<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-3655698400884223479</id><updated>2025-07-09T20:47:27.122-07:00</updated><title type='text'>ANTI VIRUS SOFTWARE&#39;S</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://antivirus-software2009.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://antivirus-software2009.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/02820373220680933314</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>52</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-3655698400884223479.post-6773755831827551458</id><published>2014-06-02T08:00:00.001-07:00</published><updated>2014-06-02T08:00:27.622-07:00</updated><title type='text'>Antivirus software-based 2014</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;h2 style=&quot;background: none rgb(255, 255, 255); border-bottom-color: rgb(170, 170, 170); border-bottom-style: solid; border-bottom-width: 1px; font-family: &#39;Linux Libertine&#39;, Georgia, Times, serif; font-weight: normal; line-height: 1.3; margin: 1em 0px 0.25em; overflow: hidden; padding: 0px;&quot;&gt;
&lt;span class=&quot;mw-headline&quot; id=&quot;History&quot;&gt;History&lt;/span&gt;&lt;/h2&gt;
&lt;div&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqrA2pB8d77gpF5cwQj8rXW0mey-Wzccc_McEAU3AhYYwt_Hvt7-iPghOtzsTn5AYU37e8lPGdpBXrzuyTMF3M85KJ2BuaCtDjANn947XOZDHULe2-3qSGQTEE9FS4yH2d0hZQ-BvUl8Y/s1600/220px-ClamTK3.08.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqrA2pB8d77gpF5cwQj8rXW0mey-Wzccc_McEAU3AhYYwt_Hvt7-iPghOtzsTn5AYU37e8lPGdpBXrzuyTMF3M85KJ2BuaCtDjANn947XOZDHULe2-3qSGQTEE9FS4yH2d0hZQ-BvUl8Y/s1600/220px-ClamTK3.08.jpg&quot; /&gt;&lt;/a&gt;&lt;span class=&quot;mw-headline&quot;&gt;&lt;div style=&quot;background-color: white; color: #252525; font-family: sans-serif; font-size: 14px; line-height: 22.399999618530273px; margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
Most of the computer viruses written in the early and mid-1980s were limited to self-reproduction and &lt;sup class=&quot;reference&quot; id=&quot;cite_ref-6&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-6&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[6]&lt;/a&gt;&lt;/sup&gt;&amp;nbsp;That changed when more and more programmers became acquainted with virus programming and created viruses that manipulated or even destroyed data on infected computers.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
had no specific damage routine built into the code.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #252525; font-family: sans-serif; font-size: 14px; line-height: 22.399999618530273px; margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
There are competing claims for the innovator of the first antivirus product. Possibly the first publicly documented removal of a computer virus in the wild was performed by&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Bernd_Fix&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Bernd Fix&quot;&gt;Bernd Fix&lt;/a&gt;&amp;nbsp;in 1987.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-7&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-7&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[7]&lt;/a&gt;&lt;/sup&gt;&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-8&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-8&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[8]&lt;/a&gt;&lt;/sup&gt;&amp;nbsp;There were also two antivirus applications for the&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Atari_ST&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Atari ST&quot;&gt;Atari ST&lt;/a&gt;platform developed in 1987. The first one was&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/G_Data&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;G Data&quot;&gt;G Data&lt;/a&gt;&amp;nbsp;&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-Gdata_9-0&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-Gdata-9&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[9]&lt;/a&gt;&lt;/sup&gt;&amp;nbsp;and second was&amp;nbsp;&lt;a class=&quot;new&quot; href=&quot;http://en.wikipedia.org/w/index.php?title=UVK_2000&amp;amp;action=edit&amp;amp;redlink=1&quot; style=&quot;background: none; color: #a55858; text-decoration: none;&quot; title=&quot;UVK 2000 (page does not exist)&quot;&gt;UVK 2000&lt;/a&gt;.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-UniqueNameOfRef_10-0&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-UniqueNameOfRef-10&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[10]&lt;/a&gt;&lt;/sup&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #252525; font-family: sans-serif; font-size: 14px; line-height: 22.399999618530273px; margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
&lt;a href=&quot;http://en.wikipedia.org/wiki/Fred_Cohen&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Fred Cohen&quot;&gt;Fred Cohen&lt;/a&gt;, who published one of the first academic papers on computer viruses in 1984,&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-11&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-11&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[11]&lt;/a&gt;&lt;/sup&gt;&amp;nbsp;began to develop strategies for antivirus software in 1988&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-12&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-12&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[12]&lt;/a&gt;&lt;/sup&gt;&amp;nbsp;that were picked up and continued by later antivirus software developers. In 1987, he published a demonstration that there is no algorithm that can perfectly detect all possible viruses.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-Cohen1987_13-0&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-Cohen1987-13&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[13]&lt;/a&gt;&lt;/sup&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #252525; font-family: sans-serif; font-size: 14px; line-height: 22.399999618530273px; margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
In 1987 the first two&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Heuristic_(computer_science)&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Heuristic (computer science)&quot;&gt;heuristic&lt;/a&gt;&amp;nbsp;antivirus utilities were released: Flushot Plus by Ross Greenberg and Anti4us by Erwin Lanting.&lt;sup class=&quot;noprint Inline-Template Template-Fact&quot; style=&quot;line-height: 1; white-space: nowrap;&quot;&gt;[&lt;i&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Wikipedia:Citation_needed&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Wikipedia:Citation needed&quot;&gt;&lt;span title=&quot;This claim needs references to reliable sources. (July 2012)&quot;&gt;citation needed&lt;/span&gt;&lt;/a&gt;&lt;/i&gt;]&lt;/sup&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #252525; font-family: sans-serif; font-size: 14px; line-height: 22.399999618530273px; margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
Also in 1988 a mailing list named VIRUS-L&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-14&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-14&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[14]&lt;/a&gt;&lt;/sup&gt;&amp;nbsp;was started on the&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/BITNET&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;BITNET&quot;&gt;BITNET&lt;/a&gt;/&lt;a class=&quot;mw-redirect&quot; href=&quot;http://en.wikipedia.org/wiki/European_Academic_Research_Network&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;European Academic Research Network&quot;&gt;EARN&lt;/a&gt;&amp;nbsp;network where new viruses and the possibilities of detecting and eliminating viruses were discussed. Some members of this mailing list like&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/John_McAfee&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;John McAfee&quot;&gt;John McAfee&lt;/a&gt;&amp;nbsp;or&lt;a href=&quot;http://en.wikipedia.org/wiki/Eugene_Kaspersky&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Eugene Kaspersky&quot;&gt;Eugene Kaspersky&lt;/a&gt;&amp;nbsp;later founded software companies that developed and sold commercial antivirus software.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #252525; font-family: sans-serif; font-size: 14px; line-height: 22.399999618530273px; margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
Before&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Internet&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Internet&quot;&gt;internet&lt;/a&gt;&amp;nbsp;connectivity was widespread, viruses were typically spread by infected&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Floppy_disk&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Floppy disk&quot;&gt;floppy disks&lt;/a&gt;. Antivirus software came into use, but was updated relatively infrequently. During this time, virus checkers essentially had to check executable files and the boot sectors of floppy disks and hard disks. However, as internet usage became common, viruses began to spread online.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-15&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-15&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[15]&lt;/a&gt;&lt;/sup&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #252525; font-family: sans-serif; font-size: 14px; line-height: 22.399999618530273px; margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
Over the years it has become necessary for antivirus software to check an increasing variety of files, rather than just executables, for several reasons:&lt;/div&gt;
&lt;ul style=&quot;background-color: white; color: #252525; font-family: sans-serif; font-size: 14px; line-height: 22.399999618530273px; list-style-image: url(data:image/png; margin: 0.3em 0px 0px 1.6em; padding: 0px;&quot;&gt;
&lt;li style=&quot;margin-bottom: 0.1em; text-align: justify;&quot;&gt;Powerful&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Macro_(computer_science)&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Macro (computer science)&quot;&gt;macros&lt;/a&gt;&amp;nbsp;used in&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Word_processor&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Word processor&quot;&gt;word processor&lt;/a&gt;&amp;nbsp;applications, such as&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Microsoft_Word&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Microsoft Word&quot;&gt;Microsoft Word&lt;/a&gt;, presented a risk. Virus writers could use the macros to write viruses embedded within documents. This meant that computers could now also be at risk from infection by opening documents with hidden attached macros.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-16&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-16&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[16]&lt;/a&gt;&lt;/sup&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0.1em; text-align: justify;&quot;&gt;The possibility of embedding executable objects inside otherwise non-executable file formats can make opening those files a risk.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-17&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-17&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[17]&lt;/a&gt;&lt;/sup&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0.1em; text-align: justify;&quot;&gt;Later email programs, in particular Microsoft&#39;s&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Outlook_Express&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Outlook Express&quot;&gt;Outlook Express&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Microsoft_Outlook&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Microsoft Outlook&quot;&gt;Outlook&lt;/a&gt;, were&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Vulnerability_(computing)&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Vulnerability (computing)&quot;&gt;vulnerable&lt;/a&gt;&amp;nbsp;to viruses embedded in the email body itself. A user&#39;s computer could be infected by just opening or previewing a message.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-18&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-18&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[18]&lt;/a&gt;&lt;/sup&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;background-color: white; color: #252525; font-family: sans-serif; font-size: 14px; line-height: 22.399999618530273px; margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
&lt;sup class=&quot;noprint Inline-Template Template-Fact&quot; style=&quot;line-height: 1; white-space: nowrap;&quot;&gt;&lt;/sup&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #252525; font-family: sans-serif; font-size: 14px; line-height: 22.399999618530273px; margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
As always-on broadband connections became the norm, and more and more viruses were released, it became essential to update virus checkers more and more frequently. Even then, a new&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Zero-day_virus&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Zero-day virus&quot;&gt;zero-day virus&lt;/a&gt;&amp;nbsp;could become widespread before antivirus companies released an update to protect against it.&lt;/div&gt;
&lt;h2 style=&quot;background: none rgb(255, 255, 255); border-bottom-color: rgb(170, 170, 170); border-bottom-style: solid; border-bottom-width: 1px; font-family: &#39;Linux Libertine&#39;, Georgia, Times, serif; font-weight: normal; line-height: 1.3; margin: 1em 0px 0.25em; overflow: hidden; padding: 0px;&quot;&gt;
&lt;span class=&quot;mw-headline&quot; id=&quot;Identification_method&quot;&gt;Identification method&lt;/span&gt;&lt;/h2&gt;
&lt;div&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirnc07DJu4u4sYrmHT-vZGHaRaNzVFPkqXvGwBGEBAKzeEYW2SNxdsz1MSZv0mDbyQQYJndReRv7tpBTwJYEV5hdbxqXxlhH8XBsxoeTJCOH2vTM2fkIqylBtq03rv_O8kTXmPLxHmtGQ/s1600/220px-MalwarebytesMainGUI.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirnc07DJu4u4sYrmHT-vZGHaRaNzVFPkqXvGwBGEBAKzeEYW2SNxdsz1MSZv0mDbyQQYJndReRv7tpBTwJYEV5hdbxqXxlhH8XBsxoeTJCOH2vTM2fkIqylBtq03rv_O8kTXmPLxHmtGQ/s1600/220px-MalwarebytesMainGUI.png&quot; /&gt;&lt;/a&gt;&lt;span class=&quot;mw-headline&quot;&gt;&lt;div style=&quot;background-color: white; color: #252525; font-family: sans-serif; font-size: 14px; line-height: 22.399999618530273px; margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
One of the few solid theoretical results in the study of computer viruses is&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Fred_Cohen&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Fred Cohen&quot;&gt;Frederick B. Cohen&#39;s&lt;/a&gt;&amp;nbsp;1987&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-Cohen1987_13-1&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-Cohen1987-13&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[13]&lt;/a&gt;&lt;/sup&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
 demonstration that there is no algorithm that can perfectly detect all possible viruses.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #252525; font-family: sans-serif; font-size: 14px; line-height: 22.399999618530273px; margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
There are several methods which antivirus software can use to identify malware:&lt;/div&gt;
&lt;ul style=&quot;background-color: white; color: #252525; font-family: sans-serif; font-size: 14px; line-height: 22.399999618530273px; list-style-image: url(data:image/png; margin: 0.3em 0px 0px 1.6em; padding: 0px;&quot;&gt;
&lt;li style=&quot;margin-bottom: 0.1em; text-align: justify;&quot;&gt;Signature based detection is the most common method. To identify viruses and other malware, antivirus software compares the contents of a file to a&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Associative_array&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Associative array&quot;&gt;dictionary&lt;/a&gt;of virus signatures. Because viruses can embed themselves in existing files, the entire file is searched, not just as a whole, but also in pieces.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-About2009_19-0&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-About2009-19&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[19]&lt;/a&gt;&lt;/sup&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;background-color: white; color: #252525; font-family: sans-serif; font-size: 14px; line-height: 22.399999618530273px; list-style-image: url(data:image/png; margin: 0.3em 0px 0px 1.6em; padding: 0px;&quot;&gt;
&lt;li style=&quot;margin-bottom: 0.1em; text-align: justify;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Heuristic&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Heuristic&quot;&gt;Heuristic&lt;/a&gt;-based detection like malicious activity detection, can be used to identify unknown viruses.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;background-color: white; color: #252525; font-family: sans-serif; font-size: 14px; line-height: 22.399999618530273px; list-style-image: url(data:image/png; margin: 0.3em 0px 0px 1.6em; padding: 0px;&quot;&gt;
&lt;li style=&quot;margin-bottom: 0.1em; text-align: justify;&quot;&gt;File emulation is another heuristic approach. File emulation involves executing a program in a&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Virtual_machine&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Virtual machine&quot;&gt;virtual environment&lt;/a&gt;&amp;nbsp;and logging what actions the program performs. Depending on the actions logged, the antivirus software can determine if the program is malicious or not and then carry out the appropriate disinfection actions.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-20&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-20&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[20]&lt;/a&gt;&lt;/sup&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0.1em; text-align: justify;&quot;&gt;&lt;h3 style=&quot;background-attachment: initial; background-clip: initial; background-image: none; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border-bottom-style: none; color: black; line-height: 1.6; margin: 0.3em 0px 0px; overflow: hidden; padding-bottom: 0px; padding-top: 0.5em; text-align: justify;&quot;&gt;
&lt;span class=&quot;mw-headline&quot; id=&quot;Signature-based_detection&quot;&gt;Signature-based detection&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
Traditionally, antivirus software heavily relied upon signatures to identify malware. This can be very effective, but cannot defend against malware unless samples have already been obtained and signatures created. Because of this, signature-based approaches are not effective against new, unknown viruses.&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
As new viruses are being created each day, the signature-based detection approach requires frequent updates of the virus signature dictionary. To assist the antivirus software companies, the software may allow the user to upload new viruses or variants to the company, allowing the virus to be analyzed and the signature added to the dictionary.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-About2009_19-1&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-About2009-19&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[19]&lt;/a&gt;&lt;/sup&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
Although the signature-based approach can effectively contain virus outbreaks, virus authors have tried to stay a step ahead of such software by writing &quot;&lt;a href=&quot;http://en.wikipedia.org/wiki/Oligomorphic_code&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Oligomorphic code&quot;&gt;oligomorphic&lt;/a&gt;&quot;, &quot;&lt;a href=&quot;http://en.wikipedia.org/wiki/Polymorphic_code&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Polymorphic code&quot;&gt;polymorphic&lt;/a&gt;&quot; and, more recently, &quot;&lt;a href=&quot;http://en.wikipedia.org/wiki/Metamorphic_code&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Metamorphic code&quot;&gt;metamorphic&lt;/a&gt;&quot; viruses, which encrypt parts of themselves or otherwise modify themselves as a method of disguise, so as to not match virus signatures in the dictionary.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-21&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-21&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[21]&lt;/a&gt;&lt;/sup&gt;&lt;/div&gt;
&lt;h3 style=&quot;background-attachment: initial; background-clip: initial; background-image: none; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border-bottom-style: none; color: black; line-height: 1.6; margin: 0.3em 0px 0px; overflow: hidden; padding-bottom: 0px; padding-top: 0.5em; text-align: justify;&quot;&gt;
&lt;span class=&quot;mw-headline&quot; id=&quot;Heuristics&quot;&gt;Heuristics&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
Some more sophisticated antivirus software uses&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Heuristic_(computer_science)&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Heuristic (computer science)&quot;&gt;heuristic&lt;/a&gt;&amp;nbsp;analysis to identify new malware or variants of known malware.&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
Many viruses start as a single infection and through either&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Mutation_(genetic_algorithm)&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Mutation (genetic algorithm)&quot;&gt;mutation&lt;/a&gt;&amp;nbsp;or refinements by other attackers, can grow into dozens of slightly different strains, called variants. Generic detection refers to the detection and removal of multiple threats using a single virus definition.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-22&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-22&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[22]&lt;/a&gt;&lt;/sup&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
For example, the&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Vundo&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Vundo&quot;&gt;Vundo&lt;/a&gt;&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Trojan_horse_(computing)&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Trojan horse (computing)&quot;&gt;trojan&lt;/a&gt;&amp;nbsp;has several family members, depending on the antivirus vendor&#39;s classification.&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Symantec&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Symantec&quot;&gt;Symantec&lt;/a&gt;classifies members of the Vundo family into two distinct categories,&amp;nbsp;&lt;i&gt;Trojan.Vundo&lt;/i&gt;&amp;nbsp;and&amp;nbsp;&lt;i&gt;Trojan.Vundo.B&lt;/i&gt;.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-23&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-23&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[23]&lt;/a&gt;&lt;/sup&gt;&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-24&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-24&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[24]&lt;/a&gt;&lt;/sup&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
While it may be advantageous to identify a specific virus, it can be quicker to detect a virus family through a generic signature or through an inexact match to an existing signature. Virus researchers find common areas that all viruses in a family share uniquely and can thus create a single generic signature. These signatures often contain non-contiguous code, using&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Wildcard_character&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Wildcard character&quot;&gt;wildcard characters&lt;/a&gt;&amp;nbsp;where differences lie. These wildcards allow the scanner to detect viruses even if they are padded with extra, meaningless code.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-25&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-25&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[25]&lt;/a&gt;&lt;/sup&gt;&amp;nbsp;A detection that uses this method is said to be &quot;heuristic detection.&quot;&lt;/div&gt;
&lt;h3 style=&quot;background-attachment: initial; background-clip: initial; background-image: none; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border-bottom-style: none; color: black; line-height: 1.6; margin: 0.3em 0px 0px; overflow: hidden; padding-bottom: 0px; padding-top: 0.5em; text-align: justify;&quot;&gt;
&lt;span class=&quot;mw-headline&quot; id=&quot;Rootkit_detection&quot;&gt;Rootkit detection&lt;/span&gt;&lt;/h3&gt;
&lt;div class=&quot;hatnote relarticle mainarticle&quot; style=&quot;font-style: italic; margin-bottom: 0.5em; padding-left: 1.6em; text-align: justify;&quot;&gt;
Main article:&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Rootkit&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Rootkit&quot;&gt;Rootkit&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
Anti-virus software can attempt to scan for rootkits; a&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Rootkit&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Rootkit&quot;&gt;rootkit&lt;/a&gt;&amp;nbsp;is a type of&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Malware&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Malware&quot;&gt;malware&lt;/a&gt;&amp;nbsp;that is designed to gain administrative-level control over a computer system without being detected. Rootkits can change how the&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Operating_system&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Operating system&quot;&gt;operating system&lt;/a&gt;&amp;nbsp;functions and in some cases can tamper with the anti-virus program and render it ineffective. Rootkits are also difficult to remove, in some cases requiring a complete re-installation of the operating system.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-26&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-26&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[26]&lt;/a&gt;&lt;/sup&gt;&lt;/div&gt;
&lt;h3 style=&quot;background-attachment: initial; background-clip: initial; background-image: none; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border-bottom-style: none; color: black; line-height: 1.6; margin: 0.3em 0px 0px; overflow: hidden; padding-bottom: 0px; padding-top: 0.5em; text-align: justify;&quot;&gt;
&lt;span class=&quot;mw-headline&quot; id=&quot;Real-time_protection&quot;&gt;Real-time protection&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
Real-time protection, on-access scanning, background guard, resident shield, autoprotect, and other synonyms refer to the automatic protection provided by most antivirus, anti-spyware, and other anti-malware programs. This monitors computer systems for suspicious activity such as computer viruses, spyware, adware, and other malicious objects in &#39;real-time&#39;, in other words while data loaded into the computer&#39;s active memory: when inserting a CD, opening an email, or browsing the web, or when a file already on the computer is opened or executed.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-27&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-27&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[27]&lt;/a&gt;&lt;/sup&gt;&lt;/div&gt;
&lt;h2 style=&quot;background-attachment: initial; background-clip: initial; background-image: none; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border-bottom-color: rgb(170, 170, 170); border-bottom-style: solid; border-bottom-width: 1px; color: black; font-family: &#39;Linux Libertine&#39;, Georgia, Times, serif; font-weight: normal; line-height: 1.3; margin: 1em 0px 0.25em; overflow: hidden; padding: 0px; text-align: justify;&quot;&gt;
&lt;span class=&quot;mw-headline&quot; id=&quot;Issues_of_concern&quot;&gt;Issues of concern&lt;/span&gt;&lt;/h2&gt;
&lt;h3 style=&quot;background-attachment: initial; background-clip: initial; background-image: none; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border-bottom-style: none; color: black; line-height: 1.6; margin: 0.3em 0px 0px; overflow: hidden; padding-bottom: 0px; padding-top: 0.5em; text-align: justify;&quot;&gt;
&lt;span class=&quot;mw-headline&quot; id=&quot;Unexpected_renewal_costs&quot;&gt;Unexpected renewal costs&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
Some commercial antivirus software&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/End-user_license_agreement&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;End-user license agreement&quot;&gt;end-user license agreements&lt;/a&gt;&amp;nbsp;include a clause that the&amp;nbsp;&lt;a class=&quot;mw-redirect&quot; href=&quot;http://en.wikipedia.org/wiki/Subscription&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Subscription&quot;&gt;subscription&lt;/a&gt;&amp;nbsp;will be automatically renewed, and the purchaser&#39;s credit card automatically billed, at the renewal time without explicit approval. For example,&lt;a href=&quot;http://en.wikipedia.org/wiki/McAfee&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;McAfee&quot;&gt;McAfee&lt;/a&gt;&amp;nbsp;requires users to unsubscribe at least 60 days before the expiration of the present subscription&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-28&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-28&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[28]&lt;/a&gt;&lt;/sup&gt;&amp;nbsp;while&lt;a class=&quot;mw-redirect&quot; href=&quot;http://en.wikipedia.org/wiki/BitDefender&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;BitDefender&quot;&gt;BitDefender&lt;/a&gt;&amp;nbsp;sends notifications to unsubscribe 30 days before the renewal.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-29&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-29&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[29]&lt;/a&gt;&lt;/sup&gt;&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Norton_AntiVirus&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Norton AntiVirus&quot;&gt;Norton AntiVirus&lt;/a&gt;&amp;nbsp;also renews subscriptions automatically by default.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-30&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-30&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[30]&lt;/a&gt;&lt;/sup&gt;&lt;/div&gt;
&lt;h3 style=&quot;background-attachment: initial; background-clip: initial; background-image: none; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border-bottom-style: none; color: black; line-height: 1.6; margin: 0.3em 0px 0px; overflow: hidden; padding-bottom: 0px; padding-top: 0.5em; text-align: justify;&quot;&gt;
&lt;span class=&quot;mw-headline&quot; id=&quot;Rogue_security_applications&quot;&gt;Rogue security applications&lt;/span&gt;&lt;/h3&gt;
&lt;div class=&quot;hatnote relarticle mainarticle&quot; style=&quot;font-style: italic; margin-bottom: 0.5em; padding-left: 1.6em; text-align: justify;&quot;&gt;
Main article:&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Rogue_security_software&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Rogue security software&quot;&gt;Rogue security software&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
Some apparent antivirus programs are actually&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Malware&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Malware&quot;&gt;malware&lt;/a&gt;&amp;nbsp;masquerading as legitimate software, such as&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/WinFixer&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;WinFixer&quot;&gt;WinFixer&lt;/a&gt;,&amp;nbsp;&lt;a class=&quot;mw-redirect&quot; href=&quot;http://en.wikipedia.org/wiki/MS_Antivirus&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;MS Antivirus&quot;&gt;MS Antivirus&lt;/a&gt;, and&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Mac_Defender&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Mac Defender&quot;&gt;Mac Defender&lt;/a&gt;.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-31&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-31&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[31]&lt;/a&gt;&lt;/sup&gt;&lt;/div&gt;
&lt;h3 style=&quot;background-attachment: initial; background-clip: initial; background-image: none; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border-bottom-style: none; color: black; line-height: 1.6; margin: 0.3em 0px 0px; overflow: hidden; padding-bottom: 0px; padding-top: 0.5em; text-align: justify;&quot;&gt;
&lt;span class=&quot;mw-headline&quot; id=&quot;Problems_caused_by_false_positives&quot;&gt;Problems caused by false positives&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
A &quot;false positive&quot; is when antivirus software identifies a non-malicious file as a virus. When this happens, it can cause serious problems. For example, if an antivirus program is configured to immediately delete or quarantine infected files, as is common on&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Microsoft_Windows&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Microsoft Windows&quot;&gt;Microsoft Windows&lt;/a&gt;&amp;nbsp;antivirus applications, a false positive in an essential file can render the Windows&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Operating_system&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Operating system&quot;&gt;operating system&lt;/a&gt;&amp;nbsp;or some applications unusable.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-32&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-32&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[32]&lt;/a&gt;&lt;/sup&gt;&amp;nbsp;Recovering from such damage to critical software infrastructure incurs technical support costs and businesses can be forced to close whilst remedial action is undertaken.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-33&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-33&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[33]&lt;/a&gt;&lt;/sup&gt;&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-34&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-34&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[34]&lt;/a&gt;&lt;/sup&gt;&amp;nbsp;For example, in May 2007 a faulty virus signature issued by&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Symantec&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Symantec&quot;&gt;Symantec&lt;/a&gt;&amp;nbsp;mistakenly removed essential operating system files, leaving thousands of PCs unable to&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Boot&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Boot&quot;&gt;boot&lt;/a&gt;.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-35&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-35&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[35]&lt;/a&gt;&lt;/sup&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
Also in May 2007, the&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Executable&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Executable&quot;&gt;executable file&lt;/a&gt;&amp;nbsp;required by&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Pegasus_Mail&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Pegasus Mail&quot;&gt;Pegasus Mail&lt;/a&gt;&amp;nbsp;on Windows was falsely detected by&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Norton_AntiVirus&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Norton AntiVirus&quot;&gt;Norton AntiVirus&lt;/a&gt;&amp;nbsp;as being a Trojan and it was automatically removed, preventing Pegasus Mail from running. Norton AntiVirus had falsely identified three releases of Pegasus Mail as malware, and would delete the Pegasus Mail installer file when that happened.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-v45x_36-0&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-v45x-36&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[36]&lt;/a&gt;&lt;/sup&gt;&amp;nbsp;In response to this Pegasus Mail stated:&lt;/div&gt;
&lt;table class=&quot;cquote&quot; style=&quot;background-color: transparent; border-collapse: collapse; border: none; color: #252525; font-size: 14px; line-height: 22.399999618530273px; margin: auto; text-align: justify; width: auto;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;border: none; color: #b2b7f2; font-family: &#39;Times New Roman&#39;, serif; font-size: 35px; font-weight: bold; padding: 10px;&quot; valign=&quot;top&quot; width=&quot;20&quot;&gt;“&lt;/td&gt;&lt;td style=&quot;border: none; padding: 4px 10px;&quot; valign=&quot;top&quot;&gt;On the basis that Norton/Symantec has done this for every one of the last three releases of Pegasus Mail, we can only condemn this product as too flawed to use, and recommend in the strongest terms that our users cease using it in favour of alternative, less buggy anti-virus packages.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-v45x_36-1&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-v45x-36&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[36]&lt;/a&gt;&lt;/sup&gt;&lt;/td&gt;&lt;td style=&quot;border: none; color: #b2b7f2; font-family: &#39;Times New Roman&#39;, serif; font-size: 35px; font-weight: bold; padding: 10px; text-align: right;&quot; valign=&quot;bottom&quot; width=&quot;20&quot;&gt;”&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
In April 2010,&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/McAfee_VirusScan&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;McAfee VirusScan&quot;&gt;McAfee VirusScan&lt;/a&gt;&amp;nbsp;detected svchost.exe, a normal Windows binary, as a virus on machines running&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Windows_XP&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Windows XP&quot;&gt;Windows XP&lt;/a&gt;&amp;nbsp;with Service Pack 3, causing a reboot loop and loss of all network access.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-37&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-37&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[37]&lt;/a&gt;&lt;/sup&gt;&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-38&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-38&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[38]&lt;/a&gt;&lt;/sup&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
In December 2010, a faulty update on the&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/AVG_(software)&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;AVG (software)&quot;&gt;AVG&lt;/a&gt;&amp;nbsp;anti-virus suite damaged 64-bit versions of&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Windows_7&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Windows 7&quot;&gt;Windows 7&lt;/a&gt;, rendering it unable to boot, due to an endless boot loop created.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-39&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-39&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[39]&lt;/a&gt;&lt;/sup&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
In October 2011,&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Microsoft_Security_Essentials&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Microsoft Security Essentials&quot;&gt;Microsoft Security Essentials&lt;/a&gt;&amp;nbsp;(MSE) removed the&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Google_Chrome&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Google Chrome&quot;&gt;Google Chrome&lt;/a&gt;&amp;nbsp;web browser, rival to Microsoft&#39;s own&lt;a href=&quot;http://en.wikipedia.org/wiki/Internet_Explorer&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Internet Explorer&quot;&gt;Internet Explorer&lt;/a&gt;. MSE flagged Chrome as a&amp;nbsp;&lt;a class=&quot;mw-redirect&quot; href=&quot;http://en.wikipedia.org/wiki/Zeus_(trojan_horse)&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Zeus (trojan horse)&quot;&gt;Zbot banking trojan&lt;/a&gt;.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-40&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-40&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[40]&lt;/a&gt;&lt;/sup&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
In September 2012,&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Sophos&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Sophos&quot;&gt;Sophos&lt;/a&gt;&#39; anti-virus suite identified various update-mechanisms, including its own, as malware. If it was configured to automatically delete detected files, Sophos Antivirus could render itself unable to update, required manual intervention to fix the problem.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-41&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-41&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[41]&lt;/a&gt;&lt;/sup&gt;&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-42&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-42&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[42]&lt;/a&gt;&lt;/sup&gt;&lt;/div&gt;
&lt;h3 style=&quot;background-attachment: initial; background-clip: initial; background-image: none; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border-bottom-style: none; color: black; line-height: 1.6; margin: 0.3em 0px 0px; overflow: hidden; padding-bottom: 0px; padding-top: 0.5em; text-align: justify;&quot;&gt;
&lt;span class=&quot;mw-headline&quot; id=&quot;System_and_interoperability_related_issues&quot;&gt;System and interoperability related issues&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
Running multiple antivirus programs concurrently can degrade performance and create conflicts.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-43&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-43&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[43]&lt;/a&gt;&lt;/sup&gt;&amp;nbsp;However, using a concept called&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Multiscanning&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Multiscanning&quot;&gt;multiscanning&lt;/a&gt;, several companies (including&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/G_Data&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;G Data&quot;&gt;G Data&lt;/a&gt;&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-44&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-44&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[44]&lt;/a&gt;&lt;/sup&gt;&amp;nbsp;and&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Microsoft&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Microsoft&quot;&gt;Microsoft&lt;/a&gt;&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-45&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-45&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[45]&lt;/a&gt;&lt;/sup&gt;) have created applications which can run multiple engines concurrently.&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
It is sometimes necessary to temporarily disable virus protection when installing major updates such as Windows Service Packs or updating graphics card drivers.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-46&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-46&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[46]&lt;/a&gt;&lt;/sup&gt;&amp;nbsp;Active antivirus protection may partially or completely prevent the installation of a major update. Anti-virus software can cause problems during the installation of an operating system upgrade, e.g. when upgrading to a newer version of Windows &quot;in place&quot; — without erasing the previous version of Windows. Microsoft recommends that anti-virus software be disabled to avoid conflicts with the upgrade installation process.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-47&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-47&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[47]&lt;/a&gt;&lt;/sup&gt;&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-48&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-48&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[48]&lt;/a&gt;&lt;/sup&gt;&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-49&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-49&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[49]&lt;/a&gt;&lt;/sup&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
The functionality of a few computer programs can be hampered by active anti-virus software. For example&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/TrueCrypt&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;TrueCrypt&quot;&gt;TrueCrypt&lt;/a&gt;, a disk encryption program, states on its troubleshooting page that anti-virus programs can conflict with TrueCrypt and cause it to malfunction or operate very slowly.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-50&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-50&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[50]&lt;/a&gt;&lt;/sup&gt;&amp;nbsp;Anti-virus software can impair the performance and stability of games running in the&lt;a href=&quot;http://en.wikipedia.org/wiki/Steam_(software)&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Steam (software)&quot;&gt;Steam&lt;/a&gt;&amp;nbsp;platform.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-51&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-51&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[51]&lt;/a&gt;&lt;/sup&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
Support issues also exist around antivirus application interoperability with common solutions like&amp;nbsp;&lt;a class=&quot;mw-redirect&quot; href=&quot;http://en.wikipedia.org/wiki/VPN&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;VPN&quot;&gt;SSL VPN remote access&lt;/a&gt;and&amp;nbsp;&lt;a class=&quot;mw-redirect&quot; href=&quot;http://en.wikipedia.org/wiki/Network_access_control&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Network access control&quot;&gt;network access control&lt;/a&gt;&amp;nbsp;products.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-52&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-52&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[52]&lt;/a&gt;&lt;/sup&gt;&amp;nbsp;These technology solutions often have policy assessment applications which require that an up to date antivirus is installed and running. If the antivirus application is not recognized by the policy assessment, whether because the antivirus application has been updated or because it is not part of the policy assessment library, the user will be unable to connect.&lt;/div&gt;
&lt;h3 style=&quot;background-attachment: initial; background-clip: initial; background-image: none; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border-bottom-style: none; color: black; line-height: 1.6; margin: 0.3em 0px 0px; overflow: hidden; padding-bottom: 0px; padding-top: 0.5em; text-align: justify;&quot;&gt;
&lt;span class=&quot;mw-headline&quot; id=&quot;Effectiveness&quot;&gt;Effectiveness&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
Studies in December 2007 showed that the effectiveness of antivirus software had decreased in the previous year, particularly against unknown or&amp;nbsp;&lt;a class=&quot;mw-redirect&quot; href=&quot;http://en.wikipedia.org/wiki/Zero_day_attack&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Zero day attack&quot;&gt;zero day attacks&lt;/a&gt;. The computer magazine&amp;nbsp;&lt;i&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/C%27t&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;C&#39;t&quot;&gt;c&#39;t&lt;/a&gt;&lt;/i&gt;&amp;nbsp;found that detection rates for these threats had dropped from 40-50% in 2006 to 20-30% in 2007. At that time, the only exception was the&amp;nbsp;&lt;a class=&quot;mw-redirect&quot; href=&quot;http://en.wikipedia.org/wiki/NOD32&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;NOD32&quot;&gt;NOD32&lt;/a&gt;&amp;nbsp;antivirus, which managed a detection rate of 68 percent.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-53&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-53&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[53]&lt;/a&gt;&lt;/sup&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
The problem is magnified by the changing intent of virus authors. Some years ago it was obvious when a virus infection was present. The viruses of the day, written by amateurs, exhibited destructive behavior or&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Pop-up_ad&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Pop-up ad&quot;&gt;pop-ups&lt;/a&gt;. Modern viruses are often written by professionals, financed by&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Organized_crime&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Organized crime&quot;&gt;criminal organizations&lt;/a&gt;.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-54&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-54&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[54]&lt;/a&gt;&lt;/sup&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
Independent testing on all the major virus scanners consistently shows that none provide 100% virus detection. The best ones provided as high as 99.9% detection for simulated real-world situations, while the lowest provided 91.1% in tests conducted in August 2013. Many virus scanners produce false positive results as well, identifying benign files as malware.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-55&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-55&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[55]&lt;/a&gt;&lt;/sup&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
Although methodologies may differ, some notable independent quality testing agencies include&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/AV-Comparatives&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;AV-Comparatives&quot;&gt;AV-Comparatives&lt;/a&gt;,&amp;nbsp;&lt;a class=&quot;mw-redirect&quot; href=&quot;http://en.wikipedia.org/wiki/ICSA_Labs&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;ICSA Labs&quot;&gt;ICSA Labs&lt;/a&gt;, West Coast Labs,&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Virus_Bulletin&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Virus Bulletin&quot;&gt;Virus Bulletin&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/AV-TEST&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;AV-TEST&quot;&gt;AV-TEST&lt;/a&gt;&amp;nbsp;and other members of the&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Anti-Malware_Testing_Standards_Organization&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Anti-Malware Testing Standards Organization&quot;&gt;Anti-Malware Testing Standards Organization&lt;/a&gt;.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-56&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-56&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[56]&lt;/a&gt;&lt;/sup&gt;&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-Harley_2011_57-0&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-Harley_2011-57&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[57]&lt;/a&gt;&lt;/sup&gt;&lt;/div&gt;
&lt;h3 style=&quot;background-attachment: initial; background-clip: initial; background-image: none; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border-bottom-style: none; color: black; line-height: 1.6; margin: 0.3em 0px 0px; overflow: hidden; padding-bottom: 0px; padding-top: 0.5em; text-align: justify;&quot;&gt;
&lt;span class=&quot;mw-headline&quot; id=&quot;New_viruses&quot;&gt;New viruses&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
Anti-virus programs are not always effective against new viruses, even those that use non-signature-based methods that should detect new viruses. The reason for this is that the virus designers test their new viruses on the major anti-virus applications to make sure that they are not detected before releasing them into the wild.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-58&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-58&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[58]&lt;/a&gt;&lt;/sup&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
Some new viruses, particularly&amp;nbsp;&lt;a class=&quot;mw-redirect&quot; href=&quot;http://en.wikipedia.org/wiki/Ransomware_(malware)&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Ransomware (malware)&quot;&gt;ransomware&lt;/a&gt;, use&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Polymorphic_code&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Polymorphic code&quot;&gt;polymorphic code&lt;/a&gt;&amp;nbsp;to avoid detection by virus scanners. Jerome Segura, a security analyst with&amp;nbsp;&lt;a class=&quot;new&quot; href=&quot;http://en.wikipedia.org/w/index.php?title=ParetoLogic&amp;amp;action=edit&amp;amp;redlink=1&quot; style=&quot;background: none; color: #a55858; text-decoration: none;&quot; title=&quot;ParetoLogic (page does not exist)&quot;&gt;ParetoLogic&lt;/a&gt;, explained:&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-CBC16Apr10_59-0&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-CBC16Apr10-59&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[59]&lt;/a&gt;&lt;/sup&gt;&lt;/div&gt;
&lt;table class=&quot;cquote&quot; style=&quot;background-color: transparent; border-collapse: collapse; border: none; color: #252525; font-size: 14px; line-height: 22.399999618530273px; margin: auto; text-align: justify; width: auto;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;border: none; color: #b2b7f2; font-family: &#39;Times New Roman&#39;, serif; font-size: 35px; font-weight: bold; padding: 10px;&quot; valign=&quot;top&quot; width=&quot;20&quot;&gt;“&lt;/td&gt;&lt;td style=&quot;border: none; padding: 4px 10px;&quot; valign=&quot;top&quot;&gt;It&#39;s something that they miss a lot of the time because this type of [ransomware virus] comes from sites that use a polymorphism, which means they basically randomize the file they send you and it gets by well-known antivirus products very easily. I&#39;ve seen people firsthand getting infected, having all the pop-ups and yet they have antivirus software running and it&#39;s not detecting anything. It actually can be pretty hard to get rid of, as well, and you&#39;re never really sure if it&#39;s really gone. When we see something like that usually we advise to reinstall the operating system or reinstall backups.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-CBC16Apr10_59-1&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-CBC16Apr10-59&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[59]&lt;/a&gt;&lt;/sup&gt;&lt;/td&gt;&lt;td style=&quot;border: none; color: #b2b7f2; font-family: &#39;Times New Roman&#39;, serif; font-size: 35px; font-weight: bold; padding: 10px; text-align: right;&quot; valign=&quot;bottom&quot; width=&quot;20&quot;&gt;”&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
A&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Proof_of_concept&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Proof of concept&quot;&gt;proof of concept&lt;/a&gt;&amp;nbsp;virus has used the&amp;nbsp;&lt;a class=&quot;mw-redirect&quot; href=&quot;http://en.wikipedia.org/wiki/Graphics_Processing_Unit&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Graphics Processing Unit&quot;&gt;Graphics Processing Unit&lt;/a&gt;&amp;nbsp;(GPU) to avoid detection from anti-virus software. The potential success of this involves bypassing the&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Central_processing_unit&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Central processing unit&quot;&gt;CPU&lt;/a&gt;&amp;nbsp;in order to make it much harder for security researchers to analyse the inner workings of such malware.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-60&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-60&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[60]&lt;/a&gt;&lt;/sup&gt;&lt;/div&gt;
&lt;h3 style=&quot;background-attachment: initial; background-clip: initial; background-image: none; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border-bottom-style: none; color: black; line-height: 1.6; margin: 0.3em 0px 0px; overflow: hidden; padding-bottom: 0px; padding-top: 0.5em; text-align: justify;&quot;&gt;
&lt;span class=&quot;mw-headline&quot; id=&quot;Rootkits&quot;&gt;Rootkits&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
Detecting&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Rootkit&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Rootkit&quot;&gt;rootkits&lt;/a&gt;&amp;nbsp;is a major challenge for anti-virus programs. Rootkits have full administrative access to the computer and are invisible to users and hidden from the list of running processes in the&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Task_manager&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Task manager&quot;&gt;task manager&lt;/a&gt;. Rootkits can modify the inner workings of the&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Operating_system&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Operating system&quot;&gt;operating system&lt;/a&gt;&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-61&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-61&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[61]&lt;/a&gt;&lt;/sup&gt;&amp;nbsp;and tamper with antivirus programs.&lt;/div&gt;
&lt;h3 style=&quot;background-attachment: initial; background-clip: initial; background-image: none; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border-bottom-style: none; color: black; line-height: 1.6; margin: 0.3em 0px 0px; overflow: hidden; padding-bottom: 0px; padding-top: 0.5em; text-align: justify;&quot;&gt;
&lt;span class=&quot;mw-headline&quot; id=&quot;Damaged_files&quot;&gt;Damaged files&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
Files which have been damaged by computer viruses, e.g. by ransomware, may be damaged beyond recovery. Anti-virus software removes the virus code from the file during disinfection, but this does not always restore the file to its undamaged state. In such circumstances, damaged files can only be restored from existing backups or&amp;nbsp;&lt;a class=&quot;mw-redirect&quot; href=&quot;http://en.wikipedia.org/wiki/Shadow_copy&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Shadow copy&quot;&gt;shadow copies&lt;/a&gt;;&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-62&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-62&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[62]&lt;/a&gt;&lt;/sup&gt;&amp;nbsp;installed software that is damaged requires re-installation&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-63&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-63&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[63]&lt;/a&gt;&lt;/sup&gt;&amp;nbsp;(however, see&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/System_File_Checker&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;System File Checker&quot;&gt;System File Checker&lt;/a&gt;).&lt;/div&gt;
&lt;h3 style=&quot;background-attachment: initial; background-clip: initial; background-image: none; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border-bottom-style: none; color: black; line-height: 1.6; margin: 0.3em 0px 0px; overflow: hidden; padding-bottom: 0px; padding-top: 0.5em; text-align: justify;&quot;&gt;
&lt;span class=&quot;mw-headline&quot; id=&quot;Firmware_issues&quot;&gt;Firmware issues&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
Active anti-virus software can interfere with a&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Firmware&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Firmware&quot;&gt;firmware&lt;/a&gt;&amp;nbsp;update process.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-64&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-64&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[64]&lt;/a&gt;&lt;/sup&gt;&amp;nbsp;Any writeable firmware in the computer can be infected by malicious code.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-65&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-65&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[65]&lt;/a&gt;&lt;/sup&gt;&amp;nbsp;This is a major concern, as an infected&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/BIOS&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;BIOS&quot;&gt;BIOS&lt;/a&gt;&amp;nbsp;could require the actual BIOS chip to be replaced to ensure the malicious code is completely removed.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-66&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-66&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[66]&lt;/a&gt;&lt;/sup&gt;&amp;nbsp;Anti-virus software is not effective at protecting firmware and the&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Motherboard&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Motherboard&quot;&gt;motherboard&lt;/a&gt;&amp;nbsp;BIOS from infection.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-67&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-67&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[67]&lt;/a&gt;&lt;/sup&gt;&lt;/div&gt;
&lt;h2 style=&quot;background-attachment: initial; background-clip: initial; background-image: none; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border-bottom-color: rgb(170, 170, 170); border-bottom-style: solid; border-bottom-width: 1px; color: black; font-family: &#39;Linux Libertine&#39;, Georgia, Times, serif; font-weight: normal; line-height: 1.3; margin: 1em 0px 0.25em; overflow: hidden; padding: 0px; text-align: justify;&quot;&gt;
&lt;span class=&quot;mw-headline&quot; id=&quot;Other_methods&quot;&gt;Other methods&lt;/span&gt;&lt;/h2&gt;
&lt;div class=&quot;thumb tright&quot; style=&quot;clear: right; float: right; margin: 0.5em 0px 1.3em 1.4em; text-align: start; width: auto;&quot;&gt;
&lt;div class=&quot;thumbinner&quot; style=&quot;background-color: #f9f9f9; border: 1px solid rgb(204, 204, 204); font-size: 13px; min-width: 100px; overflow: hidden; padding: 3px !important; text-align: center; width: 222px;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;a class=&quot;image&quot; href=&quot;http://en.wikipedia.org/wiki/File:ClamAV0.95.2.png&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot;&gt;&lt;img alt=&quot;&quot; class=&quot;thumbimage&quot; data-file-height=&quot;466&quot; data-file-width=&quot;669&quot; height=&quot;153&quot; src=&quot;http://upload.wikimedia.org/wikipedia/commons/thumb/2/2f/ClamAV0.95.2.png/220px-ClamAV0.95.2.png&quot; srcset=&quot;//upload.wikimedia.org/wikipedia/commons/thumb/2/2f/ClamAV0.95.2.png/330px-ClamAV0.95.2.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/2/2f/ClamAV0.95.2.png/440px-ClamAV0.95.2.png 2x&quot; style=&quot;background-color: white; border: 1px solid rgb(204, 204, 204); vertical-align: middle;&quot; width=&quot;220&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;thumbcaption&quot; style=&quot;border: none; font-size: 12px; line-height: 1.4em; padding: 3px !important; text-align: left;&quot;&gt;
&lt;div class=&quot;magnify&quot; style=&quot;background: none !important; border: none !important; float: right; margin-left: 3px;&quot;&gt;
&lt;a class=&quot;internal&quot; href=&quot;http://en.wikipedia.org/wiki/File:ClamAV0.95.2.png&quot; style=&quot;background: none !important; border: none !important; color: #0b0080; display: block; text-decoration: none;&quot; title=&quot;Enlarge&quot;&gt;&lt;img alt=&quot;&quot; height=&quot;11&quot; src=&quot;http://bits.wikimedia.org/static-1.24wmf6/skins/common/images/magnify-clip.png&quot; style=&quot;background: none !important; border: none !important; display: block; text-align: justify; vertical-align: middle;&quot; width=&quot;15&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;line-height: 1.4em;&quot;&gt;A command-line virus scanner,&lt;/span&gt;&lt;a class=&quot;mw-redirect&quot; href=&quot;http://en.wikipedia.org/wiki/ClamAV&quot; style=&quot;background: none; color: #0b0080; line-height: 1.4em; text-decoration: none;&quot; title=&quot;ClamAV&quot;&gt;Clam AV 0.95.2&lt;/a&gt;&lt;span style=&quot;line-height: 1.4em;&quot;&gt;, running a virus signature definition update, scanning a file and identifying a Trojan&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
Installed antivirus software running on an individual computer is only one method of guarding against viruses. Other methods are also used, including cloud-based antivirus, firewalls and on-line scanners.&lt;/div&gt;
&lt;h3 style=&quot;background-attachment: initial; background-clip: initial; background-image: none; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border-bottom-style: none; color: black; line-height: 1.6; margin: 0.3em 0px 0px; overflow: hidden; padding-bottom: 0px; padding-top: 0.5em; text-align: justify;&quot;&gt;
&lt;span class=&quot;mw-headline&quot; id=&quot;Cloud_antivirus&quot;&gt;Cloud antivirus&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
Cloud antivirus is a technology that uses lightweight agent software on the protected computer, while offloading the majority of data analysis to the provider&#39;s infrastructure.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-68&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-68&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[68]&lt;/a&gt;&lt;/sup&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
One approach to implementing cloud antivirus involves scanning suspicious files using multiple antivirus engines. This approach was proposed by an early implementation of the cloud antivirus concept called CloudAV. CloudAV was designed to send programs or documents to a&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Cloud_computing&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Cloud computing&quot;&gt;network cloud&lt;/a&gt;&amp;nbsp;where multiple antivirus and behavioral detection programs are used simultaneously in order to improve detection rates. Parallel scanning of files using potentially incompatible antivirus scanners is achieved by spawning a virtual machine per detection engine and therefore eliminating any possible issues. CloudAV can also perform &quot;retrospective detection,&quot; whereby the cloud detection engine rescans all files in its file access history when a new threat is identified thus improving new threat detection speed. Finally, CloudAV is a solution for effective virus scanning on devices that lack the computing power to perform the scans themselves.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-69&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-69&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[69]&lt;/a&gt;&lt;/sup&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
Some examples of cloud anti-virus products are&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Panda_Cloud_Antivirus&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Panda Cloud Antivirus&quot;&gt;Panda Cloud Antivirus&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Immunet&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Immunet&quot;&gt;Immunet&lt;/a&gt;.&lt;/div&gt;
&lt;h3 style=&quot;background-attachment: initial; background-clip: initial; background-image: none; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border-bottom-style: none; color: black; line-height: 1.6; margin: 0.3em 0px 0px; overflow: hidden; padding-bottom: 0px; padding-top: 0.5em; text-align: justify;&quot;&gt;
&lt;span class=&quot;mw-headline&quot; id=&quot;Network_firewall&quot;&gt;Network firewall&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
&lt;a href=&quot;http://en.wikipedia.org/wiki/Firewall_(computing)&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Firewall (computing)&quot;&gt;Network firewalls&lt;/a&gt;&amp;nbsp;prevent unknown programs and processes from accessing the system. However, they are not antivirus systems and make no attempt to identify or remove anything. They may protect against infection from outside the protected computer or&amp;nbsp;&lt;a class=&quot;mw-redirect&quot; href=&quot;http://en.wikipedia.org/wiki/LAN&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;LAN&quot;&gt;network&lt;/a&gt;, and limit the activity of any malicious software which is present by blocking incoming or outgoing requests on certain TCP/IP ports. A firewall is designed to deal with broader system threats that come from network connections into the system and is not an alternative to a virus protection system.&lt;/div&gt;
&lt;h3 style=&quot;background-attachment: initial; background-clip: initial; background-image: none; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border-bottom-style: none; color: black; line-height: 1.6; margin: 0.3em 0px 0px; overflow: hidden; padding-bottom: 0px; padding-top: 0.5em; text-align: justify;&quot;&gt;
&lt;span class=&quot;mw-headline&quot; id=&quot;Online_scanning&quot;&gt;Online scanning&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
Some antivirus vendors maintain websites with free online scanning capability of the entire computer, critical areas only, local disks, folders or files. Periodic online scanning is a good idea for those that run antivirus applications on their computers because those applications are frequently slow to catch threats. One of the first things that malicious software does in an attack is disable any existing antivirus software and sometimes the only way to know of an attack is by turning to an online resource that is not installed on the infected computer.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-70&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-70&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[70]&lt;/a&gt;&lt;/sup&gt;&lt;/div&gt;
&lt;h3 style=&quot;background-attachment: initial; background-clip: initial; background-image: none; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border-bottom-style: none; color: black; line-height: 1.6; margin: 0.3em 0px 0px; overflow: hidden; padding-bottom: 0px; padding-top: 0.5em; text-align: justify;&quot;&gt;
&lt;span class=&quot;mw-headline&quot; id=&quot;Specialist_tools&quot;&gt;Specialist tools&lt;/span&gt;&lt;/h3&gt;
&lt;div class=&quot;thumb tright&quot; style=&quot;clear: right; float: right; margin: 0.5em 0px 1.3em 1.4em; text-align: start; width: auto;&quot;&gt;
&lt;div class=&quot;thumbinner&quot; style=&quot;background-color: #f9f9f9; border: 1px solid rgb(204, 204, 204); font-size: 13px; min-width: 100px; overflow: hidden; padding: 3px !important; text-align: center; width: 222px;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;a class=&quot;image&quot; href=&quot;http://en.wikipedia.org/wiki/File:Rkhunter_Ubuntu.png&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot;&gt;&lt;img alt=&quot;&quot; class=&quot;thumbimage&quot; data-file-height=&quot;412&quot; data-file-width=&quot;656&quot; height=&quot;138&quot; src=&quot;http://upload.wikimedia.org/wikipedia/en/thumb/5/5c/Rkhunter_Ubuntu.png/220px-Rkhunter_Ubuntu.png&quot; srcset=&quot;//upload.wikimedia.org/wikipedia/en/thumb/5/5c/Rkhunter_Ubuntu.png/330px-Rkhunter_Ubuntu.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/5/5c/Rkhunter_Ubuntu.png/440px-Rkhunter_Ubuntu.png 2x&quot; style=&quot;background-color: white; border: 1px solid rgb(204, 204, 204); vertical-align: middle;&quot; width=&quot;220&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;thumbcaption&quot; style=&quot;border: none; font-size: 12px; line-height: 1.4em; padding: 3px !important; text-align: left;&quot;&gt;
&lt;div class=&quot;magnify&quot; style=&quot;background: none !important; border: none !important; float: right; margin-left: 3px;&quot;&gt;
&lt;a class=&quot;internal&quot; href=&quot;http://en.wikipedia.org/wiki/File:Rkhunter_Ubuntu.png&quot; style=&quot;background: none !important; border: none !important; color: #0b0080; display: block; text-decoration: none;&quot; title=&quot;Enlarge&quot;&gt;&lt;img alt=&quot;&quot; height=&quot;11&quot; src=&quot;http://bits.wikimedia.org/static-1.24wmf6/skins/common/images/magnify-clip.png&quot; style=&quot;background: none !important; border: none !important; display: block; text-align: justify; vertical-align: middle;&quot; width=&quot;15&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;line-height: 1.4em;&quot;&gt;Using&lt;/span&gt;&lt;span style=&quot;line-height: 1.4em;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Rkhunter&quot; style=&quot;background: none; color: #0b0080; line-height: 1.4em; text-decoration: none;&quot; title=&quot;Rkhunter&quot;&gt;rkhunter&lt;/a&gt;&lt;span style=&quot;line-height: 1.4em;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;line-height: 1.4em;&quot;&gt;to scan for&lt;/span&gt;&lt;span style=&quot;line-height: 1.4em;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Rootkit&quot; style=&quot;background: none; color: #0b0080; line-height: 1.4em; text-decoration: none;&quot; title=&quot;Rootkit&quot;&gt;rootkits&lt;/a&gt;&lt;span style=&quot;line-height: 1.4em;&quot;&gt;on an&lt;/span&gt;&lt;span style=&quot;line-height: 1.4em;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Ubuntu_(operating_system)&quot; style=&quot;background: none; color: #0b0080; line-height: 1.4em; text-decoration: none;&quot; title=&quot;Ubuntu (operating system)&quot;&gt;Ubuntu&lt;/a&gt;&lt;span style=&quot;line-height: 1.4em;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Linux&quot; style=&quot;background: none; color: #0b0080; line-height: 1.4em; text-decoration: none;&quot; title=&quot;Linux&quot;&gt;Linux&lt;/a&gt;&lt;span style=&quot;line-height: 1.4em;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;line-height: 1.4em;&quot;&gt;computer.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
Virus removal tools are available to help remove stubborn infections or certain types of infection. Examples include&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Trend_Micro&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Trend Micro&quot;&gt;Trend Micro&lt;/a&gt;&#39;s&amp;nbsp;&lt;i&gt;Rootkit Buster&lt;/i&gt;,&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-71&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-71&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[71]&lt;/a&gt;&lt;/sup&gt;&amp;nbsp;and&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Rkhunter&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Rkhunter&quot;&gt;rkhunter&lt;/a&gt;&amp;nbsp;for the detection of&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Rootkit&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Rootkit&quot;&gt;rootkits&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Avira&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Avira&quot;&gt;Avira&lt;/a&gt;&#39;s&amp;nbsp;&lt;i&gt;AntiVir Removal Tool&lt;/i&gt;,&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-antivir_72-0&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-antivir-72&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[72]&lt;/a&gt;&lt;/sup&gt;&amp;nbsp;&lt;i&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/PC_Tools_(company)&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;PC Tools (company)&quot;&gt;PCTools&lt;/a&gt;&amp;nbsp;Threat Removal Tool&lt;/i&gt;,&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-73&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-73&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[73]&lt;/a&gt;&lt;/sup&gt;&amp;nbsp;and&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/AVG_(software)&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;AVG (software)&quot;&gt;AVG&lt;/a&gt;&#39;s Anti-Virus Free 2011.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-74&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-74&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[74]&lt;/a&gt;&lt;/sup&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
A rescue disk that is bootable, such as a CD or USB storage device, can be used to run antivirus software outside of the installed operating system, in order to remove infections while they are dormant. A bootable antivirus disk can be useful when, for example, the installed operating system is no longer bootable or has malware that is resisting all attempts to be removed by the installed antivirus software. Examples of some of these bootable disks include the&amp;nbsp;&lt;i&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Avira&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Avira&quot;&gt;Avira&lt;/a&gt;&amp;nbsp;AntiVir Rescue System&lt;/i&gt;,&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-antivir_72-1&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-antivir-72&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[72]&lt;/a&gt;&lt;/sup&gt;&amp;nbsp;&lt;i&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/PC_Tools_(company)&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;PC Tools (company)&quot;&gt;PCTools&lt;/a&gt;Alternate Operating System Scanner&lt;/i&gt;,&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-75&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-75&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[75]&lt;/a&gt;&lt;/sup&gt;&amp;nbsp;and&amp;nbsp;&lt;i&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/AVG_(software)&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;AVG (software)&quot;&gt;AVG&lt;/a&gt;&amp;nbsp;Rescue CD&lt;/i&gt;.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-avgcd_76-0&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-avgcd-76&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[76]&lt;/a&gt;&lt;/sup&gt;&amp;nbsp;The AVG Rescue CD software can also be installed onto a USB storage device, that is bootable on newer computers.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-avgcd_76-1&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-avgcd-76&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[76]&lt;/a&gt;&lt;/sup&gt;&lt;/div&gt;
&lt;h2 style=&quot;background-attachment: initial; background-clip: initial; background-image: none; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border-bottom-color: rgb(170, 170, 170); border-bottom-style: solid; border-bottom-width: 1px; color: black; font-family: &#39;Linux Libertine&#39;, Georgia, Times, serif; font-weight: normal; line-height: 1.3; margin: 1em 0px 0.25em; overflow: hidden; padding: 0px; text-align: justify;&quot;&gt;
&lt;span class=&quot;mw-headline&quot; id=&quot;Usage_and_risks&quot;&gt;Usage and risks&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;margin-bottom: 0.5em; margin-top: 0.5em; text-align: justify;&quot;&gt;
According to an FBI survey, major businesses lose $12 million annually dealing with virus incidents.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-77&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-77&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[77]&lt;/a&gt;&lt;/sup&gt;&amp;nbsp;A survey by&lt;a href=&quot;http://en.wikipedia.org/wiki/Symantec&quot; style=&quot;background: none; color: #0b0080; text-decoration: none;&quot; title=&quot;Symantec&quot;&gt;Symantec&lt;/a&gt;&amp;nbsp;in 2009 found that a third of small to medium sized business did not use antivirus protection at that time, whereas more than 80% of home users had some kind of antivirus installed.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-78&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-78&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[78]&lt;/a&gt;&lt;/sup&gt;&amp;nbsp;According to a sociological survey conducted by G Data Software in 2010 49% of women did not use any antivirus program at all.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-79&quot; style=&quot;line-height: 1; unicode-bidi: -webkit-isolate;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Antivirus_software#cite_note-79&quot; style=&quot;background: none; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[79]&lt;/a&gt;&lt;/sup&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://antivirus-software2009.blogspot.com/feeds/6773755831827551458/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://antivirus-software2009.blogspot.com/2014/06/antivirus-software-based-2014.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/6773755831827551458'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/6773755831827551458'/><link rel='alternate' type='text/html' href='http://antivirus-software2009.blogspot.com/2014/06/antivirus-software-based-2014.html' title='Antivirus software-based 2014'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/02820373220680933314</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqrA2pB8d77gpF5cwQj8rXW0mey-Wzccc_McEAU3AhYYwt_Hvt7-iPghOtzsTn5AYU37e8lPGdpBXrzuyTMF3M85KJ2BuaCtDjANn947XOZDHULe2-3qSGQTEE9FS4yH2d0hZQ-BvUl8Y/s72-c/220px-ClamTK3.08.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3655698400884223479.post-2478686680860253564</id><published>2013-10-19T05:02:00.000-07:00</published><updated>2013-10-19T05:02:14.134-07:00</updated><title type='text'>Antivirus Software: Fighting Blame, Not Hacks</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;h1 class=&quot;headline&quot; itemprop=&quot;name headline&quot; style=&quot;border: 0px; font-size: 2.3em; margin: 0px 0px 8px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;color: red; font-family: Georgia, Times New Roman, serif;&quot;&gt;Antivirus Software: Fighting Blame, Not Hacks&lt;/span&gt;&lt;/h1&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMzK5rjjarTmecnXKFWavKF6dYCG2y7o7VBXto-Y-niuFBF2pJ3DZp03DK1jeOVnT6AVCr_QNvZfwUgZwEahzi9WBM74uK2kSvDNxytpbx8VIOE4g1naB_0PZ7jOh9yC_8PpWEwlnHNNw/s1600/tech_antivirus.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;213&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMzK5rjjarTmecnXKFWavKF6dYCG2y7o7VBXto-Y-niuFBF2pJ3DZp03DK1jeOVnT6AVCr_QNvZfwUgZwEahzi9WBM74uK2kSvDNxytpbx8VIOE4g1naB_0PZ7jOh9yC_8PpWEwlnHNNw/s320/tech_antivirus.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: #222222; font-family: Georgia, serif; font-size: 1.3em; line-height: 1.5em; text-align: justify;&quot;&gt;Craig Elliott, chief executive officer of Pertino, a cloud-networking startup, knows that the antivirus software his company uses won’t deter all hacking attacks. That won’t stop him from using it. “It’s a safety blanket,” he says. “It’s CYA [cover your ass] more than anything else.” That’s why the antivirus industry, born in the late 1980s to combat floppy-disk viruses, has staying power, even in this era of sophisticated hacks from China and elsewhere.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div style=&quot;border: 0px; color: #222222; font-family: Georgia, serif; font-size: 1.3em; line-height: 1.5em; margin-bottom: 1.5em; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
Although the word virus generally applies to all manner of computer attacks, data security pros no longer just worry about old-style viruses—programs or pieces of code that replicate and spread from computer to computer, degrading their performance. The new threat: advanced forms of malicious software, or malware, such as online banking password-stealers and military-grade spying software.&lt;/div&gt;
&lt;div style=&quot;border: 0px; color: #222222; font-family: Georgia, serif; font-size: 1.3em; line-height: 1.5em; margin-bottom: 1.5em; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
Recent incidents like the attack on the&amp;nbsp;&lt;em style=&quot;border: 0px; font-size: 17px; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;New York Times&lt;/em&gt;&amp;nbsp;by Chinese hackers, which antivirus software failed to stop, illustrate the challenge facing industry leaders such as Symantec and McAfee. A weakness of antivirus software is that it’s designed to zero in on so-called signatures, or identifiable patterns in code. When an antivirus company finds a piece of malicious software, it adds a signature to its database, which is included in software upgrades sent to users.&lt;/div&gt;
&lt;div class=&quot;related_item tracked&quot; data-action-type=&quot;Feature Template&quot; data-actions=&quot;click&quot; data-category=&quot;Inline Related Links&quot; data-label=&quot;Position: 8&quot; style=&quot;border: 0px; color: #007cd5; font-family: &#39;Helvetica Neue&#39;, Helvetica-Neue, Helvetica, Arial, sans-serif; font-weight: bold; line-height: 16px; margin: -0.25em 0px 1.6em; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;a href=&quot;http://www.businessweek.com/articles/2013-02-07/mandiant-the-go-to-security-firm-for-cyber-espionage-attacks&quot; style=&quot;-webkit-tap-highlight-color: rgb(255, 102, 0); color: #007cd5;&quot;&gt;&lt;span class=&quot;related_item-label&quot; style=&quot;border: 0px; color: black; font-size: 17px; font-weight: bolder; margin: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;STORY:&amp;nbsp;&lt;/span&gt;Mandiant, the Go-To Security Firm for Cyber-Espionage Attacks&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; color: #222222; font-family: Georgia, serif; font-size: 1.3em; line-height: 1.5em; margin-bottom: 1.5em; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
The approach was effective until more sophisticated malware arrived on the scene in the early 2000s. Now identifying a piece of attack software after the fact has limited value because the most advanced malware is custom-built for specific attacks—and never used again. Today’s hackers also prefer to infiltrate networks via e-mail and social media, making attacks harder to detect. The&amp;nbsp;&lt;em style=&quot;border: 0px; font-size: 17px; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Times&lt;/em&gt;&amp;nbsp;attack is thought to have begun with infected e-mails sent to employees.&lt;/div&gt;
&lt;div style=&quot;border: 0px; color: #222222; font-family: Georgia, serif; font-size: 1.3em; line-height: 1.5em; margin-bottom: 1.5em; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
After the&amp;nbsp;&lt;em style=&quot;border: 0px; font-size: 17px; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Times&lt;/em&gt;&amp;nbsp;disclosed that Symantec software failed to identify the malware used in the breach, the Mountain View (Calif.)-based company issued a statement saying that antivirus protection alone is not enough to thwart advanced attacks.&lt;span class=&quot;ticker_wrap&quot; style=&quot;border: 0px; font-size: 17px; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span itemscope=&quot;&quot; itemtype=&quot;http://schema.org/Corporation&quot; style=&quot;border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span itemprop=&quot;name&quot; style=&quot;border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Symantec&lt;/span&gt;&lt;/span&gt;&amp;nbsp;(&lt;a class=&quot;ticker&quot; data-symbol=&quot;SYMC&quot; href=&quot;http://investing.businessweek.com/research/stocks/snapshot/snapshot.asp?ticker=SYMC&quot; style=&quot;-webkit-tap-highlight-color: rgb(255, 102, 0); color: #007cd5; text-decoration: none;&quot;&gt;SYMC&lt;/a&gt;)&lt;/span&gt;&amp;nbsp;and Santa Clara (Calif.)-based McAfee are upgrading their security software to keep pace with hackers, such as adding blocking features that crunch traffic data to determine whether an unknown e-mail attachment or website is trustworthy.&lt;/div&gt;
&lt;div style=&quot;border: 0px; color: #222222; font-family: Georgia, serif; font-size: 1.3em; line-height: 1.5em; margin-bottom: 1.5em; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
“The industry will likely change pretty dramatically,” says Francis deSouza, Symantec’s president of products and services. “We’re seeing more malware than we’ve ever seen before, and we’re seeing more custom malware than we’ve ever seen before. Those trends have profound implications for the antivirus industry.” Michael Fey, chief technology officer for McAfee, which is owned by&amp;nbsp;&lt;span class=&quot;ticker_wrap&quot; style=&quot;border: 0px; font-size: 17px; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span itemscope=&quot;&quot; itemtype=&quot;http://schema.org/Corporation&quot; style=&quot;border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span itemprop=&quot;name&quot; style=&quot;border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Intel&lt;/span&gt;&lt;/span&gt;&amp;nbsp;(&lt;a class=&quot;ticker&quot; data-symbol=&quot;INTC&quot; href=&quot;http://investing.businessweek.com/research/stocks/snapshot/snapshot.asp?ticker=INTC&quot; style=&quot;-webkit-tap-highlight-color: rgb(255, 102, 0); color: #007cd5; text-decoration: none;&quot;&gt;INTC&lt;/a&gt;)&lt;/span&gt;, says “one product is not a silver bullet.”&lt;/div&gt;
&lt;div class=&quot;related_item tracked&quot; data-action-type=&quot;Feature Template&quot; data-actions=&quot;click&quot; data-category=&quot;Inline Related Links&quot; data-label=&quot;Position: 0&quot; style=&quot;border: 0px; color: #007cd5; font-family: &#39;Helvetica Neue&#39;, Helvetica-Neue, Helvetica, Arial, sans-serif; font-size: 1.3em; font-weight: bold; line-height: 16px; margin: -0.25em 0px 1.6em; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span class=&quot;related_item-label&quot; style=&quot;border: 0px; color: black; font-size: 17px; font-weight: bolder; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;STORY:&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.businessweek.com/articles/2012-08-15/cyber-wars-reach-a-new-frontier-the-airport&quot;&gt;Cyberwars Reach a New Frontier: the Airport&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; color: #222222; font-family: Georgia, serif; font-size: 1.3em; line-height: 1.5em; margin-bottom: 1.5em; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
Despite this, companies aren’t likely to dump their antivirus software. Even if they wanted to because of cost or performance concerns, many simply can’t, says Amrit Williams, chief technology officer of Lancope, a company which sells software that scans computer networks for malware. Retailers that accept credit cards, for instance, must comply with the Payment Card Industry (PCI) data-security standard, which mandates antivirus protection. Corporate security chiefs in industries that don’t require antivirus software can choose to buy it—or risk their jobs if they go without it and get attacked, Williams says. Consumer and corporate purchases of software to combat online threats will account for $8 billion of the $66 billion in worldwide spending on computer-security technology this year, according to&amp;nbsp;&lt;span class=&quot;ticker_wrap&quot; style=&quot;border: 0px; font-size: 17px; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span itemscope=&quot;&quot; itemtype=&quot;http://schema.org/Corporation&quot; style=&quot;border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span itemprop=&quot;name&quot; style=&quot;border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Gartner&lt;/span&gt;&lt;/span&gt;&amp;nbsp;(&lt;a class=&quot;ticker&quot; data-symbol=&quot;IT&quot; href=&quot;http://investing.businessweek.com/research/stocks/snapshot/snapshot.asp?ticker=IT&quot; style=&quot;-webkit-tap-highlight-color: rgb(255, 102, 0); color: #007cd5; text-decoration: none;&quot;&gt;IT&lt;/a&gt;)&lt;/span&gt;.&lt;/div&gt;
&lt;div style=&quot;border: 0px; color: #222222; font-family: Georgia, serif; font-size: 1.3em; line-height: 1.5em; margin-bottom: 1.5em; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
Another reason demand for antivirus companies’ products is likely to remain high is that there’s still a threat from less sophisticated attacks, says Steven Ashley, an analyst with financial services firm Robert W. Baird in Milwaukee.&amp;nbsp;&lt;em style=&quot;border: 0px; font-size: 17px; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;The New York Times&lt;/em&gt;&amp;nbsp;is still a Symantec customer, though it is “exploring other options,” says spokeswoman Eileen Murphy.&lt;/div&gt;
&lt;div style=&quot;border: 0px; color: #222222; font-family: Georgia, serif; font-size: 1.3em; line-height: 1.5em; margin-bottom: 1.5em; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
“Antivirus is an important element that will always be there,” says Ashley. “Even if someone broke into a guarded office or facility, you won’t take down the fence around it.” At least one company, though, has done just that.&amp;nbsp;&lt;span class=&quot;ticker_wrap&quot; style=&quot;border: 0px; font-size: 17px; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span itemscope=&quot;&quot; itemtype=&quot;http://schema.org/Corporation&quot; style=&quot;border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span itemprop=&quot;name&quot; style=&quot;border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Palo Alto Networks&lt;/span&gt;&lt;/span&gt;(&lt;a class=&quot;ticker&quot; data-symbol=&quot;PANW&quot; href=&quot;http://investing.businessweek.com/research/stocks/snapshot/snapshot.asp?ticker=PANW&quot; style=&quot;-webkit-tap-highlight-color: rgb(255, 102, 0); color: #007cd5; text-decoration: none;&quot;&gt;PANW&lt;/a&gt;)&lt;/span&gt;, a maker of network-security equipment, has no official policy on antivirus software, says co-founder Nir Zuk. Its 840 employees are not required to have antivirus software on their machines, and the company uses its own network-security products to defend against attacks. Most infections occur in the first 48 hours after a new piece of malware is released—before antivirus companies can get a fix out to customers, Zuk says, citing his company’s research.&lt;/div&gt;
&lt;div class=&quot;related_item tracked&quot; data-action-type=&quot;Feature Template&quot; data-actions=&quot;click&quot; data-category=&quot;Inline Related Links&quot; data-label=&quot;Position: 10&quot; style=&quot;border: 0px; color: #007cd5; font-family: &#39;Helvetica Neue&#39;, Helvetica-Neue, Helvetica, Arial, sans-serif; font-size: 1.3em; font-weight: bold; line-height: 16px; margin: -0.25em 0px 1.6em; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span class=&quot;related_item-label&quot; style=&quot;border: 0px; color: black; font-size: 17px; font-weight: bolder; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;STORY:&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.businessweek.com/articles/2012-08-02/how-the-experts-would-fix-cyber-security&quot;&gt;How the Experts Would Fix Cyber Security&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;&quot; style=&quot;border: 0px; color: #222222; font-family: Georgia, serif; font-size: 1.3em; line-height: 1.5em; margin-bottom: 1.5em; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
“I think there’s value in AV—most CTOs won’t get rid of it,” he says. “It’s just that I think the cost of it, and the fact it only works on some machines, and the fact that it’s not detecting targeted or new attacks, makes me want to invest my money in other solutions.”&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://antivirus-software2009.blogspot.com/feeds/2478686680860253564/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://antivirus-software2009.blogspot.com/2013/10/antivirus-software-fighting-blame-not.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/2478686680860253564'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/2478686680860253564'/><link rel='alternate' type='text/html' href='http://antivirus-software2009.blogspot.com/2013/10/antivirus-software-fighting-blame-not.html' title='Antivirus Software: Fighting Blame, Not Hacks'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/02820373220680933314</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMzK5rjjarTmecnXKFWavKF6dYCG2y7o7VBXto-Y-niuFBF2pJ3DZp03DK1jeOVnT6AVCr_QNvZfwUgZwEahzi9WBM74uK2kSvDNxytpbx8VIOE4g1naB_0PZ7jOh9yC_8PpWEwlnHNNw/s72-c/tech_antivirus.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3655698400884223479.post-4813676182633792766</id><published>2013-07-23T11:38:00.001-07:00</published><updated>2013-07-23T11:38:53.476-07:00</updated><title type='text'>Articles Index with click to select</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;h1 style=&quot;background-color: white; font-weight: normal; line-height: 1.2; margin: 0px; padding: 0px; text-decoration: inherit;&quot;&gt;
&lt;b style=&quot;color: #666666; font-family: Verdana; font-size: 12px; line-height: 18px;&quot;&gt;Ads:&lt;/b&gt;&lt;ul style=&quot;color: #666666; display: inline; font-family: Verdana; font-size: 12px; line-height: 18px; margin: 1.5em 0px; padding: 0px; position: relative; text-decoration: inherit; z-index: 0;&quot;&gt;&amp;nbsp;
&lt;li style=&quot;display: inline; font-family: inherit; font-style: inherit; list-style-type: disc; margin: 0px; padding: 0px 0px 0px 0.75em; text-decoration: inherit;&quot;&gt;&lt;a href=&quot;http://antivirus.about.com/z/js/o.htm?k=gratis%20antivirus%20software&amp;amp;d=Gratis%20AntiVirus%20Software&amp;amp;r=http://antivirus.about.com/od/virusdescriptions/a/&quot; style=&quot;color: #3366cc; cursor: pointer; font-family: inherit; font-style: inherit; margin: 0px; padding: 0px 0px 0px 0.75em;&quot; target=&quot;_top&quot;&gt;Gratis AntiVirus Software&lt;/a&gt;&lt;/li&gt;
&amp;nbsp;
&lt;li style=&quot;display: inline; font-family: inherit; font-style: inherit; list-style-type: disc; margin: 0px; padding: 0px 0px 0px 0.75em; text-decoration: inherit;&quot;&gt;&lt;a href=&quot;http://antivirus.about.com/z/js/o.htm?k=antivirus%20scan%20virus&amp;amp;d=AntiVirus%20Scan%20Virus&amp;amp;r=http://antivirus.about.com/od/virusdescriptions/a/&quot; style=&quot;color: #3366cc; cursor: pointer; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px 0px 0px 0.75em;&quot; target=&quot;_top&quot;&gt;AntiVirus Scan Virus&lt;/a&gt;&lt;/li&gt;
&amp;nbsp;
&lt;li style=&quot;display: inline; font-family: inherit; font-style: inherit; list-style-type: disc; margin: 0px; padding: 0px 0px 0px 0.75em; text-decoration: inherit;&quot;&gt;&lt;a href=&quot;http://antivirus.about.com/z/js/o.htm?k=anti%20virus%20software&amp;amp;d=Anti%20Virus%20Software&amp;amp;r=http://antivirus.about.com/od/virusdescriptions/a/&quot; style=&quot;color: #3366cc; cursor: pointer; font-family: inherit; font-style: inherit; margin: 0px; padding: 0px 0px 0px 0.75em;&quot; target=&quot;_top&quot;&gt;Anti Virus Software&lt;/a&gt;&lt;/li&gt;
&amp;nbsp;
&lt;li style=&quot;display: inline; font-family: inherit; font-style: inherit; list-style-type: disc; margin: 0px; padding: 0px 0px 0px 0.75em; text-decoration: inherit;&quot;&gt;&lt;a href=&quot;http://antivirus.about.com/z/js/o.htm?k=free%20virus%20protection&amp;amp;d=Free%20Virus%20Protection&amp;amp;r=http://antivirus.about.com/od/virusdescriptions/a/&quot; style=&quot;color: #3366cc; cursor: pointer; font-family: inherit; font-style: inherit; margin: 0px; padding: 0px 0px 0px 0.75em;&quot; target=&quot;_top&quot;&gt;Free Virus Protection&lt;/a&gt;&lt;/li&gt;
&amp;nbsp;
&lt;li style=&quot;display: inline; font-family: inherit; font-style: inherit; list-style-type: disc; margin: 0px; padding: 0px 0px 0px 0.75em; text-decoration: inherit;&quot;&gt;&lt;a href=&quot;http://antivirus.about.com/z/js/o.htm?k=free%20avast%20antivirus&amp;amp;d=Free%20Avast%20AntiVirus&amp;amp;r=http://antivirus.about.com/od/virusdescriptions/a/&quot; style=&quot;color: #3366cc; cursor: pointer; font-family: inherit; font-style: inherit; margin: 0px; padding: 0px 0px 0px 0.75em;&quot; target=&quot;_top&quot;&gt;Free Avast AntiVirus&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/h1&gt;
&lt;h1 style=&quot;background-color: white; font-weight: normal; line-height: 1.2; margin: 0px; padding: 0px; text-decoration: inherit;&quot;&gt;
&lt;span style=&quot;color: red; font-family: Courier New, Courier, monospace; font-size: x-large;&quot;&gt;Articles Index&lt;/span&gt;&lt;/h1&gt;
&lt;h3 style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin: 1.5em 0px; padding: 0px; text-decoration: inherit;&quot;&gt;
&lt;a href=&quot;http://antivirus.about.com/od/virusdescriptions/a/Antivirus-Software-Technology.htm&quot; style=&quot;color: #3366cc; cursor: pointer; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; padding: 0px;&quot;&gt;Antivirus Software Technology&lt;/a&gt;&lt;/h3&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin-bottom: 1.5em; padding: 0px; text-decoration: inherit;&quot;&gt;
Threats are abundant with information systems. One nasty virus can cripple your machine, steal your personal information, and infect other devices. Protecting your computer from malware is perhaps the most important aspect of computer ownership. The first step in protecting your system is understanding how antivirus software operate.&lt;/div&gt;
&lt;h3 style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin: 1.5em 0px; padding: 0px; text-decoration: inherit;&quot;&gt;
&lt;a href=&quot;http://antivirus.about.com/od/virusdescriptions/a/Ilivid-Virus.htm&quot; style=&quot;color: #3366cc; cursor: pointer; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; padding: 0px;&quot;&gt;iLivid Virus&lt;/a&gt;&lt;/h3&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin-bottom: 1.5em; padding: 0px; text-decoration: inherit;&quot;&gt;
The iLivid virus presents itself as a tool called &quot;iLivid Free Download Manager.&quot; The virus tricks people into thinking that the application will assist with media downloads. Learn more about the dangers of iLivd.&lt;/div&gt;
&lt;h3 style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin: 1.5em 0px; padding: 0px; text-decoration: inherit;&quot;&gt;
&lt;a href=&quot;http://antivirus.about.com/od/virusdescriptions/a/Firefox-Redirect-Virus.htm&quot; style=&quot;color: #3366cc; cursor: pointer; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; padding: 0px;&quot;&gt;Firefox Redirect Virus&lt;/a&gt;&lt;/h3&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin-bottom: 1.5em; padding: 0px; text-decoration: inherit;&quot;&gt;
Firefox Redirect Virus causes unwanted results by redirecting your Internet searches. Follow these steps to help you remove the Firefox Redirect Virus.&lt;/div&gt;
&lt;h3 style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin: 1.5em 0px; padding: 0px; text-decoration: inherit;&quot;&gt;
&lt;a href=&quot;http://antivirus.about.com/od/virusdescriptions/a/Fake-Antivirus-Software.htm&quot; style=&quot;color: #3366cc; cursor: pointer; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; padding: 0px;&quot;&gt;Fake Antivirus Software&lt;/a&gt;&lt;/h3&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin-bottom: 1.5em; padding: 0px; text-decoration: inherit;&quot;&gt;
Fake antivirus software will conduct false virus scans on your computer. Learn how to detect these threats.&lt;/div&gt;
&lt;h3 style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin: 1.5em 0px; padding: 0px; text-decoration: inherit;&quot;&gt;
&lt;a href=&quot;http://antivirus.about.com/od/virusdescriptions/a/What-Is-Sirefef-Malware.htm&quot; style=&quot;color: #3366cc; cursor: pointer; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; padding: 0px;&quot;&gt;What is Sirefef Malware?&lt;/a&gt;&lt;/h3&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin-bottom: 1.5em; padding: 0px; text-decoration: inherit;&quot;&gt;
Learn about the dangers of Sirefef (ZeroAccess) Malware and how to prevent it.&lt;/div&gt;
&lt;h3 style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin: 1.5em 0px; padding: 0px; text-decoration: inherit;&quot;&gt;
&lt;a href=&quot;http://antivirus.about.com/od/virusdescriptions/a/Website-Compromises-At-Unc-Chapel-Hill.htm&quot; style=&quot;color: #3366cc; cursor: pointer; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; padding: 0px;&quot;&gt;Website Compromises at UNC Chapel Hill&lt;/a&gt;&lt;/h3&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin-bottom: 1.5em; padding: 0px; text-decoration: inherit;&quot;&gt;
The first step in solving any problem is first understanding you have a problem. This is particularly true when it comes to managing the problems brought on by website compromises and date breaches.&lt;/div&gt;
&lt;h3 style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin: 1.5em 0px; padding: 0px; text-decoration: inherit;&quot;&gt;
&lt;a href=&quot;http://antivirus.about.com/od/virusdescriptions/a/Bugs-Mice-And-Antivirus.htm&quot; style=&quot;color: #3366cc; cursor: pointer; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; padding: 0px;&quot;&gt;Bugs, Mice, and Antivirus&lt;/a&gt;&lt;/h3&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin-bottom: 1.5em; padding: 0px; text-decoration: inherit;&quot;&gt;
So what do computer viruses and real life cockroaches have in common? Nothing really, except the lessons you learn from trying to overcome one can also be applied to the other.&lt;/div&gt;
&lt;h3 style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin: 1.5em 0px; padding: 0px; text-decoration: inherit;&quot;&gt;
&lt;a href=&quot;http://antivirus.about.com/od/virusdescriptions/a/fortnight.htm&quot; style=&quot;color: #3366cc; cursor: pointer; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; padding: 0px;&quot;&gt;JS.Fortnight Worm&lt;/a&gt;&lt;/h3&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin-bottom: 1.5em; padding: 0px; text-decoration: inherit;&quot;&gt;
The Fortnight worm arrives in the body of an html-rendered email, redirecting Internet Explorer to porn sites.&lt;/div&gt;
&lt;h3 style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin: 1.5em 0px; padding: 0px; text-decoration: inherit;&quot;&gt;
&lt;a href=&quot;http://antivirus.about.com/od/virusdescriptions/a/klezhelp.htm&quot; style=&quot;color: #3366cc; cursor: pointer; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; padding: 0px;&quot;&gt;Klez Help Center&lt;/a&gt;&lt;/h3&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin-bottom: 1.5em; padding: 0px; text-decoration: inherit;&quot;&gt;
The Klez virus uses a variety of techniques to fool and aggravate users&lt;/div&gt;
&lt;h3 style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin: 1.5em 0px; padding: 0px; text-decoration: inherit;&quot;&gt;
&lt;a href=&quot;http://antivirus.about.com/od/virusdescriptions/a/badtransb.htm&quot; style=&quot;color: #3366cc; cursor: pointer; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; padding: 0px;&quot;&gt;BadTrans.B&lt;/a&gt;&lt;/h3&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin-bottom: 1.5em; padding: 0px; text-decoration: inherit;&quot;&gt;
Tips for removing the BadTrans.B virus and blocking it in email&lt;/div&gt;
&lt;h3 style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin: 1.5em 0px; padding: 0px; text-decoration: inherit;&quot;&gt;
&lt;a href=&quot;http://antivirus.about.com/od/virusdescriptions/a/botnets.htm&quot; style=&quot;color: #3366cc; cursor: pointer; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; padding: 0px;&quot;&gt;Common Botnets&lt;/a&gt;&lt;/h3&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin-bottom: 1.5em; padding: 0px; text-decoration: inherit;&quot;&gt;
A botnet is a collection of compromised (infected) computers under the collective control of remote attackers. The malware on the infected computer is known as a bot, a type of backdoor or remote access trojan (RAT). Here is a collection of the most common botnets.&lt;/div&gt;
&lt;h3 style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin: 1.5em 0px; padding: 0px; text-decoration: inherit;&quot;&gt;
&lt;a href=&quot;http://antivirus.about.com/od/virusdescriptions/a/Stuxnet-Winsta-Exe-And-Cover-Ups.htm&quot; style=&quot;color: #3366cc; cursor: pointer; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; padding: 0px;&quot;&gt;Stuxnet, Winsta.exe, and Cover-ups&lt;/a&gt;&lt;/h3&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin-bottom: 1.5em; padding: 0px; text-decoration: inherit;&quot;&gt;
Stuxnet is - without dispute - the most important malware in history. It would be nice if for once the industry (including vendors and journalists) would put their self-interests on hold, would stop trying to save face, and would instead delve into the truth of Stuxnet so at least we have the real facts.&lt;/div&gt;
&lt;h3 style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin: 1.5em 0px; padding: 0px; text-decoration: inherit;&quot;&gt;
&lt;a href=&quot;http://antivirus.about.com/od/virusdescriptions/a/Is-Stuxnet-Really-Targeting-Iran.htm&quot; style=&quot;color: #3366cc; cursor: pointer; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; padding: 0px;&quot;&gt;Is Stuxnet Really Targeting Iran?&lt;/a&gt;&lt;/h3&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin-bottom: 1.5em; padding: 0px; text-decoration: inherit;&quot;&gt;
There has been no shortage of claims that Iran was the intended target of the Stuxnet worm. But the reality is, these claims are completely unfounded. Here are a few of the true facts behind Stuxnet.&lt;/div&gt;
&lt;h3 style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin: 1.5em 0px; padding: 0px; text-decoration: inherit;&quot;&gt;
&lt;a href=&quot;http://antivirus.about.com/od/virusdescriptions/a/2003virus.htm&quot; style=&quot;color: #3366cc; cursor: pointer; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; padding: 0px;&quot;&gt;2003: Year of the Black Sheep&lt;/a&gt;&lt;/h3&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin-bottom: 1.5em; padding: 0px; text-decoration: inherit;&quot;&gt;
It seems appropriate that the Chinese dubbed 2003 as the Year of the Black Sheep. Among other things, the sheep is a symbol of untidiness - and from a virus standpoint, the year was indeed a mess.&lt;/div&gt;
&lt;h3 style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin: 1.5em 0px; padding: 0px; text-decoration: inherit;&quot;&gt;
&lt;a href=&quot;http://antivirus.about.com/od/virusdescriptions/a/confickerupdate.htm&quot; style=&quot;color: #3366cc; cursor: pointer; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; padding: 0px;&quot;&gt;Conficker: More Conflict than Worm&lt;/a&gt;&lt;/h3&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin-bottom: 1.5em; padding: 0px; text-decoration: inherit;&quot;&gt;
Barely a week after the 60 Minutes April Fools&#39; Conficker doomsday update failed to materialize, the closely watched Conflicker.C did finally manage an update. And in an ironic twist, the worm itself debunks much of the hype surrounding it.&lt;/div&gt;
&lt;h3 style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin: 1.5em 0px; padding: 0px; text-decoration: inherit;&quot;&gt;
&lt;a href=&quot;http://antivirus.about.com/od/virusdescriptions/a/pptzeroday.htm&quot; style=&quot;color: #3366cc; cursor: pointer; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; padding: 0px;&quot;&gt;PowerPoint Zero Day Vulnerability In-the-Wild&lt;/a&gt;&lt;/h3&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin-bottom: 1.5em; padding: 0px; text-decoration: inherit;&quot;&gt;
Microsoft has released Security Advisory 969136 warning of a newly discovered zero day PowerPoint vulnerability. The flaw impacts PowerPoint versions found in Windows versions of Office 2000, 2002, 2003, and Office 2004 for Mac.&lt;/div&gt;
&lt;h3 style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin: 1.5em 0px; padding: 0px; text-decoration: inherit;&quot;&gt;
&lt;a href=&quot;http://antivirus.about.com/od/virusdescriptions/a/60minconficker.htm&quot; style=&quot;color: #3366cc; cursor: pointer; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; padding: 0px;&quot;&gt;60 Minutes, Conficker, and April&#39;s Fool&lt;/a&gt;&lt;/h3&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin-bottom: 1.5em; padding: 0px; text-decoration: inherit;&quot;&gt;
Is the Conficker worm set to detonate some evil payload on April 1st? According to 60 Minutes, it seems so. Here&#39;s the non-FUD behind the Conficker worm.&lt;/div&gt;
&lt;h3 style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin: 1.5em 0px; padding: 0px; text-decoration: inherit;&quot;&gt;
&lt;a href=&quot;http://antivirus.about.com/od/virusdescriptions/a/winthbvirus.htm&quot; style=&quot;color: #3366cc; cursor: pointer; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; padding: 0px;&quot;&gt;Winthb &#39;Virus&#39; Tied to Backdoor Trojans&lt;/a&gt;&lt;/h3&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin-bottom: 1.5em; padding: 0px; text-decoration: inherit;&quot;&gt;
A family of backdoor and autorun trojans are working together to plague users. One symptom that may appear - the drive volume name and icon may be changed. The more insiduous aspects of the infection are far more silent and may be overlooked when users attempt manual removal.&lt;/div&gt;
&lt;h3 style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin: 1.5em 0px; padding: 0px; text-decoration: inherit;&quot;&gt;
&lt;a href=&quot;http://antivirus.about.com/od/virusdescriptions/a/stormyemail.htm&quot; style=&quot;color: #3366cc; cursor: pointer; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; padding: 0px;&quot;&gt;A Storm of Scary Email&lt;/a&gt;&lt;/h3&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin-bottom: 1.5em; padding: 0px; text-decoration: inherit;&quot;&gt;
In recent weeks, a rash of spam has been sent that bear much resemblance to the all-too-familiar tactics of the Storm botnet.&lt;/div&gt;
&lt;h3 style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin: 1.5em 0px; padding: 0px; text-decoration: inherit;&quot;&gt;
&lt;a href=&quot;http://antivirus.about.com/od/virusdescriptions/a/jspsyme.htm&quot; style=&quot;color: #3366cc; cursor: pointer; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; padding: 0px;&quot;&gt;What is JS/Psyme (and How to Get Rid of It)&lt;/a&gt;&lt;/h3&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin-bottom: 1.5em; padding: 0px; text-decoration: inherit;&quot;&gt;
Many users have experienced repeated warnings of infection by Psyme each time they open their browser. Depending on the antivirus in use, the name given in the warning may be any of the following: Downloader.Psyme (Symantec), Troj/Psyme (Sophos), Trojan.VBS.KillAV (Kaspersky), TrojanDownloader.VBS.Psyme (CA),Trojan.Downloader.JS.Psyme (Kaspersky), VBS/Petch.A (F-Prot), VBS/Psyme (McAfee)&lt;/div&gt;
&lt;h3 style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin: 1.5em 0px; padding: 0px; text-decoration: inherit;&quot;&gt;
&lt;a href=&quot;http://antivirus.about.com/od/virusdescriptions/a/stormworm.htm&quot; style=&quot;color: #3366cc; cursor: pointer; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; padding: 0px;&quot;&gt;What is the Storm Worm?&lt;/a&gt;&lt;/h3&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin-bottom: 1.5em; padding: 0px; text-decoration: inherit;&quot;&gt;
The so-called Storm worm is actually not a worm, but rather a family of Trojans that typically include a backdoor, SMTP relay, P2P communications, email harvester, downloader, and often a rootkit.&lt;/div&gt;
&lt;h3 style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin: 1.5em 0px; padding: 0px; text-decoration: inherit;&quot;&gt;
&lt;a href=&quot;http://antivirus.about.com/od/virusdescriptions/a/uzaworm.htm&quot; style=&quot;color: #3366cc; cursor: pointer; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; padding: 0px;&quot;&gt;U.Z.A. O/S Eliminator Worm&lt;/a&gt;&lt;/h3&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin-bottom: 1.5em; padding: 0px; text-decoration: inherit;&quot;&gt;
The so-called &quot;U.Z.A. O/S Eliminator&quot; worm appears to have originated in Maldives sometime in late July or early August 2007. The worm exploits the autorun feature, enabling it to spread from removable USB/thumb drives to other computers.&lt;/div&gt;
&lt;h3 style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin: 1.5em 0px; padding: 0px; text-decoration: inherit;&quot;&gt;
&lt;a href=&quot;http://antivirus.about.com/od/virusdescriptions/a/freedomworm.htm&quot; style=&quot;color: #3366cc; cursor: pointer; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; padding: 0px;&quot;&gt;Freedom / Outlaw Worm&lt;/a&gt;&lt;/h3&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin-bottom: 1.5em; padding: 0px; text-decoration: inherit;&quot;&gt;
The Freedom &#39;virus&#39; is a worm that infects local and USB drives, disables access to Task Manager, Registry Editor and other system utilities, and may try to delete MP3 files found on infected systems. Here&#39;s how to clean it.&lt;/div&gt;
&lt;h3 style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin: 1.5em 0px; padding: 0px; text-decoration: inherit;&quot;&gt;
&lt;a href=&quot;http://antivirus.about.com/od/virusdescriptions/a/ransomware.htm&quot; style=&quot;color: #3366cc; cursor: pointer; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; padding: 0px;&quot;&gt;Ransomware: Trojans Demand Money From Victims&lt;/a&gt;&lt;/h3&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin-bottom: 1.5em; padding: 0px; text-decoration: inherit;&quot;&gt;
Having your computer infected with a virus or other malicious software is upsetting enough. But over the past year, a new type of attack promises to be even more disconcerting. Dubbed ransomware, this new attack infects the system, encrypts the files, and then demands payment from its victims.&lt;/div&gt;
&lt;h3 style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin: 1.5em 0px; padding: 0px; text-decoration: inherit;&quot;&gt;
&lt;a href=&quot;http://antivirus.about.com/od/virusdescriptions/a/mespam.htm&quot; style=&quot;color: #3366cc; cursor: pointer; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; padding: 0px;&quot;&gt;Trojan.MeSpam Makes You the Spammer&lt;/a&gt;&lt;/h3&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 18px; margin-bottom: 1.5em; padding: 0px; text-decoration: inherit;&quot;&gt;
Instead of relying on bots to do the dirty work, Trojan.MeSpam makes you the culprit. Once infected, every forum post you make, every webmail you send, and every blog comment you leave will also deposit a link pointing to a nefarious website.&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://antivirus-software2009.blogspot.com/feeds/4813676182633792766/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://antivirus-software2009.blogspot.com/2013/07/articles-index-with-click-to-select.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/4813676182633792766'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/4813676182633792766'/><link rel='alternate' type='text/html' href='http://antivirus-software2009.blogspot.com/2013/07/articles-index-with-click-to-select.html' title='Articles Index with click to select'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/02820373220680933314</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3655698400884223479.post-1766555788588999374</id><published>2013-02-24T09:41:00.000-08:00</published><updated>2013-02-24T09:41:17.771-08:00</updated><title type='text'></title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6JjOCzOqVjEmXMhB4Am6-I3TVmLroE64HgKrJe-cXi1WbJl807gzqhSAIC1-zj906P367B3U6jZUpxhZM28A7p5pGZyot-EZUrH8fEgYkn_0DD3_A3Crwd-DNoILgjpryPJVHcbmIHOw/s1600/ONE_2012_200_31055-139154.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6JjOCzOqVjEmXMhB4Am6-I3TVmLroE64HgKrJe-cXi1WbJl807gzqhSAIC1-zj906P367B3U6jZUpxhZM28A7p5pGZyot-EZUrH8fEgYkn_0DD3_A3Crwd-DNoILgjpryPJVHcbmIHOw/s1600/ONE_2012_200_31055-139154.png&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;h1 class=&quot;clearfix&quot;&gt;
&lt;u style=&quot;color: #cc0000; font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;Kaspersky ONE&lt;/u&gt;&lt;/h1&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Kaspersky ONE Universal Security is the easy, one-licence solution to protect 
your PCs, Macs, Android smartphones and Android tablets. Based on award-winning 
Kaspersky Lab technologies, Kaspersky ONE delivers security that’s optimised for 
each device – to provide real-time protection against dangerous Internet 
threats. Whichever device you use to bank, shop, surf or chat online, you know 
Kaspersky technologies are helping to ensure you&#39;re safe.&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxJ2oyExVKQQ-ssfBPeugCQbdRkTXcdT-FkxUGrekNjdMXe3LsN7nAak4BzW61lcAAJNPW90-BFfc0BmM0h2ooxiwjGaRmg8eQ2dsIgmrdUrS-6iNDz1M0JyS56N2AL3-0Z6wx_v66UZE/s1600/nav_hightlight55-8833.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxJ2oyExVKQQ-ssfBPeugCQbdRkTXcdT-FkxUGrekNjdMXe3LsN7nAak4BzW61lcAAJNPW90-BFfc0BmM0h2ooxiwjGaRmg8eQ2dsIgmrdUrS-6iNDz1M0JyS56N2AL3-0Z6wx_v66UZE/s1600/nav_hightlight55-8833.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBlPubMXhU3CsBQ0dZvB_nbZlCSKQ_9fJ4slIO3hn7eOk_NZ2Z3IJk7kWpC870ighM3Rnz2UlTGziCgZ7zdpRZTawiRLXUar4rM6AilACfMhP-_UIpssyfu-QlHL8dx302eE-Kfe1YJz8/s1600/nav_sysreq55-8837.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBlPubMXhU3CsBQ0dZvB_nbZlCSKQ_9fJ4slIO3hn7eOk_NZ2Z3IJk7kWpC870ighM3Rnz2UlTGziCgZ7zdpRZTawiRLXUar4rM6AilACfMhP-_UIpssyfu-QlHL8dx302eE-Kfe1YJz8/s1600/nav_sysreq55-8837.jpg&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUVRDYG3cCe1YGZoGCkKmvJ_e-cxzRKUIkY32mTGqg68NFnUzV9QPDaOu58kBHNcaOP-RHzy941BzPxo-zktL792OwJoftSwKWLdcmhvEJf4hXvV4TtV_PVoE4w6Uu77dbFz3zJz9x3sY/s1600/nav_features55-8832.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUVRDYG3cCe1YGZoGCkKmvJ_e-cxzRKUIkY32mTGqg68NFnUzV9QPDaOu58kBHNcaOP-RHzy941BzPxo-zktL792OwJoftSwKWLdcmhvEJf4hXvV4TtV_PVoE4w6Uu77dbFz3zJz9x3sY/s1600/nav_features55-8832.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;a href=&quot;&quot; name=&quot;Feature0&quot;&gt;Benefits&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;prodbox&quot;&gt;
&lt;div class=&quot;rim clearfix&quot;&gt;
&lt;div class=&quot;text&quot;&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;strong&gt;Universal security for multiple devices&amp;nbsp;&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Smart devices 
are continually exposed to new, sophisticated threats on a daily basis. 
Kaspersky ONE Universal Security provides convenient protection against malware 
and cybercrime for your Windows PCs, Macs, Android smartphones and tablets.&lt;/div&gt;
&lt;br /&gt;

&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;strong&gt;Easy, one-licence protection&amp;nbsp;&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
With just one licence, you 
can secure any combination of PCs, Macs, Android smartphones and tablets. For 
example, a single licence for five devices will enable you to protect your 
desktop, two laptops and two smartphones – or protect two tablets, two 
smartphones and a Mac. Kaspersky ONE lets you match your security to your 
needs.&lt;/div&gt;
&lt;br /&gt;

&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;strong&gt;Award-winning Kaspersky Lab technologies&amp;nbsp;&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Whether you’re 
looking to protect your PC, Mac, Android smartphone, Android tablet – or various 
combinations of these devices – you can enjoy peace-of-mind with world-class 
security that’s easy to use and won’t slow you down.&lt;/div&gt;
&lt;br /&gt;

&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;strong&gt;Real-time reaction to new and emerging threats&amp;nbsp;&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Potential 
threats are monitored and analysed in real-time and dangerous actions are 
prevented before they can cause harm. Whatever device you’re using – your PC, 
Mac, smartphone or tablet – you’ll get immediate scanning of all applications 
and files that you open, save or download from the web.&lt;/div&gt;
&lt;br /&gt;

&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;strong&gt;Maintain performance – with minimal impact on your devices&amp;nbsp;&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Kaspersky Lab delivers small, frequent database updates to help 
keep your devices protected from the latest threats – without severely impacting 
a device’s resources or performance. Working behind-the-scenes, Kaspersky ONE 
Universal Security doesn’t interfere with other running programs, so you can 
feel secure while still enjoying great performance.&lt;/div&gt;
&lt;br /&gt;

&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;strong&gt;Anti-Theft protection for smartphones and tablets&amp;nbsp;&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Your 
mobile device holds so much of your personal information – contacts, emails, 
texts, pictures and more. What if you lose it or it’s stolen? With our 
anti-theft protection for mobile devices, you can easily protect your private 
data and find your missing phone or tablet:&lt;/div&gt;
&lt;br /&gt;

&lt;ul&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Disable it – completely blocking access to your device&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Wipe it – delete all of your personal data&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Locate it – using GPS, Wi-Fi, GSM Find and Google Maps&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Identify unauthorised users of your smartphone – by using the “Mugshot” 
feature, you can secretly photograph the user&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Even if your smartphone’s SIM card is replaced, Kaspersky technologies can 
still help you to block, clean and find your phone&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Kaspersky’s new Anti-Theft Web Management portal gives you remote access to 
your lost or stolen device – so you can easily activate all of the above 
anti-theft features.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;top&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;a href=&quot;http://me.kaspersky.com/en/one#&quot;&gt;Back to top ↑&lt;/a&gt; &lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;prodbox&quot;&gt;
&lt;h3 style=&quot;text-align: justify;&quot;&gt;
&lt;a href=&quot;&quot; name=&quot;Feature1&quot;&gt;Key Features &lt;/a&gt;&lt;/h3&gt;
&lt;div class=&quot;text&quot;&gt;
&lt;h4 style=&quot;text-align: justify;&quot;&gt;
Windows PC Protection&lt;/h4&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
You know your PC – and the photos, music, documents and personal information 
you store on it – all need to be protected. Choose Kaspersky’s award-winning 
protection and you can bank, shop, surf and socialise online, while you’re 
protected against the increasingly complex threats that the Internet can throw 
your way… including threats that have yet to be discovered.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;strong&gt;Key Features&lt;/strong&gt;&lt;/div&gt;
&lt;ul&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Protects against all known viruses and Internet threats&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Detects new, emerging and unknown threats&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Identifies suspicious websites and phishing websites&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Delivers greater security for online shopping and banking&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Helps to protect your privacy and your digital identity&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Keeps your children safer online&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Prevents malware from exploiting vulnerabilities in your PC&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Compatible with Windows 8&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 style=&quot;text-align: justify;&quot;&gt;
Mac Protection&lt;/h4&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
The growing popularity of Macs is making them into a target for malware. Even 
if your Mac isn’t targeted, you can still pass harmful PC viruses to your 
family’s, friends’ and colleagues’ PCs.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;strong&gt;Key Features&lt;/strong&gt;&lt;/div&gt;
&lt;ul&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Real-time protection against Mac, PC and Linux malware&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Protection against phishing and malicious websites&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Advanced Parental Control to keep your children safe online&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Defeat keyloggers, screen-capture malware and identity thieves&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Familiar, Mac-style interface&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 style=&quot;text-align: justify;&quot;&gt;
Android Smartphone Protection&lt;/h4&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Mobile devices are the new hotspot for malware attacks. Because your 
smartphone faces the same vulnerabilities as your PC, you need to protect it 
just as carefully. Kaspersky ONE&#39;s smartphone protection combines innovative 
anti-theft defence with advanced Internet threat protection, to help ensure the 
safety of your Android smartphone. Whether your phone is lost or stolen, or is 
targeted while you&#39;re surfing the Internet, you know Kaspersky is helping to 
keep your personal data safe.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;strong&gt;Key Features&lt;/strong&gt;&lt;/div&gt;
&lt;ul&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Helps to protect against theft and loss – even if the SIM card has been 
replaced&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Scans for mobile viruses, spyware and more – in real-time&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Blocks dangerous and phishing websites&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Filters unwanted calls &amp;amp; SMS texts&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Hides private contacts, calls and SMS texts&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Optimised for minimal impact on battery life&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 style=&quot;text-align: justify;&quot;&gt;
Android Tablet Protection&lt;/h4&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
When you download the latest Android app, how do you know that you’ve not 
downloaded a virus along with it? Protect yourself with real-time scanning and 
frequent, over-the-air updates – plus advanced web filtering and anti-theft 
technologies.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;strong&gt;Key Features&lt;/strong&gt;&lt;/div&gt;
&lt;ul&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Real-time antivirus protection&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Automatic virus-scanning of apps&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Cutting-edge anti-theft technologies&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Web filtering to block dangerous links&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Personal Web Account for remote management&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Minimal impact on tablet resources and performance&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Optimised interface&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div class=&quot;top&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;a href=&quot;http://me.kaspersky.com/en/one#&quot;&gt;Back to top ↑&lt;/a&gt; &lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;prodbox&quot;&gt;
&lt;h3 style=&quot;text-align: justify;&quot;&gt;
&lt;a href=&quot;&quot; name=&quot;Feature2&quot;&gt;System Requirements &lt;/a&gt;&lt;/h3&gt;
&lt;div class=&quot;text&quot;&gt;
&lt;h4 style=&quot;text-align: justify;&quot;&gt;
Windows PC Protection&lt;/h4&gt;
&lt;table border=&quot;0&quot; cellpadding=&quot;1&quot; cellspacing=&quot;1&quot; style=&quot;text-align: justify; width: 100%px;&quot;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td class=&quot;first&quot;&gt;&lt;strong&gt;Operating Systems&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Hardware Requirements&lt;/strong&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td class=&quot;first&quot;&gt;
&lt;ul&gt;
&lt;li&gt;Microsoft Windows XP Home Edition (Service Pack 2 or higher)&lt;/li&gt;
&lt;li&gt;Microsoft Windows XP Professional (Service Pack 2 or higher)&lt;/li&gt;
&lt;li&gt;Microsoft Windows XP Professional 64-Bit Edition (Service Pack 2 or 
higher)&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt;Processor 800 MHz or higher&lt;/li&gt;
&lt;li&gt;512 MB available RAM&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td class=&quot;first&quot;&gt;
&lt;ul&gt;
&lt;li&gt;Microsoft Windows Vista Home Basic (32/64-Bit)&lt;/li&gt;
&lt;li&gt;Microsoft Windows Vista Home Premium (32/64-Bit)&lt;/li&gt;
&lt;li&gt;Microsoft Windows Vista Business (32/64-Bit)&lt;/li&gt;
&lt;li&gt;Microsoft Windows Vista Enterprise (32/64-Bit)&lt;/li&gt;
&lt;li&gt;Microsoft Windows Vista Ultimate (32/64-Bit)&lt;/li&gt;
&lt;li&gt;Microsoft Windows 7 Starter&lt;/li&gt;
&lt;li&gt;Microsoft Windows 7 Home Basic (32/64-Bit)&lt;/li&gt;
&lt;li&gt;Microsoft Windows 7 Home Premium (32/64-Bit)&lt;/li&gt;
&lt;li&gt;Microsoft Windows 7 Professional (32/64-Bit)&lt;/li&gt;
&lt;li&gt;Microsoft Windows 7 Ultimate (32/64-Bit)&lt;/li&gt;
&lt;li&gt;Microsoft Windows 8 (32/64-Bit)&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt;Processor 1 GHz or higher&lt;/li&gt;
&lt;li&gt;1 GB RAM (32-Bit) or 2 GB RAM (64-Bit)&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td class=&quot;first&quot; colspan=&quot;2&quot;&gt;&lt;strong&gt;Required for all 
installations&lt;/strong&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr class=&quot;first&quot;&gt;
&lt;td class=&quot;first&quot; colspan=&quot;2&quot; style=&quot;text-align: left;&quot;&gt;
&lt;ul&gt;
&lt;li&gt;Approximately 480 MB free space on the hard drive (depending on anti-virus 
database size)&lt;/li&gt;
&lt;li&gt;CD/DVD drive for installation of the program from CD ROM&lt;/li&gt;
&lt;li&gt;Computer mouse&lt;/li&gt;
&lt;li&gt;Internet connection for product activation&lt;/li&gt;
&lt;li&gt;Microsoft Internet Explorer 6 or higher&lt;/li&gt;
&lt;li&gt;Microsoft Windows Installer 2.0&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://antivirus-software2009.blogspot.com/feeds/1766555788588999374/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://antivirus-software2009.blogspot.com/2013/02/kaspersky-one-kaspersky-one-universal.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/1766555788588999374'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/1766555788588999374'/><link rel='alternate' type='text/html' href='http://antivirus-software2009.blogspot.com/2013/02/kaspersky-one-kaspersky-one-universal.html' title=''/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/02820373220680933314</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6JjOCzOqVjEmXMhB4Am6-I3TVmLroE64HgKrJe-cXi1WbJl807gzqhSAIC1-zj906P367B3U6jZUpxhZM28A7p5pGZyot-EZUrH8fEgYkn_0DD3_A3Crwd-DNoILgjpryPJVHcbmIHOw/s72-c/ONE_2012_200_31055-139154.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3655698400884223479.post-3012550718544977624</id><published>2012-12-21T05:09:00.001-08:00</published><updated>2012-12-21T05:09:44.486-08:00</updated><title type='text'>Antivirus on Windows 8</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;h1 itemprop=&quot;name&quot; style=&quot;box-sizing: border-box; font-family: facitweb, sans-serif; font-size: 38px; font-weight: 500; line-height: 1.13; margin: 0px 0px 12px;&quot;&gt;
&lt;u&gt;&lt;span style=&quot;color: red;&quot;&gt;Antivirus on Windows 8:&lt;/span&gt;&lt;/u&gt;&lt;/h1&gt;
&lt;h1 itemprop=&quot;name&quot; style=&quot;box-sizing: border-box; font-family: facitweb, sans-serif; font-size: 38px; font-weight: 500; line-height: 1.13; margin: 0px 0px 12px;&quot;&gt;
&lt;span style=&quot;color: blue;&quot;&gt;Looking at Your Options&lt;/span&gt;&lt;/h1&gt;
&lt;div&gt;
&lt;span style=&quot;color: blue;&quot;&gt;By: Zafar Ali Khan&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white; color: #222222; font-family: &#39;Helvetica Neue&#39;, Arial, sans-serif; font-size: 15px; line-height: 21px;&quot;&gt;Microsoft will&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.pcworld.com/article/255776/windows_8_security_whats_new.html&quot; style=&quot;background-color: white; box-sizing: border-box; color: #25a7d7; font-family: &#39;Helvetica Neue&#39;, Arial, sans-serif; font-size: 15px; line-height: 21px; text-decoration: initial;&quot;&gt;include antivirus in Windows 8&lt;/a&gt;&lt;span style=&quot;background-color: white; color: #222222; font-family: &#39;Helvetica Neue&#39;, Arial, sans-serif; font-size: 15px; line-height: 21px;&quot;&gt;&amp;nbsp;for the first time in the history of Windows. But will this software--the new version of Windows Defender--provide adequate protection against viruses, spyware, and other malware? Let&#39;s take a closer look at what Windows Defender provides, and whether its features are enough to keep you safe.&lt;/span&gt;&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-family: &#39;Helvetica Neue&#39;, Arial, sans-serif; font-size: 15px; line-height: 1.7em; margin-bottom: 0.7em;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-family: &#39;Helvetica Neue&#39;, Arial, sans-serif; font-size: 15px; line-height: 1.7em; margin-bottom: 0.7em;&quot;&gt;
Bear in mind that even though Microsoft will include Windows Defender in Windows 8, PC manufacturers may disable the program on new PCs that carry preinstalled antivirus software from a third-party such as Norton or McAfee. The preinstalled third-party antivirus options are usually limited-time trials, so your initial decision may be whether to keep any preinstalled antivirus; if you decide against keeping it, you&#39;ll need to decide whether to enable Windows Defender and use it or to switch to another third-party antivirus program.&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-family: &#39;Helvetica Neue&#39;, Arial, sans-serif; font-size: 15px; line-height: 1.7em; margin-bottom: 0.7em;&quot;&gt;
The most important thing to consider when choosing antivirus software is its protection strength--how well it detects, disables, and removes viruses, spyware, and other malware. In this article I&#39;ll focus on comparing the protection strength of Windows Defender to that of other antivirus programs.&lt;/div&gt;
&lt;h3 class=&quot;subhed&quot; style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-family: facitweb, sans-serif; margin-bottom: 0.25em; margin-top: 1em;&quot;&gt;
Protection Strength of Windows Defender&lt;/h3&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-family: &#39;Helvetica Neue&#39;, Arial, sans-serif; font-size: 15px; line-height: 1.7em; margin-bottom: 0.7em;&quot;&gt;
&lt;/div&gt;
&lt;figure class=&quot;image large&quot; style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-family: &#39;Helvetica Neue&#39;, Arial, sans-serif; font-size: 15px; line-height: 21px; margin: 0px 0px 10px; max-width: 100%; overflow: hidden;&quot;&gt;&lt;img alt=&quot;Windows Defender in Windows 8&quot; height=&quot;427&quot; src=&quot;http://zapp5.staticworld.net/images/article/2012/05/windows_defender-11361745.png&quot; style=&quot;border: 0px; box-sizing: border-box; float: left; height: auto; max-width: 100%; vertical-align: middle; width: auto;&quot; width=&quot;606&quot; /&gt;&lt;figcaption class=&quot;caption&quot; style=&quot;box-sizing: border-box; clear: both; color: #999999; font-family: facitweb, sans-serif; font-size: 12px; margin-top: 5px; text-align: center;&quot;&gt;Windows Defender in Windows 8 looks a lot like Microsoft Security Essentials.&lt;/figcaption&gt;&lt;/figure&gt;&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-family: &#39;Helvetica Neue&#39;, Arial, sans-serif; font-size: 15px; line-height: 1.7em; margin-bottom: 0.7em;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-family: &#39;Helvetica Neue&#39;, Arial, sans-serif; font-size: 15px; line-height: 1.7em; margin-bottom: 0.7em;&quot;&gt;
Though we haven&#39;t fully tested Windows Defender in Windows 8 yet, we have tested Microsoft Security Essentials, which uses the same antimalware engine as Windows Defender.&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-family: &#39;Helvetica Neue&#39;, Arial, sans-serif; font-size: 15px; line-height: 1.7em; margin-bottom: 0.7em;&quot;&gt;
Windows Defender and Microsoft Security Essentials also have very similar interfaces. Consequently, using the results from the&amp;nbsp;&lt;a href=&quot;http://www.pcworld.com/article/254121-2/free_antivirus_you_can_trust.html&quot; style=&quot;box-sizing: border-box; color: #25a7d7; text-decoration: initial;&quot;&gt;existing Security Essentials review&lt;/a&gt;&amp;nbsp;for a casual comparison seems reasonable. Security companies regularly update their products, and the results you obtain with the most recent iteration of each package could very well differ from those discussed here, but the earlier data does give us a rough idea of how Security Essentials and Windows Defender match up to their competition.&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-family: &#39;Helvetica Neue&#39;, Arial, sans-serif; font-size: 15px; line-height: 1.7em; margin-bottom: 0.7em;&quot;&gt;
In a&amp;nbsp;&lt;a href=&quot;http://www.pcworld.com/article/254121/free_antivirus_you_can_trust.html&quot; style=&quot;box-sizing: border-box; color: #25a7d7; text-decoration: initial;&quot;&gt;roundup review&lt;/a&gt;&amp;nbsp;that we posted three months ago, based on evaluations that we conducted in conjunction with&amp;nbsp;&lt;a href=&quot;http://www.av-test.org/index.php?L=1&quot; style=&quot;box-sizing: border-box; color: #25a7d7; text-decoration: initial;&quot;&gt;AV-Test&lt;/a&gt;, a well-respected antivirus-software testing lab, we appraised the performance of seven free antivirus programs. In this group, Security Essentials placed fifth. Our reviewers found it easy to use and deemed it the best of the seven at completely removing malware that it uncovered; but they also found its malware detection rate rather lackluster: It spotted 97 percent of known malware samples, whereas programs turned in detection rates as high as 99.9 percent.&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-family: &#39;Helvetica Neue&#39;, Arial, sans-serif; font-size: 15px; line-height: 1.7em; margin-bottom: 0.7em;&quot;&gt;
To compare the protection strength of Security Essentials to that other free and paid antiviruses, you can refer to AV-Test&#39;s website for its&amp;nbsp;&lt;a href=&quot;http://www.av-test.org/en/tests/home-user/marapr-2012/&quot; style=&quot;box-sizing: border-box; color: #25a7d7; text-decoration: initial;&quot;&gt;latest testing results&lt;/a&gt;. Those results, at this writing, show that Security Essentials provides great malware repair and removal: placing third, just behind Bitdefender and Kaspersky. But the program&#39;s results for malware detection are much worse: It placed 21st in a field of 22.&lt;/div&gt;
&lt;h3 class=&quot;subhed&quot; style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-family: facitweb, sans-serif; margin-bottom: 0.25em; margin-top: 1em;&quot;&gt;
Additional Free Antivirus Options&lt;/h3&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-family: &#39;Helvetica Neue&#39;, Arial, sans-serif; font-size: 15px; line-height: 1.7em; margin-bottom: 0.7em;&quot;&gt;
If you&#39;d like to save some money, but prefer to use some other program, you have quite a few options. Again, I&#39;ll refer to our&amp;nbsp;&lt;a href=&quot;http://www.pcworld.com/article/254121/free_antivirus_you_can_trust.html&quot; style=&quot;box-sizing: border-box; color: #25a7d7; text-decoration: initial;&quot;&gt;roundup review&lt;/a&gt;&amp;nbsp;from last April, which evaluated seven free antivirus suites. Here are the top four you might consider using:&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-family: &#39;Helvetica Neue&#39;, Arial, sans-serif; font-size: 15px; line-height: 1.7em; margin-bottom: 0.7em;&quot;&gt;
&lt;/div&gt;
&lt;figure class=&quot;image large&quot; style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-family: &#39;Helvetica Neue&#39;, Arial, sans-serif; font-size: 15px; line-height: 21px; margin: 0px 0px 10px; max-width: 100%; overflow: hidden;&quot;&gt;&lt;img alt=&quot;AVG Anti-Virus Free Edition&quot; height=&quot;404&quot; src=&quot;http://images.pcworld.com/images/article/2012/04/avg-606-11353516.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; float: left; height: auto; max-width: 100%; vertical-align: middle; width: auto;&quot; width=&quot;606&quot; /&gt;&lt;figcaption class=&quot;caption&quot; style=&quot;box-sizing: border-box; clear: both; color: #999999; font-family: facitweb, sans-serif; font-size: 12px; margin-top: 5px; text-align: center;&quot;&gt;AVG Anti-Virus Free Edition was the highest-ranked of the seven free antivirus programs we assessed earlier this year.&lt;/figcaption&gt;&lt;/figure&gt;&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-family: &#39;Helvetica Neue&#39;, Arial, sans-serif; font-size: 15px; line-height: 1.7em; margin-bottom: 0.7em;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-family: &#39;Helvetica Neue&#39;, Arial, sans-serif; font-size: 15px; line-height: 1.7em; margin-bottom: 0.7em;&quot;&gt;
&lt;a href=&quot;http://www.pcworld.com/downloads/file/fid,15202-order,4/description.html&quot; style=&quot;box-sizing: border-box; color: #25a7d7; text-decoration: initial;&quot;&gt;&lt;strong style=&quot;box-sizing: border-box;&quot;&gt;AVG Anti-Virus Free Edition&lt;/strong&gt;&lt;/a&gt;&lt;strong style=&quot;box-sizing: border-box;&quot;&gt;:&lt;/strong&gt;&amp;nbsp;Though it had the lowest detection rate of the top four free antivirus programs with a 98.7 percent detection rate against known malware (Avast, Panda, and Avira finished with rates of 99.1 percent, 99.9 percent, and 99.7 percent, respectively), it handily outperformed Security Essentials (which finished with a detection rate of 97 percent). And though it wasn&#39;t as good at completely removing malware as Security Essentials (66.7 percent versus 80 percent), it was the only antivirus to disable 100 percent of detected malware; Security Essentials finished at 93 percent on this measure. AVG Anti-Virus Free Edition also tied Panda Cloud Antivirus for the top rate of blocking brand-new threats, at 85.7 percent, whereas Security Essentials was at 71.4 percent.&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-family: &#39;Helvetica Neue&#39;, Arial, sans-serif; font-size: 15px; line-height: 1.7em; margin-bottom: 0.7em;&quot;&gt;
&lt;a href=&quot;http://www.pcworld.com/downloads/file/fid,64535-order,4/description.html&quot; style=&quot;box-sizing: border-box; color: #25a7d7; text-decoration: initial;&quot;&gt;&lt;strong style=&quot;box-sizing: border-box;&quot;&gt;Avast Free Antivirus&lt;/strong&gt;&lt;/a&gt;&lt;strong style=&quot;box-sizing: border-box;&quot;&gt;:&lt;/strong&gt;&amp;nbsp;Avast&#39;s freebie provided strong detection of known malware samples, at 99.1 percent. Its rate of completely removing malware (67 percent) fell short of Security Essentials&#39; rate (80 percent) and the two programs delivered matching 93 percent rates for disabling active malware. Avast Free Antivirus did provide better blocking of real-world malware, achieving a 78.6 percent rate, compared to Security Essentials&#39; 71.4 percent.&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-family: &#39;Helvetica Neue&#39;, Arial, sans-serif; font-size: 15px; line-height: 1.7em; margin-bottom: 0.7em;&quot;&gt;
&lt;a href=&quot;http://www.pcworld.com/downloads/file/fid,79778-order,4/description.html&quot; style=&quot;box-sizing: border-box; color: #25a7d7; text-decoration: initial;&quot;&gt;&lt;strong style=&quot;box-sizing: border-box;&quot;&gt;Panda Cloud Antivirus&lt;/strong&gt;&lt;/a&gt;&lt;strong style=&quot;box-sizing: border-box;&quot;&gt;:&lt;/strong&gt;&amp;nbsp;This tool provided the second highest protection against known malware samples overall at 99.9 percent, compared to 97 percent by Security Essentials. Though Panda&#39;s malware repair percentage was among the lowest in the group of seven, it tied with AVG for the best performance at fully blocking brand-new threats, turning in a rate of 85.7 percent, versus Security Essentials&#39; mark of 71.4 percent.&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-family: &#39;Helvetica Neue&#39;, Arial, sans-serif; font-size: 15px; line-height: 1.7em; margin-bottom: 0.7em;&quot;&gt;
&lt;a href=&quot;http://www.avira.com/en/avira-free-antivirus&quot; style=&quot;box-sizing: border-box; color: #25a7d7; text-decoration: initial;&quot;&gt;&lt;strong style=&quot;box-sizing: border-box;&quot;&gt;Avira Free Antivirus&lt;/strong&gt;&lt;/a&gt;&lt;strong style=&quot;box-sizing: border-box;&quot;&gt;:&amp;nbsp;&lt;/strong&gt;Avira provided the third-highest detection rate (out of seven free antiviruses tested) for spotting known malware samples: 99.7 percent, compared to Security Essentials&#39; rate of 97 percent. Though it scored lower than Security Essentials on AV-Test&#39;s remaining detection and repair tests, Avira did provide much faster scanning.&lt;/div&gt;
&lt;h3 class=&quot;subhed&quot; style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-family: facitweb, sans-serif; margin-bottom: 0.25em; margin-top: 1em;&quot;&gt;
Paid Antivirus Options&lt;/h3&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-family: &#39;Helvetica Neue&#39;, Arial, sans-serif; font-size: 15px; line-height: 1.7em; margin-bottom: 0.7em;&quot;&gt;
Though free antivirus programs can provide adequate protection for most users, the best protection must be bought. To compare these, I&#39;ll refer to a&amp;nbsp;&lt;a href=&quot;http://www.pcworld.com/article/248479/best_security_suites_pc_bodyguards.html&quot; style=&quot;box-sizing: border-box; color: #25a7d7; text-decoration: initial;&quot;&gt;roundup review&lt;/a&gt;&amp;nbsp;of paid security suites that we posted in January of this year. Here are the top four programs you might consider purchasing, with their prices for one year of protection on three PCs lited parenthetically:&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-family: &#39;Helvetica Neue&#39;, Arial, sans-serif; font-size: 15px; line-height: 1.7em; margin-bottom: 0.7em;&quot;&gt;
&lt;/div&gt;
&lt;figure class=&quot;image large&quot; style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-family: &#39;Helvetica Neue&#39;, Arial, sans-serif; font-size: 15px; line-height: 21px; margin: 0px 0px 10px; max-width: 100%; overflow: hidden;&quot;&gt;&lt;img alt=&quot;G Data InternetSecurity 2012&quot; height=&quot;452&quot; src=&quot;http://images.pcworld.com/images/article/2012/01/gdata2012-9792173.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; float: left; height: auto; max-width: 100%; vertical-align: middle; width: auto;&quot; width=&quot;606&quot; /&gt;&lt;figcaption class=&quot;caption&quot; style=&quot;box-sizing: border-box; clear: both; color: #999999; font-family: facitweb, sans-serif; font-size: 12px; margin-top: 5px; text-align: center;&quot;&gt;G Data InternetSecurity 2012 earned the top ranking among paid antivirus programs in our January roundup.&lt;/figcaption&gt;&lt;/figure&gt;&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-family: &#39;Helvetica Neue&#39;, Arial, sans-serif; font-size: 15px; line-height: 1.7em; margin-bottom: 0.7em;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-family: &#39;Helvetica Neue&#39;, Arial, sans-serif; font-size: 15px; line-height: 1.7em; margin-bottom: 0.7em;&quot;&gt;
&lt;a href=&quot;http://www.pcworld.com/article/248886/g_data_internetsecurity_2012_review_topnotch_antimalware_protection.html&quot; style=&quot;box-sizing: border-box; color: #25a7d7; text-decoration: initial;&quot;&gt;&lt;strong style=&quot;box-sizing: border-box;&quot;&gt;G Data InternetSecurity&lt;/strong&gt;&lt;/a&gt;&lt;strong style=&quot;box-sizing: border-box;&quot;&gt;&amp;nbsp;($45):&lt;/strong&gt;&amp;nbsp;Among 14 paid packages tested, G Data Internet Security provided the best protection against known malware with a 99.99 percent detection rate. At the same time, it had minimal impact on PC performance, and an acceptable complete malware removal score of 60 percent.&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-family: &#39;Helvetica Neue&#39;, Arial, sans-serif; font-size: 15px; line-height: 1.7em; margin-bottom: 0.7em;&quot;&gt;
&lt;a href=&quot;http://www.pcworld.com/article/248887/norton_internet_security_2012_review_solid_and_efficient_pc_security.html&quot; style=&quot;box-sizing: border-box; color: #25a7d7; text-decoration: initial;&quot;&gt;&lt;strong style=&quot;box-sizing: border-box;&quot;&gt;Norton Internet Security&lt;/strong&gt;&lt;/a&gt;&lt;strong style=&quot;box-sizing: border-box;&quot;&gt;&amp;nbsp;($50):&lt;/strong&gt;&amp;nbsp;This program delivered solid detection of known malware, at 99.94 percent, but it suffered from a higher-than-average false-positive rate and a relatively low malware removal mark of 50 percent.&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-family: &#39;Helvetica Neue&#39;, Arial, sans-serif; font-size: 15px; line-height: 1.7em; margin-bottom: 0.7em;&quot;&gt;
&lt;a href=&quot;http://www.pcworld.com/article/248889/bitdefender_internet_security_2012_review_best_protection_excellent_interface.html&quot; style=&quot;box-sizing: border-box; color: #25a7d7; text-decoration: initial;&quot;&gt;&lt;strong style=&quot;box-sizing: border-box;&quot;&gt;Bitdefender Internet Security&lt;/strong&gt;&lt;/a&gt;&lt;strong style=&quot;box-sizing: border-box;&quot;&gt;&amp;nbsp;($80):&lt;/strong&gt;&amp;nbsp;Bitdefender turned in the second-highest malware detection rate among paid programs, at 99.96 percent, and it also distinguished itself with a very good removal rate (90 percent), but its scan speeds tended to be slow, and the software had a relatively large impact on PC performance.&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-family: &#39;Helvetica Neue&#39;, Arial, sans-serif; font-size: 15px; line-height: 1.7em; margin-bottom: 0.7em;&quot;&gt;
&lt;a href=&quot;http://www.pcworld.com/article/248891/kaspersky_internet_security_2012_review_effective_antimalware_performance.html&quot; style=&quot;box-sizing: border-box; color: #25a7d7; text-decoration: initial;&quot;&gt;&lt;strong style=&quot;box-sizing: border-box;&quot;&gt;Kaspersky Internet Security&lt;/strong&gt;&lt;/a&gt;&lt;strong style=&quot;box-sizing: border-box;&quot;&gt;&amp;nbsp;($65):&lt;/strong&gt;&amp;nbsp;Kaspersky&#39;s paid antivirus software combined good malware protection (at 99.34 percent) with an acceptable malware removal rate of 60 percent.&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-family: &#39;Helvetica Neue&#39;, Arial, sans-serif; font-size: 15px; line-height: 1.7em; margin-bottom: 0.7em;&quot;&gt;
When you buy an Internet Security suite, in addition to getting better protection, you usually get more features and services than you would with a free antivirus program. For example, most Internet Security suites include a firewall to help block intrusions and data theft (these firewalls tend to be better than the free firewall built into Windows), as well as a spam filter to help you control your junk email. Many security software vendors offer tech support for removing malware if you do become infected, and they may provide additional security features such as&amp;nbsp;&lt;a href=&quot;http://www.pcworld.com/article/247416/how_to_keep_your_pc_safe_with_sandboxing.html&quot; style=&quot;box-sizing: border-box; color: #25a7d7; text-decoration: initial;&quot;&gt;sandboxing&lt;/a&gt;, and even extras like online storage or PC tune-up utilities.&lt;/div&gt;
&lt;h3 class=&quot;subhed&quot; style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-family: facitweb, sans-serif; margin-bottom: 0.25em; margin-top: 1em;&quot;&gt;
Choosing Your Antivirus for Windows 8&lt;/h3&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-family: &#39;Helvetica Neue&#39;, Arial, sans-serif; font-size: 15px; line-height: 1.7em; margin-bottom: 0.7em;&quot;&gt;
If your Windows 8 PC comes with a third-party antivirus preinstalled on it, you should first&lt;a href=&quot;http://www.pcworld.com/article/248479/best_security_suites_pc_bodyguards.html&quot; style=&quot;box-sizing: border-box; color: #25a7d7; text-decoration: initial;&quot;&gt;check the program&#39;s ranking&lt;/a&gt;; if it doesn&#39;t rank in the top four, consider opting out and using something else. As we&#39;ve seen, the free antivirus built into Windows 8 should be easy to use and should provide excellent malware removal, but it will likely be relatively weak at detecting malware in the first place.&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-family: &#39;Helvetica Neue&#39;, Arial, sans-serif; font-size: 15px; line-height: 1.7em; margin-bottom: 0.7em;&quot;&gt;
Though Windows Defender will still certainly protect you from most malware and may be suitable for some users, you may prefer to install on of the better-performing free antivirus programs offered by AVG, Avast, Panda, and Avira. Or for superior protection and more features, consider buying antivirus protection from one of the top vendors: G Data, Symantec (Norton), Bitdefender, or Kaspersky.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://antivirus-software2009.blogspot.com/feeds/3012550718544977624/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://antivirus-software2009.blogspot.com/2012/12/antivirus-on-windows-8.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/3012550718544977624'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/3012550718544977624'/><link rel='alternate' type='text/html' href='http://antivirus-software2009.blogspot.com/2012/12/antivirus-on-windows-8.html' title='Antivirus on Windows 8'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/02820373220680933314</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3655698400884223479.post-5323150295349668845</id><published>2012-09-28T06:12:00.000-07:00</published><updated>2012-09-28T07:09:49.477-07:00</updated><title type='text'>Norton 360 2013 - 1 User / 3 PC Special Discount</title><content type='html'>&lt;br /&gt;
&lt;h1 style=&quot;background-color: white; font-family: arial, verdana, sans-serif; font-size: 18pt; line-height: 21px; margin: 0px; padding: 0px;&quot;&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;i&gt;Norton 360 2013 - 1 User / 3 PC Special Discount&lt;/i&gt;&lt;/span&gt;&lt;/h1&gt;
&lt;a href=&quot;http://www.zimbio.com/go/i3BZjsyM3Zo/http://www.amazon.com/Norton-360-2013-User-PC/dp/B008TND0L6%3FSubscriptionId%3DAKIAINZUV4SWMPCJCHJA%26tag%3Dsasuknetwor08-20%26linkCode%3Dxm2%26camp%3D2025%26creative%3D165953%26creativeASIN%3DB008TND0L6&quot; style=&quot;background-color: white; color: #047da5; font-family: arial, verdana, sans-serif; font-size: 14px; font-weight: bold; line-height: 21px;&quot; title=&quot;Norton 360 2013 - 1 User / 3 PC&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://ecx.images-amazon.com/images/I/41MMRaPpMhL.jpg&quot; style=&quot;border: 0px; float: left; padding: 5px;&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background-color: white; font-family: arial, verdana, sans-serif; font-size: 14px; line-height: 21px; text-align: justify;&quot;&gt;you want to buy Norton 360 2013 - 1 User / 3 PC,yes ..! you comes at the right place. you can get special discount for Norton 360 2013 - 1 User / 3 PC in amazon.You can choose to buy a product and Norton 360 2013 - 1 User / 3 PC at the Best Price Online with Secure Transaction in amazon...&lt;/span&gt;&lt;span style=&quot;background-color: white; font-family: arial, verdana, sans-serif; font-size: 14px; line-height: 21px; text-align: justify;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: arial, verdana, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: white; font-family: arial, verdana, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: white; font-family: arial, verdana, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;&lt;u&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;Norton 360 2013 - 1 User / 3 PC by&lt;/span&gt;&lt;/b&gt;&lt;/u&gt; Symantec&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: white; font-family: arial, verdana, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white; font-family: arial, verdana, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: white; font-family: arial, verdana, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;List Price :&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: white; font-family: arial, verdana, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white; font-family: arial, verdana, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;&lt;/span&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: white; font-family: arial, verdana, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;&lt;b&gt;Price Save&lt;/b&gt; :&amp;nbsp;&lt;strong style=&quot;color: red; font-size: 17px;&quot;&gt;$54.99&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: white; font-family: arial, verdana, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white; font-family: arial, verdana, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;SalesRank :32&lt;/b&gt;&lt;/div&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white; font-family: arial, verdana, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
Warranty:&amp;nbsp;&lt;/div&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white; font-family: arial, verdana, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;LowestNewPrice: $54.99&amp;nbsp;&lt;/b&gt;&lt;/div&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white; font-family: arial, verdana, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
LowestUsedPrice:&lt;/div&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; font-family: arial, verdana, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white; font-family: arial, verdana, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white; font-family: arial, verdana, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white; font-family: arial, verdana, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white; font-family: arial, verdana, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white; font-family: arial, verdana, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white; font-family: arial, verdana, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white; font-family: arial, verdana, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white; font-family: arial, verdana, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;Norton 360 2013 - 1 User / 3 PC Description . Norton 360 combines proactive threat protection, automatic backup, and computer tune-up tools in a comprehensive solution that helps keep you safe from threats, guards your files against loss, and optimizes PC performance.&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.zimbio.com/go/i3BZjsyM3Zo/http://www.amazon.com/Norton-360-2013-User-PC/dp/B008TND0L6%3FSubscriptionId%3DAKIAINZUV4SWMPCJCHJA%26tag%3Dsasuknetwor08-20%26linkCode%3Dxm2%26camp%3D2025%26creative%3D165953%26creativeASIN%3DB008TND0L6&quot; style=&quot;background-color: white; color: #047da5; font-family: arial, verdana, sans-serif; font-size: 14px; font-weight: bold; line-height: 21px; text-decoration: none;&quot; title=&quot;Norton 360 2013 - 1 User / 3 PC&quot;&gt;Read more Norton 360 2013 - 1 User / 3 PC&lt;/a&gt;&lt;span style=&quot;background-color: white; font-family: arial, verdana, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; font-family: arial, verdana, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;h2 style=&quot;background-color: white; border: none; font-family: arial, verdana, sans-serif; font-size: 14pt; line-height: 21px; margin: 0px; padding-bottom: 1px !important; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
Norton 360 2013 - 1 User / 3 PC Feature&lt;/h2&gt;
&lt;ul style=&quot;background-color: white; font-family: arial, verdana, sans-serif; font-size: 14px; line-height: 21px; list-style-position: inside; margin: 0px 0px 10px; padding: 0px;&quot;&gt;
&lt;li style=&quot;margin: 0px; padding: 0px;&quot;&gt;Provides a single, comprehensive solution that protects you from threats, guards your files against loss, and optimizes your PC&#39;s performance.&lt;/li&gt;
&lt;li style=&quot;margin: 0px; padding: 0px;&quot;&gt;Lets you share, surf, shop, bank, and socialize online without downloading threats, getting ripped off, or having your passwords and identity stolen&lt;/li&gt;
&lt;li style=&quot;margin: 0px; padding: 0px;&quot;&gt;Automatically backs up your files-so you don&#39;t have to remember to do it-without getting in your way&lt;/li&gt;
&lt;li style=&quot;margin: 0px; padding: 0px;&quot;&gt;Cleans up and tunes up your PC to keep it running fast and trouble-free&lt;/li&gt;
&lt;li style=&quot;margin: 0px; padding: 0px;&quot;&gt;Protects without slowing you down or getting in your way&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;h2 style=&quot;background-color: white; color: #cc6600; font-family: verdana, arial, helvetica, sans-serif; margin: 0px 0px 0.25em;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;u&gt;Product Description&lt;/u&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;div class=&quot;content&quot; style=&quot;background-color: white; font-family: verdana, arial, helvetica, sans-serif; margin: 0.5em 0px 0em 25px;&quot;&gt;
&lt;h3 class=&quot;productDescriptionSource&quot; style=&quot;clear: left; color: #333333; font-size: 1.23em; font-weight: normal; margin: 0.75em 0px 0.375em -15px;&quot;&gt;
From the Manufacturer&lt;/h3&gt;
&lt;div class=&quot;productDescriptionWrapper&quot; style=&quot;margin: 0px 0px 1em;&quot;&gt;
&lt;div class=&quot;aplus&quot; style=&quot;min-width: 895px; width: 1308px;&quot;&gt;
&lt;div class=&quot;three-fourth-col&quot; style=&quot;float: left; margin-right: 21px; overflow: hidden; width: 964.5499877929688px;&quot;&gt;
&lt;h4 style=&quot;color: #cc6600; font-size: 1em; margin: 0px 0px 0.75em;&quot;&gt;
Norton 360 2013&lt;/h4&gt;
&lt;div class=&quot;leftImage&quot; style=&quot;clear: left; float: left; font-size: small; margin-bottom: 1em; margin-right: 15px; margin-top: 0px; text-align: center; vertical-align: top; width: 350px;&quot;&gt;
&lt;a href=&quot;http://www.gophoto.it/view.php?i=http://g-ecx.images-amazon.com/images/G/01/software/detail-page/mainUI.jpg&quot; style=&quot;clear: left; color: #003399; float: left; margin-bottom: 1em; margin-right: 1em;&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;Norton 360 2013&quot; height=&quot;200&quot; src=&quot;http://g-ecx.images-amazon.com/images/G/01/software/detail-page/mainUI_SM.jpg&quot; style=&quot;border: none;&quot; width=&quot;300&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div class=&quot;imageCaption&quot; style=&quot;clear: both; font-size: 0.846em; padding: 0.5em 0.5em 0px;&quot;&gt;
(&lt;a href=&quot;http://www.gophoto.it/view.php?i=http://g-ecx.images-amazon.com/images/G/01/software/detail-page/mainUI.jpg&quot; style=&quot;color: #003399;&quot; target=&quot;_blank&quot;&gt;view larger&lt;/a&gt;).&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;leftImage&quot; style=&quot;clear: left; float: left; font-size: small; margin-bottom: 1em; margin-right: 15px; margin-top: 0px; text-align: center; vertical-align: top; width: 350px;&quot;&gt;
&lt;a href=&quot;http://www.gophoto.it/view.php?i=http://g-ecx.images-amazon.com/images/G/01/software/detail-page/backup1.jpg&quot; style=&quot;clear: left; color: #003399; float: left; margin-bottom: 1em; margin-right: 1em;&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;Norton 360 2013&quot; height=&quot;215&quot; src=&quot;http://g-ecx.images-amazon.com/images/G/01/software/detail-page/backup1_SM.jpg&quot; style=&quot;border: none;&quot; width=&quot;300&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div class=&quot;imageCaption&quot; style=&quot;clear: both; font-size: 0.846em; padding: 0.5em 0.5em 0px;&quot;&gt;
(&lt;a href=&quot;http://www.gophoto.it/view.php?i=http://g-ecx.images-amazon.com/images/G/01/software/detail-page/backup1.jpg&quot; style=&quot;color: #003399;&quot; target=&quot;_blank&quot;&gt;view larger&lt;/a&gt;).&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;leftImage&quot; style=&quot;clear: left; float: left; font-size: small; margin-bottom: 1em; margin-right: 15px; margin-top: 0px; text-align: center; vertical-align: top; width: 350px;&quot;&gt;
&lt;a href=&quot;http://www.gophoto.it/view.php?i=http://g-ecx.images-amazon.com/images/G/01/software/detail-page/IDSafe1.jpg&quot; style=&quot;clear: left; color: #003399; float: left; margin-bottom: 1em; margin-right: 1em;&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;Norton 360 2013&quot; height=&quot;208&quot; src=&quot;http://g-ecx.images-amazon.com/images/G/01/software/detail-page/IDSafe1_SM.jpg&quot; style=&quot;border: none;&quot; width=&quot;300&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div class=&quot;imageCaption&quot; style=&quot;clear: both; font-size: 0.846em; padding: 0.5em 0.5em 0px;&quot;&gt;
(&lt;a href=&quot;http://www.gophoto.it/view.php?i=http://g-ecx.images-amazon.com/images/G/01/software/detail-page/IDSafe1.jpg&quot; style=&quot;color: #003399;&quot; target=&quot;_blank&quot;&gt;view larger&lt;/a&gt;).&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;leftImage&quot; style=&quot;clear: left; float: left; font-size: small; margin-bottom: 1em; margin-right: 15px; margin-top: 0px; text-align: center; vertical-align: top; width: 350px;&quot;&gt;
&lt;a href=&quot;http://www.gophoto.it/view.php?i=http://g-ecx.images-amazon.com/images/G/01/software/detail-page/tuneup1.jpg&quot; style=&quot;clear: left; color: #003399; float: left; margin-bottom: 1em; margin-right: 1em;&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;Norton 360 2013&quot; height=&quot;215&quot; src=&quot;http://g-ecx.images-amazon.com/images/G/01/software/detail-page/tuneup1_SM.jpg&quot; style=&quot;border: none;&quot; width=&quot;300&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div class=&quot;imageCaption&quot; style=&quot;clear: both; font-size: 0.846em; padding: 0.5em 0.5em 0px;&quot;&gt;
(&lt;a href=&quot;http://www.gophoto.it/view.php?i=http://g-ecx.images-amazon.com/images/G/01/software/detail-page/tuneup1.jpg&quot; style=&quot;color: #003399;&quot; target=&quot;_blank&quot;&gt;view larger&lt;/a&gt;).&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;font-size: small; margin-bottom: 1em; text-align: justify;&quot;&gt;
Norton 360 2013 brings together proactive threat protection, automatic backup, and computer tune-up tools in one comprehensive solution that helps keep you safe from threats, guards your files against loss, and helps your computer run its best.&lt;/div&gt;
&lt;h5 style=&quot;font-size: 1em; margin: 0px 0px 0.75em; text-align: justify;&quot;&gt;
Protects Against&lt;/h5&gt;
&lt;ul style=&quot;font-size: small; margin: 0px 0px 1em; padding: 0px;&quot;&gt;
&lt;li style=&quot;margin: 0px 0px 0px 20px; text-align: justify;&quot;&gt;All types of viruses and spyware&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0px 20px; text-align: justify;&quot;&gt;Online identity theft when you bank or shop&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0px 20px; text-align: justify;&quot;&gt;Bad files and websites when you browse and share&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0px 20px; text-align: justify;&quot;&gt;Phishing scams&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0px 20px; text-align: justify;&quot;&gt;Theft of your personal information&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0px 20px; text-align: justify;&quot;&gt;Hard-to-remove infections&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0px 20px; text-align: justify;&quot;&gt;Spyware&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0px 20px; text-align: justify;&quot;&gt;Spam&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0px 20px; text-align: justify;&quot;&gt;Social network threats when you socialize&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0px 20px; text-align: justify;&quot;&gt;Loss of files due to a hard drive crash or other mishap&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0px 20px; text-align: justify;&quot;&gt;Slow PC performance&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 style=&quot;color: #cc6600; font-size: 1em; margin: 0px 0px 0.75em; text-align: justify;&quot;&gt;
Key Features and Benefits&lt;/h4&gt;
&lt;div style=&quot;font-size: small; margin-bottom: 1em; text-align: justify;&quot;&gt;
&lt;b&gt;Provides a single, comprehensive solution that protects you from threats, guards your files against loss, and optimizes your PC’s performance.&lt;/b&gt;&lt;/div&gt;
&lt;ul style=&quot;font-size: small; margin: 0px 0px 1em; padding: 0px;&quot;&gt;
&lt;li style=&quot;margin: 0px 0px 0px 20px; text-align: justify;&quot;&gt;Seamlessly combines proactive threat protection with automatic backup and computer tune-up tools.&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;font-size: small; margin-bottom: 1em; text-align: justify;&quot;&gt;
&lt;b&gt;Lets you share, surf, shop, bank, and socialize online without downloading threats, getting ripped off, or having your passwords and identity stolen.&lt;/b&gt;&lt;/div&gt;
&lt;ul style=&quot;font-size: small; margin: 0px 0px 1em; padding: 0px;&quot;&gt;
&lt;li style=&quot;margin: 0px 0px 0px 20px; text-align: justify;&quot;&gt;Our five patented layers of protection quickly and accurately detect and eliminate almost any threat without false alarms.&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0px 20px; text-align: justify;&quot;&gt;Ultra-fast network defense layer stops threats before they can reach your PC.&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0px 20px; text-align: justify;&quot;&gt;Powerful threat-removal layer targets and gets rid of aggressive, hard-to-remove infections that less sophisticated products often miss.&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0px 20px; text-align: justify;&quot;&gt;Browser protection blocks “phishing” websites set up to trick you into revealing your passwords, credit card numbers, and other confidential information.&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0px 20px; text-align: justify;&quot;&gt;Scans your Facebook News Feed for dangerous downloads, suspicious links, and unsafe websites.&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0px 20px; text-align: justify;&quot;&gt;Advanced reputation and behavior antivirus technology protects you from all types of viruses, even those that haven’t been invented yet.&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;font-size: small; margin-bottom: 1em; text-align: justify;&quot;&gt;
&lt;b&gt;Automatically backs up your files, so you don’t have to remember to do it, without getting in your way.&lt;/b&gt;&lt;/div&gt;
&lt;ul style=&quot;font-size: small; margin: 0px 0px 1em; padding: 0px;&quot;&gt;
&lt;li style=&quot;margin: 0px 0px 0px 20px; text-align: justify;&quot;&gt;Backs up your photos, music, and other important files to your choice of disc, USB device, or online to one of our secure data centers.&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0px 20px; text-align: justify;&quot;&gt;Automatic sensors can tell when you aren’t using your PC, so you won’t be interrupted by backups.&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0px 20px; text-align: justify;&quot;&gt;Protects files you back up online with government-grade encryption.&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0px 20px; text-align: justify;&quot;&gt;Restores files with just a few clicks.&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0px 20px; text-align: justify;&quot;&gt;Lets you download files you back up online to any computer that has an Internet connection and even share them by simply emailing a link.&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;font-size: small; margin-bottom: 1em; text-align: justify;&quot;&gt;
&lt;b&gt;Cleans up and tunes up your PC to keep it running fast and trouble-free.&lt;/b&gt;&lt;/div&gt;
&lt;ul style=&quot;font-size: small; margin: 0px 0px 1em; padding: 0px;&quot;&gt;
&lt;li style=&quot;margin: 0px 0px 0px 20px; text-align: justify;&quot;&gt;Fixes common problems that can slow down your computer or cause it to crash or freeze.&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0px 20px; text-align: justify;&quot;&gt;Gets rid of unnecessary files and optimizes your hard drive.&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0px 20px; text-align: justify;&quot;&gt;Frees up system memory.&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;font-size: small; margin-bottom: 1em; text-align: justify;&quot;&gt;
&lt;b&gt;Protects without slowing you down or getting in your way.&lt;/b&gt;&lt;/div&gt;
&lt;ul style=&quot;font-size: small; margin: 0px 0px 1em; padding: 0px;&quot;&gt;
&lt;li style=&quot;margin: 0px 0px 0px 20px; text-align: justify;&quot;&gt;Superior performance means fast browsing and file scanning.&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0px 20px; text-align: justify;&quot;&gt;Scans and runs updates only when you’re not using your computer.&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0px 20px; text-align: justify;&quot;&gt;Works quietly in the background to block threats and won’t constantly annoy you with pop-up alerts asking you to take action.&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;font-size: small; margin-bottom: 1em; text-align: justify;&quot;&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 1em; text-align: justify;&quot;&gt;
&lt;b&gt;Cloud-based Norton Management puts you in complete control and simplifies protecting your various devices.&lt;/b&gt;&lt;/div&gt;
&lt;ul style=&quot;margin: 0px 0px 1em; padding: 0px;&quot;&gt;
&lt;li style=&quot;margin: 0px 0px 0px 20px; text-align: justify;&quot;&gt;Lets you fix, update, renew, or install Norton products on additional PCs, without having to find your install CD or product key.&lt;/li&gt;
&lt;li style=&quot;font-size: small; margin: 0px 0px 0px 20px; text-align: justify;&quot;&gt;Brings together your other Norton protection products for your Mac computer, smartphone, and tablet, in one convenient location.&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;font-size: small; margin-bottom: 1em; text-align: justify;&quot;&gt;
&lt;small&gt;Symantec provides free 24x7 chat and phone support for a period of one year. Continuing support is available with an active service period subscription.&lt;/small&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;fourth-col last&quot; style=&quot;float: left; margin-right: 0px; overflow: hidden; width: 306.8999938964844px;&quot;&gt;
&lt;h4 style=&quot;margin: 0px 0px 0.75em; text-align: justify;&quot;&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;u&gt;System Requirements&lt;/u&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;h5 style=&quot;font-size: 1em; margin: 0px 0px 0.75em; text-align: justify;&quot;&gt;
&lt;u&gt;Operating Systems Supported&lt;/u&gt;&lt;/h5&gt;
&lt;ul style=&quot;font-size: small; margin: 0px 0px 1em; padding: 0px;&quot;&gt;
&lt;li style=&quot;margin: 0px 0px 0px 20px; text-align: justify;&quot;&gt;Microsoft Windows XP (32-bit) Home/Professional/Tablet PC/Media Center (32-bit) with Service Pack 2 or later&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0px 20px; text-align: justify;&quot;&gt;Microsoft Windows Vista (32-bit and 64-bit) Starter/Home Basic/Home Premium/Business/Ultimate with Service Pack 1 or later&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0px 20px; text-align: justify;&quot;&gt;Microsoft Windows 7 (32-bit and 64-bit) Starter/Home Basic/Home Premium/Professional/Ultimate&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0px 20px; text-align: justify;&quot;&gt;Microsoft Windows 8 and Windows 8 Pro (32-bit and 64-bit)&lt;sup&gt;1&lt;/sup&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h5 style=&quot;font-size: 1em; margin: 0px 0px 0.75em; text-align: justify;&quot;&gt;
Minimum Hardware Requirements&lt;/h5&gt;
&lt;ul style=&quot;font-size: small; margin: 0px 0px 1em; padding: 0px;&quot;&gt;
&lt;li style=&quot;margin: 0px 0px 0px 20px; text-align: justify;&quot;&gt;300 MHz for Microsoft Windows XP, 1 GHz for Microsoft Windows Vista/Windows 7/Windows 8&lt;sup&gt;1&lt;/sup&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0px 20px; text-align: justify;&quot;&gt;256 MB of RAM&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0px 20px; text-align: justify;&quot;&gt;300 MB of available hard disk space&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0px 20px; text-align: justify;&quot;&gt;CD-ROM or DVD drive (if not installing via electronic download)&lt;/li&gt;
&lt;/ul&gt;
&lt;h5 style=&quot;font-size: 1em; margin: 0px 0px 0.75em; text-align: justify;&quot;&gt;
Email scanning supported for POP3-compatible email clients&lt;/h5&gt;
&lt;h5 style=&quot;font-size: 1em; margin: 0px 0px 0.75em; text-align: justify;&quot;&gt;
Browser Support for Phishing Protection, Safe Search, and Password Management&lt;/h5&gt;
&lt;ul style=&quot;font-size: small; margin: 0px 0px 1em; padding: 0px;&quot;&gt;
&lt;li style=&quot;margin: 0px 0px 0px 20px; text-align: justify;&quot;&gt;Microsoft Internet Explorer 7.0 or higher (32-bit only)&lt;sup&gt;1&lt;/sup&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0px 20px; text-align: justify;&quot;&gt;Mozilla Firefox (32-bit only)&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0px 20px; text-align: justify;&quot;&gt;Google Chrome&lt;/li&gt;
&lt;/ul&gt;
&lt;h5 style=&quot;font-size: 1em; margin: 0px 0px 0.75em; text-align: justify;&quot;&gt;
Browser Support for Vulnerability Protection&lt;/h5&gt;
&lt;ul style=&quot;font-size: small; margin: 0px 0px 1em; padding: 0px;&quot;&gt;
&lt;li style=&quot;margin: 0px 0px 0px 20px; text-align: justify;&quot;&gt;Microsoft Internet Explorer 7.0 or higher (32-bit only)&lt;sup&gt;1&lt;/sup&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0px 20px; text-align: justify;&quot;&gt;Mozilla Firefox (32-bit only)&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;font-size: small; margin-bottom: 1em; text-align: justify;&quot;&gt;
&lt;small&gt;1. Some protection features not available in Metro browsing.&lt;/small&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;emptyClear&quot; style=&quot;clear: left; font-size: 0px; height: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;h3 class=&quot;productDescriptionSource&quot; style=&quot;clear: left; font-size: 1.23em; margin: 0.75em 0px 0.375em -15px; text-align: justify;&quot;&gt;
&lt;u&gt;&lt;span style=&quot;color: blue;&quot;&gt;Product Description&lt;/span&gt;&lt;/u&gt;&lt;/h3&gt;
&lt;div class=&quot;productDescriptionWrapper&quot; style=&quot;font-size: small; margin: 0px 0px 1em; text-align: justify;&quot;&gt;
Norton 360 combines proactive threat protection, automatic backup, and computer tune-up tools in a comprehensive solution that helps keep you safe from threats, guards your files against loss, and optimizes PC performance.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: white; font-family: arial, verdana, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://antivirus-software2009.blogspot.com/feeds/5323150295349668845/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://antivirus-software2009.blogspot.com/2012/09/norton-360-2013-1-user-3-pc-special.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/5323150295349668845'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/5323150295349668845'/><link rel='alternate' type='text/html' href='http://antivirus-software2009.blogspot.com/2012/09/norton-360-2013-1-user-3-pc-special.html' title='Norton 360 2013 - 1 User / 3 PC Special Discount'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/02820373220680933314</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3655698400884223479.post-6012595119883390023</id><published>2012-09-07T04:21:00.003-07:00</published><updated>2012-09-07T04:21:52.766-07:00</updated><title type='text'>How to Uninstall Avast! Free Antivirus 7</title><content type='html'>&lt;br /&gt;
&lt;div class=&quot;article_inner editable&quot; style=&quot;background-color: #f9f7f1; color: #414141; font-family: Arial, Helvetica, sans-serif; font-size: 14px; margin: 0px; padding: 0px 27px 20px 23px;&quot;&gt;
&lt;div style=&quot;line-height: 1.2em; padding: 0px 0px 1em;&quot;&gt;
&lt;/div&gt;
&lt;h1 class=&quot;firstHeading&quot; style=&quot;color: #4a3c31; font-size: 2.25em; font-weight: normal; line-height: normal; margin: 0px; padding: 8px 0px 4px;&quot;&gt;
&lt;a href=&quot;http://www.wikihow.com/Uninstall-Avast%21-Free-Antivirus-7&quot; style=&quot;background-image: none; background-position: initial initial; background-repeat: initial initial; color: #4a3c31; margin: 0px; padding: 0px; text-decoration: none;&quot;&gt;How to Uninstall Avast! Free Antivirus 7&lt;/a&gt;&lt;/h1&gt;
&lt;br /&gt;
&lt;div style=&quot;line-height: 1.2em; padding: 0px 0px 1em;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.2em; padding: 0px 0px 1em;&quot;&gt;
To completely Uninstall avast! Free Antivirus 7 from your computer, you need to remove the avast! Internet Security (Size, 375.00MB), the Google Chrome (Size, 166.00MB) and the Microsoft Visual C++ 2008 Redistributable – x86 9.0. 30729 .4148 (Size, 10.19MB), which are listed in Add or Remove Programs or Change or uninstall a program (for Windows 7/Vista Operating System). Read more details below.&lt;/div&gt;
&lt;div class=&quot;ad_image low&quot; style=&quot;margin: -13px 0px 0px; padding: 0px;&quot;&gt;
&lt;div class=&quot;wh_ad&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;a href=&quot;&quot; name=&quot;Steps&quot; style=&quot;color: #336633; margin: 0px; padding: 0px;&quot;&gt;&lt;/a&gt;&lt;div style=&quot;line-height: 1.2em; padding: 0px 0px 1em;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;h2 style=&quot;background-color: #f9f7f1; background-image: url(http://pad2.whstatic.com/skins/WikiHow/images/module_caps.png); background-position: 0px -92px; background-repeat: no-repeat no-repeat; clear: both; color: #4a3c31; font-family: Arial, Helvetica, sans-serif; font-size: 1.45em; height: 53px; line-height: 42px; margin: 0px 0px 10px -20px; padding: 0px 0px 0px 40px; position: relative; width: 647px;&quot;&gt;
&lt;a class=&quot;button button52 editsection&quot; href=&quot;http://www.wikihow.com/index.php?title=Uninstall-Avast%21-Free-Antivirus-7&amp;amp;action=edit&amp;amp;section=1&quot; id=&quot;gatEditSection&quot; style=&quot;background-image: url(http://pad1.whstatic.com/skins/WikiHow/images/button_blue.png); background-position: -140px 0%; background-repeat: no-repeat no-repeat; color: white; display: block; float: right; font-size: 0.65em; height: 26px; letter-spacing: 0.01em; line-height: 25px; margin: 8px 13px 0px 0px; overflow: hidden; padding: 0px; text-align: center; text-decoration: none; width: 52px;&quot; title=&quot;Edit section: Steps&quot;&gt;Edit&lt;/a&gt;&lt;span style=&quot;margin: 0px; padding: 0px;&quot;&gt;Steps&lt;/span&gt;&lt;/h2&gt;
&lt;div class=&quot;editable&quot; id=&quot;steps&quot; style=&quot;background-color: #f9f7f1; color: #414141; font-family: Arial, Helvetica, sans-serif; font-size: 14px; margin: 0px; padding: 0px;&quot;&gt;
&lt;ol class=&quot;steps_list_2&quot; style=&quot;list-style: none; margin: 0px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border-bottom-color: rgb(191, 191, 191); border-bottom-style: dashed; border-bottom-width: 1px; clear: both; margin: 0px; padding: 20px 20px 20px 80px;&quot;&gt;&lt;div class=&quot;step_num&quot; style=&quot;background-image: url(http://pad1.whstatic.com/skins/WikiHow/images/header.png); background-position: -220px -80px; background-repeat: no-repeat no-repeat; clear: right; color: white; float: left; font-size: 1.45em; height: 31px; line-height: 31px; margin: 0px 19px 0px -50px; padding: 0px; text-align: center; width: 31px;&quot;&gt;
1&lt;/div&gt;
&lt;b class=&quot;whb&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;Launch the Change/Remove option for avast&lt;/b&gt;! Internet Security item.&lt;div class=&quot;mwimg&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;
&lt;div class=&quot;floatcenter&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;
&lt;div class=&quot;rounders&quot; style=&quot;height: 233px; margin: 0px 0px 0.8em; padding: 0px; position: relative; width: 500px;&quot;&gt;
&lt;span style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;a class=&quot;image&quot; href=&quot;http://www.wikihow.com/Image:Uninstall-avast-Internet-Security-7-Trial-42.jpg&quot; style=&quot;color: #336633; margin: 0px; padding: 0px; text-decoration: none;&quot; title=&quot;Uninstall avast Internet Security 7 Trial 42.jpg&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; class=&quot;mwimage101&quot; height=&quot;233&quot; src=&quot;http://pad2.whstatic.com/images/thumb/a/ad/Uninstall-avast-Internet-Security-7-Trial-42.jpg/500px-Uninstall-avast-Internet-Security-7-Trial-42.jpg&quot; style=&quot;border: 0px; margin: 0px; padding: 0px;&quot; width=&quot;500&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;div class=&quot;corner top_left&quot; style=&quot;background-image: url(data:image/png; background-position: -10px -10px; height: 10px; left: 0px; margin: 0px; padding: 0px; position: absolute; top: 0px; width: 10px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;corner top_right&quot; style=&quot;background-image: url(data:image/png; background-position: -20px -10px; height: 10px; margin: 0px; padding: 0px; position: absolute; right: 0px; top: 0px; width: 10px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;corner bottom_left&quot; style=&quot;background-image: url(data:image/png; background-position: -10px -20px; bottom: 0px; height: 10px; left: 0px; margin: 0px; padding: 0px; position: absolute; width: 10px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;corner bottom_right&quot; style=&quot;background-image: url(data:image/png; background-position: -20px -20px; bottom: 0px; height: 10px; margin: 0px; padding: 0px; position: absolute; right: 0px; width: 10px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;wh_ad&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;
&lt;div class=&quot;wh_ad_inner&quot; id=&quot;wikihowad_0&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;
&lt;div class=&quot;adunit adunitp0&quot; style=&quot;margin: 10px 0px 0px; padding: 0px;&quot;&gt;
&lt;div id=&quot;adunit1&quot; style=&quot;margin: 0px; padding: 3px 0px 0px;&quot;&gt;
&lt;div style=&quot;font-size: 1em; line-height: 1.2em; margin-bottom: 5px; padding: 0px;&quot;&gt;
&lt;a href=&quot;http://www.google.com/url?ct=abg&amp;amp;q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dhttp://www.wikihow.com/Uninstall-Avast!-Free-Antivirus-7%26gl%3DAE%26hl%3Den%26client%3Dca-pub-9543332082073187%26ai0%3DCDmnP59VJUJ_8PMHKige2voHIDov12ckC47T_qyrzw8LaZRABIJi_jwUoC1CnqMP3-_____8BYJEGoAHm777_A8gBAagDAaoEjgFP0Guk8HIe0TrtQPhvqBO2mhyp5Rdu3GgB2LASzqDnfDvqaLYUhW6ba7ApPOjxMaAu1M7H9Gjc-jK7TLzVUHQlLZS8Iu7QnLsc8oCHJ9nvpfywjwSjYXxj5wNQxD8q_dycRomMtEqvaXUJyTLA3y4GhUJADwS5LwYGal0H_LKwgUk64C3t_OIL0WMix746iAYB%26ai1%3DCYllg59VJUJ_8PMHKige2voHIDpTjleoCzOKq5jrAjbcBEAIgmL-PBSgLUICtlssHYJEGoAHild_-A8gBAagDAaoEiAFP0EuihXId0TrtQPhvqBO2mhyp5Rdu3GgB2LASzqDnfDvqaLYUhW6ba7ApPOjxMaAu1M7H9Gjc-jK7TLzVUHQlLZS8Iu7QnLsc8oCHJ9nvpfywjwSjYXxj5wNQxD8q_dycRon0t0rnafoSHTfg3i7lm1otC1e45_CAbbUEGLKwgUl6NDjoAE4qiAYB%26ai2%3DCQxH659VJUJ_8PMHKige2voHIDq-e-ocEz9mjpmX_9sHuQxADIJi_jwUoC1CXusTm_P____8BYJEGoAHR5-fRA8gBAakCIiKRy_oztT6oAwGqBIkBT9Br8LVyHNE67UD4b6gTtpocqeUXbtxoAdiwEs6g53w76mi2FIVum2uwKTzo8TGgLtTOx_Ro3Poyu0y81VB0JS2UvCLu0Jy7HPKAhyfZ76X8sI8Eo2F8Y-cDUMQ_Kv3cnEaJ9LdK52nDPRsl4N4u5ZtaLQtXuOfwgG21BBiysIFJejQ46Esdpe-IBgE%26ai3%3DCIx6F59VJUJ_8PMHKige2voHIDpb1icwCvrOT0y7AjbcBEAQgmL-PBSgLUKb2zfn-_____wFgkQagAc6z2vwDyAEBqAMBqgSDAU_QO5u0chvROu1A-G-oE7aaHKnlF27caAHYsBLOoOd8O-pothSFbptrsCk86PExoC7Uzsf0aNz6MrtMvNVQdCUtlLwi7tCcuxzygIcn2e-l_LCPBKNhfGPnA1DEPyr93JxGifS3Ssdoz8sjOI3afeRTrKsMv7sD8IBttUTMp7UXlsogiAYB%26ai4%3DCjx_Z59VJUJ_8PMHKige2voHIDqz-qrIDzN6q_BPAjbcBEAUgmL-PBSgLUPPYnbD4_____wFgkQbIAQGpAjQ1g2U2RZI-qAMBqgSDAU_QG8XechrROu1A-G-oE7aaHKnlF27caAHYsBLOoOd8O-pothSFbptrsCk86PExoC7Uzsf0aNz6MrtMvNVQdCUtlLwi7tCcuxzygIcn2e-l_LCPBKNhfGPnA1DEPyr93JxGifS3Ssdoz8sjOI3afeRTrKsMv7sD8IBttUTMp7VtxYIw%26ai5%3DCQrNj59VJUJ_8PMHKige2voHIDtW_m7oC5Z6F5jfAjbcBEAYgmL-PBSgLUKyfpJwHYJEGoAHx_8HtA8gBAagDAaoEgwFP0BuZuXIZ0TrtQPhvqBO2mhyp5Rdu3GgB2LASzqDnfDvqaLYUhW6ba7ApPOjxMaAu1M7H9Gjc-jK7TLzVUHQlLZS8Iu7QnLsc8oCHJ9nvpfywjwSjYXxj5wNQxD8q_dycRon0t0rHaM_LIziN2n3kU6yrDL-7A_CAbbVEzKe1brbfNYgGAQ&amp;amp;usg=AFQjCNF9JZmwIdv1cudazIjyjp4fXpZU-g&quot; style=&quot;color: #404040; margin: 0px; padding: 0px; text-decoration: none;&quot;&gt;Ads by Google&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;ad1&quot; style=&quot;margin: 0px 0px 12px; padding: 0px;&quot;&gt;
&lt;h4 style=&quot;background-image: none; color: #514239; display: inline; font-size: 1em; height: auto; margin: 0px; padding: 0px;&quot;&gt;
&lt;a href=&quot;http://www.googleadservices.com/pagead/aclk?sa=L&amp;amp;ai=CDmnP59VJUJ_8PMHKige2voHIDov12ckC47T_qyrzw8LaZRABIJi_jwUoC1CnqMP3-_____8BYJEGoAHm777_A8gBAagDAaoEjgFP0Guk8HIe0TrtQPhvqBO2mhyp5Rdu3GgB2LASzqDnfDvqaLYUhW6ba7ApPOjxMaAu1M7H9Gjc-jK7TLzVUHQlLZS8Iu7QnLsc8oCHJ9nvpfywjwSjYXxj5wNQxD8q_dycRomMtEqvaXUJyTLA3y4GhUJADwS5LwYGal0H_LKwgUk64C3t_OIL0WMix746iAYB&amp;amp;num=1&amp;amp;cid=5GizOg88lJJIZqBYQMz3807o&amp;amp;sig=AOD64_1C3OMHRATkEbxXLgmG6A96xou22Q&amp;amp;client=ca-pub-9543332082073187&amp;amp;adurl=http://www.techsmith.com/snagit-gslp.html&quot; style=&quot;color: #336633; font-size: 1.06em; margin: 0px; padding: 0px;&quot; target=&quot;_blank&quot;&gt;Free 30 Day Snagit Trial&lt;/a&gt;&lt;/h4&gt;
&amp;nbsp;Capture, Add Effects &amp;amp; Share From Your Desktop. Full Version.&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;a href=&quot;http://www.googleadservices.com/pagead/aclk?sa=L&amp;amp;ai=CDmnP59VJUJ_8PMHKige2voHIDov12ckC47T_qyrzw8LaZRABIJi_jwUoC1CnqMP3-_____8BYJEGoAHm777_A8gBAagDAaoEjgFP0Guk8HIe0TrtQPhvqBO2mhyp5Rdu3GgB2LASzqDnfDvqaLYUhW6ba7ApPOjxMaAu1M7H9Gjc-jK7TLzVUHQlLZS8Iu7QnLsc8oCHJ9nvpfywjwSjYXxj5wNQxD8q_dycRomMtEqvaXUJyTLA3y4GhUJADwS5LwYGal0H_LKwgUk64C3t_OIL0WMix746iAYB&amp;amp;num=1&amp;amp;cid=5GizOg88lJJIZqBYQMz3807o&amp;amp;sig=AOD64_1C3OMHRATkEbxXLgmG6A96xou22Q&amp;amp;client=ca-pub-9543332082073187&amp;amp;adurl=http://www.techsmith.com/snagit-gslp.html&quot; style=&quot;color: #336633; margin: 0px; padding: 0px; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;TechSmith.com/Snagit&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;clearall&quot; style=&quot;clear: both; height: 0px; line-height: 0; margin: 0px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;border-bottom-color: rgb(191, 191, 191); border-bottom-style: dashed; border-bottom-width: 1px; clear: both; margin: 0px; padding: 20px 20px 20px 80px;&quot;&gt;&lt;div class=&quot;step_num&quot; style=&quot;background-image: url(http://pad1.whstatic.com/skins/WikiHow/images/header.png); background-position: -220px -80px; background-repeat: no-repeat no-repeat; clear: right; color: white; float: left; font-size: 1.45em; height: 31px; line-height: 31px; margin: 0px 19px 0px -50px; padding: 0px; text-align: center; width: 31px;&quot;&gt;
2&lt;/div&gt;
&lt;b class=&quot;whb&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;Enter the Uninstall section on avast&lt;/b&gt;! INTERNET SECURITY Setup.&lt;div class=&quot;mwimg&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;
&lt;div class=&quot;floatcenter&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;
&lt;div class=&quot;rounders&quot; style=&quot;height: 358px; margin: 0px 0px 0.8em; padding: 0px; position: relative; width: 500px;&quot;&gt;
&lt;span style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;a class=&quot;image&quot; href=&quot;http://www.wikihow.com/Image:Uninstall-avast-Internet-Security-7-Trial-48.jpg&quot; style=&quot;color: #336633; margin: 0px; padding: 0px; text-decoration: none;&quot; title=&quot;Uninstall avast Internet Security 7 Trial 48.jpg&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; class=&quot;mwimage101&quot; height=&quot;358&quot; src=&quot;http://pad1.whstatic.com/images/thumb/2/29/Uninstall-avast-Internet-Security-7-Trial-48.jpg/500px-Uninstall-avast-Internet-Security-7-Trial-48.jpg&quot; style=&quot;border: 0px; margin: 0px; padding: 0px;&quot; width=&quot;500&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;div class=&quot;corner top_left&quot; style=&quot;background-image: url(data:image/png; background-position: -10px -10px; height: 10px; left: 0px; margin: 0px; padding: 0px; position: absolute; top: 0px; width: 10px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;corner top_right&quot; style=&quot;background-image: url(data:image/png; background-position: -20px -10px; height: 10px; margin: 0px; padding: 0px; position: absolute; right: 0px; top: 0px; width: 10px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;corner bottom_left&quot; style=&quot;background-image: url(data:image/png; background-position: -10px -20px; bottom: 0px; height: 10px; left: 0px; margin: 0px; padding: 0px; position: absolute; width: 10px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;corner bottom_right&quot; style=&quot;background-image: url(data:image/png; background-position: -20px -20px; bottom: 0px; height: 10px; margin: 0px; padding: 0px; position: absolute; right: 0px; width: 10px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;clearall&quot; style=&quot;clear: both; height: 0px; line-height: 0; margin: 0px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;border-bottom-color: rgb(191, 191, 191); border-bottom-style: dashed; border-bottom-width: 1px; clear: both; margin: 0px; padding: 20px 20px 20px 80px;&quot;&gt;&lt;div class=&quot;step_num&quot; style=&quot;background-image: url(http://pad1.whstatic.com/skins/WikiHow/images/header.png); background-position: -220px -80px; background-repeat: no-repeat no-repeat; clear: right; color: white; float: left; font-size: 1.45em; height: 31px; line-height: 31px; margin: 0px 19px 0px -50px; padding: 0px; text-align: center; width: 31px;&quot;&gt;
3&lt;/div&gt;
&lt;b class=&quot;whb&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;Click on Yes button on avast&lt;/b&gt;! Uninstall info box.&lt;div class=&quot;mwimg&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;
&lt;div class=&quot;floatcenter&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;
&lt;div class=&quot;rounders&quot; style=&quot;height: 355px; margin: 0px 0px 0.8em; padding: 0px; position: relative; width: 500px;&quot;&gt;
&lt;span style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;a class=&quot;image&quot; href=&quot;http://www.wikihow.com/Image:Uninstall-avast-Internet-Security-7-Trial-49.jpg&quot; style=&quot;color: #336633; margin: 0px; padding: 0px; text-decoration: none;&quot; title=&quot;Uninstall avast Internet Security 7 Trial 49.jpg&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; class=&quot;mwimage101&quot; height=&quot;355&quot; src=&quot;http://pad1.whstatic.com/images/thumb/4/4d/Uninstall-avast-Internet-Security-7-Trial-49.jpg/500px-Uninstall-avast-Internet-Security-7-Trial-49.jpg&quot; style=&quot;border: 0px; margin: 0px; padding: 0px;&quot; width=&quot;500&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;div class=&quot;corner top_left&quot; style=&quot;background-image: url(data:image/png; background-position: -10px -10px; height: 10px; left: 0px; margin: 0px; padding: 0px; position: absolute; top: 0px; width: 10px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;corner top_right&quot; style=&quot;background-image: url(data:image/png; background-position: -20px -10px; height: 10px; margin: 0px; padding: 0px; position: absolute; right: 0px; top: 0px; width: 10px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;corner bottom_left&quot; style=&quot;background-image: url(data:image/png; background-position: -10px -20px; bottom: 0px; height: 10px; left: 0px; margin: 0px; padding: 0px; position: absolute; width: 10px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;corner bottom_right&quot; style=&quot;background-image: url(data:image/png; background-position: -20px -20px; bottom: 0px; height: 10px; margin: 0px; padding: 0px; position: absolute; right: 0px; width: 10px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;clearall&quot; style=&quot;clear: both; height: 0px; line-height: 0; margin: 0px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;border-bottom-color: rgb(191, 191, 191); border-bottom-style: dashed; border-bottom-width: 1px; clear: both; margin: 0px; padding: 20px 20px 20px 80px;&quot;&gt;&lt;div class=&quot;step_num&quot; style=&quot;background-image: url(http://pad1.whstatic.com/skins/WikiHow/images/header.png); background-position: -220px -80px; background-repeat: no-repeat no-repeat; clear: right; color: white; float: left; font-size: 1.45em; height: 31px; line-height: 31px; margin: 0px 19px 0px -50px; padding: 0px; text-align: center; width: 31px;&quot;&gt;
4&lt;/div&gt;
&lt;b class=&quot;whb&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;You could send your feedback to avast&lt;/b&gt;!.&lt;div class=&quot;mwimg&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;
&lt;div class=&quot;floatcenter&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;
&lt;div class=&quot;rounders&quot; style=&quot;height: 376px; margin: 0px 0px 0.8em; padding: 0px; position: relative; width: 500px;&quot;&gt;
&lt;span style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;a class=&quot;image&quot; href=&quot;http://www.wikihow.com/Image:Uninstall-avast-Internet-Security-7-Trial-50.jpg&quot; style=&quot;color: #336633; margin: 0px; padding: 0px; text-decoration: none;&quot; title=&quot;Uninstall avast Internet Security 7 Trial 50.jpg&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; class=&quot;mwimage101&quot; height=&quot;376&quot; src=&quot;http://pad3.whstatic.com/images/thumb/e/e8/Uninstall-avast-Internet-Security-7-Trial-50.jpg/500px-Uninstall-avast-Internet-Security-7-Trial-50.jpg&quot; style=&quot;border: 0px; margin: 0px; padding: 0px;&quot; width=&quot;500&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;div class=&quot;corner top_left&quot; style=&quot;background-image: url(data:image/png; background-position: -10px -10px; height: 10px; left: 0px; margin: 0px; padding: 0px; position: absolute; top: 0px; width: 10px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;corner top_right&quot; style=&quot;background-image: url(data:image/png; background-position: -20px -10px; height: 10px; margin: 0px; padding: 0px; position: absolute; right: 0px; top: 0px; width: 10px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;corner bottom_left&quot; style=&quot;background-image: url(data:image/png; background-position: -10px -20px; bottom: 0px; height: 10px; left: 0px; margin: 0px; padding: 0px; position: absolute; width: 10px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;corner bottom_right&quot; style=&quot;background-image: url(data:image/png; background-position: -20px -20px; bottom: 0px; height: 10px; margin: 0px; padding: 0px; position: absolute; right: 0px; width: 10px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;mwimg&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;
&lt;div class=&quot;floatcenter&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;
&lt;div class=&quot;rounders&quot; style=&quot;height: 359px; margin: 0px 0px 0.8em; padding: 0px; position: relative; width: 500px;&quot;&gt;
&lt;span style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;a class=&quot;image&quot; href=&quot;http://www.wikihow.com/Image:Uninstall-avast-Internet-Security-7-Trial-51.jpg&quot; style=&quot;color: #336633; margin: 0px; padding: 0px; text-decoration: none;&quot; title=&quot;Uninstall avast Internet Security 7 Trial 51.jpg&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; class=&quot;mwimage101&quot; height=&quot;359&quot; src=&quot;http://pad2.whstatic.com/images/thumb/2/20/Uninstall-avast-Internet-Security-7-Trial-51.jpg/500px-Uninstall-avast-Internet-Security-7-Trial-51.jpg&quot; style=&quot;border: 0px; margin: 0px; padding: 0px;&quot; width=&quot;500&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;div class=&quot;corner top_left&quot; style=&quot;background-image: url(data:image/png; background-position: -10px -10px; height: 10px; left: 0px; margin: 0px; padding: 0px; position: absolute; top: 0px; width: 10px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;corner top_right&quot; style=&quot;background-image: url(data:image/png; background-position: -20px -10px; height: 10px; margin: 0px; padding: 0px; position: absolute; right: 0px; top: 0px; width: 10px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;corner bottom_left&quot; style=&quot;background-image: url(data:image/png; background-position: -10px -20px; bottom: 0px; height: 10px; left: 0px; margin: 0px; padding: 0px; position: absolute; width: 10px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;corner bottom_right&quot; style=&quot;background-image: url(data:image/png; background-position: -20px -20px; bottom: 0px; height: 10px; margin: 0px; padding: 0px; position: absolute; right: 0px; width: 10px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;clearall&quot; style=&quot;clear: both; height: 0px; line-height: 0; margin: 0px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;border-bottom-color: rgb(191, 191, 191); border-bottom-style: dashed; border-bottom-width: 1px; clear: both; margin: 0px; padding: 20px 20px 20px 80px;&quot;&gt;&lt;div class=&quot;step_num&quot; style=&quot;background-image: url(http://pad1.whstatic.com/skins/WikiHow/images/header.png); background-position: -220px -80px; background-repeat: no-repeat no-repeat; clear: right; color: white; float: left; font-size: 1.45em; height: 31px; line-height: 31px; margin: 0px 19px 0px -50px; padding: 0px; text-align: center; width: 31px;&quot;&gt;
5&lt;/div&gt;
&lt;b class=&quot;whb&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;Save your personal data, restart your computer&lt;/b&gt;.&lt;div class=&quot;mwimg&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;
&lt;div class=&quot;floatcenter&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;
&lt;div class=&quot;rounders&quot; style=&quot;height: 374px; margin: 0px 0px 0.8em; padding: 0px; position: relative; width: 500px;&quot;&gt;
&lt;span style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;a class=&quot;image&quot; href=&quot;http://www.wikihow.com/Image:Uninstall-avast-Internet-Security-7-Trial-52.jpg&quot; style=&quot;color: #336633; margin: 0px; padding: 0px;&quot; title=&quot;Uninstall avast Internet Security 7 Trial 52.jpg&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; class=&quot;mwimage101&quot; height=&quot;374&quot; src=&quot;http://pad1.whstatic.com/images/thumb/5/5d/Uninstall-avast-Internet-Security-7-Trial-52.jpg/500px-Uninstall-avast-Internet-Security-7-Trial-52.jpg&quot; style=&quot;border: 0px; margin: 0px; padding: 0px;&quot; width=&quot;500&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://antivirus-software2009.blogspot.com/feeds/6012595119883390023/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://antivirus-software2009.blogspot.com/2012/09/how-to-uninstall-avast-free-antivirus-7.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/6012595119883390023'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/6012595119883390023'/><link rel='alternate' type='text/html' href='http://antivirus-software2009.blogspot.com/2012/09/how-to-uninstall-avast-free-antivirus-7.html' title='How to Uninstall Avast! Free Antivirus 7'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/02820373220680933314</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3655698400884223479.post-180168125624282554</id><published>2012-08-31T05:31:00.000-07:00</published><updated>2012-08-31T05:31:04.183-07:00</updated><title type='text'>Remove Windows Secure Workstation </title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Courier New, Courier, monospace; font-size: large;&quot;&gt;&lt;b style=&quot;color: #632035;&quot;&gt;Windows Secure Workstation&lt;/b&gt;&lt;span style=&quot;background-color: white; color: #632035;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwsaqowxSrwAjrZIqVCi9Q-kXd-S-Zm7irCrTb9YSnFZgLpJZKjJHmQc_8XgRlLLwNe_pYpdKfgqHflWEqamaaXLEq7Lyx8k1pq-GtlhLXa974gxFm-gwJDw0rqe3L0Gum5LWtUKVwX6Y/s1600/picture.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;266&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwsaqowxSrwAjrZIqVCi9Q-kXd-S-Zm7irCrTb9YSnFZgLpJZKjJHmQc_8XgRlLLwNe_pYpdKfgqHflWEqamaaXLEq7Lyx8k1pq-GtlhLXa974gxFm-gwJDw0rqe3L0Gum5LWtUKVwX6Y/s320/picture.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;span style=&quot;background-color: white; font-family: Helvetica, Arial, Verdana, &#39;Trebuchet MS&#39;, sans-serif; font-size: medium;&quot;&gt;is a&lt;/span&gt;&lt;span style=&quot;background-color: white; font-family: Helvetica, Arial, Verdana, &#39;Trebuchet MS&#39;, sans-serif; font-size: medium;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://freeofvirus.blogspot.com/2009/05/remove-fake-antivirus-10.html#fa&quot; style=&quot;font-family: Helvetica, Arial, Verdana, &#39;Trebuchet MS&#39;, sans-serif; font-size: large; font-weight: bold;&quot; target=&quot;_blank&quot;&gt;fake antivirus&lt;/a&gt;&lt;span style=&quot;background-color: white; font-family: Helvetica, Arial, Verdana, &#39;Trebuchet MS&#39;, sans-serif; font-size: medium;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background-color: white; font-family: Helvetica, Arial, Verdana, &#39;Trebuchet MS&#39;, sans-serif; font-size: medium;&quot;&gt;program that CANNOT DETECT AND REMOVE any kind of virus, malware and trojan. Windows Secure Workstation can do nothing but just show pop ups to convince the user that the computer has been infected by malwares and urge the user to purchase the full version of Windows Secure Workstation. Windows Secure Workstation infections are known to spread by means of fake online system alerts that warn the user about infections that require the user to download Windows Secure Workstation to remove them. Windows Secure Workstation will start automatically when Windows boot. Then Windows Secure Workstation will do a fake scan on the computer and then it will show the fake report. Do not purchase Windows Secure Workstation as it can do nothing.The user should switch to Safe Mode to make sure any scans detect Windows Secure Workstation and remove Windows Secure Workstation with anti-malware applications that are designed to handle such threats.&lt;/span&gt;&lt;span style=&quot;background-color: white; font-family: Helvetica, Arial, Verdana, &#39;Trebuchet MS&#39;, sans-serif; font-size: medium;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica, Arial, Verdana, &#39;Trebuchet MS&#39;, sans-serif; font-size: 13px;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; float: left;&quot;&gt;
&lt;div style=&quot;font-family: Helvetica, Arial, Verdana, &#39;Trebuchet MS&#39;, sans-serif; font-size: 13px; text-align: justify;&quot;&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;Windows Secure Workstation&lt;/b&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-size: 21px;&quot;&gt;provide fake features such as provide fake features such as Firewall, Automatic Updates, Antivirus Protection, Anti-phishing, Advanced Process Control, Autorun Manager, Service Manager, All-in-one Suite, Quick Scan, Deep Scan, Custom Scan and etc. All of them cannot protect the computer from any kind of malware.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica, Arial, Verdana, &#39;Trebuchet MS&#39;, sans-serif; font-size: 13px;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;b style=&quot;font-family: Helvetica, Arial, Verdana, &#39;Trebuchet MS&#39;, sans-serif; font-size: x-large;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;b&gt;Windows Secure Workstation&lt;/b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&amp;nbsp;can&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;be removed by using&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://freeofvirus.blogspot.com/2010/11/emsisoft-hijackfree.html&quot; style=&quot;font-size: 13px;&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;Emsisoft HiJackFree&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;&amp;nbsp;to stop the processes and kill the files from the hard drive. Then, the user has to restore the registry entries added and modified by Windows Secure Workstation. Finally, all the file related to Windows Secure Workstation must be deleted from the hard drive. All of them has been shown in the removal guide below.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/b&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica, Arial, Verdana, &#39;Trebuchet MS&#39;, sans-serif; font-size: medium;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Helvetica, Arial, Verdana, &#39;Trebuchet MS&#39;, sans-serif; font-size: medium;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: blue;&quot;&gt;The computer users should remember that any time when they encounter a web page that states that the computer is infected, they should not believe them as the majority of these pages are scams trying to get them to install the actual infection. The second method that can be used to install this fake antivirus is through hacked web sites that install Windows Secure Workstation on to the computer without their knowledge by exploiting vulnerabilities in the outdated programs.&lt;/span&gt;&lt;/div&gt;
&lt;/span&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;b style=&quot;font-family: Helvetica, Arial, Verdana, &#39;Trebuchet MS&#39;, sans-serif; font-size: large;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;b&gt;Windows Secure Workstation&lt;/b&gt;&amp;nbsp;should be removed immediately!&lt;/span&gt;&lt;/div&gt;
&lt;/b&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;b style=&quot;font-family: Helvetica, Arial, Verdana, &#39;Trebuchet MS&#39;, sans-serif; font-size: 13px;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;Windows Secure Workstation Removal Guide&lt;/b&gt;&lt;/div&gt;
&lt;/b&gt;&lt;u style=&quot;font-family: Helvetica, Arial, Verdana, &#39;Trebuchet MS&#39;, sans-serif; font-size: 13px;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;u&gt;Kill Process&lt;/u&gt;&lt;/div&gt;
&lt;/u&gt;&lt;span style=&quot;font-family: Helvetica, Arial, Verdana, &#39;Trebuchet MS&#39;, sans-serif; font-size: 13px;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
(&lt;a href=&quot;http://freeofvirus.blogspot.com/2009/02/how-to-kill-process-effectively.html&quot; style=&quot;font-weight: bold;&quot; target=&quot;_blank&quot;&gt;How to kill a process effectively?&lt;/a&gt;)&lt;/div&gt;
&lt;/span&gt;&lt;span style=&quot;font-family: Helvetica, Arial, Verdana, &#39;Trebuchet MS&#39;, sans-serif; font-size: 13px;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
[random].exe&lt;/div&gt;
&lt;/span&gt;&lt;/span&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;u style=&quot;font-family: Helvetica, Arial, Verdana, &#39;Trebuchet MS&#39;, sans-serif; font-size: 13px;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;u&gt;Delete Registry&lt;/u&gt;&lt;/div&gt;
&lt;/u&gt;&lt;span style=&quot;font-family: Helvetica, Arial, Verdana, &#39;Trebuchet MS&#39;, sans-serif; font-size: 13px;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings &quot;WarnOnHTTPSToHTTPRedirect&quot; = 0&lt;/div&gt;
&lt;/span&gt;&lt;span style=&quot;font-family: Helvetica, Arial, Verdana, &#39;Trebuchet MS&#39;, sans-serif; font-size: 13px;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System &quot;DisableRegedit&quot; = 0&lt;/div&gt;
&lt;/span&gt;&lt;span style=&quot;font-family: Helvetica, Arial, Verdana, &#39;Trebuchet MS&#39;, sans-serif; font-size: 13px;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System &quot;DisableRegistryTools&quot; = 0&lt;/div&gt;
&lt;/span&gt;&lt;span style=&quot;font-family: Helvetica, Arial, Verdana, &#39;Trebuchet MS&#39;, sans-serif; font-size: 13px;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System &quot;DisableTaskMgr&quot; = 0&lt;/div&gt;
&lt;/span&gt;&lt;span style=&quot;font-family: Helvetica, Arial, Verdana, &#39;Trebuchet MS&#39;, sans-serif; font-size: 13px;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorAdmin&quot; = 0&lt;/div&gt;
&lt;/span&gt;&lt;span style=&quot;font-family: Helvetica, Arial, Verdana, &#39;Trebuchet MS&#39;, sans-serif; font-size: 13px;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorUser&quot; = 0&lt;/div&gt;
&lt;/span&gt;&lt;span style=&quot;font-family: Helvetica, Arial, Verdana, &#39;Trebuchet MS&#39;, sans-serif; font-size: 13px;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableLUA&quot; = 0&lt;/div&gt;
&lt;/span&gt;&lt;span style=&quot;font-family: Helvetica, Arial, Verdana, &#39;Trebuchet MS&#39;, sans-serif; font-size: 13px;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run &quot;Inspector&quot;&lt;/div&gt;
&lt;/span&gt;&lt;span style=&quot;font-family: Helvetica, Arial, Verdana, &#39;Trebuchet MS&#39;, sans-serif; font-size: 13px;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings &quot;net&quot; = &quot;2012-6-15_4&quot;&lt;/div&gt;
&lt;/span&gt;&lt;span style=&quot;font-family: Helvetica, Arial, Verdana, &#39;Trebuchet MS&#39;, sans-serif; font-size: 13px;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings &quot;UID&quot; = &quot;prrdetmjne&quot;&lt;/div&gt;
&lt;/span&gt;&lt;span style=&quot;font-family: Helvetica, Arial, Verdana, &#39;Trebuchet MS&#39;, sans-serif; font-size: 13px;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
HKEY_CURRENT_USER\Software\ASProtect&lt;/div&gt;
&lt;/span&gt;&lt;span style=&quot;font-family: Helvetica, Arial, Verdana, &#39;Trebuchet MS&#39;, sans-serif; font-size: 13px;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\About.exe&lt;/div&gt;
&lt;/span&gt;&lt;span style=&quot;font-family: Helvetica, Arial, Verdana, &#39;Trebuchet MS&#39;, sans-serif; font-size: 13px;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgserv9.exe&lt;/div&gt;
&lt;/span&gt;&lt;span style=&quot;font-family: Helvetica, Arial, Verdana, &#39;Trebuchet MS&#39;, sans-serif; font-size: 13px;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\driverctrl.exe&lt;/div&gt;
&lt;/span&gt;&lt;span style=&quot;font-family: Helvetica, Arial, Verdana, &#39;Trebuchet MS&#39;, sans-serif; font-size: 13px;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lsetup.exe&lt;/div&gt;
&lt;/span&gt;&lt;span style=&quot;font-family: Helvetica, Arial, Verdana, &#39;Trebuchet MS&#39;, sans-serif; font-size: 13px;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netutils.exe&lt;/div&gt;
&lt;/span&gt;&lt;span style=&quot;font-family: Helvetica, Arial, Verdana, &#39;Trebuchet MS&#39;, sans-serif; font-size: 13px;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ppvstop.exe&lt;/div&gt;
&lt;/span&gt;&lt;span style=&quot;font-family: Helvetica, Arial, Verdana, &#39;Trebuchet MS&#39;, sans-serif; font-size: 13px;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sperm.exe&lt;/div&gt;
&lt;/span&gt;&lt;span style=&quot;font-family: Helvetica, Arial, Verdana, &#39;Trebuchet MS&#39;, sans-serif; font-size: 13px;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vshwin32.exe&lt;/div&gt;
&lt;/span&gt;&lt;span style=&quot;font-family: Helvetica, Arial, Verdana, &#39;Trebuchet MS&#39;, sans-serif; font-size: 13px;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wrctrl.exe&lt;/div&gt;
&lt;/span&gt;&lt;span style=&quot;font-family: Helvetica, Arial, Verdana, &#39;Trebuchet MS&#39;, sans-serif; font-size: 13px;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
... and many more Image File Execution Options entries.&lt;/div&gt;
&lt;/span&gt;&lt;/span&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;u style=&quot;font-family: Helvetica, Arial, Verdana, &#39;Trebuchet MS&#39;, sans-serif; font-size: 13px;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;u&gt;Remove Folders and Files&lt;/u&gt;&lt;/div&gt;
&lt;/u&gt;&lt;span style=&quot;font-family: Helvetica, Arial, Verdana, &#39;Trebuchet MS&#39;, sans-serif; font-size: 13px;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
%AppData%\NPSWF32.dll&lt;/div&gt;
&lt;/span&gt;&lt;span style=&quot;font-family: Helvetica, Arial, Verdana, &#39;Trebuchet MS&#39;, sans-serif; font-size: 13px;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
%AppData%\Protector-[random].exe&lt;/div&gt;
&lt;/span&gt;&lt;span style=&quot;font-family: Helvetica, Arial, Verdana, &#39;Trebuchet MS&#39;, sans-serif; font-size: 13px;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
%AppData%\result.db&lt;/div&gt;
&lt;/span&gt;&lt;span style=&quot;font-family: Helvetica, Arial, Verdana, &#39;Trebuchet MS&#39;, sans-serif; font-size: 13px;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
%CommonStartMenu%\Programs\Windows Secure Workstation.lnk&lt;/div&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://antivirus-software2009.blogspot.com/feeds/180168125624282554/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://antivirus-software2009.blogspot.com/2012/08/remove-windows-secure-workstation.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/180168125624282554'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/180168125624282554'/><link rel='alternate' type='text/html' href='http://antivirus-software2009.blogspot.com/2012/08/remove-windows-secure-workstation.html' title='Remove Windows Secure Workstation '/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/02820373220680933314</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwsaqowxSrwAjrZIqVCi9Q-kXd-S-Zm7irCrTb9YSnFZgLpJZKjJHmQc_8XgRlLLwNe_pYpdKfgqHflWEqamaaXLEq7Lyx8k1pq-GtlhLXa974gxFm-gwJDw0rqe3L0Gum5LWtUKVwX6Y/s72-c/picture.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3655698400884223479.post-6185755769488052745</id><published>2012-08-31T05:12:00.000-07:00</published><updated>2012-08-31T05:12:02.813-07:00</updated><title type='text'>Bethesda admits</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;h1 style=&quot;background-color: white; font-family: arial, sans-serif; line-height: 24px; margin: 0px 0px 10px; padding: 0px;&quot;&gt;
&lt;span style=&quot;color: red; font-size: x-large;&quot;&gt;Bethesda admits&lt;/span&gt;&lt;span style=&quot;color: #333333; font-size: 22px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/h1&gt;
&lt;h1 style=&quot;background-color: white; color: #333333; font-family: arial, sans-serif; font-size: 22px; line-height: 24px; margin: 0px 0px 10px; padding: 0px;&quot;&gt;
Skyrim players may never get Dawnguard on PS3&lt;/h1&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: arial, sans-serif; font-size: 13px; line-height: 16px; margin-bottom: 15px; padding: 0px;&quot;&gt;
&lt;a href=&quot;http://www.gophoto.it/view.php?i=http://www.geek.com/wp-content/uploads/2012/08/Dawnguard1.jpg&quot; style=&quot;color: #092b89; cursor: pointer; text-decoration: none;&quot;&gt;&lt;img alt=&quot;&quot; class=&quot;alignnone size-medium wp-image-1512651&quot; height=&quot;440&quot; src=&quot;http://www.geek.com/wp-content/uploads/2012/08/Dawnguard1-517x440.jpg&quot; style=&quot;border: 1px solid rgb(187, 187, 187); margin: 0px 0px 10px;&quot; title=&quot;Dawnguard&quot; width=&quot;517&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: arial, sans-serif; font-size: 13px; line-height: 16px; margin-bottom: 15px; padding: 0px; text-align: justify;&quot;&gt;
If you own an Xbox 360 and&amp;nbsp;&lt;a href=&quot;http://www.geek.com/articles/tagged/skyrim&quot; style=&quot;color: #092b89; cursor: pointer; text-decoration: none;&quot;&gt;&lt;em&gt;Skyrim&lt;/em&gt;&lt;/a&gt;, you’ve been able to download and play the&amp;nbsp;&lt;a href=&quot;http://www.geek.com/articles/tagged/dawnguard&quot; style=&quot;color: #092b89; cursor: pointer; text-decoration: none;&quot;&gt;&lt;em&gt;Dawnguard&lt;/em&gt;&lt;/a&gt;expansion since June. If you’re a PC gamer, then you only had to wait a bit longer and got it earlier this month. PS3 gamers may now never get access to the content in&amp;nbsp;&lt;em&gt;Dawnguard&lt;/em&gt;.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: arial, sans-serif; font-size: 13px; line-height: 16px; margin-bottom: 15px; padding: 0px; text-align: justify;&quot;&gt;
That’s the news coming out of&amp;nbsp;&lt;a href=&quot;http://www.geek.com/articles/tagged/bethesda&quot; style=&quot;color: #092b89; cursor: pointer; text-decoration: none;&quot;&gt;Bethesda&lt;/a&gt;&amp;nbsp;via their forums. Administrator and global community lead Gstaff posted an update on the state of&amp;nbsp;&lt;a href=&quot;http://www.geek.com/articles/tagged/ps3&quot; style=&quot;color: #092b89; cursor: pointer; text-decoration: none;&quot;&gt;PS3&lt;/a&gt;&amp;nbsp;DLC for the game, and it’s not looking great. Gstaff explains that releasing sizeable DLC is a complex issue, and it seems like for the PS3 it might be just a bit too complex.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: arial, sans-serif; font-size: 13px; line-height: 16px; margin-bottom: 15px; padding: 0px; text-align: justify;&quot;&gt;
No detail is given as to what the specific problem/s is, but Bethesda is preparing PS3 gamers for the reality that&amp;nbsp;&lt;em&gt;Dawnguard&lt;/em&gt;, and for that matter any other&amp;nbsp;&lt;em&gt;Skyrim&lt;/em&gt;&amp;nbsp;DLC, may never reach the platform. The&lt;em&gt;Skyrim&lt;/em&gt;&amp;nbsp;development team hasn’t given up, but also admits they have a problem they can’t guarantee can be solved.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: arial, sans-serif; font-size: 13px; line-height: 16px; margin-bottom: 15px; padding: 0px; text-align: justify;&quot;&gt;
Such news comes as a major blow for both PS3 gamers and Sony. If the PS3 architecture is too complex to allow for DLC in such games, then the future doesn’t look very bright for future titles that try and get the maximum out of the hardware and provide players with sizeable additional content.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: arial, sans-serif; font-size: 13px; line-height: 16px; margin-bottom: 15px; padding: 0px; text-align: justify;&quot;&gt;
Rest assured, Bethesda will have tried everything to get&amp;nbsp;&lt;em&gt;Dawnguard&lt;/em&gt;&amp;nbsp;working on PS3. They want the revenue it would bring, and they certainly don’t want the bad press that will obviously surround this over the coming days.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: arial, sans-serif; font-size: 13px; line-height: 16px; margin-bottom: 15px; padding: 0px; text-align: justify;&quot;&gt;
I’d like to know what the exact problem is they can’t overcome, but I’d also like to know if this is a failing on Bethesda’s part or a shortcoming of the PS3 architecture. Maybe Sony should pay Bethesda a visit and see what’s going on.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://antivirus-software2009.blogspot.com/feeds/6185755769488052745/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://antivirus-software2009.blogspot.com/2012/08/bethesda-admits.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/6185755769488052745'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/6185755769488052745'/><link rel='alternate' type='text/html' href='http://antivirus-software2009.blogspot.com/2012/08/bethesda-admits.html' title='Bethesda admits'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/02820373220680933314</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3655698400884223479.post-6267892093898333278</id><published>2012-08-31T04:47:00.002-07:00</published><updated>2012-08-31T04:47:24.172-07:00</updated><title type='text'>Webroot Secure</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;h1 style=&quot;background-color: white; color: #333333; line-height: 24px; margin: 0px 0px 10px; padding: 0px;&quot;&gt;
&lt;/h1&gt;
&lt;h1 style=&quot;margin: 0px 0px 10px; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-family: Courier New, Courier, monospace; font-size: x-large;&quot;&gt;Webroot Secure:&lt;/span&gt;&lt;/h1&gt;
&lt;h1 style=&quot;background-color: white; color: #333333; font-family: arial, sans-serif; font-size: 22px; line-height: 24px; margin: 0px 0px 10px; padding: 0px;&quot;&gt;
Anywhere: PC, Android and iOS protection under one license:&lt;/h1&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: arial, sans-serif; font-size: 13px; line-height: 16px; margin-bottom: 15px; padding: 0px;&quot;&gt;
&lt;a href=&quot;http://www.gophoto.it/view.php?i=http://www.geek.com/wp-content/uploads/2011/10/WSA_Plain_Logo_Color.jpg&quot; style=&quot;color: #092b89; cursor: pointer; text-decoration: none;&quot;&gt;&lt;img alt=&quot;&quot; class=&quot;alignnone size-medium wp-image-1426309&quot; height=&quot;168&quot; src=&quot;http://www.geek.com/wp-content/uploads/2011/10/WSA_Plain_Logo_Color-580x168.jpg&quot; style=&quot;border: 1px solid rgb(187, 187, 187); margin: 0px 0px 10px;&quot; title=&quot;WSA_Plain_Logo_Color&quot; width=&quot;580&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: arial, sans-serif; font-size: 13px; line-height: 16px; margin-bottom: 15px; padding: 0px;&quot;&gt;
Security software running on your PC is a necessary evil, and depending on your choice of&amp;nbsp;&lt;a href=&quot;http://www.geek.com/articles/tagged/security-suite&quot; style=&quot;color: #092b89; cursor: pointer; text-decoration: none;&quot;&gt;security suite&lt;/a&gt;, one that can have a significant impact on the performance of you system.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: arial, sans-serif; font-size: 13px; line-height: 16px; margin-bottom: 15px; padding: 0px;&quot;&gt;
So if a company offered you a security suite that boasts a 6-second install, only required 6MB of storage, and system scans that took less than 2 minutes to perform, you’d be interested, right?&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: arial, sans-serif; font-size: 13px; line-height: 16px; margin-bottom: 15px; padding: 0px;&quot;&gt;
That’s exactly what&amp;nbsp;&lt;a href=&quot;http://www.geek.com/articles/tagged/webroot&quot; style=&quot;color: #092b89; cursor: pointer; text-decoration: none;&quot;&gt;Webroot&lt;/a&gt;&amp;nbsp;is claiming to offer with the launch of its latest suite called SecureAnywhere released today.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: arial, sans-serif; font-size: 13px; line-height: 16px; margin-bottom: 15px; padding: 0px;&quot;&gt;
Webroot Software has a history of offering security tools starting with Windows Washer in 1997, then Spy Sweeper in 2002. In 2006 it began offering antivirus, then added firewall protection before moving to a full consumer security suite for PCs in 2008.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: arial, sans-serif; font-size: 13px; line-height: 16px; margin-bottom: 15px; padding: 0px;&quot;&gt;
&lt;a href=&quot;http://www.gophoto.it/view.php?i=http://www.geek.com/wp-content/uploads/2011/10/MainPanel.jpg&quot; style=&quot;color: #092b89; cursor: pointer; text-decoration: none;&quot;&gt;&lt;img alt=&quot;&quot; class=&quot;alignnone size-medium wp-image-1426305&quot; height=&quot;423&quot; src=&quot;http://www.geek.com/wp-content/uploads/2011/10/MainPanel-580x423.jpg&quot; style=&quot;border: 1px solid rgb(187, 187, 187); margin: 0px 0px 10px;&quot; title=&quot;MainPanel&quot; width=&quot;580&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: arial, sans-serif; font-size: 13px; line-height: 16px; margin-bottom: 15px; padding: 0px;&quot;&gt;
With the introduction of SecureAnywhere, Webroot is not only trying to offer protection without the system resources overhead, but has also extended security to mobile devices including both iOS and Android platforms. In fact, with a single license it’s possible to offer protection for up to 5 PCs and 3 mobile devices.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: arial, sans-serif; font-size: 13px; line-height: 16px; margin-bottom: 15px; padding: 0px;&quot;&gt;
The quick install, scans, and minimal hard drive requirements stem from the fact SecureAnywhere is a cloud-based solution. Even the firewall is handled in the cloud. There’s no signature files, just a cloud database and threat intelligence network that uses information from all machines running the suite to offer better protection.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: arial, sans-serif; font-size: 13px; line-height: 16px; margin-bottom: 15px; padding: 0px;&quot;&gt;
The software is broken down into three components: Identity Shield, Web Threat Shield, and Core System Shield. Together they offer protection against keyloggers, screen grabbers, trojans, and phishing attacks, as well as monitoring all content on websites you visit and offering a predictive protection function for those times when you are offline.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: arial, sans-serif; font-size: 13px; line-height: 16px; margin-bottom: 15px; padding: 0px;&quot;&gt;
&lt;a href=&quot;http://www.gophoto.it/view.php?i=http://www.geek.com/wp-content/uploads/2011/10/PortalHomePanel.jpg&quot; style=&quot;color: #092b89; cursor: pointer; text-decoration: none;&quot;&gt;&lt;img alt=&quot;&quot; class=&quot;alignnone size-full wp-image-1426307&quot; height=&quot;376&quot; src=&quot;http://www.geek.com/wp-content/uploads/2011/10/PortalHomePanel.jpg&quot; style=&quot;border: 1px solid rgb(187, 187, 187); margin: 0px 0px 10px;&quot; title=&quot;PortalHomePanel&quot; width=&quot;523&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: arial, sans-serif; font-size: 13px; line-height: 16px; margin-bottom: 15px; padding: 0px;&quot;&gt;
For the novice PC users Webroot is promising a pop-up free experience that offers protection without the decision making. But at the same time advanced features are there including 124 settings and a selection of tools for additional threat detection. As for system scanning, there’s 6 options to cater for your needs.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: arial, sans-serif; font-size: 13px; line-height: 16px; margin-bottom: 15px; padding: 0px;&quot;&gt;
Because SecureAnywhere is cloud based, Webroot has managed to offer up management of all your devices through a single web portal. That means multiple PCs, tablets, smartphones, all secured through one interface. Combine that with a password management system, online backups, secure file erasing, encrypted personal data, and file synchronization, and you have a pretty complete security package for all your devices under a single license and yearly subscription.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: arial, sans-serif; font-size: 13px; line-height: 16px; margin-bottom: 15px; padding: 0px;&quot;&gt;
&lt;a href=&quot;http://www.gophoto.it/view.php?i=http://www.geek.com/wp-content/uploads/2011/10/LocateCommand.jpg&quot; style=&quot;color: #092b89; cursor: pointer; text-decoration: none;&quot;&gt;&lt;img alt=&quot;&quot; class=&quot;alignnone size-medium wp-image-1426311&quot; height=&quot;440&quot; src=&quot;http://www.geek.com/wp-content/uploads/2011/10/LocateCommand-467x440.jpg&quot; style=&quot;border: 1px solid rgb(187, 187, 187); margin: 0px 0px 10px;&quot; title=&quot;LocateCommand&quot; width=&quot;467&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: arial, sans-serif; font-size: 13px; line-height: 16px; margin-bottom: 15px; padding: 0px;&quot;&gt;
As you’d expect, there are several license options available for SecureAnywhere. For the PC user there’s SecureAnywhere AntiVirus offering a “basic antimalware service” for 1 PC for $39.95 or 3 PCs for $49.95. SecureAnywhere Essentials adds a firewall, ID protection, and 2GB of online file backup for $59.95 covering 3 PCs.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: arial, sans-serif; font-size: 13px; line-height: 16px; margin-bottom: 15px; padding: 0px;&quot;&gt;
If you want mobile device protection alone there’s SecureAnywhere Mobile Security for either Android or iOS. In both cases there is a free edition available from the respective app stores offering antivirus, secure web browsing, device locking, and call/SMS blocking. A Premium edition for $19.99 is also available and adds application inspection, password management, SIM card blocking, and device wiping features.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: arial, sans-serif; font-size: 13px; line-height: 16px; margin-bottom: 15px; padding: 0px;&quot;&gt;
&lt;a href=&quot;http://www.gophoto.it/view.php?i=http://www.geek.com/wp-content/uploads/2011/10/AppInspector.jpg&quot; style=&quot;color: #092b89; cursor: pointer; text-decoration: none;&quot;&gt;&lt;img alt=&quot;&quot; class=&quot;alignnone size-medium wp-image-1426315&quot; height=&quot;440&quot; src=&quot;http://www.geek.com/wp-content/uploads/2011/10/AppInspector-528x440.jpg&quot; style=&quot;border: 1px solid rgb(187, 187, 187); margin: 0px 0px 10px;&quot; title=&quot;AppInspector&quot; width=&quot;528&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: arial, sans-serif; font-size: 13px; line-height: 16px; margin-bottom: 15px; padding: 0px;&quot;&gt;
If you want both PC and mobile device protection then the best value choice is SecureAnywhere Complete, which protects up to 3 PCs and 3 mobile devices for $79.95. As well as offering all the features of the Essentials and Mobile Security packages, Complete ups the online storage to 10GB, and extends password management and file syncing across all PCs as well as mobile devices.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: arial, sans-serif; font-size: 13px; line-height: 16px; margin-bottom: 15px; padding: 0px;&quot;&gt;
SecureAnywhere has already received an&amp;nbsp;&lt;a href=&quot;http://www.pcmag.com/article2/0,2817,2393920,00.asp#fbid=8tlI51tr9IA&quot; style=&quot;color: #092b89; cursor: pointer; text-decoration: none;&quot;&gt;Editors’ Choice award from PCMag&lt;/a&gt;&amp;nbsp;suggesting its protection, low resource requirements, and coverage of mobile devices under a single license could be a killer combination.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: arial, sans-serif; font-size: 13px; line-height: 16px; margin-bottom: 15px; padding: 0px;&quot;&gt;
As SecureAnywhere is available for iOS, you’d expect there to be a license covering Macs too. Although not available yet, Webroot is promising Mac support in early 2012.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: arial, sans-serif; font-size: 13px; line-height: 16px; margin-bottom: 15px; padding: 0px;&quot;&gt;
Read more at&amp;nbsp;&lt;a href=&quot;http://www.webroot.com/En_US/consumer-products-secureanywhere-complete.html&quot; style=&quot;color: #092b89; cursor: pointer; text-decoration: none;&quot;&gt;Webroot&lt;/a&gt;&amp;nbsp;and view a comparison of the&amp;nbsp;&lt;a href=&quot;http://www.webroot.com/En_US/consumer-compare.html&quot; style=&quot;color: #092b89; cursor: pointer; text-decoration: none;&quot;&gt;PC SecureAnywhere products&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://antivirus-software2009.blogspot.com/feeds/6267892093898333278/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://antivirus-software2009.blogspot.com/2012/08/webroot-secure.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/6267892093898333278'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/6267892093898333278'/><link rel='alternate' type='text/html' href='http://antivirus-software2009.blogspot.com/2012/08/webroot-secure.html' title='Webroot Secure'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/02820373220680933314</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3655698400884223479.post-3772254435944610762</id><published>2012-08-22T02:57:00.002-07:00</published><updated>2012-08-22T02:57:17.268-07:00</updated><title type='text'>Computer Clean Up System</title><content type='html'>&lt;span style=&quot;color: red; font-size: large;&quot;&gt;Computer Clean Up System&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: red; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div style=&quot;color: #333333; font-family: Arial, sans-serif; font-size: 13px; text-align: justify;&quot;&gt;
With all of the recent news stories about identity theft, it got me thinking about my PC. What kinds of information did I have stored on it? And is it really something that a hacker might want?&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-family: Arial, sans-serif; font-size: 13px; text-align: justify;&quot;&gt;
After a little digging around (and several Internet tutorials later!) I was astounded at the amount of personal information I found. All the websites I had visited, months of stored cookies and more were all stored in several different locations throughout my PC. Anybody looking at my PC could see that I liked to shop at Amazon.com, what news stories I had read and that my wife was pregnant.&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-family: Arial, sans-serif; font-size: 13px; text-align: justify;&quot;&gt;
Knowing I was in need of a computer clean up, here’s what I found:&lt;/div&gt;
&lt;ul style=&quot;color: #333333; font-family: Arial, sans-serif; font-size: 13px;&quot;&gt;
&lt;li&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;strong style=&quot;color: #cc0033;&quot;&gt;Internet History&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
This is a record of all the websites I’d visited. Because my history is used in a few different ways, it’s stored in several places on my PC. For example, you know how when you start to type in a website address (URL) and your computer finishes it for you? That’s because of your Internet History list!&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;color: #333333; font-family: Arial, sans-serif; font-size: 13px;&quot;&gt;
&lt;li&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: #cc0033;&quot;&gt;&lt;strong&gt;Cache&lt;/strong&gt;&amp;nbsp;&lt;/span&gt;(also known as Temporary Internet Files)&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Cache is a file that stores information from web pages that I often visit. This means every image, animation, link and sound from all the websites I’ve visited is stored on your PC. Essentially anyone looking at my cache would be able to see everything that I saw the last time I was on the Internet.&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;color: #333333; font-family: Arial, sans-serif; font-size: 13px;&quot;&gt;
&lt;li&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;strong style=&quot;color: #cc0033;&quot;&gt;Cookies&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Have you ever bought something from a website that required a login, like Amazon.com? I have and when I go back days later, I’m greeted with &quot;Welcome back Jeffrey!&quot; at the top of the page. I used to wonder — how did the website magically remember my name?&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;color: #333333; font-family: Arial, sans-serif; font-size: 13px; margin-left: 40px; text-align: justify;&quot;&gt;
Simple – the website used a file called a Cookie. Cookies are little files that websites write and store on your computer. Every time I visit a certain website, it will look for its cookie on my hard drive. It uses the information stored within the cookie to know my name, my shopping preferences and lots of other information about me.&lt;/div&gt;
&lt;ul style=&quot;color: #333333; font-family: Arial, sans-serif; font-size: 13px;&quot;&gt;
&lt;li&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;strong style=&quot;color: #cc0033;&quot;&gt;Recent Documents List&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Did you know that Microsoft Windows keeps a record of every document that you open on your computer? This record can be easily accessed from the Start menu and anyone who looks at my computer can see what I was last working on.&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;color: #333333; font-family: Arial, sans-serif; font-size: 13px;&quot;&gt;
&lt;li&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;strong style=&quot;color: #cc0033;&quot;&gt;Index.dat file&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
This is the trickiest kind of file. Index.dat houses a record of my cookies, my history, my temporary files and my cache. I could separately delete my cookies, my history and my cache, but a record of them would still exist in my index.dat file. But the worst part is, because of the way Windows is designed; this file cannot be manually deleted.&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;color: #333333; font-family: Arial, sans-serif; font-size: 13px; text-align: justify;&quot;&gt;
After discovering all of these web tracks, I decided a computer clean up was in order. Being somewhat computer savvy, I knew that I could manually delete some of these files and perform a computer clean up myself.&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-family: Arial, sans-serif; font-size: 13px; text-align: justify;&quot;&gt;
But keeping my computer clean was another matter. I knew that a computer clean up shouldn’t be a spring-cleaning activity. I wanted my computer to be clean everyday and I knew I didn’t have the time to manually delete files every single time I left the Internet.&lt;/div&gt;
&lt;h2 style=&quot;font-family: &#39;Trebuchet MS&#39;, Arial, sans-serif; font-size: 14pt; margin: 0px; text-align: justify;&quot;&gt;
My Computer Clean Up Solution&lt;/h2&gt;
&lt;div style=&quot;color: #333333; font-family: Arial, sans-serif; font-size: 13px; text-align: justify;&quot;&gt;
&lt;a href=&quot;http://www.winferno.com/guides/software/PC-Confidential/1/home/&quot;&gt;&lt;strong&gt;PC Confidential&lt;/strong&gt;&lt;/a&gt;&amp;nbsp;is a program that was designed for the purpose of cleaning all the files on your computer that a hacker could potentially use to build a profile for you and steal your identity.&amp;nbsp; Did you know that…&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-family: Arial, sans-serif; font-size: 13px; margin-left: 40px; text-align: justify;&quot;&gt;
&lt;strong&gt;Every website you visit, picture you view, video you watch, online chat you have, and more is all being recorded in hidden files. With just a little effort, this information could be available to your spouse, your boss, your kids, or even a hacker trying to steal your identity!&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-family: Arial, sans-serif; font-size: 13px; text-align: justify;&quot;&gt;
Why jeopardize your family, reputation, job, or identity any longer? With PC Confidential, you won’t be putting your privacy at risk anymore. PC Confidential was specifically designed to protect your sensitive information and ensure that no one will be able to access what you do on your PC.&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-family: Arial, sans-serif; font-size: 13px; text-align: justify;&quot;&gt;
&lt;a href=&quot;http://www.winferno.com/guides/checkout/PCC2008-TRIAL.exe&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;http://articles.winferno.com/imageEditorUploadFiles/image/Free%20Personal%20Privacy%20Scan.JPG&quot; style=&quot;border: none; max-width: 100%; padding: 0px;&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-family: Arial, sans-serif; font-size: 13px; text-align: justify;&quot;&gt;
You don’t have to guess what private information is sitting on your computer anymore. You can download our&amp;nbsp;&lt;a href=&quot;http://www.winferno.com/guides/checkout/PCC2008-TRIAL.exe&quot;&gt;Free Personal Privacy Scan&lt;/a&gt;&amp;nbsp;and within seconds know how much of your personal information is at risk and permanently delete this data so that it can&amp;nbsp;&lt;u&gt;NEVER&lt;/u&gt;&amp;nbsp;be recovered.&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://antivirus-software2009.blogspot.com/feeds/3772254435944610762/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://antivirus-software2009.blogspot.com/2012/08/computer-clean-up-system.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/3772254435944610762'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/3772254435944610762'/><link rel='alternate' type='text/html' href='http://antivirus-software2009.blogspot.com/2012/08/computer-clean-up-system.html' title='Computer Clean Up System'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/02820373220680933314</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3655698400884223479.post-3120912744878322097</id><published>2012-08-22T02:53:00.000-07:00</published><updated>2012-08-22T02:53:03.179-07:00</updated><title type='text'>Virus Definitions</title><content type='html'>&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, Arial, sans-serif; font-weight: bold;&quot;&gt;&lt;span style=&quot;color: blue; font-size: large;&quot;&gt;Virus Definitions&lt;/span&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, Arial, sans-serif; font-weight: bold;&quot;&gt;&lt;span style=&quot;color: blue; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;h3 style=&quot;font-family: &#39;Trebuchet MS&#39;, Arial, sans-serif; margin: 0px;&quot;&gt;
&lt;span style=&quot;font-family: Verdana;&quot;&gt;&lt;span style=&quot;color: purple; font-size: small;&quot;&gt;What are Virus Definitions?&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Verdana;&quot;&gt;&lt;span style=&quot;color: purple; font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-family: Arial, sans-serif; font-size: 13px;&quot;&gt;
&lt;span style=&quot;font-family: Verdana;&quot;&gt;A&amp;nbsp;&lt;strong&gt;virus definition&amp;nbsp;&lt;/strong&gt;&lt;em&gt;(also known as a virus signature)&lt;/em&gt;&amp;nbsp;is a unique string of bits, or the binary pattern, of the machine code of a&amp;nbsp;&lt;a href=&quot;http://articles.winferno.com/antivirus/computer-worms/&quot;&gt;virus&lt;/a&gt;. The term &quot;virus definitions&quot; typically refers to the database of all current virus signature files used by a particular anti virus software for virus detection. Virus definitions are the primary method of detection for most anti virus software programs.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-family: Arial, sans-serif; font-size: 13px;&quot;&gt;
&lt;span style=&quot;font-family: Verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;h3 style=&quot;font-family: &#39;Trebuchet MS&#39;, Arial, sans-serif; margin: 0px;&quot;&gt;
&lt;span style=&quot;font-family: Verdana;&quot;&gt;&lt;span style=&quot;color: purple; font-size: small;&quot;&gt;How are Virus Definitions Used?&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Verdana;&quot;&gt;&lt;span style=&quot;color: purple; font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-family: Arial, sans-serif; font-size: 13px;&quot;&gt;
&lt;span style=&quot;font-family: Verdana;&quot;&gt;During a virus scan, anti virus software compares the content on a computer (including the hard disk, boot sectors, RAM, and removable drives) against its virus defintion database. In the virus defintition database, each defintion, or pattern of binary code is unique to each variant of a virus. This enables anti virus software to effectively detect viruses upon the discovery of any of the code included in the virus defintion database.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-family: Arial, sans-serif; font-size: 13px;&quot;&gt;
&lt;span style=&quot;font-family: Verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;h3 style=&quot;font-family: &#39;Trebuchet MS&#39;, Arial, sans-serif; font-size: 10pt; margin: 0px;&quot;&gt;
&lt;span style=&quot;background-color: white; font-family: Verdana;&quot;&gt;&lt;span style=&quot;color: purple;&quot;&gt;Why are Virus Definitions Important?&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white; font-family: Verdana;&quot;&gt;&lt;span style=&quot;color: purple;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-family: Arial, sans-serif; font-size: 13px;&quot;&gt;
&lt;span style=&quot;font-family: Verdana;&quot;&gt;For anti virus software to provide effective protection, it is essential that the virus definition database used is comprehensive and frequently updated. Virus authors are constantly creating new variants and new viruses in attempt to exploit vulnerabilities in user’s systems. All it takes is one worm or virus to wreak havoc and cause major destruction to a system or network. In order for anti virus software to provide maximum protection, it should be able to detect all known viruses, including the latest threats.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-family: Arial, sans-serif; font-size: 13px;&quot;&gt;
&lt;span style=&quot;font-family: Verdana;&quot;&gt;Examples of trusted anti virus software products that utilize an extensive database of continuously updating virus definitions include:&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.winferno.com/guides/software/mcafee/1/mcafee-home/&quot;&gt;&lt;span style=&quot;font-family: Verdana;&quot;&gt;McAfee&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Verdana;&quot;&gt;&amp;nbsp;and&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.norton-outlet.com/&quot;&gt;&lt;span style=&quot;font-family: Verdana;&quot;&gt;Norton&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Verdana;&quot;&gt;. Both of these anti virus products also provide automatic virus definition updating, ensuring that users stay up-to-date with the latest threats.&lt;/span&gt;&lt;span style=&quot;font-family: Verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: #f4f4f5; border: 1px solid rgb(230, 230, 232); color: #333333; font-family: Arial, sans-serif; font-size: 13px;&quot;&gt;
&lt;div style=&quot;color: black; font-size: 9pt; font-weight: bold; margin-left: 5px; margin-right: 5px; margin-top: 5px;&quot;&gt;
&amp;nbsp;Related Articles&lt;/div&gt;
&lt;table&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;color: #333333; font-size: 9pt; line-height: 15px; padding: 5px;&quot;&gt;&lt;img align=&quot;absmiddle&quot; src=&quot;http://www.winferno.com/images/articles/icon_article.gif&quot; /&gt;&amp;nbsp;&lt;a href=&quot;http://articles.winferno.com/antivirus/computer-virus/&quot;&gt;Computer Virus&lt;/a&gt;&lt;br /&gt;&lt;img align=&quot;absmiddle&quot; src=&quot;http://www.winferno.com/images/articles/icon_article.gif&quot; /&gt;&amp;nbsp;&lt;a href=&quot;http://articles.winferno.com/antivirus/computer-worms/&quot;&gt;Computer Worms&lt;/a&gt;&lt;br /&gt;&lt;img align=&quot;absmiddle&quot; src=&quot;http://www.winferno.com/images/articles/icon_article.gif&quot; /&gt;&amp;nbsp;&lt;a href=&quot;http://articles.winferno.com/antivirus/virus-definitions/&quot;&gt;Virus Definitions&lt;/a&gt;&lt;br /&gt;&lt;img align=&quot;absmiddle&quot; src=&quot;http://www.winferno.com/images/articles/icon_article.gif&quot; /&gt;&amp;nbsp;&lt;a href=&quot;http://articles.winferno.com/antivirus/spyware/&quot;&gt;Spyware&lt;/a&gt;&lt;br /&gt;&lt;img align=&quot;absmiddle&quot; src=&quot;http://www.winferno.com/images/articles/icon_article.gif&quot; /&gt;&amp;nbsp;&lt;a href=&quot;http://articles.winferno.com/antivirus/adware/&quot;&gt;Adware&lt;/a&gt;&lt;br /&gt;&lt;img align=&quot;absmiddle&quot; src=&quot;http://www.winferno.com/images/articles/icon_article.gif&quot; /&gt;&amp;nbsp;&lt;a href=&quot;http://articles.winferno.com/antivirus/rootkits/&quot;&gt;Rootkits&lt;/a&gt;&lt;br /&gt;&lt;img align=&quot;absmiddle&quot; src=&quot;http://www.winferno.com/images/articles/icon_article.gif&quot; /&gt;&amp;nbsp;&lt;a href=&quot;http://articles.winferno.com/antivirus/keylogging/&quot;&gt;Keylogging&lt;/a&gt;&lt;br /&gt;&lt;img align=&quot;absmiddle&quot; src=&quot;http://www.winferno.com/images/articles/icon_article.gif&quot; /&gt;&amp;nbsp;&lt;a href=&quot;http://articles.winferno.com/antivirus/trojan-horse/&quot;&gt;Trojan Horse&lt;/a&gt;&lt;br /&gt;&lt;img align=&quot;absmiddle&quot; src=&quot;http://www.winferno.com/images/articles/icon_article.gif&quot; /&gt;&amp;nbsp;&lt;a href=&quot;http://articles.winferno.com/antivirus/virus-scan-in-safe-mode/&quot;&gt;Running Virus Scan in Safe Mode&lt;/a&gt;&lt;br /&gt;&lt;img align=&quot;absmiddle&quot; src=&quot;http://www.winferno.com/images/articles/icon_article.gif&quot; /&gt;&amp;nbsp;&lt;a href=&quot;http://articles.winferno.com/antivirus/w32/&quot;&gt;W32&lt;/a&gt;&lt;br /&gt;&lt;img align=&quot;absmiddle&quot; src=&quot;http://www.winferno.com/images/articles/icon_article.gif&quot; /&gt;&amp;nbsp;&lt;a href=&quot;http://articles.winferno.com/antivirus/browser-hijacking/&quot;&gt;Browser Hijacking&lt;/a&gt;&lt;br /&gt;&lt;img align=&quot;absmiddle&quot; src=&quot;http://www.winferno.com/images/articles/icon_article.gif&quot; /&gt;&amp;nbsp;&lt;a href=&quot;http://articles.winferno.com/antivirus/virus-hoax/&quot;&gt;Virus Hoax&lt;/a&gt;&lt;/td&gt;&lt;td style=&quot;color: #333333; font-size: 9pt; line-height: 15px; padding-left: 5px;&quot;&gt;&lt;img align=&quot;absmiddle&quot; src=&quot;http://www.winferno.com/images/articles/icon_article.gif&quot; /&gt;&amp;nbsp;&lt;a href=&quot;http://articles.winferno.com/category/antivirus/&quot;&gt;Postcard Virus&lt;/a&gt;&lt;br /&gt;&lt;img align=&quot;absmiddle&quot; src=&quot;http://www.winferno.com/images/articles/icon_article.gif&quot; /&gt;&amp;nbsp;&lt;a href=&quot;http://articles.winferno.com/antivirus/merry-christmas-virus/&quot;&gt;Merry Christmas Virus&lt;/a&gt;&lt;br /&gt;&lt;img align=&quot;absmiddle&quot; src=&quot;http://www.winferno.com/images/articles/icon_article.gif&quot; /&gt;&amp;nbsp;&lt;a href=&quot;http://articles.winferno.com/antivirus/invitation-virus/&quot;&gt;Invitation Virus&lt;/a&gt;&lt;br /&gt;&lt;img align=&quot;absmiddle&quot; src=&quot;http://www.winferno.com/images/articles/icon_article.gif&quot; /&gt;&amp;nbsp;&lt;a href=&quot;http://articles.winferno.com/antivirus/life-is-beautiful-virus/&quot;&gt;Life is Beautiful Virus&lt;/a&gt;&lt;br /&gt;&lt;img align=&quot;absmiddle&quot; src=&quot;http://www.winferno.com/images/articles/icon_article.gif&quot; /&gt;&amp;nbsp;&lt;a href=&quot;http://articles.winferno.com/antivirus/iloveyou-virus/&quot;&gt;ILOVEYOU Virus&lt;/a&gt;&lt;br /&gt;&lt;img align=&quot;absmiddle&quot; src=&quot;http://www.winferno.com/images/articles/icon_article.gif&quot; /&gt;&amp;nbsp;&lt;a href=&quot;http://articles.winferno.com/windows-security/wireless-network-protection/&quot;&gt;Wireless Network Protection&lt;/a&gt;&lt;br /&gt;&lt;img align=&quot;absmiddle&quot; src=&quot;http://www.winferno.com/images/articles/icon_article.gif&quot; /&gt;&amp;nbsp;&lt;a href=&quot;http://articles.winferno.com/windows-security/wifi-protection/&quot;&gt;Wi-Fi Protection&lt;/a&gt;&lt;br /&gt;&lt;img align=&quot;absmiddle&quot; src=&quot;http://www.winferno.com/images/articles/icon_article.gif&quot; /&gt;&amp;nbsp;&lt;a href=&quot;http://articles.winferno.com/internet-privacy/permanently-erase-files/&quot;&gt;Permanently Erase Files&lt;/a&gt;&lt;br /&gt;&lt;img align=&quot;absmiddle&quot; src=&quot;http://www.winferno.com/images/articles/icon_article.gif&quot; /&gt;&amp;nbsp;&lt;a href=&quot;http://articles.winferno.com/internet-privacy/computer-clean-up/&quot;&gt;Computer Clean Up&lt;/a&gt;&lt;br /&gt;&lt;img align=&quot;absmiddle&quot; src=&quot;http://www.winferno.com/images/articles/icon_article.gif&quot; /&gt;&amp;nbsp;&lt;a href=&quot;http://articles.winferno.com/internet-privacy/delete-autocomplete/&quot;&gt;Delete AutoComplete&lt;/a&gt;&lt;br /&gt;&lt;img align=&quot;absmiddle&quot; src=&quot;http://www.winferno.com/images/articles/icon_article.gif&quot; /&gt;&amp;nbsp;&lt;a href=&quot;http://articles.winferno.com/computer-fraud/computer-fraud/&quot;&gt;Computer Fraud&lt;/a&gt;&lt;br /&gt;&lt;img align=&quot;absmiddle&quot; src=&quot;http://www.winferno.com/images/articles/icon_article.gif&quot; /&gt;&amp;nbsp;&lt;a href=&quot;http://articles.winferno.com/file-compression/sharing-digital-photos/&quot;&gt;Share Digital Photos&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;div class=&quot;postmetadata&quot; style=&quot;clear: left; color: #333333; font-family: Arial, sans-serif; font-size: 13px; padding: 10px;&quot;&gt;
Tags:&amp;nbsp;&lt;a href=&quot;http://articles.winferno.com/tag/virus-protection/&quot; rel=&quot;tag&quot;&gt;virus protection&lt;/a&gt;&lt;br /&gt;Posted in&amp;nbsp;&lt;a href=&quot;http://articles.winferno.com/category/antivirus/&quot; rel=&quot;category tag&quot; title=&quot;View all posts in Antivirus &amp;amp; Antispyware&quot;&gt;Antivirus &amp;amp; Antispyware&lt;/a&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://antivirus-software2009.blogspot.com/feeds/3120912744878322097/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://antivirus-software2009.blogspot.com/2012/08/virus-definitions.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/3120912744878322097'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/3120912744878322097'/><link rel='alternate' type='text/html' href='http://antivirus-software2009.blogspot.com/2012/08/virus-definitions.html' title='Virus Definitions'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/02820373220680933314</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3655698400884223479.post-2584267792867597450</id><published>2012-08-21T05:36:00.002-07:00</published><updated>2012-08-21T05:36:40.427-07:00</updated><title type='text'>How to Keep Your Computer Virus Free</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;
&lt;b style=&quot;background-color: white; color: red; font-family: Georgia, serif; font-size: 26px; text-align: start;&quot;&gt;&lt;i&gt;How to Keep Your Computer Virus Free&lt;/i&gt;&lt;/b&gt;
&lt;/div&gt;
&lt;div style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;
&lt;img src=&quot;http://s1.hubimg.com/u/3731968_f260.jpg&quot; /&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 18.883333206176758px;&quot;&gt;Viruses are one the most painful and frustrating problems to confront on your computer, and getting one of these can cost thousands of dollars and trash your precious PC. Using a few simple and effective tips, you can greatly decrease the chances of obtaining a virus and keep your computer running like new.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;floatclear&quot; style=&quot;background-color: white; clear: both; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 18.883333206176758px; margin: 0px; padding: 0px; width: 520px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;modfloat right&quot; style=&quot;background-color: white; color: #333333; float: right; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 18.883333206176758px; margin: 0px 0px 0.5em 15px; padding: 0px; width: 270px;&quot;&gt;
&lt;div class=&quot;module moduleImage&quot; id=&quot;mod_9722659&quot; style=&quot;margin: 0px 0px 8px; padding: 10px 0px 0px;&quot;&gt;
&lt;div id=&quot;imgs_9722659&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;
&lt;div id=&quot;img_url_3731973&quot; style=&quot;cursor: pointer; margin: 0px; padding: 0px;&quot;&gt;
&lt;img alt=&quot;&quot; class=&quot;half&quot; height=&quot;194&quot; src=&quot;http://s2.hubimg.com/u/3731973_f260.jpg&quot; style=&quot;border: 0px; display: block; margin-bottom: 5px; margin-left: auto; margin-right: auto; width: 260px;&quot; title=&quot;&quot; width=&quot;260&quot; /&gt;&lt;div class=&quot;halfSlide&quot; style=&quot;margin: 0px auto; padding: 0px; position: relative; width: 260px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;caption_half&quot; id=&quot;img_desc_3731973&quot; style=&quot;color: #888888; font-size: 0.8em; line-height: 1.25em; margin: 3px 0px 7px; padding: 0px 10px; text-align: center; width: 240px; word-wrap: break-word;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;module moduleAdSpot color0&quot; id=&quot;mod_new11&quot; style=&quot;margin: 0px; min-height: 250px; padding: 10px 0px 0px;&quot;&gt;
&lt;div style=&quot;margin: 0px; padding: 0px 0px 5px;&quot;&gt;
&lt;div id=&quot;google_ads_div_technology_hub_content_250x250_ad_wrapper&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;
&lt;div id=&quot;google_ads_div_technology_hub_content_250x250_ad_container&quot; style=&quot;display: inline-block; margin: 0px; padding: 0px;&quot;&gt;
&lt;div class=&quot;cjs_wrapper&quot; style=&quot;margin: 15px 0px; padding: 0px;&quot;&gt;
&lt;a class=&quot;adsbygoogle&quot; href=&quot;http://www.google.com/url?ct=abg&amp;amp;q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dhttp://passthejelly.hubpages.com/hub/How-to-Keep-Your-Computer-Virus-Free%26gl%3DPK%26hl%3Den%26client%3Dca-pub-6958755572607374%26ai0%3DB3gX15H8zUKy0LsGa0AWutYGoBcOx5MYC75ry7gbAjbcBoOAUEAEYASDU2agEKAM4AFC478KkB2DLBLIBGXBhc3N0aGVqZWxseS5odWJwYWdlcy5jb226AQoyNTB4MjUwX2pzyAEB2gFJaHR0cDovL3Bhc3N0aGVqZWxseS5odWJwYWdlcy5jb20vaHViL0hvdy10by1LZWVwLVlvdXItQ29tcHV0ZXItVmlydXMtRnJlZYACAakC3Xdcsddkuj6oAwHoA7sC6AO6AvUDAAAAxPUDAABAEOAGi7tr%26ai1%3DBCm9C5H8zUKy0LsGa0AWutYGoBZrz_6gEiq7r-2DAjbcBgMQTEAIYAiDU2agEKAM4AFCLuujwBWDLBLIBGXBhc3N0aGVqZWxseS5odWJwYWdlcy5jb226AQoyNTB4MjUwX2pzyAEB2gFJaHR0cDovL3Bhc3N0aGVqZWxseS5odWJwYWdlcy5jb20vaHViL0hvdy10by1LZWVwLVlvdXItQ29tcHV0ZXItVmlydXMtRnJlZcgCkpD6L6gDAegDuwLoA7oC9QMAAADE9QMAAEAQ4Abi0MQn%26ai2%3DBu54c5H8zUKy0LsGa0AWutYGoBdfx5qgC97Sp-TzAjbcBkL8FEAMYAyDU2agEKAM4AFC_r7UzYMsEsgEZcGFzc3RoZWplbGx5Lmh1YnBhZ2VzLmNvbboBCjI1MHgyNTBfanPIAQHaAUlodHRwOi8vcGFzc3RoZWplbGx5Lmh1YnBhZ2VzLmNvbS9odWIvSG93LXRvLUtlZXAtWW91ci1Db21wdXRlci1WaXJ1cy1GcmVlqQLdd1yx12S6PqgDAegDuwLoA7oC9QMAAADE9QMAAEAQ4Abx5fYO&amp;amp;usg=AFQjCNEunUH9CuuBFmDUJTa5hVse_vySvg&quot; style=&quot;clear: both; color: #666666; display: block; font-size: 9pt; line-height: 1em; outline: none; padding-top: 10px; text-decoration: none; width: 270px;&quot;&gt;Ads by Google&lt;/a&gt;&lt;div class=&quot;cjs_ad cjs_ad_0&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;
&lt;div class=&quot;cjs_titleurl&quot; style=&quot;margin: 0px; padding: 10px 0px 0px;&quot;&gt;
&lt;a class=&quot;cjs_title&quot; href=&quot;http://googleads.g.doubleclick.net/aclk?sa=L&amp;amp;ai=B3gX15H8zUKy0LsGa0AWutYGoBcOx5MYC75ry7gbAjbcBoOAUEAEYASDU2agEKAM4AFC478KkB2DLBLIBGXBhc3N0aGVqZWxseS5odWJwYWdlcy5jb226AQoyNTB4MjUwX2pzyAEB2gFJaHR0cDovL3Bhc3N0aGVqZWxseS5odWJwYWdlcy5jb20vaHViL0hvdy10by1LZWVwLVlvdXItQ29tcHV0ZXItVmlydXMtRnJlZYACAakC3Xdcsddkuj6oAwHoA7sC6AO6AvUDAAAAxPUDAABAEOAGi7tr&amp;amp;num=1&amp;amp;sig=AOD64_13CjjNQ8Bufx_BNC9eHJmYoe-m0A&amp;amp;client=ca-pub-6958755572607374&amp;amp;adurl=http://www.isisasset.com&quot; style=&quot;color: #297cef; font-size: 17px; font-weight: 700; outline: none; text-decoration: none;&quot;&gt;Isis Art Security Systems&lt;/a&gt;&lt;a class=&quot;cjs_url&quot; href=&quot;http://googleads.g.doubleclick.net/aclk?sa=L&amp;amp;ai=B3gX15H8zUKy0LsGa0AWutYGoBcOx5MYC75ry7gbAjbcBoOAUEAEYASDU2agEKAM4AFC478KkB2DLBLIBGXBhc3N0aGVqZWxseS5odWJwYWdlcy5jb226AQoyNTB4MjUwX2pzyAEB2gFJaHR0cDovL3Bhc3N0aGVqZWxseS5odWJwYWdlcy5jb20vaHViL0hvdy10by1LZWVwLVlvdXItQ29tcHV0ZXItVmlydXMtRnJlZYACAakC3Xdcsddkuj6oAwHoA7sC6AO6AvUDAAAAxPUDAABAEOAGi7tr&amp;amp;num=1&amp;amp;sig=AOD64_13CjjNQ8Bufx_BNC9eHJmYoe-m0A&amp;amp;client=ca-pub-6958755572607374&amp;amp;adurl=http://www.isisasset.com&quot; style=&quot;color: #777777; outline: none; text-decoration: none;&quot;&gt;www.isisasset.com&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;cjs_desc&quot; style=&quot;line-height: 18.9px; margin: 0px; padding: 0px;&quot;&gt;
Real-time RFID audit and tracking. Art security &amp;amp; business protection&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;cjs_ad cjs_ad_1&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;
&lt;div class=&quot;cjs_titleurl&quot; style=&quot;margin: 0px; padding: 10px 0px 0px;&quot;&gt;
&lt;a class=&quot;cjs_title&quot; href=&quot;http://googleads.g.doubleclick.net/aclk?sa=L&amp;amp;ai=BCm9C5H8zUKy0LsGa0AWutYGoBZrz_6gEiq7r-2DAjbcBgMQTEAIYAiDU2agEKAM4AFCLuujwBWDLBLIBGXBhc3N0aGVqZWxseS5odWJwYWdlcy5jb226AQoyNTB4MjUwX2pzyAEB2gFJaHR0cDovL3Bhc3N0aGVqZWxseS5odWJwYWdlcy5jb20vaHViL0hvdy10by1LZWVwLVlvdXItQ29tcHV0ZXItVmlydXMtRnJlZcgCkpD6L6gDAegDuwLoA7oC9QMAAADE9QMAAEAQ4Abi0MQn&amp;amp;num=2&amp;amp;sig=AOD64_0OykUJtmzKcDYLrl_3ROGDd-D5Gw&amp;amp;client=ca-pub-6958755572607374&amp;amp;adurl=http://www.millipore.com/viresolvepro&quot; style=&quot;color: #297cef; font-size: 17px; font-weight: 700; outline: none; text-decoration: none;&quot;&gt;Viresolve Pro Solutions&lt;/a&gt;&lt;a class=&quot;cjs_url&quot; href=&quot;http://googleads.g.doubleclick.net/aclk?sa=L&amp;amp;ai=BCm9C5H8zUKy0LsGa0AWutYGoBZrz_6gEiq7r-2DAjbcBgMQTEAIYAiDU2agEKAM4AFCLuujwBWDLBLIBGXBhc3N0aGVqZWxseS5odWJwYWdlcy5jb226AQoyNTB4MjUwX2pzyAEB2gFJaHR0cDovL3Bhc3N0aGVqZWxseS5odWJwYWdlcy5jb20vaHViL0hvdy10by1LZWVwLVlvdXItQ29tcHV0ZXItVmlydXMtRnJlZcgCkpD6L6gDAegDuwLoA7oC9QMAAADE9QMAAEAQ4Abi0MQn&amp;amp;num=2&amp;amp;sig=AOD64_0OykUJtmzKcDYLrl_3ROGDd-D5Gw&amp;amp;client=ca-pub-6958755572607374&amp;amp;adurl=http://www.millipore.com/viresolvepro&quot; style=&quot;color: #777777; outline: none; text-decoration: none;&quot;&gt;www.millipore.com/viresolvepro&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;cjs_desc&quot; style=&quot;line-height: 18.9px; margin: 0px; padding: 0px;&quot;&gt;
Productive. Next Generation. Parvovirus filtration solutions.&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;cjs_ad cjs_ad_2&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;
&lt;div class=&quot;cjs_titleurl&quot; style=&quot;margin: 0px; padding: 10px 0px 0px;&quot;&gt;
&lt;a class=&quot;cjs_title&quot; href=&quot;http://googleads.g.doubleclick.net/aclk?sa=L&amp;amp;ai=Bu54c5H8zUKy0LsGa0AWutYGoBdfx5qgC97Sp-TzAjbcBkL8FEAMYAyDU2agEKAM4AFC_r7UzYMsEsgEZcGFzc3RoZWplbGx5Lmh1YnBhZ2VzLmNvbboBCjI1MHgyNTBfanPIAQHaAUlodHRwOi8vcGFzc3RoZWplbGx5Lmh1YnBhZ2VzLmNvbS9odWIvSG93LXRvLUtlZXAtWW91ci1Db21wdXRlci1WaXJ1cy1GcmVlqQLdd1yx12S6PqgDAegDuwLoA7oC9QMAAADE9QMAAEAQ4Abx5fYO&amp;amp;num=3&amp;amp;sig=AOD64_1_jfWpdvFct6qqn4cV-o9D-Nzmmg&amp;amp;client=ca-pub-6958755572607374&amp;amp;adurl=http://www.3dx-ray.com/security-g&quot; style=&quot;color: #297cef; font-size: 17px; font-weight: 700; outline: none; text-decoration: none;&quot;&gt;X-RAY Security Screening&lt;/a&gt;&amp;nbsp;&lt;a class=&quot;cjs_url&quot; href=&quot;http://googleads.g.doubleclick.net/aclk?sa=L&amp;amp;ai=Bu54c5H8zUKy0LsGa0AWutYGoBdfx5qgC97Sp-TzAjbcBkL8FEAMYAyDU2agEKAM4AFC_r7UzYMsEsgEZcGFzc3RoZWplbGx5Lmh1YnBhZ2VzLmNvbboBCjI1MHgyNTBfanPIAQHaAUlodHRwOi8vcGFzc3RoZWplbGx5Lmh1YnBhZ2VzLmNvbS9odWIvSG93LXRvLUtlZXAtWW91ci1Db21wdXRlci1WaXJ1cy1GcmVlqQLdd1yx12S6PqgDAegDuwLoA7oC9QMAAADE9QMAAEAQ4Abx5fYO&amp;amp;num=3&amp;amp;sig=AOD64_1_jfWpdvFct6qqn4cV-o9D-Nzmmg&amp;amp;client=ca-pub-6958755572607374&amp;amp;adurl=http://www.3dx-ray.com/security-g&quot; style=&quot;color: #777777; outline: none; text-decoration: none;&quot;&gt;www.3dx-ray.com/security-g&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;cjs_desc&quot; style=&quot;line-height: 18.9px; margin: 0px; padding: 0px;&quot;&gt;
Portable &amp;amp; Mobile X-Ray detectors Minimum Time on Target&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;modfloat full&quot; style=&quot;background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 18.883333206176758px; margin: 0px; padding: 0px;&quot;&gt;
&lt;div class=&quot;module moduleText color0&quot; id=&quot;mod_9722265&quot; style=&quot;clear: left; margin: 0px; padding: 0px;&quot;&gt;
&lt;div class=&quot;txtd&quot; id=&quot;txtd_9722265&quot; style=&quot;margin: 0px; padding: 0px; word-wrap: break-word;&quot;&gt;
&lt;div style=&quot;margin-bottom: 0.75em; padding: 0px;&quot;&gt;
To effectively learn how to prevent a virus you must understand a virus and how it operates on your computer. A computer virus is a piece of software, and it is obtained through a download or an attachment that can ruin the functionality or software on your computer. They basically piggyback on real programs, and every time said program runs the virus has an opportunity to reproduce and cause harm.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;module moduleText color0&quot; id=&quot;mod_9722313&quot; style=&quot;clear: left; margin: 0px; padding: 0px;&quot;&gt;
&lt;div class=&quot;txtd&quot; id=&quot;txtd_9722313&quot; style=&quot;margin: 0px; padding: 0px; word-wrap: break-word;&quot;&gt;
&lt;div style=&quot;margin-bottom: 0.75em; padding: 0px;&quot;&gt;
Mal ware comes in different shapes and sizes and to help prevent damage it is important that you understand the various forms they come in so you can take the right precautions to protect your PC.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;module moduleImage&quot; id=&quot;mod_9722680&quot; style=&quot;clear: left; margin: 0px 0px 12px; padding: 0px;&quot;&gt;
&lt;div id=&quot;imgs_9722680&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;
&lt;div id=&quot;img_url_3731978&quot; style=&quot;cursor: pointer; margin: 0px; padding: 0px;&quot;&gt;
&lt;img alt=&quot;&quot; class=&quot;half&quot; height=&quot;221&quot; src=&quot;http://s3.hubimg.com/u/3731978_f260.jpg&quot; style=&quot;border: 0px; display: block; margin-bottom: 5px; margin-left: auto; margin-right: auto; width: 260px;&quot; title=&quot;&quot; width=&quot;260&quot; /&gt;&lt;div class=&quot;halfSlide&quot; style=&quot;margin: 0px auto; padding: 0px; position: relative; width: 260px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;caption_full&quot; id=&quot;img_desc_3731978&quot; style=&quot;color: #888888; font-size: 0.857em; line-height: 1.1em; margin: 2px 0px 7px; padding: 0px 20px; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;module moduleText color0&quot; id=&quot;mod_9722326&quot; style=&quot;clear: left; margin: 0px; padding: 0px;&quot;&gt;
&lt;div class=&quot;txtd&quot; id=&quot;txtd_9722326&quot; style=&quot;margin: 0px; padding: 0px; word-wrap: break-word;&quot;&gt;
&lt;div style=&quot;margin-bottom: 0.75em; padding: 0px;&quot;&gt;
&lt;strong&gt;Email-Viruses:&lt;/strong&gt;&amp;nbsp;These viruses can be very harmful and dangerous and the important thing to know is that you can obtain this virus from simple reading an infected e-mail.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;module moduleText color0&quot; id=&quot;mod_9722434&quot; style=&quot;clear: left; margin: 0px; padding: 0px;&quot;&gt;
&lt;div class=&quot;txtd&quot; id=&quot;txtd_9722434&quot; style=&quot;margin: 0px; padding: 0px; word-wrap: break-word;&quot;&gt;
&lt;ul style=&quot;margin: 0px 0px 0.75em 2em; padding: 0px;&quot;&gt;
&lt;li style=&quot;margin: 0px 0px 0.5em; padding: 0px;&quot;&gt;&lt;em&gt;Prevention:&lt;/em&gt;&amp;nbsp;Use caution, if an e-mail looks suspicious or strange do not read it delete it. Be weary of changes in the vocabulary pattern of your contacts, this can be a great way to spot an e-mail virus. Be sure to make e-mails that look like spam directly into the spam folder.&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;margin-bottom: 0.75em; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;module moduleText color0&quot; id=&quot;mod_9722364&quot; style=&quot;clear: left; margin: 0px; padding: 0px;&quot;&gt;
&lt;div class=&quot;txtd&quot; id=&quot;txtd_9722364&quot; style=&quot;margin: 0px; padding: 0px; word-wrap: break-word;&quot;&gt;
&lt;div style=&quot;margin-bottom: 0.75em; padding: 0px;&quot;&gt;
&lt;strong&gt;Trojan Horse:&amp;nbsp;&lt;/strong&gt;The notorious Trojan Horse can be recalled from history and Hollywood and is something you do not want to find on your computer. Trojans are the masters of disguise, they may claim to be a game or and application, but it can actually do damage when you run them.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;floatclear&quot; style=&quot;background-color: white; clear: both; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 18.883333206176758px; margin: 0px; padding: 0px; width: 520px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;modfloat right&quot; style=&quot;background-color: white; color: #333333; float: right; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 18.883333206176758px; margin: 0px 0px 0.5em 15px; padding: 0px; width: 270px;&quot;&gt;
&lt;div class=&quot;module moduleImage&quot; id=&quot;mod_9722682&quot; style=&quot;margin: 0px 0px 8px; padding: 10px 0px 0px;&quot;&gt;
&lt;div id=&quot;imgs_9722682&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;
&lt;div id=&quot;img_url_3731984&quot; style=&quot;cursor: pointer; margin: 0px; padding: 0px;&quot;&gt;
&lt;img alt=&quot;&quot; class=&quot;half&quot; height=&quot;195&quot; src=&quot;http://s1.hubimg.com/u/3731984_f260.jpg&quot; style=&quot;border: 0px; display: block; margin-bottom: 5px; margin-left: auto; margin-right: auto; width: 260px;&quot; title=&quot;&quot; width=&quot;260&quot; /&gt;&lt;div class=&quot;halfSlide&quot; style=&quot;margin: 0px auto; padding: 0px; position: relative; width: 260px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;caption_half&quot; id=&quot;img_desc_3731984&quot; style=&quot;color: #888888; font-size: 0.8em; line-height: 1.25em; margin: 3px 0px 7px; padding: 0px 10px; text-align: center; width: 240px; word-wrap: break-word;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;modfloat full&quot; style=&quot;background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 18.883333206176758px; margin: 0px; padding: 0px;&quot;&gt;
&lt;div class=&quot;module moduleText color0&quot; id=&quot;mod_9722401&quot; style=&quot;clear: left; margin: 0px; padding: 0px;&quot;&gt;
&lt;div class=&quot;txtd&quot; id=&quot;txtd_9722401&quot; style=&quot;margin: 0px; padding: 0px; word-wrap: break-word;&quot;&gt;
&lt;ul style=&quot;margin: 0px 0px 0.75em 2em; padding: 0px;&quot;&gt;
&lt;li style=&quot;margin: 0px 0px 0.5em; padding: 0px;&quot;&gt;&lt;em&gt;Prevention:&amp;nbsp;&lt;/em&gt;Trojan horses are becoming more common everyday so be sure to use caution when downloading files on the web. Do not download any game files. Trojan horses are very common on fake game downloads. If you must download a file from the internet, research it. Download from trusted websites and only download programs that you know and trust. If a deal like a free game seems to be to good to be true, it probably is. Use wit and common sense to battle these viruses with your prevention immune system.&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;margin-bottom: 0.75em; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;module moduleText color0&quot; id=&quot;mod_9722449&quot; style=&quot;clear: left; margin: 0px; padding: 0px;&quot;&gt;
&lt;div class=&quot;txtd&quot; id=&quot;txtd_9722449&quot; style=&quot;margin: 0px; padding: 0px; word-wrap: break-word;&quot;&gt;
&lt;div style=&quot;margin-bottom: 0.75em; padding: 0px;&quot;&gt;
&lt;strong&gt;Worms:&lt;/strong&gt;&amp;nbsp;We all are aware of the worms that ruin apples and live in the ground, but when talking about computers, worms can sneak in your computer and create chaos. Computer worms use computer networks and security holes to dig its way into your computer. Most worms are harmless, but some have been known to delete files or send documents via email.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;floatclear&quot; style=&quot;background-color: white; clear: both; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 18.883333206176758px; margin: 0px; padding: 0px; width: 520px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;modfloat right&quot; style=&quot;background-color: white; color: #333333; float: right; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 18.883333206176758px; margin: 0px 0px 0.5em 15px; padding: 0px; width: 270px;&quot;&gt;
&lt;div class=&quot;module moduleImage&quot; id=&quot;mod_9722706&quot; style=&quot;margin: 0px 0px 8px; padding: 10px 0px 0px;&quot;&gt;
&lt;div id=&quot;imgs_9722706&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;
&lt;div id=&quot;img_url_3731994&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;
&lt;img alt=&quot;&quot; class=&quot;half&quot; height=&quot;341&quot; src=&quot;http://s3.hubimg.com/u/3731994_f260.jpg&quot; style=&quot;border: 0px; display: block; margin-bottom: 5px; margin-left: auto; margin-right: auto; width: 260px;&quot; title=&quot;&quot; width=&quot;260&quot; /&gt;&lt;/div&gt;
&lt;div class=&quot;caption_half&quot; id=&quot;img_desc_3731994&quot; style=&quot;color: #888888; font-size: 0.8em; line-height: 1.25em; margin: 3px 0px 7px; padding: 0px 10px; text-align: center; width: 240px; word-wrap: break-word;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;modfloat full&quot; style=&quot;background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 18.883333206176758px; margin: 0px; padding: 0px;&quot;&gt;
&lt;div class=&quot;module moduleText color0&quot; id=&quot;mod_9722497&quot; style=&quot;clear: left; margin: 0px; padding: 0px;&quot;&gt;
&lt;div class=&quot;txtd&quot; id=&quot;txtd_9722497&quot; style=&quot;margin: 0px; padding: 0px; word-wrap: break-word;&quot;&gt;
&lt;ul style=&quot;margin: 0px 0px 0.75em 2em; padding: 0px;&quot;&gt;
&lt;li style=&quot;margin: 0px 0px 0.5em; padding: 0px;&quot;&gt;&lt;em&gt;Prevention:&amp;nbsp;&lt;/em&gt;The best way to prevent worms on your computer is to keep your firewall turned on. Make sure you never turn off your fire wall and be aware of icons that might indicate that it is turned off. Keep up to date on security updates. A lot of work goes into making security updates and the people in charge strive to update their software to comply with new and changing worms and Mal ware. Make sure you only obtain these updates from a trusted source. It is becoming more and more common for dangerous software to disguise itself as anti-virus software so stay vigilant. If a pop up comes up saying something like &quot;free anti-virus&quot; do not open it. Use your task manage to close to program.&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;margin-bottom: 0.75em; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;module moduleText color0&quot; id=&quot;mod_9722533&quot; style=&quot;clear: left; margin: 0px; padding: 0px;&quot;&gt;
&lt;div class=&quot;txtd&quot; id=&quot;txtd_9722533&quot; style=&quot;margin: 0px; padding: 0px; word-wrap: break-word;&quot;&gt;
&lt;div style=&quot;margin-bottom: 0.75em; padding: 0px;&quot;&gt;
&lt;strong&gt;Simple tips to be aware of:&amp;nbsp;&lt;/strong&gt;Always use common sense when browsing the internet and never download files that you are not familiar with. When it comes to your anti-virus software, be certain that you invest in a good one and use any that are available to you. Webroot Anti-Virus is a great anti-virus software, and is the one I use on my computer. Depending on your internet provider, you may receive a free version of an anti-virus software such as Macafee. Macafee is not as good as Webroot, but it is nice to have more that one anti-virus. Use it, it is nice to have a back up. Just remember to stay cautious and informed on Mal ware software. You do not need to be an expert to spot dangerous software most will have a different format and look strange.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;module moduleText color0&quot; id=&quot;mod_9722620&quot; style=&quot;clear: left; margin: 0px; padding: 0px;&quot;&gt;
&lt;div class=&quot;txtd&quot; id=&quot;txtd_9722620&quot; style=&quot;margin: 0px; padding: 0px; word-wrap: break-word;&quot;&gt;
&lt;div style=&quot;margin-bottom: 0.75em; padding: 0px;&quot;&gt;
I wish you the best of luck and hope you found this information useful in preventing viruses on you computer.&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 0.75em; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;module moduleLink color1&quot; id=&quot;mod_9788885&quot; style=&quot;clear: left; line-height: 18.883333206176758px; margin: 0px; padding: 0px;&quot;&gt;
&lt;ul style=&quot;margin: 0px 0px 0.75em 2em; padding: 0px;&quot;&gt;
&lt;li style=&quot;margin: 0px 0px 0.5em; padding: 0px;&quot;&gt;&lt;a href=&quot;http://www.webroot.com/En_US/land-3up-wisc-wise-wav.html?rc=4929&amp;amp;s_kwcid=TC|9259|webroot||S|e|5446712120&quot; style=&quot;color: #5d7d9d; outline: none; text-decoration: none;&quot;&gt;Webroot Anti-Virus&lt;/a&gt;&lt;br /&gt;Get access to Webroot Anti-Virus software to keep your computer safe&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div class=&quot;module moduleLink color1&quot; id=&quot;mod_9788903&quot; style=&quot;clear: left; line-height: 18.883333206176758px; margin: 0px; padding: 0px;&quot;&gt;
&lt;ul style=&quot;margin: 0px 0px 0.75em 2em; padding: 0px;&quot;&gt;
&lt;li style=&quot;margin: 0px 0px 0.5em; padding: 0px;&quot;&gt;&lt;a href=&quot;http://www.mcafee.com/us/&quot; style=&quot;color: #5d7d9d; outline: none; text-decoration: none;&quot;&gt;McAfee Antivirus&lt;/a&gt;&lt;br /&gt;Information on the McAfee security system&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div class=&quot;module moduleLink color1&quot; id=&quot;mod_9788931&quot; style=&quot;clear: left; line-height: 18.883333206176758px; margin: 0px; padding: 0px;&quot;&gt;
&lt;ul style=&quot;margin: 0px 0px 0.75em 2em; padding: 0px;&quot;&gt;
&lt;li style=&quot;margin: 0px 0px 0.5em; padding: 0px;&quot;&gt;&lt;a href=&quot;http://www.symantec.com/norton/products/library/article.jsp?aid=virus_tips&quot; style=&quot;color: #5d7d9d; outline: none; text-decoration: none;&quot;&gt;Tips to keep your Computer Virus Free&lt;/a&gt;&lt;br /&gt;Norton article on tips to keep your computer safe and virus prevention.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div class=&quot;module moduleLink color1&quot; id=&quot;mod_9788969&quot; style=&quot;clear: left; line-height: 18.883333206176758px; margin: 0px; padding: 0px;&quot;&gt;
&lt;ul style=&quot;margin: 0px 0px 0.75em 2em; padding: 0px;&quot;&gt;
&lt;li style=&quot;margin: 0px 0px 0.5em; padding: 0px;&quot;&gt;&lt;a href=&quot;http://www.ehow.com/how_11818_rid-computer-virus.html&quot; style=&quot;color: #5d7d9d; outline: none; text-decoration: none;&quot;&gt;How to Get Rid of a Computer Virus | eHow.com&lt;/a&gt;&lt;br /&gt;How to Get Rid of a Computer Virus. Computer viruses come in many forms and can cause various kinds of damage to your system. Fortunately, most viruses are easily dealt with and effective methods for eliminating them are often...&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://antivirus-software2009.blogspot.com/feeds/2584267792867597450/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://antivirus-software2009.blogspot.com/2012/08/how-to-keep-your-computer-virus-free.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/2584267792867597450'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/2584267792867597450'/><link rel='alternate' type='text/html' href='http://antivirus-software2009.blogspot.com/2012/08/how-to-keep-your-computer-virus-free.html' title='How to Keep Your Computer Virus Free'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/02820373220680933314</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3655698400884223479.post-2742198926622683579</id><published>2012-05-25T05:02:00.001-07:00</published><updated>2012-05-25T05:02:45.581-07:00</updated><title type='text'>11 Ways To Prevent Computer Viruses</title><content type='html'>&lt;br /&gt;
&lt;table border=&quot;0&quot; cellpadding=&quot;4&quot; cellspacing=&quot;2&quot; style=&quot;color: black; font-family: Verdana, Arial, Helvetica, sans-serif; text-align: left; width: 635px;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: #eeeeee;&quot;&gt;&lt;span style=&quot;color: blue; font-size: large;&quot;&gt;11 Ways To Prevent Computer Viruses&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: #eeeeee; font-size: 11px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: #eeeeee; font-size: 11px;&quot;&gt;It doesn’t matter if you’ve been on the Internet for five minutes or five years, you’ve probably thought about ways in which you can prevent a computer virus from entering your machine. A virus can compromise your personal information and even destroy your computer completely. Luckily, there are many low cost things you can do to protect yourself and stay one step ahead of the hackers. Here are 11 things you can do to help prevent computer viruses from invading your computer.&lt;/span&gt;&lt;/div&gt;
&lt;span class=&quot;grey-text&quot; style=&quot;background-color: #eeeeee;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-size: 11px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;1&lt;/span&gt;&lt;span style=&quot;font-size: 11px;&quot;&gt;. Install a reliable anti virus program – From the first moment you turn your computer on, you should have a&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://antivirus-software.topchoicereviews.com/bitdefender-review.htm&quot; style=&quot;font-size: 11px;&quot;&gt;trusted anti virus program&lt;/a&gt;&lt;span style=&quot;font-size: 11px;&quot;&gt;&amp;nbsp;by your side. Even if you have a machine that isn’t hooked up to the Internet, a reliable anti virus program is a low cost and common sense addition to any machine. There are even free anti virus programs you can download that work almost as well as industry giants like Norton and McAfee.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;2&lt;/span&gt;&lt;span style=&quot;font-size: 11px;&quot;&gt;. Install&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://spyware-blocker-software.topchoicereviews.com/&quot; style=&quot;font-size: 11px;&quot;&gt;anti-spyware&lt;/a&gt;&lt;span style=&quot;font-size: 11px;&quot;&gt;&amp;nbsp;and anti-malware programs – As good as the best anti virus programs are, they sometimes need a little bit of help. Thankfully, many of the top anti-spyware programs are completely free. Spybot Search and Destroy and CCleaner are just two free programs that can help prevent computer viruses from doing any damage on your machine. As helpful as these programs are, however, you must update them and run them on a regular basis for them to do any good.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;3&lt;/span&gt;&lt;span style=&quot;font-size: 11px;&quot;&gt;. Avoid suspicious websites – A good virus protection program will alert you when you visit a website that attempts to install or run a program on your computer. Many less than reputable adult websites do this, so if you get a warning, don’t go back, you may end up with a bug you can’t get rid of.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;4.&lt;/span&gt;&lt;span style=&quot;font-size: 11px;&quot;&gt; Never Open Email Attachments Without Scanning Them First – The most common way viruses are spread throughout the Internet is still via email. Some attachments, like pictures, now display in emails and don’t require an attachment to be manually opened, but other documents do. Make sure you use an email client that scans all email attachments before you are allowed to open them. This will help prevent computer viruses from getting a foothold on your machine.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;5.&lt;/span&gt;&lt;span style=&quot;font-size: 11px;&quot;&gt; Set up Automatic Scans – Many of the top anti virus programs, as well as the best anti-spyware programs, now have settings that will let them automatically run during down times or in the middle of the night. Of course, your computer must be on for this to happen, but having daily scans run when nothing else is going on is a great way to prevent even the latest computer viruses from sticking around too long.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;6&lt;/span&gt;&lt;span style=&quot;font-size: 11px;&quot;&gt;. Watch Your Downloads – Part of the fun of the Internet is downloading music, movies and other items. However, since these downloads are so massive, it can be easy to sneak a virus along for the ride. Only download these files from trusted sites that you can count on, or, at the very least, scan them before you open them.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;7.&lt;/span&gt;&lt;span style=&quot;font-size: 11px;&quot;&gt; Updates, Updates, Updates – There is a reason why Windows has a feature called Critical Updates. There is an entire branch of Microsoft dedicated to staying one step ahead of the hackers out there so when they manage to fix a possible security loophole, you need to download the patch right away. Help Microsoft help you prevent computer viruses from causing too much trouble.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;8.&lt;/span&gt;&lt;span style=&quot;font-size: 11px;&quot;&gt; Know What To Look For – Even if you are just a casual computer user, you should have an idea of how your machine operates, what normal pop up windows look like and what popular viruses are out there, that way, when your computer begins exhibiting tell tale signs, you’ll know. You can help prevent computer viruses by staying updated and educated.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;9.&lt;/span&gt;&lt;span style=&quot;font-size: 11px;&quot;&gt; Stay Away From Cracked Software – It is so secret that you can download illegal, cracked versions of some programs online. As tempting as it may be, these files are almost always infested with advanced and difficult to detect bugs. Play it safe and get your software from the source.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;10.&lt;/span&gt;&lt;span style=&quot;font-size: 11px;&quot;&gt; Install a Firewall – A firewall is a program that screens incoming Internet and network traffic. Along with your virus program, it can help prevent unauthorized access to your computer.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;11.&lt;/span&gt;&lt;span style=&quot;font-size: 11px;&quot;&gt; Be prepared to Lock Down – If you hear of a virus that is spreading like wildfire through the Internet, make an extra effort to be careful. Don’t open any suspicious emails or accept any downloads for a week or two until your virus protection program has been updated and you are, once again, safe.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://antivirus-software2009.blogspot.com/feeds/2742198926622683579/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://antivirus-software2009.blogspot.com/2012/05/11-ways-to-prevent-computer-viruses.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/2742198926622683579'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/2742198926622683579'/><link rel='alternate' type='text/html' href='http://antivirus-software2009.blogspot.com/2012/05/11-ways-to-prevent-computer-viruses.html' title='11 Ways To Prevent Computer Viruses'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/02820373220680933314</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3655698400884223479.post-7794332692803132376</id><published>2012-05-25T04:55:00.000-07:00</published><updated>2012-06-14T10:28:52.506-07:00</updated><title type='text'>Firewall Protection</title><content type='html'>&lt;i style=&quot;background-color: white; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: x-large;&quot;&gt;Firewall Protection - Why You Need It?&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: #f3f3f3; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: #f3f3f3; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;If your house has an alarm system, surveillance cameras, or any type of security equipment to prevent burglars, then you can compare it to a firewall. A firewall will monitor and limit connections to your computer from the internet and other users. A computer without a firewall is defenseless, and makes it easier for hackers or unwanted programs to invade your computer. There are two types of firewalls, hardware or software.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: #f3f3f3; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;
&lt;span style=&quot;background-color: #f3f3f3;&quot;&gt;Routers are devices that act as hardware firewalls. They prevent other users and unwanted software from entering your network. Routers are not only great for firewalls, but also can be used for sharing and connecting computers to a network. Some people use Network Address Translation (NAT) routers as firewalls, even though NAT routers primary purpose is to share an internet connection with local computers. If you do not have a router firewall, you can use a software firewall that will do the job.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;
&lt;span style=&quot;background-color: #f3f3f3;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;
&lt;span style=&quot;background-color: #f3f3f3;&quot;&gt;There are many software firewalls out there, but only a few are free. Most of the software firewalls are shareware, trials or subscription. Some free versions only have some features and if you want the full package, you will need to pay. Window XP comes with a decent firewall, but you need to make sure you have Service Pack 2 and the latest updates installed.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;
&lt;span style=&quot;background-color: #f3f3f3;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;
&lt;span style=&quot;background-color: #f3f3f3;&quot;&gt;You can check to see if your Windows XP firewall is running by clicking Start / Control Panel / Windows Firewall, or another way is My Computer / Control Panel / Network Connections / Right click your &quot;Local Area Network&quot; and click properties / Click on the Advance tab then click Settings. You can click to turn your windows firewall on or off.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;
&lt;span style=&quot;background-color: #f3f3f3;&quot;&gt;Software firewalls can be very complex as they contain several features. Some of the features are antivirus and antispyware, program control, e-mail protection and privacy control. These features help boost your protection for your computer, since a firewall alone cannot do everything. A disadvantage of having a software firewall instead of a hardware firewall is that it will use your computer&#39;s resources to function. Make sure you have enough memory to prevent your system from crashing. Software firewalls can manage inbound and outbound traffic by placing policies or rules. These policies will allow or reject your programs from accessing the internet, and prevent any unwanted internet programs from invading your computer. These policies are at the owners control and may change any setting as they wish.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;
&lt;span style=&quot;background-color: #f3f3f3;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;
&lt;span style=&quot;background-color: #f3f3f3;&quot;&gt;Firewalls may give the user increased security by protecting your computer from hackers, as opposed to having no firewall. Hackers will try anything to get into your computer by searching through your computer&#39;s ports. Your computer has many ports. They are used to connect to the internet, but sometimes they are left open. Hackers can send a virus or spyware to these ports, and take control of your computer. To prevent this from happening, a firewall will make sure all unused ports are closed.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;
&lt;span style=&quot;background-color: #f3f3f3;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;
&lt;span style=&quot;background-color: #f3f3f3;&quot;&gt;If you plan to access the internet without a firewall, it is like putting your hand in a beehive. The risk of you being stung are high, and it is the same risk for your computer to be hacked. Without a firewall your ports will be opened, and make it vulnerable for hackers. Therefore, choose a proper firewall that suits your needs. For more information, visit my blog&amp;nbsp;&lt;a href=&quot;http://free-computersoftware.blogspot.com/&quot;&gt;PC Software Revealed&lt;/a&gt;&amp;nbsp;for details about the recommended software to keep you computer safe.&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://antivirus-software2009.blogspot.com/feeds/7794332692803132376/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://antivirus-software2009.blogspot.com/2012/05/firewall-protection.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/7794332692803132376'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/7794332692803132376'/><link rel='alternate' type='text/html' href='http://antivirus-software2009.blogspot.com/2012/05/firewall-protection.html' title='Firewall Protection'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/02820373220680933314</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3655698400884223479.post-979482449886954969</id><published>2012-05-25T04:52:00.000-07:00</published><updated>2012-05-25T04:52:24.069-07:00</updated><title type='text'>11 Ways Computer Viruses Are Spread.</title><content type='html'>&lt;br /&gt;
&lt;h1 style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 18px;&quot;&gt;
&lt;span style=&quot;background-color: #eeeeee;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;11 Ways Computer Viruses Are Spread&lt;/span&gt;&lt;/span&gt;&lt;/h1&gt;
&lt;br /&gt;
&lt;span style=&quot;background-color: #1b3b75; color: #dddddd; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: #f3f3f3;&quot;&gt;&lt;span style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;t is the worst nightmare of every computer user: you wake up one day and realize that you have a virus, and you don’t know quite how to get rid of it. Most people these days understand what a virus is and how harmful it can be, but they are still somewhat unsure how computer viruses spread. The truth is that there are dozens of different ways in which a virus can spread from computer to computer, but let’s take a look at the most frequent ways in which people run into viruses, spyware and Trojans on the Internet.&lt;/span&gt;&lt;br style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot; /&gt;&lt;br style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot; /&gt;&lt;span style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;1.&amp;nbsp;&lt;/span&gt;&lt;strong style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;Email attachments.&lt;/strong&gt;&lt;span style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;&amp;nbsp;The world became familiar with the phenomena of email attachments carrying viruses thanks to Microsoft’s Outlook Express automatically opening every attachment to every email you received a few years back. Now that email clients no longer do this, the infection rate from email attachments is significantly lower, but it can still be a common problem. The golden rule is that if you don’t know what an attachment is, don’t open it. To this day, many email users never open attachments, no matter what. You don’t have to take such drastic steps to protect yourself, however; simply use common sense when opening attachments in your email.&lt;/span&gt;&lt;br style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot; /&gt;&lt;br style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot; /&gt;&lt;span style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;2.&amp;nbsp;&lt;/span&gt;&lt;strong style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;Rogue Websites.&lt;/strong&gt;&lt;span style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;&amp;nbsp;It is depressing to know that you may become infected with spyware or a virus by doing nothing more than simply visiting a website, but it is true. Many adult websites, gambling websites and other less than trustworthy websites will attempt to automatically access your computer when you visit them. They often install adware bugs that will cause a flurry of pop ups to appear on your screen. This adware will often allow for other programs with even more nefarious purposes to be installed and before you know it, your computer will be swamped. To stop these rogue websites, adjust the settings on your antivirus software and firewall so that no outside connections can be made and no programs can be installed without your express permission.&lt;/span&gt;&lt;br style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot; /&gt;&lt;br style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot; /&gt;&lt;span style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;3.&amp;nbsp;&lt;/span&gt;&lt;strong style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;Networks.&lt;/strong&gt;&lt;span style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;&amp;nbsp;If your computer is connected to a home network or if your work computer is part of a larger network, you may find yourself with an infection through no fault of your own. Someone else on the network downloaded a bug by accident, and within minutes, the entire network could be infected. There isn’t much you can do to stop these kinds of infections, short of having your network administrator ensure that everyone’s antivirus software is up to date so that the invading bug can be removed as quickly as possible.&lt;/span&gt;&lt;br style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot; /&gt;&lt;br style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot; /&gt;&lt;span style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;4.&amp;nbsp;&lt;/span&gt;&lt;strong style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;Infected Boot disks.&lt;/strong&gt;&lt;span style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;&amp;nbsp;Now that hard drives are obscenely large, the overwhelming percentage of us don’t bother to use boot disks anymore, but a virus can still be spread if an infected disk is in your hard drive and you attempt to restart. When you start your computer, your machine will always check your drives to see if a disk with boot information is present. If one is, your computer will likely automatically attempt to boot from the disk and not from your drive. If a virus is present, it will often be activated and you will become infected. Always know the origin of any disk you put into your drive.&lt;/span&gt;&lt;br style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot; /&gt;&lt;br style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot; /&gt;&lt;span style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;5.&amp;nbsp;&lt;/span&gt;&lt;strong style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;Phishing Schemes.&lt;/strong&gt;&lt;span style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;&amp;nbsp;Learning how computer viruses spread is important to keep yourself, and your personal information, safe online.&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://antivirus-software.topchoicereviews.com/how-to-detect-phishing-scam-sites_199.html&quot; style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;Phishing schemes&lt;/a&gt;&lt;span style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;&amp;nbsp;are one of the chief ways in which people end up with their identity stolen and a computer fill of viruses. A phishing scheme starts when you receive an email from a website claiming to be your bank or credit card company. You are asked to click a link and log in, but the truth is that you’ve just given away all of your personal information. Often times, when you visit these sites, spyware, adware and viruses are automatically installed on your computer (see Rogue Websites, above). Your lender or credit card will often send out a real notice that let’s you know that a phishing scheme is going around. The smartest thing you can do is to simply call your bank or credit card company if you receive an email saying there is a problem with your account instead of blindly following links in your email.&lt;/span&gt;&lt;br style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot; /&gt;&lt;br style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot; /&gt;&lt;span style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;6.&amp;nbsp;&lt;/span&gt;&lt;strong style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;Infected Software.&lt;/strong&gt;&lt;span style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;&amp;nbsp;One of the great things about the Internet is how many free games and programs there are out there, but these free programs often come at a price. Too many rogue websites intentionally infect their freeware (like Kazaa) with trojan viruses so that you unknowingly infect your computer every time you download a free game or piece of software. The key here is to only download freeware or shareware from a trusted source like CNet that always ensures your safety.&lt;/span&gt;&lt;br style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot; /&gt;&lt;br style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot; /&gt;&lt;span style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;7.&amp;nbsp;&lt;/span&gt;&lt;strong style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;Hackers.&lt;/strong&gt;&lt;span style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;&amp;nbsp;The Internet today is a much more law abiding place than it was ten years ago. Not only did most people not have antivirus protection and firewalls that could stop incoming attacks, most people didn’t even know what they were. Today, people understand the value of good online protection, but hackers can still pose a problem if you allow your protection software to lapse. The best way to beat hackers is to ensure that you have a firewall and up to date antivirus software.&lt;/span&gt;&lt;br style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot; /&gt;&lt;br style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot; /&gt;&lt;span style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;8.&amp;nbsp;&lt;/span&gt;&lt;strong style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;Instant Messaging.&lt;/strong&gt;&lt;span style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;&amp;nbsp;It is difficult to find a computer in this day and age that doesn’t have at least one instant messaging service installed on it. Unfortunately, these programs are often targets of hackers who see an easy way to trick people into clicking links that lead them to rogue websites. Common sense can keep you out of trouble, however. Only chat with people you know and never follow links to sites that you don’t recognize. You should easily be able to keep Internet worms, viruses and other bugs at bay.&lt;/span&gt;&lt;br style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot; /&gt;&lt;br style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot; /&gt;&lt;span style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;9.&amp;nbsp;&lt;/span&gt;&lt;strong style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;Fake Anti Virus Software.&lt;/strong&gt;&lt;span style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;&amp;nbsp;This is one of the most frustrating ways to become infected with a virus or worm. There are dozens of anti virus and anti spyware programs you can download for free on the Internet and a surprising number of them actually do exactly the opposite of what they claim. The product websites make outrageous claims that their product can protect you from a whole range of threats, when, in reality, their product will only make things a thousand times worse. Only download antivirus programs from trusted sites or from websites that you know are completely legit.&lt;/span&gt;&lt;br style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot; /&gt;&lt;br style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot; /&gt;&lt;span style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;10.&amp;nbsp;&lt;/span&gt;&lt;strong style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;From Mobile Devices.&lt;/strong&gt;&lt;span style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;&amp;nbsp;A recent story in the newspaper should serve as a wake up call for anyone who is getting ready to plug in a mobile device into their computer for the first time. A family purchased a digital picture frame from a local store and when they attempted to install the software that came with it, they inadvertently infected their computer with a virus. There really is no way to stop such an infection from happening, since we all buy peripherals that work with our computer, but we can ensure that we have the tools ready to go if an infection should happen. Keep your anti virus software up to date at all times and you should be able to wrestle control back from any Internet bug.&lt;/span&gt;&lt;br style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot; /&gt;&lt;br style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot; /&gt;&lt;span style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;11.&amp;nbsp;&lt;/span&gt;&lt;strong style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;Friends and Relatives.&lt;/strong&gt;&lt;span style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;&amp;nbsp;Often times, we are sent viruses through our email from people that we know and trust. The social networking site Facebook has had to battle this very problem when their serves get a bug and automatically send out emails to everyone on the system that are infected. Often times, these emails are extremely generic sounding and come with suspicious attachments, but people often open them anyway since they have come from a friend or from a site they trust, like Facebook. Remember, if you get an attachment with an .exe extension or a .dll, don’t ever open it.&amp;nbsp;&lt;/span&gt;&lt;br style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot; /&gt;&lt;br style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot; /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: #f3f3f3; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;Learning how computer viruses spread is the best way we can put an end to their reign of terror online. It is only with the right knowledge and the best antivirus protection software that Internet users everywhere can beat online bugs for good.&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://antivirus-software2009.blogspot.com/feeds/979482449886954969/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://antivirus-software2009.blogspot.com/2012/05/11-ways-computer-viruses-are-spread.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/979482449886954969'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/979482449886954969'/><link rel='alternate' type='text/html' href='http://antivirus-software2009.blogspot.com/2012/05/11-ways-computer-viruses-are-spread.html' title='11 Ways Computer Viruses Are Spread.'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/02820373220680933314</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3655698400884223479.post-6940357863642606290</id><published>2012-05-25T04:43:00.001-07:00</published><updated>2012-05-25T04:43:18.078-07:00</updated><title type='text'>EMAIL VIRUSES</title><content type='html'>&lt;br /&gt;
&lt;h1 style=&quot;font-family: Tahoma; margin: 0px 0px 5px;&quot;&gt;
&lt;span style=&quot;background-color: #f4f4f4; font-size: x-small;&quot;&gt;&lt;img src=&quot;http://www.secureurpc.com/images/rp_virus.gif&quot; /&gt;&lt;/span&gt;&lt;span style=&quot;background-color: #cccccc; color: blue; font-size: small;&quot;&gt;EMAIL VIRUSES EFFECTING COMPUTER.&lt;/span&gt;&lt;/h1&gt;
&lt;h1 style=&quot;background-color: #f4f4f4; font-family: Tahoma; font-size: 13px; margin: 0px 0px 5px;&quot;&gt;
&lt;span style=&quot;color: red;&quot;&gt;Beware of Email Viruses in Spam - Top Tips to Stay Safe&lt;/span&gt;&lt;/h1&gt;
&lt;span style=&quot;background-color: #f4f4f4; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px;&quot;&gt;Giving you more know how of Email virus is the intent of this article. Internet browsing is not the only pastime for people.&lt;/span&gt;&lt;div class=&quot;cp_gle&quot; style=&quot;background-color: #f4f4f4; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px;&quot;&gt;
&lt;/div&gt;
&lt;span style=&quot;background-color: #f4f4f4; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px;&quot;&gt;Getting connected and using the computer for communication is also a pastime for many. For those who are not web browser savvy you may by now know how to send and receive mails.&lt;/span&gt;&lt;br style=&quot;background-color: #f4f4f4; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px;&quot; /&gt;&lt;br style=&quot;background-color: #f4f4f4; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px;&quot; /&gt;&lt;span style=&quot;background-color: #f4f4f4; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px;&quot;&gt;You may open a mail account and soon you will find so many mails from people you do not seem to know. Sometimes you even find some junk mail from people you seem to know. It is a bad world out there and just beware even if you get a stupid mail that seems to be from your friend do not open it. For now crooks adopt spoofing-A technique by which they use another email id so that you may accept the mail and open it. Phishing is a means used where the &quot;From email id&quot; is spoofed to appear as though it is from your credit card company or your bank. This is to entice you to part with your PIN number and other password with which they will rob your account.&lt;/span&gt;&lt;br style=&quot;background-color: #f4f4f4; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px;&quot; /&gt;&lt;br style=&quot;background-color: #f4f4f4; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px;&quot; /&gt;&lt;span style=&quot;background-color: #f4f4f4; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px;&quot;&gt;Spamming is popular on the net. Advertising companies target your mail box in a means to send adverts across. But that is not all. You may find a variety of annoying and destructive mail or sometimes mail that has attachments. Many times these attachments contain&lt;/span&gt;&lt;ul style=&quot;background-color: #f4f4f4; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px;&quot;&gt;
&lt;li&gt;Worms&lt;/li&gt;
&lt;li&gt;Viruses&lt;/li&gt;
&lt;li&gt;Trojan Horses&lt;/li&gt;
&lt;/ul&gt;
&lt;span style=&quot;background-color: #f4f4f4; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px;&quot;&gt;What is an email virus, worm or Trojan? Email viruses are not viruses in the true sense of the term. They are more Trojans and worms. Normal computer viruses replicate on its own; but Email viruses cannot replicate without human intervention. Yet for all that they have cause major damage and shut down many email systems.&lt;/span&gt;&lt;h4 style=&quot;background-color: #f4f4f4; font-family: Tahoma; font-size: 12px; margin: 8px 0px;&quot;&gt;
&lt;span style=&quot;color: red;&quot;&gt;Means of Infection&lt;/span&gt;&lt;/h4&gt;
&lt;h5 style=&quot;background-color: #f4f4f4; font-family: Tahoma; font-size: 11px; margin: 8px 0px;&quot;&gt;
&lt;span style=&quot;color: red;&quot;&gt;Attachments&lt;/span&gt;&lt;/h5&gt;
&lt;span style=&quot;background-color: #f4f4f4; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px;&quot;&gt;Humans are gullible and it is this gullibility that virus writers use. The only means of infecting your computer via emails is by opening an attachment that contains a Trojan, a worm or a virus. Once you do this you infect your computer and cause the damage the virus or Trojan is supposed to accomplish. If it is a worm then you have caused more extensive damage not only to your self but to all on the internet. A worm is an email sending virus and send emails to all the others using the email id&#39;s from you&#39;re the address book of your mail account. The worm thus uses your mail box to spread to others.&lt;/span&gt;&lt;br style=&quot;background-color: #f4f4f4; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px;&quot; /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h1 style=&quot;background-color: #f4f4f4; font-family: Tahoma; font-size: 13px; margin: 0px 0px 5px;&quot;&gt;
&lt;span style=&quot;color: red;&quot;&gt;Email Sending Virus: Spam Infects You&lt;/span&gt;&lt;/h1&gt;
&lt;span style=&quot;background-color: #f4f4f4; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px;&quot;&gt;Email sending virus-If you know what file extension are then remember this always when opening your mailbox. Any file with extensions&lt;/span&gt;&lt;div class=&quot;cp_gle&quot; style=&quot;background-color: #f4f4f4; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px;&quot;&gt;
&lt;/div&gt;
&lt;span style=&quot;background-color: #f4f4f4; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px;&quot;&gt;.pif, .exe, .com, .vbs, .vb, .bat, .bin, .dot, .reg, .js, .jse, .scr(Trojans), .wmz, .ocx, .wsf, .wmf are dangerous files do not open such attachment if you are not sure. In case you do not know what extensions are just do not open any files if you are not sure who the sender is. Also if you find too many extensions do not open the file. For Example it may look like letter.txt.exe or personal.doc.vbs.&lt;/span&gt;&lt;h4 style=&quot;background-color: #f4f4f4; font-family: Tahoma; font-size: 12px; margin: 8px 0px;&quot;&gt;
&lt;span style=&quot;color: red;&quot;&gt;Email Client Configuration&lt;/span&gt;&lt;/h4&gt;
&lt;span style=&quot;background-color: #f4f4f4; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px;&quot;&gt;Another means of infection is the configuration of your email client. Under any circumstance do not allow any program to &quot;automatically download and run any email attachments&quot;. It may contain viruses that can damage your PC. Also many email clients allow MIME extensions allowing others to encrypt and embed files and send it. Opening files from a sender you do not know can also give you an infection.&amp;nbsp;&lt;/span&gt;&lt;br style=&quot;background-color: #f4f4f4; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px;&quot; /&gt;&lt;br style=&quot;background-color: #f4f4f4; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px;&quot; /&gt;&lt;span style=&quot;background-color: #f4f4f4; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px;&quot;&gt;For most cases it is your email client that you use that cause the most problems. The latest email virus the recent KAK virus (JS/Kak, WScript.Kak, Kakworm, VBS/Kak) exploited a problem in the email client MS-Outlook signatures to spread. This used an ActiveX flaw and spread. Nimda activated on some machines by itself and is a combination of a mass mailer worm and virus.&lt;/span&gt;&lt;h4 style=&quot;background-color: #f4f4f4; font-family: Tahoma; font-size: 12px; margin: 8px 0px;&quot;&gt;
&lt;span style=&quot;color: red;&quot;&gt;Damage&lt;/span&gt;&lt;/h4&gt;
&lt;span style=&quot;background-color: #f4f4f4; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px;&quot;&gt;Email viruses destroy and damage files on computer systems. Most viruses and Trojans are used now-a-days to get financial information that is stored on the computer. Like password and credit card information. Email&#39;s are the easiest way to download Trojans which is then used by crooks to obtain personal information. Some email viruses are capable of producing bulk email or spam by sending itself to all the others that are in your address book. The damage can be extensive and cause a denial of service attack on any email server.&lt;/span&gt;&lt;h4 style=&quot;background-color: #f4f4f4; font-family: Tahoma; font-size: 12px; margin: 8px 0px;&quot;&gt;
&lt;span style=&quot;color: red;&quot;&gt;Prevention&lt;/span&gt;&lt;/h4&gt;
&lt;span style=&quot;background-color: #f4f4f4; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px;&quot;&gt;Email virus detection and email virus protection in the form or email filters are many. Spoofing is used to bypass these filters. Prevention is better than cure and the best way to prevent being infected is&lt;/span&gt;&lt;ul style=&quot;background-color: #f4f4f4; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px;&quot;&gt;
&lt;li&gt;Do not open any mail from people you do not know.&lt;/li&gt;
&lt;li&gt;Do not open any mail that looks suspicious. Even, if you get, a &#39;mail bounce back&#39;, when you have not sent a mail.&lt;/li&gt;
&lt;li&gt;Do not open any attachments if it contains any of the extensions detailed above. Do not open files that have extensions that you do not know about.&lt;/li&gt;
&lt;li&gt;Better not to use an email client. Even if you are using one see that you are able to see the extensions of filenames downloaded. Also disable the signature and auto run features that are exploited by some viruses.&lt;/li&gt;
&lt;li&gt;Get a spam filter or activate it with your mail server such that it filters out spam. Since some spam contain Trojans and viruses that can cause damage.&lt;/li&gt;
&lt;li&gt;Be careful of any file even from known sources run and antivirus scan before attempting to open the document or file.&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 style=&quot;background-color: #f4f4f4; font-family: Tahoma; font-size: 12px; margin: 8px 0px;&quot;&gt;
&lt;span style=&quot;color: red;&quot;&gt;Removal&lt;/span&gt;&lt;/h4&gt;
&lt;ul style=&quot;background-color: #f4f4f4; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px;&quot;&gt;
&lt;li&gt;Removal of the virus is best done by getting an antivirus and running it&lt;/li&gt;
&lt;li&gt;Also regularly update your antivirus as statistics show that one virus is generated every three minutes.&lt;/li&gt;
&lt;li&gt;Get you computer scanned online by a reputed antivirus scanner like PC-Cillin or Bit defender.&lt;/li&gt;
&lt;li&gt;In case of new viruses look up alerts and find out ways used to prevent and remove such email viruses.&lt;/li&gt;
&lt;/ul&gt;
&lt;span style=&quot;background-color: #f4f4f4; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px;&quot;&gt;Over the years quite a few email viruses have turned out to be hoaxes; a search for hoaxes email viruses would turn up with some interesting results. One interesting hoax is the invitation email virus. It says do not open any email with an attached file named invitation. The warning is that the attachment opens an &quot;Olympic Torch&quot; that will burn the whole hard disk. This is untrue but the hoax was very popular and spread rapidly. Just be ever vigilant for any email virus and check out antivirus websites for alerts and hoaxes before passing on any warning.&lt;/span&gt;&lt;br style=&quot;background-color: #f4f4f4; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px;&quot; /&gt;</content><link rel='replies' type='application/atom+xml' href='http://antivirus-software2009.blogspot.com/feeds/6940357863642606290/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://antivirus-software2009.blogspot.com/2012/05/email-viruses.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/6940357863642606290'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/6940357863642606290'/><link rel='alternate' type='text/html' href='http://antivirus-software2009.blogspot.com/2012/05/email-viruses.html' title='EMAIL VIRUSES'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/02820373220680933314</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3655698400884223479.post-60646353645997585</id><published>2012-05-25T04:36:00.001-07:00</published><updated>2012-05-25T05:14:31.872-07:00</updated><title type='text'>COMPUTER VIRUS</title><content type='html'>&lt;br /&gt;
&lt;h1 style=&quot;background-color: #f4f4f4; clear: left; float: left; font-family: Tahoma; font-size: 13px; margin-bottom: 1em; margin-right: 1em; margin-top: 0px;&quot;&gt;
&lt;img src=&quot;http://t1.gstatic.com/images?q=tbn:ANd9GcQNGQ7RXrgvVDvuGoLud_ZHFttQazOjqgnY3gTuJj-omhFp9y-o&quot; style=&quot;background-color: transparent;&quot; /&gt;&lt;/h1&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h1 style=&quot;background-color: #f4f4f4; font-family: Tahoma; font-size: 13px; margin: 0px 0px 5px;&quot;&gt;
What Went Wrong - How Did my System Get Infected with a Virus?&lt;/h1&gt;
&lt;span style=&quot;background-color: #f4f4f4; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px;&quot;&gt;There are a number of warning signs that indicate the presence of a computer virus infection on your computer system.&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;cp_gle&quot; style=&quot;background-color: #f4f4f4; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px;&quot;&gt;
&lt;/div&gt;
&lt;span style=&quot;background-color: #f4f4f4; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px;&quot;&gt;The same symptoms apply to worm infections and Trojans, malicious code often delivered via contaminated email attachments. The major warning sign is a dramatic decrease in your machine&#39;s operating speed, especially if you are connected to a network.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background-color: #f4f4f4; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px;&quot;&gt;Look for strange operating behavior such as flashing drive or modem lights, corrupted or lost files (especially Word documents and Excel spreadsheets), or unusual program messages (for instance messages that say your files are not in the correct format.) Sometimes programs are disabled and will not open or new icons appear on your desktop. Your speakers my play strange sounds or your monitor&#39;s display may be disrupted.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background-color: #f4f4f4; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px;&quot;&gt;Frequent and unexplained systems crashes are common symptoms of virus infection. Sometimes the system will &quot;han&quot; on start-up or will take an unusually long time to start. You may receive &quot;out of memory&quot; messages or be unable to install new programs. But how does a virus infect your computer in the first place?&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h4 style=&quot;background-color: #f4f4f4; font-family: Tahoma; font-size: 12px; margin: 8px 0px;&quot;&gt;

How do Computers become Infected by Viruses?&lt;/h4&gt;
&lt;span style=&quot;background-color: #f4f4f4; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px;&quot;&gt;The simple answer to &quot;how do computer viruses infect your computer&quot; is that you have most probably been tricked into doing something that you shouldn&#39;t have done, thus allowing the virus to be activated and to propagate. Some of the worst virus and worm infections are attributed to email messages.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background-color: #f4f4f4; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px;&quot;&gt;The vast bulk of viruses are distributed as attachments to trick email messages. The best piece of advice anyone can follow to protect themselves from computer viruses is, do not open attachments - especially those with the file extensions .vbs or .exe. If you receive a message with an attachment, even from someone you know, send an email asking what the attachment is about and even if they actually sent it.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background-color: #f4f4f4; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px;&quot;&gt;Many viruses, once activated, send themselves to every email address in the contact list of the infected machine. The virus is designed to appear to be sending benign or useful material or programs. Be suspicious! If you are sending an attachment, clearly state in your message what you are sending (format and content) and expect the same courtesy and caution from your correspondents.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;cp_textarea&quot; style=&quot;background-color: #f4f4f4; background-image: url(http://www.secureurpc.com/images/cp_tiley.gif); background-repeat: repeat no-repeat; display: inline; float: left; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px; margin: 36px 0px 0px; padding-bottom: 20px; width: 620px;&quot;&gt;
&lt;div class=&quot;cp_t&quot; style=&quot;display: inline; float: left; margin: 20px 0px 0px 33px; width: 545px;&quot;&gt;
&lt;h1 style=&quot;font-family: Tahoma; font-size: 13px; line-height: normal; margin: 0px 0px 5px;&quot;&gt;
&amp;nbsp;Some Viruses can Crash you PC. Check out the Types of Viruses&lt;/h1&gt;
People have a very general view that there are many types of computer viruses and are those programs that cause damage or make the system crash.&lt;br /&gt;
&lt;div class=&quot;cp_gle&quot;&gt;
&lt;/div&gt;
Malicious code is the general word used and virus is one type of malicious code. Worms and Trojans are different from computer virus and destructive types of worms are sometimes termed as internet types of virus. Computer viruses have made their mark on the PC&#39;s since the 90&#39;s with different types of viruses causing damage to computers.&lt;br /&gt;
&lt;br /&gt;
The earliest viruses made the most impact as no anti-virus programs were available. The advent of anti-virus programs spelled a death blow to many common types of computer viruses that were written by the various tools to generate types of computer virus. Those who were inept at programming used these various tool to generate the virus. Devious mind always find new ways when they found that the anti-virus software&#39;s were able to disinfect and remove the different types of computer viruses they went on to new methods and that is how Trojans and worms came up.&lt;br /&gt;
&lt;br /&gt;
There are a few main types of computer viruses and these computer virus types are classified below depending upon the infection methods:&lt;br /&gt;
&lt;br /&gt;
&lt;h4 style=&quot;font-family: Tahoma; font-size: 12px; line-height: normal; margin: 8px 0px;&quot;&gt;

Boot sector/Master Boot Record Computer Virus&lt;/h4&gt;
&lt;h5 style=&quot;font-family: Tahoma; font-size: 11px; line-height: normal; margin: 8px 0px;&quot;&gt;

Means of Infection&lt;/h5&gt;
Boot sector is that area of the computer that is accessed when the computer is turned on. A boot sector virus infects this portion. Once the boot sector is infected the virus is loaded into memory when the computer is turned on. This virus then infects boot sectors on floppies or other removable media Master Boot record virus only infects the Master boot record and not the boot sector&lt;br /&gt;
&lt;h5 style=&quot;font-family: Tahoma; font-size: 11px; line-height: normal; margin: 8px 0px;&quot;&gt;

Damage Caused&lt;/h5&gt;
Boot sector viruses gain complete control of the master boot record or the DOS boot sector by replacing the operating system contents with that of its own. This allows the virus to spread fast and cause damage:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;By gaining control of the master boot record and the DOS boot sector the boot sector viruses can sometimes hide the resources that the computer has( the floppy drive even though attached may not be present)&lt;/li&gt;
&lt;li&gt;Some boot sector viruses contain instructions to redirect disk reads.&lt;/li&gt;
&lt;li&gt;Some boot sector viruses move the master boot record to another location causing the system to crash when it boots up. Other boot sector viruses cause damage to the master boot record&lt;/li&gt;
&lt;li&gt;Some boot sector viruses damage the File Allocation Table (FAT) which is the index of all the files on the drive. This causes loss of data&lt;/li&gt;
&lt;/ul&gt;
&lt;h5 style=&quot;font-family: Tahoma; font-size: 11px; line-height: normal; margin: 8px 0px;&quot;&gt;

Removal&lt;/h5&gt;
The best way to remove boot sector virus is to boot the computer with using a clean boot disk and then rewrite the files with the good operating system files on the infected disk. These viruses were very much prevalent in the ninety&#39;s and a host of antivirus programs are now available to detect and clean them effectively.&amp;nbsp;&lt;a href=&quot;http://www.paretologic.com/products/xoftspyse/index.aspx&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;Spyware remover&lt;/span&gt;&lt;/a&gt;&amp;nbsp;helps to keep off the malicious spyware to protect your PC and enhances good performance and speed up your PC.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Continue to :&amp;nbsp;&lt;/b&gt;&lt;a class=&quot;samelink&quot; href=&quot;http://www.secureurpc.com/secureurpc-articles/types-of-viruses.php&quot; style=&quot;color: black;&quot;&gt;Different Types of Viruses&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;img alt=&quot;&quot; height=&quot;18&quot; src=&quot;http://www.secureurpc.com/images/rp_toptips.gif&quot; style=&quot;border: 0px; float: left; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px; margin-top: 15px;&quot; width=&quot;242&quot; /&gt;&lt;br /&gt;
&lt;span class=&quot;lp_links&quot; style=&quot;float: left; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px; margin: 20px 0px 0px 20px; width: 250px;&quot;&gt;&lt;img alt=&quot;&quot; class=&quot;block2bull&quot; height=&quot;6&quot; src=&quot;http://www.secureurpc.com/images/block2_bullet1.gif&quot; style=&quot;border: 0px; clear: left; float: left; margin: 17px 0px 0px;&quot; width=&quot;7&quot; /&gt;&lt;span style=&quot;color: #1189bd; float: left; margin: 12px 0px 0px 10px; width: 203px;&quot;&gt;Boot Sector Virus&lt;/span&gt;&lt;img alt=&quot;&quot; class=&quot;block2bull&quot; height=&quot;6&quot; src=&quot;http://www.secureurpc.com/images/block2_bullet1.gif&quot; style=&quot;border: 0px; clear: left; float: left; margin: 17px 0px 0px;&quot; width=&quot;7&quot; /&gt;&lt;span style=&quot;color: #1189bd; float: left; margin: 12px 0px 0px 10px; width: 203px;&quot;&gt;Browser Hijacker&lt;/span&gt;&lt;img alt=&quot;&quot; class=&quot;block2bull&quot; height=&quot;6&quot; src=&quot;http://www.secureurpc.com/images/block2_bullet1.gif&quot; style=&quot;border: 0px; clear: left; float: left; margin: 17px 0px 0px;&quot; width=&quot;7&quot; /&gt;&lt;span style=&quot;color: #1189bd; float: left; margin: 12px 0px 0px 10px; width: 203px;&quot;&gt;Direct Action Virus&lt;/span&gt;&lt;img alt=&quot;&quot; class=&quot;block2bull&quot; height=&quot;6&quot; src=&quot;http://www.secureurpc.com/images/block2_bullet1.gif&quot; style=&quot;border: 0px; clear: left; float: left; margin: 17px 0px 0px;&quot; width=&quot;7&quot; /&gt;&lt;span style=&quot;color: #1189bd; float: left; margin: 12px 0px 0px 10px; width: 203px;&quot;&gt;File Infector Virus&lt;/span&gt;&lt;img alt=&quot;&quot; class=&quot;block2bull&quot; height=&quot;6&quot; src=&quot;http://www.secureurpc.com/images/block2_bullet1.gif&quot; style=&quot;border: 0px; clear: left; float: left; margin: 17px 0px 0px;&quot; width=&quot;7&quot; /&gt;&lt;span style=&quot;color: #1189bd; float: left; margin: 12px 0px 0px 10px; width: 203px;&quot;&gt;Macro Virus&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;lp_links&quot; style=&quot;float: left; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px; margin: 20px 0px 0px 20px; width: 250px;&quot;&gt;&lt;img alt=&quot;&quot; class=&quot;block2bull&quot; height=&quot;6&quot; src=&quot;http://www.secureurpc.com/images/block2_bullet1.gif&quot; style=&quot;border: 0px; clear: left; float: left; margin: 17px 0px 0px;&quot; width=&quot;7&quot; /&gt;&lt;span style=&quot;color: #1189bd; float: left; margin: 12px 0px 0px 10px; width: 203px;&quot;&gt;Multipartite Virus&lt;/span&gt;&lt;img alt=&quot;&quot; class=&quot;block2bull&quot; height=&quot;6&quot; src=&quot;http://www.secureurpc.com/images/block2_bullet1.gif&quot; style=&quot;border: 0px; clear: left; float: left; margin: 17px 0px 0px;&quot; width=&quot;7&quot; /&gt;&lt;span style=&quot;color: #1189bd; float: left; margin: 12px 0px 0px 10px; width: 203px;&quot;&gt;Polymorphic Virus&lt;/span&gt;&lt;img alt=&quot;&quot; class=&quot;block2bull&quot; height=&quot;6&quot; src=&quot;http://www.secureurpc.com/images/block2_bullet1.gif&quot; style=&quot;border: 0px; clear: left; float: left; margin: 17px 0px 0px;&quot; width=&quot;7&quot; /&gt;&lt;span style=&quot;color: #1189bd; float: left; margin: 12px 0px 0px 10px; width: 203px;&quot;&gt;Resident Virus&lt;/span&gt;&lt;img alt=&quot;&quot; class=&quot;block2bull&quot; height=&quot;6&quot; src=&quot;http://www.secureurpc.com/images/block2_bullet1.gif&quot; style=&quot;border: 0px; clear: left; float: left; margin: 17px 0px 0px;&quot; width=&quot;7&quot; /&gt;&lt;span style=&quot;color: #1189bd; float: left; margin: 12px 0px 0px 10px; width: 203px;&quot;&gt;Web Scripting Virus&lt;/span&gt;&lt;img alt=&quot;&quot; class=&quot;block2bull&quot; height=&quot;6&quot; src=&quot;http://www.secureurpc.com/images/block2_bullet1.gif&quot; style=&quot;border: 0px; clear: left; float: left; margin: 17px 0px 0px;&quot; width=&quot;7&quot; /&gt;&lt;span style=&quot;color: #1189bd; float: left; margin: 12px 0px 0px 10px; width: 203px;&quot;&gt;Trojan horse&lt;/span&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://antivirus-software2009.blogspot.com/feeds/60646353645997585/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://antivirus-software2009.blogspot.com/2012/05/computer-virus.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/60646353645997585'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/60646353645997585'/><link rel='alternate' type='text/html' href='http://antivirus-software2009.blogspot.com/2012/05/computer-virus.html' title='COMPUTER VIRUS'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/02820373220680933314</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3655698400884223479.post-5292309799590225417</id><published>2012-05-25T02:51:00.000-07:00</published><updated>2012-05-25T02:51:10.942-07:00</updated><title type='text'>How to Clean a Laptop&#39;s Virus</title><content type='html'>&lt;br /&gt;
&lt;header class=&quot;header&quot; style=&quot;background-color: white; border: 0px; color: #232323; font-family: Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;h1 class=&quot;articleTitle Heading1&quot; data-module=&quot;article-title&quot; id=&quot;nointelliTXT&quot; style=&quot;border: 0px; font-family: &#39;Museo Slab 500&#39;, serif; font-size: 30px; font-style: inherit; letter-spacing: -1px; line-height: 30px; margin: 0px 0px 5px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
How to Clean a Laptop&#39;s Virus&lt;/h1&gt;
&lt;/header&gt;&lt;footer class=&quot;footer&quot; data-module=&quot;article-author&quot; style=&quot;background-color: white; border: 0px; margin: 0px 0px 15px; outline: 0px; padding: 0px; position: relative; vertical-align: baseline;&quot;&gt;&lt;div class=&quot;AuthorByLine&quot; data-profile=&quot;AuthorProfileContainer&quot; style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;footer class=&quot;AuthorProfileWrap footer&quot; style=&quot;border: 0px; margin: 0px 0px 15px; outline: 0px; padding: 0px; position: relative; vertical-align: baseline;&quot;&gt;&lt;div style=&quot;border: 0px; clear: left; color: #232323; float: left; font-family: inherit; font-size: 13px; font-style: inherit; margin-bottom: 1em; margin-right: 1em; margin-top: 0px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;img alt=&quot;How to Format a Laptop Step-by-Step thumbnail&quot; height=&quot;150&quot; src=&quot;http://img.ehowcdn.com/article-new/ehow/images/a06/08/1a/format-laptop-step_by_step-800x800.jpg&quot; width=&quot;200&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large; text-align: left;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
Laptop viruses range from obnoxious adware trying to sell you junk to serious infections that compromise your laptop&#39;s functionality and security. Many viruses will leave your computer open to further attack, so it&#39;s important not to wait to clean the virus out. Microsoft includes a tool preinstalled on PCs to do the job for you.&lt;/div&gt;
&lt;/span&gt;&lt;div style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;div style=&quot;color: #232323; font-family: inherit; font-style: inherit; text-align: justify;&quot;&gt;
&lt;span style=&quot;color: black; font-family: inherit; font-style: inherit; text-align: left;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: inherit; font-style: inherit; text-align: justify;&quot;&gt;
&lt;h2 class=&quot;Heading2&quot; style=&quot;border: 0px; font-family: &#39;Museo Slab 500&#39;, serif; font-weight: 500; letter-spacing: -1px; margin: 0px; outline: 0px; padding: 0px; text-align: left; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;color: blue; font-size: x-large;&quot;&gt;Instructions:&lt;/span&gt;&lt;/h2&gt;
&lt;section style=&quot;border: 0px; color: black; font-family: Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;ol class=&quot;steps&quot; id=&quot;intelliTxt&quot; style=&quot;border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li class=&quot;section&quot; style=&quot;border: 0px; font-family: inherit; font-style: inherit; list-style: none; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;ul style=&quot;border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li class=&quot;step &quot; style=&quot;border: 0px; font-family: inherit; font-style: inherit; list-style: none; margin: 0px 0px 20px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span class=&quot;stepNumber&quot; style=&quot;border: 0px; color: #0a5b93; float: left; font-family: &#39;Museo Slab 500&#39;, serif; font-size: 28px; font-style: italic; margin: -3px 15px 0px 0px; min-height: 35px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;1&lt;/span&gt;&lt;div class=&quot;stepMeat&quot; style=&quot;border: 0px; font-family: inherit; font-style: inherit; margin: 0px 0px 0px 35px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;div itemprop=&quot;step&quot; style=&quot;border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;div style=&quot;border: 0px; font-family: Georgia; font-size: 15px; font-style: inherit; line-height: 1.5; margin-bottom: 10px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
Run Microsoft&#39;s &quot;Malicious Software Removal Tool.&quot; In Windows XP, click the &quot;Start&quot; button and select &quot;Run.&quot; In Windows Vista and 7, click the &quot;Start&quot; button and type in the search field. In all cases, type &quot;MRT&quot; and click &quot;Enter.&quot;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;step &quot; style=&quot;border: 0px; font-family: inherit; font-style: inherit; list-style: none; margin: 0px 0px 20px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span class=&quot;stepNumber&quot; style=&quot;border: 0px; color: #0a5b93; float: left; font-family: &#39;Museo Slab 500&#39;, serif; font-size: 28px; font-style: italic; margin: -3px 15px 0px 0px; min-height: 35px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;2&lt;/span&gt;&lt;div class=&quot;stepMeat&quot; style=&quot;border: 0px; font-family: inherit; font-style: inherit; margin: 0px 0px 0px 35px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;div itemprop=&quot;step&quot; style=&quot;border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;div style=&quot;border: 0px; font-family: Georgia; font-size: 15px; font-style: inherit; line-height: 1.5; margin-bottom: 10px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
Click the button labeled &quot;Next.&quot;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;googleAd&quot; style=&quot;border: 0px; font-family: inherit; font-style: inherit; list-style: none; margin: -5px 0px 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;div data-type=&quot;adTracking&quot; id=&quot;DMINSTR&quot; name=&quot;&amp;amp;adunit_id=ca-ehow_300x250&amp;amp;ad_unit_type=CNT&amp;amp;ad_unit_network=GAP&amp;amp;revenue_basis=CPC&amp;amp;ad_position=-&amp;amp;revenue_tag=cpu_computer_troubleshooting&quot; style=&quot;border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; type=&quot;adimpression&quot;&gt;
&lt;div id=&quot;GoogleAdsense300x250&quot; style=&quot;border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;div class=&quot;GoogleTextAd GoogleAd300x250&quot; style=&quot;border: 0px; font-family: inherit; font-style: inherit; margin: 0px 0px 20px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;div style=&quot;border: 0px; font-family: inherit; font-style: inherit; line-height: 1.4; margin-bottom: 10px; margin-top: 10px; outline: 0px; padding: 0px; text-align: left; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;color: #0a5b93; font-family: &#39;Museo Slab 500&#39;, serif; font-size: 28px; font-style: italic;&quot;&gt;3 &amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: Georgia; font-size: 15px; font-style: inherit; line-height: 1.5;&quot;&gt;Select &quot;Full Scan.&quot; While this takes longer than the default &quot;Quick Scan,&quot; it gives a better &amp;nbsp;chance of cleaning a laptop&#39;s virus.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;step &quot; style=&quot;border: 0px; font-family: inherit; font-style: inherit; list-style: none; margin: 0px 0px 20px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span class=&quot;stepNumber&quot; style=&quot;border: 0px; color: #0a5b93; float: left; font-family: &#39;Museo Slab 500&#39;, serif; font-size: 28px; font-style: italic; margin: -3px 15px 0px 0px; min-height: 35px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;4&lt;/span&gt;&lt;div class=&quot;stepMeat&quot; style=&quot;border: 0px; font-family: inherit; font-style: inherit; margin: 0px 0px 0px 35px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;div itemprop=&quot;step&quot; style=&quot;border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;div style=&quot;border: 0px; font-family: Georgia; font-size: 15px; font-style: inherit; line-height: 1.5; margin-bottom: 10px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
Click the button labeled &quot;Next.&quot; Wait for the program to complete the scan of your laptop.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;step &quot; style=&quot;border: 0px; font-family: inherit; font-style: inherit; list-style: none; margin: 0px 0px 20px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span class=&quot;stepNumber&quot; style=&quot;border: 0px; color: #0a5b93; float: left; font-family: &#39;Museo Slab 500&#39;, serif; font-size: 28px; font-style: italic; margin: -3px 15px 0px 0px; min-height: 35px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;5&lt;/span&gt;&lt;div class=&quot;stepMeat&quot; style=&quot;border: 0px; font-family: inherit; font-style: inherit; margin: 0px 0px 0px 35px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;div itemprop=&quot;step&quot; style=&quot;border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;div style=&quot;border: 0px; font-family: Georgia; font-size: 15px; font-style: inherit; line-height: 1.5; margin-bottom: 10px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
Follow the prompts that appear to clean any viruses from your laptop.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;step &quot; style=&quot;border: 0px; font-family: inherit; font-style: inherit; list-style: none; margin: 0px 0px 20px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span class=&quot;stepNumber&quot; style=&quot;border: 0px; color: #0a5b93; float: left; font-family: &#39;Museo Slab 500&#39;, serif; font-size: 28px; font-style: italic; margin: -3px 15px 0px 0px; min-height: 35px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;6&lt;/span&gt;&lt;div class=&quot;stepMeat&quot; style=&quot;border: 0px; font-family: inherit; font-style: inherit; margin: 0px 0px 0px 35px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;div itemprop=&quot;step&quot; style=&quot;border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;div style=&quot;border: 0px; font-family: Georgia; font-size: 15px; font-style: inherit; line-height: 1.5; margin-bottom: 10px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
Click the button labeled &quot;Finish.&quot;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;step &quot; style=&quot;border: 0px; font-family: inherit; font-style: inherit; list-style: none; margin: 0px 0px 20px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span class=&quot;stepNumber&quot; style=&quot;border: 0px; color: #0a5b93; float: left; font-family: &#39;Museo Slab 500&#39;, serif; font-size: 28px; font-style: italic; margin: -3px 15px 0px 0px; min-height: 35px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;7&lt;/span&gt;&lt;div class=&quot;stepMeat&quot; style=&quot;border: 0px; font-family: inherit; font-style: inherit; margin: 0px 0px 0px 35px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;div itemprop=&quot;step&quot; style=&quot;border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;div style=&quot;border: 0px; font-family: Georgia; font-size: 15px; font-style: inherit; line-height: 1.5; margin-bottom: 10px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
Restart your computer.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/section&gt;&lt;span style=&quot;border: 0px; font-family: Arial, Helvetica, sans-serif; margin: 0px; outline: 0px; padding: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;h2 class=&quot;Heading2 &quot; style=&quot;border: 0px; font-family: &#39;Museo Slab 500&#39;, serif; font-size: 24px; font-weight: 500; letter-spacing: -1px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span class=&quot;decoration&quot; style=&quot;border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;Tips &amp;amp; Warnings&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;ul style=&quot;border: 0px; color: black; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li class=&quot;tip&quot; style=&quot;border-bottom-style: dotted; border-color: rgb(169, 169, 169); border-width: 0px 0px 1px; font-family: inherit; font-style: inherit; list-style: none; margin: 0px; outline: 0px; padding: 10px 0px; vertical-align: baseline;&quot;&gt;&lt;div class=&quot;tipIcon&quot; style=&quot;background-color: #0a5b93; background-position: 0px -90px; border: 0px; float: left; font-family: inherit; font-size: 13px; font-style: inherit; height: 18px; margin: 12px 0px 0px; outline: 0px; padding: 0px; vertical-align: baseline; width: 20px;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-family: inherit; font-style: inherit; line-height: 1.4; margin-bottom: 10px; margin-left: 40px; margin-top: 10px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
If the virus is preventing your laptop from starting properly, boot it in &quot;Safe Mode.&quot; Press the &quot;F8&quot; key repeatedly as your machine starts up, then arrow down to Safe Mode and click &quot;Enter.&quot;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;span style=&quot;border: 0px; color: black; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/footer&gt;&lt;/div&gt;
&lt;/footer&gt;</content><link rel='replies' type='application/atom+xml' href='http://antivirus-software2009.blogspot.com/feeds/5292309799590225417/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://antivirus-software2009.blogspot.com/2012/05/how-to-clean-laptops-virus.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/5292309799590225417'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/5292309799590225417'/><link rel='alternate' type='text/html' href='http://antivirus-software2009.blogspot.com/2012/05/how-to-clean-laptops-virus.html' title='How to Clean a Laptop&#39;s Virus'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/02820373220680933314</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3655698400884223479.post-212896694721983679</id><published>2012-05-25T02:40:00.000-07:00</published><updated>2012-05-25T02:41:48.811-07:00</updated><title type='text'>INFECTED LAPTOP TO REBUILD LEARN</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;span style=&quot;background-color: white; font-family: Arial, Helvetica, sans-serif; text-align: left;&quot;&gt;&lt;span style=&quot;color: red; font-size: x-large;&quot;&gt;How to Rebuild a Laptop Infected With a Virus&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Knowing how to rebuild your laptop if it&#39;s been infected with a virus may save you the cost of professional help. A virus is a program that infiltrates your&amp;nbsp;&lt;/span&gt;&lt;a class=&quot;itxtrst itxtrsta itxthook&quot; href=&quot;http://www.ehow.com/how_7149244_rebuild-laptop-infected-virus.html#&quot; id=&quot;itxthook0&quot; rel=&quot;nofollow&quot; style=&quot;border-bottom-color: rgb(0, 100, 0); border-bottom-width: 0.1em; border-style: none none solid; bottom: auto; color: darkgreen; cursor: pointer; display: inline !important; float: none !important; left: auto; margin: 0px !important; outline: 0px; padding: 0px 0px 1px; position: static !important; right: auto; top: auto; vertical-align: baseline;&quot;&gt;&lt;span class=&quot;itxtrst itxtrstspan itxthookspan&quot; id=&quot;itxthook0w0&quot; style=&quot;border-bottom-color: transparent; border-bottom-width: 2px; border-style: none none solid; bottom: auto; display: inline; float: none; font-family: inherit; font-style: inherit; left: auto; margin: 0px !important; outline: 0px; padding: 0px !important; position: static; right: auto; top: auto; vertical-align: baseline;&quot;&gt;computer&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&amp;nbsp;and replicates itself. Removing a virus is a relatively easy process and takes less than a minute. There are dozens of free antivirus programs on the Web that are capable of removing a virus.&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;img height=&quot;252&quot; src=&quot;http://img.ehowcdn.com/article-new-intro-modal/ds-photo/93/177/fotolia_331755_XS.jpg&quot; width=&quot;320&quot; /&gt;&lt;br /&gt;
&lt;h2 class=&quot;Heading2&quot; style=&quot;border: 0px; font-family: &#39;Museo Slab 500&#39;, serif; font-weight: 500; letter-spacing: -1px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;color: blue; font-size: x-large;&quot;&gt;Instructions&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;span style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;section style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;ol class=&quot;steps&quot; id=&quot;intelliTxt&quot; style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li class=&quot;section&quot; style=&quot;border: 0px; list-style: none; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;ul style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li class=&quot;step &quot; style=&quot;border: 0px; font-family: inherit; font-size: 13px; font-style: inherit; list-style: none; margin: 0px 0px 20px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span class=&quot;stepNumber&quot; style=&quot;border: 0px; color: #0a5b93; float: left; font-family: &#39;Museo Slab 500&#39;, serif; font-size: 28px; font-style: italic; margin: -3px 15px 0px 0px; min-height: 35px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;1&lt;/span&gt;&lt;div class=&quot;stepMeat&quot; style=&quot;border: 0px; font-family: inherit; font-style: inherit; margin: 0px 0px 0px 35px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;div itemprop=&quot;step&quot; style=&quot;border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;div style=&quot;border: 0px; font-family: Georgia; font-size: 15px; font-style: inherit; line-height: 1.5; margin-bottom: 10px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
Download and install Webroot Spy Sweeper, Malwarebytes or the Microsoft Malicious Software Removal Tool (see Resources).&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;step &quot; style=&quot;border: 0px; font-family: inherit; font-size: 13px; font-style: inherit; list-style: none; margin: 0px 0px 20px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span class=&quot;stepNumber&quot; style=&quot;border: 0px; color: #0a5b93; float: left; font-family: &#39;Museo Slab 500&#39;, serif; font-size: 28px; font-style: italic; margin: -3px 15px 0px 0px; min-height: 35px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;2&lt;/span&gt;&lt;div class=&quot;stepMeat&quot; style=&quot;border: 0px; font-family: inherit; font-style: inherit; margin: 0px 0px 0px 35px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;div itemprop=&quot;step&quot; style=&quot;border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;div style=&quot;border: 0px; font-family: Georgia; font-size: 15px; font-style: inherit; line-height: 1.5; margin-bottom: 10px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
Double-click the icon of your newly installed anitivirus program.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;googleAd&quot; style=&quot;border: 0px; list-style: none; margin: -5px 0px 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;div data-type=&quot;adTracking&quot; id=&quot;DMINSTR&quot; name=&quot;&amp;amp;adunit_id=ca-ehow_300x250&amp;amp;ad_unit_type=CNT&amp;amp;ad_unit_network=GAP&amp;amp;revenue_basis=CPC&amp;amp;ad_position=-&amp;amp;revenue_tag=cpu_computer_troubleshooting&quot; style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; type=&quot;adimpression&quot;&gt;
&lt;div id=&quot;GoogleAdsense300x250&quot; style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;div class=&quot;GoogleTextAd GoogleAd300x250&quot; style=&quot;border: 0px; margin: 0px 0px 20px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;div style=&quot;border: 0px; font-family: inherit; font-size: 13px; font-style: inherit; line-height: 1.4; margin-bottom: 10px; margin-top: 10px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;color: #0a5b93; font-family: &#39;Museo Slab 500&#39;, serif; font-size: 28px; font-style: italic;&quot;&gt;3 &amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: Georgia; font-size: 15px; font-style: inherit; line-height: 1.5;&quot;&gt;Click &quot;Perform Full Scan.&quot;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;step &quot; style=&quot;border: 0px; font-family: inherit; font-size: 13px; font-style: inherit; list-style: none; margin: 0px 0px 20px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span class=&quot;stepNumber&quot; style=&quot;border: 0px; color: #0a5b93; float: left; font-family: &#39;Museo Slab 500&#39;, serif; font-size: 28px; font-style: italic; margin: -3px 15px 0px 0px; min-height: 35px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;4 &amp;nbsp;&lt;/span&gt;&lt;div class=&quot;stepMeat&quot; style=&quot;border: 0px; font-family: inherit; font-style: inherit; margin: 0px 0px 0px 35px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;div itemprop=&quot;step&quot; style=&quot;border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;div style=&quot;border: 0px; font-family: Georgia; font-size: 15px; font-style: inherit; line-height: 1.5; margin-bottom: 10px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
Left-click &quot;Remove Selected&quot; to completely delete the virus from your computer.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;step &quot; style=&quot;border: 0px; font-family: inherit; font-size: 13px; font-style: inherit; list-style: none; margin: 0px 0px 20px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span class=&quot;stepNumber&quot; style=&quot;border: 0px; color: #0a5b93; float: left; font-family: &#39;Museo Slab 500&#39;, serif; font-size: 28px; font-style: italic; margin: -3px 15px 0px 0px; min-height: 35px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;5 &amp;nbsp;&lt;/span&gt;&lt;div class=&quot;stepMeat&quot; style=&quot;border: 0px; font-family: inherit; font-style: inherit; margin: 0px 0px 0px 35px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;div itemprop=&quot;step&quot; style=&quot;border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;div style=&quot;border: 0px; font-family: Georgia; font-size: 15px; font-style: inherit; line-height: 1.5; margin-bottom: 10px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
Restart your laptop. Your laptop should no longer be infected.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/section&gt;&lt;span style=&quot;border: 0px; font-family: Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://antivirus-software2009.blogspot.com/feeds/212896694721983679/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://antivirus-software2009.blogspot.com/2012/05/infected-laptop-to-rebuild-learn.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/212896694721983679'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/212896694721983679'/><link rel='alternate' type='text/html' href='http://antivirus-software2009.blogspot.com/2012/05/infected-laptop-to-rebuild-learn.html' title='INFECTED LAPTOP TO REBUILD LEARN'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/02820373220680933314</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3655698400884223479.post-5944390029735271241</id><published>2012-05-25T02:22:00.002-07:00</published><updated>2012-05-25T02:22:25.126-07:00</updated><title type='text'>Internet Virus Protection Repair</title><content type='html'>&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 16.6pt; margin-bottom: 3.45pt;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;span style=&quot;color: red; font-size: large;&quot;&gt;Help
With: Internet Virus Protection Repair&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 11.1pt; margin-bottom: 6.9pt;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 8.5pt;&quot;&gt;Important
issues regarding Internet Virus Protection Repair: Computer errors occur when
your operating system becomes filled with junk and important files get removed
or corrupted. These types of problems are the consequence of not properly
maintaining your system. If left unchecked these problems can result in
critical system errors, freezes, and even a complete system crash.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 11.1pt; margin-bottom: 6.9pt;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 8.5pt;&quot;&gt;Recommended:
Use the Free Scan to diagnose Internet Virus Protection Repair issues as well
as other problems plaguing your system. Once registered, this tool can repair
the issues that may be causing your system to malfunction while simultaneously
boosting computer speed, optimizing memory, improving protection, and much
more.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 16.6pt; margin-bottom: 3.45pt;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 12.5pt;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;Diagnose
Internet Virus Protection Repair Issues&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;table border=&quot;1&quot; cellpadding=&quot;0&quot; class=&quot;MsoNormalTable&quot; style=&quot;border: 1pt solid rgb(204, 204, 204); width: 546px;&quot;&gt;
 &lt;tbody&gt;
&lt;tr&gt;
  &lt;td style=&quot;background: #334455; border: none; padding: 2.75pt 2.75pt 2.75pt 2.75pt;&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;span style=&quot;color: white; font-family: &amp;quot;Verdana&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 7.0pt; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; text-transform: uppercase;&quot;&gt;DESCRIPTION&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;background: #334455; border: none; padding: 2.75pt 2.75pt 2.75pt 2.75pt;&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;span style=&quot;color: white; font-family: &amp;quot;Verdana&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 7.0pt; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; text-transform: uppercase;&quot;&gt;VERSION&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;background: #334455; border: none; padding: 2.75pt 2.75pt 2.75pt 2.75pt;&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;span style=&quot;color: white; font-family: &amp;quot;Verdana&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 7.0pt; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; text-transform: uppercase;&quot;&gt;ESTIMATED&lt;br /&gt;
  DOWNLOAD&lt;br /&gt;
  TIME&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;background: #334455; border: none; padding: 2.75pt 2.75pt 2.75pt 2.75pt;&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr&gt;
  &lt;td style=&quot;border: none; padding: 3.45pt 5.55pt 3.45pt 5.55pt; width: 168.25pt;&quot; width=&quot;224&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;a href=&quot;http://pcsupportpro.org/download.aspx&quot; target=&quot;_self&quot;&gt;&lt;span style=&quot;color: blue; font-family: &amp;quot;Verdana&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 7.0pt; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-bidi-font-size: 11.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; text-transform: uppercase;&quot;&gt;DOWNLOAD – SCAN FOR INTERNET VIRUS
  PROTECTION REPAIR&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #8e8e8e; font-family: &amp;quot;Verdana&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 7.0pt; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;color: #8e8e8e; font-family: &amp;quot;Verdana&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 7.0pt; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;(Install speedy pc pro optimization tool)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border: none; padding: 3.45pt 5.55pt 3.45pt 5.55pt;&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;span style=&quot;color: #8e8e8e; font-family: &amp;quot;Verdana&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 7.0pt; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Current as of&lt;br /&gt;
  (May 24, 2012)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border: none; padding: 3.45pt 5.55pt 3.45pt 5.55pt;&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;span style=&quot;color: #8e8e8e; font-family: &amp;quot;Verdana&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 7.0pt; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;56k -&amp;gt; 9m&lt;/span&gt;&lt;span style=&quot;color: #8e8e8e; font-family: &amp;quot;Verdana&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 7.0pt; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-bidi-font-size: 11.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;color: #8e8e8e; font-family: &amp;quot;Verdana&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 7.0pt; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;br /&gt;
  512k &amp;lt; 1m&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border: none; padding: 3.45pt 5.55pt 3.45pt 5.55pt; width: 87.9pt;&quot; width=&quot;117&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;a href=&quot;http://pcsupportpro.org/download.aspx&quot; target=&quot;_self&quot;&gt;&lt;span style=&quot;color: windowtext; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;color: blue; font-family: &amp;quot;Verdana&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 8.5pt; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-no-proof: yes; text-transform: uppercase;&quot;&gt;&lt;!--[if gte vml 1]&gt;&lt;v:shapetype
   id=&quot;_x0000_t75&quot; coordsize=&quot;21600,21600&quot; o:spt=&quot;75&quot; o:preferrelative=&quot;t&quot;
   path=&quot;m@4@5l@4@11@9@11@9@5xe&quot; filled=&quot;f&quot; stroked=&quot;f&quot;&gt;
   &lt;v:stroke joinstyle=&quot;miter&quot;/&gt;
   &lt;v:formulas&gt;
    &lt;v:f eqn=&quot;if lineDrawn pixelLineWidth 0&quot;/&gt;
    &lt;v:f eqn=&quot;sum @0 1 0&quot;/&gt;
    &lt;v:f eqn=&quot;sum 0 0 @1&quot;/&gt;
    &lt;v:f eqn=&quot;prod @2 1 2&quot;/&gt;
    &lt;v:f eqn=&quot;prod @3 21600 pixelWidth&quot;/&gt;
    &lt;v:f eqn=&quot;prod @3 21600 pixelHeight&quot;/&gt;
    &lt;v:f eqn=&quot;sum @0 0 1&quot;/&gt;
    &lt;v:f eqn=&quot;prod @6 1 2&quot;/&gt;
    &lt;v:f eqn=&quot;prod @7 21600 pixelWidth&quot;/&gt;
    &lt;v:f eqn=&quot;sum @8 21600 0&quot;/&gt;
    &lt;v:f eqn=&quot;prod @7 21600 pixelHeight&quot;/&gt;
    &lt;v:f eqn=&quot;sum @10 21600 0&quot;/&gt;
   &lt;/v:formulas&gt;
   &lt;v:path o:extrusionok=&quot;f&quot; gradientshapeok=&quot;t&quot; o:connecttype=&quot;rect&quot;/&gt;
   &lt;o:lock v:ext=&quot;edit&quot; aspectratio=&quot;t&quot;/&gt;
  &lt;/v:shapetype&gt;&lt;v:shape id=&quot;Picture_x0020_1&quot; o:spid=&quot;_x0000_i1025&quot; type=&quot;#_x0000_t75&quot;
   alt=&quot;http://pcsupportpro.org/Images/download_arrow.png&quot;
   href=&quot;http://pcsupportpro.org/download.aspx&quot; target=&quot;&amp;quot;_self&amp;quot;&quot;
   style=&#39;width:12.75pt;height:15.75pt;visibility:visible;mso-wrap-style:square&#39;
   o:button=&quot;t&quot;&gt;
   &lt;v:fill o:detectmouseclick=&quot;t&quot;/&gt;
   &lt;v:imagedata src=&quot;file:///C:\Users\user\AppData\Local\Temp\msohtmlclip1\01\clip_image001.png&quot;
    o:title=&quot;download_arrow&quot;/&gt;
  &lt;/v:shape&gt;&lt;![endif]--&gt;&lt;!--[if !vml]--&gt;&lt;img alt=&quot;http://pcsupportpro.org/Images/download_arrow.png&quot; border=&quot;0&quot; height=&quot;21&quot; src=&quot;file:///C:/Users/user/AppData/Local/Temp/msohtmlclip1/01/clip_image002.jpg&quot; v:shapes=&quot;Picture_x0020_1&quot; width=&quot;17&quot; /&gt;&lt;!--[endif]--&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: blue; font-family: &amp;quot;Verdana&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 8.5pt; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-bidi-font-size: 11.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; text-transform: uppercase;&quot;&gt;&amp;nbsp;DOWNLOAD&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #8e8e8e; font-family: &amp;quot;Verdana&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 8.5pt; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 11.1pt; margin-bottom: 6.9pt;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 8.5pt;&quot;&gt;Important
(depending on your browser settings): when prompted, click &quot;Save&quot; to
save the installer to your computer or &quot;Run&quot; to save and begin the
installation process. Once installed use the FREE SCAN to search for system
deficiencies and Internet Virus Protection Repair related issues. (Note: some
advanced computer issues may require additional technical assistance)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;textmidtitle&quot; style=&quot;line-height: 16.6pt; margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;span style=&quot;color: lime;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 9.5pt;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;b style=&quot;line-height: 16.6pt;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 9.5pt;&quot;&gt;Fix
System Errors&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;text&quot; style=&quot;line-height: 11.1pt; margin-bottom: 6.9pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 8.5pt;&quot;&gt;Many computer problems start in the Windows
registry. This complicated database contains valuable information about
settings, preferences and relationships. With software installations and
uninstalls, it can grow large, unwieldy, unstable and corrupt. This can result
in erratic performance, freezes, crashes and a slow computer.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;text&quot; style=&quot;line-height: 11.1pt; margin-bottom: 6.9pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 8.5pt;&quot;&gt;SpeedyPC Pro safely and thoroughly cleans
the Windows registry to rid it of errors that drastically affect computer
performance. It focuses on such areas as ActiveX entries, shared DLLs (dynamic
link library), uninstall entries, font entries, applications paths, file/path
references, program shortcuts, file associations and much more.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;textmidtitle&quot; style=&quot;line-height: 16.6pt; margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 9.5pt;&quot;&gt;&lt;span style=&quot;color: lime;&quot;&gt;Improve
Performance and Startup Times&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;text&quot; style=&quot;line-height: 11.1pt; margin-bottom: 6.9pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 8.5pt;&quot;&gt;When there are too many programs operating
at the same time, your computer can slow down. This is because they are all
fighting over the available resources. In many cases, there are unneeded
processes running. SpeedyPC Pro stops these unwanted processes to improve your
PC’s performance. When you turn on your computer, various programs try to
launch. Some, such as your anti-virus, are needed. Others just take up
resources. SpeedyPC Pro’s Startup Manager helps you stop unneeded programs from
launching when you boot up.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;textmidtitle&quot; style=&quot;line-height: 16.6pt; margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 9.5pt;&quot;&gt;&lt;span style=&quot;color: lime;&quot;&gt;Remove
Viruses and Malware&lt;/span&gt;&lt;span style=&quot;color: #204f79;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;text&quot; style=&quot;line-height: 11.1pt; margin-bottom: 6.9pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 8.5pt;&quot;&gt;Viruses, spyware, adware, keyloggers,
Trojan downloaders and other malicious programs can cause all sorts of
problems. First of all there is their assigned tasks: to spy on you, steal
information, takeover your PC, bring more malware to your machine, and other
devious plans. Secondly, malware interferes with applications you need and
cause may performance issues. SpeedyPC Pro scans for and ejects active malware
that can harm you and your PC.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;texttitle&quot; style=&quot;line-height: 16.6pt; margin-bottom: 3.45pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 12.5pt;&quot;&gt;&lt;span style=&quot;color: lime;&quot;&gt;Repair Many PC Problems with
One Tool&lt;/span&gt;&lt;span style=&quot;color: #204f79;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;text&quot; style=&quot;line-height: 11.1pt; margin-bottom: 6.9pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 8.5pt;&quot;&gt;Instead of having to buy many software
programs to fix and clean your computer, you just need SpeedyPC Pro. It has a
wealth of optimization tools and useful utilities. These include:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;title&quot; style=&quot;background: #EEEEEE; line-height: 18.0pt; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 5.55pt; margin-right: 0in; margin-top: 0in; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-indent: -.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: Symbol; font-size: 10pt;&quot;&gt;·&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;span style=&quot;color: blue;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;span dir=&quot;LTR&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 9.5pt;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;Privacy Scanner&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;txt&quot; style=&quot;background: #EEEEEE; line-height: 13.85pt; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 5.55pt; margin-right: 0in; margin-top: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 8.5pt;&quot;&gt;Finds
and erases such private and confidential information as your credit card
numbers, banking info, passwords and Internet browsing history.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;title&quot; style=&quot;background: #EEEEEE; line-height: 18.0pt; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 5.55pt; margin-right: 0in; margin-top: 0in; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-indent: -.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: Symbol; font-size: 10pt;&quot;&gt;·&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;span style=&quot;color: blue;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;span dir=&quot;LTR&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 9.5pt;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;Disk Defragmenter&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;txt&quot; style=&quot;background: #EEEEEE; line-height: 13.85pt; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 5.55pt; margin-right: 0in; margin-top: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 8.5pt;&quot;&gt;Optimizes
memory by rearranging storage so that parts of the same file are all saved in
contiguous locations to improve speed.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;title&quot; style=&quot;background: #EEEEEE; line-height: 18.0pt; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 5.55pt; margin-right: 0in; margin-top: 0in; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-indent: -.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: Symbol; font-size: 10pt;&quot;&gt;·&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;span style=&quot;color: blue;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;span dir=&quot;LTR&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 9.5pt;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;File Manager&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;txt&quot; style=&quot;background: #EEEEEE; line-height: 13.85pt; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 5.55pt; margin-right: 0in; margin-top: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 8.5pt;&quot;&gt;Finds
the programs you need to open a wide variety of file extensions, including
.pdf, .docx, .jpg, .xls, .tiff and many more.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;title&quot; style=&quot;background: #EEEEEE; line-height: 18.0pt; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 5.55pt; margin-right: 0in; margin-top: 0in; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-indent: -.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: Symbol; font-size: 10pt;&quot;&gt;·&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;span style=&quot;color: blue;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;span dir=&quot;LTR&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 9.5pt;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;Clutter Cleaner&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;txt&quot; style=&quot;background: #EEEEEE; line-height: 13.85pt; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 5.55pt; margin-right: 0in; margin-top: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 8.5pt;&quot;&gt;Gets rid
of junk files, temporary items and other unneeded data that just take up space
on your computer.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;title&quot; style=&quot;background: #EEEEEE; line-height: 18.0pt; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 5.55pt; margin-right: 0in; margin-top: 0in; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-indent: -.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: Symbol; font-size: 10pt;&quot;&gt;·&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;span style=&quot;color: blue;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;span dir=&quot;LTR&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 9.5pt;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;Malware Remover&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;txt&quot; style=&quot;background: #EEEEEE; line-height: 13.85pt; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 5.55pt; margin-right: 0in; margin-top: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 8.5pt;&quot;&gt;Scans
deeply to find and oust viruses, spyware and other malicious programs that can
harm you and your PC.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;title&quot; style=&quot;background: #EEEEEE; line-height: 18.0pt; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 5.55pt; margin-right: 0in; margin-top: 0in; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-indent: -.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: Symbol; font-size: 10pt;&quot;&gt;·&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;span style=&quot;color: blue;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;span dir=&quot;LTR&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 9.5pt;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;Registry Cleaner&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;txt&quot; style=&quot;background: #EEEEEE; line-height: 13.85pt; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 5.55pt; margin-right: 0in; margin-top: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 8.5pt;&quot;&gt;Fixes
registry errors, such as ActiveX, Java, DLL and other common problems that
cause poor PC performance.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;title&quot; style=&quot;background: #EEEEEE; line-height: 18.0pt; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 5.55pt; margin-right: 0in; margin-top: 0in; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-indent: -.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: Symbol; font-size: 10pt;&quot;&gt;·&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;span style=&quot;color: blue;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;span dir=&quot;LTR&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 9.5pt;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;Startup Manager&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;txt&quot; style=&quot;background: #EEEEEE; line-height: 13.85pt; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 5.55pt; margin-right: 0in; margin-top: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 8.5pt;&quot;&gt;Gives
you the power to decide which programs should launch when you turn on your PC.
Decreases startup times.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;title&quot; style=&quot;background: #EEEEEE; line-height: 18.0pt; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 5.55pt; margin-right: 0in; margin-top: 0in; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-indent: -.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: Symbol; font-size: 10pt;&quot;&gt;·&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;span style=&quot;color: blue;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;span dir=&quot;LTR&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 9.5pt;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;Performance Problem
Finder&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;txt&quot; style=&quot;background: #EEEEEE; line-height: 13.85pt; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 5.55pt; margin-right: 0in; margin-top: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 8.5pt;&quot;&gt;Locates
unneeded programs and processes that are running, often without your knowledge,
and hogging valuable resources.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;title&quot; style=&quot;background: #EEEEEE; line-height: 18.0pt; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 5.55pt; margin-right: 0in; margin-top: 0in; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-indent: -.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: Symbol; font-size: 10pt;&quot;&gt;·&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;span style=&quot;color: blue;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;span dir=&quot;LTR&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 9.5pt;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;BHO Manager&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;txt&quot; style=&quot;background: #EEEEEE; line-height: 13.85pt; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 5.55pt; margin-right: 0in; margin-top: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 8.5pt;&quot;&gt;Disables
unwanted Browser Helper Objects, also known as plug-ins or add-ons for Internet
Explorer, Firefox, Chrome and other browsers.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;title&quot; style=&quot;background: #EEEEEE; line-height: 18.0pt; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 5.55pt; margin-right: 0in; margin-top: 0in; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-indent: -.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: Symbol; font-size: 10pt;&quot;&gt;·&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;span style=&quot;color: blue;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;span dir=&quot;LTR&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 9.5pt;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;Restore Point Manager&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;txt&quot; style=&quot;background: #EEEEEE; line-height: 13.85pt; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 5.55pt; margin-right: 0in; margin-top: 0in;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 8.5pt;&quot;&gt;Create
restore points for safe cleaning and program installation and removes old ones
to free up disk space.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://antivirus-software2009.blogspot.com/feeds/5944390029735271241/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://antivirus-software2009.blogspot.com/2012/05/internet-virus-protection-repair.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/5944390029735271241'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/5944390029735271241'/><link rel='alternate' type='text/html' href='http://antivirus-software2009.blogspot.com/2012/05/internet-virus-protection-repair.html' title='Internet Virus Protection Repair'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/02820373220680933314</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3655698400884223479.post-7010182604311257764</id><published>2012-05-20T10:32:00.001-07:00</published><updated>2012-05-20T10:32:46.188-07:00</updated><title type='text'>The Barracuda NG Firewall features intelligent.</title><content type='html'>&lt;br /&gt;
&lt;div style=&quot;background-color: white; font-family: verdana, tahoma, arial; font-size: 11px; line-height: 14px; margin-bottom: 10px; margin-top: 3px; padding: 0px;&quot;&gt;
The Barracuda NG Firewall is a family of hardware and virtual appliances designed to protect network infrastructure, improve site-to-site connectivity and simplify administration of network operations. Beyond its powerful network firewall, IPS and VPN technologies, the Barracuda NG Firewall integrates a comprehensive set of next generation firewall technologies, including Layer 7 application control, WAN optimization, Web filtering, anti-virus, anti-spam and network access control enforcement.&lt;/div&gt;
&lt;div class=&quot;sub_head&quot; style=&quot;background-color: #6f6f6f; color: white; font-family: verdana, tahoma, arial; font-size: 11px; font-weight: bold; line-height: 12px; padding: 4px;&quot;&gt;
Central Management Across the Enterprise&lt;/div&gt;
&lt;br style=&quot;background-color: white; font-family: verdana, tahoma, arial; font-size: 11px; line-height: 12px;&quot; /&gt;&lt;div style=&quot;background-color: white; font-family: verdana, tahoma, arial; font-size: 11px; line-height: 14px; margin-bottom: 10px; margin-top: 3px; padding: 0px;&quot;&gt;
With hardware models ranging from the micro branch office up to the large headquarters and datacenters, and a corresponding offering of virtual appliances, the Barracuda NG Firewall is designed for deployment across the entire enterprise. Through the Barracuda NG Control Center, administrators can manage security, content and traffic management policies from a single interface. Centralized management of security and content policy provides a number of benefits, including:&lt;/div&gt;
&lt;ul style=&quot;background-color: white; font-family: verdana, tahoma, arial; font-size: 11px; line-height: 12px; list-style-image: initial; list-style-position: initial; margin: 5px 0px 5px 35px; padding: 0px;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;line-height: 14px; text-align: left;&quot;&gt;Consistent security posture and policy enforcement across the enterprise&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;line-height: 14px; margin: 2px 0px;&quot;&gt;Real-time accounting and reporting across multiple gateways&lt;/li&gt;
&lt;li style=&quot;line-height: 14px; margin: 2px 0px;&quot;&gt;Comprehensive history and rollback of configuration and policy changes across the network&lt;/li&gt;
&lt;li style=&quot;line-height: 14px; margin: 2px 0px;&quot;&gt;Centralized version control of anti-spam, anti-virus, Web filter and network access control updates&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: verdana, tahoma, arial;&quot;&gt;&lt;span style=&quot;font-size: 11px; line-height: 14px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKikFKy0WIMtgk7G45kTEeTLNroWiaAo0iG06sCpDqf0ow2OS5k05iOLl4ykNQ0znW38ONMKs2hBeAMDklrd4tOb0JLm6l1rBMLpbaSEGSU5FOIzw6h-NN-WjjjvJf9JUJBo4tpm9dLl8/s1600/deployment_thumbnail.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;275&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKikFKy0WIMtgk7G45kTEeTLNroWiaAo0iG06sCpDqf0ow2OS5k05iOLl4ykNQ0znW38ONMKs2hBeAMDklrd4tOb0JLm6l1rBMLpbaSEGSU5FOIzw6h-NN-WjjjvJf9JUJBo4tpm9dLl8/s640/deployment_thumbnail.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div class=&quot;sub_head&quot; style=&quot;background-color: #6f6f6f; color: white; font-family: verdana, tahoma, arial; font-size: 11px; font-weight: bold; line-height: 12px; padding: 4px;&quot;&gt;
Intelligent Traffic Management&lt;/div&gt;
&lt;br style=&quot;background-color: white; font-family: verdana, tahoma, arial; font-size: 11px; line-height: 12px;&quot; /&gt;&lt;div style=&quot;background-color: white; font-family: verdana, tahoma, arial; font-size: 11px; line-height: 14px; margin-bottom: 10px; margin-top: 3px; padding: 0px;&quot;&gt;
The Barracuda NG Firewall features intelligent site-to-site traffic management capabilities that optimize both availability and performance of the wide area network. Administrators can control application-level routing and prioritization of traffic across multiple links, tunnels and traffic conditions. Supported link types include dedicated lines, xDSL, 3G wireless mobile networks, and any other link types presented as a copper or optical Ethernet link.&lt;/div&gt;
&lt;div class=&quot;sub_head&quot; style=&quot;background-color: #6f6f6f; color: white; font-family: verdana, tahoma, arial; font-size: 11px; font-weight: bold; line-height: 12px; padding: 4px;&quot;&gt;
Stops Threats and Reduces Administrative Overhead&lt;/div&gt;
&lt;br style=&quot;background-color: white; font-family: verdana, tahoma, arial; font-size: 11px; line-height: 12px;&quot; /&gt;&lt;div style=&quot;background-color: white; font-family: verdana, tahoma, arial; font-size: 11px; line-height: 14px; margin-bottom: 10px; margin-top: 3px; padding: 0px;&quot;&gt;
The Barracuda NG Firewall is an application-aware firewall solution designed to mitigate threats, enforce policies and optimize traffic flow - resulting in ultra reliable WAN links. As an added benefit, industry leading, centralized management provides visibility of the entire network, reducing administrative overhead and in line costs.&lt;/div&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://antivirus-software2009.blogspot.com/feeds/7010182604311257764/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://antivirus-software2009.blogspot.com/2012/05/barracuda-ng-firewall-features.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/7010182604311257764'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/7010182604311257764'/><link rel='alternate' type='text/html' href='http://antivirus-software2009.blogspot.com/2012/05/barracuda-ng-firewall-features.html' title='The Barracuda NG Firewall features intelligent.'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/02820373220680933314</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKikFKy0WIMtgk7G45kTEeTLNroWiaAo0iG06sCpDqf0ow2OS5k05iOLl4ykNQ0znW38ONMKs2hBeAMDklrd4tOb0JLm6l1rBMLpbaSEGSU5FOIzw6h-NN-WjjjvJf9JUJBo4tpm9dLl8/s72-c/deployment_thumbnail.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3655698400884223479.post-4024133899935739072</id><published>2012-05-20T10:25:00.000-07:00</published><updated>2012-05-20T10:25:19.379-07:00</updated><title type='text'>The Barracuda Web Filter</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;background-color: white; font-family: verdana, tahoma, arial; font-size: 11px; line-height: 14px;&quot;&gt;The Barracuda Web Filter is an integrated content filtering, application blocking and malware protection solution that is powerful, easy to use and affordable for businesses of all sizes. It enforces Internet usage policies by blocking access to Web sites and Internet applications that are not related to business, and it easily and completely eliminates spyware and other forms of malware from your organization. No more productivity loss trying to repair computers or make computers usable again.&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;5&quot; style=&quot;background-color: white; color: black; font-family: verdana, tahoma, arial; font-size: 11px; line-height: 12px; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td&gt;&lt;ul style=&quot;list-style-image: initial; list-style-position: initial; margin: 5px 0px 5px 35px; padding: 0px;&quot;&gt;
&lt;li style=&quot;line-height: 14px; margin: 2px 0px;&quot;&gt;Blocks access to Web sites based on domain, URL pattern, or content category&lt;/li&gt;
&lt;li style=&quot;line-height: 14px; margin: 2px 0px;&quot;&gt;Blocks downloads based on file type&lt;/li&gt;
&lt;li style=&quot;line-height: 14px; margin: 2px 0px;&quot;&gt;Blocks applications that access the Internet, including IM, music services, and software update utilities&lt;/li&gt;
&lt;li style=&quot;line-height: 14px; margin: 2px 0px;&quot;&gt;Integrates with &quot;safe search&quot; filters built into popular images search engines&lt;/li&gt;
&lt;li style=&quot;line-height: 14px; margin: 2px 0px;&quot;&gt;Provides integrated gateway and desktop spyware protection&lt;/li&gt;
&lt;li style=&quot;line-height: 14px; margin: 2px 0px;&quot;&gt;Uses Barracuda Web Security Agents compatible with Windows PC’s and Macs to enforce Internet policies on off-network computers.&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;b class=&quot;sub_head&quot; style=&quot;background-color: #6f6f6f; color: white; display: block; font-family: verdana, tahoma, arial; font-size: 11px; line-height: 12px; padding: 4px; text-align: left;&quot;&gt;Powerful, Enterprise-Class Solution&lt;/b&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: verdana, tahoma, arial; font-size: 11px; line-height: 12px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: verdana, tahoma, arial; font-size: 11px; line-height: 14px; margin-bottom: 10px; margin-top: 3px; padding: 0px; text-align: left;&quot;&gt;
The Barracuda Web Filter combines preventative, reactive, and proactive measures to form a complete Web filtering solution. Designed for the enterprise, the Barracuda Web Filter enables you to set up custom policies for particular users and groups across customizable time ranges. The Barracuda Web Filter integrates with popular LDAP directory servers, such as Microsoft Active Directory, for both authentication and group membership information on which to apply custom policies. Sample uses of group policies include:&lt;/div&gt;
&lt;ul style=&quot;background-color: white; font-family: verdana, tahoma, arial; font-size: 11px; line-height: 12px; list-style-image: initial; list-style-position: initial; margin: 5px 0px 5px 35px; padding: 0px;&quot;&gt;
&lt;li style=&quot;line-height: 14px; margin: 2px 0px; text-align: left;&quot;&gt;Restricting access to job board Web sites to only the Human Resources group&lt;/li&gt;
&lt;li style=&quot;line-height: 14px; margin: 2px 0px; text-align: left;&quot;&gt;Defining separate policies for teachers and students at a school&lt;/li&gt;
&lt;li style=&quot;line-height: 14px; margin: 2px 0px; text-align: left;&quot;&gt;Enabling compliance officers unrestricted access to the Web for investigation&lt;/li&gt;
&lt;li style=&quot;line-height: 14px; margin: 2px 0px; text-align: left;&quot;&gt;Providing external instant messaging (e.g., AIM) access only to specific users or groups&lt;/li&gt;
&lt;li style=&quot;line-height: 14px; margin: 2px 0px; text-align: left;&quot;&gt;Restricting personal Web browsing to non-working hours&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;background-color: white; font-family: verdana, tahoma, arial; font-size: 11px; line-height: 14px; margin-bottom: 10px; margin-top: 3px; padding: 0px; text-align: left;&quot;&gt;
For organizations that do not utilize directory servers, policies can be defined for unauthenticated users as a whole, locally defined users and groups, or network IP address ranges.&lt;/div&gt;
&lt;div style=&quot;margin-left: 1em; margin-right: 1em; text-align: left;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsYkB0tQ4z8p8w688aKQ4WHeV5oqTe-kzlj1SFoDFrObPp9LA2cqLiPguoE8gWEVRWa8jKUE6m2P7RmZka1IZ7wG4jU-jF5Puu3oN1pq3-zRE5d8UNjg4LM6HiNRl6-l_OBFEMSyawa28/s1600/byf_architecture_thumbnail.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;/a&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsYkB0tQ4z8p8w688aKQ4WHeV5oqTe-kzlj1SFoDFrObPp9LA2cqLiPguoE8gWEVRWa8jKUE6m2P7RmZka1IZ7wG4jU-jF5Puu3oN1pq3-zRE5d8UNjg4LM6HiNRl6-l_OBFEMSyawa28/s1600/byf_architecture_thumbnail.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;234&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsYkB0tQ4z8p8w688aKQ4WHeV5oqTe-kzlj1SFoDFrObPp9LA2cqLiPguoE8gWEVRWa8jKUE6m2P7RmZka1IZ7wG4jU-jF5Puu3oN1pq3-zRE5d8UNjg4LM6HiNRl6-l_OBFEMSyawa28/s640/byf_architecture_thumbnail.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;strong class=&quot;sub_head&quot; style=&quot;background-color: #6f6f6f; color: white; display: block; font-family: verdana, tahoma, arial; font-size: 11px; line-height: 12px; padding: 4px; text-align: left;&quot;&gt;Best of Breed Spyware Protection&lt;/strong&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: verdana, tahoma, arial; font-size: 11px; line-height: 12px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: verdana, tahoma, arial; font-size: 11px; line-height: 14px; margin-bottom: 10px; margin-top: 3px; padding: 0px; text-align: left;&quot;&gt;
The Barracuda Web Filter employs a unique approach to integrate gateway and desktop spyware protection strategies.&amp;nbsp; &amp;nbsp;In providing Web security at the gateway, the Barracuda Web Filter prevents new spyware and virus infections as they attempt to penetrate the network.&amp;nbsp; In addition, the Barracuda Web Filter facilitates automatic removal of spyware from previously infected Windows computers with the included Barracuda Spyware Removal Tool, an ActiveX control that can be served up automatically upon detection of spyware protocol activity (i.e., “phoning home”). By adaptively targeting those machines that are infected, the Barracuda Web Filter provides widespread protection and removal without requiring preloaded client software on every machine on the network.&lt;/div&gt;
&lt;div style=&quot;background-color: white; margin-bottom: 10px; margin-top: 3px; padding: 0px;&quot;&gt;
&lt;b class=&quot;sub_head&quot; style=&quot;background-color: #6f6f6f; color: white; display: block; font-family: verdana, tahoma, arial; font-size: 11px; line-height: 14px; padding: 4px; text-align: left;&quot;&gt;Easy to Use&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: verdana, tahoma, arial; font-size: 11px; line-height: 14px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: verdana, tahoma, arial; font-size: 11px; line-height: 14px;&quot;&gt;&lt;div style=&quot;text-align: left;&quot;&gt;
With no client software to install and no modifications required to your network, the Barracuda Web Filter is easy to deploy. It has an intuitive user interface for maintenance and monitoring, making it a virtually maintenance-free solution. Even system updates are made automatically by Barracuda Central, an advanced 24/7 security operations center where engineers work continuously to catalog sites used in personal Web browsing and to provide the most effective methods to combat the ever changing spyware variants. Updates are performed hourly so that your Barracuda Web Filter can provide ongoing enforcement of your Internet usage policy and protection of your network.&lt;/div&gt;
&lt;/span&gt;&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;b class=&quot;sub_head&quot; style=&quot;background-color: #6f6f6f; color: white; display: block; font-family: verdana, tahoma, arial; font-size: 11px; line-height: 14px; padding: 4px; text-align: left;&quot;&gt;Affordable&lt;/b&gt;&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: verdana, tahoma, arial; font-size: 11px; line-height: 14px;&quot;&gt;&lt;div style=&quot;text-align: left;&quot;&gt;
Large and small organizations alike demand solutions that are affordable not just today, but also in the future as they grow. With no per user license fee, the Barracuda Web Filter is the most affordable content filtering, application blocking, and anti-spyware solution available&lt;/div&gt;
&lt;/span&gt;&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://antivirus-software2009.blogspot.com/feeds/4024133899935739072/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://antivirus-software2009.blogspot.com/2012/05/barracuda-web-filter.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/4024133899935739072'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/4024133899935739072'/><link rel='alternate' type='text/html' href='http://antivirus-software2009.blogspot.com/2012/05/barracuda-web-filter.html' title='The Barracuda Web Filter'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/02820373220680933314</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsYkB0tQ4z8p8w688aKQ4WHeV5oqTe-kzlj1SFoDFrObPp9LA2cqLiPguoE8gWEVRWa8jKUE6m2P7RmZka1IZ7wG4jU-jF5Puu3oN1pq3-zRE5d8UNjg4LM6HiNRl6-l_OBFEMSyawa28/s72-c/byf_architecture_thumbnail.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3655698400884223479.post-6245909002221526263</id><published>2012-05-20T10:19:00.000-07:00</published><updated>2012-05-20T10:19:02.085-07:00</updated><title type='text'>Protection Layer  Barracuda Spam &amp; Virus Firewall</title><content type='html'>&lt;b style=&quot;background-color: white; font-family: verdana, tahoma, arial; font-size: 15px; line-height: 14px;&quot;&gt;Also available as a&amp;nbsp;&lt;a href=&quot;http://www.barracudanetworks.com/ns/products/vm_spam_overview.php&quot; style=&quot;color: #0066ff; text-decoration: none;&quot;&gt;virtual appliance&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href=&quot;http://www.barracudanetworks.com/ns/products/bess_overview.php?frm=spam&quot; style=&quot;color: #0066ff; text-decoration: none;&quot;&gt;hosted service&lt;/a&gt;.&lt;/b&gt;
&lt;br /&gt;
&lt;b style=&quot;background-color: white; font-family: verdana, tahoma, arial; font-size: 15px; line-height: 14px;&quot;&gt;&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;background-color: white; font-family: verdana, tahoma, arial; font-size: 11px; line-height: 14px;&quot;&gt;The Barracuda Spam &amp;amp; Virus Firewall provides a powerful, easy-to-use and affordable solution for complete protection of an organization’s email infrastructure. It eliminates spam and virus intrusions while safeguarding an organization’s reputation through content inspection based on policy for both inbound and outbound email. Outbound filtering also prevents confidential or sensitive information from being purposely or inadvertently leaked outside the organization.&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;table cellspacing=&quot;0&quot; class=&quot;copy&quot; style=&quot;background-color: white; color: black; font-family: verdana, tahoma, arial; font-size: 11px; line-height: 12px; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td valign=&quot;top&quot;&gt;&lt;ul style=&quot;list-style-image: initial; list-style-position: initial; margin: 5px 0px 5px 35px; padding: 0px;&quot;&gt;
&lt;li style=&quot;line-height: 14px; margin: 2px 0px;&quot;&gt;Anti-spam&lt;/li&gt;
&lt;li style=&quot;line-height: 14px; margin: 2px 0px;&quot;&gt;Anti-virus&lt;/li&gt;
&lt;li style=&quot;line-height: 14px; margin: 2px 0px;&quot;&gt;Anti-spoofing&lt;/li&gt;
&lt;li style=&quot;line-height: 14px; margin: 2px 0px;&quot;&gt;Anti-phishing&lt;/li&gt;
&lt;li style=&quot;line-height: 14px; margin: 2px 0px;&quot;&gt;Anti-spyware (Attachments)&lt;/li&gt;
&lt;li style=&quot;line-height: 14px; margin: 2px 0px;&quot;&gt;Denial of Service&lt;/li&gt;
&lt;li style=&quot;line-height: 14px; margin: 2px 0px;&quot;&gt;Data Leak Prevention&lt;/li&gt;
&lt;li style=&quot;line-height: 14px; margin: 2px 0px;&quot;&gt;Cloud Protection Layer&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;b class=&quot;sub_head&quot; style=&quot;background-color: #6f6f6f; color: white; display: block; line-height: 14px; padding: 4px;&quot;&gt;Powerful, Complete Solution&lt;/b&gt;&lt;b class=&quot;sub_head&quot; style=&quot;color: white; display: block; line-height: 14px; padding: 4px;&quot;&gt;&lt;div style=&quot;color: black; font-weight: normal; margin-bottom: 10px; margin-top: 3px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;The Barracuda Spam &amp;amp; Virus Firewall is compatible with all email servers and can fit into nearly any corporate or small business environment. It is used by small organizations with as few as 10 employees and large organizations with as many as 200,000 employees. A single Barracuda Spam &amp;amp; Virus Firewall handles up to 100,000 active email users. Multiple units can be clustered together for even greater capacity and high availability.&lt;br /&gt;&lt;br /&gt;The Barracuda Spam &amp;amp; Virus Firewall protects your email server with twelve defense layers:&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;ul style=&quot;color: black; font-weight: normal; line-height: 12px; list-style-image: initial; list-style-position: initial; margin: 5px 0px 5px 35px; padding: 0px;&quot;&gt;
&lt;li style=&quot;line-height: 14px; margin: 2px 0px;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Network Denial of Service Protection&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;line-height: 14px; margin: 2px 0px;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Rate Control&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;line-height: 14px; margin: 2px 0px;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;IP Reputation Analysis&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;line-height: 14px; margin: 2px 0px;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Sender Authentication&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;line-height: 14px; margin: 2px 0px;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Recipient Verification&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;line-height: 14px; margin: 2px 0px;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Virus Scanning&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;line-height: 14px; margin: 2px 0px;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Policy (User-specified rules)&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;line-height: 14px; margin: 2px 0px;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Spam Fingerprint Check&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;line-height: 14px; margin: 2px 0px;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Intent Analysis&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;line-height: 14px; margin: 2px 0px;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Image Analysis&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;line-height: 14px; margin: 2px 0px;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Bayesian Analysis&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;line-height: 14px; margin: 2px 0px;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Rule-Based Scoring&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/b&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;div style=&quot;margin-left: 1em; margin-right: 1em; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;margin-left: 1em; margin-right: 1em; text-align: left;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHijlzrsYeGLLnCUa-7syiXpGwMTMJIP3BS5_vjtfSMFKvCl1CB2HPrkyQeaH7l5rcEAhh_fcNldbcoCE2HmeLw_tThPYCYxTUEfykJRvMoSHhDUJCnR1rwrpkQYl4EwweV0Qi5AwpwWQ/s1600/bsf_architecture_thumbnail.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;/a&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHijlzrsYeGLLnCUa-7syiXpGwMTMJIP3BS5_vjtfSMFKvCl1CB2HPrkyQeaH7l5rcEAhh_fcNldbcoCE2HmeLw_tThPYCYxTUEfykJRvMoSHhDUJCnR1rwrpkQYl4EwweV0Qi5AwpwWQ/s1600/bsf_architecture_thumbnail.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;217&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHijlzrsYeGLLnCUa-7syiXpGwMTMJIP3BS5_vjtfSMFKvCl1CB2HPrkyQeaH7l5rcEAhh_fcNldbcoCE2HmeLw_tThPYCYxTUEfykJRvMoSHhDUJCnR1rwrpkQYl4EwweV0Qi5AwpwWQ/s640/bsf_architecture_thumbnail.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;margin-left: 1em; margin-right: 1em; text-align: left;&quot;&gt;
&lt;div style=&quot;background-color: white; font-family: verdana, tahoma, arial; font-size: 11px; line-height: 14px; margin-bottom: 10px; margin-top: 3px; padding: 0px; text-align: -webkit-auto;&quot;&gt;
The Barracuda Spam &amp;amp; Virus Firewall architecture optimizes the processing of each email to maximize performance and process millions of messages per day. Unlike software solutions, the Barracuda Spam &amp;amp; Virus Firewall reduces the load placed on the email server by offloading both spam and virus filtering.&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: verdana, tahoma, arial; font-size: 11px; line-height: 14px; margin-bottom: 10px; margin-top: 3px; padding: 0px; text-align: -webkit-auto;&quot;&gt;
All Barracuda Spam &amp;amp; Virus Firewall models include comprehensive outbound filtering techniques including attachment scanning, virus filtering, rate controls and encryption. These features help organizations to ensure that all outgoing email is legitimate and virus-free.&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: verdana, tahoma, arial; font-size: 11px; line-height: 14px; margin-bottom: 10px; margin-top: 3px; padding: 0px; text-align: -webkit-auto;&quot;&gt;
In addition, Barracuda Spam &amp;amp; Virus Firewall includes email encryption using a cloud-based portal and Data Loss Prevention features like attachment content scanning.&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: verdana, tahoma, arial; font-size: 11px; line-height: 14px; margin-bottom: 10px; margin-top: 3px; padding: 0px; text-align: -webkit-auto;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 10px; margin-top: 3px; padding: 0px;&quot;&gt;
&lt;b class=&quot;sub_head&quot; style=&quot;background-color: #6f6f6f; color: white; display: block; padding: 4px;&quot;&gt;Cloud Protection Layer&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 10px; margin-top: 3px; padding: 0px;&quot;&gt;
Barracuda Spam &amp;amp; Virus Firewall includes a Cloud Protection Layer to stop spam and viruses in the cloud. In this mode, inbound emails are first scanned by the cloud before delivery. The Cloud Protection Layer also features multiple delivery options. If the primary delivery destination is unavailable, then emails are delivered to a secondary destination. If both the primary and secondary destinations are unavailable, then undelivered email is stored for later delivery.&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 10px; margin-top: 3px; padding: 0px;&quot;&gt;
&lt;b class=&quot;sub_head&quot; style=&quot;background-color: #6f6f6f; color: white; display: block; padding: 4px;&quot;&gt;Easy-to-Use&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 10px; margin-top: 3px; padding: 0px;&quot;&gt;
With no software to install or modifications required to existing email systems, installation of the Barracuda Spam &amp;amp; Virus Firewall is quick and easy. Once installed, the system administrator uses the intuitive Web interface for monitoring and maintenance. With Barracuda Energize Updates, the Barracuda Spam &amp;amp; Virus Firewall is continuously updated with the latest spam and virus definitions every hour keeping maintenance to the unit at a minimum and eliminating administrative overhead. Updates are provided by Barracuda Central, an advanced 24x7 security operations center that works to continuously monitor and block the latest Internet threats.&lt;/div&gt;
&lt;b class=&quot;sub_head&quot; style=&quot;background-color: #6f6f6f; color: white; display: block; line-height: 12px; padding: 4px;&quot;&gt;Affordable&lt;/b&gt;&lt;br style=&quot;line-height: 12px;&quot; /&gt;&lt;div style=&quot;margin-bottom: 10px; margin-top: 3px; padding: 0px;&quot;&gt;
At Barracuda Networks, we design and build products not only for their power and ease-of-use, but also for their affordability. With no per user license fees, the Barracuda Spam &amp;amp; Virus Firewall is the most affordable enterprise-class spam and virus solution available&lt;/div&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://antivirus-software2009.blogspot.com/feeds/6245909002221526263/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://antivirus-software2009.blogspot.com/2012/05/protection-layer-barracuda-spam-virus.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/6245909002221526263'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/6245909002221526263'/><link rel='alternate' type='text/html' href='http://antivirus-software2009.blogspot.com/2012/05/protection-layer-barracuda-spam-virus.html' title='Protection Layer  Barracuda Spam &amp; Virus Firewall'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/02820373220680933314</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHijlzrsYeGLLnCUa-7syiXpGwMTMJIP3BS5_vjtfSMFKvCl1CB2HPrkyQeaH7l5rcEAhh_fcNldbcoCE2HmeLw_tThPYCYxTUEfykJRvMoSHhDUJCnR1rwrpkQYl4EwweV0Qi5AwpwWQ/s72-c/bsf_architecture_thumbnail.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3655698400884223479.post-1012622186695485591</id><published>2012-05-10T11:52:00.002-07:00</published><updated>2012-05-10T11:52:49.207-07:00</updated><title type='text'>eScan Unique Selling Points</title><content type='html'>&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgy9_TMguxZObKSTp0sjqWBa536EW9wkiefr43Cv40f4RxkwHNjXEpmcuAp7eGAjR7xgrzmCaKHZcg_uS8yyeeN0ZCoXI90XLdzNwqBbMFwA33zURXwAZRJl2cd3SumSs3FXUU8HCuBZjE/s1600/mwav_toolkit.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; dba=&quot;true&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgy9_TMguxZObKSTp0sjqWBa536EW9wkiefr43Cv40f4RxkwHNjXEpmcuAp7eGAjR7xgrzmCaKHZcg_uS8yyeeN0ZCoXI90XLdzNwqBbMFwA33zURXwAZRJl2cd3SumSs3FXUU8HCuBZjE/s1600/mwav_toolkit.jpg&quot; /&gt;&lt;/a&gt;The following points about eScan are the ones which make the BIGGEST impact on prospective customers:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
eScan Toolkit: eScanAV Anti-Virus Toolkit (MWAV) is part of the eScan product range and it is one of the most popular supporting tools that is given by us. Customers use eScan toolkit for&lt;br /&gt;
&lt;br /&gt;
malware/adware/spyware removal and also for removing the &quot;after-effects&quot; of malware&lt;br /&gt;
&lt;br /&gt;
infection. It is also available as a stand-alone download.&lt;br /&gt;
&lt;br /&gt;
Many forums across the world suggest and use eScanAV Anti-Virus Toolkit (MWAV) for customers who are affected by &quot;strong&quot; infections. As a result of this toolkit, eScan got the highest marks for malware disinfection from AV-Comparatives.&lt;br /&gt;
&lt;br /&gt;
If a customer purchases eScan, he also gets to use this eScanAV Anti-Virus Toolkit (MWAV) on all computers which DO NOT have eScan. The Toolkit is also available as a stand-alone download.&lt;br /&gt;
&lt;br /&gt;&lt;br /&gt;
Endpoint Security: eScan Endpoint Security or device control is a feature which helps customers to secure USB/Flash and other storage devices. Device control also provides for white-listing and device authentication so that users can &quot;disallow&quot; foreign devices from accidentally infecting their systems. Endpoint Security also provides application control, which is used for blocking unauthorized applications.&lt;br /&gt;
&lt;br /&gt;
Lowest memory usage: eScan has one of the lowest memory-footprints (less than 10 MB at idle times) amongst all AV products.&lt;br /&gt;
&lt;br /&gt;&lt;br /&gt;
FREE eScan Remote Support: eScan is the ONLY product in the market to provide the eScan&lt;br /&gt;
&lt;br /&gt;
Remote Support facility, integrated in the software, to help consumers to detect and solve malwarerelated issues, in the fastest possible time-frames.&lt;br /&gt;
&lt;br /&gt;
White-listing: eScan, today, can boast of the fastest scanner because, other than regular malware databases which all vendors provide, we also provide white-listing databases, which ensures that our monitoring only checks for &quot;NEW&quot; unknown files or modified files, and not the regular files.&lt;br /&gt;
&lt;br /&gt;
Malware URL Filter: Socially engineered malware attacks pose one of the largest risks to individuals and organizations alike by threatening to compromise, damage or expose sensitive information. These are web pages with links to applications that appear to be safe and are designed to fool the user into downloading them, like a software update, screen saver application, video codec upgrade, Fake AV, etc. Additionally, the download link delivers a malicious payload whose content type would lead to execution. In other words, the web is increasingly being used to quickly distribute malware and evade traditional security programs.&lt;br /&gt;
&lt;br /&gt;
Considering the above, we have now introduced a new feature within eScan (will be shortly available in real-time updates), which will BLOCK access of users to malicious websites / URLs. Malware URL Filter will further strengthen eScan on End points and will help users and systems-administrators to effectively mitigate loop-holes using which &quot;UNKNOWN&quot; malware enters into computers &amp;amp; networks.&lt;br /&gt;
&lt;br /&gt;
Comprehensive Protection with Virtual Keyboard: eScan provides enhanced Web Protection and Privacy Protection features, such as User-based Parental Control, Pop-up Filter, and Virtual Keyboard. Parental Control and Pop-up Filters are customizable features that would help users block offensive content and Pop-ups, respectively.&lt;br /&gt;
&lt;br /&gt;
eScan also includes an advanced Web Phishing Filter that warns users of Phishing Web Sites. It is also equipped with a Virtual Keyboard to protect the system against keyloggers. Users can use this keyboard while typing sensitive information, such as banking passwords or credit card numbers. &lt;br /&gt;
&lt;br /&gt;
Protection from accidental detections of Operating System files (false-positives) :&lt;br /&gt;
&lt;br /&gt;
In April 2010, McAfee customers all across the world suffered a terrible outage because of a critical Operating System file was wrongly detected as malware by the McAfee engine. This problem will NEVER arise with eScan because, with the help of Microsoft, and our own white-listing database, we will NEVER analyze a clean Operating System file. So the probability of wrongly detecting a good OS file as malware is close to ZERO.&lt;br /&gt;
&lt;br /&gt;
Auto-detection of gaming mode: eScan is the ONLY product which features auto-detection of gaming mode. This means that when a gamer is running a popular game, the product will go into &quot;idle&quot; or &quot;lowpriority&quot; mode so that most of the CPU is given over to the gaming product.&lt;br /&gt;
&lt;br /&gt;
OS Vulnerability checks : Most products in the market DETECT non-presence of critical OS updates and warn the user. eScan is the ONLY product which also automatically DOWNLOADS these OS updates (from Microsoft), if necessary, and REMOVE the vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
Auto and free feature additions during the period of contract: eScan is the ONLY product that gives out new features (as auto-updates) to consumers FREE of cost during the contract period. Other vendors give out feature additions as part of NEW Product releases, for which customers have to pay.&lt;br /&gt;
&lt;br /&gt;
Auto-backup of critical files : eScan is also the ONLY product which provides the feature of autobackup of critical OS and Application files. The auto-backup becomes important if a new variant of a fileinfector (like Virut, Virtob or Sality) infects the system.&lt;br /&gt;
&lt;br /&gt;
Windows Based eScan Rescue Disk : eScan Rescue Disk provides you with a Windows based clean environment that helps you to scan and clean the system and fix the Windows registry changes done by viruses.&lt;br /&gt;
&lt;br /&gt;
Works in Safe Mode : In case of infections, eScan also has the ability to scan and clean in safe mode.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
Customization : With the eScan customization kit, eScan Channel Community can get customer protection by customizing eScan products with their email-ID, website and buy links&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://antivirus-software2009.blogspot.com/feeds/1012622186695485591/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://antivirus-software2009.blogspot.com/2012/05/escan-unique-selling-points.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/1012622186695485591'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3655698400884223479/posts/default/1012622186695485591'/><link rel='alternate' type='text/html' href='http://antivirus-software2009.blogspot.com/2012/05/escan-unique-selling-points.html' title='eScan Unique Selling Points'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/02820373220680933314</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgy9_TMguxZObKSTp0sjqWBa536EW9wkiefr43Cv40f4RxkwHNjXEpmcuAp7eGAjR7xgrzmCaKHZcg_uS8yyeeN0ZCoXI90XLdzNwqBbMFwA33zURXwAZRJl2cd3SumSs3FXUU8HCuBZjE/s72-c/mwav_toolkit.jpg" height="72" width="72"/><thr:total>0</thr:total></entry></feed>