<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-8739921880945862903</id><updated>2024-12-19T10:30:56.520+07:00</updated><category term="Hot News"/><category term="Method Remove Virus"/><category term="Free Tools"/><category term="Viruses"/><category term="Super TROJAN"/><category term="Zombie Virus"/><category term="software"/><title type='text'>Remove Virus</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://methodremovevirus.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default'/><link rel='alternate' type='text/html' href='http://methodremovevirus.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/10526833191760012422</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>24</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-8739921880945862903.post-327607961318775659</id><published>2015-01-16T12:05:00.001+07:00</published><updated>2015-01-31T06:55:42.421+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="software"/><title type='text'>AVG PC TuneUp Utilities</title><content type='html'>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_sAxAawN3ELzyTFjSchxMwLph4w_GZyXzw6mb_8aknAJVmfTwUv1SBlIt6XXetgWFmoSu6QOHUdbH9wobSN6nWNUke07ZPiBwG7vyC1agBPHc3OwYA7jaOzNLvLDS3clO4bAQSb5iET3t/s1600/images.jpeg&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_sAxAawN3ELzyTFjSchxMwLph4w_GZyXzw6mb_8aknAJVmfTwUv1SBlIt6XXetgWFmoSu6QOHUdbH9wobSN6nWNUke07ZPiBwG7vyC1agBPHc3OwYA7jaOzNLvLDS3clO4bAQSb5iET3t/s320/images.jpeg&quot; id=&quot;BLOGGER_PHOTO_ID_5548625786534837442&quot; style=&quot;cursor: pointer; float: left; height: 225px; margin: 0pt 10px 10px 0pt; width: 225px;&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
AVG PC TuneUp Utilities is a department store program Latest from AVG to  optimize your PC or laptop, fix the problems that affect the  performance of your PC and enjoy your PC running more cepat.Singkirkan  trail that tells your activity and remove the files you want to increase  the speed of your pc.&lt;br /&gt;
&lt;br /&gt;
Fix register problem causing traffic jams and crashes&lt;br /&gt;
&lt;br /&gt;
Registry Cleaner and Registry Perapi&lt;br /&gt;
&lt;br /&gt;
Fix register the scattered and damaged that memory spending, slow down  your application and cause stability problems overall.&lt;br /&gt;
Disk Cleaner scans your hard drive to find files that spend disk space  and slow down your computer. This may include temporary files, Internet  browser cache or a file dump. Registry cleaners scan your registry to  fix problems that cause computers to slow down, freeze or even crash.&lt;a href=&quot;https://www.blogger.com/blogger.g?blogID=8739921880945862903&quot; name=&quot;more&quot;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Optimize your Internet connection&lt;br /&gt;
Internet Optimizer&lt;br /&gt;
&lt;br /&gt;
Internet Optimizer automatically adjust settings for your Internet  connection to speed up your online activities.&lt;br /&gt;
This tool will speed up your Internet connection by optimizing the  arrangement - including the Max MTU and RWIN - especially for the type  of Internet connection you use. In addition, Internet optimizer will  test your connection settings before applying the changes.&lt;br /&gt;
&lt;br /&gt;
Restoring accidentally deleted files&lt;br /&gt;
Recovery files&lt;br /&gt;
&lt;br /&gt;
AVG PC TuneUp comes complete with a file recovery tool so you can  recover files damaged or accidentally deleted in Windows.&lt;br /&gt;
This tool will restore files accidentally deleted or damaged file.  Recovery of files also allows you to see samples of photos and documents  while exploring the list of found files.&lt;br /&gt;
&lt;br /&gt;
Deleting files and cleaning the disk permanently&lt;br /&gt;
Destroyer file and disk sweeper&lt;br /&gt;
&lt;br /&gt;
Deleting a file or folder references eliminate them but did not delete  the actual data stored in files. This means that files that you consider  to have been deleted can be easily restored.&lt;br /&gt;
Destroyer files permanently delete files so that your personal data can  not be recovered. This tool provides four options the destruction  process, which ranged from the destruction process quickly until the  level of military security. Disk cleaning tools can be used to clean the  whole drive and to provide extra security. You can also turn off system  restore while cleaning the disk to ensure there is no copying files  during cleanup.&lt;br /&gt;
&lt;br /&gt;
Protecting your privacy&lt;br /&gt;
Trace eraser&lt;br /&gt;
&lt;br /&gt;
A lot of information about your activity recorded in PCs. Trace eraser  will help you protect your privacy by deleting personal information from  your computer.&lt;br /&gt;
When you surf the Internet, open a document or run a program, your  activities recorded. Trace trace eraser hide this so no one can see  which website you have visited or where the document you just opened.&lt;br /&gt;
&lt;br /&gt;
Increase your disk speed&lt;br /&gt;
Perapi disk and registry&lt;br /&gt;
&lt;br /&gt;
Disk defragmentation optimizes your file system to optimize your hard  drive. Enjoy your hard disks for faster and more stable computer running  smoothly.&lt;br /&gt;
Perapi reorder disk files on your disk so it can be read and written  quickly. It improves application response time, system boot speed and  overall computer performance. The same tool to clean your Windows  registry with re-writing to eliminate fragmentation, the fragmented  space and damage to structures&lt;span class=&quot;fullpost&quot;&gt;    &lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default/327607961318775659'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default/327607961318775659'/><link rel='alternate' type='text/html' href='http://methodremovevirus.blogspot.com/2015/01/avg-pc-tuneup-utilities.html' title='AVG PC TuneUp Utilities'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/10526833191760012422</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_sAxAawN3ELzyTFjSchxMwLph4w_GZyXzw6mb_8aknAJVmfTwUv1SBlIt6XXetgWFmoSu6QOHUdbH9wobSN6nWNUke07ZPiBwG7vyC1agBPHc3OwYA7jaOzNLvLDS3clO4bAQSb5iET3t/s72-c/images.jpeg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-8739921880945862903.post-2183340512639734934</id><published>2013-08-28T00:44:00.001+07:00</published><updated>2015-01-16T12:08:10.153+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hot News"/><category scheme="http://www.blogger.com/atom/ns#" term="Method Remove Virus"/><category scheme="http://www.blogger.com/atom/ns#" term="Super TROJAN"/><category scheme="http://www.blogger.com/atom/ns#" term="Viruses"/><category scheme="http://www.blogger.com/atom/ns#" term="Zombie Virus"/><title type='text'>Trick for AntiVirus Program </title><content type='html'>&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:WordDocument&gt;
  &lt;w:View&gt;Normal&lt;/w:View&gt;
  &lt;w:Zoom&gt;0&lt;/w:Zoom&gt;
  &lt;w:TrackMoves/&gt;
  &lt;w:TrackFormatting/&gt;
  &lt;w:PunctuationKerning/&gt;
  &lt;w:ValidateAgainstSchemas/&gt;
  &lt;w:SaveIfXMLInvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;
  &lt;w:IgnoreMixedContent&gt;false&lt;/w:IgnoreMixedContent&gt;
  &lt;w:AlwaysShowPlaceholderText&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;
  &lt;w:DoNotPromoteQF/&gt;
  &lt;w:LidThemeOther&gt;EN-US&lt;/w:LidThemeOther&gt;
  &lt;w:LidThemeAsian&gt;X-NONE&lt;/w:LidThemeAsian&gt;
  &lt;w:LidThemeComplexScript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;
  &lt;w:Compatibility&gt;
   &lt;w:BreakWrappedTables/&gt;
   &lt;w:SnapToGridInCell/&gt;
   &lt;w:WrapTextWithPunct/&gt;
   &lt;w:UseAsianBreakRules/&gt;
   &lt;w:DontGrowAutofit/&gt;
   &lt;w:SplitPgBreakAndParaMark/&gt;
   &lt;w:DontVertAlignCellWithSp/&gt;
   &lt;w:DontBreakConstrainedForcedTables/&gt;
   &lt;w:DontVertAlignInTxbx/&gt;
   &lt;w:Word11KerningPairs/&gt;
   &lt;w:CachedColBalance/&gt;
  &lt;/w:Compatibility&gt;
  &lt;w:BrowserLevel&gt;MicrosoftInternetExplorer4&lt;/w:BrowserLevel&gt;
  &lt;m:mathPr&gt;
   &lt;m:mathFont m:val=&quot;Cambria Math&quot;/&gt;
   &lt;m:brkBin m:val=&quot;before&quot;/&gt;
   &lt;m:brkBinSub m:val=&quot;&amp;#45;-&quot;/&gt;
   &lt;m:smallFrac m:val=&quot;off&quot;/&gt;
   &lt;m:dispDef/&gt;
   &lt;m:lMargin m:val=&quot;0&quot;/&gt;
   &lt;m:rMargin m:val=&quot;0&quot;/&gt;
   &lt;m:defJc m:val=&quot;centerGroup&quot;/&gt;
   &lt;m:wrapIndent m:val=&quot;1440&quot;/&gt;
   &lt;m:intLim m:val=&quot;subSup&quot;/&gt;
   &lt;m:naryLim m:val=&quot;undOvr&quot;/&gt;
  &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt;
&lt;/xml&gt;&lt;![endif]--&gt;



&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Online Research&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;The main reason for performance
testing antivirus products is that not all antivirus packages are created equal
when it comes to providing PC and web browsing protection, memory usage,
background scanning speeds, virus detection and removal, etc.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Antivirus suites should have at
least the following modules:&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Online Antivirus Scan&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;If you do not have any antivirus
software currently installed on your PC and you have been surfing the web, then
I strongly suggest you scan your system with an online antivirus scanner before
you download and install any trial antivirus suites.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Installed Antivirus Software&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;If you currently have any antivirus
software already installed on your system then this must first be uninstalled
completely and your system restarted before installing any trial antivirus
packages.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Recommended Uninstaller Program&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;After you have downloaded and
installed Revo Uninstaller, use it to uninstall your current antivirus program.
If for some reason, when you go to install an antivirus trial and it will not
install due to some leftover files from the previous antivirus program then
download the previous installed antivirus programs removal utility from the
vendor&#39;s web site and run it.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;N.B. Restart your computer after you
have uninstalled the antivirus program.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;System Resource Usage&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;How to Check System Resource Usage&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;This screen shows memory and CPU
usage of your computer.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Once you have noted the memory and
CPU usage without the trial software installed on your system you can now go
ahead and install the trial antivirus package.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;You then need to run a full
antivirus scan of your system and repeat the memory and CPU check while the
antivirus scan is running. Again, note the memory and CPU usage.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Once you have completed your testing
of the first antivirus trial suite, uninstall it as per the instructions above
with the Revo Uninstaller program and repeat the testing process for the other
antivirus trial suite software you have downloaded.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Results&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;If your PC performed badly with all
of the antivirus trial software, the memory cannot be upgraded and you ran the
Advanced System Care before testing the trial software then your system may
require a re-installation of the operating system. &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;The need for antivirus protection is
of paramount concern for virtually all PC users.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;First Things First: What IS a Computer
Virus?&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;A computer virus is just one of
three types of programs known as &quot;maliceware&quot;. Most antivirus
programs are designed to detect and defend your PC from all three threats.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;What Does an Antivirus Program Do?&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Antivirus programs take two common
approaches to recognize threats to your computer.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;1. Signature Detection: Via
Signature Detection an antivirus application scans your computer, drives and
storage devices for files that contain a code it recognizes as a virus variant.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Antivirus applications that scan for
potential computer virus activity can be more useful at detecting the latest
threats than those reliant on signature detection. Most of today&#39;s
&quot;solid&quot; antivirus programs utilize a combination of both signature
detection and virus activity to protect your computer against threats.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;How to Choose the Antivirus Program
that is Right for You.&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Risk generally equates to your
computers exposure to outside applications, files or connections. If you were
to operate a computer that would never come into contact with any program or
file not manufactured by a secure source, then you have virtually no need for
an Antivirus application. There are many good antivirus programs that will fit
this need available as shareware - a free download - throughout the internet.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Antivirus software manufactured for
business and home can be two very different applications both in cost and
effectiveness. Home versions generally cost less and come with fewer options
than business based antivirus programs. Most corporate versions of antivirus
applications allow for a central point of control over entire networks. Protection
can be divided between internet or application servers and individual PCs. Exchange/mail
and internet server protection is a must, as well as protection for
mission-critical file and application servers. Usually business antivirus
programs come as a server based application. Clients, or additional licenses,
are purchased for each computer or user that connects to the antivirus server.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;With Regard to the Antivirus Program
Itself:&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;The best antivirus manufacturers
release updates on a daily basis and often offer updates to their programs on a
real-time, as needed basis. The ability for an antivirus software manufacturer
to release constant, and relevant, updates to their programs should be of great
concern to the user. - Just like all applications and operating systems,
antivirus applications will use your computers processing power, memory and
storage space to function. &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:LatentStyles DefLockedState=&quot;false&quot; DefUnhideWhenUsed=&quot;true&quot;
  DefSemiHidden=&quot;true&quot; DefQFormat=&quot;false&quot; DefPriority=&quot;99&quot;
  LatentStyleCount=&quot;267&quot;&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;0&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Normal&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;heading 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 7&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 8&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 9&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 7&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 8&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 9&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;35&quot; QFormat=&quot;true&quot; Name=&quot;caption&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;10&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Title&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;1&quot; Name=&quot;Default Paragraph Font&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;11&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Subtitle&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;22&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Strong&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;20&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Emphasis&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;59&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Table Grid&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; UnhideWhenUsed=&quot;false&quot; Name=&quot;Placeholder Text&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;1&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;No Spacing&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; UnhideWhenUsed=&quot;false&quot; Name=&quot;Revision&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;34&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;List Paragraph&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;29&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Quote&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;30&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Intense Quote&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;19&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Subtle Emphasis&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;21&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Intense Emphasis&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;31&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Subtle Reference&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;32&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Intense Reference&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;33&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Book Title&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;37&quot; Name=&quot;Bibliography&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; QFormat=&quot;true&quot; Name=&quot;TOC Heading&quot;/&gt;
 &lt;/w:LatentStyles&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
 {mso-style-name:&quot;Table Normal&quot;;
 mso-tstyle-rowband-size:0;
 mso-tstyle-colband-size:0;
 mso-style-noshow:yes;
 mso-style-priority:99;
 mso-style-qformat:yes;
 mso-style-parent:&quot;&quot;;
 mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
 mso-para-margin-top:0cm;
 mso-para-margin-right:0cm;
 mso-para-margin-bottom:10.0pt;
 mso-para-margin-left:0cm;
 line-height:115%;
 mso-pagination:widow-orphan;
 font-size:11.0pt;
 font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;
 mso-ascii-font-family:Calibri;
 mso-ascii-theme-font:minor-latin;
 mso-fareast-font-family:&quot;Times New Roman&quot;;
 mso-fareast-theme-font:minor-fareast;
 mso-hansi-font-family:Calibri;
 mso-hansi-theme-font:minor-latin;}
&lt;/style&gt;
&lt;![endif]--&gt;&lt;span class=&quot;fullpost&quot;&gt;


    &lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default/2183340512639734934'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default/2183340512639734934'/><link rel='alternate' type='text/html' href='http://methodremovevirus.blogspot.com/2013/08/trick-for-antivirus-program.html' title='Trick for AntiVirus Program '/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/10526833191760012422</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-8739921880945862903.post-120462119026852566</id><published>2012-07-10T03:01:00.000+07:00</published><updated>2012-07-10T03:04:43.623+07:00</updated><title type='text'>Flame, Super Sophisticated computer viruses and dangerous attack Iran</title><content type='html'>&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;en&quot;&gt;&lt;span class=&quot;hps&quot;&gt;&lt;/span&gt;&lt;span class=&quot;hps&quot;&gt;Kaspersky&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Lab&lt;/span&gt;, &lt;span class=&quot;hps&quot;&gt;is conducting&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;an investigation&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;with&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;a&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;new&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;computer&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;virus&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;that was mentioned&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;the most&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;sophisticated in the world&lt;/span&gt;. &lt;span class=&quot;hps&quot;&gt;The virus&lt;/span&gt;, dubbed the &lt;span class=&quot;hps atn&quot;&gt;&quot;&lt;/span&gt;&lt;span class=&quot;&quot;&gt;Flame&lt;/span&gt;&lt;span class=&quot;&quot;&gt;&quot;&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;is intended to attack&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Iran&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;and&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;several countries&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;in&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;the Middle&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;East&lt;/span&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLqahBvUMkqNc8pMmjtBKYXG9qcFOK-DLmUel1HFD1HAHYFw9gLahhyphenhyphen6tArwWXe5ta87-Z3bMrkn6cza0x0iuABFBtBt5GxIw_AwY7j-7jd7UZFgrbV2TahOLcPDmK_i_Coz-oUnZzN_dY/s1600/Flame.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLqahBvUMkqNc8pMmjtBKYXG9qcFOK-DLmUel1HFD1HAHYFw9gLahhyphenhyphen6tArwWXe5ta87-Z3bMrkn6cza0x0iuABFBtBt5GxIw_AwY7j-7jd7UZFgrbV2TahOLcPDmK_i_Coz-oUnZzN_dY/s1600/Flame.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;en&quot;&gt;&lt;/span&gt;&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;en&quot;&gt;&lt;span class=&quot;hps&quot;&gt;Kaspersky&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;party&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;suspected&lt;/span&gt;&lt;span class=&quot;&quot;&gt;,&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;the virus is&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;made ​​by the government&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;of a country&lt;/span&gt;. &lt;span class=&quot;hps&quot;&gt;The complexity&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;to&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Kapsersky&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;own&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;needs help&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;to&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;cope with&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;this&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;virus&lt;/span&gt;&lt;span class=&quot;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;en&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;en&quot;&gt;&lt;span class=&quot;hps&quot;&gt;Kaspersky&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;suspect&lt;/span&gt;&lt;span class=&quot;&quot;&gt;,&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;the virus is&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;made ​​by the government&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;of a country&lt;/span&gt;. &lt;span class=&quot;hps&quot;&gt;Viruses&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;are tricky to&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;overcome,&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;so&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Kapsersky&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;need help&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;to cope with&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;this&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;virus&lt;/span&gt;&lt;span class=&quot;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;en&quot;&gt;&lt;span class=&quot;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;en&quot;&gt;&lt;span class=&quot;hps&quot;&gt;Reported,&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;the new&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;virus&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;code&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;has a size of&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;20-fold&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;compared to&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;the size of the&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;majority of&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;malicious&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;software&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;programs&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;generally&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;include&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Stuxnet&lt;/span&gt;. &lt;span class=&quot;hps&quot;&gt;Worse&lt;/span&gt;, &lt;span class=&quot;hps&quot;&gt;the new&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;virus&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;is&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;suspected to&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;have been circulating&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;since&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;last&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;five&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;years&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;and&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;infect&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;a computer&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;in&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Iran&lt;/span&gt;, &lt;span class=&quot;hps&quot;&gt;Israel&lt;/span&gt;, &lt;span class=&quot;hps&quot;&gt;Sudan&lt;/span&gt;, &lt;span class=&quot;hps&quot;&gt;Syria&lt;/span&gt;, &lt;span class=&quot;hps&quot;&gt;and&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Egypt&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;as well&lt;/span&gt;&lt;span class=&quot;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;en&quot;&gt;&lt;span class=&quot;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;en&quot;&gt;&lt;span class=&quot;hps&quot;&gt;Iran&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;has repeatedly accused&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Western countries and&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Israel&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;to make&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;malicious programs&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;to&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;attack them&lt;/span&gt;. &lt;span class=&quot;hps&quot;&gt;In addition to&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Stuxnet&lt;/span&gt;, &lt;span class=&quot;hps&quot;&gt;other&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;malicious&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;programs&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;that&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;have&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;hit&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Iran&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;is&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Duqu&lt;/span&gt;&lt;span class=&quot;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;en&quot;&gt;&lt;span class=&quot;hps&quot;&gt;Some of&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;these viruses&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;such as&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;the ability&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;to collect&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;confidential data&lt;/span&gt;, &lt;span class=&quot;hps&quot;&gt;change the settings&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;in&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;remote&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;computer&lt;/span&gt;, &lt;span class=&quot;hps&quot;&gt;turn on&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;a computer&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;microphone&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;to&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;record conversations&lt;/span&gt;, &lt;span class=&quot;hps&quot;&gt;take a&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;screenshot&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;and&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;copy the&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;conversation&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;in&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;instant&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;messaging.&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Israel&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;accused of&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;being&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;behind&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;this&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;after&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Kaspersky&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;detects&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;virus&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;infection&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;in&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;several&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Middle Eastern countries&lt;/span&gt;. &lt;span class=&quot;hps&quot;&gt;This was confirmed&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;a statement by&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Israel&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;in the&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;American&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;observer&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;states&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Flame&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;is part&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;of the&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;action of&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;the Jewish state&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;cyber&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;warfare&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;en&quot;&gt;&lt;span class=&quot;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;


    &lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default/120462119026852566'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default/120462119026852566'/><link rel='alternate' type='text/html' href='http://methodremovevirus.blogspot.com/2012/07/flame-super-sophisticated-computer.html' title='Flame, Super Sophisticated computer viruses and dangerous attack Iran'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/10526833191760012422</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLqahBvUMkqNc8pMmjtBKYXG9qcFOK-DLmUel1HFD1HAHYFw9gLahhyphenhyphen6tArwWXe5ta87-Z3bMrkn6cza0x0iuABFBtBt5GxIw_AwY7j-7jd7UZFgrbV2TahOLcPDmK_i_Coz-oUnZzN_dY/s72-c/Flame.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-8739921880945862903.post-1459537326193969308</id><published>2012-07-10T02:44:00.001+07:00</published><updated>2012-07-10T02:44:51.332+07:00</updated><title type='text'>5 Kick-Ass New Virus Attacks</title><content type='html'>&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;en&quot;&gt;&lt;span class=&quot;hps&quot;&gt;Many&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;new&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;ways&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;that&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;do&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;hackers&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;to&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;spread viruses&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;in cyberspace&lt;/span&gt;&lt;span&gt;.&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Here are&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;some&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;new type of attack&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;that was launched&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;by&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Kaspersky&lt;/span&gt;&lt;span class=&quot;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;en&quot;&gt;&lt;span class=&quot;hps&quot;&gt;In&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;April 2012&lt;/span&gt;&lt;span&gt;,&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;reported&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;700 thousand&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Mac OS&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;X&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;computers&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;worldwide are infected with&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Trojan&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Flashback&lt;/span&gt;&lt;span&gt;.&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Infected computers&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;to be combined into&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;a&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;botnet&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;that&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;was given&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Flashfake&lt;/span&gt;&lt;span class=&quot;&quot;&gt;, allowing&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;cybercriminals&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;to add&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;other malicious&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;module&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;into&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;the&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;computer&lt;/span&gt;&lt;span class=&quot;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;en&quot;&gt;&lt;span class=&quot;hps&quot;&gt;Way&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;is&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;quite unique&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;and&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;relatively new&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;in cyberspace&lt;/span&gt;&lt;span&gt;.&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Even&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Flashfake&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;attack&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;had begun&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;seeping into the&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;WordPress&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;blog&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;in late&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;February to early&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;March 2012&lt;/span&gt;&lt;span&gt;.&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;About 85&lt;/span&gt;&lt;span class=&quot;&quot;&gt;%&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;of&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;these blogs&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;are in the United&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;States&lt;/span&gt;&lt;span&gt;.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;en&quot;&gt;&lt;span class=&quot;hps&quot;&gt;Here is&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;another&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;type of&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;attack&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;is&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;also very&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;dangerous&lt;/span&gt;&lt;span&gt;.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;en&quot;&gt;&lt;span class=&quot;hps&quot;&gt;Blackhole&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Exploit&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Kit&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;en&quot;&gt;&lt;span&gt;&lt;b&gt; &lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;en&quot;&gt;&lt;span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;
&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;en&quot;&gt;&lt;span class=&quot;hps&quot;&gt;Kaspersky&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Lab&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;reported the&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;presence of&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;two&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;activities&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;that use&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Spam&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Blackhole&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Exploit&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Kit&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;to&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;install&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;malware&lt;/span&gt;&lt;span class=&quot;&quot;&gt;.&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;The first&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;occurrence&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;is found&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;on Twitter&lt;/span&gt;&lt;span&gt;, where more&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;than 500&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;infected&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;accounts&lt;/span&gt;&lt;span&gt;.&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;en&quot;&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;en&quot;&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;en&quot;&gt;&lt;span class=&quot;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;en&quot;&gt;&lt;span class=&quot;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;en&quot;&gt;&lt;span class=&quot;hps&quot;&gt;Activity&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;is&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;sending&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;spam&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;to the users&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;twitter&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;link&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;that directs&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;them&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;to&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;malicious sites&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;that have&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Blackhole&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Exploit&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Kit&lt;/span&gt;&lt;span class=&quot;&quot;&gt;,&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;then&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;the site&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;will be installing&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;scareware&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;into the computer&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;in the form of&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;fake&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;anti-virus&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;notification&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;is&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;sent&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;to&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;computer&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;users&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;scan&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;their&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;systems&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;to&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;look for&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;infection&lt;/span&gt;&lt;span class=&quot;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;en&quot;&gt;&lt;span class=&quot;hps&quot;&gt;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;h3 class=&quot;mb10&quot;&gt;
Email Phishing&lt;/h3&gt;
&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;en&quot;&gt;&lt;span class=&quot;hps&quot;&gt;This method is&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;actually&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;quite&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;old school&lt;/span&gt;&lt;span&gt;,&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;but&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;now&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;increasingly&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;enhanced by&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;various acts of&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;deception&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;that&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;spit&lt;/span&gt;&lt;span class=&quot;&quot;&gt;.&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;One&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;case in point&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;occurred&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;in late&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;March&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;when&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;many&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;users&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;receive&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;a spoofed email&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;U.S.&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Airways&lt;/span&gt;&lt;span&gt;.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt; &lt;span class=&quot;hps&quot;&gt;The cyber criminals&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;phishing&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;email&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;in an effort&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;to&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;deceive&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;the people&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;are&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;clicking&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;on the&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;email&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;sent&lt;/span&gt;&lt;span&gt;.&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;The&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;link&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;offers a&lt;/span&gt; &lt;span class=&quot;hps atn&quot;&gt;&#39;&lt;/span&gt;&lt;span class=&quot;&quot;&gt;reservation details&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;online&lt;/span&gt;&lt;span&gt;&#39;&lt;/span&gt;&lt;span&gt;,&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;including a choice of&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;check&lt;/span&gt;&lt;span&gt;-in&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;flight&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;with&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;U.S.&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Airways&lt;/span&gt;&lt;span&gt;.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt; &lt;span class=&quot;hps&quot;&gt;If a link&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;is&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;clicked,&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;the&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;user&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;will be redirected to&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;a fake&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;website&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;which&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;contains the&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Blackhole&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Exploit&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Kit&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;contains a&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;banking&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;malware&lt;/span&gt;&lt;span&gt;.&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Banking&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;malware&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;will&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;install itself&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;into the computer&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;and&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;steal&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;confidential data&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;online&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;banking&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;users&lt;/span&gt;&lt;span&gt;.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt; &lt;span class=&quot;hps&quot;&gt;These&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;spam&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;messages&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;sent in bulk&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;while&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;the criminals&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;the&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;people who will be&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;waiting&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;to book&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;flights&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;with U.S.&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Airways&lt;/span&gt;&lt;span&gt;,&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;and&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;directing&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;them to click&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;a link&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;in the&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;email&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;you send.&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;mobilize&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;them&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;to&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;malicious sites&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;that have&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Blackhole&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Exploit&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Kit&lt;/span&gt;&lt;span&gt;,&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;then&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;the site&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;will be installing&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;scareware&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;into the computer&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;in the form of&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;fake&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;anti-virus&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;notification&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;is&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;sent&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;to&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;computer&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;users&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;scan&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;their&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;systems&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;to&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;look for&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;infection&lt;/span&gt;&lt;span&gt;.&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;en&quot;&gt;&lt;span class=&quot;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;en&quot;&gt;&lt;span class=&quot;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;h3 class=&quot;mb10&quot;&gt;
Malware Ponsel&lt;/h3&gt;
&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;en&quot;&gt;&lt;span class=&quot;hps&quot;&gt;Early April&lt;/span&gt;&lt;span&gt;,&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;a&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;new&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;type of&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Android&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;malware&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;found&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;in&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Japan&lt;/span&gt;&lt;span&gt;.&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Unfortunately,&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;the&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;incidence&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;in&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Japan&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;is&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;nearly 30&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;malicious applications&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;are available&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;on&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Google&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Play&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;and&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;at least&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;70 thousand&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;users have&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;downloaded&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;one&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;of&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;30&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;such applications&lt;/span&gt;&lt;span&gt;.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt; &lt;span class=&quot;hps&quot;&gt;Malware&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;of this type&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;can be&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;connected&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;to a&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;server&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;that has been&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;determined.&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;If a&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;connection&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;occurs&lt;/span&gt;&lt;span&gt;,&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;the malware&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;will&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;download the&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;MP4&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;video&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;file&lt;/span&gt;&lt;span&gt;.&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;This malware is&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;also&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;capable of stealing&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;confidential&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;information&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;from&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;the infected&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;device&lt;/span&gt;&lt;span&gt;,&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;including&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;contact names&lt;/span&gt;&lt;span&gt;,&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;email&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;addresses&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;and&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;a list of&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;telephone&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;numbers&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;available&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;in&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;the&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Android&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;device&lt;/span&gt;&lt;span class=&quot;&quot;&gt;.&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Kaspersky&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Mobile&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Security&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;detects&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;this&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;malware&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;as&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Trojan.AndroidOS.FakeTimer&lt;/span&gt;&lt;span class=&quot;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;en&quot;&gt;&lt;span class=&quot;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h3 class=&quot;mb10&quot;&gt;
TigerBot&lt;/h3&gt;
&lt;div class=&quot;mb10&quot; style=&quot;font-weight: normal;&quot;&gt;
&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;en&quot;&gt;&lt;span class=&quot;hps&quot;&gt;Another&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;type of attack&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;that strikes&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;a smart phone&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;users&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;are&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;TigerBot&lt;/span&gt;&lt;span&gt;,&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;malware&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;is&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;controlled&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;via&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;short messages&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;are increasingly popular&lt;/span&gt;&lt;span&gt;.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt; &lt;span class=&quot;hps&quot;&gt;Some&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;time ago&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;this&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;malware&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;infects&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;a number of&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;devices&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;found&lt;/span&gt;&lt;span&gt;.&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Remarkably&lt;/span&gt;&lt;span&gt;,&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;these malicious programs&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;do not&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;perform&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;any suspicious&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;activity&lt;/span&gt;&lt;span&gt;.&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;But&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;if&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;there are&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;further&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;examined&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;various commands&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;allow&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;cyber criminals&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;to record&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;phone&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;conversations&lt;/span&gt;&lt;span&gt;,&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;stealing&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;GPS&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;coordinates&lt;/span&gt;&lt;span&gt;, text&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;or&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;change the&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;network configuration&lt;/span&gt;&lt;span&gt;.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt; &lt;span class=&quot;hps&quot;&gt;Fortunately&lt;/span&gt;&lt;span&gt;,&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;this&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;malware&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;is not&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;up to&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Google&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;meyambangi&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Play&lt;/span&gt;&lt;span&gt;.&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;However&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;the&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;owner of the phone&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;should&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;still be careful&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;when&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;installing&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;the application&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;from anywhere&lt;/span&gt;&lt;span&gt;.&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Kaspersky&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Mobile&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Security&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;detects&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;this&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;malware&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;as&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Backdoor.AndoidOS.TigerBot&lt;/span&gt;&lt;span&gt;.&lt;/span&gt;&lt;/span&gt; &lt;/div&gt;
&lt;div class=&quot;mb10&quot; style=&quot;font-weight: normal;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;mb10&quot; style=&quot;font-weight: normal;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;mb10&quot; style=&quot;font-weight: normal;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;en&quot;&gt;&lt;span class=&quot;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;


    &lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default/1459537326193969308'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default/1459537326193969308'/><link rel='alternate' type='text/html' href='http://methodremovevirus.blogspot.com/2012/07/5-kick-ass-new-virus-attacks.html' title='5 Kick-Ass New Virus Attacks'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/10526833191760012422</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-8739921880945862903.post-6310659838056510068</id><published>2011-08-25T00:22:00.004+07:00</published><updated>2011-08-25T20:20:17.557+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Method Remove Virus"/><title type='text'>Remove virus manually</title><content type='html'>When a virus is active in a PC before what that ago is to worry itself of disattivare the programs for the emergency and the antivirus in primis. For this reason it turns out obvious that in order to remove a virus it must take part in various way.
&lt;br /&gt;
&lt;br /&gt;
Like removing a virus manually
&lt;br /&gt;
&lt;br /&gt;
If it were decided to take part with the manual removal, must keep in mind who will go itself to take part in the registry; therefore it must be aware of the risks and of what it is being made. Generally a virus when it is active has a process in memory and inserts a key in the registry for autoattivarsi to every start, therefore once removed (e) this key (you) enough then to remove the rows inserted from the present virus and if to&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt; disabilitare the System present Restore in win Me and Win XP. The question that is made is the following one: How I recognize the process of the virus and the key of the registry? The answer is simple, enough to visit the sites of the TrendMicro, Symantec, etc and to try own present virus. Of this reason I have inserted a search engine for virus of the TrendMicro in order to render the search of the virus easy. Like already said if in a PC c&#39; it is a virus is present a process in memory and keys in the registry. We suppose of being by now infects from the MsBlast.A virus much famous one. In the information of the TrendMicro besides an introduction of the virus with the characteristics the Solution section is present:
&lt;br /&gt;
&lt;br /&gt;
Here they come exposed the two methods of disinfestazione, first (AUTOMATIC REMOVAL INSTRUCTIONS) through the Tool Trend Microcleaner and according to through a manual removal (MANUAL REMOVAL INSTRUCTIONS). The steps that are completed in the manual removal are always the same ones, that is change only to the actors the viruses but even if it is not comprised well. It’s The procedure for the other viruses the method is the same one:
&lt;br /&gt;
&lt;br /&gt;
In the manual removal Trend Micro it begins thus:
&lt;br /&gt;
Terminating the Malware Program
&lt;br /&gt;
This procedure terminates the running malware process from memory.
&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;Open Windows Task Manager, press CTRL+SHIFT+ESC, and click the Processes tab.&lt;/li&gt;
&lt;li&gt; In the list of running programs, locate the process: MSBLAST.EXE&lt;/li&gt;
&lt;li&gt; Select the malware process, then press the End Process button.&lt;/li&gt;
&lt;li&gt;To check if the malware process has been terminated, close Task Manager, and then open it again.&lt;/li&gt;
&lt;li&gt;Close Task Manager
&lt;/li&gt;
&lt;/ol&gt;
&lt;br /&gt;
Note: Windows 98 /Me does not allow to see all the processes in the Task manager therefore is necessary to use a program of third parts as ProceXP9x
&lt;br /&gt;
Successive step :
&lt;br /&gt;
Removing Autostart Entries from the Registry
&lt;br /&gt;
Removing autostart entries from the registry prevents the malware from executing during startup.
&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;Open Registry Editor. To do this, click Start&amp;amp;gt;Run, type Regedit, then press Enter.&lt;/li&gt;
&lt;li&gt;In the left panel, double-click the following:HKEY_LOCAL_MACHINE&amp;amp;gt;Software&amp;amp;gt;Microsoft&amp;amp;gt;Windows&amp;amp;gt;CurrentVersion&amp;amp;gt;Run&lt;/li&gt;
&lt;li&gt;In the right panel, locate and delete the entry:&quot;windows auto update&quot; = MSBLAST.EXE&lt;/li&gt;
&lt;li&gt;Close Registry Editor.
&lt;/li&gt;
&lt;/ol&gt;
NOTE: If you were not able to terminate the malware process from memory as described in the previous procedure, restart your system.
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default/6310659838056510068'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default/6310659838056510068'/><link rel='alternate' type='text/html' href='http://methodremovevirus.blogspot.com/2011/08/emove-virus-manually.html' title='Remove virus manually'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/10526833191760012422</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-8739921880945862903.post-4485320940637731740</id><published>2011-08-24T23:46:00.000+07:00</published><updated>2011-08-24T23:48:04.360+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Viruses"/><title type='text'>Dangerous Virus In Ambush On The Mail</title><content type='html'>&lt;div id=&quot;result&quot;&gt;&lt;div style=&quot;padding:0.6em;&quot;&gt;ATTENTION TO THE VIRUSES!  An email circulates on Internet that offers the possibility to be  connected to sites for the video vision porno. Draft of a virus that s&#39;  he inserts in the rubrica of the e-mail case, and king sends to all the  addresses. The mail, apparently innocuous, contains a simple connection  to an attached pdf.  Once opened l&#39; attached, the virus is extended to the other contacts.  The main difference with the other viruses, is that the mail does not  demand a download from other sites but is autoinstallante. Insomma  enough to open it is the damage is made.  &lt;/div&gt;&lt;/div&gt; 	 	  	  	  	 &lt;span class=&quot;fullpost&quot;&gt;    &lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default/4485320940637731740'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default/4485320940637731740'/><link rel='alternate' type='text/html' href='http://methodremovevirus.blogspot.com/2011/08/dangerous-virus-in-ambush-on-mail.html' title='Dangerous Virus In Ambush On The Mail'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/10526833191760012422</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-8739921880945862903.post-7171577788624669983</id><published>2011-08-21T13:32:00.005+07:00</published><updated>2011-08-21T13:39:54.115+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hot News"/><title type='text'>HP TABLET</title><content type='html'>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitMVY5bScCUnp-BT32oR-61XH7C-XwIl9kYJjf4VKttuXMZeBua0UV8AZqb3GxCnU-R_MzKOvCxfKwtHKAwNm2-xBCCMS2MPXZw3M7tHtA7DbAJmdaNObK6eZb6jUDdQSTqrwBlbFmnQ8N/s1600/HP-tablet.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 320px; height: 234px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitMVY5bScCUnp-BT32oR-61XH7C-XwIl9kYJjf4VKttuXMZeBua0UV8AZqb3GxCnU-R_MzKOvCxfKwtHKAwNm2-xBCCMS2MPXZw3M7tHtA7DbAJmdaNObK6eZb6jUDdQSTqrwBlbFmnQ8N/s320/HP-tablet.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5643195219750785730&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;HP’s Website, along with Amazon, continues to sell the HP TouchPad, despite announcing the tablet’s ignoble death.&lt;br /&gt;&lt;p&gt;Hewlett-Packard’s Website is still selling the HP TouchPad, the webOS tablet it has condemned to history’s dustbin of dead tech.&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;p&gt;Those interested in purchasing a piece of future geek trivia can find the 16GB and 32GB versions on HP’s official shopping page for $399.99 and $499.99, respectively. Another HP page sings the virtues of webOS, complete with text claiming it’s “the smartest OS ever created.” For the moment, the tablet is also available on Amazon.&lt;/p&gt; &lt;p&gt;THE much awaited HP TouchPad tablet was withdrawn from the Australian market today just 4 days after its launch, making it one of the shortest-lived electronics products in Australian history.&lt;/p&gt; &lt;p&gt;Retailer Harvey Norman, which sold the HP TouchPad tablet exclusively, said it had instructed franchises to remove all stocks from shelves and to contact customers who had bought it and offer them a full refund or credit for another purchase.&lt;/p&gt; &lt;p&gt;The HP TouchPad’s dramatic demise in Australia is the result of HP’s decision in the United States yesterday to axe it and smartphones powered by its in-house webOS mobile operating system, after astonishingly poor sales since its United States launch in July.&lt;/p&gt; &lt;p&gt;The problem for the Palo Alto, California-based tech company was that webOS was neither Apple nor Android. It was a mobile operating system HP acquired when it bought smartphone manufacturer Palm for $1.2 billion last year.&lt;/p&gt; &lt;p&gt;With relatively few apps available for download, and several exhibiting serious bugs, many commentators believed the HP TouchPad was doomed from the start.&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default/7171577788624669983'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default/7171577788624669983'/><link rel='alternate' type='text/html' href='http://methodremovevirus.blogspot.com/2011/08/hp-tablet.html' title='HP TABLET'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/10526833191760012422</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitMVY5bScCUnp-BT32oR-61XH7C-XwIl9kYJjf4VKttuXMZeBua0UV8AZqb3GxCnU-R_MzKOvCxfKwtHKAwNm2-xBCCMS2MPXZw3M7tHtA7DbAJmdaNObK6eZb6jUDdQSTqrwBlbFmnQ8N/s72-c/HP-tablet.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-8739921880945862903.post-3810469555749101546</id><published>2011-08-21T13:20:00.002+07:00</published><updated>2011-08-21T13:30:44.187+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hot News"/><title type='text'>Obama Briefed On Tripoli Fighting</title><content type='html'>&lt;p&gt;VINEYARD HAVEN, Mass. — A vacationing President Barack Obama was being kept up to date by aides on developments in Libya and U.S. officials were in touch with their contacts in that country Saturday to determine the progress of rebel troops advancing on Libya&#39;s capital, Tripoli.&lt;/p&gt;  &lt;p&gt;A senior administration official said the president was briefed during the day on Martha&#39;s Vineyard, Mass., and would continue to get regular updates, including through the night if necessary. A second senior official said the administration was in close contact with the Libyan opposition and U.S. allies and partners, and believes that Moammar Gadhafi&#39;s days in power are numbered.&lt;/p&gt; 									&lt;p&gt;It is unclear to some U.S. analysts, however, whether these latest developments translate to a tipping point.&lt;/p&gt;  &lt;p&gt;Analysts have concluded that Gadhafi&#39;s well-known mercurial decision-making style means he could decide within hours to flee, or stay to the bitter end.&lt;/p&gt;  &lt;p&gt;If Gadhafi flees or is otherwise deposed, the administration plans to voice the support of the U.S. and its partners in the international community for the opposition and assist it as the country makes a transition to democracy, officials say. But the administration will also continue to stress that this is a matter for the Libyan people to decide.&lt;/p&gt;  &lt;p&gt;The officials, both with the White House and with other agencies, spoke anonymously to discuss sensitive diplomatic matters.&lt;/p&gt;  &lt;p&gt;Reporters in Tripoli heard gunfire and explosions after rebel troops seized control of Zawiya, a major coastal city not far from the capital. Rebel leaders called it the start of an attack on Gadhafi&#39;s main stronghold.&lt;/p&gt;  &lt;p&gt;Obama spent most of Saturday at his vacation compound on this island off Cape Cod. He dropped in briefly at a reception hosted by his friend and former law school professor, Charles Ogletree, but was back at the complex in just over an hour.&lt;/p&gt;&lt;span class=&quot;fullpost&quot;&gt;    &lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default/3810469555749101546'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default/3810469555749101546'/><link rel='alternate' type='text/html' href='http://methodremovevirus.blogspot.com/2011/08/obama-briefed-on-tripoli-fighting.html' title='Obama Briefed On Tripoli Fighting'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/10526833191760012422</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-8739921880945862903.post-2442664225986740943</id><published>2011-08-21T04:50:00.000+07:00</published><updated>2011-08-21T04:52:07.376+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hot News"/><title type='text'>No Tsunami Threat to Hawaii After Two 7+ Vanuatu Quakes</title><content type='html'>&lt;p&gt;Hawaii remains clear of any tsunami threat following two large quakes and several smaller tremors in the Vanuatu Islands region this morning.  An initial 7.1 magnitude quake (downgraded from an earlier 7.5 measurement) occurred at 6:55 a.m., followed by several smaller 5+ magnitude earthquakes, and a subsequent 7.0 magnitude quake at 8:19 a.m. HST.&lt;/p&gt; &lt;p&gt;The following information details the list of activity in the region this morning:&lt;/p&gt; &lt;ul&gt;&lt;li&gt;6:55 a.m. HST: 7.1 magnitude quake 39 miles SSW of PORT-VILA, Efate, Vanuatu&lt;/li&gt;&lt;li&gt;7:11 a.m. HST: 5.6 magnitude quake 53 miles SW of PORT-VILA, Efate, Vanuatu&lt;/li&gt;&lt;li&gt;7:13 a.m. HST: 5.9 magnitude quake 41 miles SSW of PORT-VILA, Efate, Vanuatu&lt;/li&gt;&lt;li&gt;7:44 a.m. HST: 5.1 magnitude quake 75 miles SSW of PORT-VILA, Efate, Vanuatu&lt;/li&gt;&lt;li&gt;8:02 a.m. HST: 5.2 magnitude quake 65 miles SSW of PORT-VILA, Efate, Vanuatu&lt;/li&gt;&lt;li&gt;8:19 a.m. HST: 7.0 magnitude quake 42 miles SSW of PORT-VILA, Efate, Vanuatu&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;The Pacific Tsunami Warning Center advised that there is NO tsunami threat to Hawaii based on available data.&lt;/p&gt; &lt;p&gt;(Posted at 7:20 a.m. 8/20/11)&lt;/p&gt; &lt;p&gt;There is no tsunami threat to Hawaii following a 7.5 magnitude quake near the Vanuatu Islands, according to the Pacific Tsunami Warning Center.&lt;/p&gt; &lt;p&gt;The quake occurred at 6:55 a.m. on Saturday, August, 20, 2011 (Time at the epicenter: 3:55 a.m. Sunday, August 21, 2011).&lt;/p&gt; &lt;p&gt;The earthquake was centered 38 miles SSW of PORT-VILA, 118 miles NW of Isangel, 198 miles SSE of Santo (Luganville)and 1151 miles ENE of Brisbane, Australia.&lt;/p&gt; &lt;span class=&quot;fullpost&quot;&gt;    &lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default/2442664225986740943'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default/2442664225986740943'/><link rel='alternate' type='text/html' href='http://methodremovevirus.blogspot.com/2011/08/no-tsunami-threat-to-hawaii-after-two-7.html' title='No Tsunami Threat to Hawaii After Two 7+ Vanuatu Quakes'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/10526833191760012422</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-8739921880945862903.post-1933690618665762632</id><published>2011-02-06T19:43:00.000+07:00</published><updated>2011-02-06T19:56:01.019+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hot News"/><title type='text'>Digital TV overshadowed the risk of virus infection</title><content type='html'>One of the pioneer of digital TV, Ocean Blue Software (OBS), warned the latest generation of television is to save the risk of virus infection.&lt;br /&gt;&lt;br /&gt;According to the OBS, unless the manufacturers take anticipative steps by offering a built-in protection system, the majority of digital television, which connect to the Internet network, are vulnerable to new types of virus that had not previously been associated with this device.&lt;br /&gt;&lt;br /&gt;“Almost all television products to the processor, memory capacity and an internet connection overshadowed the risk,” said founder and CEO of OBS, Ken Helps, as quoted from ITProPortal.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Previously, digital television sets will only accept new software updates from the broadcaster. However, now almost all devices have an internet connection and a browser equipped with a built-in, allowing the owner to download anything.&lt;br /&gt;&lt;br /&gt;“(But) the television does not have enough ability to run anti-virus protection,”said Helps.&lt;br /&gt;&lt;br /&gt;To protect your digital TV, OBS suggested to complement the television with the services cloud-based anti-virus to scan all downloads before reaching the device. In addition, you also have to ensure the protection you have is the latest version.&lt;span class=&quot;fullpost&quot;&gt;    &lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default/1933690618665762632'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default/1933690618665762632'/><link rel='alternate' type='text/html' href='http://methodremovevirus.blogspot.com/2011/02/digital-tv-overshadowed-risk-of-virus.html' title='Digital TV overshadowed the risk of virus infection'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/10526833191760012422</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-8739921880945862903.post-7477024833239818992</id><published>2011-02-05T23:46:00.004+07:00</published><updated>2011-02-06T00:17:44.287+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Super TROJAN"/><title type='text'>Beware SUPER TROJAN lurks !!!</title><content type='html'>Security experts warn that a new “supertrojan” is lurking in the cyber shadows, which may make ordinary viruses seem as harmless as the common cold.&lt;br /&gt;&lt;br /&gt;The two most forbidding pieces of spyware on the Net have James Bond-worthy names: &lt;span style=&quot;font-weight: bold;&quot;&gt;SpyEye&lt;/span&gt; and &lt;span style=&quot;font-weight: bold;&quot;&gt;ZeuSTwo&lt;/span&gt;. Once competing tools for cybercrooks, now they’re teaming up to form a hybrid being hailed as &lt;span style=&quot;font-weight: bold;&quot;&gt;SpyZeuS&lt;/span&gt; — and security analysts warn companies and users to be on their guard.&lt;br /&gt;&lt;br /&gt;“Conventional security solutions will find it hard to detect and handle this type of new threat,” wrote fraud expert Aviv Raff on his blog.&lt;br /&gt;&lt;br /&gt;Shouldn’t rival gangs of cut-throat badware makers be enemies? Not so, experts tell FoxNews.com: According to those in the security realm, building Trojan horse software that steals users’ banking information is a business just like any other.&lt;br /&gt;&lt;br /&gt;Indeed, the merger is comparable to the dealings of the banks and companies they target.&lt;br /&gt;&lt;br /&gt;“The underground malware world functions essentially as a business,” Alex Cox, principal research analyst at network-security firm NetWitness, told FoxNews.com. “So just like in big business, it’s normal for those with a well-known product to have competitors, as well as make big mergers such as this.”&lt;br /&gt;&lt;br /&gt;In other words, a major business merger is underway — and those profiting from the deal may be drawing from your bank accounts.&lt;br /&gt;&lt;br /&gt;ZeuS is considered king of the botnets, having been used to hack the websites of such reputable groups as Bank of America, NASA, and Amazon. SpyEye surfaced last year, with many assuming it would become the next ZeuS — and now in a way, it has.&lt;br /&gt;&lt;br /&gt;How to protect yourself from Trojan horses&lt;br /&gt;&lt;br /&gt;The security industry had suspected since October that the criminal masterminds behind ZeuS were abandoning their creation and sending the leftover codes to the creators of SpyEye. And now traces of the updated Trojan are popping up, as authors have been shipping out beta releases of SpyZeus almost daily.&lt;br /&gt;&lt;br /&gt;The evolution of these infamous malware tools has those tracking the criminals calling for banks and companies to evolve along with them.&lt;br /&gt;&lt;br /&gt;“It’s all about understanding the way your network works, such as the amount and kind of traffic that is going through your system,” Cox told FoxNews.com. “Detection used to be primarily signature-based” — a technique that involves finding a common thread in the software and detecting it by looking for that signature.&lt;br /&gt;&lt;br /&gt;“But bad guys have gotten too good at bypassing those signature-based detection systems,” Cox said. “We’re trying to push the move to more behavioral-based detection.”&lt;br /&gt;&lt;br /&gt;Threat-alert service Seculert has included some screenshots of the administrative panel of SpyZeus on its blog. The shots reveal the authors of the hybrid malware trying to cater to users of both Trojans. Co-founder and CTO of Seculert Aviv Raff thinks that it is important for the public to be aware and alert.&lt;br /&gt;&lt;br /&gt;“Before the merge, these were the only two important Trojans in the cybercrime world,” Raff told FoxNews.com. “But we felt this was newsworthy because there will probably be new rivals out … we’re already seeing new faces and new families of this type of malware.”&lt;br /&gt;&lt;br /&gt;And for the average consumer, there are simple detection techniques that can help those hoping to fend off cyber criminals.&lt;br /&gt;&lt;br /&gt;“Just be aware,” Cox told FoxNews.com. “There should always be a red flag when you’re using a computer at home and you are asked for something that your login doesn’t normally ask you for. That should give you a heads up that something’s awry.”&lt;span class=&quot;fullpost&quot;&gt;    &lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default/7477024833239818992'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default/7477024833239818992'/><link rel='alternate' type='text/html' href='http://methodremovevirus.blogspot.com/2011/02/be-aware-super-trojan.html' title='Beware SUPER TROJAN lurks !!!'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/10526833191760012422</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-8739921880945862903.post-4747841982961489218</id><published>2010-12-12T17:46:00.007+07:00</published><updated>2010-12-12T18:05:57.337+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Method Remove Virus"/><title type='text'>Method remove &amp; uninstall PC Protection Center Virus</title><content type='html'>Are you looking for a way to uninstall and remove PC Protection Center Virus? Have you tried many methods, but you still can&#39;t remove &lt;a href=&quot;http://methodremovevirus.blogspot.com/2010/12/method-remove-uninstall-pc-protection.html&quot;&gt;PC Protection Center Virus&lt;/a&gt;? Now you are at the right place! This article is written for the purpose to help you fully remove PC Protection Center Virus security-wire.com.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;What&#39;s PC Protection Center Virus?&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://methodremovevirus.blogspot.com/2010/12/method-remove-uninstall-pc-protection.html&quot;&gt;PC Protection Center&lt;/a&gt; is a rogue security utitlity developed to mislead computer users and swindle their money. PC Protection Center comes from the same rogue group as Privacy Corrector, PrivacyGuard 2010 and &lt;span style=&quot;font-weight: bold;&quot;&gt;PCOptimizer 2010&lt;/span&gt;. It intrudes into your workstation thru system loopholes and software vulnerabilities. Once on board, PC Protection Center loads every time your PC &lt;span style=&quot;font-weight: bold;&quot;&gt;warm&lt;/span&gt;s up due to the distortions made to the system. The rogueware will create several harmless files which are reported by PC Protection Center as dangerous malware.&lt;br /&gt;Furthermore, this rogue can even disable most of the applications on your computer. To convince your purchase, PC Protection Center will keep changing your URL destinations into its affiliated websites. Don&#39;t be flattered by its promise that it will get rid of all &lt;span style=&quot;font-weight: bold;&quot;&gt;viruses&lt;/span&gt;.&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Why You Get PC Protection Center Virus?&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Many people do not know how their computers are infected by PC Protection Center Virus until their PCs are in bad performance. Actually, in many cases, it is the users themselves who give the chance for &lt;span style=&quot;font-weight: bold;&quot;&gt;malware&lt;/span&gt; into their PC, not anyone else! Many people are lack of self-protection awareness and know little about how to maintain computer security. It&#39;s suggested that you get a 100% real time protection!&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;How to Remove PC Protection Center Virus?&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;If you&#39;re feeling lucky, an advanced user, and you aren&#39;t too busy, you could try to manually remove PC Protection Center Virus.&lt;br /&gt;First of all, backup your registry and important data. Then you need to open registry and delete registry entries related to PC Protection Center Virus and .exe, .bat files, .dll and .lnk files. You must be more careful, patient and prudent when you manually remove PC Protection Center Virus.&lt;br /&gt;&lt;br /&gt;But it&#39;s advised that you use a professional designed tool to remove&lt;a href=&quot;http://methodremovevirus.blogspot.com/2010/12/method-remove-uninstall-pc-protection.html&quot;&gt; PC Protection Center Virus&lt;/a&gt;. A professional designed removal tool can not only completely remove PC Protection Center Virus but also those malware that hide in your system. And it&#39;s not only for one time removal. It can provide you with 100% real time protection and patch your system vulnerabilities so as to prevent your system against potential threats. The infection of PC Protection Center Virus should be attributed to the bad protection of your current antivirus. Now save your time and start to get rid of PC Protection Center Virus now!&lt;br /&gt;&lt;br /&gt;Article Source: technology.ezinemark.com&lt;br /&gt; &lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default/4747841982961489218'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default/4747841982961489218'/><link rel='alternate' type='text/html' href='http://methodremovevirus.blogspot.com/2010/12/method-remove-uninstall-pc-protection.html' title='Method remove &amp; uninstall PC Protection Center Virus'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/10526833191760012422</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-8739921880945862903.post-389573825895312332</id><published>2010-12-04T13:23:00.001+07:00</published><updated>2010-12-04T13:33:06.573+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hot News"/><title type='text'>German hackers &quot;gained access to Lady Gaga’s computer&quot;</title><content type='html'>German- &lt;a href=&quot;http://methodremovevirus.blogspot.com/search/label/Hot%20News&quot;&gt;Two German&lt;/a&gt; hackers gained access to the computers of over 50 pop stars, including Justin Timberlake and Lady Gaga, in an attempt to steal unreleased songs and issue blackmail threats over intimate photographs, prosecutors have alleged.&lt;br /&gt;&lt;br /&gt;The pair, according to German police, used nothing more than perseverance and simple invasive programmes called &lt;a href=&quot;http://methodremovevirus.blogspot.com/search/label/Method%20Remove%20Virus&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Trojans&lt;/span&gt;&lt;/a&gt;, which can break into private computer networks. But they are alleged to have hacked into the computers of a string of world famous stars and downloaded hundreds of documents including music, credit card details, emails and photographs.&lt;br /&gt;&lt;br /&gt;Their haul included a picture of the American singer Kesha, reportedly naked and having sex. Prosecutors said that the two had tried to blackmail the 24-year-old singer, but no money changed hands.&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;Happy with their success, the duo allegedly bragged on internet forums about their ability to hack into the computers of A-list celebrities. But prosecutors believe their main goal was unreleased musical material, which can fetch high prices on the internet. They sold some of the music they had obtained.&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuuNyD4GxNI-gBa50WDEw8TAxHTG5cBqj-O_NcLMFqpLHc3YCLLElODzvPvSzChEXDRI5ybg9HRDZXa0220vii1ZuG6J7BMcd5hxoBzlKMeRxszDPvTuYRZC9RS8lo8Ry-10uJ8Fc-ViDi/s1600/LadyGaga-PokerFace_20100210.jpg&quot;&gt;&lt;img style=&quot;display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 320px; height: 215px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuuNyD4GxNI-gBa50WDEw8TAxHTG5cBqj-O_NcLMFqpLHc3YCLLElODzvPvSzChEXDRI5ybg9HRDZXa0220vii1ZuG6J7BMcd5hxoBzlKMeRxszDPvTuYRZC9RS8lo8Ry-10uJ8Fc-ViDi/s320/LadyGaga-PokerFace_20100210.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5546711059890182530&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;“Basically we are talking about illegal, bootlegged publication, and spying using Trojans,” state prosecutor Rolf Haferkamp, told the newspaper Neue Ruhr/Neuer Rhein Zeitung. “The trick itself is nothing special. All it requires is a bit of know-how and perseverance to achieve criminal success.” He added that the hacking had forced a number of singers to bring forward record release dates.&lt;br /&gt;&lt;br /&gt;The alleged crime came to light only when fans of Kelly Clarkson, another targeted singer, tipped her off about unreleased music available on the internet. She informed the police, triggering an investigation involving the FBI and the German Federal Police Service.&lt;br /&gt;&lt;br /&gt;While the two, a 17-year-old from Duisburg and a 23-year-old from the nearby town of Wessel, have not been charged, some newspaper reports claimed they had already confessed to the police.&lt;br /&gt;&lt;br /&gt;Sven Kilthau-Lander, Universal Music’s director of public relations in Germany who is responsible for the publicity of stars Lady Gaga and Rihanna, told a local newspaper: “It’s really frightening. One can’t feel safe anywhere.”&lt;br /&gt;&lt;br /&gt; &lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default/389573825895312332'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default/389573825895312332'/><link rel='alternate' type='text/html' href='http://methodremovevirus.blogspot.com/2010/12/german-hackers-gained-access-to-lady.html' title='German hackers &quot;gained access to Lady Gaga’s computer&quot;'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/10526833191760012422</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuuNyD4GxNI-gBa50WDEw8TAxHTG5cBqj-O_NcLMFqpLHc3YCLLElODzvPvSzChEXDRI5ybg9HRDZXa0220vii1ZuG6J7BMcd5hxoBzlKMeRxszDPvTuYRZC9RS8lo8Ry-10uJ8Fc-ViDi/s72-c/LadyGaga-PokerFace_20100210.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-8739921880945862903.post-1616321125028439772</id><published>2010-12-04T13:10:00.002+07:00</published><updated>2010-12-04T13:15:43.193+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hot News"/><title type='text'>The Stuxnet worm Mutation</title><content type='html'>&lt;a href=&quot;http://methodremovevirus.blogspot.com/search/label/Hot%20News&quot;&gt;TEHRAN&lt;/a&gt; - &lt;span style=&quot;font-weight: bold;&quot;&gt;The Stuxnet worm&lt;/span&gt; is mutating and wreaking further havoc on computerised industrial equipment in Iran where about 30,000 IP addresses have already been infected, IRNA news agency reported on Monday.&lt;br /&gt;&lt;br /&gt;&quot;The attack is still ongoing and new versions of this virus are spreading,&quot; Hamid Alipour, deputy head of Iran’s Information Technology Company, was quoted as saying by IRNA, Iran’s official news agency.&lt;br /&gt;&lt;br /&gt;Stuxnet, which was publicly identified in June, was tailored for Siemens supervisory control and data acquisition, or SCADA, systems commonly used to manage water supplies, oil rigs, power plants and other industrial facilities.&lt;br /&gt;&lt;br /&gt;The self-replicating malware has been found lurking on Siemens systems mostly in India, Indonesia and Pakistan, but the heaviest infiltration appears to be in Iran, according to researchers.&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;The hackers, who enjoyed &quot;huge investments&quot; from a series of foreign countries or organisations, designed the worm to exploit five different security vulnerabilities, Alipour said while insisting that Stuxnet was not a &quot;normal&quot; worm.&lt;br /&gt;&lt;br /&gt;He said his company had begun the cleanup process at Iran’s &quot;sensitive centres and organisations,&quot; the report said.&lt;br /&gt;&lt;br /&gt;Analysts say Stuxnet may have been designed to target Iran’s nuclear facilities. But Iranian officials have denied the Islamic republic’s first nuclear plant at Bushehr was among the addresses penetrated by the worm.&lt;br /&gt;&lt;br /&gt;&quot;This virus has not caused any damage to the main systems of the Bushehr power plant,&quot; Bushehr project manager Mahmoud Jafari said on Sunday.&lt;br /&gt;&lt;br /&gt;He, however, added the worm had infected some &quot;personal computers of the plant’s personnel.&quot;&lt;br /&gt;&lt;br /&gt;Alipour, whose company is tasked with planning and developing networks in Iran, said personal computers were also being targeted by the malware.&lt;br /&gt;&lt;br /&gt;&quot;Although the main objective of the Stuxnet virus is to destroy industrial systems, its threat to home computer users is serious,&quot; Alipour said.&lt;br /&gt;&lt;br /&gt;The worm is able to recognise a specific facility’s control network and then destroy it, according to German computer security researcher Ralph Langner, who has been analysing the malicious software.&lt;br /&gt;&lt;br /&gt;Langner said he suspected &lt;a href=&quot;http://methodremovevirus.blogspot.com/2010/11/eliminate-all-types-of-viruses.html&quot;&gt;Stuxnet&lt;/a&gt; was targeting Bushehr nuclear power plant, where unspecified problems have been blamed for delays in getting the facility fully operational.&lt;br /&gt;&lt;br /&gt;Iran’s nuclear ambitions are at the heart of a conflict between Tehran and the West, which suspects the Islamic republic is seeking to develop atomic weapons under the cover of a civilian drive.&lt;br /&gt;&lt;br /&gt;Tehran denies the allegation and has pressed on with its enrichment programme -- the most controversial aspect of its nuclear activities -- despite four sets of UN Security Council sanctions.&lt;br /&gt;© Copyright (c) AFP  &lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default/1616321125028439772'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default/1616321125028439772'/><link rel='alternate' type='text/html' href='http://methodremovevirus.blogspot.com/2010/12/stuxnet-worm-mutation.html' title='The Stuxnet worm Mutation'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/10526833191760012422</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-8739921880945862903.post-6440686747464031128</id><published>2010-11-29T21:59:00.003+07:00</published><updated>2010-12-01T21:39:37.753+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Free Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="Method Remove Virus"/><title type='text'>Remove HDD Control malware</title><content type='html'>&lt;strong&gt;HDD Control&lt;/strong&gt; is a malicious program that pretends to  be a computer defragmenter and optimization program. It hijacks your PC,  blocks Windows legitimate applications from running, presents various  fake critical errors alerts that the computer’s hard drive is corrupt   in order to frighten you into purchasing this useless application. It is  a new &lt;a href=&quot;http://methodremovevirus.blogspot.com/&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;malware&lt;/span&gt;&lt;/a&gt; from Defragger malware family as Check Disk, Scan Disk,  Ultra Defragger, HDD Defragger, etc.&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;p&gt;The main method for distribution of HDD Control is by trojans. When the  trojan is started, it will install the program into TEMP folder under  different random names. Next, it will be configured to run automatically  when Windows starts.&lt;/p&gt; &lt;p&gt;Like other fake defragmenter programs, it does a fake scan of your  computer then tells you it has found numerous critical errors such “Read  time of hard drive clusters less than 500 ms”, “32% of HDD space is  unreadable”, “&lt;a href=&quot;http://methodremovevirus.blogspot.com/&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Bad sectors on hard drive&lt;/span&gt;&lt;/a&gt; or damaged file allocation  table”, etc. HDD Control requires you to pay for the fake software  before it “repairs” your machine of the problems. Of course, all of  these errors are a fake. The misleading application only imitates  functions of computer defragmenter software and unable to detect any  problems. Most important, don`t pay for the bogus program and just  ignore the false scan results.&lt;/p&gt; &lt;p&gt;HDD Control will also prevent you from using other programs or the  internet by shutting down programs every time they are opened. Moreover,  this malware will flood your computer with nag screens and fake alerts.  Some of the alerts are:&lt;/p&gt; &lt;blockquote&gt;&lt;p&gt;System Restore&lt;br /&gt;The system has been restored after a critical error. Data integrity and hard drive integrity verification required.&lt;/p&gt;&lt;/blockquote&gt; &lt;blockquote&gt;&lt;p&gt;Windows – No Disk&lt;br /&gt;Exception Processing Message 0×0000013&lt;/p&gt;&lt;/blockquote&gt; &lt;blockquote&gt;&lt;p&gt;Critical Error&lt;br /&gt;A critical error has occurred while indexing data stored on hard drive. System restart required.&lt;/p&gt;&lt;/blockquote&gt; &lt;p&gt;Of course, like false scan results above, all of these alerts are  just a fake. This is an attempt to make you think your computer in  danger. Like false scan results you can safely ignore them.&lt;/p&gt; &lt;p&gt;If your PC has been infected with HDD Control malware, follow the  removal instructions below in order to remove HDD Control and any  associated malware from your computer for free.&lt;/p&gt;&lt;h3&gt;Automated Removal Instructions for HDD Control&lt;/h3&gt; &lt;p&gt;&lt;strong&gt;Step 1. Reboot your computer in Safe mode with networking&lt;/strong&gt;&lt;/p&gt;  &lt;p&gt;Restart your computer.&lt;/p&gt; &lt;p&gt;After hearing your computer beep once during startup, start pressing  the F8 key on your keyboard. On a computer that is configured for  booting to multiple operating systems, you can press the F8 key when the  Boot Menu appears.&lt;/p&gt; &lt;p&gt;Instead of Windows loading as normal, Windows Advanced Options menu appears similar to the one below.&lt;/p&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtdtmGVweOUr-7SnSmJ_Pk3srILfIkV4-uvtJ4ZiG0bYOLUf4jlf00TRNeQ4Z-FUjPVtocxjqHMoeXvrwke0F2d1fiknio3ViX1xvc-6jNMD_QYSTgPuFaG92mCVS1RbhxJg1RfmonEe6L/s1600/windows-advanced-options-menu.jpg&quot;&gt;&lt;img style=&quot;display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 320px; height: 145px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtdtmGVweOUr-7SnSmJ_Pk3srILfIkV4-uvtJ4ZiG0bYOLUf4jlf00TRNeQ4Z-FUjPVtocxjqHMoeXvrwke0F2d1fiknio3ViX1xvc-6jNMD_QYSTgPuFaG92mCVS1RbhxJg1RfmonEe6L/s320/windows-advanced-options-menu.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5544982380426902898&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;When the Windows Advanced Options menu appears, select &lt;strong&gt;Safe mode with networking&lt;/strong&gt; and then press ENTER.  &lt;p&gt;&lt;strong&gt;Step 2. Clean temp folder&lt;/strong&gt;&lt;/p&gt;  &lt;p&gt;HDD Control stores its files in Windows temp foder. You need to clean it.&lt;/p&gt;  &lt;p&gt;Please download ATF Cleaner by Atribune from &lt;a href=&quot;http://www.atribune.org/ccount/click.php?id=1&quot;&gt;here&lt;/a&gt;, saving it to your desktop. It is used to cleanout temporary files &amp;amp; temp areas used by internet browsers.&lt;/p&gt;  &lt;p&gt;Start ATF-&lt;span style=&quot;font-weight: bold;&quot;&gt;Cleaner&lt;/span&gt;.exe to run the program. Under Main choose: Select All and click the Empty Selected button.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Step 3. Remove HDD Control and associated malware&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Download &lt;a href=&quot;http://www.myantispyware.com/mbam&quot;&gt;MalwareBytes Anti-malware&lt;/a&gt; (MBAM). Close all programs and Windows on your computer.&lt;/p&gt; &lt;p&gt;Double Click mbam-setup.exe to install the application. When the  installation begins, keep following the prompts in order to continue  with the installation process. Do not make any changes to default  settings and when the program has finished installing, make sure a  checkmark is placed next to Update Malwarebytes’ &lt;span style=&quot;font-weight: bold;&quot;&gt;Anti-Malware&lt;/span&gt; and Launch  Malwarebytes’ Anti-Malware, then click Finish.&lt;/p&gt; &lt;p&gt;If an update is found, it will download and install the latest version.&lt;/p&gt; &lt;p&gt;Once the program has loaded you will see window similar to the one below.&lt;/p&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7_2vWWPlU2shQOaW8Prv0IJfW3N3yPhFdo5dzbn2jMmhOKKBfKZDDNynp-KVM2_ekVGaOfTV8hr8oiFgOohXiTZ0dcSk_2bFCECQfOgPK_AnVsrAHyUjWdG7Qxol5g-6MF1MgM1wwx-lw/s1600/malwarebytes-antimalware1-500x377.jpg&quot;&gt;&lt;img style=&quot;display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 320px; height: 242px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7_2vWWPlU2shQOaW8Prv0IJfW3N3yPhFdo5dzbn2jMmhOKKBfKZDDNynp-KVM2_ekVGaOfTV8hr8oiFgOohXiTZ0dcSk_2bFCECQfOgPK_AnVsrAHyUjWdG7Qxol5g-6MF1MgM1wwx-lw/s320/malwarebytes-antimalware1-500x377.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5544983762483486498&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Select &lt;b&gt;Perform Quick Scan&lt;/b&gt;, then click &lt;b&gt;Scan&lt;/b&gt;, it will start scanning your computer for &lt;b&gt;HDD Control infection&lt;/b&gt;. This procedure can take some time, so please be patient.  &lt;p&gt;When the scan is complete, click &lt;b&gt;OK&lt;/b&gt;, then Show Results to view  the results. You will see a list of infected items similar as shown  below. Note: list of infected items may be different than what is shown  in the image below.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEwBWuuhCgLPOaaZw1p4ea92sxao6P8HWBgkzg-wZ0GJvKmqiM-QCXhyTwAdShKcZvTKoc6K50pSvC18FRTOWicUM2veejlArqhFBjjyqN3sSKxsNNBh5AomD5QkuIvfgLJG26ICrxasI9/s1600/mbam-500x379.jpg&quot;&gt;&lt;img style=&quot;display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 320px; height: 242px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEwBWuuhCgLPOaaZw1p4ea92sxao6P8HWBgkzg-wZ0GJvKmqiM-QCXhyTwAdShKcZvTKoc6K50pSvC18FRTOWicUM2veejlArqhFBjjyqN3sSKxsNNBh5AomD5QkuIvfgLJG26ICrxasI9/s320/mbam-500x379.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5544984189440315282&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/p&gt;Make sure all entries have a checkmark at their far left and click “Remove Selected” button to &lt;a href=&quot;http://methodremovevirus.blogspot.com/2010/11/remove-hdd-control-malware_29.html&quot;&gt;&lt;b&gt;remove HDD Control&lt;/b&gt;&lt;/a&gt;.  MalwareBytes Anti-malware will now remove all of associated HDD Control  files and registry keys and add them to the programs’ quarantine. When  MalwareBytes Anti-malware has finished removing the infection, a log  will open in Notepad and you may be prompted to Restart.&lt;br /&gt;&lt;br /&gt;&lt;h3&gt;HDD Control creates the following files and folders&lt;/h3&gt; &lt;p&gt;%UserProfile%\Desktop\HDD Control.lnk&lt;br /&gt;%UserProfile%\Start Menu\Programs\HDD Control\HDD Control.lnk&lt;br /&gt;%UserProfile%\Start Menu\Programs\HDD Control\Uninstall HDD Control.lnk&lt;br /&gt;%Temp%\{RANDOM}.exe&lt;br /&gt;%Temp%\{RANDOM}&lt;br /&gt;%Temp%\{RANDOM}.dat&lt;/p&gt; &lt;h3&gt;HDD Control creates the following registry keys and values&lt;/h3&gt; &lt;p&gt;HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run | {RANDOM}&lt;/p&gt;&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default/6440686747464031128'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default/6440686747464031128'/><link rel='alternate' type='text/html' href='http://methodremovevirus.blogspot.com/2010/11/remove-hdd-control-malware_29.html' title='Remove HDD Control malware'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/10526833191760012422</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtdtmGVweOUr-7SnSmJ_Pk3srILfIkV4-uvtJ4ZiG0bYOLUf4jlf00TRNeQ4Z-FUjPVtocxjqHMoeXvrwke0F2d1fiknio3ViX1xvc-6jNMD_QYSTgPuFaG92mCVS1RbhxJg1RfmonEe6L/s72-c/windows-advanced-options-menu.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-8739921880945862903.post-8780129899901014835</id><published>2010-11-28T07:36:00.005+07:00</published><updated>2010-12-01T21:41:19.763+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Zombie Virus"/><title type='text'>One million Chinese cellphone users reportedly infected with zombie virus</title><content type='html'>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6_boBYofSfPIrsCCagwS2jXcGayHzyz-AcCShwl3nobobd6QTGYTOtyK9OqzheHZX497byGEfWbK6JijuwlR2EzRHBdU7x9W2AX_DVnEulqLkvQdO7i7Z4wXgclgspaa69nBAPAFoljuP/s1600/tumblr_laktb0CWvI1qcapuko1_400.jpg&quot;&gt;&lt;img style=&quot;float: left; margin: 0pt 10px 10px 0pt; cursor: pointer; width: 207px; height: 320px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6_boBYofSfPIrsCCagwS2jXcGayHzyz-AcCShwl3nobobd6QTGYTOtyK9OqzheHZX497byGEfWbK6JijuwlR2EzRHBdU7x9W2AX_DVnEulqLkvQdO7i7Z4wXgclgspaa69nBAPAFoljuP/s320/tumblr_laktb0CWvI1qcapuko1_400.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5544395615754346930&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Some disturbing news has come to light for our Chinese readers now, with the news of a new “&lt;a href=&quot;http://methodremovevirus.blogspot.com/search/label/Zombie%20Virus&quot;&gt;zombie virus&lt;/a&gt;” that is sweeping the country and has infected over 1 million cellphones.&lt;br /&gt;&lt;br /&gt;Viruses built to exploit and takeover cellphones have had a moderately short lifespan compared to computer viruses, but it seems as the more that time passes, the more deadly they become.&lt;br /&gt;&lt;br /&gt;China are the latest victims in the cellphone virus rise, with a “zombie virus” that disguises itself as an antivirus application.&lt;br /&gt;&lt;br /&gt;The virus spreads quite easily, and then cashes in by spamming the cellphone with money-making links and other general popups and advertisements that seem to have built up around &lt;a href=&quot;http://methodremovevirus.blogspot.com/search/label/Zombie%20Virus&quot;&gt;$300,000 &lt;/a&gt;per-day in added text message charges.&lt;br /&gt;&lt;br /&gt;We are told that the authorities have tracked down the people who designed the virus, but in a strange twist it seems as though they have nothing to do with the virus, as they are also a victim too, so they say.&lt;br /&gt;&lt;br /&gt;Have you been affected by the “&lt;a href=&quot;http://methodremovevirus.blogspot.com/search/label/Zombie%20Virus&quot;&gt;zombie virus&lt;/a&gt;,” or any other cellphone virus for that matter. Let us know your stories.&lt;br /&gt;&lt;br /&gt;source : &lt;a href=&quot;http://www.engadget.com/2010/11/11/one-million-chinese-cellphone-users-reportedly-infected-with-zom/&quot;&gt;enggadget&lt;/a&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default/8780129899901014835'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default/8780129899901014835'/><link rel='alternate' type='text/html' href='http://methodremovevirus.blogspot.com/2010/11/one-million-chinese-cellphone-users.html' title='One million Chinese cellphone users reportedly infected with zombie virus'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/10526833191760012422</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6_boBYofSfPIrsCCagwS2jXcGayHzyz-AcCShwl3nobobd6QTGYTOtyK9OqzheHZX497byGEfWbK6JijuwlR2EzRHBdU7x9W2AX_DVnEulqLkvQdO7i7Z4wXgclgspaa69nBAPAFoljuP/s72-c/tumblr_laktb0CWvI1qcapuko1_400.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-8739921880945862903.post-1351081791585336452</id><published>2010-11-25T22:04:00.005+07:00</published><updated>2010-12-01T21:42:28.508+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Method Remove Virus"/><title type='text'>Eliminate All types of Viruses</title><content type='html'>Given the numerous questions about the security we have decided to write this simple but effective guide on how to&lt;span style=&quot;font-weight: bold;&quot;&gt; remove&lt;/span&gt; the most viruses,&lt;a href=&quot;http://methodremovevirus.blogspot.com/2010/11/eliminate-all-types-of-viruses.html&quot;&gt; &lt;span style=&quot;font-weight: bold;&quot;&gt;spyware, trojans, and malware&lt;/span&gt; &lt;/a&gt;using only free tools.&lt;br /&gt;&lt;br /&gt;Taking inspiration from the last question also resolved to our forums and some previous guide: &quot;&lt;a href=&quot;http://methodremovevirus.blogspot.com/2010/11/eliminate-all-types-of-viruses.html&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Removing virus-worm-spywar&lt;/span&gt;e&lt;/a&gt;&quot; and &quot;Repair pc without formatting&quot; summarize the various operations in a practical way forward.&lt;br /&gt;&lt;br /&gt;1 - Slight&lt;br /&gt;&lt;br /&gt; 1. Get a good antivirus such as Avira AntiVir or in extremis KAV (although trial version)&lt;br /&gt; 2. Updated anti-virus (the virus signatures should be updated before the scan)&lt;br /&gt; 3. We set up the anti-virus in order to obtain a full scan.&lt;br /&gt; 4. We start the computer in Safe Mode (press F8 before win or read here)&lt;br /&gt; 5. Proceedings brought to the antivirus scan the entire system&lt;br /&gt; 6. Check whether the virus or virus were removed retracing the scan.&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;2 - Middle&lt;br /&gt;&lt;br /&gt; 1. Disable System Restore.&lt;br /&gt; 2. We start the PC in Safe Mode.&lt;br /&gt; 3. Re-try scanning the system completely.&lt;br /&gt; 4. Always check if residues remain&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;3 - With removal tool generic&lt;br /&gt;&lt;br /&gt;If previous attempts are unsuccessful it is likely that our anti-virus does not recognize and therefore does not know how to delete the viruses found, so proceed installing some generic removal tool. Download this software and run it one at a time:&lt;br /&gt;&lt;br /&gt; 1. A-squared Free 3.5 - Powerful tool removes spyware, trojans, dialers, adware and malware&lt;br /&gt; 2. AVG Anti-Spyware 7.5 - One of the best anti-spyware software for free&lt;br /&gt; 3. Ad-Aware SE - A good removal tool virus / trojan generic.&lt;br /&gt; 4. Spybot - very comprehensive tool like Ad-aware-se.&lt;br /&gt; 5. Spywareterminator - Effective anti-spyware protection with real-time.&lt;br /&gt; 6. CWShredder Tool-specific browser hijackers / unwanted ads / pop-up.&lt;br /&gt; 7. Prevx CSI - Anti-malware generic stand-alone (scan only the most sensitive part of the system)&lt;br /&gt;Once installed and configured the program to turn to follow the same methods described in the attempt 1 and 2 obviously acting on the newly installed program&lt;br /&gt;&lt;br /&gt;4 - Tool database online&lt;br /&gt;&lt;br /&gt;We search the following databases by writing the exact name of the virus in our attempt to find a specific tool, which is a small program designed solely or rather specialized in the removal of a single threat.&lt;br /&gt;&lt;br /&gt;Here&#39;s where to look for the database:&lt;br /&gt;&lt;br /&gt; 1. Kaspersky Removal Tool&lt;br /&gt; 2. Symantec Removal Tool&lt;br /&gt; 3. Nod32 removal tool&lt;br /&gt; 4. BitDefender Removal Tool&lt;br /&gt;&lt;br /&gt;&lt;span id=&quot;result_box&quot; class=&quot;&quot; lang=&quot;en&quot;&gt;&lt;span style=&quot;&quot; title=&quot;&quot;&gt;5 - Online Virus Scanner&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;&quot; title=&quot;&quot;&gt;Let us consider this time in the scanner online. &lt;/span&gt;&lt;span style=&quot;&quot; title=&quot;&quot;&gt;The  virus scanners are online versions of antivirus running directly  through the browser (Internet Explorer) that do not require installation  (except for some plug-in for communication) and are supplied by the  manufacturers themselves antvirus of classics (like Norton). &lt;/span&gt;&lt;span style=&quot;&quot; title=&quot;&quot;&gt;Since residing on servers operated by the same manufacturers of antivirus-date on the latest virus definitions. &lt;/span&gt;&lt;span style=&quot;&quot; title=&quot;&quot;&gt;Also in this case with the System Restore off.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;&quot; title=&quot;&quot;&gt;Here are some of the most effective scanner:&lt;br /&gt;&lt;br /&gt; &lt;/span&gt;&lt;span title=&quot;&quot;&gt;1. &lt;/span&gt;&lt;span style=&quot;&quot; title=&quot;&quot;&gt;Kaspersky - http://www.kaspersky.com/virusscanner&lt;br /&gt; &lt;/span&gt;&lt;span title=&quot;&quot;&gt;2. &lt;/span&gt;&lt;span style=&quot;&quot; title=&quot;&quot;&gt;NanoScan - New works with firefox!&lt;br /&gt; &lt;/span&gt;&lt;span title=&quot;&quot;&gt;3. &lt;/span&gt;&lt;span style=&quot;&quot; title=&quot;&quot;&gt;Trend Micro - http://housecall.trendmicro.com/&lt;br /&gt; &lt;/span&gt;&lt;span title=&quot;&quot;&gt;4. &lt;/span&gt;&lt;span style=&quot;&quot; title=&quot;&quot;&gt;Panda - http://www.pandasoftware.com/products/ActiveScan.htm&lt;br /&gt; &lt;/span&gt;&lt;span title=&quot;&quot;&gt;5. &lt;/span&gt;&lt;span style=&quot;&quot; title=&quot;&quot;&gt;Bit Defender - http://www.bitdefender.com/scan8/ie.html&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span id=&quot;result_box&quot; class=&quot;&quot; lang=&quot;en&quot;&gt;&lt;span style=&quot;&quot; title=&quot;&quot;&gt; 6 - HijackThis Logs&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;&quot; title=&quot;&quot;&gt;HijackThis  is a special software which takes care of generating a log or a text  file which shows the most sensitive part of our system, as the record or  particular locations within the system folders. &lt;/span&gt;&lt;span style=&quot;&quot; title=&quot;&quot;&gt;This may well be useful for identifying suspicious files, the key suspect, and finally virus.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;&quot; title=&quot;&quot;&gt;Following operations:&lt;br /&gt;&lt;br /&gt; &lt;/span&gt;&lt;span title=&quot;&quot;&gt;1. &lt;/span&gt;&lt;span style=&quot;&quot; title=&quot;&quot;&gt;Download HijackThis 2.0.2&lt;br /&gt; &lt;/span&gt;&lt;span title=&quot;&quot;&gt;2. &lt;/span&gt;&lt;span style=&quot;&quot; title=&quot;&quot;&gt;Open the HijackThis program&lt;br /&gt; &lt;/span&gt;&lt;span title=&quot;&quot;&gt;3. &lt;/span&gt;&lt;span style=&quot;&quot; title=&quot;&quot;&gt;We click on the &quot;Do a system scan and save a logfile&quot;&lt;br /&gt; &lt;/span&gt;&lt;span title=&quot;&quot;&gt;4. &lt;/span&gt;&lt;span style=&quot;&quot; title=&quot;&quot;&gt;The text file is saved in &quot;C: \ Program Files \ Trend Micro \ HijackThis&quot;&lt;br /&gt; &lt;/span&gt;&lt;span title=&quot;&quot;&gt;5. &lt;/span&gt;&lt;span style=&quot;&quot; title=&quot;&quot;&gt;Now we got the infamous Log.&lt;br /&gt; &lt;/span&gt;&lt;span title=&quot;&quot;&gt;6. &lt;/span&gt;&lt;span style=&quot;&quot; title=&quot;&quot;&gt;For the interpretation of the log we can connect to this site&lt;br /&gt; &lt;/span&gt;&lt;span title=&quot;&quot;&gt;7. &lt;/span&gt;&lt;span style=&quot;&quot; title=&quot;&quot;&gt;If we have doubts about the analysis please contact us via the forum&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;&quot; title=&quot;&quot;&gt;Note: I point out that HijackThis was recently purchased by TrendMicro known security companies. &lt;/span&gt;&lt;span style=&quot;&quot; title=&quot;&quot;&gt;The network still run older versions are not marked. &lt;/span&gt;&lt;span style=&quot;&quot; title=&quot;&quot;&gt;Do not worry it&#39;s not fake (fake) but it is always better to use the latest version.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;    &lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default/1351081791585336452'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default/1351081791585336452'/><link rel='alternate' type='text/html' href='http://methodremovevirus.blogspot.com/2010/11/eliminate-all-types-of-viruses.html' title='Eliminate All types of Viruses'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/10526833191760012422</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-8739921880945862903.post-473858200197541641</id><published>2010-11-20T20:45:00.006+07:00</published><updated>2010-11-28T22:49:00.730+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Viruses"/><title type='text'>Win32.Polip.A</title><content type='html'>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjqgNqjbeNgRbxBJT_shlJ9QXaN1W0gX_ZxzmFEuS_xl4lNwECyX-YNuvQDgze7sraOUMyDGumSCzT2cmjtcVoYDA7lSa7cx-6Wts-YK-A5mBt-jy6LgsRonIObpz3hq83C5qsWQjNDfG-6/s1600/virus-komputer-trojan-horse.jpg&quot;&gt;&lt;img style=&quot;float: left; margin: 0pt 10px 10px 0pt; cursor: pointer; width: 200px; height: 207px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjqgNqjbeNgRbxBJT_shlJ9QXaN1W0gX_ZxzmFEuS_xl4lNwECyX-YNuvQDgze7sraOUMyDGumSCzT2cmjtcVoYDA7lSa7cx-6Wts-YK-A5mBt-jy6LgsRonIObpz3hq83C5qsWQjNDfG-6/s320/virus-komputer-trojan-horse.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5541636307166182418&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Win32.Polip&lt;/span&gt;.A is a dangerous, polymorphic file infector, with a worm-like spreading capability. It&#39;s targets are EXE and SCR files.&lt;br /&gt;&lt;br /&gt;It is a memory-resident virus, because once executed, it injects code in the running processes. The first files it infects are those located in %ProgramFiles% and %WINDIR% directories. But it hooks imported functions for the infected proceses, so that all executables accessed by those processes will be infected.&lt;br /&gt;&lt;br /&gt;This infector uses different encryption layers, the first of them being the hardest to decrypt. It is a simplified version of XTEA (eXtended Tiny Encryption Algorithm), but decrypting it could take a long time.&lt;br /&gt;&lt;br /&gt;It also has an advanced polymorphic engine, combined with a junk-code generator, antidebugging and antiemulation techniques, making it&#39;s detection more difficult.&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;FILE INFECTION METHOD:&lt;br /&gt;&lt;br /&gt;Using different entry-point obscuring techniques, Polip makes itself a hard to detect virus:&lt;br /&gt;&lt;br /&gt;* It chooses a random imported function from the victim, and hooks all calls or jumps to that function.&lt;br /&gt;&lt;br /&gt;* It searches for functions that have the same stack-frame-restore code, and patches all instances of that code, with a call to its own body.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;If it finds unused space in victim&#39;s code sections, it inserts code into them, as much as it can, without increasing those sections&#39; sizes.&lt;br /&gt;It increases the &lt;a href=&quot;http://heroadsens.com/&quot;&gt;VirtualSize&lt;/a&gt; for the data sections of the victim, and will use that space from it&#39;s junk code.&lt;br /&gt;If a resource section is found in the victim, sometimes it shifts that section, and inserts a new section after the last data section, and before the resources (other times it appends it&#39;s section after the resources), and repairs the resource section (otherwise it would damage the victim).&lt;br /&gt;&lt;br /&gt;When infecting a file, it searches for the following files in same directory as the file that is going to be infected:&lt;br /&gt;* drwebase.vdb&lt;br /&gt;* avg.avi&lt;br /&gt;* vs.vsn&lt;br /&gt;* anti-vir.dat&lt;br /&gt;* avp.crc&lt;br /&gt;* chklist.ms&lt;br /&gt;* ivb.ntz&lt;br /&gt;* ivp.ntz&lt;br /&gt;* chklist.cps&lt;br /&gt;* smartchk.ms&lt;br /&gt;* smartchk.cps&lt;br /&gt;* aguard.dat&lt;br /&gt;* avgqt.dat&lt;br /&gt;* lguard.vps&lt;br /&gt;&lt;br /&gt;It will delete these files if they are found.&lt;br /&gt;Once the control of an infected file is passed to the virus body, it cleans the memory copy of the file (restores the original code at the patched locations), to make sure it is run only once from a certain file.&lt;br /&gt;&lt;br /&gt;When the virus is executed from an file with overlay, it makes a copy of that in the %TEMP% folder, disinfects it, and runs it from that location. This is useful in case of installers or SFX archives that use integrity checks.&lt;br /&gt;&lt;br /&gt;The virus will not infect the files matching the following names:&lt;br /&gt;&lt;br /&gt;* vtf tb dbg f- nav pav mon rav nvc fpr dss ibm inoc scn&lt;br /&gt;* pack vsaf vswp fsav adinf sqstart mc watch kasp nod setup&lt;br /&gt;* temp norton mcafee anti tmp secure upx forti scan &quot;zone labs&quot;&lt;br /&gt;* alarm symantec retina eeye virus firewall spider backdoor&lt;br /&gt;* drweb viri debug panda shield kaspersky doctor &quot;trend micro&quot;&lt;br /&gt;* sonique cillin barracuda sygate rescue pebundle ida spf&lt;br /&gt;* assemble pklite aspack disasm gladiator ort expl process&lt;br /&gt;* eliashim tds3 starforce sec avx root burn aladdin&lt;br /&gt;* esafe olly grisoft avg armor numega mirc softice norman&lt;br /&gt;* neolite tiny ositis proxy webroot hack spy iss pkware&lt;br /&gt;* blackice lavasoft aware pecompact clean hunter common kerio&lt;br /&gt;* route trojan spyware heal alwil qualys tenable avast a2&lt;br /&gt;* etrust spy steganos security principal agnitum outpost avp&lt;br /&gt;* personal softwin defender intermute guard inoculate sophos&lt;br /&gt;* frisk alwil protect eset nod32 f-prot avwin ahead nero&lt;br /&gt;* blindwrite clonecd elaborate slysoft hijack roxio imapi&lt;br /&gt;* newtech infosystems adaptec &quot;swift sound&quot; copystar astonsoft&lt;br /&gt;* &quot;gear software&quot; sateira dfrgntfs&lt;br /&gt;&lt;br /&gt;The decrypted virus body contains the following text:&lt;br /&gt;&lt;br /&gt;* Win32.Polipos v1.2 by Joseph&lt;br /&gt;&lt;br /&gt;source &lt;a href=&quot;http://www.bitdefender/&quot;&gt;Bitdevender&lt;/a&gt;&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default/473858200197541641'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default/473858200197541641'/><link rel='alternate' type='text/html' href='http://methodremovevirus.blogspot.com/2010/11/win32polipa.html' title='Win32.Polip.A'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/10526833191760012422</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjqgNqjbeNgRbxBJT_shlJ9QXaN1W0gX_ZxzmFEuS_xl4lNwECyX-YNuvQDgze7sraOUMyDGumSCzT2cmjtcVoYDA7lSa7cx-6Wts-YK-A5mBt-jy6LgsRonIObpz3hq83C5qsWQjNDfG-6/s72-c/virus-komputer-trojan-horse.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-8739921880945862903.post-3321841239041261822</id><published>2010-11-18T02:34:00.005+07:00</published><updated>2010-11-28T22:49:29.157+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Free Tools"/><title type='text'>Eater autorun.inf</title><content type='html'>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9hb1FhuxcpaVZvFK-Dz2HA4PjaPF4HIwDieI2CJ9ixfqTu3iCBy43yFA6uA-7CMMOIiQP5DtBKRdCXWlILUMDEdFJLgEQZmjIf75HJXMMmaaob6q5S99QmufcDN5V1xoGNQwHCATlHjAp/s1600/USBFingerprintSecurityLockFlashDisk_01.jpg&quot;&gt;&lt;img style=&quot;float: left; margin: 0pt 10px 10px 0pt; cursor: pointer; width: 201px; height: 248px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9hb1FhuxcpaVZvFK-Dz2HA4PjaPF4HIwDieI2CJ9ixfqTu3iCBy43yFA6uA-7CMMOIiQP5DtBKRdCXWlILUMDEdFJLgEQZmjIf75HJXMMmaaob6q5S99QmufcDN5V1xoGNQwHCATlHjAp/s320/USBFingerprintSecurityLockFlashDisk_01.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5540605886045805074&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span id=&quot;result_box&quot; class=&quot;&quot; lang=&quot;en&quot;&gt;&lt;span style=&quot;&quot; title=&quot;&quot;&gt;Autorun inf: remove virus from flashdisk&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span id=&quot;result_box&quot; class=&quot;&quot; lang=&quot;en&quot;&gt;&lt;span style=&quot;&quot; title=&quot;&quot;&gt;The &lt;span style=&quot;font-weight: bold;&quot;&gt;virus&lt;/span&gt;, now, can spread from any instrument, and even through the USB flashdisk so sure ..&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span id=&quot;result_box&quot; class=&quot;&quot; lang=&quot;en&quot;&gt;&lt;span style=&quot;&quot; title=&quot;&quot;&gt;Autorun.inf  is the primary file in the pen and is what is usually affected by  &lt;span style=&quot;font-weight: bold;&quot;&gt;worms&lt;/span&gt;, &lt;span style=&quot;font-weight: bold;&quot;&gt;Trojans&lt;/span&gt; and &lt;span style=&quot;font-weight: bold;&quot;&gt;viruses&lt;/span&gt; in general, This tool absolutely  free a little program that will analyze and eliminate, if infected,  this file.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span id=&quot;result_box&quot; class=&quot;&quot; lang=&quot;en&quot;&gt;&lt;span style=&quot;&quot; title=&quot;&quot;&gt;The process will take  before entering into, because the software in fact remove autorun.inf  immediately creating a backup file, thanks to it we can restore the file  &quot;clean&quot; with no other problems. &lt;/span&gt;&lt;span style=&quot;&quot; title=&quot;&quot;&gt;I remind you that USB Autorun Eater is of course free and is supported by all versions of Windows (XP, Vista, Seven&lt;/span&gt;&lt;/span&gt;)&lt;br /&gt;&lt;/div&gt;&lt;span id=&quot;result_box&quot; class=&quot;&quot; lang=&quot;en&quot;&gt;&lt;span style=&quot;&quot; title=&quot;&quot;&gt;&lt;br /&gt;&lt;a href=&quot;http://www.softpedia.com/progDownload/Autorun-Eater-Download-85585.html&quot;&gt;DOWNLOAD here&lt;/a&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;fullpost&quot;&gt;    &lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://methodremovevirus.blogspot.com/feeds/3321841239041261822/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://methodremovevirus.blogspot.com/2010/11/eater-autoruninf.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default/3321841239041261822'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default/3321841239041261822'/><link rel='alternate' type='text/html' href='http://methodremovevirus.blogspot.com/2010/11/eater-autoruninf.html' title='Eater autorun.inf'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/10526833191760012422</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9hb1FhuxcpaVZvFK-Dz2HA4PjaPF4HIwDieI2CJ9ixfqTu3iCBy43yFA6uA-7CMMOIiQP5DtBKRdCXWlILUMDEdFJLgEQZmjIf75HJXMMmaaob6q5S99QmufcDN5V1xoGNQwHCATlHjAp/s72-c/USBFingerprintSecurityLockFlashDisk_01.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8739921880945862903.post-4600786138372700761</id><published>2010-11-13T15:21:00.004+07:00</published><updated>2015-01-15T22:44:08.334+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Viruses"/><title type='text'>The name is Murofet</title><content type='html'>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJzVZzpI83IWuvBcLqMft4Qp8SBxM4MLQY3CthlxQSBnxiLbWobb5my3Yfn7CYtOOAR7GO90vMVeYWJ5Pob4eOEkiiH-LTYFqWcz5DNzKnsdENVfIOq4UvU8n1ZBtu_dCm08mO4V37ZfFP/s1600/virus+computer.gif&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJzVZzpI83IWuvBcLqMft4Qp8SBxM4MLQY3CthlxQSBnxiLbWobb5my3Yfn7CYtOOAR7GO90vMVeYWJ5Pob4eOEkiiH-LTYFqWcz5DNzKnsdENVfIOq4UvU8n1ZBtu_dCm08mO4V37ZfFP/s320/virus+computer.gif&quot; id=&quot;BLOGGER_PHOTO_ID_5538946760304401570&quot; style=&quot;cursor: pointer; float: left; height: 249px; margin: 0pt 10px 10px 0pt; width: 262px;&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;en&quot;&gt;&lt;span title=&quot;&quot;&gt;The name is Murofet and is a new virus for Windows that has the vague resemblance to the known Conficker.&lt;br /&gt;&lt;/span&gt;&lt;span title=&quot;&quot;&gt;This  virus is very treacherous, is capable of infecting many files saved on  your PC and is also able to steal passwords and send them saved on the  remote server through a computer hacker.&lt;br /&gt;&lt;/span&gt;&lt;span title=&quot;&quot;&gt;Murofet  infected PCs in the same way many other viruses: 2,000 bytes injected  into an exe file that, once started, download the virus on the hard  disk.&lt;br /&gt;&lt;/span&gt;&lt;span title=&quot;&quot;&gt;The attitude of  this malware is very ambiguous, it is able to start downloading the  virus but at the same time generates unique domains based on time of the  computer virus is still groped to reach them cyclically one by one.&lt;br /&gt;&lt;/span&gt;&lt;span title=&quot;&quot;&gt;In 24 hours appears to be able to connect to the domain until 1020 can not download the virus. &lt;/span&gt;&lt;span title=&quot;&quot;&gt;If the virus can infect two executables, trying to clog the network, in a cyclic way to connect to sites.&lt;br /&gt;&lt;/span&gt;&lt;span title=&quot;&quot;&gt;If you downloaded Murofet steal your data from your browser and the hacker will be sent to the remote server.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span title=&quot;&quot;&gt;source: from the web&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;fullpost&quot;&gt;    &lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://methodremovevirus.blogspot.com/feeds/4600786138372700761/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://methodremovevirus.blogspot.com/2010/11/name-is-murofet-and-is-new-virus-for.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default/4600786138372700761'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default/4600786138372700761'/><link rel='alternate' type='text/html' href='http://methodremovevirus.blogspot.com/2010/11/name-is-murofet-and-is-new-virus-for.html' title='The name is Murofet'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/10526833191760012422</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJzVZzpI83IWuvBcLqMft4Qp8SBxM4MLQY3CthlxQSBnxiLbWobb5my3Yfn7CYtOOAR7GO90vMVeYWJ5Pob4eOEkiiH-LTYFqWcz5DNzKnsdENVfIOq4UvU8n1ZBtu_dCm08mO4V37ZfFP/s72-c/virus+computer.gif" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8739921880945862903.post-8224335872482331308</id><published>2010-11-12T00:38:00.002+07:00</published><updated>2010-11-28T22:50:12.495+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Free Tools"/><title type='text'>Tool for free Win32.Worm.Stuxnet</title><content type='html'>&lt;span style=&quot;font-size:85%;&quot;&gt;BitDefender has released a removal tool for free Win32.Worm.Stuxnet, This tool is able to remove all known variants of Stuxnet, as well as the driver rootkit used to hide critical components of the worm. Win32.Worm.Stuxnet is a new type of online threat established around the middle of last July.&lt;br /&gt;&lt;br /&gt;Although it may infect any Windows-based system, this worm is aimed primarily to SCADA systems (control and data acquisition) based on Siemens WinCC software. The worm spreads by taking advantage of several 0 day exploits of the current version of Windows. Moreover, it can auto-run from mobile devices as soon as the file. Lnk on the device is read by the operating system. Exploiting this vulnerability involves the installation of a backdoor and two rootkits that hide both files. Lnk files and. Tmp that accompany it. &quot;Already 19 July BitDefender has added a generic detection than all the variations of Stuxnet, protecting their users from day one&lt;/span&gt;.&lt;br /&gt;&lt;span class=&quot;fullpost&quot;  style=&quot;font-size:85%;&quot;&gt;&lt;br /&gt;In addition, as part of its ongoing commitment to helping people around the world in the fight against online threats, BitDefender has created a removal tool to Stuxnet. In this way, users are not protected by a security solution can eliminate Bitdefender Stuxnet from their infected systems, &quot;says Catalin Cosoi, head of the &#39;Online Threats in BitDefender Lab. The tool can be used on 32 and 64-bit and eliminates both the driver of the rootkit is the worm. The removal tool of Stuxnet is available for download in the section on Removal Tools &lt;span style=&quot;font-weight: bold;&quot;&gt;www.malwarecity.com&lt;/span&gt;, an initiative dedicated to the community of BitDefender security software and free resource for anyone interested in their safety online&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://methodremovevirus.blogspot.com/feeds/8224335872482331308/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://methodremovevirus.blogspot.com/2010/11/tool-for-free-win32wormstuxnet.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default/8224335872482331308'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default/8224335872482331308'/><link rel='alternate' type='text/html' href='http://methodremovevirus.blogspot.com/2010/11/tool-for-free-win32wormstuxnet.html' title='Tool for free Win32.Worm.Stuxnet'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/10526833191760012422</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8739921880945862903.post-4275428404835428848</id><published>2010-11-09T23:38:00.009+07:00</published><updated>2010-11-28T22:50:38.811+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Free Tools"/><title type='text'>It &#39;s virus free, portable, and real time scans</title><content type='html'>&lt;span style=&quot;;font-family:georgia;font-size:85%;&quot;  &gt;This could be the slogan to advertise one of the best of its kind.&lt;br /&gt;&lt;br /&gt;Exactly! In fact, it is already difficult (or impossible) to find virus that gather together all these features. And if the results are more than satisfactory, so I can not positively review this product.&lt;br /&gt;&lt;br /&gt;Follow me to observe him more closely.&lt;br /&gt;&lt;br /&gt;I refer to SmadAv. Surely many of you (like me), this name does not say anything, probably because it is a young software and Indonesian nationality (even if in English), and this aspect does not play in his favor.&lt;br /&gt;&lt;br /&gt;SmadAV, however, has the potential to break through and be successful in this area.&lt;br /&gt;In fact, thanks to its own scanning engine that works quickly and accurately, coupled with a good heuristic algorithm, is able to easily identify all the variants of the virus in circulation.&lt;br /&gt;&lt;br /&gt;Its real strength, however, is the speed of scanning, and of course the accuracy of the work, making it one of the fastest compared to all other products in the industry.&lt;br /&gt;&lt;br /&gt;Once the download (the link is at the bottom of the article) we open the store. Rar and unzip the contents to a folder of your choice (being portable, can be quietly about our USB key).&lt;br /&gt;Let us now double-click on the green.&lt;br /&gt;&lt;br /&gt;Followed by a notice on which we click ok.&lt;br /&gt;Our antivirus will immediately begin a scan of running processes. I am not exaggerating when I say that I found 3 virus within a matter of seconds, as shown below&lt;br /&gt;t also offers other interesting features like the ability to report and send suspicious files, a Process Manager to view running programs, a system editor to modify the settings of the Start Menu or Windows Explorer, and a useful tool to force the system to execute those processes as the Task Manager, Registry Editor, Command Prompt, etc.. etc.., possibly damaged by the virus.&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnrPVWmeKqtf4uXf6uUIdntZT-JJy0QQiNQ9hdCL_YeAHRvkO3LZsqzh-kA6Fvv0dQnuyig-ILJ1dUPuoY7mzcCSRyzEPDsbj5h8RSK_BWbGc5XLhNAr9HZ4iFwjudI0bVb5KN1MdP7TZa/s1600/1234.GIF&quot;&gt;&lt;img style=&quot;display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 320px; height: 237px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnrPVWmeKqtf4uXf6uUIdntZT-JJy0QQiNQ9hdCL_YeAHRvkO3LZsqzh-kA6Fvv0dQnuyig-ILJ1dUPuoY7mzcCSRyzEPDsbj5h8RSK_BWbGc5XLhNAr9HZ4iFwjudI0bVb5KN1MdP7TZa/s320/1234.GIF&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5537592144814925650&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;;font-family:georgia;font-size:85%;&quot;  &gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span class=&quot;fullpost&quot;  style=&quot;font-size:85%;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:georgia;&quot;&gt;it also offers other interesting features like the ability to report and send suspicious files, a Process Manager to view running programs, a system editor to modify the settings of the Start Menu or Windows Explorer, and a useful tool to force the system to execute those processes as the Task Manager, Registry Editor, Command Prompt, etc.. etc.., possibly damaged by the virus.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:georgia;&quot;&gt;In summary, therefore, here is what are its salient features.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:georgia;&quot;&gt; 1. Scanning super fast, probably the fastest in the world!&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:georgia;&quot;&gt; 2. Not only disinfects viruses but also cleans up the files from infection;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:georgia;&quot;&gt; 3. Protects your computer in real time;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:georgia;&quot;&gt; 4. Updating;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:georgia;&quot;&gt; 5. Portable, and therefore can also be used from a USB stick;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:georgia;&quot;&gt; 6. Free;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:georgia;&quot;&gt;He also thanked the blog n web, for his article that I was teased the curiosity to seek out and review this virus&lt;/span&gt;.&lt;br /&gt;&lt;br /&gt;&lt;a style=&quot;font-weight: bold;&quot; href=&quot;http://www.smadav.net/download&quot;&gt;SMADAV DOWNLOAD&lt;/a&gt;&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://methodremovevirus.blogspot.com/feeds/4275428404835428848/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://methodremovevirus.blogspot.com/2010/11/here-it-s-virus-free-portable-and-that.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default/4275428404835428848'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default/4275428404835428848'/><link rel='alternate' type='text/html' href='http://methodremovevirus.blogspot.com/2010/11/here-it-s-virus-free-portable-and-that.html' title='It &#39;s virus free, portable, and real time scans'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/10526833191760012422</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnrPVWmeKqtf4uXf6uUIdntZT-JJy0QQiNQ9hdCL_YeAHRvkO3LZsqzh-kA6Fvv0dQnuyig-ILJ1dUPuoY7mzcCSRyzEPDsbj5h8RSK_BWbGc5XLhNAr9HZ4iFwjudI0bVb5KN1MdP7TZa/s72-c/1234.GIF" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8739921880945862903.post-5244426503106724839</id><published>2010-11-07T17:10:00.002+07:00</published><updated>2010-11-28T22:50:57.503+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Free Tools"/><title type='text'>Sality Remover</title><content type='html'>Sality virus is a complex including keyloggers and backdoor capabilities.&lt;br /&gt;Sality with his run, delete the files associated with security software including antivirus and firewall. Then run a keylogging module, which collects system information and network login names and passwords, steal confidential information stored in specific files and then sends all this data to a predefined email address. Sality can also open a back door (back door) that will provide access to the infected computer attackers. The intruder can then control the system and steal sensitive information.&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;Win32/Sality Remover will allow you to easily clean the virus infection from your PC. All you have to do is download the three files and run the executable file. You can also specify the disks (or partitions) as a command parameters, for example, &quot;rmsality C: D:&quot;. If the command is used without parameters, it heals all disks (partitions) on computer. You can download the tool from &lt;a href=&quot;http://www.blogger.com/%20%20%20http://www.ziddu.com/download/12422799/rmsality.exe.html&quot;&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;Note: To successfully run the remover requires administrator rights. For the correct operation of removal, you must save the rmsality.nt and rmsality.dos rmsality.exe in the same folder.&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://methodremovevirus.blogspot.com/feeds/5244426503106724839/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://methodremovevirus.blogspot.com/2010/11/sality-virus-is-complex-including.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default/5244426503106724839'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default/5244426503106724839'/><link rel='alternate' type='text/html' href='http://methodremovevirus.blogspot.com/2010/11/sality-virus-is-complex-including.html' title='Sality Remover'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/10526833191760012422</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8739921880945862903.post-9154849788460769091</id><published>2010-11-07T13:07:00.002+07:00</published><updated>2010-11-28T22:51:13.874+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Method Remove Virus"/><title type='text'>GUIDE ON HOW TO REMOVE VIRUS OR TROJAN</title><content type='html'>FIRST ANALYSIS&lt;br /&gt;&lt;br /&gt;Turn off system restore until you have been completely decontaminated:&lt;br /&gt;1. Click Start-&gt; Programs-&gt; Accessories-&gt; Windows Explorer.&lt;br /&gt;2. Click the right mouse button on My Computer and click Properties.&lt;br /&gt;3. Select the &quot;System Restore&quot;.&lt;br /&gt;4. Select &quot;Turn off System Restore&quot;&lt;br /&gt;5. Press OK. You are prompted to confirm the action as they will delete all restore&lt;br /&gt;points saved. Confirm by pressing YES.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Method for Win-Vista:&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;To enable or disable System Protection&lt;br /&gt;&lt;br /&gt;1. To open System, click StartImmagine the Start button, click Control Panel, System&lt;br /&gt;  and Maintenance, and then click System.&lt;br /&gt;2. In the left pane, click System Protection. Administrator permission required If&lt;br /&gt;  you are prompted for an administrator password or confirmation, type the password&lt;br /&gt;  or provide confirmation.&lt;br /&gt;3. To turn off System Protection for a hard disk, clear the checkbox next to the&lt;br /&gt;  disk, and then click OK.&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt; &lt;br /&gt;&lt;br /&gt;SECOND ANALYSIS&lt;br /&gt;&lt;br /&gt;clean junk files in the system&lt;br /&gt;&lt;br /&gt;1. Download CCleaner from this address &lt;a href=&quot;http://www.ccleaner.com/&quot;&gt;http://www.ccleaner.com&lt;/a&gt;&lt;br /&gt;2. Flegg after installing all the boxes and press and press down after cleaning&lt;br /&gt;&lt;br /&gt;THREE ANALYSIS&lt;br /&gt;&lt;br /&gt;scanning infected files&lt;br /&gt;&lt;br /&gt;1.Download from these websites, the following programs:&lt;br /&gt;         malwarebytes: &lt;a href=&quot;http://www.malwarebytes.org/&quot;&gt;http://www.malwarebytes.org&lt;/a&gt;&lt;br /&gt;         avira antivir: &lt;a href=&quot;http://www.free-av.com/&quot;&gt;http://www.free-av.com&lt;/a&gt;&lt;br /&gt;         Prevx: &lt;a href=&quot;http://www.prevx.com/&quot;&gt;http://www.prevx.com&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;2. Begin with the installation and subsequent updating of malwarebytes update it and&lt;br /&gt;  run it then click on deep scan to remove all end scan&lt;br /&gt;&lt;br /&gt;3. Or  uninstall your antivirus and installed avira antivir update it and run it do&lt;br /&gt;  a full scan scan order eliminated all&lt;br /&gt;&lt;br /&gt;4. Or installed Prevx full scan and end scan does not find anything if you&#39;re in is&lt;br /&gt;  a little bit as if the program is a fee you will never clear the virus but at&lt;br /&gt;  least tells you that file and you delete them manually.&lt;br /&gt;&lt;br /&gt;ANALYSIS FOURTH GENERAL CLEANING&lt;br /&gt;&lt;br /&gt;1.Download the following program &quot;Spybot&quot; from this address&lt;br /&gt; &lt;a href=&quot;http://www.safernetworking.org/&quot;&gt;http://www.safernetworking.org&lt;/a&gt;/it/index ...&lt;br /&gt;2. install it - run it and update it then click on full scan and end scan remove all&lt;br /&gt;&lt;br /&gt;I hope I have been very helpful Shoot down all the trojan and many are crused&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://methodremovevirus.blogspot.com/feeds/9154849788460769091/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://methodremovevirus.blogspot.com/2010/11/gguide-on-how-to-remove-virus-or-trojan.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default/9154849788460769091'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8739921880945862903/posts/default/9154849788460769091'/><link rel='alternate' type='text/html' href='http://methodremovevirus.blogspot.com/2010/11/gguide-on-how-to-remove-virus-or-trojan.html' title='GUIDE ON HOW TO REMOVE VIRUS OR TROJAN'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/10526833191760012422</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>