May 2015 OS world market share
Free anti-virus tools
Avast 2014 Remote Desktop issue
VirusTotal is a free service that analyzes suspicious files and URLs and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware
Trend Micro's http://housecall.antivirus.com
McAfee's Stinger http://vil.nai.com/vil/stinger/
Fprot - Jotti's Malware scan www.Avast.com Configure avast! Antivirus Non-profit discounts on Avast here
Here's an anti-virus comparative site
Got malware, spyware, pop-ups and such?
bleepingcomputer.com is a great site with many free tools to help rid your system of malware, also try Ad-aware, SpyBot-Search & Destroy, Spy Sweeper , most can be found here from www.majorgeeks.com
By now, most people acquainted with the Internet know that scammers and cybercriminals tend to treat holidays as a special opportunity for mischief. But the scammers' methods of attack change over time. Here's what they've been up to lately.
1. Facebook spam. You get a lovely Valentine's Day message on your Wall, and when you click on the link, it takes you to a page for some Valentine's Day app. When you download the app, it asks you for permission to post on your Wall, access your basic information (including your list of friends), and access your data. If you say yes, then you've just allowed this application to spam your Wall and the Walls of all your friends. Even worse, you might then get tricked into filling out a survey that makes money for the scammer. And because they have access to your list of friends, they might fall prey to the same scheme.
2. Fake romances. If you meet somebody online who allegedly lives overseas, or who never seems to be able to meet with you in person, be suspicious. If they happen to have a small child or relative who falls suddenly ill, or if they experience some other crisis that calls for a massive infusion of cash, be very suspicious. True love seldom, if ever, comes in the form of a faceless stranger asking you for money.
3. Delivery scams. A new trick involves getting an email from a "delivery service" letting you know that the flowers you wanted sent to your special someone won't be making it there unless you provide a new credit card number for your order. Most people won't fall for this, because even on Valentine's Day, the percentage of people who have ordered flowers on the Internet pales in comparison to the number of people who haven't. But a crook only needs one sucker in order to go on a shopping spree.
4. And now... Ransomware! decrypt cryptolocker with help from FireEye and Fox-IT https://www.decryptcryptolocker.com/
You can help protect yourself from these and other threats by making sure your security software is up to date. Trend Micro can identify phishing attempts, prevent you from visiting dangerous sites, and block malware. Or give it to that special someone as a romantic Valentine's Day gift!
To totally uninstall F-Secure have a look @ this link [support.f-secure.com]
To totally uninstall Kaspersky have a look @ this link [support.kaspersky.com]
To totally uninstall McAfee have a look @ this link [service.mcafee.com]
To totally uninstall NAV (2003 & later) have a look @ this link [service1.symantec.com]
To totally uninstall NAV (pre 2003) have a look @ this link [service1.symantec.com]
To uninstall NOD32 use the Windows Add/Remove and follow up with the removal tool available here [www.betterantivirus.com]
To uninstall Norman Virus Control / Norman Internet Control use the removal tool available here [www.norman.com]
To totally uninstall Panda 2007 have a look @ this link [www.pandasecurity.com]
To totally uninstall Panda 2008 have a look @ this link [www.pandasecurity.com]
For earlier Panda versions... see their support pages to find the uninstaller for it...
To totally uninstall PC-Cillin have a look @ this link [esupport.trendmicro.com]
Windows Live OneCare cleanup util have a look @ this link [download.microsoft.com]
Virus hoaxes? Check here or email Urban Legends Reference Pages
Spammed again? Here's the dope on the spam that appears as though it was sent from your email address...
This carefully thought out scam brings direct profit for at least four different types of companies, with spin off effect work for many others, PAID indirectly from Internet users (or phone line owners) with a functional phone line connected to their PC or network Phone / Internet money scam costs big bucks! I understand that Bell may discount the calls to their best possible rate plan. This reduced my father-in-law's bogus over $2 per minute calls to a wireless device in Austria to 9 cents per minute. Click here to read Bell's view on this problem and here to see Bell's new product called Call Control Service (and YES they'll want more money!!!).
Step 1: Antivirus scanning
If you have a functioning, updated antivirus program, please leave it enabled pm the system for now. Do NOT add any of the free AV programs below.
If you're NOT running any antivirus, you should install one now. If you install a new antivirus, be sure to update it. - Neither a scan nor log are requested at this time.
Recommended Free Antivirus for temporary means:
Step 2: Malwarebytes Anti-Malware (MBAM)
Download Malwarebytes Anti-Malware.
Double-click mbam-setup.exe to install the application. If you already have the program installed, just follow the directions. No need to re-download or re-install!
Note: if you already have the program installed, open Malwarebytes from the Start Menu or Desktop shortcut, click the Update tab, and click Check for Updates, before doing the scan as instructed below.
Step 3: DDS
NOTE 1: You may have to
disable any script protection running if the scan fails to run. After
downloading the tool, disconnect from the internet and disable
all antivirus protection. Run the scan, enable your A/V and reconnect to the
NOTE 2: Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.
Include the contents of both logs (DDS.txt and Attach.txt) in your new topic.
The scan will instruct you to post Attach.txt as an attachment. No need for that though, just post it's contents as you would any other log.
Step 4: Log Handling Instructions
Include the following logs into your next reply (copy & paste them). Please do not put logs in a quote box or code box.
Attached logs won't be reviewed.
If any further steps are recommended, it will be done so in your thread.
Download TDSSKiller and save it to your desktop.
Please download AdwCleaner by Xplode onto your desktop.
Please download Junkware Removal Tool to your desktop.
Download OTL to your Desktop.
Alternate download: http://www.itxassociates.com/OT-Tools/OTL.exe
Please download Farbar
Recovery Scan Tool and save it to your
Note: You need to run the version compatibale with your system. If you are not sure which version applies to your system download both of them and try to run them. Only one of them will run on your system, that will be the right version.
attached fixlist.txt file
and save it to the Desktop.
NOTE. It's important that both files, FRST and fixlist.txt are in the same location or the fix will not work.
NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system
Run FRST/FRST64 and press the Fix button just once and wait.
The tool will make a log on the Desktop (Fixlog.txt). Please post it to your reply.
Download Security Check from here or here and save it to your Desktop.
NOTE 1. If one of your security
applications (e.g., third-party firewall) requests permission to allow
NOTE 2 SecurityCheck may produce some false warning(s), so leave the results reading to me.
Please download Farbar Service Scanner (
Download Temp File Cleaner (TFC)
Alternate download: http://www.itxassociates.com/OT-Tools/TFC.exe
Please run a free online scan with the ESET Online Scanner
Your computer is clean
1. We need to reset system restore to prevent your computer from being accidentally reinfected by using some old restore point(s). We'll remove all old restore points and create fresh, clean restore point.
Turn system restore off.
Turn system restore back on.
If you don't know how to do it...
Windows XP: http://support.microsoft.com/kb/310405
Vista and Windows 7: http://www.howtogeek.com/howto/windows-vista/disable-system-restore-in-windows-vista/
Windows 8: http://www.bleepingcomputer.com/tutorials/windows-8-system-restore-guide/#disable
2. Make sure Windows Updates are current.
3. If any Trojan was listed among your infection(s), make sure, you change all of your on-line important passwords (bank account(s), secured web sites, etc.) immediately!
4. Check if your browser plugins are up to date.
Firefox - https://www.mozilla.org/en-US/plugincheck/
other browsers: https://browsercheck.qualys.com/ (click on "Launch a quick scan now" link)
5. Download, and install WOT (Web OF Trust): http://www.mywot.com/. It'll warn you (in most cases) about dangerous web sites.
6. Run Malwarebytes "Quick scan" once in a while to assure safety of your computer.
7. Run Temporary File Cleaner (TFC), AdwCleaner and Junkware Removal Tool (JRT) weekly.
8. Download and install Secunia Personal Software Inspector (
9. (optional) If you want to keep all your programs up to date, download and install FileHippo Update Checker.
The Update Checker will scan your computer for installed software, check the versions and then send this information to FileHippo.com to see if there are any newer releases.
10. When installing\updating ANY program, make sure you always select "Custom " installation, so you can UN-check any possible "drive-by-install" (foistware), like toolbars etc., which may try to install along with the legitimate program. Do NOT click "Next" button without looking at any given page.
How did I get infected?, With steps so it does not happen again!:http://www.bleepingcomputer.com/forums/topic2520.html
Simple and easy ways to keep your computer safe and secure on the Internet:http://www.bleepingcomputer.com/tutorials/keep-your-computer-safe-online/
12. Except for MBAM and TFC, which are keepers you can simply delete all other tools we used as they don't install.
13. Please, let me know, how your computer is doing.
back to Deighton