tutorials

Showing posts with label from. Show all posts
Showing posts with label from. Show all posts

Thursday 18 June 2015

Secure Your PC From Spyware

By http://ad-tutorials.blogspot.com/   Posted at  10:03 am   your No comments


Secure Your PC

سکیور یور کمپیوٹر

All about SpyWare

What is Spyware?

Broadly speaking, Spyware is something that sneaks on to your computer, usually with the intentions of extracting money from you. At its worst, Spyware can take control of your computer, directing you to web pages you didn't want to go to, downloading other nasty stuff in the background, and even harvesting email address, passwords and your credit card details. But even a mild case of Spyware infection can be nuisance.
If you've ever been plagued by annoying pop-ups when your computer loads, or have strange new icons where your clock is (bottom right, called the System Tray), or if you're directed to a strange webpage when you try to go on to the internet, then you may well be infected.
Spyware, in the main, gathers information about you and your online habits, and sends that information to third party. And all without asking for your permission!


Where does Spyware come from?

Spyware can come from a whole host of different sources. But Spyware mainly gets on to your PC through deception. For example, suppose you receive this email:
Email with potential Spyware
You'd assume that this email was sent to you in error. Can you resist clicking on the link? After all, what harm can it do? Well, a lot actually! There well may be a joke on the site, but there's something less funny going on in the background - the web page is trying to sneak something on to your PC! You may also have seen a harmless-looking popup window asking you to click a button to proceed. You'll click it anyway, just to get rid of it. Clicking OK is what's infected your PC!
Other sources of Spyware infection are freeware or shareware software, an operating system that is un-patched and hasn't got the latest security software, downloading stuff from peer-to peer applications - the list is long!
And don't think your Anti-Virus software will protect you - it won't! Spyware is not considered to be a virus, so your Anti-Virus software won't spring in to action once an infection takes place - it will stay sleeping in the background, unaware that anything malicious is going on. The best tool for the job is a dedicated Spyware Detection system.

Beware of the Scam Merchants!

You may have come across a website that promises to check your PC for Spyware infection. All for free. All you need to do is to click a button to scan your PC. So you download, scan, and lo and behold - it's found something! Then up pops a message directing you to a website that lets you buy the software.
Except, it didn't really detect anything. Or if it did, it's what's know as a false positive (Something that sounds dangerous but isn't). The job of the scan is to scare you into buying their software.
If you type in "Spyware detection" into Google, most of the results that come back are for these types of programmes. According to Suzi Turner, writing on Zdnet , some of the most popular Spyware scams are these products:
  1. SpyAxe
  2. SpySheriff
  3. PSGuard
  4. WorldAntiSpy
  5. Spy Trooper
  6. Razespyware
  7. SpywareNo or SpyDemolisher
  8. WinAntiVirus or WinAntiSpyware 2005
  9. SlimShield tied with "Winhound Spyware Remover"
  10. Spyware Bomber (shut down by the FTC)
Hopefully, you haven't bought anything on the top ten list! Even if you haven't, check out the alarmingly long list of scam Spyware on spywarewarrior.com (Fortunately, they also have a good-software list!)
If you've bought any of the software on the bad list then the protection you have is at no protection at all. At worst, these pieces of software can be incredibly difficult to get rid of - Spyware themselves!

How to get Rid of Spyware

As a computer owner, you really need your wits about you in the Spyware detection game. So what are you to do if you can't even trust the very people who say they are going to help you clean your PC? Well, you can fight back! The best way to do that is with software from very reputable companies. The following are the most well-known (and free) anti-spyware solutions:
Ad-Aware is probably the easiest to use of the three. SpyBot is good, but a bit complex for beginners. Microsoft Windows Defender is well worth getting, too. However, it's not the easiest piece of software in the world to use. You do get some good tools with it, though. Check out the websites by clicking the links above (there's a tutorial on the Microsoft site for Windows Defender).
Once you download your chosen anti-spyware solution, you need to install it on to your PC. After you have installed it, start the software and do a full scan of your computer. (Ad-Aware has a nice big button that says "Scan"!)
Unlike anti-virus software, it IS recommended that you have more than one anti-spyware solution on your PC. This is because spyware can be very difficult to get rid of, and anti-spyware software will rarely find 100 percent of threats. By having more than one solution, what one piece of anti-spyware programme misses, the other should (hopefully) pick it up.
Text Curtsy: Free Computer Tutorials 


Share/Bookmark

Wednesday 3 June 2015

Remove Virus from USB/Pen Drive/PC/Memory Card With Linux

By http://ad-tutorials.blogspot.com/   Posted at  3:58 pm   with No comments




Remove Virus from USB/Pen Drive/PC/Memory Card With Linux



Remove virus from usb/pen drive etc.

Disclaimer: This article is written on basis of author’s personal experiences and R&D. Any data loss or misbehavior of system is not responsibility of the authors.
The shortcut virus is commonly found is USB drivers and it replaces all the data with its shortcuts, means corrupt all the data. So you can imagine how dangerous it can be specially when you have very important data in your pen drive.
Scenario:
A few days before I encountered with this problem. I got a laptop of one of my friends. He asked me to install an OS into his Laptop. Windows 7 was pre-installed in that book. As I connected my pen drive with the laptop, all the data was disappeared and 3 strange types of files plus a shortcut to a folder (name similar to my USB) was showing me. I tried my level best to diagnose it via DOS commands and BLA BLA, but … no, nothing was there for me to get back. I am having 32 GB Pen Drive, which was used almost 85% at that moment (without any backup in my system). After a long R&D, I found following issues with that:
  1. All my data was moved to a blank directory (folder), which was renamed as ‘   ‘ (here all name is consist of blank spaces), which is quite impossible in any Version of Windows OS including DOS
  2. A shortcut was created with fake name similar to Volume name of my Pen Drive
  3. ‘3’ unknown scripts/files created, which were detected by antivirus and removed
Steps to Recover:
Required Resources:
Before I start writing about steps, we must all resources which will be needed for this task
  1. Linux Live CD/USB with NTFS/FAT/FAT32 Support, already burned on CD/USB
    1. My recommendation is SliTaz GNU Linux, which is already discussed in this forum in an article named as 8 of the Best Tiny Linux Distros (Download Link: http://www.slitaz.org/en/)
  2. A PC with at least 512 MB RAM to run Live Linux OS with CD Boot Support
  3. Infected Pen Drive
  4. Finally common sense ��
Procedure:
  1. Boot PC from CD-ROM (recommended) already burned with Live Linux OS (as discussed earlier)
  2. After completion of OS loading, insert Pen Drive in PC and browse it via file browser
  3. Delete the unnecessary & unknown files (if you are 100% sure, as I was at that moment) from of the Pen Drive
  4. Linux can support renaming of blank spaces, rename the directory, and browse into it.
  5. Cut the data and move it at its original place in Pen Drive
  6. Remove infected folder from Pen Drive
  7. Properly eject Pen Drive, and reboot system. 
  8. Simply done:-)


Share/Bookmark

Back to top ↑
Free track counters
IT Tutorials and Novels by Achidosti © 2014-15.
All Rights Reserved. By IT.TUTORIALS