VERY IMPORTANT - BIG VIRUS COMING !!! PLEASE READ AND TELL OF YOUR FRIEND !!!

Hi All,
DEAR READER THIS IS TIME WHEN SO MANY OF VIRUS ARE LAUNCHINGAND IT IS SPREADING BY MAIL.THIS IS MY REQUEST --Do not open any message with an attachment entitled 'POSTCARD FROM HALLMARK,'regardless of who sent it to you.You should be alert during the next few days.Do not open any message with an attachment entitled 'POSTCARD FROM HALLMARK,'regardless of who sent it to you.
It is a virus which opens A POSTCARD IMAGE - it 'burns' the entire hard disc C.This virus will be received from someone who has your e-mail address in their contact list. This is the reason why you must send this e-mail to all your contacts. It is better to receive this message multiple times than to receive the virus and open it.If you receive mail called' POSTCARD,' even though sent to you by a friend, do not open it! Shut down your computer immediately.
This virus has been classified by Microsoft as extremely destructive.
McAfee discovered this virus yesterday.
This virus destroys the Zero Sector of the Hard Disc, where the vital information is kept.
REMEMBER: WHEN YOU GET SUCH MESSAGE PLEASE TELL ALL YOUR FRIEND CIRCLEABOUT THIS MAIL SAVE HIS ACCOUNT .
THANK YOU
AJEET

NEW VIRUS ON YOUR PC..READ THIS POST

Dear All, READER I GOT A MAIL SINCE THIS IS RELATED TO COMPUTER AND YOUR DATA SECURITY SO I THINK THIS MAY BE HELPFUL FOR YOU...

This information arrived this morning direct from both Microsoft and Norton. Please send it to everybody you know who has access to the Internet. You may receive an apparently harmless email with a Power Point presentation 'Life is beautif If you receive it DO NOT OPENS THE FILE UNDER ANY CIRCUMSTANCES, and deletes it immediately. If you open this file, a message will appear on your screen saying: 'It is too late now; your life is no longer beautiful.'
Subsequently you will LOSE EVERYTHING IN YOUR PC and the person who sent it to you will gain access to your name, e-mail and password
.
This is a new virus which started to circulate on Tuesday afternoon. AOL has already confirmed the severity, and the antivirus software's are not capable of destroying it. The virus has been created by a hacker who calls himself 'life owner.'
PLEASE SEND A COPY OF THIS EMAIL TO ALL YOUR FRIENDS and ask them to PASS IT ON IMMEDIATELY!

Windows Defender defend your pc from virus and hackers

Windows Defender detects and removes spyware

Windows Defender is software that helps protect your computer against pop-ups, slow performance, and security threats caused by spyware and other unwanted software by detecting and removing known spyware from your computer. Windows Defender features Real-Time Protection, a monitoring system that recommends actions against spyware when it's detected, minimizes interruptions, and helps you stay productive.

The benefits of installing Windows Defender include:

Spyware detection and removal

* Windows Defender quickly and easily finds spyware and other unwanted programs that can slow down your computer, display annoying pop-up ads, change Internet settings, or use your private information without your consent.
* Windows Defender eliminates detected spyware easily at your direction, and if you inadvertently remove programs that you actually want, it's easy to get them back.
* Windows Defender allows you to schedule your scanning and removal times when it's convenient for you, whether it's on-demand or on a schedule that you set.

Improved Internet browsing safety

* Windows Defender helps stop spyware before it infiltrates your computer. Windows Defender also offers a continuous safeguard designed to target all the ways that spyware can infiltrate your computer.
* Windows Defender works without distracting you. It runs in the background and automatically handles spyware based on preferences that you set. You can use your computer with minimal interruption.

Protection against the latest threats

* A dedicated team of Microsoft researchers continuously searches the Internet to discover new spyware and develop methods to counteract it.
* A voluntary, worldwide network of Windows Defender users helps Microsoft determine which suspicious programs to classify as spyware. Participants help discover new threats quickly and notify Microsoft analysts, so that everyone is better protected. Anyone who uses Windows Defender can join this network and help report potential spyware to Microsoft.
* To help protect your computer from the latest threats, you can choose to have updates that counteract new spyware automatically downloaded to your computer.

How to Protect Your Children's Privacy and Safety in network from virus and from hackers

  1. Never reveal personal information. It needs to be drummed into kids they can never give away any real aspects of their identity. This includes information such as name, address, phone number, school, and parent’s work address. If this kind of information is needed to register with a web site, parents should get involved.
  2. Use only moderated chat rooms. Chatting won’t go away, but it can be made safer. Parents should be just as wary of who their kids talk to online as they are in person. Keep kids away from private or one-on-one chat rooms, and ask to be introduced to online friends.
  3. Talk about bad experiences. Children need to understand that they can talk to their parents if they come across something that makes them feel uncomfortable while online. Discussing issues with an adult they trust will help them to realize that a bad experience is not their fault.
  4. Spend time with children online. Being online is no different than being outside; you always want to know where your children are and become familiar with the places they visit. Learn about their favorite sites and online friends. Going online is a big part of your kids’ lives, and it’s important that you share in that.
  5. Never meet online friends in person. Online, it’s easy to be someone different. People who seem friendly online may be of questionable character in reality. If a child wants to meet an online friend, make sure that it’s done only under strict adult supervision, and in a public place.
  6. Be mindful of viruses. Tell kids to be extremely careful of email they get from strangers. Besides containing inappropriate material, it could have viruses that lodge inside PC and leave it vulnerable to attack. It’s almost always better to delete emails of unknown origin and not open them.
  7. Think twice about sending pictures. Sending family or school pictures to family and friends online is fine...as long as it’s done with a parent’s permission. However, sending pictures to strangers is unacceptable under any circumstances. In the wrong hands, these pictures can be used for a variety of sinister purposes.
  8. Avoid using real last names. Don’t give people, friends or otherwise, more information than they need. This is especially important if the situation appears to be unusual. Instead of using your real last name, for example, it’s a safer bet to use your middle name, or just make one up.
  9. Stop at offensive web sites. Tell children that they need to trust their instincts when they come across a web site that makes them uncomfortable. After all, even a misspelled URL can take a browser to a foul site. Tell the kids it is okay, as long as they get out of that site.

New Computer Virus List

we have heard different type of virus such as trojen,win32,malware,etc but these are the newly launched virus,so be carefull and know all functions of these virus.Since we are leaving in cyber world and we do lot of work by computer but we dont know our data is safe or not.virus is one of the factor to send your data to other place-----
I am going to explain such newly virus so read AND
be carefull and happy surfing

1. OPRAH WINFREY VIRUS: Your 200MB hard drive suddenly shrinks to 80MB, and then slowly expands back to 200MB.

2.AT&T VIRUS: Every three minutes it tells you what great service you are getting.

3.MCI VIRUS: Every three minutes it reminds you that you're paying too much for the AT&T virus.

4.PAUL REVERE VIRUS: This revolutionary virus does not horse around. It warns you of impending hard disk attack---once if by LAN, twice if by C:>.

5.POLITICALLY CORRECT VIRUS: Never calls itself a "virus", but instead refers to itself as an "electronic microorganism."

6.RIGHT TO LIFE VIRUS: Won't allow you to delete a file, regardless of how old it is. If you attempt to erase a file, it requires you to first see a counselor about possible alternatives.

7.ROSS PEROT VIRUS: Activates every component in your system, just before the whole darn thing quits.

8.MARIO CUOMO VIRUS: It would be a great virus, but it refuses to run.

9.TED TURNER VIRUS: Colorizes your monochrome monitor.

10..ARNOLD SCHWARZENEGGER VIRUS: Terminates and stays resident. It'll be back.

11.DAN QUAYLE VIRUS #2: Their is sumthing rong wit your komputer, ewe jsut cant figyour out watt!

12.GOVERNMENT ECONOMIST VIRUS: Nothing works, but all your diagnostic software says everything is fine.

13.NEW WORLD ORDER VIRUS: Probably harmless, but it makes a lot of people really mad just thinking about it.

14.FEDERAL BUREAUCRAT VIRUS: Divides your hard disk into hundreds of little units, each of which does practically nothing, but all of which claim to be the most important part of your computer.

15.GALLUP VIRUS: Sixty percent of the PCs infected will lose 38 percent of their data 14 percent of the time. (plus or minus a 3.5 percent margin of error.)

16.TERRY RANDALL VIRUS: Prints "Oh no you don't" whenever you choose "Abort" from the "Abort" "Retry" "Fail" message.

17.TEXAS VIRUS: Makes sure that it's bigger than any other file.

18.ADAM AND EVE VIRUS: Takes a couple of bytes out of your Apple.

19.CONGRESSIONAL VIRUS: The computer locks up, screen splits erratically with a message appearing on each half blaming the other side for the problem.

20.AIRLINE VIRUS: You're in Dallas, but your data is in Singapore.

21.FREUDIAN VIRUS: Your computer becomes obsessed with marrying its own motherboard.

22.PBS VIRUS: Your programs stop every few minutes to ask for money.

23.ELVIS VIRUS: Your computer gets fat, slow and lazy, then self destructs; only to resurface at shopping malls and service stations across rural America.

24.OLLIE NORTH VIRUS: Causes your printer to become a paper shredder.

25.NIKE VIRUS: Just does it.

26.SEARS VIRUS: Your data won't appear unless you buy new cables, power supply and a set of shocks.

27.JIMMY HOFFA VIRUS: Your programs can never be found again.

28.CONGRESSIONAL VIRUS #2: Runs every program on the hard drive simultaneously, but doesn't allow the user to accomplish anything.

29.KEVORKIAN VIRUS: Helps your computer shut down as an act of mercy.

30.IMELDA MARCOS VIRUS: Sings you a song (slightly off key) on boot up, then subtracts money from your Quicken account and spends it all on expensive shoes it purchases through Prodigy.

31.STAR TREK VIRUS: Invades your system in places where no virus has gone before.

32.HEALTH CARE VIRUS: Tests your system for a day, finds nothing wrong, and sends you a bill for $4,500.

33.GEORGE BUSH VIRUS: It starts by boldly stating, "Read my docs....No new files!" on the screen. It proceeds to fill up all the free space on your hard drive with new files, then blames it on the Congressional Virus.

34.CLEVELAND INDIANS VIRUS: Makes your 486/50 machine perform like a 286/AT.

35.LAPD VIRUS: It claims it feels threatened by the other files on your PC and erases them in "self defense".

36.CHICAGO CUBS VIRUS: Your PC makes frequent mistakes and comes in last in the reviews, but you still love it.

37.ORAL ROBERTS VIRUS: Claims that if you don't send it a million dollars, it's programmer will take it back.

Computing Conficker virus could be deadly threat – or April Fool's joke

It could be the biggest April Fool's joke ever played on the internet, or it could be one of the worst days ever for computers connected to the network. Security experts can't work out whether the Conficker virus – which has infected more than 10m Windows PCs worldwide – will wreak havoc on Wednesday , or just let the day pass quietly.

Experts have worked out that from midnight on 1 April, the Conficker program will start scanning thousands of websites for a new set of instructions telling it what to do next. The infected machines thus comprise one of the biggest "botnets" – a network of "robot" computers – in internet history. And if they were all given a target, such as simultaneously sending search queries to Google or trying to connect to a gambling site, they could knock it offline through the sheer volume of connections – a "denial of service". Victims usually discover that they have been locked out of their computers or have very slow-running internet connections.

Botnets have been used in the past to generate millions of pieces of spam email and to blackmail gambling sites that need to stay online during sports events with the threat that they will be deluged by a "denial of service" attacks.

Despite being tracked for several months, however, the truth about Conficker's motivations and origins remain clouded. Last weekend, one team of researchers suggested that they may have discovered a "fingerprint" inside the worm which should make it possible to scan computers for the infection, making removal easier.

The identity of its creator remains unknown, despite Microsoft offering a bounty of $250,000 (£176,000) for the information. Usual methods of unpacking the virus code to examine its workings have been thwarted because the authors have encrypted it, using algorithms that render it almost uncrackable.

In the meantime, Conficker has gone on to become one of the most widespread internet worms in recent years.

Last week a leaked memo revealed that the House of Commons computer system had become infected, leading to concerns that confidential or highly sensitive material could be stolen when the virus next updates.

In the document, Joan Miller, the director of parliamentary computer services, said that her team were "continuing to work with our third party partners to manage its removal and we need to act swiftly to clean computers that are infected".

Ordinary PC users are being advised to keep their anti-virus software up to date and watch for news about the worm. Cluley suggested that the widespread coverage could help lessen the potential impact. "Most businesses appear to have Conficker under control," he said. "They've applied patches and updated their anti-virus software to stem the spread of the worm. Some firms struggled to clean it up quickly – but most have now used some of the free Conficker removal tools available for download from security vendors."

Kaspersky Anti-Virus

Kaspersky Anti-Virus

MAIN FEATURE
  • Free Trial
  • Scans files and Internet traffic
  • Updates automatically

BEST Antivirus ----6 --ESET NOD32 Antivirus

ESET NOD32 Antivirus

Main Features:

  • Uses a combination of filtration methods
  • Identifies known and unknown threats
  • System restore

BEST Antivirus --5.. ZoneAlarm Anti-virus 2009

ZoneAlarm Anti-virus 2009

Main Features:

  • Advanced antivirus, spyware removal protection
  • On demand scanner interface
  • Simple to install and run
  • Advanced virus removal technology

BEST Antivirus ...4...Panda Antivirus Pro 2009

Panda Antivirus Pro 2009

Main Features:

  • Automatically eliminates viruses
  • Anti-Malware Engine
  • On-demand scanning
  • Smart auto-configuration
  • Automatic Virus Pattern Updates

Best Antivirus Software----KBSMP CHOICE

3>>>>> Norton Antivirus 2009

Main Features:
  • Advanced antivirus with anti-spyware
  • Best proactive protection
  • Rapid pulse updates every 5 to 15 minutes
  • Rootkit detection, two way firewall
  • Defends against Web-based attacks
  • Automatic Virus Pattern Updates

Best Antivirus Software---KBSMP CHOICE

2>>>Trend Micro Antivirus Internet Security 2009

Advanced Features:
  • Effective Antivirus Protection
  • Customizable security for your home PCs
  • Prevents virus-infected emails
  • Home Protection for up to 3 PCs
  • Spyware and Adware Protection
  • Automatic Virus Pattern Updates
  • Enhanced Software History Cleaner
  • Effective Antivirus Protection
  • Excellent value

Best Antivirus Software----KBSMP CHOICE

1>>>>> Shield Deluxe 2009 - Antivirus Protection

Advanced Features:
  • Total virus and spyware protection
  • Free technical support
  • Intelligent scanning
  • Real time threat detection
  • Hourly updates, Vista compatible
  • Decides best security actions to take
  • Stealth web browsing
  • Excellent extended parental controls
  • Uses minimal system resources

How to remove a computer virus

Even for an expert, removing a computer virus can be a difficult task without the help of computer virus removal tools. Some computer viruses and other unwanted software, such as spyware, even reinstall themselves after the viruses have been detected and removed. Fortunately, by updating the computer and by using antivirus tools, you can help permanently remove unwanted software.

To remove a computer virus, follow these steps:
  1. Install the latest updates from Microsoft Update on the computer.
  2. Update the antivirus software on the computer. Then, perform a thorough scan of the computer by using the antivirus software.
  3. Download, install, and then run the Microsoft Malicious Software Removal Tool to remove existing viruses on the computer. To download the Malicious Software Removal Tool, visit the following Microsoft Web site:
    http://www.microsoft.com/security/malwareremove/default.mspx (http://www.microsoft.com/security/malwareremove/default.mspx)
For more information about how to remove a computer virus, visit the following Microsoft Web site:
http://www.microsoft.com/protect/computer/viruses/remove.mspx (http://www.microsoft.com/protect/computer/viruses/remove.mspx)

How to remove a computer virus

Even for an expert, removing a computer virus can be a difficult task without the help of computer virus removal tools. Some computer viruses and other unwanted software, such as spyware, even reinstall themselves after the viruses have been detected and removed. Fortunately, by updating the computer and by using antivirus tools, you can help permanently remove unwanted software.

To remove a computer virus, follow these steps:
  1. Install the latest updates from Microsoft Update on the computer.
  2. Update the antivirus software on the computer. Then, perform a thorough scan of the computer by using the antivirus software.
  3. Download, install, and then run the Microsoft Malicious Software Removal Tool to remove existing viruses on the computer. To download the Malicious Software Removal Tool, visit the following Microsoft Web site:
    http://www.microsoft.com/security/malwareremove/default.mspx (http://www.microsoft.com/security/malwareremove/default.mspx)
For more information about how to remove a computer virus, visit the following Microsoft Web site:
http://www.microsoft.com/protect/computer/viruses/remove.mspx (http://www.microsoft.com/protect/computer/viruses/remove.mspx)

Symptoms of worms and trojan horse viruses in e-mail messages

When a computer virus infects e-mail messages or infects other files on a computer, you may notice the following symptoms:
  • The infected file may make copies of itself. This behavior may use up all the free space on the hard disk.
  • A copy of the infected file may be sent to all the addresses in an e-mail address list.
  • The computer virus may reformat the hard disk. This behavior will delete files and programs.
  • The computer virus may install hidden programs, such as pirated software. This pirated software may then be distributed and sold from the computer.
  • The computer virus may reduce security. This could enable intruders to remotely access the computer or the network.
  • You receive an e-mail message that has a strange attachment. When you open the attachment, dialog boxes appear, or a sudden degradation in system performance occurs.
  • Someone tells you that they have recently received e-mail messages from you that contained attached files that you did not send. The files that are attached to the e-mail messages have extensions such as .exe, .bat, .scr, and .vbs extensions.

Symptoms of a computer virus

If you suspect or confirm that your computer is infected with a computer virus, obtain the current antivirus software. The following are some primary indicators that a computer may be infected:
  • The computer runs slower than usual.
  • The computer stops responding, or it locks up frequently.
  • The computer crashes, and then it restarts every few minutes.
  • The computer restarts on its own. Additionally, the computer does not run as usual.
  • Applications on the computer do not work correctly.
  • Disks or disk drives are inaccessible.
  • You cannot print items correctly.
  • You see unusual error messages.
  • You see distorted menus and dialog boxes.
  • There is a double extension on an attachment that you recently opened, such as a .jpg, .vbs, .gif, or .exe. extension.
  • An antivirus program is disabled for no reason. Additionally, the antivirus program cannot be restarted.
  • An antivirus program cannot be installed on the computer, or the antivirus program will not run.
  • New icons appear on the desktop that you did not put there, or the icons are not associated with any recently installed programs.
  • Strange sounds or music plays from the speakers unexpectedly.
  • A program disappears from the computer even though you did not intentionally remove the program.

What is a computer virus?

A computer virus is a small software program that spreads from one computer to another computer and that interferes with computer operation. A computer virus may corrupt or delete data on a computer, use an e-mail program to spread the virus to other computers, or even delete everything on the hard disk.

Computer viruses are most easily spread by attachments in e-mail messages or by instant messaging messages. Therefore, you must never open an e-mail attachment unless you know who sent the message or unless you are expecting the e-mail attachment. Computer viruses can be disguised as attachments of funny images, greeting cards, or audio and video files. Computer viruses also spread by using downloads on the Internet. Computer viruses can be hidden in pirated software or in other files or programs that you may download.

How Computer Viruses Work

Inside this Article

1. Introduction to How Computer Viruses Work
2. Virus Origins
3. Virus History
4. Virus Evolution
5. E-mail Viruses
6. Worms


Strange as it may sound, the computer virus is something of an Information Age marvel. On one hand, viruses show us how vulnerable we are -- a properly engineered virus can have a devastating effect, disrupting productivity and doing billions of dollars in damages. On the other hand, they show us how sophisticated and interconnected human beings have become.

For example, experts estimate that the Mydoom worm infected approximately a quarter-million computers in a single day in January 2004. Back in March 1999, the Melissa virus was so powerful that it forced Microsoft and a number of other very large companies to completely turn off their e-mail systems until the virus could be contained. The ILOVEYOU virus in 2000 had a similarly devastating effect. In January 2007, a worm called Storm appeared -- by October, experts believed up to 50 million computers were infected. That's pretty impressive when you consider that many viruses are incredibly simple.
­­When you listen to the news, you hear about many different forms of electronic infection. The most common are:

* Viruses - A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs) or wreak havoc.
* E-mail viruses - An e-mail virus travels as an attachment to e-mail messages, and usually replicates itself by automatically mailing itself to dozens of people in the victim's e-mail address book. Some e-mail viruses don't even require a double-click -- they launch when you view the infected message in the preview pane of your e-mail software [source: Johnson].
* Trojan horses - A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk). Trojan horses have no way to replicate automatically.
* Worms - A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.

­In this article, we will discuss viruses -- both "traditional" viruses and e-mail viruses -- so that you can learn how they work and understand how to protect yourself.

Thinking About Securing Your Home Computer

Before diving into the tasks you need to do to secure your home computer, let’s first think about the problem by relating it to something you already know how to do. In this way, you can apply your experience to this new area.

So, think of your computer as you would your house, your apartment, or your condo. What do you know about how that living space works, what do you routinely do to keep it secure, and what have you installed to improve its security? (We’ll use this “computer-is-like-a-house-and-the-things-in-it” analogy throughout, departing only a few times to make a point.)

For example, you know that if you have a loud conversation, folks outside your space can probably hear you. You also routinely lock the doors and close the windows when you leave, and you don’t give the keys to just anyone. Some of you may install a security system to complement your practices. All of these are part of living in your home.

Let’s now apply similar thinking to your home computer. Email, instant messaging, and most web traffic go across the Internet in the clear; that is, anyone who can capture that information can read it. These are things you ought to know. You should always select and use strong passwords and exercise due care when reading all email, especially the unsolicited variety. These are things you ought to do. Finally, you can add a firewall, an anti-virus program, patches, and file encryption to improve the level of security on your home computer, and we’ll call these things you ought to install.

The rest of this document describes the things you ought to know, do, and install to improve the security of your home computer.

Home Computer Security

What Should I Do To Secure My Home Computer?

Task 1 - Install and Use Anti-Virus Programs
Task 2 - Keep Your System Patched
Task 3 - Use Care When Reading Email with Attachments
Task 4 - Install and Use a Firewall Program
Task 5 - Make Backups of Important Files and Folders
Task 6 - Use Strong Passwords
Task 7 - Use Care When Downloading and Installing Programs
Task 8 - Install and Use a Hardware Firewall
Task 9 - Install and Use a File Encryption Program and Access Controls