Remove virus – Trojan Horse Sheur2

The Trojan Horse Sheur2 is a dangerous and harmful Trojan that infects Windows 98, Windows 95, Windows XP, Windows ME, Windows Vista, Windows 2000 computers. If your computer constantly raises speaker beep sounds, shows “Blue Screen” and reports that the error is produced by missing dll’s, registry keys, and Windows files, or your pop-up blocker is unable to block the pornographic and gambling related bulk popups then you are sure to have Trojan...

Document Viruses

Document or “macro” viruses take advantage of macros – commands that are embedded in fi les and run automatically.Many applications, such as word processing and spreadsheet programs, use macros. A macro virus is a macro program that can copy itself and spread from one file to another. If you open a file that contains a macro virus, the virus copies itself into the application’s startup files. The computer is now...

Denial of Service attack (DoS)

A denial-of-service (DoS) attack prevents users from accessing a computer or website.In a DoS attack, a hacker attempts to overload or shut down a computer, so that legitimate users can no longer access it. Typical DoS attacks target web servers and aim to make websites unavailable. No data is stolen or compromised, but the interruption to the service can be costly for a company.The most common type of DoS attack...

Browser Hijackers

Browser hijackers change the default home and search pages in yourinternet browser. Some websites run a script that changes the settings in your browser without your permission. This hijacker can add shortcuts to your “Favorites” folder or, more seriously, can change the page that is first displayed when you open the browser. You may find that you cannot change your browser’s start page back to your chosen site. Some hijackers edit the Windows...

Bluesnarfing---security threat

 Bluesnarfing[sintuhack] Bluesnarfing is the theft of data from a Bluetooth phone.Like Bluejacking, Bluesnarfing depends on the ability of Bluetooth-enabled devices to detect and contact others nearby.[sintuhack].In theory, a Bluetooth user running the right software on their laptop can discover a nearby phone, connect to it without your confirmation, and download your phonebook,[sintuhack], pictures of contacts and calendar.Your mobile phone’s serial number can also be downloaded and used to clone the phone.[sintuhack],A great euphonious...

HOW to Track and Recover Your Lost/Stolen iPhone

iPhone is the world’s best smart phone available today without any doubt. People carry their phones everywhere they go, and hence there is always a chance of them forgetting their iPhone somewhere or the iPhone getting stolen. Learn how to track, message, erase and recover your lost or stolen iPhone. 1. Track your iPhone via MobileMeApple has announced a new service called Find My iPhone that will allow iPhone owners to remotely locate their lost...