUT2OrpMHYTOr47wj7Px05iuLUk0I5e2FRUwT3eHoMOg0wo-TmLOjdu0JACAzAqGyt-T1IzWHRcBgztW1iaQluakNMLGKXHyT_cpn93YdY4WM6sNwhiQIucQPVwSxYlbXPL2j7bqeloC/s72-c/TrojanWorm.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3659770485807886238.post-4284720661289367762</guid><pubDate>Tue, 09 Sep 2008 19:34:00 +0000</pubDate><atom:updated>2008-09-09T12:41:52.254-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Knowledge</category><title>Most Methods of Virus Code</title><description>&lt;span style=&quot;font-family:verdana;&quot;&gt;A virus needs to infect hosts in order to spread further. In some cases, it might be a bad idea to infect a host program. For example, many anti-virus programs perform an integrity check of their own code. Infecting such programs will therefore increase the likelihood that the virus is detected. For this reason, some viruses are programmed not to infect programs that are known to be part of anti-virus software. Another type of host that viruses sometimes avoid is bait files. Bait files (or goat files) are files that are specially created by anti-virus software, or by anti-virus professionals themselves, to be infected by a virus. These files can be created for various reasons, all of which are related to the detection of the virus:&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdhPlFqY_PQ5t6fsLb4l8B2rigDgWZqokuPCuxvrYUabF-8Ab1Y0587q1uuqhz6s5f-j12XRirigSc6p5eCmojQe2FfcY55i429emMDhBd15TrLkmARXUg1Hx0r7zdgTij_AzXzaFTJSeD/s1600-h/method-computer_virus.gif&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdhPlFqY_PQ5t6fsLb4l8B2rigDgWZqokuPCuxvrYUabF-8Ab1Y0587q1uuqhz6s5f-j12XRirigSc6p5eCmojQe2FfcY55i429emMDhBd15TrLkmARXUg1Hx0r7zdgTij_AzXzaFTJSeD/s320/method-computer_virus.gif&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5244108848405777490&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Anti-virus professionals can use bait files to take a sample of a virus (i.e. a copy of a program file that is infected by the virus). It is more practical to store and exchange a small, infected bait file, than to exchange a large application program that has been infected by the virus.&lt;br /&gt;&lt;br /&gt;Anti-virus professionals can use bait files to study the behavior of a virus and evaluate detection methods. This is especially useful when the virus is polymorphic. In this case, the virus can be made to infect a large number of bait files. The infected files can be used to test whether a virus scanner detects all versions of the virus.&lt;br /&gt;&lt;br /&gt;Some anti-virus software employs bait files that are accessed regularly. When these files are modified, the anti-virus software warns the user that a virus is probably active on the system.&lt;br /&gt;&lt;br /&gt;Since bait files are used to detect the virus, or to make detection possible, a virus can benefit from not infecting them. Viruses typically do this by avoiding suspicious programs, such as small program files or programs that contain certain patterns of &#39;garbage instructions&#39;.&lt;br /&gt;&lt;br /&gt;A related strategy to make baiting difficult is sparse infection. Sometimes, sparse infectors do not infect a host file that would be a suitable candidate for infection in other circumstances. For example, a virus can decide on a random basis whether to infect a file or not, or a virus can only infect host files on particular days of the week.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Stealth&lt;/span&gt;&lt;br /&gt;Some viruses try to trick anti-virus software by intercepting its requests to the operating system. A virus can hide itself by intercepting the anti-virus software’s request to read the file and passing the request to the virus, instead of the OS. The virus can then return an uninfected version of the file to the anti-virus software, so that it seems that the file is &quot;clean&quot;. Modern anti-virus software employs various techniques to counter stealth mechanisms of viruses. The only completely reliable method to avoid stealth is to boot from a medium that is known to be clean.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Self-modification&lt;/span&gt;&lt;br /&gt;Most modern antivirus programs try to find virus-patterns inside ordinary programs by scanning them for so-called virus signatures. A signature is a characteristic byte-pattern that is part of a certain virus or family of viruses. If a virus scanner finds such a pattern in a file, it notifies the user that the file is infected. The user can then delete, or (in some cases) &quot;clean&quot; or &quot;heal&quot; the infected file. Some viruses employ techniques that make detection by means of signatures difficult but probably not impossible. These viruses modify their code on each infection. That is, each infected file contains a different variant of the virus.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Encryption with a variable key&lt;/span&gt;&lt;br /&gt;A more advanced method is the use of simple encryption to encipher the virus. In this case, the virus consists of a small decrypting module and an encrypted copy of the virus code. If the virus is encrypted with a different key for each infected file, the only part of the virus that remains constant is the decrypting module, which would (for example) be appended to the end. In this case, a virus scanner cannot directly detect the virus using signatures, but it can still detect the decrypting module, which still makes indirect detection of the virus possible. Since these would be symmetric keys, stored on the infected host, it is in fact entirely possible to decrypt the final virus, but that probably isn&#39;t required, since self-modifying code is such a rarity that it may be reason for virus scanners to at least flag the file as suspicious.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMUkt6n7AMZUoYcrL4qb4XO7vJTjU25HNUHntkKO9QDFwKeWnUcPuwAoH7YdEq8XHVE80Fh4FCUnnVZ3P4oRcJDThA9mbZFmTtfTdSXB5P5kvIqU-Ar3pQ4EB0pcz0NjHfZMUWCqEgEFWg/s1600-h/method-computer-virus.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMUkt6n7AMZUoYcrL4qb4XO7vJTjU25HNUHntkKO9QDFwKeWnUcPuwAoH7YdEq8XHVE80Fh4FCUnnVZ3P4oRcJDThA9mbZFmTtfTdSXB5P5kvIqU-Ar3pQ4EB0pcz0NjHfZMUWCqEgEFWg/s320/method-computer-virus.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5244109036719151810&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;An old, but compact, encryption involves XORing each byte in a virus with a constant, so that the exclusive-or operation had only to be repeated for decryption. It is suspicious code that modifies itself, so the code to do the encryption/decryption may be part of the signature in many virus definitions.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Polymorphic code&lt;/span&gt;&lt;br /&gt;Polymorphic code was the first technique that posed a serious threat to virus scanners. Just like regular encrypted viruses, a polymorphic virus infects files with an encrypted copy of itself, which is decoded by a decryption module. In the case of polymorphic viruses however, this decryption module is also modified on each infection. A well-written polymorphic virus therefore has no parts which remain identical between infections, making it very difficult to detect directly using signatures. Anti-virus software can detect it by decrypting the viruses using an emulator, or by statistical pattern analysis of the encrypted virus body. To enable polymorphic code, the virus has to have a polymorphic engine (also called mutating engine or mutation engine) somewhere in its encrypted body.&lt;br /&gt;&lt;br /&gt;Some viruses employ polymorphic code in a way that constrains the mutation rate of the virus significantly. For example, a virus can be programmed to mutate only slightly over time, or it can be programmed to refrain from mutating when it infects a file on a computer that already contains copies of the virus. The advantage of using such slow polymorphic code is that it makes it more difficult for anti-virus professionals to obtain representative samples of the virus, because bait files that are infected in one run will typically contain identical or similar samples of the virus. This will make it more likely that the detection by the virus scanner will be unreliable, and that some instances of the virus may be able to avoid detection.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Metamorphic code&lt;/span&gt;&lt;br /&gt;To avoid being detected by emulation, some viruses rewrite themselves completely each time they are to infect new executables. Viruses that use this technique are said to be metamorphic. To enable metamorphism, a metamorphic engine is needed. A metamorphic virus is usually very large and complex. For example, W32/Simile consisted of over 14000 lines of Assembly language code, 90% of which is part of the metamorphic engine.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://viruscontra.blogspot.com/2008/09/most-methods-of-virus-code.html</link><author>noreply@blogger.com (btvideo)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdhPlFqY_PQ5t6fsLb4l8B2rigDgWZqokuPCuxvrYUabF-8Ab1Y0587q1uuqhz6s5f-j12XRirigSc6p5eCmojQe2FfcY55i429emMDhBd15TrLkmARXUg1Hx0r7zdgTij_AzXzaFTJSeD/s72-c/method-computer_virus.gif" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3659770485807886238.post-1886920874101018735</guid><pubDate>Tue, 09 Sep 2008 19:04:00 +0000</pubDate><atom:updated>2008-09-09T12:30:15.732-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Knowledge</category><title>Computer Virus Definition</title><description>&lt;span style=&quot;font-family:verdana;&quot;&gt;A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves. All computer viruses are &lt;span style=&quot;font-style: italic;&quot;&gt;man made&lt;/span&gt;. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://upload.wikimedia.org/wikipedia/commons/7/71/ASM-Virus.PNG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 555px; height: 368px;&quot; src=&quot;http://upload.wikimedia.org/wikipedia/commons/7/71/ASM-Virus.PNG&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Since 1987, when a virus infected ARPANET, a large network used by the Defense Department and many universities, many antivirus programs have become available. These programs periodically check your computer system for the best-known types of viruses.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgirNA-PkXoRPQOsyH4uBd0vrQDYmotFZkzyWXGo612aueD9kw6I5kXjGh94FE9RnmTyYZPOa4JihiUlNqAbsKta2hJILIcaME_eY4S_ViCwxxbtODozi0IbvnzUEtiIIgiWEYz8TT-FFdo/s1600-h/Virus-Computer.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgirNA-PkXoRPQOsyH4uBd0vrQDYmotFZkzyWXGo612aueD9kw6I5kXjGh94FE9RnmTyYZPOa4JihiUlNqAbsKta2hJILIcaME_eY4S_ViCwxxbtODozi0IbvnzUEtiIIgiWEYz8TT-FFdo/s320/Virus-Computer.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5244104364684361362&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Some people distinguish between general viruses and worms. A worm is a special type of virus that can replicate itself and use memory, but cannot attach itself to other programs.&lt;br /&gt;&lt;br /&gt;In order to replicate itself, a virus must be permitted to execute code and write to memory. For this reason, many viruses attach themselves to executable files that may be part of legitimate programs. If a user tries to start an infected program, the virus&#39; code may be executed first. Viruses can be divided into two types, on the basis of their behavior when they are executed.&lt;br /&gt;&lt;br /&gt;Nonresident viruses immediately search for other hosts that can be infected, infect these targets, and finally transfer control to the application program they infected. Resident viruses do not search for hosts when they are started. Instead, a resident virus loads itself into memory on execution and transfers control to the host program. The virus stays active in the background and infects new hosts when those files are accessed by other programs or the operating system itself.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://viruscontra.blogspot.com/2008/09/computer-virus-definition.html</link><author>noreply@blogger.com (btvideo)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgirNA-PkXoRPQOsyH4uBd0vrQDYmotFZkzyWXGo612aueD9kw6I5kXjGh94FE9RnmTyYZPOa4JihiUlNqAbsKta2hJILIcaME_eY4S_ViCwxxbtODozi0IbvnzUEtiIIgiWEYz8TT-FFdo/s72-c/Virus-Computer.jpg" height="72" width="72"/><thr:total>1</thr:total></item></channel></rss>