Monthly Archives: March 2009

How to Get Rid Of Antivirus 360: Manual Removal Instructions

adware 3 Since its appearance in December 2008, the infamous Antivirus 360 is still messing up our computers. New variants are coming out everyday.

Antivirus 360, Antivirus360, AV360 or A360, are all the same fake anti-spyware program that only has one purpose: convincing you to buy it with a credit card, and then using your credit card information for more fraud.

All over the help forums, you can read Antivirus 360 victims saying: “Out of nowhere it appeared on my screen and is claiming that I have about 38 threats.”

What these people don’t know is that their computers most likely got infected with the Vundo Trojan when they were visiting a suspicious website or downloading an infected file from a file-sharing network.

Then they will be invaded with pop-ups stating that their computer has a virus and Antivirus 360 must be downloaded to save their systems from harm. And once they open one of these popups, Antivirus 360 is installed.

antivirus-360

Antivirus 360 will automatically start up and scan your system and will list quite a few infections that will stay on your computer unless you purchase the software. These infections are no more than your necessary Windows files that your system will not work without. Also, when Antivirus 360 is running, fake security alerts will constantly popup stating that your computer is vulnerable and needs an antivirus such as Antivirus 360.

The aim of Antivirus 360 with all these bogus infections listing and all these fake security alerts is to scare you into thinking that your computer is dangerously infected while Antivirus 360 is the actual infection.

So, just ignore all these false security alerts and pop-us, and follow these manual removal instructions to get rid of Antivirus 360.

Very important: Don’t forget to make a system and registry backup before this operations. Please read this article on How to back up and restore the registry in Windows.

Step 1

Kill all Antivirus 360 Processes.

1. Open your task manager by pressing “Ctrl + Alt + Del”.

2. Go to the “Processes” tab.

3. Highlight Antivirus 360 Process (in most of cases it’s av360.exe or a360.exe)

4. Click on “End Process”

Now antivirus 360 will not bother you until the next reboot.

Step 2

Find and Remove all Antivirus 360 related files and folders.

1. Press the “Start” button and then click “Search”.

2. Then in the “What do you want to search for?” section, click on “All files and folders”

3. On the Search box, type Antivirus 360 related names (Antivirus 360, Antivirus360, AV360, A360… etc)

4. Click on “Search”.

5. In the results area, delete all the files that you are sure are related to Antivirus 360.

Step 3

Find and Delete all Antivirus 360 related registry entries.

1. Press the “Start” button and then click “Run”.

2. Type in “regedit” into the “Open:” field. Then click on the OK button.

3. Now it opens the Registry Editor.

4. Navigate through the subkeys and edit the Antivirus 360 registry entries. Or, you can press “Ctrl + F” to locate the subkey that contains the antivirus 360 value (F3 to Find Next).

Step 4

Antivirus 360 related registry entries are:

  • Microsoft\Windows\CurrentVersion\Explorer\MenuOrder\Start Menu2\Programs\A360
  • Microsoft\Windows\CurrentVersion\Explorer\MenuOrder\Start Menu2\Programs\Antivirus 360
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “13376694984709702142491016734454
  • HKEY_CURRENT_USER\Software\13376694984709702142491016734454
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{d263fa6d-84cc-48a8-9af6-c664362b7a5b}
  • HKEY_CLASSES_ROOT\CLSID\{d263fa6d-84cc-48a8-9af6-c664362b7a5b}
  • HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2e97f8dfd4426572882394323b23c449

Step 5

Close the registry editor and reboot your computer. If something appears wrong after you change the registry, you can restore the registry from the backup you’ve created.

For detailed instructions check out this Antivirus 360 removal video.

Guest Writer: This is a guest post by Sarah M. of Spyware-Removal-Guide.net – a good resource for malware and spyware manual removal. Pay a visit to Antivirus 360 Manual Removal for more details about this rogue anti-spyware.

The content of this article is copyright 2009 © by Spyware-Removal-Guide.net – All rights reserved.

6 Comments

Filed under Don't Get Hacked, Interconnectivity, internet scams, Malware Advisories, Manual Malware Removal, Rogue Software, Spyware - Adware Protection, Windows Tips and Tools

The Enemy is at the Gate – Common Sense Tips for Internet and System Security

commonsense 3 So what can you add to your computer’s Firewall, Security Applications, and Browser security add-ons to ensure you have the best protection available while you’re surfing the web?

Well, how about something that’s free, and readily available. Something called “Common Sense”.

Common sense: sound and prudent judgment based on a simple perception of the situation or facts. Merriam-Webster’s Online Dictionary

Common Sense Tip #1 – Given the virtual epidemic of malware currently circulating on the Internet, don’t run, or install programs, of unknown origin.

Internet users’ continue to be bombarded with rogue security software which has reached epidemic proportions. There seems to be no end to the release of new rogue security software threats. Rogue software will often install and use a Trojan horse to download a trial version, or it will perform other actions on a machine that are detrimental such as slowing down the computer drastically.

Download applications, particularly free programs, only from verifiably safe sites (sites that guarantee malware free downloads), such as Download.com, MajorGeeks, Softpedia, and the like.

There are many more safe download sites available, but be sure you investigate the site thoroughly before you download anything. Googling the site, while not always entirely reliable, is a good place to start. A recommendation from friends as to a site’s safety is often a more appropriate choice.

Common Sense Tip #2 – Don’t open emails that come from untrusted sources. It’s been estimated that 96% of emails are spam. While not all spam is unsafe, common sense dictates that you treat it as if it is.

Much of the spam emails I’ve seen lately are crafted around spicy, scandalous, and salacious stories. This is generally a dead giveaway that you are dealing with a risky email.

Here’s a recent email from my inbox – “Who to blame in world crisis?‎ – Ivanka Trump sunbathing pics http://www.000000.com”. Common sense tells me there is a major disconnect between the heading of this email (Who to blame in world crisis?) and sunbathing pics of Ivanka Trump. There is no doubt that this is a dodgy email. By the way her name is Ivana, not Ivanka.

Common Sense Tip #3 – Don’t run files that you receive via email without making sure of their origin. If the link has been sent to you in a forwarded email from a friend, be particularly cautious. Forwarded emails are notorious for containing dangerous elements, and links.

Common Sense Tip #4 – Don’t click links in emails. If they come from a known source, type them in the browser’s address bar. If they come from an untrusted source, simply ignore them, as they could take you to a web designed to download malware onto your computer.

Common Sense Tip #5 – If you do not use a web based email service then be sure your anti-virus software scans all incoming e-mail and attachments.

Common Sense Tip #6 – Be proactive when it comes to your computer’s security; make sure you have adequate software based protection to reduce the chances that your machine will become infected.

adeona with locks

If you are unsure if your software based protection is up to the task then checkout the following recommended free downloads that will help you manage and protect your computer system.

These applications have been well tested over the years for reliability and functionality, and all have developed a strong, loyal following.

AVG Anti-Virus Free Edition

AVG Anti-Virus Free 8.0 now incorporates protection against spyware through a new combined anti-virus and anti-spyware engine as well as a “safe-searching component” which has been incorporated into the new AVG Internet Security Toolbar. This program scans files on access, on demand, and on schedule and scans email incoming and outgoing. For those on Vista, you’re in luck, it’s Vista-ready

Spyware Doctor Starter Edition

Spyware Doctor Starter Edition from PC Tools is an excellent choice, as a secondary line of defense. This free version of the award winning program, with its easy to use interface, is used by millions of people worldwide to protect their computers; it’s reported there are a million+ additional downloads every week. Be aware however, there is no real-time protection offered with this version and this is the reason I recommend this application as a secondary scanner only.

Spyware Terminator

Having tested virtually all of the major anti-spyware applications over the past year or more, I’ve settled, for now, on Spyware Terminator primarily due to its strong real-time protection against spyware, adware, Trojans, key-loggers, home page hijackers and other malware threats. Spyware Terminator excels in strong active protection against know and unknown threats. If anything, I find it perhaps a little overly aggressive. On the other hand, better this than the alternative.

Comodo Firewall Pro

Comodo Firewall protects your system by defeating hackers and restricting unauthorized programs from accessing the Internet. I have been using this application for 10 months and I continue to feel very secure. It resists being forcibly terminated and it works as well, or better, than any firewall I’ve paid for. This is one I highly recommend. Amazing that it’s free!

HiJackFree

If you are an experienced/advanced computer user and you’re looking for a program to strengthen your anti-malware resources, then HiJackFree is one that’s worth taking a look at. This free application, from EMSI Software, offers a potent layer of additional protection to add to your major anti-malware programs. The program operates as a detailed system analysis tool that can help you in the detection and removal of Hijackers, Spyware, Adware, Trojans, Worms, and other malware. It doesn’t offer live protection but instead, it examines your system, determines if it’s been infected, and then allows you to eradicate the malware.

Ad-Aware

Ad-Aware Free is good free spyware and adware remover. It does a good job of protecting against known data-mining, Trojans, dialers, malware, browser hijackers and tracking components. The only downside with the free version; real-time protection is not included.

ThreatFire

ThreatFire blocks mal-ware, including zero-day threats, by analyzing program behavior and it does a stellar job. Again, this is one of the security applications that forms part of my front line defenses. I have found it to have high success rate at blocking mal-ware based on analysis of behavior. Highly recommend this one!

Web of Trust (WOT)

WOT is a free Internet Browser add-on (my personal favorite), that has established an impressive 4.5/5.0 star user rating on CNET. WOT tests web sites you are visiting for spyware, spam, viruses, browser exploits, unreliable online shops, phishing, and online scams, helping you avoid unsafe web sites.

SnoopFree Privacy Shield

SnoopFree Privacy Shield is a powerful application that guards your keyboard, screen and open windows from all spy software. I have been using this application for quite some time, and I have been amazed at the number of programs that have requested access to my keyboard and screen. In particular, programs that I am in the process of installing. If you’re serious about privacy, this is a must have addition to your security toolbox.

5 Comments

Filed under Adware, Anti-Malware Tools, Antivirus Applications, Browser add-ons, Don't Get Hacked, Firefox Add-ons, Freeware, Interconnectivity, Internet Safety Tools, Software, Spyware - Adware Protection, System File Protection, System Security, Windows Tips and Tools

Hi-Tech Spousal Abuse – Technology Perverted

domesticviolence 1 The U.S. Office on Violence against Women (OVW) defines domestic violence as a pattern of abusive behavior in any relationship that is used by one partner to gain or maintain power and control over another intimate partner.

Domestic violence can take many forms, including physical abuse, sexual abuse, emotional, economic, and psychological abuse.

This article is gender neutral; clearly both men and women can be victims of domestic violence and abusive behavior.

Most of us would agree that new technology is, in most cases, unbiased. It is how we implement technology that establishes its value, and impacts any ethical questions that surrounds its use. It is clear that virtually all technologies, if used improperly, can be used to cause damage.

Over the past year I have reviewed several computer monitoring and keylogger products which I must admit, I had not considered could be misused as an aid in spousal abuse until it was brought to my attention. I suppose I shouldn’t have been quite as surprised as I was; after all many of these products are advertised as a method to detect a cheating spouse.

Curious about this, I Googled “cheating spouse”, and I was surprised to see over 900,000 hits. More surprising was the number of hits on “keyloggers for cheating spouse”; over 95,000.

Domestic violence.woman

Probing further, I discovered that this type of technology is now pervasive in spousal abuse. According to Anna Stepanov, manager of the Anti-Spyware program at McAfee Avert Labs, “Using spyware for surveillance in cases of domestic abuse is a serious matter.”

Stepanov, who is also the author of a report entitled Spyware: A Morphing Campaign, which describes current spyware trends that includes domestic abuse states, “Monitoring a victim’s online, cell phone, or general computing activity is of more value than ever in controlling or hurting a victim.”

Cindy Southworth, technology director at the National Network to End Domestic Violence commenting on this issue has stated “With spyware, if the victim is thinking about leaving, all that is captured. If the victim looks for plane tickets, shelters, a new apartment, it all shows up in the computer logs.”

Since spyware is now an issue in domestic abuse the agency cautions those in an abusive relationship not to use their home computer for these kinds of tasks.

All of this has now been compounded by the news that the misuse of GPS technology by abusive individuals is now rampant. GPS can be used to track a victim by transmitting coordinates that result in the generation of a web page that maps the victim’s location.

The U.S. National Network to End Domestic Violence suggests the following to computer users, to reduce the impact of this type of abuse.

Internet Safety Tips for Abused Women

  • If you are in danger, please try to use a safer computer that someone abusive does not have direct or remote hacking access to.
  • If you think your activities are being monitored, they probably are. Abusive people are often controlling and want to know your every move. You don’t need to be a computer programmer or have special skills to monitor someone’s computer and Internet activities – anyone can do it and there are many ways to monitor with programs like Spyware, keystroke loggers and hacking tools.
  • It is not possible to delete or clear all the “footprints” of your computer or online activities. If you are being monitored, it may be dangerous to change your computer behaviors such as suddenly deleting your entire Internet history if that is not your regular habit.
  • If you think you may be monitored on your home computer, be careful how you use your computer since an abuser might become suspicious. You may want to keep using the monitored computer for normal activities, such as looking up the weather or recipes. Use a safer computer to research an escape plan, look for new jobs or apartments, bus tickets, or ask for help.
  • Email and Instant/Text Messaging (IM) are not safe or confidential ways to talk to someone about the danger or abuse in your life. If possible, please call a hotline instead. If you use email or IM, please use a safer computer and an account your abuser does not know about.
  • Computers can store a lot of private information about what you look at via the Internet, the emails and instant messages you send, internet-based phone and IP-TTY calls you make, web-based purchases and banking, and many other activities.
  • It might be safer to use a computer in a public library, at a community technology center (CTC), at a trusted friend’s house, or an Internet Café.

4 Comments

Filed under Interconnectivity, Internet Safety, Personal Perspective, Privacy, Spousal Abuse, Surveillance

Instant Messaging – Tips You Need to Know

instant messanger 1 I’m always amazed when I see my younger friends communicating with each other using instant messaging applications.

Their use of instant messaging for rapid communication, as opposed to voice contact, is a phenomenon that I must admit has never appealed to me.

I excuse myself on this one by convincing myself that I’m an ancient fossil; after all my computing experience goes all the way back to the dark ages of MS-DOS 1. Not quite the days of the Dinosaurs; but close.

My comfort zone in communications is a telephone, used the old fashioned way for immediacy, or email where immediacy is not an issue. The reality is however, that programs such as MSN Messenger, Yahoo! Messenger, AIM, and a basket full of other IM applications, are extremely popular with the younger generation, like my younger friends, who want real-time contact with each other.

Regrettably, from a security perspective these applications can present considerable security risks. Generally, security risks occur when these programs are used to share files, folders, or in some cases, even entire drives. Instant messaging, unfortunately, is a primary channel used by cyber-criminals to distribute malware.

As Wikipedia explains it, hackers use two methods of delivering malicious code through IM: delivery of virus, Trojan, or spyware within an infected file, and the use of “socially engineered” text, with a web address that entices the recipient to click on a URL that connects him or her, to a website that then downloads malicious code. Viruses, worms, and Trojans typically propagate by sending themselves rapidly through the infected user’s buddy list.

Follow these tips to ensure you are protected when using instant messaging.

  • Don’t click on links, or download files from unknown sources. You need to be alert to the dangers in clicking on links, or downloading files from sources that are not known to you. Even if the files or links apparently come from someone you know, you have to be positive that it really was this person who has sent the message.
  • Check with your contact to be sure the files, or links are genuine. Remember, if you click on those links, or run those attachments without confirmation, you run the risk of letting malware into your computer.
  • Use only secure passwords, and be sure to change them regularly. The longer and more varied they are – using a variety of different characters and numbers – the more secure they will be.
  • Protect personal and confidential information when using IM. Revealing confidential or personal information in these types of conversations can make you an easy target for Internet predators.
  • For added protection when using a public computer, ensure that you disable any features that retain login information to prevent other users from gaining access to your instant messaging once you leave.
  • It’s virtually impossible to avoid publishing your email address on the Internet, however do so only when absolutely necessary. Cyber criminals are always on the lookout for accounts to target.

Instant Messanger changed Above all, if you are a parent, take exceptional care with the access that your children have to these programs.

The risk here goes beyond malware, as sadly, they could come into contact with undesirable or even dangerous individuals.

Elsewhere on this site you can read an article on protecting your children on the Internet and download free software to help you do this.

ParentalControl Bar, a browser toolbar, is one solution provided free of charge, by WRAAC.org, a non-profit organization dedicated to providing free, and effective Internet control tools.

Check out my review of this free application on this site “Free Internet Child Protection – Parental Control Bar”.

For information on monitoring your child’s cell phone usage (most cell phones today are really Internet connected devices), see “Parental Monitoring and Cellular Phones” by my tech wizard friend TechPaul.

1 Comment

Filed under Child Safety Internet, Don't Get Hacked, Freeware, Interconnectivity, Internet Safety, Internet Safety for Children, Malware Advisories, Mobile Applications, Parenting Help, Software, Teenager Internet Safety Tips

How Does Your Teenager Use The Internet? – Should You Care?

commonsense 2 McAfee Inc., a well known and respected provider of antivirus software and intrusion prevention solutions, recently released new research which indicates that most American mothers rate their teenagers’ online safety, their exposure to drugs and drunk driving, as essentially equal anxiety producing agents.

So, are these mothers concerns justified?

You bet! While it’s true that the Internet can provide a rich educational and cultural experience for children, and teenagers, it is virtually impossible for them not to be exposed to, as my Internet friend Rick Robinette, the owner of the Web site, What’s on My PC, a recently retired Law Enforcement specialist puts it, “the underbelly of the internet”.

The sad reality is, contrary to the myth that we have raised, or are raising a “tech savvy” generation – the majority of children, and teenagers, are undereducated when it comes to recognizing the dangers, and threats, that the Internet poses to their personal privacy and safety.

Consider this – would you drop off your child, or teenager, in a neighborhood where more than half of the buildings were adult stores, and which was potentially full of predators? In my view, if you allow your child, or younger teenager, to interact with the Internet unsupervised, or without having communicated to your child information concerning potential on-line dangers, this is what you may be doing.

internet_predators 3

Additional McAfee study statistics:

  • Providing personal information to online strangers – 52 per cent of teens in the study reported having done so
  • Providing a photograph, or a physical description, to online strangers – 34 per cent of teenage girls in the study, reported having done so
  • Clearing the browser cache so that their Internet history cannot be tracked – 32 per cent of the teenagers in the study, reported having done so

I found the most surprising and troubling statistic to be; 16 per cent of the teenagers involved in the McAfee study, indicated they had developed social networking profiles and Email addresses, which they had hidden from their parents.

fbi_logo 2

So what’s a concerned parent to do? According to the FBI in the United States, the following are some of the most important positive actions, you as a parent, can take to reduce your child’s possible victimization on the Internet.

  • Communicate, and talk to your child about potential on-line dangers
  • Spend time with your children on-line. Have them teach you about their favorite on-line destinations
  • Keep the computer in a common room in the house, not in your child’s bedroom
  • Utilize parental controls provided by your service provider and/or blocking software

Since computer-sex offenders are a very real danger on the Internet, the FBI suggests that you instruct your children to:

* Never arrange a face-to-face meeting with someone they met on- line

* Never upload (post) pictures of themselves onto the Internet or an on-line service to people they do not personally know

* Never give out identifying information such as their name, home address, school name, or telephone number

* Never download pictures from an unknown source; there is a good chance there could be sexually explicit images

* Never respond to messages or bulletin board postings that are suggestive, obscene, belligerent, or harassing

Parental Control Bar 2

An important aspect of ensuring that your child is safe while using the Internet, (recommended by child safety experts/organizations), is the installation of parental control software.

Parental controls will provide you with the advantage of being able to:

  • Block access to materials (text and pictures) identified as inappropriate for kids
  • Permit access only to materials specifically approved as safe for kids
  • Specify what types of materials are appropriate for your child
  • Monitor your child’s activity on the Internet by storing names of sites and/or snapshots of material seen by your child on the computer for you to view later
  • Set different restrictions for each family member
  • Limit results of an Internet search to content appropriate for kids
  • Enforce time limits set by parents

ParentalControl Bar, a browser toolbar, is one solution provided free of charge, by WRAAC.org, a non-profit organization dedicated to providing free, and effective Internet control tools.

You can download this application from the developer’s site.

Check out my review of this free application on this site “Free Internet Child Protection – Parental Control Bar”.

For additional information on monitoring your child’s cell phone usage (most cell phones today are really Internet connected devices), see “Parental Monitoring And Cellular Phones” by my tech wizard friend TechPaul.

8 Comments

Filed under Child Safety Internet, Freeware, Internet Safety, Online Safety, Parenting Help, Safe Surfing, social networking, Software, Teenager Internet Safety Tips, Windows Tips and Tools

FireFox 3.1 beta 3 – Ready For Download

FireFox Download FireFox 3.1, beta 3, is finally ready for download, following one delay after another. Beta users are aware that this is the third beta release of FireFox 3.1.

According to Mozilla, “FireFox 3.1 is an incremental release on the previous version with significant changes to improve web compatibility, performance, and ease of use”

Changes to be aware of in this version include minor changes to the Private Browsing Mode, and the TraceMonkey JavaScript engine which, as Mozilla has stated, will improved performance and stability. Be aware however, this is beta software which may lead to compatibility problems with some websites and add-ons.

It will be the last version of the browser to use the name FireFox 3.1, as beta 4 will be called FireFox 3.5 beta 4. Go figure!

To download the new version, go to the Help drop-down menu and select the “Check For Updates” option. Alternatively, go to the Mozilla site and download directly.

10 Comments

Filed under Browsers, Firefox, Freeware, Software, Windows Tips and Tools

RegSeeker – King of the Free Registry Cleaners!

Bang Head Getting frustrated while you wait for your operating system to load? Are some of your applications not working quite right? Tired of trying to figure it out?

Then it’s time to give RegSeeker, a free Windows registry cleaner, a go at cleaning and optimizing your Windows registry.

A jam-packed, jumbled registry can be one of the chief causes of computer slowdown and malfunction. A messy registry can often put a brake on your system, cause programs to stop working properly, and aggravate you while you hang around waiting for the operating system to load at a snails pace.

Even a new/newer computer is not immune to this type of problem. Over time, sometimes a very short time, repeated loading of the operating system and application software can create errors and leave unnecessary entries in the registry. This is where RegSeeker, a multilingual registry cleaner/optimizer, can prove to be very useful.

regseeker

RegSeeker’s primary function is to clean your registry, which it does easily, safely, and thoroughly. Just launch the program, click on “Clean the Registry”, and delete the listed unneeded registry entries.

Despite the fact RegSeeker has an automatic registry backup feature, I strongly recommend that you analyze the search results very carefully, and then ensure you have in fact backed up before deleting any registry entries.

After a previous review of this application, I received one comment in which the reader indicated he had suffered a complete meltdown of his computer after having run this application.

On the other hand, I have been safely using this program on a daily basis for over three years, and I have not had to use this backup feature yet. However, as we all know there’s always a first time and that generally occurs when you least expect it. So my advice; err on the side of caution any time you are working with the registry and be sure to backup.

reg-result 2

I download and test, 1-2 applications daily, so this program gets a real workout on my machines. As well, I use Revo Uninstaller, a powerful application uninstaller to uninstall applications which means less work for RegSeeker.

RegSeeker is multifunctional in that it also performs tweak operations. It can clean out your startup entries, Add/Remove program entries, adjust color schemes, change personal information entries, and it includes a general “Tweaks” menu option. I have found this tweaking ability to be relatively useful.

RegSeeker is an extremely valuable tool for keeping your Registry in perfect running order, and its “Tweaks” editing options allow you to do more with the user interface than you might have previously thought was possible.

RegSeeker is FREE for personal use only.

System Requirements: Windows 95/98/Me/NT/2000/XP/2003 Server

Download at: Download.com

Important Note:

If you’re a relatively new computer user, it’s important that you choose a Registry cleaner which will clean your Registry easily, thoroughly, and most importantly for you as a new user, safely.

Wise Registry Cleaner is a free, non aggressive application that, as one of my friends says, “hits a home run in the safety department”. As it searches the Registry for obsolete/redundant registry keys, it differentiates between those that are “safe to fix”, and those that are “not fully safe to fix”.

To provide the greatest safety factor for those who are uncomfortable or unfamiliar with cleaning the Registry, the application’s default removal setting is “safe to fix”.

Download at: Download.com

5 Comments

Filed under Cleaning Your Computer, Computer Maintenance, Freeware, Registry Cleaners, regseeker, Slow Computer, Software, System Tweaks, System Utilities, Windows Tips and Tools

PC Fixer – Free From Digital Support Technology

Often, new and casual computer users get left behind when it comes to PC utility software. Developers of this type of application are prone to designing tools that require more than just a passing knowledge of how computer operating systems really work.

New users are very often unfamiliar with both the technology itself, and the technical terms involved in using this type of application. For many users, a simple set of tools that does not require the user to be geek inclined, is more appropriate than a suite of tools that does everything but clean the kitchen sink.

While it’s generally true that more advanced users want/need much more control than a one click system utility provides, this type of utility can be the ideal solution for a new user.

PC Fixer 1

PC Fixer is a relatively simple but nonetheless, powerful set of tools for new and casual computer users that includes the following comparatively basic modules:

  • Install – assists in the setup/installation of applications, internet, email, printers, wireless network and more.
  • Fix – diagnostic applet with comprehensive solutions to common problems.
  • Optimize – a configuration utility with surprising functionality.
  • Secure – as well as the ability to remove malware, this module allows the user to configure Windows security settings.
  • Data Recovery – provides the user with the tools required to recover data in specific applications including MS Word, Excel, Access, and Outlook and so on.
  • Tune up – this feature is essentially a Registry cleaner.

A valuable resource for less experienced users is the community-based forum chock full of answers to many common PC support questions.

PC Fixer 2

A sample of issues addressed by PC Fixer:

  • CD or DVD driver is missing.
  • CD burner does not work.
  • Printing service is disabled.
  • Cannot open Task Manager.
  • Performance tuning tips.
  • Security and Privacy protection.

This application is not a panacea for computer problems of course, but for less experienced Windows users, it should prove to a valuable addition to their computer toolbox.

There is additional functionality ncluded in this neat little application, but I’ll leave that for you to discover. Good surprises are cool, right?

Download at: Download.com

For a more robust set of system utilities checkout “Glary Utilities – Perfect Collection of Free System Tools” on this site.

1 Comment

Filed under Anti-Malware Tools, Computer Maintenance, Diagnostic Software, Freeware, Slow Computer, Software, System Tweaks, System Utilities, Windows Tips and Tools

Check Process Security – Free Glarysoft Security Process Explorer

Glarysoft_logo Glarysoft, the developer of the powerful, free system tool Glary Utilities (which should be part of every casual/intermediate computers users’ toolbox), also offers a free enhanced task manager; Security Process Explorer. This application though, is better suited to experienced or advanced computer users.

Security Process Explorer operates very much like A-squared HiJackFree but with an additional twist. Operating as an enhanced task manager, the program provides advanced risk information about programs, and processes, running on your computer.

The program displays all the usual task manager information, including file name, directory path, description, CPU usage, and so on. What sets the application apart is the unique security risk rating that is applied to running programs and processes.

Security process explorer 2

The major caveat here however is, the user must make the decision whether a particular process, or program, should be terminated or removed. Thankfully, you can get help in making that decision by clicking on the More Info Tab. Doing so, opens Glarysoft’s web based database where additional information about the specific program/process can be obtained, along with a risk factor for that inquiry.

If you make a mistake, the application offers a way out. Just go to the Edit Tab and reverse the action.

Using Security Process Explorer you can easily find and remove unnecessary background processes. As well, you can assign more resources to demanding processes like games, real-time multimedia applications and CD writing software, where necessary.

Quick facts:

  • Provides detailed information about all running processes
  • Specifies whether a process is safe or not
  • Single click process termination
  • Block unneeded processes or malware
  • Simple user interface

System requirements: Windows 2003, Windows Vista, Windows NT, Windows XP, Windows 2000, Windows 98

If you are an experienced/advanced computer user, and you’re looking for a program to strengthen your anti-malware resources, then Security Process Explorer is one that’s worth taking a look at.

Download at: Download.com

Comments Off on Check Process Security – Free Glarysoft Security Process Explorer

Filed under Anti-Malware Tools, Don't Get Hacked, Freeware, Geek Software and Tools, Manual Malware Removal, Software, Spyware - Adware Protection, System Security, System Utilities, Windows Tips and Tools

Uncover Kernel Mode Trojans or Rootkits

Check for Rootkits with free detectors.

rootkits 2 A Rootkit (a Kernel Mode Trojan), is a malware program, or a combination of malware programs, designed to take low level control of a computer system. Often, they are Keyloggers as well.

Techniques used to hide rootkits include; concealing running processes from monitoring programs, and hiding files, or system data, from the operating system.

In other words, the rootkit files and processes will be hidden in Explorer, Task Manager, and other detection tools.

It’s easy to see then, that if a threat uses rootkit technology to hide, it is going to be very difficult to find.

Kudos to the major anti-malware companies though; many have come up with a free serviceable solution to rootkits. Enter the Rootkit detector which will provide you with the tool to find and delete rootkits, and to uncover the threats rootkits may be hiding.

Generally, rootkit detectors are capable of the following type of scans, although it is important to note that not all detectors scan, or handle rootkits, in precisely the same way.

  • hidden processes
  • hidden threads
  • hidden modules
  • hidden services
  • hidden files
  • hidden Alternate Data Streams
  • hidden registry keys
  • drivers hooking SSDT
  • drivers hooking IDT
  • drivers hooking IRP calls

Rootkits If you think you might have hidden malware on your system, I recommend that you run multiple rootkit detectors.

Much like anti-spyware programs, no one program catches everything. To be safe, I use each of the rootkit detectors listed below on my machines.

The following are a number of free rootkit detectors available for download. To download any tool, just click on the highlighted name.

Microsoft Rootkit Revealer

Microsoft Rootkit Revealer is an advanced root kit detection utility. Its output lists Registry and file system API discrepancies that may indicate the presence of a user-mode or kernel-mode rootkit. According to Microsoft, Rootkit Revealer successfully detects all persistent rootkits published at http://www.rootkit.com, including AFX, Vanquish and Hacker Defender.

IceSword

IceSword is a very powerful software application that will scan your computer for rootkits. It also displays hidden processes and resources on your system that you would be unlikely to find in any other Windows Explorer like program. Because of the amount of information presented in the application, please note that IceSword was designed for more advanced users.

GMER

This freeware tool is essentially a combination of Sysinternals’ Rootkit Revealer and Process Explorer. The program can list running processes, modules and Windows services, in addition to scanning for the presence of rootkits.

5 Comments

Filed under Anti-Keyloggers, Anti-Malware Tools, Don't Get Hacked, Freeware, Geek Software and Tools, Malware Advisories, Manual Malware Removal, rootkits, Software, Spyware - Adware Protection, System Security, trojans, Viruses, Windows Tips and Tools, worms