Monday, August 3, 2009

Windows 7 supported anti-virus software

New Kaspersky offers Windows 7 support

Kaspersky Lab has announced the Release Candidate for Kaspersky Anti-Virus 6.0 for Windows Workstations Maintenance Pack 4 with Windows 7 support.

The company says it is the next step in supporting the new desktop operating system from Microsoft. Kaspersky Lab was among the first antivirus companies to support Windows 7 in January 2009 with the release of Kaspersky Anti-Virus Technology Preview for Windows 7.

Kaspersky Anti-Virus for Windows Workstations provides centralised protection of all workstations on a corporate network and protects from all types of contemporary malware, crimeware and other cyber threats including viruses, Trojans, worms, spyware, phishing and hacker attacks.

Kaspersky Anti-Virus 6.0 for Windows Workstations MP4 replaces Kaspersky Anti-Virus Technology Preview for Windows 7 and has been enhanced with a management system – Kaspersky Administration Kit 8.0 – that also supports Windows 7.

Kaspersky Administration Kit 8.0 is the next version of the management console and it contains everything required to protect a network immediately after installation, with new deployment scenarios (including 1-click deployment and native GPO-based deployment support) and optimised default settings.

Kaspersky Administration Kit 8.0 also has Release Candidate status and is scheduled for release later this year

Kaspersky Lab invites interested parties to participate in public testing of these updated applications.

http://companies.mybroadband.co.za/blog/2009/07/30/windows-7-supported-anti-virus-software/

Tuesday, July 28, 2009

CA Anti-Spyware 2009 : Destory Spyware

Utility that sniffs out and highlights any spyware, adware and Trojans on your PC, ready for placing in quarantine or deletion.

The software now has a much improved interface to rival similar programs such as Ad-Aware. It is just as easy to use and, in some ways, performs a better job.

CA Anti-Spyware found items that the free version of Ad-aware missed in its scan, which may explain why Ad-aware is freeware and PestPatrol isn't.

You can become as involved in the analysis as you like, reading the huge amount of advice available and making your own decisions, or simply let PestPatrol do the donkey work.

After scanning your selected drives, CA Anti-Spyware lists any suspect files with advice on the threat (privacy etc), the risk (high/low) and what to do (delete/quarantine).

Friday, July 17, 2009

New Virus "Southpark.exe" comes to German

Computer Associates warns of Lovebugs successor

There is a life after ILOVEYOU - but this hardly looks pleasing from. The virus expert from c a now warn against a new worm, called South Park. He is not related to the Lovebugs worm and spreads through Outlook on all PCs with Windows 9x, 2000 or NT to run.

Unlike LoveLetter he need not activated Windows Scripting Host. He is tricky, mostly because subject line and body of the mail in the German language are held. The Subject is "Hey old man!" In the body text is the message "Here is the game that you absolutely wanted to read !;-)". Attached is a file called "South Park.exe".

The worm is, according to CA in no way associated with the Pretty Park worm, which a few weeks ago, drove his mischief (ZDNet reported). Written is the new Visual Basic virus in 5th If the file is opened, they are initially sent by mail to all persons involved in the contacts of the infected computer is stored.

In the background, they copied itself to the file "winguard.exe" and embed itself on the hard disk, from where they launch the next time the PC becomes active. Then the worm creates a file called "Swapfile.vxd", for so long with garbage data is filled up the hard drive is overflowing.

As always advise the virus experts about the e-mail to delete unread. CA offers a free Personal Edition of antivirus software "Inoculate" under www.antivirus.ca.com/ ... for free download, which, according to the company against South Park wappnet.

New ILOVEYOU virus appeared

Kapersky Lab warns
The Virus Hunters of the Kaspersky Lab warn of a new variant of the ILOVEYOU virus. The Internet worm "Fireburn" spread just like its predecessor via Outlook as VBS file in the attachment to an e-mail. The pathogen is also in IRC channels, by making the mIRC client infected.
The subject line looks different every time, in the mail states - on receipt of German version of Windows - in most cases:
Subject: Moin, alles klar?
Text: Hi, how's you? / Guck dir mal the photo attached, to, is echt geil;) / bye until then ..
When using a of Windows is written:
Subject: Hi, how are you?
Body: Hi, look at that nice Pic attached! / Watching it is a must; / cu later ...)
As the file names are used:
Ultra-hardcore Bondage.JPG.vbs
Christina__NUDE!. JPG.vbs
CuteJany__BigTits!. GIF.vbs
MyGirlfriend__NUDE!. JPG.vbs
Aguiliera__NUDE!. JPG.vbs
! Jany__Gets-fucked!. GIF.vbs
cute__EmmaPeel!. JPG.vbs
Julie17__xxx.GIF.vbs
Of course, the company offers on its site a patch against the parasite
so to make your computer safe and secure against all these threats, we need to use proper antivirus software and update our antivirus software on the regular basis.

Thursday, July 16, 2009

New virus can update itself

Symantec: W95.Babylonia attacks. Exe and. Hlp files

Various anti-virus companies are facing a new pathogen warned himself to be able to update. "This is just the tip of the iceberg," said the adviser Eric Chien of Symantec, the appearance of "W95.Babylonia". "The virus writers are becoming more network-centric ideas to create new types of programs to write."

Previously known name for e-mail attachments with dangerous cargo are:

I-WATCH-U.EXE
BABILONIA.EXE
X-MAS.EXE
SURPRISE!. EXE
JESUS.EXE
BUHH.EXE
CHOCOLATE.EXE

Symantec has since the first appearance of Babylonia on 6 December 24 Virenbefälle counted (www.symantec.com/ ...), Computer Associates since 3 December 15th ELF KByte great program attacks. "Exe" - and ". Hlp" files from Windows 95, however, directed to no harm - not yet. The experts suggest that destructive variants of the language confusion not wait long to be.

The virus first appeared in a newsgroup on - disguised as a Windows Help file named "serialz.hlp" - before and gave a list of serial numbers for commercial software. If the file is opened, it copies itself into the kernel memory and opened a new, four large KByte file with the name "c: \ babylonia.exe". Then copied babylonia.exe to themselves as "KERNEL32.EXE" in the Windows system directory and copy these lists "Software \ Microsoft \ Windows \ CurrentVersion \ Run".

In the result, the program at each program launch itself. It looks at the kind of application "RNAAPP.EXE" in Windows 9x in the online mode is active. If the program is successful, it provides a link to a site of a Japanese hacker ago. From there it loads a text file named "virus.txt" down. This lists the name of "dropper.dat", "greetz.dat", "ircworm.dat" and "poll.dat" on. They use a special format with a header, with "vmode" begins. Vmode stands for "Virus modules.

Finally, the four active loaded files and send the message, among other things "Quando o mestre chegara?" to the address babylonia_counter@hotmail.com. This serves the author about the number of infected computers to determine. About MIRC spreading the virus further.

The author of "Vecna" is, according to Symantec belongs to the Latin American group of virus writers known as 29A.

Users can be infected by the entry "W95/Babylonia by Vecna (c) 1999" in c: \ autoexec.bat noted. An update of the anti-virus software should protect against infe

Wednesday, July 15, 2009

Norton Antivirus 2008 with Browser Defender is ready

Antivirus software now comes with three licenses per package.
With Norton Antivirus 2008 and Norton Internet Security 2008 Symantec has updated versions of its security solutions. Both programs now included with the browser Defender on a real-time protection against malicious programs that security vulnerabilities in the browser exploit and unnoticed on the computer, as well as threats to target vulnerabilities in Internet Explorer exploit. In particular, for the attacks with unmarked ActiveX, JavaScript and VB Script malicious code.

New in Norton Internet Security 2008 is also the Norton Identity Safe, which the personal information and the identity of the user with online shopping, banking or browsing protect. Norton Identity Safe allows users to control what information with which site to be replaced.

In addition, users can access their data centrally manage. He has the option, passwords and other confidential data in Identity Safe to store and different identities for different activities on the Internet apply. The respective access data created will be automatically retrieved and if necessary entered into web forms. An encryption prevents tap some of the data by keyloggers.

In addition, the user gets on the Home Network feature an overview of his home network, including Wi-Fi router, and can manage individual network components. In addition, a support function directly into the software: If assistance is needed, the user enters directly through the Norton surface via live chat or e-mail with a Symantec employee in contact.

The software packages are expected late September on the market. Both solutions are now standard with licenses for three computers: Norton Antivirus 2008 costs 39.99 euros, Norton Internet Security 2008 is available for 59,99 Euro.

Webroot Brings AntiSpyware Corporate Edition with Antivirus


Security solution offers Vista compatibility and Active Directory integration
Webroot Software announced today the publication of its security solution AntiSpyware Corporate Edition with Antivirus announced. The software is a renamed new version of Webroot SME Security 3.1. Also his other products, the manufacturer now under a new brand names sell.

New in the current version of AntiSpyware Corporate Edition with Antivirus, in addition to the compatibility with Windows Vista Active Directory integration and technology Sophos Behavioral Genotype Protection. The latter analyzes the behavior of code before it is executed.

In addition, Webroot proactive protection to on-Write, Read-on-and on-execute shields extended to block spyware threats. The new version now also contains detailed reports on spyware detection and real-time threats and trace reports. The scalable security solution, according to the manufacturer in networks of all sizes use.

Tuesday, July 14, 2009

How to remove SpyWorm.Win32 .

SpyWorm.Win32 is a fake security center, It uses same type of unfair tactics that all fake antivirus software uses.This is installed by Trojan.Zlob.N

This SpyWorm.Win32 give's fake security alerts, to inform the users that they are infected by the malicious programs and need to install Windows Antivirus,Ultimate Antivirus and Advanced antivirus.

Related files: stream32a.dll, mscfg32.dll, pdswin.dll, ecxwp.dll, msvideo.dll, windivx.dll, websrc32.dll, pmspl.dll, vipextqtr.dll

We can remove this fake rouge antivirus software by following these steps .

1 Delete all these registry keys .


c4545fc9-26d0-4ccf-b4fb-728aed895dbd
BBB05D9E-0297-404D-A6BF-D8F2876B84A6
F9EAAA11-DF98-4615-A2C7-7D03C86A6BE9
202EBB90-ABD4-46CC-BB5A-4F0ECC67B331
69B98C68-D2B8-4A4E-9CB7-E85B6F3A7014
A8565FBC-8D53-4D4F-9BB0-CBC68A22B126
62EA9201-8CC7-4199-AC30-7744F836322E
b166be07-30a4-4d38-b781-44528a630706
D17CFF74-A19C-4C36-821A-E074E4F889CA
15EB9F40-D775-4463-B75B-8687B3C66BB7
E856E05E-1B91-4339-9EFC-9A3308CB5491
B3E45A9B-7756-46A2-AB14-90175CD374F9
43BA0532-0D69-458A-8C71-AD0F6AE70D19
6D64B03B-3B93-4AF2-BFC6-01264A4C7F2A
6A719349-BDF5-4268-9019-4ACA0C2562D2

2 Unregister all these Dll files by using Regsvr32 -u commnad.

stream32a.dll, mscfg32.dll, pdswin.dll, ecxwp.dll, msvideo.dll, windivx.dll, websrc32.dll, pmspl.dll, vipextqtr.dll

3 Delete all these files from your computer .

Delete files:
stream32a.dll, mscfg32.dll, pdswin.dll, ecxwp.dll, msvideo.dll, windivx.dll, websrc32.dll, pmspl.dll, vipextqtr.dll

Monday, July 13, 2009

Botnet worm in DOS attacks could wipe data out on infected PCs

As we all know, last week US and south korean websites are attacked by DOS attack ie Deniel of service attack . Approximately 50,000 computers are affected by DoS attack in Us and South Korea.

This attack started in july 4th ie on the weekend, on the Government and business sites in both USA and South Korea .


The programs used to wipe out files on the PC, effects the Masterboot record, which caused the problem in booting.

A dropper program called W32.Dozer that contains the other components is sent by W32.Mytob!gen to e-mail addresses it gathers from the compromised computer.

The Dozer Trojan serves as a backdoor and connects to IPs through certain ports, allowing it to update itself and to receive instructions on sites to attack,It's unclear if the DOS attacks will happen again because the infected PCs can receive new instructions at any time.

Trend Micro detected new variant Conficker

WORM_DOWNAD.E loads over peer-to-peer functionality in accordance with the previous version. The new variant is associated with sites such as myspace.com. You should be on 3 May disable.

Trend Micro has released a new version of Conficker with the name WORM_DOWNAD.E discovered via the peer-to-peer functionality in accordance with the previous version is loaded. The new update appears to contain malicious routines. The security experts that it is a keylogger or some other program that tries to get to sensitive data.

As the global leader for information security at Trend Micro's David Perry said, it seems that the harmful from a routine. Sys component to exist, which hides behind a rootkit, and in this way disguises that the PC is infected at all. The software is highly encrypted, so the researchers have problems, analyze the malware.

In addition, the worm connects with myspace.com, msn.com, ebay.com, cnn.com and aol.com to check whether the attacked computers at all has an Internet connection. Then it deletes all the tracks, which he on the host computer has left. According to an entry in TrendLabs Malware Blog is it configured so that he is on 3 May even be disabled.

Friday, July 10, 2009

How to remove WinBlueSoft (fake antispyware software)

WinBlueSof is a fake anti spyware and it is from the family of WiniBlueSoft.this fake antispyware enters in to your computer by following these using Trojan or other malicious programs .
first of all trojan will attack your computer with the security alerts asking you to download and install WinBlueSoft to clean your computer .WinBlueSoft Uses Blocker.dll that makes this infection more devastating.

when blocker.dll is loaded for the first time it will change your desktop to a black background with dark red ominous text written over it. This text is

" Warning!
Your're in danger!
Your computer is infected with Spyware!
All you do with computers is stored forever in your hard disk. When you visit sites, send emails... All your actions are logged. And it is impossible to remove them with standard tools. Your data is still available for forensics. And in some cases

For your boss, your friends, your wife, your children.

Every site you or somebody or even something, like spyware, opened in the browsers, with all the images, and all the downloaded and maybe later removed movies or mp3 songs - ARE STILL THERE and could break your life!

Secure yourself right now!
Remove all Spyware from your PC! "

You can remove this fake anti spyware manually from your computer by following these steps .
1 Remove all the files associated with this fake anti spyware software.

c:\Documents and Settings\All Users\Desktop\WinBlueSoft.lnk
c:\Documents and Settings\All Users\Start Menu\Programs\WinBlueSoft
c:\Documents and Settings\All Users\Start Menu\Programs\WinBlueSoft\1 WinBlueSoft.lnk
c:\Documents and Settings\All Users\Start Menu\Programs\WinBlueSoft\2 Homepage.lnk
c:\Documents and Settings\All Users\Start Menu\Programs\WinBlueSoft\3 Uninstall.lnk
c:\Program Files\WinBlueSoft Software
c:\Program Files\WinBlueSoft Software\WinBlueSoft
c:\Program Files\WinBlueSoft Software\WinBlueSoft\data.bin
c:\Program Files\WinBlueSoft Software\WinBlueSoft\license.txt
c:\Program Files\WinBlueSoft Software\WinBlueSoft\uninstall.exe
c:\Program Files\WinBlueSoft Software\WinBlueSoft\WinBlueSoft.exe
C:\Windows\System32\blocker.dll


2 Remove all the registry files associated with the WinBlueSoft.

HKEY_CURRENT_USER\Software\WinBlueSoft
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\WinBlueSoft
HKEY_LOCAL_MACHINE\SOFTWARE\WinBlueSoft
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run "WinBlueSoft"


How to remove Spyware Protect 2009 (Fake antivirus software)


Spyware protect 2009 is a fake antivirus software, it has same as antivirus 2009 (fake antivirus software).

This fake antivirus software can be installed on your computer by torjan (malicious program) such as Zlon or false codes or by other web down loaders.

This program starts scanning computer, After the scanning is over the fake antivirus software shows lot of malicious programs in your computer.ie a false result (files which this antivirus software show does not exist)

Asks to buy the full version of spyware protect 2009 on your computer.

Following are the symptoms of spyware protect 2009.

2 Pop-up windows .
3 Sudden appearance of websites on your computer.
4 SpywareProtect2009.exe or Spyware Protect 2009.exe in your computer.
5 Spyware Protect 2009 trys to connect itself to the internet.

we can remove this fake antipsyware from your computer by following these steps .

1 Block all the websites responsible for this malicious attack.

os-protection.com
spwprotect2009.com
spy-protect-2009.com
spywprotect.com
spywprotect2009.com
spywrprotect-2009.com
swp2009.com
sysguard2009.com

2 Delete all the files created by spyware protect 2009.

C:\Program Files\Spyware Protect 2009
C:\Program Files\Spyware Protect 2009\gfx.bin
C:\Program Files\Spyware Protect 2009\options.ini
C:\Program Files\Spyware Protect 2009\SpywareProtect2009.exe
C:\Program Files\Spyware Protect 2009\SpywareProtect2009.exe.MANIFEST
C:\Program Files\Spyware Protect 2009\SpywareProtect2009_start_setup.exe
C:\Program Files\Spyware Protect 2009\tp_starter.exe
C:\Program Files\Spyware Protect 2009\uninstall.exe
C:\Program Files\Spyware Protect 2009\uninstall.log
C:\Program Files\Spyware Protect 2009\vbase.ini
C:\Program Files\Spyware Protect 2009\lang
C:\Program Files\Spyware Protect 2009\lang\english.lng


3 Delete all the registry files associated with spyware protect 2009.

HKCU\Software\Spyware Protect 2009
HKCU\Software\Microsoft\Windows\CurrentVersion\uninstall\Spyware Protect 2009
HKCU\Software\Microsoft\Windows\CurrentVersion\Run Spyware Protect 2009

By following all these steps we can delete this fake antispyware from your computer.

Wednesday, July 8, 2009

Antivirus: beta Microsoft Security Essentials is available for download

Over the years computers and Internet technology has make tremendous advancement in every field , On one side these advancement helped us a lot in every field ( Business , Education ) .But on other side it leads to the several type of threats on the Internet , for example virus , worms , Trojan horses .
All these threats , on one side effects the performance of our computer , and also causing threat to personal data .
So avoid all these things, Microsoft one of the giants in the field OS and application software is planning to develop and antivirus software.
Downloading the beta version of Microsoft's free anti-virus will be limited to 75 000 users said a spokesman of the publisher.

Security Essentials, available in 32 and 64 bits, providing protection against viruses, malware and spyware for Windows XP, Vista and Windows 7. This suite will replace Live OneCare stops the marketing end of June.

Designed for netBook

Security Esssentials was also designed to require minimal resources and space in order to run properly on the netBook.

Originally called Morro, the software ended up (unintentionally?) On the net since yesterday. It was a pre-beta version that Microsoft is currently testing with its employees and a panel of users picked.

Tuesday, July 7, 2009

Trojan horse disguises itself as anti-virus tool


Kaspersky warns of mail with attachment "AAprices.exe"; program connects the PC with a site, from a virus on the computer is loaded
The antivirus specialist Kaspersky warns against a Trojan horse that Kasperskys itself as anti-virus program Tarn. In a mass mail to the malicious program TrojanDownloader.Win32.Apher distributed.

Lead Attachment of the user on his system, so iniziiere "Apher automatically an Internet connection to a remote site. From the loaded page will be a tool of the virus "Backdoor.Death.25" on the infected computer. Through the program, and the virus was the attacker in a position to secretly infected computer to use, confidential data and send files as well as to create, copy and delete them.

Currently have been some users with software infected. The Trojans will go with the e-mail address info@microsoft.com sent. The subject of the mail leutet: "Protect Your NetWare with Kaspersky Anti-Virus" and the attachment name is "AAprices.exe".

Kaspersky has an antidote in its database for the program, Anti-Virus 4.0 recorded.

ZDNet offers a Virus Center with current information about the threat from cyberspace, a comprehensive collection of current anti-virus software and a free live-virus check. The online scanner be trimmed its system according to various pests.

Monday, July 6, 2009

W32.Sapaq computer worm

On 12 june 2009, a computer virus worm broke out in the comouter world called as W32.Sapaq, it's a self replicating worm which spreads through network shares and infects executable files.

this worm can infect following operating system .

1 Windows 95
2 windows 98
3 windows 2000
4 windows ME
5 Windows NT
6 Windows XP
7 Windows server 2003
8 windows vista

This worm attacks the executable file that are shared and spread through networks.it's believed that this worm is 81463 bytes to 82439 Bytes.
And one thing is believed that this worm is a low Category worm(means

Once the file is executed, it copies itself into the %System%\drivers\TXP1atform.exe, and then creates the following files:
%System%\drivers\JM.SYS
%CommonProgramFiles%\Desktop_1.ini (non malicious)
%CommonProgramFiles%\Desktop_2.ini (non malicious)
What makes this worm a possible medium threat is that it deletes the host file and then creates another file. HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\"Explorer" = "%System%\drivers\TXP1atform.exe" gets created along with a host of 20+ other HKEY files.
Along with the HKEY files, the worm recreates the JM.SYS file that was embedded with the originally created files (which is a variant of a Trojan virus that steals passwords and then transmits them to the virus proginator) is changed. It changes from JM.SYS to DMusic with an image path of DMusic that automatically starts-up when the host machine is started. As the file is a worm, it continues to infect executable files in the host machine until it’s contained or neutralized. For the network administrators that monitor the continuous outgoing numbers for your network, the key is to watch TCP Port 80, and follow the IP Address: 60.173.10.53.

Friday, July 3, 2009

MJ virus (E-mail threat)


Now a days, if your computer is connected to the internet it means that you can prone to the malicous programs , which are prevailing on the internt.

One o such threat is MJ virus, which emerged, 8 hours after the death of michael jackson .

World's obsession for the sudden death of Michael Jackson,caused a serious threat to computer users,especially for the fans of Michael Jackson .
As this affection of Michael Jackson, is causing email threat ie MJ virus or the Internet .

Mj virus spread via email, this email comes with the subject ‘Remembering Michael Jackson’ and is sent from ‘sarah… michaelja-ckson.com’. this email transmitted from a mass email clamming to contain secret songs and phots of Michael Jackson in an attachment.

By opening the attachment, computer users are exposed to infection. Once infected, a computer will begin automatically spreading the worm onto other Internet users.

This MJ virus is capable of spreading as an autorun component on USB memory stick.

These email has one more thing ,it also contain link for "revealing truth from death of Michael Jackson'

So, to make your compute safe and secure, we need to use proper antivirus software. To make our computer safe against such threats.

Wednesday, July 1, 2009

How to system security 2009

System security 2009 is fake or rouge antispyware, it is the sucessor of system security malware, it enterns into the computer using Trojan or other malicious programs, Once your computer get infected with you will get the Pop-ups " That your computer is infected and you need to buy system security 2009, Once this fake antivirus software is there in your compute there is alway, a threat of data corruptin and also your computer can also go to no boot situation .

The latest trick used by System Security2009 is changing wallpaper into scary message : Such as " YOur computer is infected by spyware and your need to install system security 2009.

Following are the steps to remove System security 2009, from your computer .

1 Block System Security 2009 sites:

bestcleaner.us
ultracleaner.us
ultracleaner.biz
websecurityvoice.com
greatvirusscan.com
securityscanguide.com
getpcguard.com
initialsecurityscan.com
interinetskim.com
wwwmobilereads.com
websecuritymaster.com
networkstabilityscan.com
fullandtotalsecurity.com
secureserver4.cc
securityscan4you.com
free-web-scaners.info
totalvirushield.com
justwebsecurity.com
xvirusdescan.com
hypersecurityshield.com
fullvirusprotection.com
freewebmypcscan.com
besthandycap.com
futureinternetsecurity.com
internetsecuritymetrics.com
fullpcvirusscan.com
0scan.us
thesecuritystandart.com
superiorinternetsecurity.com
free-webscaners.net
webstoresecurity.com
crownsafetytool.com
securityonlinesite.com
loved-online-tube.com
scan-virusremover2009.com
aboutdot.info
ourbestsecurityshield.com
safetyscanguide.com
scantrustsecurity.com
scan-av-express.com


2 Find and Delete these System Security Files:

systemsecurity.exe
SystemSecurity.lnk
SystemSecurity on the Web.lnk
Uninstall SystemSecurity.lnk
%desktopdirectory%\system security.lnk
%desktopdirectory%\ws\config.udb
%desktopdirectory%\ws\init.udb
%desktopdirectory%\ws\languages\english.lng
%desktopdirectory%\ws\languages\german.lng
%desktopdirectory%\ws\languages\spanish.lng
%desktopdirectory%\ws\systemsecurity.exe
%programs%\system security\system security.lnk
%desktopdirectory%\ws\systemsecurity.exe
05643921.exe
install.exe
%desktopdirectory%\system security 2009.lnk
%programs%\system security\system security 2009 support.lnk
%programs%\system security\system security 2009.lnk


3 Remove System Security Registry Values:

HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run systemsecurity
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\systemsecurity2009
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\systemsecurity2009 displayicon
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\systemsecurity2009 displayname
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\systemsecurity2009 shortcutpath
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\systemsecurity2009 uninstallstring

By following these steps we can remove System security software .






Tuesday, June 30, 2009

How to remove Antivirusbest

Antivirus software one of the Rouge or (fake) antivirus software. This fake antivirus software infected the computer's is the end of june 2009, this fake antiviruss software is caught with trojan , which are downloaded or with the shareware .
So if you computer is infected with trojan , which belongs to the community of this antivirus, these trojan leads to Pop-ups or security alerts , claming the computer is in infection , Thus parasites this antivirusbest , And you need to pay for this .

This antivirus software takes control of your computer, leading to the corruption of the data or other personal information .

So it's always recommended to remove this antivirus software .
We can remove this by following these steps .

Before starting the removal of this fake antivirus software , we need to take the backup of our system and registry . So that if something get wrong we, can restore that files .

1 Block Antivirus-Best.com sites:

Antivirus-Best.com

2 Stop Antivirus-Best.com processes:
Antivirus2009.exe
aBest.exe
C:\Program Files\Antivirus 2009\av2009.exe

3 Remove Antivirus-Best.com files:
c:\WINDOWS\system32\scui.cpl
Uninstall Antivirus 2009.lnk
Antivirus 2009.lnk


4 Get rid of Antivirus-Best.com folders:
C:\Program Files\Antivirus 2009

5 Unregister Antivirus-Best.com registry keys:
By opening the Registor editior , by typing the regedit in the command prompt.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\15358943642955870504508370025739
HKEY_LOCAL_MACHINE\SOFTWARE\Antivirus
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Antivirus\ProgramFiles\Antivirus 2009\Antvrs.exe
HKEY_CURRENT_USER\Software\Antivirus

By removing all these antivirus files and registry entries we can remove this fake antivirus software, make our computer safe against malicious programs .

Monday, June 29, 2009

F-Secure Anti-Virus 2003

F-secure Anti-Virus 2003 is a fast anti-virus guard, but given its somewhat narrow scope is rather expensive. Although its price range of 53 U.S. Dollar for the Home / Small Office version (F-Secure AV 2003) up to 80 U.S. dollars for the Enterprise version goes, provides F-Secure Anti-Virus fewer amenities than, for example McAfee VirusScan 7.0. If unattended, for example, virus scans using a scheduler to perform, you have a free add-on F-Secure download, and install it. The same also applies to the firewall. And the review of incoming and outgoing e-mails in real time is a function of the competing offers to F-Secure, however, has not integrated.
Positive to mention is the dominant user interface easy to F-Secure Anti-Virus and the minimal impact of its scanning engine on system resources. With regard to its stress on the system, this is one of the easiest so far tested virus scanners. Who just a quick scan antivirus needs is with F-Secure Anti-Virus well advised. Otherwise, offer programs like PC-cillin or VirusScan better and more complete offer.

Setup & interface
The installation of F-Secure Anti-Virus on a download is easy, for modem users but time consuming. The setup requires two larger downloads (6.1 MB and 13.6 MB), the installation process considerably slower. So only the needed 13 MB download on the large 56-KB modem-one hours. For broadband users, this is obviously not an issue, and if once the download is complete, the setup is a breeze. Instead, you can download a CD version.

F-Secure Anti-Virus 2003 provides a tidy, easy to use interface, without the typical clutter of icons and menus altogether, the other anti-virus programs which are often.

After a few obligatory clicks is the completed installation. F-Secure Anti-Virus after installation requires only a few (if any) fine. With its default settings, the program is capable of malicious code throughout the system to automatically remove what is good, but it can also configure it so that instead all the suspicious files renames or deletes.

The designers of the program interface deserve praise that they have succeeded in the surface easy to keep. A similar website homepage replaced the usual icons and drop-down menus, making the surface and clear up confusion. The virus signatures are automatically updated by the user - a refreshing change compared to the constant annoying prompts some other antivirus programs.

Features
F-Secure provides a good, simple scanning engine available, but not much more, unless one is prepared, additional components such as a scheduler and a firewall separately download and install it. The lack of an integrated firewall is certainly understandable, but not even include the market-leading Norton AntiVirus 2003 product such. A scheduler should be standard equipment and are not an optional extra, even if F-Secure believes that its real-time scanner, which examines all files when the operating system is accessing the traditional, pre-planned virus scans unnecessary. Maybe even the true, the test team but prefers the safety and redundancy scheduled scans and wishes to their integration into the program.

F-Secure Antivirus provides basic functions, such as the ability to perform manual scans , for automated scans you have to install a separate utility.

Performance
F-Secure Anti-Virus produced in the tests only a small slowing of system performance, and this point was in par with McAfee VirusScan 7.0 and EZ Antivirus, but uses less system resources than the somewhat slow or Norton AntiVirus 2003, Panda Antivirus Platinum 7.0. Indeed, F-Secure Anti-Virus in this category is only one percentage point below the top PC-cillin.

To test the effects of F-Secure on the system performance ZDNet Labs used SysMark 2002 by BAPCO, a benchmark program that is recognized as the industry standard is. The category of Internet Content Creation SysMark measures the performance of a desktop, on the ready-to-use applications such as Adobe Photoshop, Microsoft Windows Media Encoder, and Macromedia Dreamweaver running. (In the test, the category Office Productivity not performed, because the program includes McAfee VirusScan 5:13.)
In a test of the overall scan speed needed F-Secure, however, 2.2 minutes for a 1 GB big list to be reviewed. In comparison, EZ Antivirus stood with an average of 1.1 minutes for the review of a 1 GB big list at the top. McAfee VirusScan 7.0 required an average of 1.7 minutes, while Panda and Norton each required 3.1 minutes slow. With an average load time of 65.1 seconds reached F-Secure, however, only the worst possible time for the start of the program is needed
Service and Support

For its customers, the categories of home users and small businesses are assigned, provides F-Secure no phone service. (The only other anti-virus program with a similar policy without telephone support is Panda Antivirus Platinum.) Positive to mention is that of F-Secure offer free support via e-mail. The company promises to e-mail inquiries within two to eight hours to respond - quickly, compared with its competitors - and in the tests was also observed that promise. The website of the company also offers an adequate supply of software patches, troubleshooting tips and other useful anti-virus info

First safety tests positive for Microsoft Security Essentials

A first test on a sample reduced by viruses, conducted by independent lab AV-Test, highlights good detection capabilities of the new free antivirus Microsoft Security Essentials.

While it remains a partial examination, but the conclusions are generally positive for the Microsoft Security Essentials, a new antivirus firm Redmond, still in beta.

To test the capacity of detection and disinfection software, AV-Test GmbH, known for its comparative effectiveness of antivirus software, Microsoft faces a Security Essentials for a sample of approximately 3,200 currently active malware (viruses, bot, horses Trojan and worms).

According to the leader of the independent laboratory, Andreas Marx, quoted by The Register, Microsoft antivirus correctly identified and treated all infected files. A good point for the application, especially since several antivirus market are still unable to pass the test, said Andreas Marx.

Microsoft Security Essentials effective virus and rootkit

AV-Test GmbH has also assessed the capacity of the software has correctly identified threats submitting false positives, ie files here frequently detected as a virus yet safe. An important test since the quarantining or deleting a legitimate file may lead to the failure of computer or malfunctioning of certain applications.

For this second analysis, Security Essentials Microsoft has also responded well. Thus, none of these files has been an alert. Finally, with programs designed to evade anti-virus engines by hiding their presence, rootkits, security software Microsoft also avoids the failure. "We did not find any reason to complain," said Andreas Marx.

However, this partial analysis is not sufficient to conclude that the good performance of Microsoft Security Essentials, as explained AV-Test, which states that tests have yet been conducted on the samples, including rootkits.

No behavioral analysis module integrated

The next analysis will focus on samples of this time hundreds of thousands of malicious programs. AV Comparatives, which will submit Microsoft Security Essentials for analysis in August, use a little more than two million codes, including viruses specially developed for testing and unknown publishers of antivirus software.

And perhaps this last point that a problem for the anti-Microsoft. It does indeed no detection module behavioral and relies solely on the basis of signatures.

To be effective, this type of virus should provide frequent updates of the signatures. But Microsoft Security Essentials is not the only one without this technology, said AV-Test. The behavioral analysis is a feature more common among security suites, that Morro (the previous name of the software from Microsoft) because it is not just an antivirus.

Friday, June 26, 2009

How to remove W32/Nachi.worm

This W32/Nachi.worm is a type of computer virus which spreads without user action and that distributes complete copies of itself across networks (such as the Internet). Generally known as "Nachi," this new worm exploits the vulnerabilities that were addressed by Microsoft Security Bulletins MS03-026 (823980) and MS03-007 (815021) to spread itself over networks by using open Remote Procedure Call (RPC) ports or the World Wide Web Distributed Authoring and Versioning (WebDAV) protocol that is supported by Internet Information Server (IIS) 5.0.
It is also know as .
W32.Welchia.worm (NAV)
W32/Nachi!tftpd
W32/Nachi.worm.a
WORM_MSBLAST.D (Trend)
Installation
To ensure only one instance of the worm on the victim machine, a mutex of the following name is created:
RpcPatch_Mutex
The virus installs itself within a WINS directory in the Windows System directory:
C:\WINNT\SYSTEM32\WINS\DLLHOST.EXE (10,240 bytes)
The virus attempts to copy the TCP/IP trivial file transfer daemon (TFTPD.EXE) binary from the dllcache on the victim machine to this directory also, renaming it:
C:\WINNT\SYSTEM32\WINS\SVCHOST.EXE
Note: If TFTPD.EXE is not present on the target machine, this copy will fail. TFTPD.EXE only exists by default on specific OSes.
The following services are installed:
1. RpcPatch Set to run the installed copy of the worm (DLLHOST.EXE)
Display name: "WINS Client"
2. RpcTftpd Set to run the copy of the TFTPD application (SVCHOST.EXE)
Display name: "Network Connections Sharing"
Symptoms -
· large volumes of ICMP traffic in network
· existence of the files and Windows services detailed above
To prevent this virus from infecting your computer, follow these steps:
1. Enable the Internet Connection Firewall feature (ICF) in Windows XP, in Windows Server 2003, Standard Edition, and in Windows Server 2003, Enterprise Edition; or use Basic Firewall, Microsoft Internet Security and Acceleration (ISA) Server 2000, or a third-party firewall to block TCP ports 135, 139, 445, and 593; UDP ports 69 (TFTP), 135, 137, and 138; and TCP port 80.
To enable the ICF in Windows XP or Windows Server 2003, follow these steps:
1. Click Start, and then click Control Panel.
2. In Control Panel, double-click Networking and Internet Connections, and then click Network Connections.
3. Right-click the connection where you want to enable ICF, and then click Properties.
4. Click the Advanced tab, and then click to select the Protect my computer or network by limiting or preventing access to this computer from the Internet check box.
Note Some dial-up connections may not appear in the Network Connection folders. For example, AOL and MSN dial-up connections may not appear. Sometimes, you can use the following procedure to enable ICF for a connection that does not appear in the Network Connection folder. If these steps do not work, contact your Internet service provider (ISP) for information about how to firewall your Internet connection.
5. Start Internet Explorer.
6. On the Tools menu, click Internet Options.
7. Click the Connections tab, click the dial-up connection that you use to connect to the Internet, and then click Settings.
8. In the Dial-up settings area, click Properties.
9. Click the Advanced tab, and then click to select the Protect my computer or network by limiting or preventing access to this computer from the Internet check box.

Tuesday, June 23, 2009

Morro project: free antivirus from Microsoft

Microsoft one of the giants in the field of Operating system softwares and also in application software has decided to try to their hands in security softwares ( ie the antivirus software)
Microsoft has confirmed that his future was now free antivirus , which has entered in its final phase of testing. With basic security functionalities, it should succeed OneCare Live by the end of the month.As previously planed by microsoft, free antivirus can be downloaded from microsoft website,. This free antivirus software is known as the Morro code, it is a software suite that will offer protection against viruses, spyware and other malicious software.Basic functions identical to those found in products of entry-level of industry heavyweights such as McAfee and Symantec, or with competitors like free Avast or AntiVir.With Morro, Microsoft aims explicitly emerging countries like Brazil, China and India. One way to quickly gain market share.It remains to be seen how this utility will be released. Microsoft will assign it to the temptation to include it in Windows 7 or to offer to all its OS via Windows Update? This is unlikely as the risk of prosecution for abuse of dominant position are obvious.

Monday, June 22, 2009

WAYS TO BE VIRUS-FREE

Development of computer and Internet technology ,leads to great revolution in world of information technology , and helped in making this world as a global village, these technologies boomed the Education and Business structure, now a days students can use Internet to study about the latest technologies aroung any part of the world , even business can expanded and managed world wide using these smile technologies .

But on the other side these technologies also leads to the several threats such as Virus , worm , spy ware and many other , all these malicious programs can cause a serious threats to our personal data and personal information such as credit card information , netbanking password

All these malicious programs are programs which are used to attack the file structure of the windows based operating system .
But we can avoid all computer related threats by following some of the basic steps .
1 Protect macros in ms Word, Excell and Powerpoint :
Some virus uses macros (ie stored commands ) for malicious attack, these malwares attack macros and change file types from the text files or spreadsheets in to templates, it also deletes the files from the computer .
2 Don't download from public news groups :
Its always recommended not to download form unsafe websites, so is the public news groups these groups are mainly used by hackers .
3 Use strong password :
there are several malicious programs which attacks the weak password, ie application having weak password, so its always recomened to use proper and strong password.
4 Backup files and folder.
To be on the safer hand we should always backup our data.
5 Download application software.
There is a application package called as Microsoft baseline security analyse (MBSA), this application will scan your computer for missing hotfixes, it will work for windows 2000 and xp home and professional .




Friday, June 19, 2009

(Microsoft security Essentials 1.0)

Microsoft one of the leading giant in operating system softwares, Enter into the field of security softwares , as microsoft is now ready for one of its up coming Free antivirus code name microsoft Morro

This antivirus software is compatible with windows 7, windows vista sp2/ sp1/RTM and windows XP Sp3.

Micorsoft security essentials is the name of that free antivirus software which was earlier called as microsoft morro

The beta version will be limited to 75000 downloads and for countries like USA, Israel and Brazil ie Where core development team is available. in the month of July the beta version of this antivirus software is available in China


Microsoft security essential (Antivirus software cann't be installed on the Pirated copies of windows operating system, For that there is a new concept added to this antivirus software called as " validation ". For this we need to Click on the Validate button, it will valiadiate whether windows operating system is Genuine or not, if windows is genuine then this antivirus software will install on that computer .

It has several features such as schedule scanning, real time protection and microsoft spynet.



Download for this free antivirus software is really light weight for windows 7 its 3.8 MB in size and for windows 7 its 7.7 MB.

For installatin we need to accept the licence aggrement.Installation of this antivirus software will ask for the updating antivirus software .


Wednesday, June 17, 2009

How to remove W32/Nachi.worm

This W32/Nachi.worm is a type of computer virus which spreads without user action and that distributes complete copies of itself across networks (such as the Internet). Generally known as "Nachi," this new worm exploits the vulnerabilities that were addressed by Microsoft Security Bulletins MS03-026 (823980) and MS03-007 (815021) to spread itself over networks by using open Remote Procedure Call (RPC) ports or the World Wide Web Distributed Authoring and Versioning (WebDAV) protocol that is supported by Internet Information Server (IIS) 5.0.
It is also know as .
W32.Welchia.worm (NAV)
W32/Nachi!tftpd
W32/Nachi.worm.a
WORM_MSBLAST.D (Trend)
InstallationTo ensure only one instance of the worm on the victim machine, a mutex of the following name is created:
RpcPatch_Mutex
The virus installs itself within a WINS directory in the Windows System directory:
C:\WINNT\SYSTEM32\WINS\DLLHOST.EXE (10,240 bytes)
The virus attempts to copy the TCP/IP trivial file transfer daemon (TFTPD.EXE) binary from the dllcache on the victim machine to this directory also, renaming it:
C:\WINNT\SYSTEM32\WINS\SVCHOST.EXE
Note: If TFTPD.EXE is not present on the target machine, this copy will fail. TFTPD.EXE only exists by default on specific OSes.
The following services are installed:
RpcPatch Set to run the installed copy of the worm (DLLHOST.EXE)
Display name: "WINS Client"
RpcTftpd Set to run the copy of the TFTPD application (SVCHOST.EXE)
Display name: "Network Connections Sharing"
Symptoms -
large volumes of ICMP traffic in network
existence of the files and Windows services detailed above
To prevent this virus from infecting your computer, follow these steps:
Enable the Internet Connection Firewall feature (ICF) in Windows XP, in Windows Server 2003, Standard Edition, and in Windows Server 2003, Enterprise Edition; or use Basic Firewall, Microsoft Internet Security and Acceleration (ISA) Server 2000, or a third-party firewall to block TCP ports 135, 139, 445, and 593; UDP ports 69 (TFTP), 135, 137, and 138; and TCP port 80. To enable the ICF in Windows XP or Windows Server 2003, follow these steps:
Click Start, and then click Control Panel.
In Control Panel, double-click Networking and Internet Connections, and then click Network Connections.
Right-click the connection where you want to enable ICF, and then click Properties.
Click the Advanced tab, and then click to select the Protect my computer or network by limiting or preventing access to this computer from the Internet check box.
Note Some dial-up connections may not appear in the Network Connection folders. For example, AOL and MSN dial-up connections may not appear. Sometimes, you can use the following procedure to enable ICF for a connection that does not appear in the Network Connection folder. If these steps do not work, contact your Internet service provider (ISP) for information about how to firewall your Internet connection.
Start Internet Explorer.
On the Tools menu, click Internet Options.
Click the Connections tab, click the dial-up connection that you use to connect to the Internet, and then click Settings.
In the Dial-up settings area, click Properties.
Click the Advanced tab, and then click to select the Protect my computer or network by limiting or preventing access to this computer from the Internet check box.

Thursday, June 11, 2009

Win32/Hotbar champion software parasites on the web in 2007 .


Microsoft has in the second half of 2007 increased by 66.7% of detections of potentially unwanted software "compared to the previous semester. Information obtained via the removal tool for malicious software (MSRT) is included with Windows XP and Vista, fitted to a base of 450 million PCs in the world.
In total, 129.5 million of these software parasites were detected between 1 July and 31 December 2007. Win32/Hotbar has had the largest volume of attempted infections. According to Microsoft, it is polluting P2P networks as files bombs and attempting to infect systems via spam. This program installs a dynamic toolbar in Internet Explorer and displays pop-up ads, chosen for the analysis of Internet activity.
It contains the buttons differ depending on the current Web page and keywords in it. Click a button on the toolbar can display an advertiser's Web site or a search fee. Hotbar also installs graphics skins for Internet Explorer, Outlook and Outlook Express.
This parasite may collect user information, download and install updates or any other code automatically from its servers, Microsoft notes. The antivirus market or Microsoft tool (MSRT) normally block the program, dated April 2007 and was therefore included in the signature of most viruses. It must of course have a day to protect them. But this does not prevent them clearly to conduct a large number of attempts of infection, according to Microsoft.

Thursday, May 28, 2009

Spyware Protect 2009 Removal

Spyware Protect 2009 :--
Now days, many computer users experiencing external threats like spywares, adwares, malwares and many more. Spyware Protect 2009 is a new rouge antipsyware software. It is generally comes up with many fake alerts, messages and pop-ups.

Spyware Protect 2009 Symptoms :--
Spyware Protect 2009 pop-ups generates following warning messages :--
1. Your computer is infected by viruses attacks and scan your computer using Spyware Protect 2009.
2. Activate Spyware Protect 2009 now to sure that maximal protection is applied.
3. Critical System Error.
4. Your computer is infected.
5. Hijacked homepage to swp2009.com, spyprotect2009.com, sp-protect2009.com or obscure web page.
6. Flashing icons appear on your system tray (near of your system clock).

Spyware Protect 2009 Manual Removal Steps :--
We need to delete some dll files, processses and registry entries to get rid off Spyware Protect 2009.
These are the following files that associated with Spyware Protect 2009 infection :--
%WINDOWS%\aazalirt.exe%WINDOWS%\dkekkrkska.exe%WINDOWS%\dkewiizkjdks.exe%WINDOWS%\iddqdops.exe%WINDOWS%\ienotas.exe%WINDOWS%\iqmcnoeqz.exe%WINDOWS%\irprokwks.exe%WINDOWS%\jikglond.exe%WINDOWS%\jiklagka.exe%WINDOWS%\jrjakdsd.exe%WINDOWS%\jungertab.exe%WINDOWS%\kitiiwhaas.exe%WINDOWS%\kkwknrbsggeg.exe%WINDOWS%\klopnidret.exe%WINDOWS%\krkdkdkee.exe%WINDOWS%\krkmahejdk.exe%WINDOWS%\krtawefg.exe%WINDOWS%\krujmmwlrra.exe%WINDOWS%\ktknamwerr.exe%WINDOWS%\kuruhccdsdd.exe%WINDOWS%\ooorjaas.exe%WINDOWS%\oranerkka.exe%WINDOWS%\oropbbsee.exe%WINDOWS%\ronitfst.exe%WINDOWS%\seeukluba.exe%WINDOWS%\skaaanret.exe%WINDOWS%\sysguardn.exe%WINDOWS%\tobmygers.exe%WINDOWS%\tobykke.exe%WINDOWS%\zibaglertz.exe%WINDOWS%\otnnbektre.exe%WINDOWS%\otowjdseww.exe%WINDOWS%\otpeppggq.exe%WINDOWS%\rkaskssd.exeSpyware Protect 2009.lnkUninstall Spyware Protect 2009.lnk

These are the following "dll files" that associated with Spyware Protect 2009 infection :--
1. usp10.dll
2. Omahonafazeq.dll
3. iehelper.dll

These are the following processes that we have to kill to get rid off Spyware Protect 2009 :--
1. sysguardn.exe
2. free_scan.exe
3. ntos.exe
4. load[1].exe
5. new23[1].exe
6. gr[2].exe
7. adv111[1].exe
8. new26[1].exe
9. sysguard.exe
10. av.19.1[1].exe

These are the following registry entries that we have to kill to get rid off Spyware Protect 2009 :--
1. Microsoft\Windows\CurrentVersion\Run\sysguardn
2. Microsoft\Windows\CurrentVersion\Run\Mmexofumutokara
3. Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{C9C42510-9B21-41c1-9DCD-8382A2D07C61}{C9C42510-9B21-41c1-9DCD-8382A2D07C61}
4. HKEY_CURRENT_USER\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\system tool
5. Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{BBD4551A-9B23-41cd-9BCD-818AA2DA7B63}

Spyware Protect 2009 Removal By Security Softwares :--
We should follow these troubleshooting steps to get rid off Spyware Protect 2009 :--
1. We should delete all the internet temporary files like temp, %temp% and prefetch files.
2. Scan computer using any updated antivirus program.
3. We should install and download the "Antimalwarebytes" (freely available).
4. We should update "Antimalwarebytes".
5. Scan computer using the "Antimalwarebytes".
6. We should follow the same procedure for "Superantispyware" as we have done for "Antimalwarebytes" (Safe Mode).
By all the above discussion, We can conclude that Spyware Protect 2009 is a fake antivirus program. Spyware Protect 2009 is mainly responsible for the malfunction and slow down the computer performance. So, it is very necessary to scan computer using updated anti-spyware softwares on the regular basis.

Wednesday, May 13, 2009

IYogi Press Release: iYogi Acquires Clean Machine Inc.

New York, NY, May 11th, 2009 : iYogi, a global direct to consumer and small business remote technical support provider, today announced it’s acquisition of Clean Machine Inc, a provider of remotely administered PC security and performance management services. Clean Machine will operate as a separate brand under the iYogi services umbrella along with the recently lunched Support Dock (www.supportdock.com) and its comprehensive range of 24/7 technical support services for computers, printers, MP3 players, digital camera, routers, servers and more than 100 software applications. Larry Gordon, Founder of Clean Machine is appointed as the President of Global Channel Sales for iYogi.

iYogi will integrate technology and innovation that Clean Machine Inc. has developed for delivering an enhanced service experience by proactively managing the health and security for PC's and Apple Computers. This acquisition also broadens iYogi's access to key markets through Clean Machine's existing partnerships. Larry Gordon's past experience and successful track record will accelerate iYogi's expansion through his focus on global alliances.

Commenting on the acquisition of Clean Machine Inc., Uday Challu, CEO & Co-founder of iYogi, said,

"This acquisition will help iYogi to enhance our customer experience and extend our market reach to the millions of consumers that are challenged by the increasingly complex technology environment. Clean Machine's proactive maintenance and management of PCs in home and small business environment will be our launch platform for building the next generation of managed services for consumers."
"We are delighted to have Larry spearheading partnerships and global alliances for iYogi. His incredible experience in marketing, sales and building global alliances will help forge partnerships with retailers, multiple service operators, software publishers, original equipment manufacturers (OEM) and other such companies that are at the frontlines for managing tech support issues for consumers and small businesses",

added Challu.

With more than 20 years of experience, Larry Gordon has played a variety of strategic roles in marketing, sales and building alliances. Larry was the Executive Vice President at Capgemini and Kanbay. He was also VP of Global Marketing for Cognizant (Nasdaq: CTSH), a leader in global IT services and Director of Marketing for New York based Information Builders.

"I am excited to join a company that shares a common mission to Clean Machine in creating a global brand for delivering the best technical support to consumers and small businesses. We also share a common approach of utilizing highly skilled talent with leading edge tools, thereby delivering services at incredible price-points, with high margins for our partners",
said Larry Gordon, the newly appointed President of Global Channel Sales at iYogi.

ABOUT IYOGI

Headquartered in Gurgaon, India with offices in New York, USA, iYogi provides personalized computer support for consumers and small businesses in United States, United Kingdom, Canada and Australia. IYogi's 24/7 phone and remote technical assistance, spans across a comprehensive range of technologies we use every day from a wide range of vendors. Utilizing its proprietary technology iMantra , and highly qualified technicians, iYogi delivers amongst the highest benchmarks for resolution and customer satisfaction. iYogi is privately held and funded by SAP Ventures, Canaan Partners, and SVB India Capital Partners. iYogi was recently awarded the Red Herring Global 100 Award, recognizing it as one of the 100 most innovative private companies driving the future of technology. For more information on iYogi and a detailed list of technologies supported, visit: www.iyogi.ca.

ABOUT CLEAN MACHINE

Clean Machine Inc. is a NJ-based and incorporated company that helps consumers and small business owners easily manage and protect their computing environments safely and cost effectively. The company is has a unique, powerful and inexpensive PC concierge service. Specifically, each customer is assigned a highly-trained tech concierge who remotely examines their computer system on a scheduled and very secure basis. The PC concierge will immediately fix software-based problems and prevent new threats to the customer's computing environment including offensive pop-ups, browser redirects and slow performance, and then provides a detailed report. Clean Machine's proprietary Radar(TM) technology (Remote Access Detection Audit and Repair) allows its expert technicians to remotely resolve any problems, eliminating the need for customers to go through the frustrating process of speaking with a tech support expert, and still having to do the work themselves. In other words, the Clean Machine PC concierges do it all. For more information on Clean Machine please visit www.pccleanmachine.com.

CONTACT:

iYogi Contact
Vishal Dhar
President Marketing
iYogi Inc.
Phone: 212 229 0901
Email: vishal@iyogi.net


The Press Release is available at its source: iYogi acquires Clean Machine Inc.