โปรแกรม anti-trojan, Backdoors, Keyloggers, Rootkits+etc ที่ work สุด ๆ

0 ความคิดเห็น

โปรแกรม anti-trojan, Backdoors, Keyloggers, Rootkits+etc ที่ work สุด ๆ

โปรแกรม anti-trojan, Backdoors, Keyloggers, Rootkits, Spyware, Adware, Tracking Cookies, Worms, Bots, Viruses, and Dialers ที่ work สุด ๆ (ผม scan เจอพวกตัวร้าย ๆ บ่อยมาก ๆ)

เป็นโปรแกรมที่เป็น Best in Tests -ที่สุด ณ ตอนนี้- ครับ
ทำงานได้รวดเร็ว และดักจับพวก malwares ต่าง ๆ ได้อย่างมีประสิทธิภาพมาก ๆ
อ้างอิงจาก การทดสอบของ Malware Research Group

โปรแกรมนี้ ชื่อ a-squared Anti-Malware 4.5
มี Free Download ให้ทดลองใช้ ตามนี้เลยครับ

hททp://www.emsisoft.com/en/software/free/#download


ผู้ผลิตมี Daily Updates ที่ทันต่อสถานการณ์มากครับ

*** หากถูกใจ และพอใจในโปรแกรมตัวนี้ ช่วยให้ Thanks ผมด้วยนะครับ ***

ขอบคุณเพื่อน ๆ ทุกท่านครับ

ที่มา : thaiseoboard.com

How To Remove Trojan FakeAlert

0 ความคิดเห็น

How to remove Trojan FakeAlert.

Trojan FakeAlert hijacks your desktop background image has notified users that their computer systems, computer has been infected with some type of spyware. Trojan FakeAlert also changed some settings on the value of Windows to include: - the right to cancel the user's computer can not change the wallpaper and set the desktop to use. 'Show web content' Is most often installed with other nasty rogue anti-spyware program.

Rogue anti-spyware AntiSpyware is a malicious software. (Malicious software (list) or malicious to advertise or install utilities own or coerce the owner to purchase computer software to delete nonexistent malware several times this type of software such as Trojan FakeAlert are usually installed Trojan horse to download trial copies of software to run the other unwanted software of this type is common.

In most cases the main reason of creating software that allows these criminals for the purpose of selling their software.

You can use one of three software products to remove this threat: PC Tools Internet Security antivirus products plus AntiSpyware product spyware doctor with antivirus or last but not least the AntiSpyware product spyware doctor Any of these solutions will be operating. It just depends on what you have security? If your firewall is not the first product. If you do not have anti-virus is the second product. If you just want a good remove spyware and other programs you have a security application is the final product. With any of these, Trojan FakeAlert to history

Remove Antivirus Personal - Need to conduct a removal antivirus?

1 ความคิดเห็น

Remove Antivirus Personal - Need to conduct a removal antivirus?

The computer has been infected? Think you might have to delete Personal Antivirus? So if you are not already aware, Personal Antivirus is a virus. Although billed as a benign product that helps remove malicious software, this is not really the case. The program posts rogue false positives to scare the messages of purchasing their software. If you install the program is simply to make the infection worse.

Now the crux of the problem is that, although the messages were false, the computer is infected. Personal Antivirus is a virus itself. The program also uses spyware and keyloggers to try to collect sensitive information like passwords, credit cards and other private data.

How to get Antivirus on your personal computer? This could be due to many factors. The most common is, you visit a malicious website that installs the virus on your system. This can often happen without you even knowing it, which is why I always recommend having some sort of real-time antivirus software running at all times.

Antivirus personal disposal

To remove Antivirus Personal you need to get rid of all your components at once. This may include but not limited to:

1. EXE, BAT, or files of another process (eg personalantivirus.exe)

2. LNK and DLL files that run silently in the background

3. Registry entries that have been infected.

The problem with these viruses is that they generally use the names at random places and random infect. This is more geared to the experts who have a good idea of what a malicious infection appears.

For those who are not computer experts, there is hope for you too. Fortunately, there is a removal tool Antivirus personal which may not only eliminate the virus, but also offers real-time protection to combat future threats.

Tired of viruses infecting your computer? Want to surf the web with peace of mind that your computer is secure? Get your free scan from the top virus protection and remove personal antivirus.

Jim Marshall is an expert computer technician with fifteen years experience in the industry. Since his own computer was destroyed by malicious software that has been studying anti-spyware, adware, and malware systems for years. His website details the overall results of this investigation, the ranking of the best antivirus and antispyware programs available.

home antivirus 2010

0 ความคิดเห็น

home antivirus 2010

home antivirus 2010, They claim it to be the fastest antivirus and most effective virus protection which Symantec have ever offered.You can now download Norton Antivirus 2010 for free from their official website.This latest version claims superio

Antivirus software

0 ความคิดเห็น

Antivirus software

Antivirus (or anti-virus) software is used to prevent, detect, and remove malware, including computer viruses, worms, and trojan horses. Such programs may also prevent and remove adware, spyware, and other forms of malware.

A variety of strategies are typically employed. Signature-based detection involves searching for known malicious patterns in executable code. However, it is possible for a user to be infected with new malware in which no signature exists yet. To counter such so called zero-day threats, heuristics can be used. One type of heuristic approach, generic signatures, can identify new viruses or variants of existing viruses for looking for known malicious code (or slight variations of such code) in files. Some antivirus software can also predict what a file will do if opened/run by emulating it in a sandbox and analyzing what it does to see if it performs any malicious actions. If it does, this could mean the file is malicious.

However, no matter how useful antivirus software is, it can sometimes have drawbacks. Antivirus software can degrade computer performance if it is not designed efficiently. Inexperienced users may have trouble understanding the prompts and decisions that antivirus software presents them with. An incorrect decision may lead to a security breach. If the antivirus software employs heuristic detection (of any kind), the success of it is going to depend on whether it achieves the right balance between false positives and false negatives. False positives can be as destructive as false negatives. In one case, a faulty virus signature issued by Symantec mistakenly removed essential operating system files, leaving thousands of PCs unable to boot. Finally, antivirus software generally runs at the highly trusted kernel level of the operating system, creating a potential avenue of attack

In addition to the drawbacks mentioned above, the effectiveness of antivirus software has also been researched and debated. One study found that the detection success of major antivirus software dropped over a one-year period.

History of Antivirus

0 ความคิดเห็น

History of Antivirus

See also: Timeline of notable computer viruses and worms

There are competing claims for the innovator of the first antivirus product. Possibly the first publicly documented removal of a computer virus in the wild was performed by Bernt Fix in 1987.


ClamTk 4.08 virus scanner running on Ubuntu 9.04An antivirus program to counter the Polish MKS vir was released in 1987. Dr. Solomon's Anti-Virus Toolkit, AIDSTEST and AntiVir were released by in 1988. Dr. Ahn Chul Soo (Charles Ahn, founder of AhnLab Inc) in South Korea also released the Anti-Virus software called 'Vaccine Ⅰ' in June 10, 1988. By late 1990, nineteen separate antivirus products were available including Norton AntiVirus and McAfee VirusScan. Early contributors to work on computer viruses and countermeasures included Fred Cohen, Peter Tippett, John McAfee and Ahn Chul Soo.

Before Internet connectivity was widespread, viruses were typically spread by infected floppy disks. Antivirus software came into use, but was updated relatively infrequently. During this time, virus checkers essentially had to check executable files and the boot sectors of floppy and hard disks. However, as internet usage became common, initially through the use of modems, viruses spread throughout the Internet.

Powerful macros used in word processor applications, such as Microsoft Word, presented a further risk. Virus writers started using the macros to write viruses embedded within documents. This meant that computers could now also be at risk from infection by documents with hidden attached macros as programs.

Later email programs, in particular Microsoft Outlook Express and Outlook, were vulnerable to viruses embedded in the email body itself. Now, a user's computer could be infected by just opening or previewing a message. This meant that virus checkers had to check many more types of files. As always-on broadband connections became the norm and more and more viruses were released, it became essential to update virus checkers more and more frequently. Even then, a new zero-day virus could become widespread before antivirus companies released an update to protect against it.

Antivirus: the most dangerous threat to the computer

0 ความคิดเห็น

Antivirus: the most dangerous threat to the computer

Anti-spy ware, firewall and anti-virus are the three critical software, which helps protect your computer. If we do not activate them by going online our computer may be infected with harmful viruses within eight seconds. Yes, eight seconds is enough for the world's fastest Sasser virus to attack your computer and you know the result.

Anti-virus software works as a spy ware remover spy. You can find Internet Explorer to viruses that are better known under the name IE anti-virus from different places on the web. This is a false spy ware Remover, which can annoy you with messages not stop asking you to download anti-spy ware programs to save your computer from infection with spy ware.

You must be careful when watching the film, which was published online today. Although a number of sites is relatively safe, but few can be harmful. If you need to open a file in Media Player to download something you can find fake codes usually used to keep a tab on the person using the computer. These are the real spyware program. The computer may be infected with electronic spying via Internet Explorer because it is fairly low for the ActiveX control and can not resist electronic espionage, ad ware and mal ware. If you happen to send you to a bad site, it will be known as the diversion of browser, and you cease to download Internet Explorer to viruses.

It is very risky for a computer if it contains ant virus spy ware. Since this spy ware constantly gathering information, processing speed and the Internet is slow. It is very difficult to eliminate the virus. Sometimes the registry on your computer can be mitigated if the delete.

You can use SUPER Anti Spy Ware, Spyboat Search and Destroy, Ad Ware Pro as anti spy ware software. Depending on the type of anti-virus, you can install more than one of these spy products. There are many people who, despite having security software to remove spyware stocks each week from their computers. They do not know how to protect their computers against attacks by malicious software. Thus, it is necessary that the computer user to know how to protect their computers spy ware form. There are several spyware Spy ware blockers as the doctor who can help your computer in the form of the attack on electronic espionage.

There are a number of online PC support companies that can help you remove spyware Ware, ad-ware and mal ware, and I assure you the security and computer virus.

How to Remove Trojan.FakeAlert Manually

3 ความคิดเห็น

Before we get started, you should backup your system and your registry, so it’ll be easy to restore your computer if anything goes wrong.


To remove Trojan.FakeAlert manually, you need to delete Trojan.FakeAlert files. And I’ll show you. Otherwise, go ahead and…


Remove Trojan.FakeAlert processes:


rpnqrdnm.exe

runsrv32.exe

tcpservice2.exe

susp.exe

users32.exe

Remove Trojan.FakeAlert registry values:


HKEY_CLASSES_ROOT\clsid\{60e2e76b-60e2e76b-60e2e76b-60e2e76b-60e2e76b}

Unregister Trojan.FakeAlert DLLs:


zserv.dll

wstart.dll

winflash.dll

udpmod.dll

runsrv32.dll

questmod.dll

pynix.dll

jao.dll

bridge.dll

Detect and Remove these Trojan.FakeAlert files:


bridge.dll

jao.dll

pynix.dll

questmod.dll

rpnqrdnm.exe

runsrv32.dll

runsrv32.exe

susp.exe

tcpservice2.exe

udpmod.dll

users32.exe

winflash.dll

wstart.dll

zserv.dll

Note: In any Trojan.FakeAlert files I mention above, “%UserProfile%” is a variable referring to your current user’s profile folder. If you’re using Windows NT/2000/XP, by default this is “C:\Documents and Settings\[CURRENT USER]” (e.g., “C:\Documents and Settings\JoeSmith”). If you have any questions about manual Trojan.FakeAlert removal, go ahead and leave a comment.


How Do You Remove Trojan.FakeAlert Files?


Need help figuring out how to delete Trojan.FakeAlert files? While there’s some risk involved, and you should only manually remove Trojan.FakeAlert files if you’re comfortable editing your system, you’ll find it’s fairly easy to delete Trojan.FakeAlert files in Windows.


How to delete Trojan.FakeAlert files in Windows XP and Vista:



  1. Click your Windows Start menu, and then click “Search.”
  2. A speech bubble will pop up asking you, “What do you want to search for?” Click “All files and folders.”
  3. Type a Trojan.FakeAlert file in the search box, and select “Local Hard Drives.”
  4. Click “Search.” Once the file is found, delete it.


How to stop Trojan.FakeAlert processes:



  1. Click the Start menu, select Run.
  2. Type taskmgr.exe into the the Run command box, and click “OK.” You can also launch the Task Manager by pressing keys CTRL + Shift + ESC.
  3. Click Processes tab, and find Trojan.FakeAlert processes.
  4. Once you’ve found the Trojan.FakeAlert processes, right-click them and select “End Process” to kill Trojan.FakeAlert.


How to remove Trojan.FakeAlert registry keys:


Because your registry is such a key piece of your Windows system, you should always backup your registry before you edit it. Editing your registry can be intimidating if you’re not a computer expert, and when you change or a delete a critical registry key or value, there’s a chance you may need to reinstall your entire system. Make sure your backup your registry before editing it.



  1. Select your Windows menu “Start,” and click “Run.” An “Open” field will appear. Type “regedit” and click “OK” to open up your Registry Editor.
  2. Registry Editor will open as a window with two panes. The left side Registry Editor’s window lets you select various registry keys, and the right side displays the registry values of the registry key you select.
  3. To find a registry key, such as any Trojan.FakeAlert registry keys, select “Edit,” then select “Find,” and in the search bar type any of Trojan.FakeAlert’s registry keys.
  4. As soon as Trojan.FakeAlert registry key appears, you can delete the Trojan.FakeAlert registry key by right-clicking it and selecting “Modify,” then clicking “Delete.”


How to delete Trojan.FakeAlert DLL files:



  1. First locate Trojan.FakeAlert DLL files you want to delete. Open your Windows Start menu, then click “Run.” Type “cmd” in Run, and click “OK.”
  2. To change your current directory, type “cd” in the command box, press your “Space” key, and enter the full directory where the Trojan.FakeAlert DLL file is located. If you’re not sure if the Trojan.FakeAlert DLL file is located in a particular directory, enter “dir” in the command box to display a directory’s contents. To go one directory back, enter “cd ..” in the command box and press “Enter.”
  3. When you’ve located the Trojan.FakeAlert DLL file you want to remove, type “regsvr32 /u SampleDLLName.dll” (e.g., “regsvr32 /u jl27script.dll”) and press your “Enter” key.


That’s it. If you want to restore any Trojan.FakeAlert DLL file you removed, type “regsvr32 DLLJustDeleted.dll” (e.g., “regsvr32 jl27script.dll”) into your command box, and press your “Enter” key.


Did Trojan.FakeAlert change your homepage?



  1. Click Windows Start menu > Control Panel > Internet Options.
  2. Under Home Page, select the General > Use Default.
  3. Type in the URL you want as your home page (e.g., “http://www.homepage.com”).
  4. Select Apply > OK.
  5. You’ll want to open a fresh web page and make sure that your new default home page pops up.


Trojan.FakeAlert Removal Tip


Is your computer acting funny after deleting any Trojan.FakeAlert files? I recommend using a program like File Recover from PC Tools. File Recover saves deleted files that otherwise can’t be recovered by Windows operating sytem.


Want to save time finding Trojan.FakeAlert files? Download Spyware Doctor, let it find the Trojan.FakeAlert files for you, and then manually delete Trojan.FakeAlert files.

Source : http://www.411-spyware.com/remove-trojan-fakealert

How to remove Personal Antivirus rogue anti-spyware

1 ความคิดเห็น

Malware Description:

When it comes to computer security, Personal Antivirus is not a program you want to have in your system. The explanation is simple: Personal Antivirus is a rogue anti-spyware tool designed to deceive people into paying for its registered commercial software, no matter how illicit its tactics may be. Personal Antivirus propagates through backdoor Trojans or insecure downloads on the web. The latent intrusion is always followed by Personal Antivirus launching its misleading campaign on your computer. It means you will keep getting multiple alerts and scanners trying to get you alarmed about the security of your PC. Personal Antivirus pop-ups and scanners report infections that supposedly inhabit your machine. These deceitful techniques practised by Personal Antivirus are all about tricking you into downloading and registering the paid commercial version of Personal Antivirus. In reality, Personal Antivirus is not capable of removing any actual infections because it’s not developed on a legitimate antivirus engine. Therefore, purchasing Personal Antivirus is probably the most unreasonable to do. On the other hand, though, ignoring Personal Antivirus in your system will soon turn its obsessive pranks into a major system disruption and further malware invasion resulting in getting your privacy violated. So it’s highly recommended to remove Personal Antivirus once you spot its signs on your computer.



Malware Type: Rogue Anti-Spyware


Malware Author: Innovagest2000 SL


Threat Level: Critical


Advice: Immediately remove and scan for additional malware


Personal Antivirus Free Scanner and Remover: Download Now


Personal Antivirus Screenshot:


General Antivirus


How to remove Personal Antivirus and affiliated threats manually:

Manual removal of Personal Antivirus is a feasible objective if you have sufficient expertise in dealing with program files, processes, .dll files and registry entries.


The files to be deleted are listed below:



  • %Documents and Settings%\All Users\Desktop\Personal Antivirus.lnk
  • %Documents and Settings%\All Users\Start Menu\Programs\Personal Antivirus
  • %Documents and Settings%\All Users\Start Menu\Programs\Personal Antivirus\Personal Antivirus Home Page.lnk
  • %Documents and Settings%\All Users\Start Menu\Programs\Personal Antivirus\Personal Antivirus.lnk
  • %Documents and Settings%\All Users\Start Menu\Programs\Personal Antivirus\Purchase License.lnk
  • %UserProfile%\Application Data\Microsoft\Internet Explorer\Quick Launch\Personal Antivirus.lnk
  • %UserProfile%\Application Data\Personal Antivirus
  • %UserProfile%\Application Data\Personal Antivirus\settings.ini
  • %UserProfile%\Application Data\Personal Antivirus\uill.ini
  • %UserProfile%\Application Data\Personal Antivirus\unins000.exe
  • %UserProfile%\Application Data\Personal Antivirus\Uninstall Personal Antivirus.lnk
  • %UserProfile%\Application Data\Personal Antivirus\db
  • %UserProfile%\Application Data\Personal Antivirus\db\config.cfg
  • %UserProfile%\Application Data\Personal Antivirus\db\Timeout.inf
  • %UserProfile%\Application Data\Personal Antivirus\db\Urls.inf
  • %UserProfile%\Local Settings\Application Data\Microsoft\Windows\log.txt
  • %UserProfile%\Local Settings\Application Data\Microsoft\Windows\pguard.ini
  • %UserProfile%\Local Settings\Application Data\Microsoft\Windows\services.exe
  • %Program Files%\Personal Antivirus
  • %Program Files%\Personal Antivirus\activate.ico
  • %Program Files%\Personal Antivirus\Explorer.ico
  • %Program Files%\Personal Antivirus\PerAvir.exe
  • %Program Files%\Personal Antivirus\unins000.dat
  • %Program Files%\Personal Antivirus\uninstall.ico
  • %Program Files%\Personal Antivirus\working.log
  • %Program Files%\Personal Antivirus\db
  • %Program Files%\Personal Antivirus\db\DBInfo.ver
  • %Program Files%\Personal Antivirus\db\ia080614.db
  • %Program Files%\Personal Antivirus\db\ia080618x.db
  • %Program Files%\Personal Antivirus\Languages
  • %Program Files%\Personal Antivirus\Languages\IAEs.lng
  • %Program Files%\Personal Antivirus\Languages\IAFr.lng
  • %Program Files%\Personal Antivirus\Languages\IAGer.lng
  • %Program Files%\Personal Antivirus\Languages\IAIt.lng
  • %WINDOWS%\system32\log.txt
  • %UserProfile%\Application Data\Microsoft\Windows\winlogon.exe
  • %UserProfile%\Local Settings\Application Data\Microsoft\Internet Explorer\iGSh.png
  • %UserProfile%\Local Settings\Application Data\Microsoft\Internet Explorer\iMSh.png
  • %UserProfile%\Local Settings\Application Data\Microsoft\Internet Explorer\iPSh.png
  • %UserProfile%\Local Settings\Application Data\Microsoft\Internet Explorer\iv.exe
  • %UserProfile%\Local Settings\Application Data\Microsoft\Windows\log.txt
  • %UserProfile%\Local Settings\Application Data\Microsoft\Windows\pguard.ini
  • %UserProfile%\Local Settings\Application Data\Microsoft\Windows\services.exe


The registry entries that need to be removed are as follows:



  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Personal Antivirus_is1
  • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ITGRDENGINE
  • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ITGrdEngine
  • HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer “PrS”
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “Personal Antivirus”


Please, be aware that manual removal of Personal Antivirus is a cumbersome process and does not always ensure complete deletion of the malware, due to the fact that some files might be hidden or may get reanimated automatically afterwards. Moreover, manual interference of this kind may cause damage to the system. That’s why we strongly recommend automatic removal of Personal Antivirus, which will save your time and enable avoiding any system malfunctions and guarantee the needed result.



Source : http://remove-malware.net

How to remove Trojan.FakeAlert infection

0 ความคิดเห็น

Malware Description:

Trojan.FakeAlert (aka Downloader.MisleadApp or Hoax.Win32.Agent.n) is a dangerous digital infection that specializes in promoting affiliated rogue security products. Trojan.FakeAlert is known to be currently involved in the intricate pushing schemes of Personal Antivirus rogue anti-spyware program. Typically, Trojan.FakeAlert intrudes without the user’s awareness and consent because it applies backdoor techniques to infiltrate, i.e. it spots and exploits security flaws and firewall vulnerabilities to get on board. When inside, Trojan.FakeAlert creates some additional registry entries and drops a few malicious files in the System32 folder. The consequences of such malicious activity of Trojan.FakeAlert are as follows: the victim will keep getting misleading and exaggerated alerts about a variety of infections which are allegedly detected on the compromised computer. Those alerts usually appear from the system tray in the bottom right-hand corner of the desktop. In fact, through, if you click on such fake notifications, you will trigger the procedure of installing the rogue anti-spyware application (currently – the PAV infection mostly). In addition, in the overwhelming majority of cases of Trojan.FakeAlert infection, it has caused browser hijacking symptoms, which results in diverting you online activities to fraudulent insecure websites. It’s strongly recommended to remove Trojan.FakeAlert parasite if it attacked your PC. And make sure you check your machine for additional infections after that.



Malware Type: Trojan Horses


Malware Author: Unknown


Threat Level: Critical


Advice: Immediately remove and scan for additional malware


Trojan.FakeAlert And Affiliated Malware Free Scanner and Remover: Download Now


How to remove Trojan.FakeAlert manually:

Manual removal of Trojan.FakeAlert is feasible if you have sufficient expertise in dealing with program files, system processes, .dll files and registry entries.


The associated files to be deleted are listed below:



  • rpnqrdnm.exe
  • runsrv32.exe
  • tcpservice2.exe
  • susp.exe
  • users32.exe
  • zserv.dll
  • wstart.dll
  • winflash.dll
  • udpmod.dll
  • runsrv32.dll
  • questmod.dll
  • pynix.dll
  • jao.dll
  • bridge.dll


The related registry entries to be removed are as follows:



  • HKEY_CLASSES_ROOT\clsid\{60e2e76b-60e2e76b-60e2e76b-60e2e76b-60e2e76b}


Please, be aware that manual removal of Trojan.FakeAlert malware is a cumbersome procedure and does not ensure complete deletion of the malware, due to the fact that some files might be hidden or may automatically reanimate themselves afterwards. Moreover, manual interference of this kind may cause damage to the system. That’s why we strongly recommend automatic removal of Trojan.FakeAlert, which will save your time and enable avoiding any system malfunctions and guarantee the needed result.

Hot Hit

Followers

 

Antivirus Online. Copyright 2008 All Rights Reserved Revolution Two Church theme by Brian Gardner Converted into Blogger Template by Bloganol dot com