A computer support consultant is a seasoned consulting role which involves contract programming and system administration. Quite a tedious job, a computer support consultant is basically hired on a contract basis and usually the consultants are experts in computer administration and dealing.
Functions
The basic concept behind hiring computer consultants is to fit into the role of the expert and get services which are otherwise not found in the employees of the company. This skill of the consultant is hired by the companies to fill in the gap and ensure smoother functioning of the company.
The computer support consultants are required to train the employees in the company who have been hired on a permanent basis. The whole idea is to train the permanent employees in such a way that they will take over the services rendered by the consultant after the training process is over.
After the underlying issues are resolved by the computer consultant, the contract usually expires. The contract can be renewed if there are other areas or department in the company which have similar issues. Otherwise the consultant leaves the company.
Prospects
While this whole process is also a learning curve experience for the computer support consultant, the consultant can earn more money in the process. The difference between a permanent employee and a consultant is that while the former has a job wherein years might be spend on a single project.
It is a reliable and less-demanding job as compared to a consultant's. Because the latter have contracts of up to 3 months or even lesser and will have to apply for jobs every few months. The chief criteria to be qualified as a computer support consultant are to possess good and specialized skills which qualify the person to be a hired giving expert advice to companies.
online Computer Support
Install Anti-virus software from McAFee
While browsing the Internet, a computer can get infected with different types of viruses. Two of the most common viruses are Spyware and Malware. Spyware viruses can be something as small as an ad-tracker, or an annoying pop-up program that displays with each new Webpage. Malware is something more serious and can infect a computer's start up controls and Internet function. To deal with these problems one can install anti-virus or anti-spyware program software that can help eliminate these problems and keep an Internet-connected computer running securely.
Our prime focus will be to install Antivirus software and for this article, we have zeroed on the McAFee Anti-virus software.
The McAFee Anti-virus is one of the best and reliable anti-virus software available in the market today. It ensures smooth working of the computer by the computer. It goes out of its way to ensure complete protection to your computer. To install Antirus support software from McAFee, you will have to follow these steps :-
STEP 1 You can get an online, downloadable version or can purchase a copy from the nearest computer retailer.
STEP 2 Keep the manufacturer's directions in mind and load the program.
STEP 3 Go to "Start ->Control Panel → Add or Remove Programs.“ If the McAfee Antivirus Software is there, you will need to select "Change." The directions will allow you to install the updated version. If it is a new product, then do the following:-
a). Insert the CD in the CD?DVD drive and select the installation button to load the program into the computer.
b). Once the loading is complete, restart your computer and follow the directions given.
c). Select the options saying the computer would be user friendly
d). Now,enable the system to choose and decide the correct times to automatically scan your computer for viruses.
The regime to install Antivirus support software from McAFee is almost complete. After the completion of the last step, re-start your computer, this will enable all the changes done to take its effect.
Role of Tech Support Specialists
The role of computer tech support specialists are on the rise with the increasing demand on computers to enable all kinds of businesses in this time and age. Every business activity is inept without the help of computers and since computers are also vulnerable to technical glitches, there is the need of well-qualified and efficient computer tech support specialists everywhere. All established business is always on the look-out to employ tech support analysts at some point or the other.
To qualify as a tech support specialist, a degree in the respected field is sufficient. For some companies, computer proficiency and skills with experience in the related field certified by companies makes the grade. Excellent verbal and writing skills is a huge advantage to go further up the ladder. The support specialists are usually stationed at Helpdesks and Service desks providing technical support through telephonic calls and responding to emails related on technical support. The clientele can range from inviduals to big blue chip companies.
The tech support specialist cater to the needs of the users to resolve any problem which they can handle and send the call or mail across to a relevant technical team for further assistance. The clients should always be informed of what is happening and should be updated on any issue pertaining to them. Their role is to provide support to a company's web based products and services. But the work of tech support specialists is not getting down straight to technical or network support roles. Since these issues are related to the IT industry, it is as added bonus to be proficient with IT services. Normally the tech support specialists are trained to provide technical support to the company's products. As mentioned earlier, it is quite important to have a college degree to be suitable to qualify as a tech support specialist but then relevant experience in the field or good verbal and communicating skills is also sufficient.
Avast! Home Edition antivirus support software
Avast offers free antivirus support software with spyware protection in it's Home edition. It is also the best antivirus support software available this time around and is a hot pick with users and customers alike. The Avast! Home Edition, however, has been created specifically for non-commercial & home use. The edition is specifically targeted for these users and if a user does not fit into the bill and wants something more elaborate and secure, than there are a host of other variations available from Avast! in it's range of antivirus support software.
The other products cater to other security issues like higher data security, and this are enabled in it's other versions like the Avast! Professional version for businesses and enterprises. The free Avast! antivirus support software in the Home edition comprises a lot of security features. It includes the anti-spyware shield and also an anti-rootkit detection which has been built by taking into the designs and software of the latest technologies available in the market this time around.
It is also a simple tool to use and it provides daily updates on your computer which are automated to give a user endless protection from malware and spyware as well. There is no need to make any additional purchases with it, and once the anti virus support software has been enabled in your computer, there is no need for worry as the product will take care of everything.
It is one of the most reliable products available and has been trusted by users worldwide. The Avast! Antivirus support software supports all the versions of Windows from Windows 95 to Vista and now, the new Windows 7.
It performs a lot better than any anti-malware product and it does not matter in which system you have deployed the anti virus support software from Avasti!, it has everything under it's control.
AVG support
AVG provides one of the best aantivirus support for a host of anti-virus and Internet security software and has been developed by AVG Technologies. It used to be known as Grisoft before it got its present name. It supports Microsoft Windows, Linux and other software. The AVG support is easily trusted and has a good bunch of loyals who swear by it. It has gone down well over the ages and recently the AVG antivirus Free Edition 9.0 has been released.
The Avast! antivirus support software has been a prized software for users worldwide with a huge loyal fan club following. It has a lot of antivirus support programs in different editions serving various purposes and enterprises. It is quite an impressive software providing robust protection and is in the league clubbed with the best. And a user can avail all the features in the Avast! antivirus support for free.
The AVG Anti-Virus Free Edition 9.0 is the latest addition to the AVG support scheme of things. It provides flawless security to meet all the basic needs pertaining to issues regarding security to the user. The AVG support has always endeavoured to provide the correct basic computer security free of cost. It has upto 80 million loyal users and the numbers say a lot for itself. For a user who has to regularly spend time on the Internet and is regularly involved in recieving and sending files, the AVG support must be procured at any cost or rather, free of cost here.
It's unique LinkScanner® allows a user to surf and browse the Internet with no worries since the Scanner protects a user from malicious websites. The anti virus support enabled under AVG support gives both online and offline protection from viruses, spyware etc.. With it, a user can have the pleasure of consistent high-speed PC performance. It's regular automatic updates helps keep the protection up-to-date. It is compatible with all the Windows operating systems, including the new Windows 7.
Features in Kaspersky Anti- Virus support
A lot of features have been incorporated in the antivirus support software rolled out by Kaspersky. One of them is the Startup Scan. It comes along with an updateable database.It allows instant automatic updates. This is enabled through the Kaspersky Security Network.
There is further reduction of the Anti-Virus support database update size available in the Differential update which comes along with the package. Another feature in the antivirus support is the Script-Checker with Internet Explorer GUI plug-in. There is a way to identify and clean-up Critical areas which is made available to the user through the Scan Critical Areas Task.
It falls under the category of a "New Scan Hope". It also has the Scan Starup Objects. And as the name suggests, the user can have a full control of the task execution. Another important feature is the Ban-list of blocked computers by IDS subsystem. It comes with the un-block feature.
The features of Kaspersky Anti-Virus support is to basically help in facilitating identification of security breaches and also to keep a check on time reduction when it comes to protecting the computer from new security risks. It is a good anti-virus support pack and can also shield itself from malware,which has the ability to disable it, when a user information is not available and Kaspersky utilizes the lab to promote and further its security products. This keeps a check on the computer from corrupt and malicious threats.
Spyware Antispyware Download
Most spyware can be generally harmless, but in the worst cases it is capable of gathering all your private details like bank account numbers etc. which can enable crooks to steal your money and identity. Although, the antispware support software designed was meant to gather information about the user, it can also have adverse effects. Therefore, it is necessary to install an anti-spyware support and shield yourself from such heinous acts that could be set on you. Its an easy and simply process to install the software in your system, and wouldn't cost you a penny either.
The most highly rated anti-spyware support that can be downloaded freely are Avast! Ad-Aware and Spybot Search and Destroy. Once the program is downloaded, one would be able to see an installer on your desktop or in your designated downloads folder. Double-click on the icon and confirm to install the software. Next, make sure that you follow the steps on the screen, confirming that you agree to the terms and conditions.
The system will do the rest. Finally, keep in mind Run the anti-spyware support software once a week to keep your computer clean. Do it on a weekly basis, at regular intervals, and all problems related to spyware will be a thing of the past.
Microsoft Office Help: Templates
Software giant, Microsoft, gives out free templates for its users in the forms of certificates, brochures etc. in order to enable work at home or at work. These templates are basically to help the users in having a greater control and knowledge of its various products. This article will be based on Microsoft Office help tips manual in order to give the users a deeper insight into Microsoff Office 2007 features and versions.
The templates help a user to look for a specific template in order to simplify his work process and they are all categorized for easier use. They support all the major Microsoft Office programs like Microsoft Excel, Word etc. While these programs can be used for most of the versions of Microsoft Office, there are some which can only be enabled in the newer versions.
A user can search for a template by right-clicking on the site and once the relevant template is found, simply click to download it and then open the following with the relevant Microsoft Office program. Then changing, editing and customizing the documents follow suit and the work can be saved as a document or a template.
A personalized template can shared for use with other users once it has been submitted on the appropriate site. There is also a provision to view the newly created template by making a suggestion for the same. Microsoft has enabled a lot of help services in its Microsoft Office help area for the templates. One can even participate in a discussion forum for using or creating these templates. Visit Microsoft Office Help for more resources.
Microsoft Windows Users and iYogi Predict a Surge in Tech Support for Windows 7 Upgrades
New York, NY (PRWEB) September 16, 2009 -- iYogi, the on-demand tech services company with a unique global delivery model, announced today the results of a consumer poll regarding support concerns and predictions for the upcoming launch of the new Microsoft Windows 7 operating system. Based on responses from more than 1,000 Windows XP and Windows Vista users, 52 percent think that moving to a new operating system and moving their data is a hassle, suggesting some real frustrations on the near horizon. Nearly half (47 percent) think upgrading to Microsoft Windows 7 may require a call to technical support - potentially causing a huge backlog of support needs, as up to 40 million copies of Windows 7 are expected to be sold in 2009, according to IDC.
"We predict that more than 40 percent of XP users will generate support calls and inquiries globally this year and even more in 2010 as mass adoption kicks in and people face the prospect of dealing with an entirely new interface," said Vishal Dhar, President Marketing & Co-founder of iYogi. "We estimate twice as many support calls for current Windows XP users than Windows Vista users, since Microsoft Windows XP users will require a 'clean' install including migrating applications, settings and drivers--a potentially arduous, time-intensive task."
We predict that more than 40 percent of XP users will generate support calls and inquiries globally this year and even more in 2010 as mass adoption kicks in and people face the prospect of dealing with an entirely new interface
Additional survey findings reveal:
* 58 percent of users think they will or may upgrade to Windows 7, an encouraging number considering some of the backlash surrounding Vista
* Only 39 percent of users are aware that Windows 7 is launching soon, suggesting an increased flurry of help questions in the coming months as more people become aware of the upgrade options
iYogi has more has more than 90,000 annual subscribers and provides thousands of single incident sessions every day on a 24/7 basis. Its Global Delivery Platform delivers on the highest customer satisfaction benchmarks in the industry and gets smarter with every customer interaction, building a powerful knowledge base that provides unique customer insights on predictive needs to tech support.
ABOUT IYOGI
iYogi is a global on-demand services company that provides personalized computer support for consumers and small businesses in United States, United Kingdom, Canada and Australia. iYogi's unique model, including proprietary technology iMantra and highly qualified technicians, is designed to eliminate computer-related stress and keep millions of digitally dependent consumers and small businesses always protected and productive. Only iYogi -- with its proven global expertise delivery model, intelligent customer insight systems, easy-to-use self-help tools and automated PC optimization and computer support services - offers users a simple yet comprehensive path to digital serenity. iYogi has perfected the remote technical support model to overcome the current limitations of in-store, on-site, or call center services to become the fastest growing provider of support in the industry. Major resellers and technology companies are increasingly turning to iYogi to improve customer satisfaction, reduce return rates, and deliver a compelling new-value added offering to customers. For more information on iYogi and a detailed list of technologies supported, visit: www.iyogi.net.
What is Antivirus 2010?
This post provides information about Antivirus 2010 and give some virus removal tips for protect your computer. Antivirus 2010 is a very insistent that you want to download yourself and protect your computer.
Do not fall for it. Antivirus 2010 will not protect you against malware. In fact, it is malware. It is a rogue program pretending to protect against infection, while infecting your computer.
If you receive a pop-up warning of danger and it is suggested to install this wonderful program, click Yes and no, click No, no. Close the window.
And if you think you became infected, download, install and run the free version of SuperAntiSpyware any Malabytes and Anti-Malware.
How to Remove Autorun.inf virus
This tutorial details removing the autorun virus from pc. If your computer is infected with autorun virus, you will not be able to view the drives. Instead it will ask for open with option when you double click on a drive. It applies for all the drives. You can view the files only through windows explorer. Autorun virus enters a pc when we use cd rom which is autorun cd. Most of the antivirus software removes this virus as soon as a threat is detected. If not scan the entire sytem for viruses. Few antivirus software that i have used are
1. AVG 2. Avira 3. Panda 4. Symantec. you can protect your computer to install antivirus on computer.
Follow the steps
1. Scan your sytem for viruses. Scan for each drive.
2. This is will fix the problem. The antivirus your using will remove this virus.
3. Otherwise continue your task. There are several manual removal tools like autorun eater 2.4. It worked for me.
4. Even this does not work. Try it manually.
goto command prompt type c: atrrib-h-s-r autorun.inf
del c:\autorun.inf
del c:\ntdelect.com
How to Recover from Multiple Virus Infestations
Have a desktop collecting dust, because it seems like it has enough viruses to contaminate the entire internet? Think the PC won't turn on anymore?
We're going to go through a few steps to get that once reliable desktop or laptop back on its feet again.
Turn on the computer; continuously press F8 during boot-up.
You will recieve a "Safe Mode" selection screen.
Choose just the "Safe Mode" option and press enter.
Once windows boots up, sign in as Administrator or your own account (administrator is preferred)
Go to start > run.. (search bar if in Vista)
Type "MSCONFIG" and press enter.
This will bring up the Microsoft Configuration Utility.
Go to the Services tab.
Check the box that says "Hide All Microsoft Services"
Click Disable All.
Go to the Startup tab and disable everything (uncheck all items).
Click Apply, Ok, and Restart.
Your computer will now boot straight into a clean run of Windows.
Once booted up, log in and open Internet explorer (or Mozilla Firefox if you have it)
Go to http:\\Malwarebytes.org and download MalwareBytes Free.
Install it, let it update, and run a scan. Remove anything that is found.
Close MalwareBytes.
Download Spybot: Search and Destroy from http://spybot.com
Install it, run a scan, remove all items found.
Click Mode > advanced from the top toolbar.
Click on tools in bottom left, then in the right-pane check ActiveX and BHO's
On the left, under tools, Click ActiveX
Delete all of the items listed to the right.
On the left, under tools, Click BHO's
Delete all of the items listed to the right.
Click Spybot S&D from top left, and click immunize.
Then click Immunize all in the mid-top.
To increase effectiveness follow the tips below and check the linked anti virus supprot expert for how to make your PC like-new.
How to Delete the NLSDL.EXE Virus
The NLSDL.exe virus, alternatively knows as the worm.Win32.VB.ck virus, pretends to be a critical Microsoft Windows file. The fake NLSDL.exe will open when your computer boots up. The file then will connect to a remote server and attempt to download malicious files. To remove virus from your system, you will need to delete several files it copies to your computer's
Navigate to the AVG website if you don't already have an antivirus utility installed on your computer. Download and run the installation file for the antivirus utility.
Restart your computer and wait for the logo of your computer's manufacturer to appear on the monitor. Press the F8 key to bring up a new menu.
Scroll down to the "Safe Mode" option and press Enter. Bring up the Start menu once the operating system finishes loading. Click on the "Search" option.
Type the phrase "6d4e036f-cb53-4ebb-9c47-fdc78b67be70.exe" into the Windows Vista search box. Right-click on the file and choose the "Delete" option. Search for and delete the "worm2007.exe" file.
Search for "NLSDL.exe." Look through the files that appear and find the version that is not in the Windows folder. The fake version will be installed into a random folder other than Windows. Right-click on the file and delete it.
Search for "regedit" and double-click the registry editor's icon when it appears in the search results. Click on the folder HKEY_CURRENT_USER.
Navigate through the subfolders Software, Yahoo and Pager to get to View. Right-click and delete the folders YMSGR_Launchcast and YMSGR_buzz.
Close the registry editor's window. Make sure your antivirus definitions are up to date and run a full system scan.
After the virus scan is completed, restart your computer.
How to Scan More Than Just Your C: Drive for Spyware
This post provide virus protection tips to protect your computer. Have Spy Sweeper scan other hard drives or removable devices for spyware and adware
If you have several hard drive or hard drive partitions on your system, you may want Spy Sweeper to scan these drives, and not just your C: drive, for spyware and questionable content. To make this change:
1. Double-click the Spy Sweeper icon in your Windows taskbar. If it is not present, you can click "Spy Sweeper" in your "Programs" or "All Programs" menu.
2. Click the "Options" button on the left.
3. Click the "Sweep Options" button on top.
4. Underneath "Select Drives to Sweep", click the "pull-down".
5. Checkboxes will appear representing your available drives. Check the boxes next to the drives that you want scanned (swept) for spyware.
6. Click the "Apply" button.
Now, when you do a "Sweep Now", these other drives will be checked for spyware.
Report New Spyware Threats to Trend Micro
Alert Trend Micro of suspicious spyware activity to help improve the quality of the Anti-Spyware product. this is useful to remove spyware and protect your computer from spyware
You can help ensure Trend Micro Anti-Spyware is up-to-date with the latest threats to your computing and privacy. If you notice a privacy threat not currently detected by the software, click the "Report" button. Internet Explorer will then open up to a spyware reporting webpage where you can provide information such as:
- Spyware threat name
- Name of product installed
- Name of service installed
- URL where you think the spyware was originally found
- Problems occurred due to the spyware
Does free antivirus offer a false feeling of security?
Consider the results from the latest Anti-Virus comparative review for May 2009 against new malware, indicating that Microsoft’s OneCare achieved an Advanced+ rating (60% detection), putting it on the second position, with Symantec achieving a mere 35% detection rate — ironically a huge percentage of AV-Comparative’s visitors are running free antivirus software according to their voting poll.
Moreover, similar results can be seen in Virus Bulletin’s comparative review for April, 2009 (subscribers only), where OneCare once again outperforms Symantec.
Does this mean that free antivirus is in fact outperforming commercial applications? Given the dynamic nature of today’s threats, what’s true for a particular moment in time can become totally irrelevant at a future date. For instance, some real-time time statistics on antivirus rankings have the potential to offer an entirely different comparative view — free antivirus scanners again rank pretty well — which shouldn’t be considered as the primary benchmark when attempting to answer whether or not free antivirus offers a false feeling of security.
Both, commercial and free stand-alone antivirus scanners suffer from a similar weakness - they’re over-positioned in the mind of the average Internet user. This over-positioning results in higher expectations which on the other hand results in lack of security awareness on what an antivirus scanner can, and cannot protect against.
Cybercriminals have been tricking signature based scanning engines for years, and their quality assurance practices are becoming even more professional and automated through the user of underground versions of popular community services such as VirusTotal, or by using multiple offline virus scanning engines before a campaign is launched. Similar services attempting to verify whether or not their malware sample will bypass popular personal firewalls are also known to be available on demand.
For more visit here: http://blogs.zdnet.com/security/?p=3733
2009 will break previous Malware record: McAfee
McAfee has catalogued more than 1.2 million unique samples of malware in the first half of 2009, putting this year well on course to smash last year's record in malware creation. In the first half of 2008 McAfee has identified around 500,000 unique pieces of malware while in the second half of 2008 McAfee saw one million pieces, arriving at a total of 1.5 million unique pieces of malware for the full year 2008.
"In the first half of 2009, we have seen about three times the unique malware discovered in the same period in 2008. This tremendous growth is a signal of daunting times for users, as malware infiltrates more and more of the platforms we trust," said Dave Marcus, Director of Security Research and Communications at McAfee.
According to the report, 30-40 percent of all password stealing Trojans focus on gaming and virtual worlds, illustrating the high profit potential of virtual goods. Also, 80 percent of all banking emails are fraudulent. The report also states that average loss per victim from phishing is $866.
Norton antivirus beta defies cyber threats
NORTON’S Anti Virus version 2010, the new antivirus software released in March 2009 Symantec Corp., aims to identify in advance the viruses and malwares that might affect computers with online-application access.
The new detection method called reputation-based (quorum) reveals malicious activity or programs before it can be clicked or downloaded by a user based on the number of users, publisher and origin.
“This detection explains where the threat came from and what it may cause to applications installed in a user’s system. It provides ‘insights before install,’” explained David Hall, security expert and regional consumer product marketing manager of Symantec in Asia-Pacific told reporters during a live teleconference.
Although other detection methods in the form of signature, uncovering threats and comparing it to archived virus, and heuristic, concealing malicious activity through file analysis and file emulation, are still helpful, these two can no longer recognize recently released malware samples.
The executive shared that failure to identify such malware and threats could lead the threat to their proliferation in a system and even hide underneath an operating system, thus, even when safe boot is carried out, the condition of the system remains the same.
With an average of 200 million malware spread on the Web every month, according to Symantec, protection of users extending to that of other computer users are always at risk.
To prove the effectivity and efficiency of Norton Beta, AV-test.org conducted an observation of the product on July 6 using operating platforms of Windows XP and Vista.
It noted, “We have tested the dynamic [behavior-based] detection with a few recently released malware samples which are not yet detected by heuristics, signatures or the ‘in the cloud’ features and found that about 80 percent of them are properly identified and remove virus from computer.”
Inside Microsoft's anti-virus
Microsoft recently officially announced its free, real-time consumer anti-malware solution for fighting viruses, spyware, rootkits and trojans.
Termed Microsoft Security Essentials (MSE), it aims to help users fight the threats that plague Windows PCs which are traditionally considered more prone to malware attacks than their Mac and Linux brethrens.
Microsoft described MSE as "a no-cost anti-malware solution that provides consumers with quality protection from threats including viruses, spyware, rootkits and trojans."
Here's a peek into the Microsoft's free security software.
Previously code-named 'Morro', MSE is the company's new anti-virus/anti-spyware for basic use. The programme replaces subscription-based OneCare service.
A beta of MSE was released recently in English and Brazilian Portuguese for public download at microsoft.com/security_essentials for the first 75,000 users.
The company is likely to release a second public build, either a Beta Refresh or a Release Candidate by September. Microsoft aims to release the final product "before the end of the year".
While OneCare offered a Managed Firewall, PC Performance Tuning, Data Backup and Restore, Multi-PC Management, and Printer Sharing, MSE is reportedly closer to Forefront Client Security, Microsoft's antivirus product for the enterprise.
MSE will not have some of OneCare's features such as backup management, wireless network management and optimisation.
MSE will offer antivirus basics, including built-in and customisable scan options, a scheduler, automatic definition file updates, a real-time defense shield and rootkit protection. Unlike Windows Live OneCare, MSE will not require a Windows Live ID, or any personal information. It will however, require WGA validation
Available free of cost, the programme is thrifty on resource usage, making it ideal for low-bandwidth scenarios as well as on less powerful PCs. According to Microsoft it is suitable for even low-powered PCs such as Netbooks.
The software weighs in a rough 3MB for a 32-bit version and 7MB for a 64-bit version.
According to reports, Microsoft Security Essentials comes with a new feature called Dynamic Signature Service that checks for malware even before the malware's specific signature has been identified.
Microsoft says Security Essentials copies the behaviour of programmes before they run, and uses the signature created during the process to look for any suspicious behaviour. The Dynamic Signature Service then determines what action needs to be taken against the potential malware.
The programme also offers real-time protection, and warns if a user is downloading malware or if the system has been infected. The software scans the system once a week by default. MSE will compete with rival subscription programmes from McAfee and Symantec and with several other free packages.
Why Antivirus Software's Are Necessary
Antivirus software are very necessary for our computer to secure and protect our very important and costly personal data from virus or other malwares. Due the continuous improvement in the field of the computer and internet technologies on one side these developments helped in making this world as glsonalobal village, where one per can contact to the another person sitting in any part of the world and also in the several other fields of the life from Business to the Education . But in spite of all these developments it also makes us prone to the several sort of threats For example Virus Trojan Spam email and worms.
If you want to protect your computer then you should install antivirus software program, there are many anti-virus software's available in market these days. Viruses are small part of the malicious code that protects you. Anti-virus has expanded to include worms, Trojans, viruses, jokes and hoaxes and even spyware and adware. If you're anti-virus product doesn't detect and block spyware you can try a product like Adware Pro which will protect your system from spyware or adware.
This anti-virus software's scans and detects the malicious programs in the computer. But we must keep one thing in mind that installing the anti-virus programe does not mean that our computer data is safe from any sort of threat as these computer threats are released in the Internet on the daily basis. So to be upgraded against all these new threats we should have a continuous update of our anti-virus . The updation process adds the new virus definition to the Antivirus software which makes the anti-virus to detect the new virus or others threats and delete them from the computer.
For example recently a worm called as the Conflicker was released on the Internet it uses the svchost.exe file of the windows based computers to attack. but this worm is not able to cause much of damage as all the antivirus software's companies has released the updates for this worm and Microsoft also released the patch to protect the computer against this So to be safe and secure against all the Internet threats we should use good antivirus software's and to protect our data from all the latest threats we should update the antivirus software at least once in weak.
After installing antivirus software update the antivirus software and you have to scan your system with Antivirus software, you can schedule the scan as you want to given time you can manually scan your system to detect and remove spyware. There are free software available on net like Malware Byte, Spybot, Super Anti Spyware, Trojan Remover etc. Follow these steps to keep your computer protect from spyware, malware and viruses.
Source: http://EzineArticles.com/?Why-Antivirus-Softwares-Are-Necessary&id=2477655
Microsoft offers free Anti-virus
A trial version of Microsoft's liberated anti-virus code has been launched in the US, China, Brazil, and Israel.
Microsoft Security Essentials (MSE) promises to provide grouping with base protection against viruses, trojans, rootkits and spyware.
The code giant has been criticised in the time for imperfectness to include liberated section code with Windows.
Its first section package, Windows Live OneCare, failed to attract some customers and will be discontinued.
Microsoft is hoping that MSE, available as a liberated download from its site, will prove more popular. It has said it will automatically update it for users.
However, rival section vendors have questioned whether Microsoft can compete with more established anti-virus players.
Family doctor
\"Early reviews of the beta are display that it under-performs when compared to existing freeware products, and substantially below paid solutions,\" said section firm Symantec in a statement.
\"Referring to Microsoft's base anti-virus and anti-spyware creation as an essential section resolution is misleading. Consumers requirement firewall protection, web protection, anti-spam and identity safeguards,\" it said.
J.R Smith, chief executive of section firm AVG, said Microsoft's entry into the section market could \"further confuse consumers most the inexplicit section of their computer\".
\"It's important to discern that Microsoft's persona in the internet section demesne is much like your relationship with your trusty kinsfolk doctor. They can support diagnose the problems. In addition, they treat some general ailments. In the end, though, they are not a replacement for a specialist when you requirement one,\" he said.
Initially 75,000 trial versions of MSE, codenamed Morro, will be available in the US, Brazil, China and Israel.
Autorun Virus Removal - How to Pull Out Your Computer System From Autorun Virus
Autorun virus, as it signifies exploits the Auto run feature in Windows Operating System, which is misused to move programs stored in extractable media similar the DVDs, CD ROMs, USB Devices, and Storage Sticks.
The Auto run virus is a Windows PE EXE record that spreads itself on a machine by making duplex copies of autorun.inf files on a computer system. Each second you artifact a removable media or backup move your drives in Windows Soul, the virus files signaling executing. The Auto run virus creates a plenty enter called logon.bat and modifies the scheme registry to secure that each second you execute your system the virus is launched automatically.
The virus may clandestinely link to a leering website and set a rootkit on your machine. The rootkit may put a key logger to steal your own assemblage much as statement lottery, usernames, passwords accomplishment roster message, ethnic precaution, and other radio sensitive information. It is hence, highly crucial that you disappear autorun virus from your machine as soon as doable.
The autorun virus can be removed both manually and by using any autorun virus separation slave. The practice cremation time of the virus depends on the intensity of the attachment of the virus to the system. To get rid of the virus manually, you can perform these computer repair steps:
1. End the auto run knowledge finished Task Handler.
2. Revive the grouping in uninjured mode and outside the dictation.
3. Identify all grouping and .exe files on the C (or your Operating System actuation).
4. Wound invisible, scheme, and see exclusive attributes for autorun.inf and ntdelect.com (not ntdetect.com)
5. Remove both the files.
6. Restate these steps for all the drives on your machine.
7. Examine for kavo.exe in C:\windows\system32\ and withdraw it.
8. Outside registry editor and remove all the entries of kavo.exe under:
HKEY_LOCAL_MACHINE\SOFTWARE
HKEY_CURRENT_USER\SOFTWARE
The drill separation of autorun virus is recommended only to computer experts because removing or editing windows registry can crusade intense casualty to your method if you delete the wrongheaded files.
Want to mash those nettlesome pop up ads and get your PC gushing equivalent new? Get the issue fixed with some computer support today.
Source: http://EzineArticles.com/?Autorun-Virus-Removal---How-to-Pull-Out-Your-Computer-System-From-Autorun-Virus&id=2523476
How to remove Winweb Security 2008
This post provide spyware removal tips and Winweb Security 2008 is another malware that tries to get money disguised as a security tool. Winweb Security causes various problems instead of protecting a computer. It loads large amounts of pop-ups, it slows computer?s performance and it hijacks web browser. These are symptoms of computer parasite, so taking WinwebSecurity as anti-spyware and purchasing it is not recommended.This post provide steps to remove winweb Security 2008 from your computer
Steps to remove Winweb Security 2008 sfsd
Download and install Hizack This.
http://www.trendsecure.com/portal/en-US/tools/security_tools/hijackthis
Run HijackThis. Click on the Do a system scan only button.
Locate for these lines and place a checkmark against each of the following, if still present
O2 - BHO: BHOws Object - {D5DF7C9D-6069-4552-8B0C-D02A912FC889} - ws.dll (file missing)
O4 - HKLM\..\Run: [adpws] ?C:\Documents and Settings\All Users\Application Data\5689887B.exe?
O4 - HKLM\..\Run: [{90BF8224-CD63-4081-A4C7-EF9A2CF6596F}] ?C:\Documents and Settings\All Users\Application Data\[RANDOM_NAME].exe?
O4 - HKLM\..\Run: [RANDOM_NUMBERS] ?C:\Documents and Settings\All Users\Application Data\[RANDOM_NUMBERS]\[RANDOM_NUMBERS].exe?
O4 - HKLM\..\Run: [WinwebSecurity] ?C:\Documents and Settings\All Users\Application Data\WinwebSecurity\WinwebSecurity.exe?
Note: Few examples: [RANDOM_NUMBERS] - 764082672, 1612374962;RANDOM_NAME - 5828ADFF.exe, A974FA49.exe
Click on Fix Checked when finished and exit HijackThis.
Click Start, then Run and type regedit.exe.
Locate the following registry key and delete
Warning: Serious problems might occur if you modify the registry incorrectly by using Registry Editor or by using another method. These problems might require that you reinstall the operating system.
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run | WinwebSecurity
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run | adpws
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run | {90BF8224-CD63-4081-A4C7-EF9A2CF6596F}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\Browser Helper Objects\{D5DF7C9D-6069-4552-8B0C-D02A912FC889}
Close the registry editor.
Locate the following files and delete:
C:\Documents and Settings\All Users\Application Data\5689887B.exe
C:\Documents and Settings\All Users\Application Data\A974FA49.exe
C:\Documents and Settings\All Users\Application Data\5828ADFF.exe
C:\Documents and Settings\All Users\Application Data\WinwebSecurity
Download MalwareBytes Anti-malware (MBAM) http://www.malwarebytes.org/mbam.php. Close all programs and Windows on your computer.
Double Click mbam-setup.exe to install the application. When the installation begins, keep following the prompts in order to continue with the installation process. Do not make any changes to default settings and when the program has finished installing, make sure a checkmark is placed next to Update Malwarebytes? Anti-Malware and Launch Malwarebytes? Anti-Malware, then click Finish.
If an update is found, it will download and install the latest version.
Once the program has loaded, select ?Perform Quick Scan?, then click Scan.
When the scan is complete, click OK, then Show Results to view the results.
Make sure that everything is checked, and click Remove Selected.
When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.
Restart the computer.
Related Search
How to use Spyware Doctor With AntiVirus
anti virus support
How to uninstall Spyware Doctor
Fix Event ID 2011 Antivirus Problems
After you install Norton AntiVirus for Windows or IBM AntiVirus 3.01N (Build 301.590), you receive the following error messages:
Not enough server storage is available to process this command.
and
Not enough memory to complete transaction. Close some applications and retry.
Clients cannot access network shares. Additionally, Event Viewer on the Windows server may log one or more of the following event messages in the system log:
Event ID : 2011
Source : Srv
Description: The Server's configuration parameter "IRPStackSize" is too
small for the server to use a local device. Please
increase the value of this parameter.
This Post provide antivirus support to fix this issue. You can find step by step resolution
1. Click Start, and then click Run.
2. Type regedit, and then click OK.
3. Navigate to the following key:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanmanServer\Parameters
4. In the right pane, double-click the IRPStackSize value.
NOTE: If the IRPStackSize value does not already exist, use the following procedure to create it:
1. In the Parameters folder of the registry, right-click the right pane.
2. Point to New, and then click DWord Value.
3. Type IRPStackSize.
IMPORTANT: Type "IRPStackSize" exactly as it is displayed because the value name is case-sensitive.
5. Change the Base to decimal.
6. In the Value Data box, type a value that is larger than the value that is listed.
If you created the IRPStackSize value using the procedure described in step 4, the default value is 15. It is recommended that you increase the value by 3. Therefore, if the previous value was 11, type 14, and then click OK.
7. Close the Registry Editor.
8. Restart the computer.
If the problem persists after you complete the preceding procedure, try to increase the value of IRPStackSize even more. The maximum value for Windows 2000 is 50 (0x32 hex).
If you are running Windows NT 4.0, and the problem persists after you complete the preceding procedure, you may have to apply Windows NT Service Pack 4 or Service Pack 5.
How to uninstall Spyware Doctor
This post provides spyware support step by step method to uninstall Spyware Doctor.
Follow the steps mention below to uninstall Spyware Doctor 5 and 6:
Ensure that you have fully exited the application. To fully exit from Spyware Doctor please right click on the Spyware Doctor icon in the notification area (next to the clock on the Windows taskbar) and select Shutdown from the menu that appears. Please also close any instances of Internet Explorer or other browsers.
Perform an uninstall of Spyware Doctor from: Start > Programs > Spyware Doctor > Uninstall Spyware Doctor.
Make sure that the Spyware Doctor folder (which by default would be under 'C:\Program Files') no longer exists. If the 'Spyware Doctor' folder still exists, delete the folder.
Spyware Doctor 4:
Right click on the Spyware Doctor icon (if it exists) in the notification area (next to the clock on the Windows taskbar) and select Exit from the menu that appears.
Perform an uninstall of Spyware Doctor from: Start > Programs > Spyware Doctor > Uninstall Spyware Doctor.
Make sure that the Spyware Doctor folder (which by default would be under 'C:\Program Files') no longer exists. If the 'Spyware Doctor' folder still exists, please delete the folder.
How to manually block files or sites in Spyware Doctor with Antivirus
This post provide antivirus support to manually block files or sites using Spyware Doctor with Antivirus.
Spyware Doctors Global action list enables users to manually block files and sites. Make sure IntelliGuard / IntelliGuard is completely activated and simply add the file or site you wish to block.
Follow the steps below:
Open Spyware Doctor and select the 'Settings' button >> 'Global Action List'.
Click the 'Add' button and the 'Add New Rule' box will appear.
At the ' Select data type: ' dropdown box make sure you select 'File on disk' or 'Web site address/cookie'.
Browse for the 'executable file' (.exe file) that opens and runs the application in question or type the URL you wish to block.
Once the file or site is selected, at the bottom dropdown box make sure ' Always block ' is selected, then click the 'Add' button.
The file or site is now added and will be blocked by IntelliGuard / IntelliGuard.
How to use Spyware Doctor With AntiVirus
This post antivirus support to describe how to use Spyware Doctor with Antivirus
Follow the tips
Open Spyware Doctor with AntiVirus and perform a Smart Update to ensure you have all the latest updates. Ensure IntelliGuard / IntelliGuard Protection has been activated.
From the System Status screen, ensure that Computer Immunization is ON. If it is set to OFF, simply click on the button to turn it ON.
Click on the Start Scan button on the left to display the System Scan screen.
Select the Full Scan radio button under the Select Scan Type section, and then click on the Scan Now button beneath this to conduct a full scan.
During scanning process, you can always Pause Scan or Stop Scan anytime.
If any infections are found, click the Fix Checked button to remove all detected infections. If the legal notice disclaimer displays, read it, and if you wish to proceed, click the Continue Removal button.
IYogi Press Release: iYogi Acquires Clean Machine Inc.
New York, NY, May 11th, 2009 : iYogi, a global direct to consumer and small business remote technical support provider, today announced it’s acquisition of Clean Machine Inc, a provider of remotely administered PC security and performance management services. Clean Machine will operate as a separate brand under the iYogi services umbrella along with the recently lunched Support Dock (www.supportdock.com) and its comprehensive range of 24/7 technical support services for computers, printers, MP3 players, digital camera, routers, servers and more than 100 software applications. Larry Gordon, Founder of Clean Machine is appointed as the President of Global Channel Sales for iYogi.
iYogi will integrate technology and innovation that Clean Machine Inc. has developed for delivering an enhanced service experience by proactively managing the health and security for PC's and Apple Computers. This acquisition also broadens iYogi's access to key markets through Clean Machine's existing partnerships. Larry Gordon's past experience and successful track record will accelerate iYogi's expansion through his focus on global alliances.
Commenting on the acquisition of Clean Machine Inc., Uday Challu, CEO & Co-founder of iYogi, said,
"This acquisition will help iYogi to enhance our customer experience and extend our market reach to the millions of consumers that are challenged by the increasingly complex technology environment. Clean Machine's proactive maintenance and management of PCs in home and small business environment will be our launch platform for building the next generation of managed services for consumers."
"We are delighted to have Larry spearheading partnerships and global alliances for iYogi. His incredible experience in marketing, sales and building global alliances will help forge partnerships with retailers, multiple service operators, software publishers, original equipment manufacturers (OEM) and other such companies that are at the frontlines for managing tech support issues for consumers and small businesses",
added Challu.
With more than 20 years of experience, Larry Gordon has played a variety of strategic roles in marketing, sales and building alliances. Larry was the Executive Vice President at Capgemini and Kanbay. He was also VP of Global Marketing for Cognizant (Nasdaq: CTSH), a leader in global IT services and Director of Marketing for New York based Information Builders.
"I am excited to join a company that shares a common mission to Clean Machine in creating a global brand for delivering the best technical support to consumers and small businesses. We also share a common approach of utilizing highly skilled talent with leading edge tools, thereby delivering services at incredible price-points, with high margins for our partners",said Larry Gordon, the newly appointed President of Global Channel Sales at iYogi.
ABOUT IYOGI
Headquartered in Gurgaon, India with offices in New York, USA, iYogi provides personalized computer support for consumers and small businesses in United States, United Kingdom, Canada and Australia. IYogi's 24/7 phone and remote technical assistance, spans across a comprehensive range of technologies we use every day from a wide range of vendors. Utilizing its proprietary technology iMantra , and highly qualified technicians, iYogi delivers amongst the highest benchmarks for resolution and customer satisfaction. iYogi is privately held and funded by SAP Ventures, Canaan Partners, and SVB India Capital Partners. iYogi was recently awarded the Red Herring Global 100 Award, recognizing it as one of the 100 most innovative private companies driving the future of technology. For more information on iYogi and a detailed list of technologies supported, visit: www.iyogi.ca.
ABOUT CLEAN MACHINE
Clean Machine Inc. is a NJ-based and incorporated company that helps consumers and small business owners easily manage and protect their computing environments safely and cost effectively. The company is has a unique, powerful and inexpensive PC concierge service. Specifically, each customer is assigned a highly-trained tech concierge who remotely examines their computer system on a scheduled and very secure basis. The PC concierge will immediately fix software-based problems and prevent new threats to the customer's computing environment including offensive pop-ups, browser redirects and slow performance, and then provides a detailed report. Clean Machine's proprietary Radar(TM) technology (Remote Access Detection Audit and Repair) allows its expert technicians to remotely resolve any problems, eliminating the need for customers to go through the frustrating process of speaking with a tech support expert, and still having to do the work themselves. In other words, the Clean Machine PC concierges do it all. For more information on Clean Machine please visit www.pccleanmachine.com.
CONTACT:
iYogi Contact
Vishal Dhar
President Marketing
iYogi Inc.
Phone: 212 229 0901
Email: vishal@iyogi.net
The Press Release is available at its source: iYogi acquires Clean Machine Inc.
Download Norton AntiVirus Virus Definitions May 08, 2009
Norton AntiVirus Virus Definitions description Contains the latest free virus databases for Norton AntiVirus Virus (NAV)
Signature file updates ensure that your PC is protected from the latest viruses. It is very important to make sure that you have the latest signature on your PC.
As new threats emerge, Symantec immediately builds new Virus Definitions Updates and makes them available for download.
Note: The i32 Intelligent Updater package cannot be used to update Symantec AntiVirus Corporate Edition 8.0, 9.0, or 10.0 servers or Norton AntiVirus Corporate Edition 7.6 servers, but can be used to update Corporate Edition clients. The x86 Intelligent Updater package can be used to update Corporate Edition clients and servers.
Which virus definition file do you need?
External Mirror 1 & External Mirror 2 - Supports the following versions of Symantec antivirus software:
· Norton AntiVirus 2003 Professional Edition
· Norton AntiVirus 2003 for Windows 98/Me/2000/XP Home/XP Pro
· Norton AntiVirus 2004 Professional Edition
· Norton AntiVirus 2004 for Windows 98/Me/2000/XP Home/XP Pro
· Norton AntiVirus 2005 for Windows 98/Me/2000/XP Home/XP Pro
· Norton AntiVirus 2006 for Windows 2000/XP Home/XP Pro
· Norton AntiVirus 2007 for Windows XP Home/XP Pro/Vista
· Norton AntiVirus for Microsoft Exchange (Intel)
· Norton SystemWorks (all versions)
· Norton Utilities for Windows 95/98 (all versions)
· Symantec AntiVirus 3.0 for CacheFlow Security Gateway
· Symantec AntiVirus 3.0 for Inktomi Traffic Edge
· Symantec AntiVirus 3.0 for NetApp Filer/NetCache
· Symantec AntiVirus 8.0 Corporate Edition Client
· Symantec AntiVirus 8.1 Corporate Edition Client
· Symantec AntiVirus 9.0 Corporate Edition Client
· Symantec AntiVirus 10.0 Corporate Edition Client
· Symantec AntiVirus 10.1 Corporate Edition Client
· Symantec AntiVirus 10.2 Corporate Edition Client
· Symantec Mail Security for Domino 4.0
· Symantec Mail Security for Domino 5.0
External Mirror 3 & External Mirror 4 - Supports the following versions of Symantec antivirus software:
· Norton AntiVirus 2008 for Windows XP Home/XP Pro/Vista
· Norton Internet Security 2008 for Windows XP Home/XP Pro/Vista
External Mirror 5 & External Mirror 6 - Supports the following versions of Symantec antivirus software:
· Norton AntiVirus 2003 Professional Edition
· Norton AntiVirus 2003 for Windows 98/Me/2000/XP Home/XP Pro
· Norton AntiVirus 2004 Professional Edition
· Norton AntiVirus 2004 for Windows 98/Me/2000/XP Home/XP Pro
· Norton AntiVirus 2005 for Windows 98/Me/2000/XP Home/XP Pro
· Norton AntiVirus 2006 for Windows 2000/XP Home/XP Pro
· Norton AntiVirus 2007 for Windows XP Home/XP Pro/Vista
· Norton AntiVirus for Microsoft Exchange (Intel)
· Symantec AntiVirus 3.0 CacheFlow Security Gateway
· Symantec AntiVirus 3.0 for Inktomi Traffic Edge
· Symantec AntiVirus 3.0 for NetApp Filer/NetCache
· Symantec AntiVirus 8.01 (Build 457 and above) Corporate Edition Client
· Symantec AntiVirus 8.01 (any Build prior to 457) Corporate Edition Client or Server
· Symantec AntiVirus 8.1 Corporate Edition Client
· Symantec AntiVirus 9.0 Corporate Edition Client
· Symantec AntiVirus 10.0 Corporate Edition Client
· Symantec AntiVirus 10.1 Corporate Edition Client
· Symantec AntiVirus 10.2 Corporate Edition Client
· Symantec AntiVirus for Bluecoat Security Gateway for Windows 2000 Server/2003 Server
· Symantec AntiVirus for Clearswift MIMESweeper for Windows 2000 Server/2003 Server
· Symantec AntiVirus for Microsoft ISA Server for Windows 2000 Server/2003 Server
· Symantec Mail Security for Domino 4.0
· Symantec Mail Security for Domino 5.0
· Symantec Mail Security for Microsoft Exchange Server 4.x
· Symantec Mail Security for Microsoft Exchange 4.5
· Symantec Mail Security for SMTP v 4.x
· Symantec Web Security 3.0 for Windows
· Symantec AntiVirus Scan Engine for Windows
This all inclusive updater will update all of the products listed above. This is useful for updating multiple machines and products with one single package.
External Mirror 7 & External Mirror 8 - Supports the following versions of Symantec antivirus software for 64-bit platforms:
· Norton AntiVirus 2008 for Windows XP/Vista for 64-bit OS only
· Norton Internet Security 2008 for Windows XP/Vista for 64-bit OS only
External Mirror 9 & External Mirror 10 - Supports the following versions of Symantec antivirus software for 64-bit platforms:
· Symantec AntiVirus 8.1 Corporate Edition Client for 64-bit OS only
· Symantec AntiVirus 9.0 Corporate Edition Client for 64-bit OS only
· Symantec AntiVirus 10.0 Corporate Edition Client for 64-bit OS only
· Symantec AntiVirus 10.1 Corporate Edition Client for 64-bit OS only
· Symantec AntiVirus 10.2 Corporate Edition Client for 64-bit OS only
More Related Search
Malware: Another Pandemic Of Which You Should Be Aware Windows 7 RC contain Trojan Conficker Computer Virus Poses New Threat Install Antivirus How to download AVG Removal Utility
Windows 7 RC contain Trojan
Pirated copies of Windows 7 Release Candidate (RC) on file-sharing sites contain malware, according to users who have downloaded the upgrade.
Windows 7 RC, which Microsoft Corp. will officialy launch today, leaked two weeks ago, with copies first appearing on BitTorrent tracking sites on April 24.
Some of the pirated builds include a Trojan horse, numerous users said in message forums and in comments on BitTorrent sites such as Mininova.org.
"Just a warning for anyone downloading the new RC builds of windows 7. Quiet [sic] a lot of the downloads have a trojan inbedded [sic] in the setup EXE," said someone identified as Frank Fontaine on a Neowin.net discussion thread. "The Setup EXE is actually a container, it appears to be a self-extracting EXE. There are 2 files inside, Setup.exe and codec.exe."
Fontaine's antivirus software identified the "codec.exe" file as a generic Trojan.
"Suspicious codec.exe!" reported someone labeled as "UltimateGTR" on Mininova, commenting on one of the 32-bit builds.
Another Mininova commenter, "WuNgUn," identified the malware as the "Falder" Trojan, which downloads fake security software, dubbed "scareware," to PCs and installs a rootkit to hide from legitimate antivirus products.
More
Download windows 7
Antivirus Support for Windows 7
System requirment for Windows 7
Windows 7 Release Candidate: Download instructions
AutoRun offers no chance to worms with Windows 7
Microsoft Windows 7 has included autorun function to protect your pc from Worm. You no need to install anti-virus to extra protection.
The continuing circulation of the Conficker worm has prompted Microsoft to make changes to the AutoRun function in the Windows 7 release candidate, due for release tomorrow. As well as exploiting vulnerabilities in Windows and guessing simple passwords, Conficker also penetrates computers by using the Windows AutoRun function, which allows programs to be run automatically when a USB flash drive is connected or CD inserted.
Conficker programmers have also taken into account the behaviour of AutoRun under Vista, where the AutoRun function requires confirmation from the user. After connecting an infected USB flash drive, the AutoRun dialogue box shows a fake icon to fool users into thinking that clicking on it will open a folder. Instead, it runs the worm. Suspicions should be raised by the apparent duplication of the menu item for opening the folder, but nevertheless this trick has clearly been, and remains, fairly effective.
To stop users from falling into this trap in future, Microsoft has completely removed the option of running a program from the dialogue box for writeable media such as USB sticks, memory cards and external drives. The change does not, however, apply to CDs and DVDs. Testing will be required to determine what this means for U3 USB drives, which emulate a CD-ROM.
See also On this site
How Do You Remove Conficker Worm Files?
How to remove Conficker Worm registry keys
Online Virus Removal
Variant of Conficker worm
Conficker Computer Virus Poses New Threat
The Conficker worm computer virus updated itself late Wednesday, bringing a new threat to the millions of PCs currently infected by it.
The discovery was made by Internet security company Trend Micro, who stated in a press release that the ybercriminals behind the notorious Conficker worm may finally be gearing up for more serious attacks.ԍ
As many as 12 million computers could be infected by the worm. Microsoft is offering a $250,000 bounty for its creator.
The worm can be used to steal data from computers. It can also control infected computers to be used in what is called a otnet.The army of computers in the botnet can then be used by a hacker to launch cyberattacks against anything from Web sites to government computer networks.
Such an attack was launched against the U.S. Pentagon in 2007 by Chinese hackers. The Pentagon was forced to temporarily shut down its network and lost an unknown amount of information.
The activation of the Conficker worm came the same day (Wednesday) as reports of cyber spies infiltrating the U.S. power grid. The Wall Street Journal reported that Chinese and Russian spies were behind it, leaving software in the system that could shut down the U.S. electric grid.
Canadian researchers also discovered late last month the Chinese ԇhostNetԗa spyware system that is being used to monitor and steal documents from 1,295 computers in 103 countries. Among their targets were the Dalai Lama, the media, and hundreds of government and private offices.
Whether the Conficker worm has any connection to the other attacks is yet to be known.
On Oct. 26, 2008, just three days after the discovery of the worm was announced by Microsoft, Chinese hackers created a toolkit that would allow anyone to exploit the system gap. The kit was originally sold for $37.80 but was later made available for free download.
The surprisingly rapid spread of the Conficker worm is attributed to its ability to pass between computers on USB memory sticks. It is also able to invade computer networks. The worm spreads through vulnerabilities in Microsoftӳ operating system, Windowsءlthough an update is now available to repair the vulnerabilities.
The update of the worm was originally suspected to be taking place on April 1. According to Trend Micro the new variant of the worm, known as WORM_DOWNAD.E, runs using a random file name and random service name. It updated itself through P2P communications. The new file was discovered in the Windows Temp folder.
Its effects are yet to be known.
Strangely, according to a BBC report, researchers from the Symantec internet security company said the new update has instructions for the worm to remove virus itself on May 3, 2009, yet a gap in the machine will remain open so that its creators can still control the compromised PC
How antivirus software and System Restore work together
With System Restore in Windows XP, you can restore your computer to a previous state, and you do not lose private data files (such as Word documents, graphic files, and e-mail). System Restore actively monitors computer file changes and some program file changes to record or store earlier versions before the changes occurred. You do not have to take computer snapshots because System Restore automatically creates identifiable restore points that you can use to revert to a previous time. Restore points are created when significant computer events occur (such as the installation of a program or a driver) and periodically (each day).
To help protect critical computer and program files, System Restore monitors, records, and in some cases copies these files before they are modified. For example, when a process or a program (such as an upgrade, an inadvertent user change, a driver installation, or a virus) modifies a critical computer file or program file, System Restore records and saves a copy of the file before the change occurs. If a problem occurs, a restore operation can replace files with previously saved versions of those files. Antivirus support programs use auto-detection or scanning mechanism to monitor critical and personal files on the computer for signs of infectivity. The antivirus program then takes action to clean, remove, or quarantine (isolate) files that known viruses have infected. System Restore also tracks an antivirus program when it modifies (cleans), moves, or deletes a monitored, critical, computer or program file.
During a restoration, an active antivirus program scans for infected files. If the antivirus program detects any infected files, the antivirus program tries to modify, move, or delete the infected files. If the antivirus program successfully cleans the infected files, System Restore restores the cleaned files. However, if the antivirus software cannot clean a file, the antivirus software deletes or quarantines the file. As a result, the restoration does not work because these actions to the file cause an inconsistent restoration state. As a result, System Restore reverts to the state immediately before the restoration.
Signature files for antivirus programs are updated as viruses become known. As a result, a restoration that did not work several days ago might succeed after the antivirus program is updated. However, if you undo and retry a restoration to a point that succeeded before, the restoration may not work if a new signature or definition detects a virus that the antivirus program cannot clean on a backed-up file.