Tuesday, June 30, 2009

How to remove Antivirusbest

Antivirus software one of the Rouge or (fake) antivirus software. This fake antivirus software infected the computer's is the end of june 2009, this fake antiviruss software is caught with trojan , which are downloaded or with the shareware .
So if you computer is infected with trojan , which belongs to the community of this antivirus, these trojan leads to Pop-ups or security alerts , claming the computer is in infection , Thus parasites this antivirusbest , And you need to pay for this .

This antivirus software takes control of your computer, leading to the corruption of the data or other personal information .

So it's always recommended to remove this antivirus software .
We can remove this by following these steps .

Before starting the removal of this fake antivirus software , we need to take the backup of our system and registry . So that if something get wrong we, can restore that files .

1 Block Antivirus-Best.com sites:

Antivirus-Best.com

2 Stop Antivirus-Best.com processes:
Antivirus2009.exe
aBest.exe
C:\Program Files\Antivirus 2009\av2009.exe

3 Remove Antivirus-Best.com files:
c:\WINDOWS\system32\scui.cpl
Uninstall Antivirus 2009.lnk
Antivirus 2009.lnk


4 Get rid of Antivirus-Best.com folders:
C:\Program Files\Antivirus 2009

5 Unregister Antivirus-Best.com registry keys:
By opening the Registor editior , by typing the regedit in the command prompt.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\15358943642955870504508370025739
HKEY_LOCAL_MACHINE\SOFTWARE\Antivirus
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Antivirus\ProgramFiles\Antivirus 2009\Antvrs.exe
HKEY_CURRENT_USER\Software\Antivirus

By removing all these antivirus files and registry entries we can remove this fake antivirus software, make our computer safe against malicious programs .

Monday, June 29, 2009

F-Secure Anti-Virus 2003

F-secure Anti-Virus 2003 is a fast anti-virus guard, but given its somewhat narrow scope is rather expensive. Although its price range of 53 U.S. Dollar for the Home / Small Office version (F-Secure AV 2003) up to 80 U.S. dollars for the Enterprise version goes, provides F-Secure Anti-Virus fewer amenities than, for example McAfee VirusScan 7.0. If unattended, for example, virus scans using a scheduler to perform, you have a free add-on F-Secure download, and install it. The same also applies to the firewall. And the review of incoming and outgoing e-mails in real time is a function of the competing offers to F-Secure, however, has not integrated.
Positive to mention is the dominant user interface easy to F-Secure Anti-Virus and the minimal impact of its scanning engine on system resources. With regard to its stress on the system, this is one of the easiest so far tested virus scanners. Who just a quick scan antivirus needs is with F-Secure Anti-Virus well advised. Otherwise, offer programs like PC-cillin or VirusScan better and more complete offer.

Setup & interface
The installation of F-Secure Anti-Virus on a download is easy, for modem users but time consuming. The setup requires two larger downloads (6.1 MB and 13.6 MB), the installation process considerably slower. So only the needed 13 MB download on the large 56-KB modem-one hours. For broadband users, this is obviously not an issue, and if once the download is complete, the setup is a breeze. Instead, you can download a CD version.

F-Secure Anti-Virus 2003 provides a tidy, easy to use interface, without the typical clutter of icons and menus altogether, the other anti-virus programs which are often.

After a few obligatory clicks is the completed installation. F-Secure Anti-Virus after installation requires only a few (if any) fine. With its default settings, the program is capable of malicious code throughout the system to automatically remove what is good, but it can also configure it so that instead all the suspicious files renames or deletes.

The designers of the program interface deserve praise that they have succeeded in the surface easy to keep. A similar website homepage replaced the usual icons and drop-down menus, making the surface and clear up confusion. The virus signatures are automatically updated by the user - a refreshing change compared to the constant annoying prompts some other antivirus programs.

Features
F-Secure provides a good, simple scanning engine available, but not much more, unless one is prepared, additional components such as a scheduler and a firewall separately download and install it. The lack of an integrated firewall is certainly understandable, but not even include the market-leading Norton AntiVirus 2003 product such. A scheduler should be standard equipment and are not an optional extra, even if F-Secure believes that its real-time scanner, which examines all files when the operating system is accessing the traditional, pre-planned virus scans unnecessary. Maybe even the true, the test team but prefers the safety and redundancy scheduled scans and wishes to their integration into the program.

F-Secure Antivirus provides basic functions, such as the ability to perform manual scans , for automated scans you have to install a separate utility.

Performance
F-Secure Anti-Virus produced in the tests only a small slowing of system performance, and this point was in par with McAfee VirusScan 7.0 and EZ Antivirus, but uses less system resources than the somewhat slow or Norton AntiVirus 2003, Panda Antivirus Platinum 7.0. Indeed, F-Secure Anti-Virus in this category is only one percentage point below the top PC-cillin.

To test the effects of F-Secure on the system performance ZDNet Labs used SysMark 2002 by BAPCO, a benchmark program that is recognized as the industry standard is. The category of Internet Content Creation SysMark measures the performance of a desktop, on the ready-to-use applications such as Adobe Photoshop, Microsoft Windows Media Encoder, and Macromedia Dreamweaver running. (In the test, the category Office Productivity not performed, because the program includes McAfee VirusScan 5:13.)
In a test of the overall scan speed needed F-Secure, however, 2.2 minutes for a 1 GB big list to be reviewed. In comparison, EZ Antivirus stood with an average of 1.1 minutes for the review of a 1 GB big list at the top. McAfee VirusScan 7.0 required an average of 1.7 minutes, while Panda and Norton each required 3.1 minutes slow. With an average load time of 65.1 seconds reached F-Secure, however, only the worst possible time for the start of the program is needed
Service and Support

For its customers, the categories of home users and small businesses are assigned, provides F-Secure no phone service. (The only other anti-virus program with a similar policy without telephone support is Panda Antivirus Platinum.) Positive to mention is that of F-Secure offer free support via e-mail. The company promises to e-mail inquiries within two to eight hours to respond - quickly, compared with its competitors - and in the tests was also observed that promise. The website of the company also offers an adequate supply of software patches, troubleshooting tips and other useful anti-virus info

First safety tests positive for Microsoft Security Essentials

A first test on a sample reduced by viruses, conducted by independent lab AV-Test, highlights good detection capabilities of the new free antivirus Microsoft Security Essentials.

While it remains a partial examination, but the conclusions are generally positive for the Microsoft Security Essentials, a new antivirus firm Redmond, still in beta.

To test the capacity of detection and disinfection software, AV-Test GmbH, known for its comparative effectiveness of antivirus software, Microsoft faces a Security Essentials for a sample of approximately 3,200 currently active malware (viruses, bot, horses Trojan and worms).

According to the leader of the independent laboratory, Andreas Marx, quoted by The Register, Microsoft antivirus correctly identified and treated all infected files. A good point for the application, especially since several antivirus market are still unable to pass the test, said Andreas Marx.

Microsoft Security Essentials effective virus and rootkit

AV-Test GmbH has also assessed the capacity of the software has correctly identified threats submitting false positives, ie files here frequently detected as a virus yet safe. An important test since the quarantining or deleting a legitimate file may lead to the failure of computer or malfunctioning of certain applications.

For this second analysis, Security Essentials Microsoft has also responded well. Thus, none of these files has been an alert. Finally, with programs designed to evade anti-virus engines by hiding their presence, rootkits, security software Microsoft also avoids the failure. "We did not find any reason to complain," said Andreas Marx.

However, this partial analysis is not sufficient to conclude that the good performance of Microsoft Security Essentials, as explained AV-Test, which states that tests have yet been conducted on the samples, including rootkits.

No behavioral analysis module integrated

The next analysis will focus on samples of this time hundreds of thousands of malicious programs. AV Comparatives, which will submit Microsoft Security Essentials for analysis in August, use a little more than two million codes, including viruses specially developed for testing and unknown publishers of antivirus software.

And perhaps this last point that a problem for the anti-Microsoft. It does indeed no detection module behavioral and relies solely on the basis of signatures.

To be effective, this type of virus should provide frequent updates of the signatures. But Microsoft Security Essentials is not the only one without this technology, said AV-Test. The behavioral analysis is a feature more common among security suites, that Morro (the previous name of the software from Microsoft) because it is not just an antivirus.

Friday, June 26, 2009

How to remove W32/Nachi.worm

This W32/Nachi.worm is a type of computer virus which spreads without user action and that distributes complete copies of itself across networks (such as the Internet). Generally known as "Nachi," this new worm exploits the vulnerabilities that were addressed by Microsoft Security Bulletins MS03-026 (823980) and MS03-007 (815021) to spread itself over networks by using open Remote Procedure Call (RPC) ports or the World Wide Web Distributed Authoring and Versioning (WebDAV) protocol that is supported by Internet Information Server (IIS) 5.0.
It is also know as .
W32.Welchia.worm (NAV)
W32/Nachi!tftpd
W32/Nachi.worm.a
WORM_MSBLAST.D (Trend)
Installation
To ensure only one instance of the worm on the victim machine, a mutex of the following name is created:
RpcPatch_Mutex
The virus installs itself within a WINS directory in the Windows System directory:
C:\WINNT\SYSTEM32\WINS\DLLHOST.EXE (10,240 bytes)
The virus attempts to copy the TCP/IP trivial file transfer daemon (TFTPD.EXE) binary from the dllcache on the victim machine to this directory also, renaming it:
C:\WINNT\SYSTEM32\WINS\SVCHOST.EXE
Note: If TFTPD.EXE is not present on the target machine, this copy will fail. TFTPD.EXE only exists by default on specific OSes.
The following services are installed:
1. RpcPatch Set to run the installed copy of the worm (DLLHOST.EXE)
Display name: "WINS Client"
2. RpcTftpd Set to run the copy of the TFTPD application (SVCHOST.EXE)
Display name: "Network Connections Sharing"
Symptoms -
· large volumes of ICMP traffic in network
· existence of the files and Windows services detailed above
To prevent this virus from infecting your computer, follow these steps:
1. Enable the Internet Connection Firewall feature (ICF) in Windows XP, in Windows Server 2003, Standard Edition, and in Windows Server 2003, Enterprise Edition; or use Basic Firewall, Microsoft Internet Security and Acceleration (ISA) Server 2000, or a third-party firewall to block TCP ports 135, 139, 445, and 593; UDP ports 69 (TFTP), 135, 137, and 138; and TCP port 80.
To enable the ICF in Windows XP or Windows Server 2003, follow these steps:
1. Click Start, and then click Control Panel.
2. In Control Panel, double-click Networking and Internet Connections, and then click Network Connections.
3. Right-click the connection where you want to enable ICF, and then click Properties.
4. Click the Advanced tab, and then click to select the Protect my computer or network by limiting or preventing access to this computer from the Internet check box.
Note Some dial-up connections may not appear in the Network Connection folders. For example, AOL and MSN dial-up connections may not appear. Sometimes, you can use the following procedure to enable ICF for a connection that does not appear in the Network Connection folder. If these steps do not work, contact your Internet service provider (ISP) for information about how to firewall your Internet connection.
5. Start Internet Explorer.
6. On the Tools menu, click Internet Options.
7. Click the Connections tab, click the dial-up connection that you use to connect to the Internet, and then click Settings.
8. In the Dial-up settings area, click Properties.
9. Click the Advanced tab, and then click to select the Protect my computer or network by limiting or preventing access to this computer from the Internet check box.

Tuesday, June 23, 2009

Morro project: free antivirus from Microsoft

Microsoft one of the giants in the field of Operating system softwares and also in application software has decided to try to their hands in security softwares ( ie the antivirus software)
Microsoft has confirmed that his future was now free antivirus , which has entered in its final phase of testing. With basic security functionalities, it should succeed OneCare Live by the end of the month.As previously planed by microsoft, free antivirus can be downloaded from microsoft website,. This free antivirus software is known as the Morro code, it is a software suite that will offer protection against viruses, spyware and other malicious software.Basic functions identical to those found in products of entry-level of industry heavyweights such as McAfee and Symantec, or with competitors like free Avast or AntiVir.With Morro, Microsoft aims explicitly emerging countries like Brazil, China and India. One way to quickly gain market share.It remains to be seen how this utility will be released. Microsoft will assign it to the temptation to include it in Windows 7 or to offer to all its OS via Windows Update? This is unlikely as the risk of prosecution for abuse of dominant position are obvious.

Monday, June 22, 2009

WAYS TO BE VIRUS-FREE

Development of computer and Internet technology ,leads to great revolution in world of information technology , and helped in making this world as a global village, these technologies boomed the Education and Business structure, now a days students can use Internet to study about the latest technologies aroung any part of the world , even business can expanded and managed world wide using these smile technologies .

But on the other side these technologies also leads to the several threats such as Virus , worm , spy ware and many other , all these malicious programs can cause a serious threats to our personal data and personal information such as credit card information , netbanking password

All these malicious programs are programs which are used to attack the file structure of the windows based operating system .
But we can avoid all computer related threats by following some of the basic steps .
1 Protect macros in ms Word, Excell and Powerpoint :
Some virus uses macros (ie stored commands ) for malicious attack, these malwares attack macros and change file types from the text files or spreadsheets in to templates, it also deletes the files from the computer .
2 Don't download from public news groups :
Its always recommended not to download form unsafe websites, so is the public news groups these groups are mainly used by hackers .
3 Use strong password :
there are several malicious programs which attacks the weak password, ie application having weak password, so its always recomened to use proper and strong password.
4 Backup files and folder.
To be on the safer hand we should always backup our data.
5 Download application software.
There is a application package called as Microsoft baseline security analyse (MBSA), this application will scan your computer for missing hotfixes, it will work for windows 2000 and xp home and professional .




Friday, June 19, 2009

(Microsoft security Essentials 1.0)

Microsoft one of the leading giant in operating system softwares, Enter into the field of security softwares , as microsoft is now ready for one of its up coming Free antivirus code name microsoft Morro

This antivirus software is compatible with windows 7, windows vista sp2/ sp1/RTM and windows XP Sp3.

Micorsoft security essentials is the name of that free antivirus software which was earlier called as microsoft morro

The beta version will be limited to 75000 downloads and for countries like USA, Israel and Brazil ie Where core development team is available. in the month of July the beta version of this antivirus software is available in China


Microsoft security essential (Antivirus software cann't be installed on the Pirated copies of windows operating system, For that there is a new concept added to this antivirus software called as " validation ". For this we need to Click on the Validate button, it will valiadiate whether windows operating system is Genuine or not, if windows is genuine then this antivirus software will install on that computer .

It has several features such as schedule scanning, real time protection and microsoft spynet.



Download for this free antivirus software is really light weight for windows 7 its 3.8 MB in size and for windows 7 its 7.7 MB.

For installatin we need to accept the licence aggrement.Installation of this antivirus software will ask for the updating antivirus software .


Wednesday, June 17, 2009

How to remove W32/Nachi.worm

This W32/Nachi.worm is a type of computer virus which spreads without user action and that distributes complete copies of itself across networks (such as the Internet). Generally known as "Nachi," this new worm exploits the vulnerabilities that were addressed by Microsoft Security Bulletins MS03-026 (823980) and MS03-007 (815021) to spread itself over networks by using open Remote Procedure Call (RPC) ports or the World Wide Web Distributed Authoring and Versioning (WebDAV) protocol that is supported by Internet Information Server (IIS) 5.0.
It is also know as .
W32.Welchia.worm (NAV)
W32/Nachi!tftpd
W32/Nachi.worm.a
WORM_MSBLAST.D (Trend)
InstallationTo ensure only one instance of the worm on the victim machine, a mutex of the following name is created:
RpcPatch_Mutex
The virus installs itself within a WINS directory in the Windows System directory:
C:\WINNT\SYSTEM32\WINS\DLLHOST.EXE (10,240 bytes)
The virus attempts to copy the TCP/IP trivial file transfer daemon (TFTPD.EXE) binary from the dllcache on the victim machine to this directory also, renaming it:
C:\WINNT\SYSTEM32\WINS\SVCHOST.EXE
Note: If TFTPD.EXE is not present on the target machine, this copy will fail. TFTPD.EXE only exists by default on specific OSes.
The following services are installed:
RpcPatch Set to run the installed copy of the worm (DLLHOST.EXE)
Display name: "WINS Client"
RpcTftpd Set to run the copy of the TFTPD application (SVCHOST.EXE)
Display name: "Network Connections Sharing"
Symptoms -
large volumes of ICMP traffic in network
existence of the files and Windows services detailed above
To prevent this virus from infecting your computer, follow these steps:
Enable the Internet Connection Firewall feature (ICF) in Windows XP, in Windows Server 2003, Standard Edition, and in Windows Server 2003, Enterprise Edition; or use Basic Firewall, Microsoft Internet Security and Acceleration (ISA) Server 2000, or a third-party firewall to block TCP ports 135, 139, 445, and 593; UDP ports 69 (TFTP), 135, 137, and 138; and TCP port 80. To enable the ICF in Windows XP or Windows Server 2003, follow these steps:
Click Start, and then click Control Panel.
In Control Panel, double-click Networking and Internet Connections, and then click Network Connections.
Right-click the connection where you want to enable ICF, and then click Properties.
Click the Advanced tab, and then click to select the Protect my computer or network by limiting or preventing access to this computer from the Internet check box.
Note Some dial-up connections may not appear in the Network Connection folders. For example, AOL and MSN dial-up connections may not appear. Sometimes, you can use the following procedure to enable ICF for a connection that does not appear in the Network Connection folder. If these steps do not work, contact your Internet service provider (ISP) for information about how to firewall your Internet connection.
Start Internet Explorer.
On the Tools menu, click Internet Options.
Click the Connections tab, click the dial-up connection that you use to connect to the Internet, and then click Settings.
In the Dial-up settings area, click Properties.
Click the Advanced tab, and then click to select the Protect my computer or network by limiting or preventing access to this computer from the Internet check box.

Thursday, June 11, 2009

Win32/Hotbar champion software parasites on the web in 2007 .


Microsoft has in the second half of 2007 increased by 66.7% of detections of potentially unwanted software "compared to the previous semester. Information obtained via the removal tool for malicious software (MSRT) is included with Windows XP and Vista, fitted to a base of 450 million PCs in the world.
In total, 129.5 million of these software parasites were detected between 1 July and 31 December 2007. Win32/Hotbar has had the largest volume of attempted infections. According to Microsoft, it is polluting P2P networks as files bombs and attempting to infect systems via spam. This program installs a dynamic toolbar in Internet Explorer and displays pop-up ads, chosen for the analysis of Internet activity.
It contains the buttons differ depending on the current Web page and keywords in it. Click a button on the toolbar can display an advertiser's Web site or a search fee. Hotbar also installs graphics skins for Internet Explorer, Outlook and Outlook Express.
This parasite may collect user information, download and install updates or any other code automatically from its servers, Microsoft notes. The antivirus market or Microsoft tool (MSRT) normally block the program, dated April 2007 and was therefore included in the signature of most viruses. It must of course have a day to protect them. But this does not prevent them clearly to conduct a large number of attempts of infection, according to Microsoft.