Cari Blog Ini

My Ping in TotalPing.com
Showing posts with label anti virus. Show all posts
Showing posts with label anti virus. Show all posts

Android malware 2012

Written By Unknown on Thursday, February 16, 2012 | 10:12 PM

Over time, Android is constantly increasing in terms of market share. Drastically increased the market share of Android did not escape the attention of cyber criminals. In 2011 the last, the real threats to the Android is starting to look. Many malicious applications that infiltrate the operating system made ​​by Google. What about 2012? In 2012 a new beginning, but the threat of malware on Android already started popping up!

One of the attacks against Android recently occurred in France. An attack of this Android.Qicsomos named deceive victims who want to find and remove the controversial application of Carrier IQ. Interestingly, Symantec security team was not able to find traces of these false applications in the Android Market. This application is spreading as spam or phishing campaign of an operator in Europe to ask the victim to download and run the application. When running the application, Carrier IQ is not obtained, but the smartphone will send an SMS to a premium number!

The threat is characterized by a certificate issued as part of the Android Open Source porject (AOSP). This allows the application to a particular device is installed on the screen without having to go through the normal licensing notice, which is the primary defense mechanism to face dangerous applications.

Previously, the Android Market there are some rogue application masquerading as popular games. The application under the name "Steven Creek Software". When you are finished installing the application in this evil, then there will be a key to be pressed to complete the installation. However, it turns out the button will take you to the internet browser and take you to a website Online Income Solution.
10:12 PM | 0 comments | Read More

Trojan horse SpyEye : virus stealing money on online bank account

Written By Unknown on Tuesday, January 24, 2012 | 3:15 AM

Circulated a new version of the software 'trojan horse' that can steal your money. Creepy, not only that, the virus is able to make a convincing fake bank statements.The new version of Trojan horse SpyEye this could be a nightmare for you. When visiting an online bank, there would be no trail of transactions associated cyber criminals are using your account and empty the bank account.Even worse, your balance will be adjusted to appear as if nothing happened. The attack on a Windows PC is detected in the United States (U.S.) and Britain. Software that is stealing bank passwords to access this account waiting to enter the same banking details before the 'adjust' what you see.The idea of ​​this attack is to give thieves more time to use your debit card details on a fraudulent transaction without realizing it. The first known case of this attack is, the bank refused to give money or a written statement indicating cyber criminals have been draining money from your account.The new version of this SpyEye target banks in the U.S. and the UK. Trusteer security company detected the virus, said, "When the victim returned to visit their online banking site, malware is hiding the fraudulent transactions that occur and change the total balance artificially."As a result, customers who are deceived do not know his account had been 'taken over' as well as fraudulent transactions that occur, he added. Software which is a common variant of cyber attacks are made in such a way that you like do not realize this crime occurred."SpyEye is a 'child' Zeus crimeware that takes the data forming the web in the browser," said Naked Security blog, which is part of web security experts Sophos. This year, just before the last holiday season, a new version SpyEye Trusteer find this in the U.S. and Britain, he said."This new Trojan can not intercept or divert email messages but conceal fraudulent transactions, even after the user out of the banking site and then log back into their account," he continued.Through sophisticated attacks like this SpyEye, there are some signs that indicate a wrong thing is happening. There is a defense that will update itself manually if needed.You should also make sure the option 'anti-phishing' in state 'on' in Firefox, Chrome or Internet Explorer that will examine the 'black list' of sites and prevent the browser is directed to a version of 'false' which gives your bank statement.
3:15 AM | 0 comments | Read More

Clean shortcut virus in your PC

Written By Unknown on Saturday, December 10, 2011 | 3:27 AM

Again, the virus makes all the work to be hampered, though not all of the data removes viruses but the name is very annoying. Although virus does not destroy the document even though it still remains by inhibiting the work (process) conducted a computer.One virus that recently quite a hassle that is often called a shortcut virus, this virus does not damage our files, but only hides the original file and then create a new shortcut to the file so that when clicked shortcut we made a virus then the file / folder is not opened because it was not the original shortcut.
Once I tried to find a solution how to remove viruses shortcut with the help of google Sanya hosts found some blogs and the web that provide articles how to remove / clean shortcut virus , among other pretty good in my opinion as follows:
1. Turn off system restore our computer beforehand how to right click on the icon in My Computer, Properties, click the System Restore tab and then give a check mark in Turn Off System Restore on All Drives and click OK

2. Turn off the process of Wscript file located in C: \ Windows \ System32, by using tools such as CProcess, HijackThis or can also use the Task Manager of Windows

3. Once off the process of Wscript, we need to delete or to rename the file so not used for awhile by the virus
For the record, if we are to rename the files with automatic Wscript.exe, it will be copied again in the folder. Therefore, we must find where the file Wscript.exe others, usually in C: \ Windows \ $ NtServicePackUninstall $, C: \ Windows \ ServicePackFiles \ i386.
Unlike other VBS viruses, we can change the Open With from the vbs file into Notepad, the virus that means is berextensi MDB Microsoft Access file. So Wscript database.mdb will run the file as if he is a VBS file
4. Delete the parent file in C: \ Documents and Settings \ \ My Documents \ database.mdb, so that every time the computer starts will not load the file. And do not forget we are also open MSCONFIG, disable the run command.
5. Now we will delete the files autorun.inf. Microsoft.inf and Thumb.db. The trick, click the START button, type CMD, moved to the drive to be cleaned, for example, drive C: \, then we have to do is:
Type C: \ del Microsoft.inf / s, this command will delete microsoft.inf all files in all folders on drive C:. Meanwhile if you want to move the drive to stay just renamed drive example: D: \ del Microsoft.inf / s.
For the autorun.inf file, type C: \ autorun.inf del / s / ah / f, the command will delete the file autorun.inf (syntax / ah / f) is used as the file is taking attrib RSHA, as well as to file Thumb . db also do the same thing
6. To delete the files in addition to 4 files earlier, we must find a way search files with the extension. Lnk size 1 kb. In the 'More advanced options' make sure the option 'Search system folders' and 'Search hidden files and folders' are both checked.
"Please be careful, not all shortcut files / LNK file size of 1 kb is a virus, we can distinguish it from the icon, size and type. For the shortcut icon created viruses are always using the icon 'folder', size 1 kb and type 'shortcut '. While the correct folder should not have' size 'and the type is' File Folder'. "
7. Fix the registry has been altered by the virus. To expedite the process of repair registry copy the script below on the program 'notepad' and save it with the name 'repair.inf'. Execute the following ways:
Right-click repair.infClick Install[Version]Signature = "$ Chicago $"Provider = Vaksincom Oyee
[DefaultInstall]AddReg = UnhookRegKeyDelReg = del
[UnhookRegKey]HKLM, Software \ CLASSES \ batfile \ shell \ open \ command ,,,"""% 1 ""% * "HKLM, Software \ CLASSES \ comfile \ shell \ open \ command ,,,"""% 1 ""% * "HKLM, Software \ CLASSES \ exefile \ shell \ open \ command ,,,"""% 1 ""% * "HKLM, Software \ CLASSES \ piffile \ shell \ open \ command ,,,"""% 1 ""% * "HKLM, Software \ CLASSES \ regfile \ shell \ open \ command,,, "regedit.exe"% 1 ""HKLM, Software \ CLASSES \ scrfile \ shell \ open \ command ,,,"""% 1 ""% * "HKLM, SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon, Shell, 0, "Explorer.exe"HKLM, SYSTEM \ ControlSet001 \ Control \ safeboot, AlternateShell, 0, "cmd.exe"HKLM, SYSTEM \ ControlSet002 \ Control \ safeboot, AlternateShell, 0, "cmd.exe"
[Del]HKLM, SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Run, WinupdateHKCU, SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Run, explorer
Tips on how to clean virus shortcut I get from the following: http://sugengsetyawan.blogspot.com/2009/02/cara-menghilangkan-virus-shortcut-di.html
3:27 AM | 0 comments | Read More

How to protect your computer from the virus in Internet

Written By Unknown on Friday, November 11, 2011 | 9:59 AM

The computer is still a mainstay device for accessing the internet. Secure computer is one of the capital for cruising the Internet activity takes place smoothly. This is because computers are secure better able to ward off an attack or malicious programs that try to get through the internet. If you often become victims of virus attacks, it could be your computer is not powerful enough to ward off incoming attacks.

Here are four important capital to protect your computer:

  • Make sure the firewall is always in a position "on". A firewall is a software that can counteract the illegal access to computers, whether they intend to remove the information, computer damage, or steal personal data. If you use more than one computer connected together, make sure the firewall on each computer is active. This is to prevent the virus spreading to all computers if one computer is infected.
  • Use software and operating system up-to-date. The latest update, let alone the nature of the high priority it is important to computer security. Update software usually contains the latest protection, as well as improvements to the bugs and security loopholes that exist in previous versions.
  • Always update antivirus software. Antivirus technologies are better able to ward off viruses and spyware that attack your computer, rather than the antivirus with the old technology.
  • Brainware factor (human) also plays an important role. Always be alert and careful, as not just open an attachment in an e-mail or link that is not known exactly what it says. Attachments or links it may contain viruses or other malicious programs. Do not download any, except from a trusted site, and read all security warnings, license agreements and related privacy of any software you download.
9:59 AM | 0 comments | Read More

Malware Threats behind Fun Online Games

Written By Unknown on Friday, October 7, 2011 | 9:39 AM

Playing computer games, especially those that are online, making it fun and sometimes lose track of time. However, are you aware if there is a danger that threatens the fun behind it?

Yes, there are currently a number of looming threats of cyber-gamers. Some popular ones include:

1. Phishing: The site featured a fake game play with a face that has a URL or page similarity with the original games. A gamer who is not vigilant not only potentially infected, but also could lose personal data which again may impact on the financial losses.

2. Social Networking: A lot of fake Facebook accounts and pages are outstanding and made to commit a crime. Worse yet, each stating that they are the original producer of games that are circulating on Facebook. To that end, never give or enter confidential personal data to these accounts.

3. Games that have been infected and pirated software: user or gamer potentially infected with a virus because it uses a fake computer game software or the crack. The game lovers are encouraged to be extra careful, especially against the shipment of e-mail attachments and removable media like USB flash disks.

4. Malware: These days, the malware that attack computers online gamers and the most widely spread is Win32/PSW.OnLineGames. Malware is still included a Trojan family that is normally used to perform phishing attacks and targeted specifically to online game players.

Malware is commonly arise with keylogging and (sometimes) rootkit to gather information related to online games and the player's data. Information obtained will be sent to the computer attackers or criminals. Therefore, it is highly recommended for players in MMORPGs (Massively Multi-player Online Role Playing Games) like Lineage and World of Warcraft to remain vigilant against potential threats that attack them.

"Losses experienced online gamers as malware infiltration Win32/PSW.OnLineGames usually in the form of online gaming is losing points," said Yudhi Strong (Technical Consultant, PT. Prosperita-ESET Indonesia) in his press statement.

For that, ESET gives five tips for gamers to be protected from malware:

  • Use different passwords for multiple accounts and create passwords that difficult to guess.
  • Please type in URLs or website you want online games directly in your browser or use bookmarks in your browser. That way, you will be protected from accidental clicking the link elements of online games from the search engines that have been infected.
  • Protect data with a password protector, either on computer or in the cloud.
  • Never use a software crack results because it could be a malicious software or malicious software.
  • Always use antivirus updated regularly and computer security solutions featuring Antispyware and Firewall. ESET Smart Security and ESET NOD32 Antivirus 5 provides Gamer Mode feature that can perform automatically switching to silent mode to save resources so that the user can better enjoy the game without being distracted.

Based on survey results have been published by the Steam Survey Hardware & Software, ESET become the first choice of gamers for a paid antivirus category.
9:39 AM | 0 comments | Read More

How to Remove conficker / downup in your computer

Written By Unknown on Tuesday, September 27, 2011 | 10:17 PM

It has been more than three years since the early emergence Conficker, a virus that exploits the DCOM port security network for the purpose of spreading itself via the network media and the Internet. Conficker or collectively, the virus is classified as a virus Downadup the most popular and most victims. In a short time had spread and infect every network connected PC. The virus is very troublesome, because when already infected PC then the network will be slow and eventually end up.

Symptoms of Conficker / Downadup:

  1. There is an error message "Generic Host Process (GHP) Error"
  2. Conficker do pacthing against the RPC DCOM windows security gaps, and open a random port between 1024-10000 to spread itself over a network
  3. Network running slow
  4. Disconnected from the network, sharing folders disconnected
  5. Services dead tissue (network conection, servers, workstations)
  6. Services Sound off (windows audio), or the sound driver Cres
  7. Conficker duplicate files into a Removable Disk Drive: \ recycled \ jwgkvsq.vmx
  8. Can not access Website Security / Antivirus (www.symantec.com, www.avg.com, Kapersky, etc.)
  9. Turning off system restore
  10. On the menu of Windows Firewall - Exceptions, there is a setting conficker with name% Random%

If the symptoms above occur on our computer, has been ascertained by computer is infected with Virus Conficker.
Here's Step by Step Method Solution how to remove Conficker:

  • If your computer is connected to a network, first disconnect by unplugging the network cable or disable the LAN.
  • Use the removal tools from Symantec.com conficker, can be downloaded here!
  • Perform scanning the computer using safe mode Removal Tools on Windows
  • After scanning is complete, restart Windows
  • Do your windows security patches MS08-067 patch can be downloaded on the Microsoft.com site. Its function is to patch security loopholes that successfully hacked by Conficker
  • Antivirus installations that have been known and worked with both Conficker Antivirus and update the database regularly so that the virus does not re-invade our computers
  • Do a scan on the Removable Disk is suspicious, as there is a hidden Recycle folder, if so then certainly the Removable Disk is already infected by Conficker

May we all be free from computer virus.
10:17 PM | 0 comments | Read More

Trojan Virus is now able to Steal a list of Android Calls and messages

Written By Unknown on Thursday, September 22, 2011 | 6:48 AM

Latest technology news, online criminals have recycle ability Trojan Android cruel became more dangerous and damaging millions of smartphone users on the Android Platform

Trojoan is known as Androidos_Dordrae. N, this is a variant of trojan DroidDreamLight that began in late may, live 24 different android applications are legitimate, and when downloaded to give all the sensitive data between 30,000 – 120,000 victims.
Please note also that DroidDreamLight is itself a variant of DroidDream, who went into hiding in early March found in more than 50 Android applications


While DroidDream and DroidDreamLight were able to steal user data and download android phone into a mobile code berbaya terinfeksei, Androidos_Dordrae have enhanced ability to go further.

security firm Trend Micro says, a new variant of the Code has been modified to steal from Android users entry, text messages, call logs, phone contact list and information related to accounts that are stored on the smartphone.

"Also, based on the code, this malware has the ability to insert a message in the Inbox of infected devices, with delivery and message content is determined by the attacker, as well as the ability to send a message to the number in the user's contact list," Micro tulisTrend.

Currently, Androidos_Dordrae spreads through third party mobile applications stores mainly in China. Like a Trojan horse that looks like Androidos_Nickispy, who is hiding in the Google apps +, with a new variant of memungkingkan that DroidDreamLight easily could spread to the Android Market.

But thankfully, antivirus makers have been forced to adapt and create antivirus solutions for hundreds of millions of users who may be affected by the threat of mobile viruses. Some mobile security software companies such as Symantec, AVG and Kaspersky Lab, the Lookout, a smartphone that has been providing antivirus can be downloaded on the market of applications.

Fortunately, a smartphone that is so common now that the anti-virus makers have been forced to adapt and create anti-virus solutions for hundreds of millions of users who may be affected by the threat of mobile. Some mobile security software companies, including AVG,

6:48 AM | 0 comments | Read More

Norton AntiVirus 2012 Released

Written By Unknown on Friday, September 16, 2011 | 3:44 AM

Symantec just released the latest stable version of security product: 2012 Norton Antivirus and Norton Internet Security. Norton 2012 comes with several new features and other enhancements that offers a sophisticated and powerful protection against viruses, spyware, infection and prevent attacks by cyber criminals.

 Norton Internet Security 2012 dan Norton AntiVirus 2012 Rilis

on Internet Security 2012 and Norton AntiVirus 2012 introduced several new technologies to combat emerging threats. This guard against Fake Antivirus programs, one of the most widespread threat faced by internet users today. To fight the Fake AV, Norton has included SONAR 4.0 and 2.0 Power Eraser Norton security suite. 2012 brings support for features of identity safe and secure Web browser Google Chrome. Furthermore, the panel of the main window has been simplified, the CPU meter and you can also customize your scan.

NAV2012UI Norton Internet Security 2012 dan Norton AntiVirus 2012 Rilis

For a list of new features and improvements, check out: what's new in Norton Internet Security 2012 and Norton AntiVirus 2012 you can see it here.

Visit here to see a quick comparison between Norton Internet Security 2011 and Norton AntiVirus.

NIS 2012 and 2012 NAB now available for purchase in stores Symantec. If you are using Norton 2011 products then you can update to version 2012 by going to the support of the main User Interface and clicking check for New Version.

30 day trial of Norton 2012 Offline Installer [Direct Download Link]

Download Norton Internet Security 2012 :

http://buy-download.norton.com/downloads/CLT/NIS/US/2012/19.1/21219/ESD/NIS-TW-30-19-1-0-28-EN.exe

Download Norton AntiVirus 2012

http://buy-download.norton.com/downloads/CLT/NAV/US/2012/19.1/21219/ESD/NAV-TW-30-19-1-0-28-EN.exe

3:44 AM | 0 comments | Read More

Ashampoo Snap 4 Free Download

Written By Unknown on Saturday, September 10, 2011 | 7:37 PM

Ashampoo Snap 4 is an application that allows you to take screenshots, recording motion directly from the screen and edit them anyway you want. This Program comes with a lot of editing tools, which allow you to improve the image and add instructions, arrows, text, graphics, forms, stamps and more. Next, with Ashampoo Snap 4 you can also record video, edit and create professional illustrations for your work.

 Ashampoo Snap 4 Free Download

The main features of Ashampoo Snap 4:

All new video capture techniques with new effects/pilihanBaru cursor and zoom effects to a video captureDukungan codec which more/container for encoding multiple-record videoDukungan monitorJeda videoImproved highlighting tool (more than one region) of the object, for example, arrow, text etc., can form dieditHigh-quality objects (anti-aliasing, etc) support Image formats for import and Ashampoo eksporPerangko and graphics that can be added to screenshotMendukung Windows 7, Vista and XP

Free Download Ashampoo Snap 4

After you download using the register key here to activate your Software

AMS4AC-77DEF3-7B5CEA

7:37 PM | 0 comments | Read More

GingerMaster : New Android Malware

Written By Unknown on Saturday, September 3, 2011 | 6:12 AM

Latest technology news, a dangerous new malware found on smartphones android and move freely, even at the operating system android most recent version though not exactly safe.



The new malware is called "GingerMaster", according to a report from Kaspersky Lab via laptopmag, this malware is found to have stolen the android Data on smartphones that have been infected and transmit stolen information such as device ID, a phone number to a remote server.



GingerMaster, Malware baru yang mampu menginfeksi Android 2 3 Gingerbread

Malware GingerMaster very scary because it is able to exploit the Android version 2.3 or Gingerbread. Gingermaster will have root access that allows to build direct line of communication between devices that are infected with a remote server.



Xuxian Jiang, a professor of computer science from North Carolina State University who discovered this GingerMaster said "Due to the fact GingerMaster able to exploit the current root, we think it poses one of the most serious threats for mobile users,"



Gingermaster infecting users, as do most smartphones virus, by hiding in a valid application and automatically download in the background, unnoticed. However, Kaspersky Lab researcher says there is no indication that any formal application in the Android market have a hidden malware.



Malware Gingermaster itself is actually a variant of DroidKungfu, namely a piece of malware that was found in May. The original version was found hiding in an unauthorized application on the application market of China, it has the same ability as GingerMaster but only on the previous version of the android.



However GingerMaster a different malware, malware is not only targeted at the Android 2.3.3 may also be infected at a higher version of the android, GingerMaster also managed to avoid detection from antivirus seleluar termuka all that has been tested,



GingerMaster, New malware that can infect Android 2 3 Gingerbread 2



to avoid various kinds of malware, Jiang gave a few tips below:

when you download smartphone applications, better looking of the leading application stores only, then check the reviews and ranking. If an application looks good, but the feedback from users to the contrary, it is better to leave it.



Jiang also added that in addition, make sure you feel comfortable with the data that will be their (application) access, if you feel the data accessed by the application too much, better not be downloaded.



And lastly, make sure you always update anvirus on your smartphone. Hopefully some of the above tips can safeguard you from malware android smartphone GingerMaster quite scary.
6:12 AM | 0 comments | Read More

Repair Windows 7 Blue Screen

Written By Unknown on Tuesday, August 2, 2011 | 6:22 AM

There are several events that result in blue screen one is blue screen error STOP: 0x0000006B on Windows 7, sometimes people feel frustrated when it came to blue screen and some of the user's computer when the blue screen do reinstall Windows. But if you are having problems with the above code you can try this way.

Microsoft has identified a problem in Windows 7 that crashes (BSOD) during the process began with a STOP: 0x0000006B error message and fail to boot. The full error message looks like below,

Blue Screen


STOP: 0x0000006B (Parameter1, Parameter2, Parameter3, Parameter4)
This occurs because the PROCESS1_INITIALIZATION_FAILEDMasalah file is corrupted or Bootcat. cache because the cache file size changed Bootcat. Since the beginning of the last successful star up Windows. Fortunately Microsoft has released a fix for this problem in Windows 7 Service Pack 1.

But if you don't want to download Windows 7 SP1 you can use the following simple way to start the computer running a Windows 7 bootable from the hard disk or from a USB drive using the Windows installation media and then you delete the file cache, and the Bootcat. and then restart the computer. The File cache is located in Bootcat.

% SystemRoot% \ system32 \ codeintegrity

For more details you can read here

http://support.microsoft.com/kb/981833/

6:22 AM | 0 comments | Read More

Repair corrupted files due to Virus attack

Your important documents can be damaged by virus attack or system crash, failure of the application and also the network error. But you can also repair a damaged file with a simple freeware tool which can repair a corrupted file in such cases.

This is a powerful tool to repair your damaged files. Scan of the damaged file and extract the maximum from data to a file that can be used. This application supports various file formats and document and has a simple interface to fix.

You only need to specify the folder where you have a damaged document and the application automatically starts to process them.

Support File Formats;

Word documents (doc, is corrupted. Docx,. Docm,. Excel Spreadsheet (Rtf). Xls, XLA, ... .Xlsx) Zip or RAR archive (. Zip,. Rar) Video (avi, ... Mp4,. Mov,. Flv, wmv, ... Asf,. Mpg) JPEG, GIF, TIFF, BMP, PNG, or RAW images (jpg, ... Jpeg, gif, ... Tiff,. Bmp,. PDF Document (Png). Pdf) Access databases (mdb, ... Mde, accdb, ... Accde) PowerPoint (ppt, ... Pps, pptx).Music (mp3, ... Wav)

Download File Repair

http://www.filerepair1.com/files/file-repair-setup.exe

6:18 AM | 0 comments | Read More

Here's How To Clean The Worm Tidserve W32

Written By Unknown on Saturday, July 16, 2011 | 3:50 AM

Worm Tidserve or W32.Tidserve mainly spread via removable drives. This Worm does not cause serious damage to your system, but you should delete it immediately. This Worm can disable your antivirus software, which makes your computer vulnerable to virus infection is dangerous. This Worm can also change the settings of your browser, and prevent You from accessing websites that relate to security.
Here's how to clean the Worm Tidserve or W32;

Remove Registry Entries

1 #. Click "Start." Type "regedit" in the search box and press "Enter." Allow the Registry Editor tool to launch.

Navigate to the following registry entries on the left pane one at a time:
HKEY_CLASSES_ROOTmsqpdxvx "msqpdxpos" = "[RANDOM STRING VALUE]"
HKEY_CLASSES_ROOTmsqpdxvx "msqpdxsrv" = "[RANDOM DWORD VALUE]"
HKEY_CLASSES_ROOTmsqpdxvx "msqpdxid" = "[RANDOM STRING VALUE]"
HKEY_CLASSES_ROOTmsqpdxvx "msqpdxinfo" = "[RANDOM STRING VALUE]"
HKEY_CLASSES_ROOTmsqpdxvx "msqpdxaff" = "[RANDOM DWORD VALUE]"
HKEY_CLASSES_ROOTmsqpdxvx "msqpdxpff" = "[RANDOM DWORD VALUE]"
HKEY_CLASSES_ROOThomeviewCLSID "default" = "{6BF52A52-394A-11D3-B153-00C04F79FAA6}"
HKEY_LOCAL_MACHINESystemCurrentControlSetServicesmsqpdxserv config.sys

2 #. Right-click the entries at the end of the registry path and click "Delete." Exit the Registry Editor.

Unregister the Files

Click "Start."Type "cmd" in the search box and press "Enter." Wait for the Command Prompt to appear.Type "regsvr32/u etc. etc." at the Command Prompt and press "Enter." This will unregister the Tidserv files.Exit the Command Prompt.

Remove the Files

Click "Start."Type "Windows Explorer" in the search box and press "Enter." Allow the Windows Explorer to open.Type "etc. etc. [RANDOM CHARACTERS]; tmp" in the search box and press "Enter."Right-click the file and click "Delete."

NOTE;

Backup the registry first before doing any changes. Do not make any step other than those ordered in the Registry Editor. You can harm your system by making small changes to the registry You are violating the above rules.


3:50 AM | 0 comments | Read More

Install antivirus in your flashdisk

Written By Unknown on Wednesday, June 22, 2011 | 4:53 AM

Safety and "health" computer is absolutely expected and required by all computer users to use computers in their activities become more comfortable and safer. Many ways and the way computers are used in order to remain healthy and in fit condition and performance. One is to prevent attacks from malicious viruses by using antivirus always updated of course. Of the many ways the spread of viruses that infect computers, the most widely and efficiently is through storage media or removable disk (flash).

Virus infected flash will easily infect other computers when the flash is plugged in and then accessing or opening a file in flashdisk. From one computer to another computer flash is taking computer virus which then spread it to others.

For the safety of virus attacks from flash, it is recommended that before accessing the flash is always on and always do the scanning of the flash. Rely on antivirus alone is not enough. Sebaiknyalah friend try this one tool that truly free and portable, so do not overload the computer's performance. And again it is also powerful tools to clean the virus contained in the flash, because this tool is dedicated to eradicate the virus in flash, not on my hard drive. Some examples of viruses that attack through the flash is autoruns.inf, auto.exe, autorun.ini, ctfmon.exe, copy.exe, Macromedia_Setup.exe, ntde1ect.com, New Folder.exe, soundmix.exe, svchost.exe, semo2X.exe, windows.scr and others.



This tools is only 746 KB is called ninja pendisk. When running this tool will run on the system tray and can be set to run at startup, automatic clean and disable autoplay by right clicking on the icon in the system tray. Kerjanyapun very easy way. run this tool and then plug your flash, then this tool will work immediately and clean the flash of a virus is identified.

If you curious and intend to try it can download at the link below:


4:53 AM | 0 comments | Read More

Tips to restore files and folders hidden by viruses

Written By Unknown on Friday, March 25, 2011 | 5:53 AM

Sometimes we find our flash blank when viewed using Windows Explorer, but when viewed in Properties, apparently full capacity utilization. Well .. if you meet these conditions, be thankful you're data is still there but hidden in the (hidden). Cases like this usually happens because the virus hides files and folders, so it takes a special trick to bring it back. As for how to restore a file or folder that is hidden (is hidden) by the virus are:

1. First open Windows Explorer and enable the option "show hidden files and folders " menu by going to TOOLS - FOLDER OPTIONS - VIEW, then select "show hidden files and folders ".


Folder Option



5. OK, we try to check the current contents of a file or folder is hidden by the virus in our flash, we assume here F is the flash drive. Type the following command "F:" and then press ENTER, the command is useful to move the prompt to drive F.


command prompt

6. To view any file or folder that dihidden on drive F (flash), use the command "dir / ah"

Then we will be able to see any files or folders are hidden by the virus in the flash us. Here there are 2 folders and 1 file in the hidden condition, ie the folder "DATA-IMPORTANT", "DATA-TA" and "task-akhir.doc".

7. Now we will use the command "attrib" to bring back the hidden files and folders last. Here exemplified to bring back the folder "DATA-TA" and files "task-akhir.doc". The command "attrib" that need to be typed here are:

F: \> attrib.exe-R-H-S / s / d DATA-TA

Attrib

The above command will bring back the folder "DATA-TA", to bring up the file "task-akhir.doc" we use the following command:

F: \> attrib.exe-R-S-H-akhir.doc task

attrib

8. To ensure the folders and files had reappeared, please do you see using Windows Explorer.

windows explorer

9. Congratulations ... your data has appeared again ..

notes:
- To bring up the Folder use the command: "attrib.exe-R-H-S / s / d-folder name
- To bring up the Folder use the command: "attrib.exe-R-S-H-full-file name

Hopefully this article provide benefits


5:53 AM | 0 comments | Read More