Showing posts with label free ativirus. Show all posts
Showing posts with label free ativirus. Show all posts

Internet security

1. Use a firewall
We strongly recommend the use of some type of firewall product for Internet security, such as a network appliance or a personal firewall software package. Intruders are constantly scanning home user systems for known vulnerabilities. Network firewalls (whether software or hardware-based) can provide some degree of protection against these attacks.
2. Don't open unknown email attachments[ Internet security]
Before opening any email attachments, be sure you know the source of the attachment. It is not enough that the mail originated from an address you recognize. The Melissa virus spread precisely because it originated from a familiar address. Malicious code might be distributed in amusing or enticing programs. [ Internet security]
If you must open an attachment before you can verify the source, we suggest the following procedure:

a. save the file to your hard disk
b. scan the file using your antivirus software
c. open the file
For additional protection, you can disconnect or lock your computer's network connection before opening the file.
Following these steps will reduce, but not wholly eliminate, the chance that any malicious code contained in the attachment might spread from your computer to others.
3. Don't run programs of unknown origin
Never run a program unless you know it to be authored by a person or company that you trust. Also, don't send programs of unknown origin to your friends or coworkers simply because they are amusing -- they might contain a Trojan horse program. These programs seriously hurt Internet Security.

4. Disable hidden filename extensions
Windows operating systems contain an option to "Hide file extensions for known file types". The option is enabled by default, but you can disable this option in order to have file extensions displayed by Windows. After disabling this option, there are still some file extensions that, by default, will continue to remain hidden.
There is a registry value which, if set, will cause Windows to hide certain file extensions regardless of user configuration choices elsewhere in the operating system. The "NeverShowExt" registry value is used to hide the extensions for basic Windows file types. For example, the ".LNK" extension associated with Windows shortcuts remains hidden even after a user has turned off the option to hide extensions.[ Internet security]

5. Keep all applications, including your operating system, patched
Vendors will usually release patches for their software when a vulnerability has been discovered. Most product documentation offers a method to get updates and patches. You should be able to obtain updates from the vendor's web site. Read the manuals or browse the vendor's web site for more information.
Some applications will automatically check for available updates, and many vendors offer automatic notification of updates via a mailing list. Look on your vendor's web site for information about automatic notification. If no mailing list or other automated notification mechanism is offered you may need to check periodically for updates.[ Internet security]

6. Turn off your computer or disconnect from the network when not in use
Turn off your computer or disconnect its Ethernet interface when you are not using it. An intruder cannot attack your computer if it is powered off or otherwise completely disconnected from the network.[ Internet security]

7. Disable Java, JavaScript, and ActiveX if possible
Be aware of the risks involved in the use of "mobile code" such as ActiveX, Java, and JavaScript. A malicious web developer may attach a script to something sent to a web site, such as a URL, an element in a form, or a database inquiry. Later, when the web site responds to you, the malicious script is transferred to your browser.[ Internet security]
The most significant impact of this vulnerability can be avoided by disabling all scripting languages. Turning off these options will keep you from being vulnerable to malicious scripts. However, it will limit the interaction you can have with some web sites.
Many legitimate sites use scripts running within the browser to add useful features. Disabling scripting may degrade the functionality of these sites.[ Internet security]

8. Disable scripting features in email programs
Because many email programs use the same code as web browsers to display HTML, vulnerabilities that affect ActiveX, Java, and JavaScript are often applicable to email as well as web pages. Therefore, in addition to disabling scripting features in web browsers, we recommend that users also disable these features in their email programs. It is important to Internet security.[ Internet security]

9. Make regular backups of critical data
Keep a copy of important files on removable media such as ZIP disks or recordable CD-ROM disks (CD-R or CD-RW disks). Use software backup tools if available, and store the backup disks somewhere away from the computer.[ Internet security]

10. Make a boot disk in case your computer is damaged or compromised
To aid in recovering from a security breach or hard disk failure, create a boot disk on a floppy disk which will help when recovering a computer after such an event has occurred. Remember, however, you must create this disk before you have a security event.[ Internet security]

11. Consult your system support personnel if you work from home
If you use your broadband access to connect to your employer's network via a Virtual Private Network (VPN) or other means, your employer may have policies or procedures relating to the security of your home network. Be sure to consult with your employer's support personnel, as appropriate, before following any of the steps outlined in this document.[ Internet security]
Taken from armor2net.com

Cyber law or It act of India

Cyber laws are meant to set the definite pattern, some rules and guidelines that defined certain business activities going on through internet legal and certain illegal and hence punishable .Today sintuhack will explian some fact about cyber case (sintuhack). The IT Act 2000, the cyber law of India , gives the legal framework so that information is not denied legal effect, validity or enforceability, solely on the ground that it is in the form of electronic records.

One cannot regard government as complete failure in shielding numerous e-commerce activities on the firm basis of which this industry has got to its skies, but then the law cannot be regarded as free from ambiguities.(sintuhack)


The IT Act 2000 attempts to change outdated laws and provides ways to deal with cyber crimes. Let’s have an overview of the law where it takes a firm stand and has got successful in the reason for which it was framed.(sintuhack)

1. The E-commerce industry carries out its business via transactions and communications done through electronic records . It thus becomes essential that such transactions be made legal . Keeping this point in the consideration, the IT Act 2000 empowers the government departments to accept filing, creating and retention of official documents in the digital format. The Act also puts forward the proposal for setting up the legal framework essential for the authentication and origin of electronic records / communications through digital signature.(sintuhack)

2. The Act legalizes the e-mail and gives it the status of being valid form of carrying out communication in India . This implies that e-mails can be duly produced and approved in a court of law , thus can be a regarded as substantial document to carry out legal proceedings.(sintuhack)

3. The act also talks about digital signatures and digital records . These have been also awarded the status of being legal and valid means that can form strong basis for launching litigation in a court of law. It invites the corporate companies in the business of being Certifying Authorities for issuing secure Digital Signatures Certificates.

4. The Act now allows Government to issue notification on the web thus heralding e-governance.(sintuhack)

5. It eases the task of companies of the filing any form, application or document by laying down the guidelines to be submitted at any appropriate office, authority, body or agency owned or controlled by the government. This will help in saving costs, time and manpower for the corporates.(sintuhack)

6. The act also provides statutory remedy to the coporates in case the crime against the accused for breaking into their computer systems or network and damaging and copying the data is proven. The remedy provided by the Act is in the form of monetary damages, not exceeding Rs. 1 crore($200,000).(sintuhack)

7. Also the law sets up the Territorial Jurisdiction of the Adjudicating Officers for cyber crimes and the Cyber Regulations Appellate Tribunal.(sintuhack)

8. The law has also laid guidelines for providing Internet Services on a license on a non-exclusive basis.(sintuhack)

The IT Law 2000, though appears to be self sufficient, it takes mixed stand when it comes to many practical situations. It looses its certainty at many places like:(sintuhack)

1. The law misses out completely the issue of Intellectual Property Rights, and makes no provisions whatsoever for copyrighting, trade marking or patenting of electronic information and data. The law even doesn’t talk of the rights and liabilities of domain name holders , the first step of entering into the e-commerce.(sintuhack)
2. The law even stays silent over the regulation of electronic payments gateway and segregates the negotiable instruments from the applicability of the IT Act , which may have major effect on the growth of e-commerce in India . It leads to make the banking and financial sectors irresolute in their stands .(sintuhack)(sintuhack)
3. The act empowers the Deputy Superintendent of Police to look up into the investigations and filling of charge sheet when any case related to cyber law is called. This approach is likely to result in misuse in the context of Corporate India as companies have public offices which would come within the ambit of "public place" under the Act. As a result, companies will not be able to escape potential harassment at the hands of the DSP.(sintuhack)
4. Internet is a borderless medium ; it spreads to every corner of the world where life is possible and hence is the cyber criminal. Then how come is it possible to feel relaxed and secured once this law is enforced in the nation??(sintuhack)

The Act initially was supposed to apply to crimes committed all over the world, but nobody knows how can this be achieved in practice , how to enforce it all over the world at the same time???(sintuhack)

* The IT Act is silent on filming anyone’s personal actions in public and then distributing it electronically. It holds ISPs (Internet Service Providers) responsible for third party data and information, unless contravention is committed without their knowledge or unless the ISP has undertaken due diligence to prevent the contravention .(sintuhack)
* For example, many Delhi based newspapers advertise the massage parlors; and in few cases even show the ‘therapeutic masseurs’ hidden behind the mask, who actually are prostitutes. Delhi Police has been successful in busting out a few such rackets but then it is not sure of the action it can take…should it arrest the owners and editors of newspapers or wait for some new clauses in the Act to be added up?? Even the much hyped case of the arrest of Bajaj, the CEO of Bazee.com, was a consequence of this particular ambiguity of the law. One cannot expect an ISP to monitor what information their subscribers are sending out, all 24 hours a day.(sintuhack)

Cyber law is a generic term, which denotes all aspects, issues and the legal consequences on the Internet, the World Wide Web and cyber space. India is the 12th nation in the world that has cyber legislation apart from countries like the US, Singapore, France, Malaysia and Japan .(sintuhack)

But can the cyber laws of the country be regarded as sufficient and secure enough to provide a strong platform to the country’s e-commerce industry for which they were meant?? India has failed to keep in pace with the world in this respect, and the consequence is not far enough from our sight; most of the big customers of India ’s outsourcing company have started to re-think of carrying out their business in India .Bajaj’s case has given the strongest blow in this respect and have broken India ’s share in outsourcing market as a leader.(sintuhack)

If India doesn’t want to loose its position and wishes to stay as the world’s leader forever in outsourcing market, it needs to take fast but intelligent steps to cover the glaring loopholes of the Act, or else the day is not far when the scenario of India ruling the world’s outsourcing market will stay alive in the dreams only as it will be overtaken by its competitors.sintuhack,sintuhack,sintuhack,sintuhack,sintuhack,sintuhack,sintuhack,sintuhack

Online Survey Company Is Fraud Or Not-how to know

Today, when there is hot dispute is already going on between the star news and online paid survey company Speak Asia after publishing the negative news about Speak Asia and their business behavior. sintuhack strongly feel that sintuhack should post an article to help you find the possible online fraud survey companies which are asking for money any how.


1. Whois Lookup:
A/c to sintuhack try to who is look up for the domain of official website of paid survey company you can easily find the following details.sintuhack also suggest you to know
Who is the owner of website domain?
From since long the website is active, means since how long the company is in survey business?
What is the registered official address? Where the company office is actually located.
All these info helps a lot to decide weather the company you are researching about is just another online scam or not.


2. SEO Research:
Seo research on the paid survey website can easily tell you the fact about how the website is popular in the world. You can look for number of backlinks, Google page rank and alexa rank for this. From alexa traffic analysis you can also find the location of main traffic toward the website so you can know where the website is doing more business in the world.


3. Online Complains and Scam Discussion boards:
One thing more a/c to sintuhack use google to know page rank of that website.
If you search in Google with the words like complain, fraud, scam along with the company name, you can easily find the various blogs or websites where people might have discussed about their issues or complaints with the company. Although every good company will also have some issues with clients but too much of them can really alarm you about possible online scam.


4. Make money online blogs and forums.
Here sintuhack talking about the blogs and forums where people are generally from the similar niche and discuss about how to make money online. It would be great source to find the exact information about such paid scams. If you are new to online money making niche and much not aware of the scams you can also post comments (here also) and threads in forum in similar niche to get reviews of experts in the same niche.


5. Think smartly, wisely and independently.
And last sintuhack guide you to use internet smartly wisely and independently
Think smartly to detect online scams
Its my own experience that people always get trapped in scams because they are always in search of quick rich formula and hence they generally do not think for the most important questions. So think like you want to investigate about the company and not want to invest in it, this way you can find most answers easily.

Remove virus – Trojan Horse Sheur2

The Trojan Horse Sheur2 is a dangerous and harmful Trojan that infects Windows 98, Windows 95, Windows XP, Windows ME, Windows Vista, Windows 2000 computers. If your computer constantly raises speaker beep sounds, shows “Blue Screen” and reports that the error is produced by missing dll’s, registry keys, and Windows files, or your pop-up blocker is unable to block the pornographic and gambling related bulk popups then you are sure to have Trojan Horse Sheur2 on your computer.

The Trojan Horse Sheur2 is not just one computer infection. It comes in various forms and related infections. Some related infections are: SHeur2.hsf, SHeur2.FO, SHeur2, SHeur2.AS, SHeur2.MR, SHeur2.ISU, SHeur2.BBJ, sheur2.hsd, and SHeur2.CFT

SHeur enters your computer through backdoor without your knowledge. It usually gets into your computer due to browser security holes on your computer or if you visit questionable websites such as gambling, pornography, and hacking related websites.
Once installed on your computer, it hides itself on your computer as a legal software and the will start performing its various annoyances.

It drops malicious code to your local or network computer, disables the firewall and antivirus software configured on your computer, redirects your web browser to malicious websites, downloads malicious code, slowdowns the performance of your computer considerably, slowdowns Internet connection, and forwards passwords, login names and other confidential private information from your computer to remote computers.
How To Remove Trojan Horse Sheur2

You can remove SHeur2 Trojan using and automatic removal tool or manually. To remove it manually, you need to:

1.    Restart you computer Safe Mode.
2.    Open Internet Explorer and clean browser history and temporary internet files.
3.    Remove startup items.
4.    Remove Registry entries related to SHeur2
5.    Reboot your computer.


If the Trojan is still there you can try performing a System Restore to remove it. It is very difficult to remove SHeur2 manually because it re-installs itself if you have not completely removed its presence from your computer. Also it requires an expertise to handle system registry else you may end up in damaging your computer even more than it is damaged by this Trojan. It is therefore strongly recommended to use an automatic trojan Sheur removal tool to get rid of this virus from your computer

Computer Security Threats

We are living in a digital world, were computers are not just an ordinary thing anymore but a “necessity” to our everyday lives. Most of us only knew a little about computer security threats, the most common were “virus” and “worm”. But did you know that there are 34 different types of Computer Security Threats? A lot huh? You’ll know more about them below, so keep reading and i hope that you’ll be more cautious and knowledgeable in using your computer.

1. Adware

Adware is software that displays advertisements on your computer.
Adware, or advertising-supported software, displays advertising banners or pop-ups on
your computer when you use the application. This is not necessarily a bad thing. Such
advertising can fund the development of useful software, which is then distributed free
(for example, the Opera web browser).
However, adware becomes a problem if it:
  • installs itself on your computer without your consent
  • installs itself in applications other than the one it came with and displays advertising
    when you use those applications
  • hijacks your web browser in order to display more ads (see Browser hijackers)
  • gathers data on your web browsing without your consent and sends it to others via
    the internet (see Spyware)
  • is designed to be difficult to uninstall.
Adware can slow down your PC. It can also slow down your internet connection by
downloading advertisements. Sometimes programming flaws in the adware can make
your computer unstable.
Advertising pop-ups can also distract you and waste your time if they have to be closed
before you can continue using your PC.
Some anti-virus programs detect adware and report it as “potentially unwanted
applications”. You can then either authorize the adware program or remove it from the
computer. There are also dedicated programs for detecting adware.
THIS IS FIRST COMUTER SECURITY THREAT,I WILL POST ALL 34 COMUTER SECURITY THREAT ONE BY ONE,DUE TO CRISIS OF TIME I CANT POST ALL AT ONCE SO KEEP TOUCH WITH THIS BLOG,THIS IS MY PROMISE TO ALL OF YOU,I WILL COLLECT ALL RELEVANT INFORMATION ABOUT COMPUTER SECURITY THREAT FOR YOU.
UP COMING POST ON--- Backdoor Trojans.SECURITY THREAT.WITH BEST WAY TO SAVE YOUR COMPUTER

Internet Security

                        Tips for browsing internet safely
The concern for internet safety is a global phenomenon, mostly for those who are new-fangled to internet. While the prevalence of social networking websites, online communities and internet-enabled processes should be great news for individual, corporate and government users, the concern for safety remains a major source of concern. The 21st century is the age of computers and World Wide Web. Everyone starting from child to old is accustomed with web browsing. But the question arises how much we are safe on the internet? Hackers and malicious software is a great threat to our individual online privacy. So we need to protect our self from these dangerous aspects of internet. Following are some steps that can ensure a safe browsing practice. 
 1–Use Common Sense 
 To browse the internet safely, it’s best if you do so by using common sense. Do not click on advertisements that may harm your computer, and stay away from sites that promise “free” items, cash or other services simply by entering your personal information. Just because a website looks official, this does not mean that it can’t harm your computer.
2 – Use a Firewall 

 To improve the safety of your internet browsing, it’s highly recommended that you install some high-quality firewall software. Having a firewall can help prevent programs from infiltrating your computer, and may also protect against some hackers or internet criminals.
3- Use Strong Passwords

 Ensure data security by using strong passwords for your online accounts and your system files. Do not use your name or birth date as a password since they are easy to crack. Instead, use a password that contains alphanumeric characters and is at least eight characters long. Also, do not store passwords on your system. If remembering all your passwords is difficult, use a password manager program to organize and manage your passwords.
 4- Install Antivirus and Antispyware Tools 

 Use an antivirus and an antispyware tool to keep your system protected from malicious programs, such as viruses, worms, adware, and spyware. Configure these tools to perform regular full system scans on your computer.
5 – Be Aware 

When other people are using your computer, it’s best if you supervise their activities. Even if a friend asks to check their email, its best if you have them login under a other account that you have created for others to use. Having a Guest account on your computer enables you to allow others to use your computer without having to worry about them installing potentially malicious software. When creating a Guest account, disable sharing of important files on your computer. In addition to this, you should always make sure that any sensitive files are password-protected. Don’t load non-essential programs off the Internet, especially things like toolbars, screensavers, or video programs. These programs normally install extra, malicious software that causes problems and often requires a repair to remove effectively. Don’t click on anything in a pop-up and unsolicited links received in email, instant messages, or chat rooms, as it might install malware.
6- Do Not Open Attachments from Unsolicited Emails
Attachments that come with unwanted emails can contain malicious programs, such as viruses and worms. These malicious programs often cause severe damage to your system. Therefore, it is best that you straight away delete any unwanted emails you receive. You must also scan the attachments that you obtain from known sources before opening them.
7- Lock icon in the browser doesn’t means it’s secure

When the lock icon appears in the browser, many of us believe we are opening a secure site. This is because the lock icon indicates there is an SSL encrypted connection between the browser and the server to protect the personal sensitive information. However, it does not present any security from malware. In fact, it’s the reverse because most Web security products are totally blind to encrypted connections: it’s the perfect vehicle for malware to penetrate a machine. There have been many cases where hackers emulate bank, credit card sites complete with spoofed SSL certificates that are difficult for a user to identify as deceptive. So keep away from the unknown site which shows lock icon.
8- Keep your Operating System, Software, and Drivers Up-To-Date
     

LATEST VIRUS NAME..

    1.     Virus Name:     Virus:W32/Sality
   A malicious program that secretly integrates itself into program or datafiles.It spreads by integrating itself into more files each time the host program is run.
              
    2.     Virus Name:           Trojan-Downloader:W32/Hiloti
                   This type of trojan secretly downloads malicious files from a remote server, then installs and executes the files.
              
    3.     Virus Name:  Trojan-Downloader:W32/Fakerean.gen!A
This type of trojan secretly downloads malicious files from a remote server, then installs and executes the files.
              
    4.     Virus Name:  Trojan-Downloader:W32/Wimad.gen!A
     A trojan that secretly downloads malicious files from a remote server, then installs and executes the files.
              
    5.     Virus Name:           Trojan-Downloader:W32/Oficla
This type of trojan secretly downloads malicious files from a remote server, then installs and executes the files.
              
    6.     Virus Name:           Trojan:AndroidOS/Tapsnake
 Also known as a trojan horse program, this is a deceptive program that performs additional actions without the user's knowledge or permission. It does not replicate.
              
    7.     Virus Name:           Email-Worm:W32/Bagle.GE
  This type of worm is embedded in an e-mail attachment, and spreads using the infected computer's e-mailing networks.
              
    8.     Virus Name:           Virus:W32/Bursted
A malicious program that secretly integrates itself into program or data files. It spreads by integrating itself into  more files each time the host program is run.
              
    9.     Virus Name:           Trojan:W32/Qhost
Also known as a trojan horse program, this is a deceptive program that performs additional actions without the user's knowledge or permission. It does not replicate.
              
    10.     Virus Name:           Trojan:W32/Agent.DKJC
Also known as a trojan horse program, this is a deceptive program that performs additional actions without the user's knowledge or permission. It does not replicate.  

5 Free Antivirus – Download Free Antivirus and Save your computer from Virus Attack!

Today I switched my computer ON just like any other day and the hell broke lose. Computer was running slow, high-speed internet was acting choked and I almost thought my monitor belongs to a 16 year old sexually charged with adult pop-ups all over the screen.
By the time I could figure out what went wrong (virus attack), I had already lost some data on my hard drive and my Operating System was acting weird.
A computer that is inadequately protected is vulnerable to all sorts of viruses, spyware or malicious codes which could attack your data or even your operating system.
Some malware are programmed to damage the computer by damaging programs, deleting files, or reformatting the hard disk. Other malware programs are not designed to do any damage, but simply replicate themselves and perhaps make their presence known by presenting text, video, or audio messages. (Wikipedia)
I gathered information on about 5 most popular free Antivirus softwares which do a good job of protecting your computer and keep your data safe from such attacks.
Why pay for Antivirus softwares when free ones are equally good? Following is the list of top 5 free antivirus softwares.
Avast.com – avast! is a fully featured free antivirus designed specifically for home users or for non-commercial use, however, it requires you to register your free version with Avast within 60 days of installation. It is compatible with Windows Vista/XP/2000/NT/ME/98. The latest version of Avast 4.8 comes with 39 downloadable skins to personalize your free copy of antiviurs software.
Some of the features of avast! Free Antivirus for Home Edition are listed below.
•    Anti-spyware built-in
•    Web Shield
•    Anti-rootkit built-in
•    Automatic updates
•    Strong self-protection
•    Virus Chest
•    Antivirus kernel
•    System integration
•    Simple User Interface
•    Integrated Virus Cleaner
•    Resident protection
•    Support for 64-bit Windows
•    P2P and IM Shields
•    Internationalization
•    Network Shield

AVG’s is one of the most popular free Antivirus softwares available online. AVG has a strong userbase of 70 million users and the number just keeps going up! AVG is easy to download, install and use. It is compatible with Windows Vista & Windows XP and freely available for home and non-Commercial use.
AVG keeps it virus database udpated with the latest virus definitions, this helps its users detect the latest virus threats as soon as it hits internet.
Her are some of the key feature of AVG FREE Edition
•    Automatic update functionality
•    The AVG Resident Shield, which provides real-time protection as files are opened and programs are run
•    The AVG E-mail Scanner, which protects your e-mail
•    The AVG On-Demand Scanner, which allows the user to perform scheduled and manual tests
•    Free Virus Database Updates
•    AVG Virus Vault for safe handling of infected files

Avira AntiVir Personal – FREE Antivirus is a another reliable free antivirus solution, that constantly and rapidly scans your computer for malicious programs such as viruses, Trojans, hoaxes, worms, dialers etc. It also monitors every action executed by the user or the operating system and reacts promptly when a malicious program is detected.
“AntiVir is also low-profile. By that I mean it spawns only two background services and if there weren’t a system tray applet to access the program, you probably wouldn’t even know it was running.” – (pcworld.com)
Avira is a Free Antivirus protection for Windows Vista/XP/2000 and also for Linux users. It has over 30 million users worldwide.
Some of the features that Avira AntiVir Personal has are following.
•    Protection from viruses, worms and Trojans
•    Protection against expensive dialers
•    Protection from hidden rootkits
•    Faster Scanning up to 20% faster
•    Protection from phishing

Bitdefender offers its version of free antivirus and it also publicizes that it is “one of the world’s most effective antivirus engines for free!”
Bitdefender’s Free Edition is an on-demand virus scanner, which is best used in a system recovery and is ideal for users who connect to the internet on a regular basis; however it’s not for users who are “always-on” the internet. For these types of users Bitdefender recommends them to upgrade to a more powerful version of their software which is the paid version.
Few features offered by BitDefender are listed below
•    Antivirus
•    IMPROVED Proactive detection
•    Spyware scanning and cleaning
•    IMPROVED Deployment and use
•    IMPROVED User Experience
•    Hourly Updates
•    NEW Rootkit Detection and Removal
Bitdefender also comes with other features such as Skinable Interface, where you can customize the looks of the scanner.
Also included in this version is the “Quarantine” and “Report” feature. In Quarantine you can isolate the infected file to reduce the risk of your other files and OS getting infected any further. In the Reporting feature you can check the statistics of your last scan.