Remove virus – Trojan Horse Sheur2

The Trojan Horse Sheur2 is a dangerous and harmful Trojan that infects Windows 98, Windows 95, Windows XP, Windows ME, Windows Vista, Windows 2000 computers. If your computer constantly raises speaker beep sounds, shows “Blue Screen” and reports that the error is produced by missing dll’s, registry keys, and Windows files, or your pop-up blocker is unable to block the pornographic and gambling related bulk popups then you are sure to have Trojan Horse Sheur2 on your computer.

The Trojan Horse Sheur2 is not just one computer infection. It comes in various forms and related infections. Some related infections are: SHeur2.hsf, SHeur2.FO, SHeur2, SHeur2.AS, SHeur2.MR, SHeur2.ISU, SHeur2.BBJ, sheur2.hsd, and SHeur2.CFT

SHeur enters your computer through backdoor without your knowledge. It usually gets into your computer due to browser security holes on your computer or if you visit questionable websites such as gambling, pornography, and hacking related websites.
Once installed on your computer, it hides itself on your computer as a legal software and the will start performing its various annoyances.

It drops malicious code to your local or network computer, disables the firewall and antivirus software configured on your computer, redirects your web browser to malicious websites, downloads malicious code, slowdowns the performance of your computer considerably, slowdowns Internet connection, and forwards passwords, login names and other confidential private information from your computer to remote computers.
How To Remove Trojan Horse Sheur2

You can remove SHeur2 Trojan using and automatic removal tool or manually. To remove it manually, you need to:

1.    Restart you computer Safe Mode.
2.    Open Internet Explorer and clean browser history and temporary internet files.
3.    Remove startup items.
4.    Remove Registry entries related to SHeur2
5.    Reboot your computer.


If the Trojan is still there you can try performing a System Restore to remove it. It is very difficult to remove SHeur2 manually because it re-installs itself if you have not completely removed its presence from your computer. Also it requires an expertise to handle system registry else you may end up in damaging your computer even more than it is damaged by this Trojan. It is therefore strongly recommended to use an automatic trojan Sheur removal tool to get rid of this virus from your computer

Document Viruses


Document or “macro” viruses take advantage of macros – commands that are embedded in fi les and run automatically.
Many applications, such as word processing and spreadsheet programs, use macros.
A macro virus is a macro program that can copy itself and spread from one file to
another. If you open a file that contains a macro virus, the virus copies itself into the
application’s startup files. The computer is now infected.
When you next open a file using the same application, the virus infects that file. If your
computer is on a network, the infection can spread rapidly: when you send an infected
file to someone else, they can become infected too. A malicious macro can also make
changes to your documents or settings.
Macro viruses infect files used in most offices and some can infect several file types,
such as Word and Excel files. They can also spread to any platform on which their host
application runs.
Macro viruses first appeared in the mid-1990s and rapidly became the most serious
virus threat of that time. Few viruses of this type are seen now

Denial of Service attack (DoS)


A denial-of-service (DoS) attack prevents users from accessing a computer or website.
In a DoS attack, a hacker attempts to overload or shut down a computer, so that
legitimate users can no longer access it. Typical DoS attacks target web servers
and aim to make websites unavailable. No data is stolen or compromised, but the
interruption to the service can be costly for a company.
The most common type of DoS attack involves sending more traffic to a computer than
it can handle. Rudimentary methods include sending outsized data packets or sending
email attachments with names that are longer than permitted by the mail programs.
[sintuhack]
An attack can also exploit the way that a “session” of communications is established
when a user first contacts the computer. If the hacker sends many requests for a
connection rapidly and then fails to respond to the reply, the bogus requests are left in
a buffer for a while. Genuine users’ requests cannot be processed, so that they can’t
contact the computer.
[sintuhack]
Another method is to send an “IP ping” message (message requiring a response from
other computers) that appears to come from the victim’s computer. The message goes
out to a large number of computers, which all try to respond. The victim is flooded with
replies and the computer can no longer handle genuine traffic.
[sintuhack]
A distributed denial-of-service (DDoS) attack uses numerous computers to launch the attack. Typically, hackers use a virus or Trojan to open a “back door” on other people’s
computers and take control of them. These “zombie” computers can be used to launch
a coordinated denial-of-service attack.
[sintuhack]

Browser Hijackers

Browser hijackers change the default home and search pages in your
internet browser.

Some websites run a script that changes the settings in your browser without your
permission. This hijacker can add shortcuts to your “Favorites” folder or, more seriously,
can change the page that is first displayed when you open the browser.

You may find that you cannot change your browser’s start page back to your chosen
site. Some hijackers edit the Windows registry so that the hijacked settings are restored
every time you restart your computer. Others remove options from the browser’s tools
menu, so that you can’t reset the start page.

In every case, the intention is the same: to force you to visit a website. This inflates
the number of “hits” and the site’s ranking with search engines, which boosts the
advertising revenue that the site can earn.

Browser hijackers can be very tenacious. Some can be removed automatically by
security software. Others may need to be removed manually. In some cases, it is easier
to restore the computer to an earlier state or reinstall the operating system.Browser hijackers change the default home and search pages in your
internet browser.

Some websites run a script that changes the settings in your browser without your
permission. This hijacker can add shortcuts to your “Favorites” folder or, more seriously,
can change the page that is first displayed when you open the browser.

You may find that you cannot change your browser’s start page back to your chosen
site. Some hijackers edit the Windows registry so that the hijacked settings are restored
every time you restart your computer. Others remove options from the browser’s tools
menu, so that you can’t reset the start page.

In every case, the intention is the same: to force you to visit a website. This inflates
the number of “hits” and the site’s ranking with search engines, which boosts the
advertising revenue that the site can earn.

Browser hijackers can be very tenacious. Some can be removed automatically by
security software. Others may need to be removed manually. In some cases, it is easier
to restore the computer to an earlier state or reinstall the operating system.Browser hijackers change the default home and search pages in your
internet browser.

Some websites run a script that changes the settings in your browser without your
permission. This hijacker can add shortcuts to your “Favorites” folder or, more seriously,
can change the page that is first displayed when you open the browser.

You may find that you cannot change your browser’s start page back to your chosen
site. Some hijackers edit the Windows registry so that the hijacked settings are restored
every time you restart your computer. Others remove options from the browser’s tools
menu, so that you can’t reset the start page.

In every case, the intention is the same: to force you to visit a website. This inflates
the number of “hits” and the site’s ranking with search engines, which boosts the
advertising revenue that the site can earn.

Browser hijackers can be very tenacious. Some can be removed automatically by
security software. Others may need to be removed manually. In some cases, it is easier
to restore the computer to an earlier state or reinstall the operating system.

Bluesnarfing---security threat

 Bluesnarfing[sintuhack]
Bluesnarfing is the theft of data from a Bluetooth phone.Like Bluejacking, Bluesnarfing depends on the ability of Bluetooth-enabled devices to detect and contact others nearby.[sintuhack].In theory, a Bluetooth user running the right software on their laptop can discover a
nearby phone, connect to it without your confirmation, and download your phonebook,[sintuhack],
pictures of contacts and calendar.Your mobile phone’s serial number can also be downloaded and used to clone the phone.
[sintuhack],A great euphonious in every box
You should turn off Bluetooth or set it to “undiscoverable”.[sintuhack] The undiscoverable setting
allows you to continue using Bluetooth products like headsets, but means that your
phone is not visible to others.
[sintuhack]

HOW to Track and Recover Your Lost/Stolen iPhone

iPhone is the world’s best smart phone available today without any doubt. People carry their phones everywhere they go, and hence there is always a chance of them forgetting their iPhone somewhere or the iPhone getting stolen. Learn how to track, message, erase and recover your lost or stolen iPhone.

1. Track your iPhone via MobileMe
Apple has announced a new service called Find My iPhone that will allow iPhone owners to remotely locate their lost or stolen iPhones using the iPhone’s GPS. The service will be available as part of Apple’s MobileMe online subscription service.

Find My iPhone will pinpoint the iPhone’s current location using Google Maps and let owners send and display a message on the iPhone even if it’s locked, presumably to provide information on how to return the phone to the finder of the phone.
2. iPhone anti-theft solution – iLocalis
iLocalis has the following uses-

    * Never lose you iPhone: If it is missing just log onto the iLocalis site and you’ll know where it was located last.
    * Retrieve a stolen iPhone: If your iPhone is stolen you can log into the site and check out where it’s at. Extra features built into iLocalis allow you to send text messages or make calls on your iPhone when you don’t even have it with you. If you iPhone is stolen log in and send yourself a text message. If the thief changed the sim card you’ll have their phone number!
    * Allow your family and friends to know where you are: iLocalis will send a message to your friends when you are near by. You can also set it up to allow your friends to locate you. If your friend also has iLocalis you can send messages to each other for free. No txt messaging charges.
    * iLocalis can also be used for a business that needs location services for their employees. Employees carrying iPhones with iLocalis can be tracked via the web site easily.