Search This Blog

Showing posts with label virus N spyware. Show all posts
Showing posts with label virus N spyware. Show all posts

Saturday, February 27, 2010

"This You??" Twitter Phishing Attack

twitter-virus-2010
There Is A New Phishing Attack Which Has Hit Twitter And I Thought It Would Be Important Bit Of News For Our Readers Who Are On Twitter. The Attack Spreads Through A Tweet With The Text Message “This You????” Followed By A Link. Clicking On The Link Spreads The Phishing Attack And Makes Your Account Details Vulnerable.
Read more »

Friday, February 27, 2009

Protection From Spam Emails

email security - protection from spams
Are You Disturbed Of Email Spam? Need An Email Guard?? Get It Now.

mcafee email protection 1001-tricks


Get the email you want and nothing else. McAfee SpamKiller quickly and easily helps you stop spam from polluting your inbox with advanced rule-based and list based filtering.

SpamKiller is THE Leading Anti-Spam Product for Consumers and Small Businesses

  • Block emails using both lists and preset filters
  • Update internal filters automatically
  • Filter MSN/Hotmail, POP3 and MAPI email
  • Create custom filters
  • Quarantine spam outside of your inbox
  • Import "friends" automatically into your safe list
  • Monitor and filter multiple email accounts
  • Fight back against spammers
  • Report spam to McAfee
Read More On This Product
anti spam software 1001-tricks

With the home and corporate user in mind we have created Spam Agent - your anti spam filtering solution!

Spam Agent comes preset with over 1,500 filters for the most common spam issues.

You also have the ability to create your own custom filters by email, subject, word(s), and much more - as many as you wish!

Some Key Features :

  • prevent all unwanted spam and junk email from entering your inbox!
  • includes over 1,500 preset filters for preventing spam
  • create custom filters based on email, subject, words, domain, etc.
  • fight back against spam - report spammers and send abuse emails to their internet providers!
  • "friends" list ensures your friends emails are never blocked
  • runs automatically at computer bootup
  • compatible with all POP3 and IMAP email accounts
  • compatible with all email software including Outlook, Eudora, and more!
  • compatible with all versions of Windows
Read More On This Product

Anti Spam Tools Freeware

Spamihilator

Spamihilator is an full featured anti-spam filtering program that works with any email client. It runs as a local POP server that sits between your email program and your mail server and filters mail based on a built-in filtering mechanism. In addition, you can maintain a blocklist as well as a list of friends (their mail will never be filtered) and customize the filtering with a variety of settings and plug-ins. The program automatically configures popular email clients (Outlook, Outlook Express, Netscape etc.) to work with the filter. Among many other options, you can change the aggressiveness of the filter, block certain attachment types, block specific senders and also add your own spam words to look for. Spamihilator does not delete the spam right away, but moves it to a recycle bin from where you can review it, restore items or permanently delete them. A very flexible and capable spam filtering system.

Iconix eMail ID

Iconix eMail ID is a client application that verifies the sender of an incoming email, and guarantees that the mail is actually coming from the company that it claims. The service works with companies that have registered with Iconix, which currently includes more than 400 companies such as eBay, PayPal, Citibank, Amazon.com, Expedia, and many others. Whenever an email arrives from one of the known senders, it is authenticated, and an icon displayed next to the message that indicates the validity of the mail. Once Iconix is installed on your computer, it will automatically verify email messages whenever you use any of the supported services, there is no interface or additional configuration required. If are concerned about phishing scams involving major companies, give this software a try. Iconix eMail ID supports IE and Firefox and works with Gmail, Yahoo, MSN and Hotmail accounts as well as Outlook Express.


More Anti spam Freeware Tools

Wednesday, February 11, 2009

USB Device Spreading Viruses





Funny UST Scandal Virus

These Viruses Are Mainly Spreading From The USB Devices Like Pendrive , Mobile Memory Cards etc...

Some of the Symptoms Of Funny UST SCandal.avi.exe

• A orange icon with image of a Foot.

• Files missing, Not able to view hidden files.

• Every time you click on My Computer opens a new instance of it.

• Task Manager automatically disappearing after few seconds, not able to view process.

• System deadly slow

• Installations not occurring.





How To Remove This Virus ?



* Follow These Steps

    1. Download and install TaskKiller. TaskKiller forcefully kills the task and hence stops virus from replicating. Run Task Killer, and a red skull icon will appear on the system tray.Left click it, and click Processes
    2. Select to kill these processes -
      • killer.exe
      • lsass.exe
      • smss.exe
    3. Now open up Command Prompt (Start>Run>command). Type each command and press Enter to run it -
      • cd\
      • attrib -h -s smss.exe
      • attrib -h -s autorun.inf
    4. Open My Computer and go to "C:\", then "C:\Windows\System32" and "C:\Windows\System".
    5. Delete the following files -
      • smss.exe
      • autorun.inf
      • Funny UST Scandal.avi.exe
    6. Now, go to C:\Documents and Settings\All users\Startmenu\Programs\Startup and delete the file lsass.exe.
    7. Open Registry Editor (Start>Run>regedit)
    8. Delete the key HKEY_LOCAL_MACHINE\Software\

      Microsoft\WindowNT\CurrentVersion\
      Winlogon=shell(killer.exe
    9. Delete the key HKEY_CURRENT_USER\Software\

      Microsoft\windows\Currentversion\Run=runonce(c:\windows\smss.exe)
    10. Check For the virus in the other root partitions and remove the Funny UST Scandal.avi.exe


Another Method For Removing Funny UST Scandal Virus

You Can Remove Funny UST Scandal Virus Using The Funny UST Scandal Virus Remover





This Remover Tool Works Only If Your Computer Is Infected With Funny UST Scandal Virus. Otherwise It Displays A Message "No Funny Virus Running!!!!!"

Download link 1



Alternate link





2.

“I Dont hate Mozilla but use IE or Else” Virus

Few days back when i tried to open mozilla firefox i got a message “I Dont hate mozilla but use IE or Else”… this was my first encounter with a virus… My antiVirus couldn’t detect it… thats bad.. :(

My senior Colleague at office Mr. Mohan, he is a person who guides me in all my system related queries. Thanks Mohan. when i said him about this he went through google…. and landed on to a site “mozillaZine” where people discuss about the virus. Thankfully people had already found solution for this virus. Which had blocked my mozilla firefox but IE was accessible. even with IE i was unable to visit orkut.

Disable Autorun Feature

  1. Click Start -> Run.
  2. Type RegEdit in the Open text box, then press ENTER.
  3. In the Registry Editor, locate and click the following registry key:

HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\CDRom

  1. Modify the value of the Autorun to 0 (zero) so that CD-ROMs and Audio CDs do not run and start automatically when inserted.
  2. Next navigate to the following registry subkey:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer

  1. Modify the value of the NoDriveTypeAutoRun entry to 0xb5 value to turn off the AutoRun feature for CD-ROMs by right-click NoDriveTypeAutoRun and then click Modify to type B5 in the Value data box. Select Hexadecimal, and then click OK.
  2. Quit Registry Editor.
  3. Restart your computer.



The steps to kill the virus :

  1. Go to Task Manager (Ctrl+Alt+Del)
  2. in that click on Process Tab
  3. Delete only the svchost.exe of your user name
  4. type c:\heap41a in you address barof your explorer and you can trace this folder
  5. Done.




Source: Google





Tuesday, January 13, 2009

RATS

What? Rats? Those pesky black things that always cause damage in the house. Very cute to look still very destructive all the same. This is supposed to be a site on Internet Security not household and pest management. So why all this here?
Put your thoughts aside for a while and let me continue. I am not talking about the above rats. This is in continuation on what the uninitiated call as Trojans which I had hinted upon in my earlier article and what the refined call as Remote Administrative Tools or RATS. Trojans can be very destructive if you're not careful. So tighten your seat belts as we gear up for take-off.
To define Trojans, we refresh our knowledge of a virus. A virus is a self-replicating piece of code designed to cause damage or irritation. Trojans assume much greater risk proportions. As the name RATS suggest, they allow a remote user to operate your PC sitting thousands of miles away via the Internet. Surprised? No need to be. The Internet today imparts such power that even a lame user can do this to you.
Note: Lame means a user possessing limited knowledge. In other words, a naive user, not a professional.
Evolution
Every thing has a beginning. This is the most basic principle of evolution. Trojans evolved from what can be termed as an exploitation of a basic administrative need. When Internet began to spread its wings in late 90s, corporations found the regional barriers too small for comfort. They wanted to expand their horizons. For this, they needed a software which could help in remote management of resources. Wherein a person can manage all the company resources spread across the world. Microsoft, as it always does, recognized this need and came up with a software package Microsoft Back Office.
The Underground was quick to pounce upon this thought. It is a fundamental rule in computing (or for anything) that Nothing is perfect. There are always some loopholes left open for exploitation. The Underground came up with what can be branded as the first Trojan known as Back Orifice (a lash at Microsoft). This had limited remote administrative powers still it pioneered the Underground in this direction. Today Back Orifice remains as one of the all-time powerful Trojan. It is managed by Cult Of Dead Cow (www.cultofdeadcow.com). Many soon followed suite and the next popular one was Netbus.
Today, Trojans impart a lot of power and are extremely easy to use. In the next article, we will try to classify Trojans based on their remote administrating prowess. Till then adieu.
Trojans-The Beginning Read on to know more about the supreme tool of novice and advanced hacking. The tool that got through Microsoft's defense. One that can create havoc on your PC also. This is just the beginning.
Related Posts Plugin for WordPress, Blogger...