BHASKAR.com has been hacked by pakistani hacker


pakistani hacker group d3-st4lli0n & [A] has hacked one of the most famous news portalsite of india owned by bhaskar group bhaskar.com. around 11 pm it has been announced proudly by some pakistani group of hacker. it is one of the example of webjacking.there were same accident happened with unicef and also done by some of the pakistani hacker group.

TIPS TO SAVE OWN MAIL

Antivirus software is simply not enough. An email worm can spread worldwide in just minutes, but it takes hours for antivirus vendors to analyze, create, and deploy signature updates. Fortunately, there are five easy steps you can take to help close that window of vulnerability and help keep email worms off your system.

Rule 1: Identification - Understanding the nature of the attachment is the first step towards email safety. Any executable type attachment has the potential to be infected. This covers a wide range of extensions. Complicating matters is that, by default, Windows suppresses file extensions. Make sure you have file extension viewing enabled. {i]Hint: If you aren't sure what file extensions are, sign up for the free Windows Basics online course.

Rule 2: Intent - An executable type attachment should not be opened unless it was specifically requested or expected. Since email worms are sent to addresses found on infected users' machines, just knowing the sender is no proof of intent - they may well be infected. In fact, odds are an email worm will arrive from someone you know and the sender is oblivious to the viral email being sent from their machine. Worse, today's worms spoof the From address, so it may well be that it's not even from the person you think it is. If there's any question as to the intent, see Rule 3 below.

Rule 3: Necessity - This is the simplest rule to follow, but one that many people ignore. If you do not need the attachment, don't open it. Delete the email instead.

Rule 4: Secure your client - To date, many email worms and viruses have taken advantage of security vulnerabilities found in Microsoft Outlook and Outlook Express. However, any mail client that supports HTML and scripting should be considered at risk. For instructions on securing your particular mail client, choose from the list below:

The 5 Most Common Mistakes in Email Security

Properly managing your email accounts
1. Using just one email account.

Individuals new to email often think about their email account like they do their home address, you only have one home address, so you should only have one email. Instead, you should think about your email address like you do your keys; while it may be OK to use the same key for your front and your back door, having a single key open everything is both impractical and unsafe.

A good rule of thumb for the average email user is to keep a minimum of three email accounts.

2. Holding onto spammed-out accounts too long.

It is simply a fact of life that email accounts will accumulate spam over time. This is especially true of the account you use to sign up for newsletters and that you post online (which as stated above should not be your main email account). When this happens, it is best to simply dump the email account and start afresh.

3. Not closing the browser after logging out.

When you are checking your email at a library or cybercafé you not only need to log out of your email when you are done, but you also need to make sure to close the browser window completely. Some email services display your username (but not your password) even after you have logged out. While the service does this for your convenience, it compromises your email security.

4. Forgetting to delete browser cache, history and passwords.

After using a public terminal, it is important that you remember to delete the browser cache, history, and passwords. Most browsers automatically keep track of all the web pages that you have visited, and some keep track of any passwords and personal information that you enter in order to help you fill out similar forms in the future.

5. Forgetting the telephone option

One of the most important lessons about email security is that no matter how many steps you take to secure your email, it will never be foolproof. This is never truer than when using a public computer. So unless you need a written record of something or are communicating across the globe, consider whether a simple phone call rather than an email is a better option. While a phone conversation may require a few extra minutes, when compared with accessing email through a public computer, a phone call is a far more secure option and it does not leave a paper trail.

How to Save Your Email Address

Instructions


Step 1

Do not post your email anywhere on the web.
Make sure you protect your email. Do not live it live out there on the World Wide Web. Do not post it on your websites contact page, or with your blog comments or anything like that. If you feel is necessary to do so, create a new email address just for this purpose. You can forward email from multiple addresses to the one that you like, and if you change your mind, you can un-forward it because you are in control!

Step 2

Click on the "un-subscribe" link.
Everybody is doing email marketing these days. Some people like to get discounts this way, but if you don't here is what you have to do: find the un-subscribe link and follow the simple steps to get your self unsubscribe. This is the only guaranteed way to farce them to do so, by law. If you mark them as junk, your email system is going to place that sender in the appropriate "spot" but it does not send a request back to the sender to unsubscribe, therefore your email address is still on their list. Depending on the privacy policy you agreed to, without really reading it, they might be selling the list with your address in if for so many times; this is how you get to receive more and more of this unwanted emails.

Step 3

Use the your email system's tools.
Learn how you can utilize the tools available to you. If you use Outlook, check out the help for this specific topic and you'll get some great step by step how to instructions.

Windows Explorer.exe Does Not Load\Run

This type of problem occurs when your computer get infected from the virus or spyware which has corrupted some registry keys which are related to explorer load.



Follow the procedure below FOR SOLVE THIS PROBLEM----

1. Press Ctrl+Shift+Esc to launch task manager

2. Click File | New Task

3. Now type regedit and click Ok

4. Browse the following registry path

HKEY_LOCAL_MACHINESOFTWAREMicrosoft
Windows NTCurrentVersionImage File Execution.options

5. Under this registry path, you will see subkeys named explorer.exe and iexplorer.exe.
These keys must be pointing to files created by the virus that have been removed (virus/spyware); explorer32dbg.exe and iexplore_dbg.exe.

6. Delete the explorer and iexplorer keys entirely.

7. Close Registry and restart your computer

I hope this procedure given above will help you fix the problem, if it does not let us know through comments.

How to Detect Missing DLL File Errors?

When a DLL file is corrupt or missing you may receive an error message similar to the one given below when you run a program that needs to use this DLL file:

Cannot find the file Program_Name.exe.

In the error message Program_Name represents the name of the program or name of one of its components in which the error occurred.

This error message is usually followed by an error message similar to the one given below:

Error starting program. A required .DLL file DLL_Name.DLL was not found.

Here, DLL_Name is the name of the DLL file that is causing the error.

What Causes Missing DLL File Errors?

There can be many causes of missing DLL errors. Some of the most common causes are:

* An essential system file required by the program you are using has been deleted. This may happen when a program is uninstalled/installed or you have tried to clean up space on the hard disk.
* A virus infection has infected the required DLL file.
* DLL entries in the Windows registry are corrupt

How to Fix Missing DLL File Errors

The following are some of the methods that you can use to resolve issues related to missing DLL files.

Method 1: Reinstall the program that is generating the error message.

Reinstalling the program replaces any missing or damaged program files with their original version. This step also helps in rectifying problems in the Windows registry related to this program.

Method 2: Reinstall the recently installed program.

Sometimes, when you uninstall a program, some of the shared DLL files required by other programs on your computer may also get removed. This may lead to missing DLL file errors when you try to use programs that require the removed DLL files.

In this case, the best way to resolve the problem is to reinstall the program you removed. Doing this will copy and register the required files on the system again.

Method 3: Update the program or device driver that you may have installed recently

If you have recently installed a new program or device driver, it is quite likely that some of the existing DLL files are overwritten by their older versions. In this case, to resolve the error, try to search for any updates for this new program. If you find an update, download and install it to try and resolve the error. You may also try to download the newer version of the DLL file from the Internet or another computer with a similar configuration as yours and copy it your computer.

If nothing works, you may need to use the System Restore to revert your system to the time when no error occurred on the PC.

Method 4: Repair your Windows registry

In order to work, all DLL files need to be registered in the Windows registry. If the registry entries related to one or more DLL files are corrupt, missing DLL errors may be generated. To prevent this problem, you must perform registry scan and repair and maintain an error-free registry. To easily perform this task on a regular basis, you may use a reliable registry tool, such as RegGenie.

Method 5: Scan and remove virus infections

Malicious virus infections may cause damage to existing DLL files and generate errors. To resolve this issue, you must use an efficient antivirus tool, such as AntiVirus Plus to perform a full system scan of your computer and remove all malware data from it. An antivirus tool helps in repairing infected files and restoring your computer back to it’s normal working state. Before performing the scan, you must update your antivirus tool. Additionally, it is recommended that you perform the scan in Safe Mode to make it more effective.

How To Remove Newfolder dot exe Virus?

What is Newfolder dot exe?

The real name of this virus is Iddono. This threat copies its file(s) to your hard disk. Its typical file name is Iddono. Then it creates new startup key with name Iddono and value newfolder dot exe. You can also find it in your processes list with name newfolder dot exe or Iddono.This virus is very difficult to eliminate manually, but you can find solution for removal below.

Manual Solution:
Step1:
1. Search for autorun.inf file. It is a read only file so you will have to change it to normal by right clicking the file , selecting the properties and un-check the read only option
2. Open the file in notepad and delete everything and save the file.
3. Now change the file status back to read only mode so that the virus could not get access again.
4. Autorun
5. Click start->run and type msconfig and click ok
6. Go to startup tab look for regsvr and uncheck the option click OK.
7. Click on Exit without Restart, cause there are still few things we need to do before we can restart the PC.
8. Now go to control panel -> scheduled tasks, and delete the At1 task listed there.

Step2:
1. Click on start -> run and type gpedit.msc and click Ok.
2.
3. If you are Windows XP Home Edition user you might not have gpedit.msc in that case download and install it from Windows XP Home Edition: gpedit.msc and then follow these steps.
4. Go to users configuration->Administrative templates->system
5. Find “prevent access to registry editing tools” and change the option to disable.
6. Opening the gate of castle: Group Edit Policies
7. Once you do this you have registry access back.

Step3:
1. Click on start->run and type regedit and click ok
2. Go to edit->find and start the search for regsvr dot exe,
3. Launch the attack in the heart of castle: registry search
4. Delete all the occurrence of regsvr dot exe; remember to take a backup before deleting. KEEP IN MIND regsvr32 dot exe is not to be deleted. Delete regsvr dot exe occurrences only.

1. Click on start->search->for files and folders.
2. Their click all files and folders
3. Type “* dot exe” as filename to search for
4. Click on ‘when was it modified ‘ option and select the specify date option
5. Type from date as 1/31/2008 and also type To date as 1/31/2008
6. Seek and destory enemy soldiers: the search option
7. Now hit search and wait for all the exe’s to show up.
8. Once search is over select all the exe files and shift+delete the files, caution must be taken so that you don’t delete the legitimate exe file that you have installed on 31st January.
9. Also selecting lot of files together might make your computer unresponsive so delete them in small bunches.
10. Also find and delete regsvr dot exe, svchost dot exe( notice an extra space between the svchost and dot exe)

What To Do If Your PC Is Taking Much Time To Shutdown?

Does your system take a lot of time to shutdown? If yes, follow the tips listed below to speed up system shutdowns.

Close All Running Programs

When you give the command to shutdown Windows, the shutdown process first closes down all applications and processes running on it and then shuts down itself. Therefore, if your system is slow in shutting down, it is recommended that you first close all programs running on the computer and displayed in the system tray and then give the shutdown command.

Resolve Problems Related to Buggy and Outdated Drivers

Buggy and outdated device drivers may also cause problems during system shutdown. To see if there are problems with device drivers on your computer, do the following:

1. Open the Start menu, select Control Panel, and then select System.
2. On the Hardware tab, click Device Manager.
3. In the Device Manager window, look for the following items:
* Items that are marked with red exclamation marks: This implies that the device is not working.
* Items that are marked with yellow question marks: This indicates that Windows is using a generic driver for the device instead of the device-specific driver.

HOW ANTIVIRUS WORK TO STOP SPREADING OF VIRUS

Virus definition files tell the anti virus software what code characteristics to look for while monitoring your computer. When a certain file type or activity occurs that matches a characteristic, the anti virus software blocks the execution of code and alerts you that a virus has been found. The virus is then isolated and destroyed.
A actually antivirus sees only two thing which is content is "Specific" and "Generic"

They provide identifiable characteristics, or finger prints, for malicious code. This is what is meant by "Specific" scanning—your anti virus program takes all these updates and stores them in an internal database. The anti-virus then matches them against any new files being introduced to your system via email or file download for known threats.
.

Using virus definitions is great for known viruses, but new viruses are growing exponentially every year and it is possible to not have a definition in time to properly diagnose a dangerous line of code. Heuristic and sandboxing are "Generic" scanning methods. They are not perfected yet and can bring up some strange issues including system slowdown and incorrect diagnoses. Generic scanning is really in its infant stage and is used more in larger networks where a server can do all the scanning (not individual PCs). Antivirus companies use Generic scanning to construct new virus signatures and I feel that these methods will be more widely used by single users in the future.

Heuristic is a type of generic scanning that looks through the lines of code, not for exact matches to virus definitions, but for suspicious code. The anti-virus makes intelligent assumptions based on the scrutinized code. Basically this means that the anti-virus can try to determine whether or not a file has a virus in it by looking at how the file or program is constructed and acts. This isn't a perfect system, however, and can bring up some strange results. This is why some programs tell you to turn off your anti-virus before installing. This type of scanning isn't a perfected science, but on the bright side it is better to be safe then sorry.

Sandboxing is where an antivirus program will take suspicious code and run it in a Virtual Machine (secure from the rest of the system) in order to see exactly how the code works and what its purpose is.

Well that's a quick overview of how anti-virus works to protect our systems form infection. Hopefully, with the introduction of new technologies and methods, the threat of infection will be a remote and it might just discourage the writers of these malicious codes. As usual, I emphasize that anyone who has a PC should have anti-virus software installed to keep their system virus free.

Stay safe out there,

TOP TEN ANTIVIRUS OF 2009

This review picks the best antivirus software based on ease to use, effectiveness, updates, feature list, ease of installation, Help/Support.

1. BitDefender Antivirus
2. Kaspersky Anti-Virus
3. Webroot Antivirus
4. G DATA AntiVirus
5. AntiVirus ESET Nod32
6. ParetoLogic Anti-Virus PLUS
7. AVG Anti-Virus
8. Vipre Antivirus + Antispyware
9. F-Secure Anti-Virus
10. Trend Micro

Top ten Viruses of 2009 : Based on Ranking

Here is a listing of Top 10 Threats by Bright Hub web site , In the article "Top 10 Computer Viruses of 2009" by KBSMP GROUP, there is the complete list about the worst viruses in this year.

Top Viruses of 2009 : Based on Ranking

* Rank 1: Win32/Conficker
* Rank 2: INF/Autorun
* Rank 3: Win32/PSW.OnLineGames
* Rank 4: Wind32/Agent
* Rank 5: Win32/FlyStudio
* Rank 6: INF/Conficker
* Rank 7: Win32/Pacex.Gen
* Rank 8: WMA/TrojanDownloader.GetCodec
* Rank 9: Win32/Qhost
* Rank 10: Win32/Autorun