tag:blogger.com,1999:blog-51615502581285189692024-03-13T21:21:13.158-07:00Microsoft Security Essentials<b><p>Get Expert, Affordable Help For Your Computer Problems
Call Us Toll Free 1-877-452-9201 </p></b>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.comBlogger53125tag:blogger.com,1999:blog-5161550258128518969.post-54516697361616337972012-02-13T02:22:00.000-08:002012-02-13T02:23:47.540-08:00New Version of Microsoft Security Essentials - Makes more Improvements<div dir="ltr" style="text-align: left;" trbidi="on"><div class="MsoNormal" style="text-align: justify;"><span style="font-family: "Times New Roman","serif";">This version of Microsoft Security Essentials from <b style="mso-bidi-font-weight: normal;"><a href="http://www.vtechsquad.com/microsoft-support.html">Microsoft support</a></b> includes the following new features and enhancements to better help protect your computer from threats:</span></div><div class="MsoNormal" style="text-align: justify;"><br />
</div><div class="MsoNormal" style="text-align: justify;"><b style="mso-bidi-font-weight: normal;"><span style="font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 115%;">Windows Firewall integration:</span></b><span style="font-family: "Times New Roman","serif";"> Security Essentials setup enables you to turn on or off Windows Firewall. Now when you install Security Essentials, the installation wizard verifies that Windows Firewall is turned on. If you have intentionally turned off Windows Firewall, you can avoid turning it on by clearing a check box. You can change your Windows Firewall settings at any time via the System and Security settings in Control Panel.</span></div><div class="MsoNormal" style="text-align: justify;"><br />
</div><div class="separator" style="clear: both; text-align: center;"><a href="http://techycentral.com/wp-content/uploads/2011/05/Forefront-Endpoint-Protection-2012-beta.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="200" src="http://techycentral.com/wp-content/uploads/2011/05/Forefront-Endpoint-Protection-2012-beta.jpg" width="400" /></a></div><div class="MsoNormal" style="text-align: justify;"><br />
</div><div class="MsoNormal" style="text-align: justify;"><br />
</div><div class="MsoNormal" style="text-align: justify;"><b style="mso-bidi-font-weight: normal;"><span style="font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 115%;">Network Inspection System:</span></b><span style="font-family: "Times New Roman","serif";"> This feature enhances real-time protection by inspecting network traffic to help proactively block exploitation of known network-based vulnerabilities. Network Inspection System works with real-time protection to better protect you against network-based attacks by greatly reducing the timespan between vulnerability disclosures and update deployment from weeks to a few hours.</span></div><div class="MsoNormal" style="text-align: justify;"><br />
</div><div class="MsoNormal" style="text-align: justify;"><b style="mso-bidi-font-weight: normal;"><span style="font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 115%;">New and improved protection engine:</span></b><span style="font-family: "Times New Roman","serif";"> The updated engine offers enhanced detection and cleanup capabilities with better performance. Under the hood of Security Essentials is its award-winning protection engine that is updated regularly. The engine is backed by a team of antimalware researchers from the Microsoft Malware Protection Center, providing responses to the latest malware threats 24 hours a day.</span></div></div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com1tag:blogger.com,1999:blog-5161550258128518969.post-39075173137871944412012-02-09T03:10:00.000-08:002012-02-15T00:59:46.553-08:00What's new in Microsoft Security Essentials<div dir="ltr" style="text-align: left;" trbidi="on"><br />
<div class="MsoNormal" style="text-align: justify;">Under the hood of Microsoft Security Essentials is its award-winning protection engine that is updated regularly. The engine is backed by a team of antimalware researchers from the Microsoft Malware Protection Center, <b style="mso-bidi-font-weight: normal;"><a href="http://www.vtechsquad.com/virus-removal.html">virus removal</a></b> & providing responses to the latest malware threats 24 hours a day.</div><div class="MsoNormal" style="text-align: justify;"><br />
</div><div class="MsoNormal" style="text-align: justify;">When you install Microsoft Security Essentials by <b style="mso-bidi-font-weight: normal;"><a href="http://www.vtechsquad.com/microsoft-support.html">Microsoft support</a></b>, the installation wizard verifies that Windows Firewall is turned on. If you have intentionally turned off Windows Firewall, you can avoid turning it on by clearing a check box. You can change your Windows Firewall settings at any time via the System and Security settings in Control Panel.</div><div class="MsoNormal" style="text-align: justify;"><br />
</div><div class="separator" style="clear: both; text-align: center;"><a href="http://www.downloadatoz.com/resources/201011/10/imgs/micro_324x357.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="http://www.downloadatoz.com/resources/201011/10/imgs/micro_324x357.jpg" /></a></div><div class="MsoNormal" style="text-align: justify;"><br />
</div><div class="MsoNormal" style="text-align: justify;"><br />
</div><div class="MsoNormal" style="text-align: justify;">Microsoft Security Essentials includes the following new features and enhancements to better help protect your PC from threats-</div><div class="MsoNormal" style="text-align: justify;"><br />
</div><div class="MsoNormal" style="text-align: justify;"><b style="mso-bidi-font-weight: normal;">Windows Firewall integration:</b> You can turn Windows Firewall on or off using Microsoft Security Essentials.</div><div class="MsoNormal" style="text-align: justify;"><br />
</div><div class="MsoNormal" style="text-align: justify;"><b style="mso-bidi-font-weight: normal;">Network inspection system: </b> This feature enhances real-time protection by inspecting network traffic to help block exploitation of known network-based vulnerabilities.</div><div class="MsoNormal" style="text-align: justify;"><br />
</div><div class="MsoNormal" style="text-align: justify;"><b style="mso-bidi-font-weight: normal;">New and improved protection engine:</b> The updated engine offers enhanced detection and cleanup capabilities with better performance.</div></div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com0tag:blogger.com,1999:blog-5161550258128518969.post-66703387505437825472012-02-03T01:40:00.000-08:002012-02-15T00:59:51.692-08:00What are the limitations of antivirus software<div dir="ltr" style="text-align: left;" trbidi="on"><br />
<div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"><span style="font-family: "Times New Roman","serif"; font-size: 12pt;">Anti-virus software depends on the signature or pattern files that contain the latest virus information. However, not all viruses, especially the new ones, are included in the signature files. This limits the capability of anti-virus software to catch new viruses.</span></div><div class="MsoNormal" style="background: white; line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"><span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt;"><br />
</span><span style="font-family: "Times New Roman","serif"; font-size: 12pt;">Generally, it will the fundamental protection tasks for all of us, for example <b style="mso-bidi-font-weight: normal;"><a href="http://www.vtechsquad.com/virus-removal.html">online virus removal</a></b> and defense, quarantine, and identity protection, among many more. A substantial quantity of anti-virus software programs is available both on the internet and in Compact disc contractors. Each kind of anti-virus software has features unique from one another, for example malware obstructing, adware and spyware defense, Internet surfing protection, and registry cleanup. However, computer customers shouldn’t depend positioned on the anti-virus during <b><a href="http://www.vtechsquad.com/">online technical support</a></b> and it is abilities.</span><span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt;"></span></div><div class="MsoNormal" style="background: white; line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"><br />
</div><div class="separator" style="clear: both; text-align: center;"><a href="http://www.usenix.org/event/sec08/tech/full_papers/oberheide/oberheide_html/avtime.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="http://www.usenix.org/event/sec08/tech/full_papers/oberheide/oberheide_html/avtime.png" /></a></div><div class="MsoNormal" style="background: none repeat scroll 0% 0% white; line-height: normal; margin-bottom: 0.0001pt; text-align: justify;"><br />
</div><div class="MsoNormal" style="background: none repeat scroll 0% 0% white; line-height: normal; margin-bottom: 0.0001pt; text-align: justify;"><br />
</div><div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"><span style="font-family: "Times New Roman","serif"; font-size: 12pt;">Anti-virus software has different features. The most basic anti-virus software, especially free programs, can be limited because they can protect computers for certain virus variants only but will not protect computers for the more sophisticated ones. When looking for anti-virus software, it is important to get the one with the most comprehensive features, including anti-spyware.</span></div><div class="MsoNormal" style="background: white; line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"><span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt;"><br />
</span><span style="font-family: "Times New Roman","serif"; font-size: 12pt;">To be able to identify infections, an anti-virus needs pattern files which contain the newest and up-to-date details about the various infections which exist. However, the amount of infections appears to improve at greater times compared to anti-virus pattern files. What this means is that certain limitation of the anti-virus may be the slowness if this involves the update and recognition of recently-conceptualized infections.</span></div><div class="MsoNormal" style="background: white; line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"><br />
</div><div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"><span style="font-family: "Times New Roman","serif"; font-size: 12pt;">Anti-virus software is also limited because it cannot stop exploits, which attack vulnerabilities or security flaws inherent in the operating systems. If a computer is not patched from Windows Update, no matter how many times an anti-virus cleans an exploit or <a href="http://www.vtechsquad.com/">virus removal</a>, there's a good chance it will recur because the operating system itself has security holes, which the anti-virus cannot protect.</span></div><div class="MsoNormal" style="background: white; line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"><span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt;"><br style="mso-special-character: line-break;" /> <br style="mso-special-character: line-break;" /> </span></div><div class="MsoNormal" style="text-align: justify;"><br />
</div><div class="MsoNormal" style="background: white; line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"><span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt;"><br style="mso-special-character: line-break;" /> <br style="mso-special-character: line-break;" /> </span></div><div class="MsoNormal" style="background: white; line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"><span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt;"><br style="mso-special-character: line-break;" /> <br style="mso-special-character: line-break;" /> </span></div><div class="MsoNormal" style="background: white; line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"><span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt;"><br />
<br style="mso-special-character: line-break;" /> <br style="mso-special-character: line-break;" /> </span></div><div class="MsoNormal" style="background: white; line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"><br />
</div><div class="MsoNormal" style="background: white; line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"><br />
</div><div class="MsoNormal" style="background: white; line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"><br />
</div><div class="MsoNormal" style="text-align: justify;"><br />
</div><div class="MsoNormal" style="text-align: justify;"><br />
</div></div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com0tag:blogger.com,1999:blog-5161550258128518969.post-91523487206998128272012-02-02T01:17:00.000-08:002012-02-15T00:59:59.316-08:00Fix the IE 8 Security Warning<div dir="ltr" style="text-align: left;" trbidi="on"><br />
<div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;"><span style="font-family: "Times New Roman","serif"; font-size: 12pt;">Internet Explorer 8 is the last version of Internet Explorer by <b style="mso-bidi-font-weight: normal;"><a href="http://www.vtechsquad.com/">Microsoft support</a></b> that works in Windows XP. Its successor, Internet Explorer 9, works in <a href="http://www.vtechsquad.com/">Windows 7 support</a> and Vista. Internet Explorer will interrupt a download when using HTTP based resources on a secure HTTPS page by displaying a security warning. You might be getting this warning message because the website relies on non-secure images, CSS or JavaScript. You will be prompted whether you want to view only the Web page content that was delivered securely. However, you could easily get rid of that warning pop-up for good.</span></div><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;"><br />
</div><div class="separator" style="clear: both; text-align: center;"><a href="http://images.sixrevisions.com/2010/10/16-07_security_warning.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="246" src="http://images.sixrevisions.com/2010/10/16-07_security_warning.png" width="320" /></a></div><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;"><br />
</div><div class="MsoNormal" style="background: white; line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;"><span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt;"><br />
<b style="mso-bidi-font-weight: normal;"><u>Steps:</u></b></span></div><div class="MsoNormal" style="background: none repeat scroll 0% 0% white; line-height: normal; margin-bottom: 0.0001pt;"><br />
</div><div class="MsoNormal"><b style="mso-bidi-font-weight: normal;"><u><span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt;"></span></u></b></div><div class="MsoNormal"><b><u><span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt;"></span></u></b></div><div class="MsoNormal"><b><u><span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt;"></span></u></b></div><div class="MsoNormal"><b><u><span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt;"></span></u></b></div><div class="MsoNormal"><b><u><span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt;"><span style="text-decoration: none;"></span></span></u></b><span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 115%;">1.</span> <span style="font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 115%;">From the "Tools" menu, select "Internet Options." The Internet Options dialog appears.</span></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 115%;">2. </span><span style="font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 115%;">Select the "Security" tab. Click on the "Custom Level" button toward the bottom. The Security Settings dialog appears.</span></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 115%;">3. </span><span style="font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 115%;">Scroll down to the "Miscellaneous" section. From the "Display mixed content" option, click the radio button next to "Enable." The security warning box will no longer prompt you.</span></div><div class="MsoNormal" style="background: white; line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;"><span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt;"><br style="mso-special-character: line-break;" /> <br style="mso-special-character: line-break;" /> </span></div><div class="MsoNormal" style="background: white; line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;"><br />
</div><div class="MsoNormal" style="background: white; line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;"><span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt;"><br style="mso-special-character: line-break;" /> <br style="mso-special-character: line-break;" /> </span></div><div class="MsoNormal" style="background: white; line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;"><span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt;"><br style="mso-special-character: line-break;" /> <br style="mso-special-character: line-break;" /> </span></div><div class="MsoNormal"><br />
</div></div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com0tag:blogger.com,1999:blog-5161550258128518969.post-71479229394817958282012-01-30T22:02:00.000-08:002012-02-15T01:00:18.767-08:00Latest McAfee Data Loss Prevention Guide<div dir="ltr" style="text-align: left;" trbidi="on"><br />
<div class="MsoNormal">In this <b style="mso-bidi-font-weight: normal;"><a href="http://www.vtechsquad.com/mcafee-support.html">McAfee Technical support</a></b> blog you will find the use McAfee data loss prevention program and it also useful for <b style="mso-bidi-font-weight: normal;"><a href="http://www.vtechsquad.com/virus-removal.html">online virus removal</a></b>. There is nothing that strikes panic in the heart of computer users like lost data. When it's gone there is nothing you can do about it. There are many data loss prevention programs available and McAfee is one of the newest. McAfee has joined the fray and is hoping to be your data loss prevention program supplier.</div><div class="MsoNormal"><br />
</div><div class="separator" style="clear: both; text-align: center;"><a href="http://www.channelinsider.com/images/stories/slideshows/DLP_Lead_Vendors/DLP_SS_005.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="http://www.channelinsider.com/images/stories/slideshows/DLP_Lead_Vendors/DLP_SS_005.jpg" /></a></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><b style="mso-bidi-font-weight: normal;"><u>Steps:</u></b></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><b style="mso-bidi-font-weight: normal;">1.</b> Check your system to ensure that it meets the minimum system requirements such as: 100 Mbit LAN serving all endpoints and the DLP DB server, minimum 80 GB Hard Disk and Microsoft Windows 2003 or later.</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><b style="mso-bidi-font-weight: normal;">2.</b> Install MacAfee data loss prevention software to your network. Connect to all end points including laptops and thus get great protection.</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><b style="mso-bidi-font-weight: normal;">3.</b> Set the system to the level of data security you desire. Keep information from being downloaded onto any removable media. Control how and when data is sent from anywhere on your network.</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><b style="mso-bidi-font-weight: normal;">4.</b> Use McAfee data loss prevention software to keep track of usage data for superiors or network managers.</div><div class="MsoNormal"><b style="mso-bidi-font-weight: normal;">5.</b> Block, filter and monitor all information on your network and know what programs and information is being used at any given time.</div><div class="MsoNormal"><br />
</div><div class="MsoNormal">Also find most popular info related McAfee like <b style="mso-bidi-font-weight: normal;"><a href="http://microsoft-support-squad.blogspot.in/2012/01/how-to-add-trusted-application-in.html">How to add a trusted application in McAfee >></a> </b>and more hot topics.</div></div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com0tag:blogger.com,1999:blog-5161550258128518969.post-84930848111245202742012-01-29T21:30:00.000-08:002012-02-15T01:00:26.238-08:00Tips to fix a Facebook Virus<div dir="ltr" style="text-align: left;" trbidi="on"><br />
<div class="MsoNormal">Did someone hack your Facebook account? This activity can easily be detected if you see status updates that you did not post to your public Facebook wall. Status updates can be links to spam sites or virus downloading websites that infect anyone who clicks on them. Cleaning out your Facebook profile and computer is essential in getting rid of the <b style="mso-bidi-font-weight: normal;"><a href="http://www.vtechsquad.com/virus-removal.html">online virus removal</a></b>, and protecting your computer from future invasions. In this <b style="mso-bidi-font-weight: normal;"><a href="http://www.vtechsquad.com/virus-removal.html">Microsoft support</a></b> blog, sharing the basic tips to safe your Facebook account from virus/threads.</div><div class="MsoNormal"><br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://plus.evozi.com/wp-content/uploads/2011/07/Facebook.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="http://plus.evozi.com/wp-content/uploads/2011/07/Facebook.jpg" /></a></div><br />
<br />
</div><div class="MsoNormal"><b style="mso-bidi-font-weight: normal;"><u>Steps:</u></b></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><b style="mso-bidi-font-weight: normal;">1.</b> Update your anti-virus and anti-spyware softwares for the latest definitions and virus detection.</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><b style="mso-bidi-font-weight: normal;">2.</b> Run anti-virus software to check the entire "C" drive (main computer hard drive). Run anti-spyware software once the anti-virus program has completed its scan. Delete any viruses or malicious files detected by either program.</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><b style="mso-bidi-font-weight: normal;">3.</b> Login to your Facebook account and change your password to something difficult. Use a combination of letters, numbers and symbols to form a hard-to-guess password.</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><b style="mso-bidi-font-weight: normal;">4.</b> Go through your Facebook friend list and remove any individuals that you do not know; they can be online strangers that added you as friend to gain access to your profile. Remove any friends that appear to spam or have fake Facebook accounts (sexy or inappropriate pictures, constant spam link in status updates, and questionable content are some signs to look for).</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><b style="mso-bidi-font-weight: normal;">5.</b> Remove any status updates on your Facebook profile that appear to be virus links. Click on "Profile" - "Wall" and hover over the questionable status update. Click on "Remove" button that shows up when hovering over the update. Confirm that the status should be deleted.</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><b style="mso-bidi-font-weight: normal;"><a href="http://technical-support-squad.blogspot.com/2012/01/how-to-remove-memory-resident-virus-in.html">How to remove a memory resident virus in Widows Xp >></a></b></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><br />
</div></div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com0tag:blogger.com,1999:blog-5161550258128518969.post-89056409878383083742012-01-27T03:05:00.000-08:002012-02-15T01:00:33.260-08:00How to remove a virus that renames & corrupts the users files<div dir="ltr" style="text-align: left;" trbidi="on"><br />
<div class="MsoNormal">A seemingly invisible Trojan horse has infiltrated your computer, which is now slow and weak. Internally, this duplicating virus is wreaking havoc on your system, corrupting and renaming files and threatening your personal security. This blog will help you how to <b style="mso-bidi-font-weight: normal;"><a href="http://www.vtechsquad.com/virus-removal.html">online virus removal</a> </b>or how to <b style="mso-bidi-font-weight: normal;"><a href="http://www.vtechsquad.com/virus-removal.html">virus removal</a></b> for a critical virus that corrupting & renaming the files.</div><div class="MsoNormal"><br />
</div><div class="MsoNormal">If you have antivirus software installed and your Windows operating system is still infected, a few steps can ensure that you are back up and running a healthy PC. This includes disconnecting from the Internet, disabling System Restore and running a full system scan within the Safe Mode environment.</div><div class="MsoNormal"><br />
</div><div class="separator" style="clear: both; text-align: center;"><a href="http://60-thip.com/wp-content/uploads/2011/10/Copy-of-Shortcut.gif" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="http://60-thip.com/wp-content/uploads/2011/10/Copy-of-Shortcut.gif" /></a></div><div class="MsoNormal"></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><b style="mso-bidi-font-weight: normal;">Removing a Virus</b></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><b style="mso-bidi-font-weight: normal;">1.</b> Double-check that your virus definitions are up-to-date before disconnecting from the Internet. Current and registered antivirus applications are self-updating as long as you are connected to the Internet.</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><b style="mso-bidi-font-weight: normal;">2.</b> Configure your antivirus software settings to scan all files so that no data is excluded, which may be why the virus was not detected in the first place.</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><b style="mso-bidi-font-weight: normal;">3.</b> Temporarily disable System Restore. Click "Start," right-click "My Computer" and then click "Properties." On the "System Restore" tab, check Turn off System Restore and click "Apply." Select "Yes" to confirm, and then click "OK."</div><div class="MsoNormal"><br />
</div><div class="MsoNormal">This step is crucial because a virus can damage system restore data, and Windows prevents antivirus software from accessing and repairing these files.</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><b style="mso-bidi-font-weight: normal;">4.</b> Start your computer in Safe Mode. This will ensure that no programs are running when you subsequently run a full system scan. First, exit all active applications. Then navigate to the "Start" button, click on "Run," type "msconfig" into the box that appears and click "OK" to open the System Configuration Utility. Select the Boot.ini tab, check the "/Safeboot" box and click "OK." You will receive a prompt to "Restart" your computer in Safe Mode.</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><b style="mso-bidi-font-weight: normal;">5.</b> Run a full system virus scan in Safe Mode, which will detect, remove and quarantine all viruses.</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><b style="mso-bidi-font-weight: normal;">6.</b> Restart your computer in Normal Mode by returning to the System Configuration Utility, unchecking the "/Safeboot" box and clicking "Restart." Then reconnect your wireless or wired network and re-enable System Restore by unchecking the "Turn off System Restore" box.</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><br />
</div></div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com0tag:blogger.com,1999:blog-5161550258128518969.post-51715624542937250772011-11-22T03:21:00.000-08:002011-11-22T03:21:38.695-08:00How to Remove Adware & Viruses for Free<div dir="ltr" style="text-align: left;" trbidi="on"><div style="text-align: justify;">Adware and viruses can not only threaten your privacy, they can reduce your computer's performance. These are those malicious programs that once they infect your machine will start causing havoc on your computer. You can prevent and cure the problem of adware, spyware, viruses and other hostile software by installing Microsoft Security Essentials. It is a free antivirus software by Microsoft. Microsoft Security Essentials protects your computer, free of charge, from viruses and spyware that may be used to conduct a malicious attack on your computer. Security Essentials updates automatically to ensure you are utilizing the latest virus definitions when safeguarding your computer against Internet threats. With virus protection software and safe Internet browsing, computer attacks can be prevented, providing a safe computing environment. Anti-virus protection software is a must-have for every computer. There is really no way around it.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><b>Steps to Remove Adware & Viruses for Free </b></div><br />
• Open your Web browser and type <a href="http://windows.microsoft.com/en-US/windows/products/security-essentials">http://windows.microsoft.com/en-US/windows/products/security-essentials</a> to navigate to Microsoft's Security Essentials website Click the "Download" button and save the installation file to your computer.<br />
<br />
• Click the <b>“Free Download”</b> button <br />
<br />
• Double-click the downloaded file. <br />
<br />
• Click<b> "Next"</b> on the Welcome screen.<br />
<br />
• Accept the End User License Agreement (EULA).<br />
<br />
• Click <b>"Validate"</b> to make sure your copy of Windows is a genuine copy.<br />
<br />
• Click<b> "Install."</b> After the install completes, Microsoft Security Essentials automatically updates your virus and spyware definitions to the latest release and performs a scan to make sure your computer is virus free.<br />
<br />
• Find the installation file on your computer and run the program using the default installation options.<br />
<br />
• Click the Security Essentials icon in your computer's system tray to open the program.<br />
<br />
• Click <b>"Scan Now" </b>to begin scanning your computer for any existing viruses and spyware.</div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com0tag:blogger.com,1999:blog-5161550258128518969.post-60292199726205306462011-11-21T01:15:00.001-08:002011-11-21T01:17:11.241-08:00Steps to Uninstall Microsoft Security Essentials in Windows XP<div dir="ltr" style="text-align: left;" trbidi="on"><div style="text-align: justify;">This blog describes how to uninstall Microsoft Security Essentials in Windows XP. Microsoft Security Essentials is one of the best free anti-virus and anti-malware Software. I would like to suggest all the computer users that if you are looking for a free anti-virus software please go Microsoft Security Essential. MSE would provide protection against different types of malware such as computer virus, spyware, root kits and Trojan horses for Windows operating systems. If you do have Security Essentials installed and you do not want to use it, you should uninstall it to avoid conflicts with other security programs. It is difficult to uninstall Microsoft Security Essential in the Control Panel because you cannot remove all components of MSE. If you are having problems in uninstalling Microsoft Security Essentials by using Add or Remove Programs, you can uninstall it manually. Follow the steps given below to Uninstall Microsoft Security Essential Manually. “We recommend that you verify that you cannot uninstall by using Add or Remove Programs first.”</div><br />
<a href="http://microsoft-security-essential.blogspot.com/2011/11/steps-to-uninstall-microsoft-security.html"><b>Steps to Uninstall Microsoft Security Essentials</b></a><br />
<br />
• Click the Windows <b>"Start"</b> button.<br />
<br />
• Click <b>"Control Panel."</b><br />
<br />
• Double-click <b>"Add or Remove Programs."</b><br />
<br />
• Highlight <b>"Microsoft Security Essentials"</b> in the list of programs on your computer.<br />
<br />
• Click <b>"Remove."</b> Click <b>"Yes"</b> when prompted to confirm. Microsoft Security Essentials should uninstall. If it does not, close the Control Panel and proceed to the next step.<br />
<br />
• Click the Windows <b>"Start"</b> button.<br />
<br />
• Click <b>"Run."</b><br />
<br />
• Type <b>"appwiz.cpl"</b> and click <b>"OK."</b><br />
<br />
• Click <b>"Microsoft Security Essentials."</b><br />
<br />
• Click <b>"Uninstall."</b><br />
<br />
• Reboot your computer.</div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com0tag:blogger.com,1999:blog-5161550258128518969.post-88154387181802522592011-11-17T00:19:00.001-08:002011-11-17T00:19:29.382-08:00Steps to Update Virus Definitions in Microsoft Security Essentials (MSE)<div dir="ltr" style="text-align: left;" trbidi="on"><div style="text-align: justify;">Microsoft Security Essentials is a free antivirus program for your computer designed by Microsoft which is simple to install and easy to use. It provides protection for your computer against viruses, malware, spyware and any other type of malicious software, and always kept up to date so you can be assured your PC is protected by the latest technology. Hardware requirements for Microsoft Security Essentials differ, depending on the operating system. For Windows XP, Microsoft Security Essentials requires at least a 500 MHz processor and 256 MB of RAM. On Windows Vista and Windows 7, Microsoft Security Essentials requires a 1 GHz processor and 1 GB of RAM. In order to stay protected, you must update your virus and spyware definitions on a regular interval.<br />
<br />
<a href="http://microsoft-security-essential.blogspot.com/2011/11/steps-to-update-virus-definitions-in.html"><b>Steps to Update Virus Definitions in Microsoft Security Essentials</b></a></div><div style="text-align: justify;"><br />
• Click <b>"Start,"</b> <b>"All Programs"</b> and <b>"Microsoft Security Essentials."</b> Alternatively, you can double-click the Microsoft Security Essentials icon in your system tray or click the <b>"Start Orb"</b> and type <b>"Essentials"</b> in the instant search field. <b>"Microsoft Security Essentials"</b> appears in the list for you to select.<br />
<br />
• Select the <b>"Update"</b> tab and click the <b>"Update"</b> button. <br />
<br />
• If an update is available, Microsoft Security Essentials downloads and installs the update.<br />
<br />
• Click <b>"Cancel Update"</b> if you want to cancel the update for any reason.</div></div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com0tag:blogger.com,1999:blog-5161550258128518969.post-40912064174244941802011-10-05T03:26:00.000-07:002011-10-05T03:26:42.430-07:00NewsDay newspaper website hacked<div dir="ltr" style="text-align: left;" trbidi="on">The website of the NewsDay newspaper has been down since Sunday with a warning for visitors to the site being generated by search engine giant Google.<br />
<br />
“Warning: Something's Not Right Here! www.newsday.co.zw contains malware. Your computer might catch a virus if you visit this site. Google has found that malicious software may be installed onto your computer if you proceed,” says a message behind a red background was placed by Google.<br />
<br />
“If you've visited this site in the past or you trust this site, it's possible that it has just recently been compromised by a hacker. You should not proceed. Why not try again tomorrow or go somewhere else? We have already notified www.newsday.co.zw that we found malware on the site,” Google added.<br />
<br />
SW Radio Africa spoke to NewsDay editor Vincent Kahiya and he said: “There was a security breach on our website on Sunday and as a result of the breach our website was blocked and because of the blockade, it’s not visible to the public. We could have brought it up immediately but we have decided to suspend it for about a week whilst we sort out the security breach on the website,” Kahiya said.<br />
<br />
Kahiya said they were working closely with Google to see “how best to enhance security on the site” adding, “it’s just a question of putting more firewalls around” the site. Asked who might have hacked their site he said: “I have had a lot of people ask me that question whether it was the security establishment. It can be them; it can be anyone else who can get into our system.”<br />
<br />
“So what is important is making sure that our system is secure and if it’s secured then we minimize the risk of people breaching the wall that protects our core,” Kahiya added.<br />
<br />
Meanwhile the editor of the Daily News, Stanley Gama, told SW Radio Africa that the paper’s website had been down for over a month and only went back online on Tuesday this week because they are carrying out an upgrade and modernizing the site. He said they ran adverts in the paper informing readers of the site upgrade.<br />
Gama said the old site is back up and the new site would be launched soon.<br />
<br />
“We are in the process of updating the website and making further developments and modernising in line with modern websites around the world. So in the next few weeks our readers will be able to open up new pages on our website, brand new, modern and state of the art. We will be able to communicate directly with our readers and it will be a live website,” Gama told SW Radio Africa.<br />
<div><br />
</div><br />
</div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com0tag:blogger.com,1999:blog-5161550258128518969.post-64966704100472841682011-09-25T22:49:00.000-07:002011-11-16T23:08:57.120-08:00Return of the BIOS trojans<div dir="ltr" style="text-align: left;" trbidi="on">Chinese supplier AV 360 has detected a virus in nature that makes its home in the BIOS of a computer, where it remains hidden from traditional virus scanners. The contaminant, called Mebrom first checks whether the victim's computer uses an Award BIOS. If so, it uses CBROM command-line tool to connect an expansion in the BIOS. The next time the system boots, the BIOS extension adds additional code to save the hard drive (MBR) in order to infect the process winlogon.exe / Winnt.exe on Windows XP and 2003 / Windows 2000 before starting Windows.<br />
<br />
The next time Windows starts, the malicious code downloads a rootkit to prevent disk MBR to be cleaned by a <a href="http://www.vtechsquad.com/virus-removal.html"><b>virus scanner</b></a>. But even if the disk is cleaned, the entire routine is repeated infection, the BIOS next time the module is started. Mebrom can also survive a change in hard drive. If your computer is not an Award BIOS, the pollutant simply infects the MBR.<br />
<br />
The idea of hanging a malicious BIOS routine is not new and has the advantage of keeping attackers hidden in the virus. In 1999, the virus tried to manipulate the BIOS theCIH of the victim, but was not as destructive: the BIOS was crushed, and the computer will not boot. In 2009, security researchers presented a scenario where a rootkit has been rooted in the BIOS. But so far, no pollutants BIOS was able to spread, possibly because there are too many different mothers - and the different ways to update the BIOS too.</div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com0tag:blogger.com,1999:blog-5161550258128518969.post-74654407453910730372011-09-06T04:26:00.000-07:002011-11-16T23:11:39.555-08:00Google Redirect Virus Removal Instruction<div dir="ltr" style="text-align: left;" trbidi="on">Malware and Spyware account to almost eighty percent of non-productivity of those computer as well as the computer user. Though there are several <a href="http://www.vtechsquad.com/adware-spyware.html">adware and spyware removal</a> products, both paid and free, there are many new viruses and Trojans coming out plenty of hour that is very difficult helping put a curb on all the strategies. The latest virus among these would be the Google Redirect Virus.<br />
<br />
Is some information about Google Redirect Virus and how to remove it.Precisely what is Google Redirect Virus?The Google redirect virus is known as a virus that redirects internet users to pages that they would possibly not need to view, in the event that they made a spelling mistake while typing the name of a particular site of webstore within the address bar. This also happens in case the page that they require no more exists. This virus mainly attacks internet users who plan on using Google either to be a homepage or as a considerate google and yahoo.<br />
<br />
The probability of computers getting infected with this virus increases in case the user uses Google search engine since the default, incase the Google home page is kept as default, they necessitate a Google redirect virus removal tool.The way to remove Google Redirect Virus?Presently, there can be no known solution to this issue; however, anti-virus software makers are hammer and tongs at locating a solution. Under these circumstances, the ideal one can safely commit to is usually to use the latest anti-virus and anti-malware software. In case your machine is laid low with the issue, device is infected by a Trojan and also a TDL3 infection, and would need to involve a Google redirect virus removal tool.<br />
<br />
There are numerous anti-virus and anti-malware software available, and certain of them concentrate on removing the TDL3 virus, as referred as the TDSS virus. The best way to find anti-virus for TDSS will be to attempt a search regarding it on your favorite search engine. A number of the well-known anti malware and anti-spyware systems for the Google redirect virus removal is:? Windows Malicious Removal Tool? Best Antivirus SoftwareYou can find out the best antivirus software at link that may be given with the bottom of this article.<br />
<br />
If finally the virus removal program won’t work, you encounter no other option nevertheless format your machine and reinstall your operating systems. Also, after you have reinstalled the operating system, it is best to make certain to use good anti-virus software, and that you practice restraint over the method of websites that you visit as well as the type of downloads you conduct against your machine.</div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com0tag:blogger.com,1999:blog-5161550258128518969.post-51635678103674364052011-09-02T02:02:00.000-07:002011-09-02T02:02:56.975-07:00McAfee Reports - Malware Increases Massively During Q2-2011<div dir="ltr" style="text-align: left;" trbidi="on">According to the recently released "Threats Report for Q2-2011" by McAfee, 2011 has been the most preoccupied year ever during its January-June months within the history of malware programs. The company, through its research, indicates that its laboratory for detection and research has witnessed almost 12m malware items during Q1-2011. Although this means an increase of 22% over Q1-2010, the situation during Q2-2011 appears even bad.<br />
<br />
Remarking about this unhappy situation, McAfee stated that if the numbers of the second quarters were to be added, the overall aggregate of all malicious programs within its database, would touch about 65m. Apparently, its researchers had calculated that the seemingly "Malware Zoo" would touch a minimum of 75m programs towards 2011-end, McAfee outlined. Thetechherald.com published this on August 23, 2011.<br />
<br />
Further, giving information about fake anti-virus targeting Mac computers, the report states that Mac users have increased unlike ever-before, while with enterprises adopting Macs more and more for business purposes, malware writers are increasingly targeting Apple now. Albeit traditionally, fake AV couldn't affect Apple's products, developments during Q2-2011 show that they're now affecting. And while such fake AV represents a wholly fresh one, McAfee Avert Labs actually anticipates that there'll be an overall decline in fake anti-virus over time.<br />
<br />
One more kind of malware which's consistently growing is stealth malicious program. This one involves a technique whereby malware is concealed within a rootkit for making the former more covert as well as persistent. According to the security company, it has observed stealth malware to acquire prominence during 2010, what with sophisticated assaults being executed with Stuxnet. Reportedly, during the past 6 months, there has been a faster growth in stealth malware compared to any earlier time, rising nearly 38% since 2010. Also, two rootkits, which were found the busiest, were TDSS and Koutodoor that are both vicious in concealing malicious program for theft of data, states McAfee.<br />
<br />
Finally, the report discusses about e-mail spam too. Accordingly, although spam continues to be at its minimum volume ever, thanks to Rustock's shutdown, which was partly responsible, McAfee anticipates that this activity will steeply rise during the forthcoming months.<br />
<br />
</div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com0tag:blogger.com,1999:blog-5161550258128518969.post-33838479097328637022011-08-31T04:37:00.000-07:002011-08-31T04:37:38.663-07:00Warning over ‘anti virus' protection scam<div dir="ltr" style="text-align: left;" trbidi="on"><span class="Apple-style-span" style="background-color: white; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 13px; line-height: 17px;"></span><br />
<div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 13px; line-height: 17px; margin-bottom: 1em; margin-top: 1em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">WHEN Jenny Heath received an unexpected phone call telling her there was a problem with her computer she was naturally concerned.</div><div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 13px; line-height: 17px; margin-bottom: 1em; margin-top: 1em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">“The caller said it needed to be fixed urgently,” she said.</div><div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 13px; line-height: 17px; margin-bottom: 1em; margin-top: 1em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">It wasn't until later that the Seventeen Mile Rocks grandmother realised she had almost become a victim of a clever and costly scam.</div><div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 13px; line-height: 17px; margin-bottom: 1em; margin-top: 1em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">The con involves criminals posing as computer security experts and tricking internet users into buying anti-virus protection for viruses that do not exist.</div><div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 13px; line-height: 17px; margin-bottom: 1em; margin-top: 1em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">The fraudster cold calls customers using a fake company name and tells them their PC is infected with viruses and needs to be fixed urgently or it will be destroyed.</div><div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 13px; line-height: 17px; margin-bottom: 1em; margin-top: 1em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">The offender then directs the victim through a process on their computer, ultimately giving them remote access to the computer to download viruses or gain access to personal information.</div><div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 13px; line-height: 17px; margin-bottom: 1em; margin-top: 1em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">Ms Heath said she had been targeted by this scam six times.</div><div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 13px; line-height: 17px; margin-bottom: 1em; margin-top: 1em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">“During the first encounter, I was unsure if the call was genuine or not,” Ms Heath said.</div><div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 13px; line-height: 17px; margin-bottom: 1em; margin-top: 1em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">“They sounded very professional and convincing.</div><div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 13px; line-height: 17px; margin-bottom: 1em; margin-top: 1em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">“But at the same time something struck me as strange about the way they were calling me out of the blue like that.”</div><div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 13px; line-height: 17px; margin-bottom: 1em; margin-top: 1em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">Fortunately for Ms Heath, she hung up before she revealed any personal information.</div><div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 13px; line-height: 17px; margin-bottom: 1em; margin-top: 1em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">An 80-year-old Inala woman, who received a similar call, said she was terrified after being told her computer was at risk.</div><div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 13px; line-height: 17px; margin-bottom: 1em; margin-top: 1em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">“I was worried sick for days, thinking someone was accessing all my personal information,” the woman said.</div></div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com0tag:blogger.com,1999:blog-5161550258128518969.post-86051304507773744452011-08-25T03:58:00.000-07:002011-08-25T03:58:19.422-07:00BitDefender Top 100 Removal Tool<div dir="ltr" style="text-align: left;" trbidi="on"><div>Back in 2010 I reviewed the Stuxnet Removal Tool by BitDefender, part of BitDefender’s <a href="http://www.vtechsquad.com/virus-removal.html">Free Virus Removal</a> Tools on the BitDefender website. Removal tools are specialized programs that remove a particular virus or malware from a computer system.</div><div><br />
</div><div>That’s convenient if you know what malware has reached the computer, not so much if you do not know the name or characteristics. The BitDefender Removal Tool is designed for exactly this reason. In essence, it combines the Top 100 of removing an interface tools. It is by no means an alternative for regular antivirus protection, but a good option if you know your computer is infected and that the default antivirus solution is not possible to disinfect the computer.</div><div><br />
</div><div>The removal tool is a mobile security program for the Windows operating system has been simplified for ease of use. There is only one option in the interface and it is to start a system scan.</div><div><br />
</div><div>BitDefender removal tool will begin scanning the system for traces of the 100 viruses, worms, Trojans and other malware. The procedure itself takes time and is generally a good choice to start at a time when the PC is idle otherwise.</div><div><br />
</div><div>Malware that is found by the scan is displayed in the interface. BitDefender has announced plans to update the removal tool of every month to reflect new malicious programs that made the top 100 of the malware from the previous month. For now, only June’s version of the Removal Tool is available. It is unclear if the version in July will be released soon.</div><div><br />
</div><div>BitDefender’s Removal Tool is available for 32-bit and 64-bit editions of the Windows operating system. Both versions are portable and can be executed directly from any location.</div><div><br />
</div><div>If a fault is the slow scanning speed of the system and update option to update the program needed at the local level when a new version is pushed by BitDefender.</div></div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com0tag:blogger.com,1999:blog-5161550258128518969.post-92202004723376467312011-08-23T00:33:00.000-07:002011-11-16T23:13:09.214-08:00Security Protection Causes Only Infection<div dir="ltr" style="text-align: left;" trbidi="on"><br />
Another rogue is out on the field playing with unsuspecting victims. It is called the security protection, but it does not guarantee the security of your PC - it is an infection of themselves as belonging to the family of rogue malware protection.<br />
<br />
Disguised as anti-virus program, this malware attempts to mislead into thinking that your computer is infected with multiple viruses. Most of the time, the scareware enters computers via fake <a href="http://www.vtechsquad.com/virus-removal.html"><b>online virus scanners</b></a>. If you happen to select one, a Trojan immediately creeps into your PC.<br />
<br />
HELP! Security Protection Problem?<br />
Security Protection may pose a risk to your PC.<br />
Start Your Scan Now to detect Security Protection.<br />
<br />
From then on, a malicious program starts automatically as soon as you start your PC and run a scan false. These fake scan all argue that the computer has serious security problems. Program offers a solution for you to buy the full version.<br />
<br />
What this rogue also does is to make annoying pop-ups appear. Most of them state that: "Malicious program has been detected. Click here to protect your computer". All of these are only produced to make you believe you need to buy the fake anti-virus software and there is no real threat inside your machine.<br />
<br />
Another trick that the malware used is to prevent malicious executables to launching. When you try to start a program, the rogue will display a message, claiming that the program is infected. Do not rely on these messages - they are all as fake as the program itself.<br />
<br />
On the whole, Security Protection is just another rogue that aims at making you pay for its useless services. If you see this villain working on your PC, use a legitimate anti-virus software and get rid of it as soon as possible.</div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com0tag:blogger.com,1999:blog-5161550258128518969.post-10335719263798788402011-08-18T22:12:00.000-07:002011-08-18T22:12:42.463-07:00Virus Outbreaks Predicted By Computer Program<div dir="ltr" style="text-align: left;" trbidi="on"><span class="Apple-style-span" style="background-color: white;"></span><br />
<div style="margin-bottom: 10px; margin-top: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><span class="Apple-style-span" style="font-family: Arial, Verdana, 'Times New Roman', Tahoma, sans-serif;"></span></div><div style="margin-bottom: 10px; margin-top: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><span class="Apple-style-span" style="font-family: Arial, Verdana, 'Times New Roman', Tahoma, sans-serif;">The human infection of the West Nile virus has been predicted by a computer program. The program was successful in predicting where it would occur around Sacramento in 2005, U.S. researchers said.</span></div><div style="margin-bottom: 10px; margin-top: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><span class="Apple-style-span" style="font-family: Arial, Verdana, 'Times New Roman', Tahoma, sans-serif;">Scientists at Brown University said a computer model of the spread of the mosquito-borne virus in 17 California counties in 2005 successfully predicted where 81.6 percent of human cases of the disease would arise, a university release reported Thursday.</span></div><div style="margin-bottom: 10px; margin-top: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><span class="Apple-style-span" style="font-family: Arial, Verdana, 'Times New Roman', Tahoma, sans-serif;">The model was able to define high-risk areas where the risk of infection turned out to be 39 times higher than in low-risk areas, an article on the study in the journal Emerging Infectious Diseases said.</span></div><div style="margin-bottom: 10px; margin-top: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><span class="Apple-style-span" style="font-family: Arial, Verdana, 'Times New Roman', Tahoma, sans-serif;">"All of the parameters in the model are based on experimental data related to the biology and ecology of the virus, mosquito vector, and bird host," Brown graduate student Ryan Carney said.</span></div><div style="margin-bottom: 10px; margin-top: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><span class="Apple-style-span" style="font-family: Arial, Verdana, 'Times New Roman', Tahoma, sans-serif;">For example, the spatial parameters of the model include how far mosquitoes and infected birds are likely to fly, Carney said. Key time parameters include how long the virus needs to incubate in mosquitoes before they become infectious, and the lifespan of infected birds.</span></div><div style="margin-bottom: 10px; margin-top: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><span class="Apple-style-span" style="font-family: Arial, Verdana, 'Times New Roman', Tahoma, sans-serif;">The model allowed the California Department of Public Health to provide early warnings to an area stretching from the Bay Area through Sacramento to the Nevada line as well as regions in Southern California, UPI.com said.</span></div><div style="margin-bottom: 10px; margin-top: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><span class="Apple-style-span" style="font-family: Arial, Verdana, 'Times New Roman', Tahoma, sans-serif;"><b>Source:- </b></span><a href="http://www.pcworld.com/">www.pcworld.com</a></div><br />
</div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com0tag:blogger.com,1999:blog-5161550258128518969.post-40486307618913673652011-08-17T22:19:00.000-07:002011-11-16T23:16:27.622-08:00How to Remove McAfee Products<div dir="ltr" style="text-align: left;" trbidi="on"><br />
<div class="MsoNormal"><span style="font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 115%;">The article has been designed to help users remove McAfee products from their system using simple methods. The methods described in the article are simple and correct to the date. It is still advised that users follow the instructions carefully to remove the desired product and avoid running into common <a href="http://www.vtechsquad.com/mcafee-support.html">McAfee product problems</a>. <o:p></o:p></span></div><div class="MsoNormal"><span style="font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 115%;"><br />
</span></div><div class="MsoNormal"><span style="font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 115%;">McAfee products are ranked among the best security products for computer systems. However, sometimes users may want to uninstall their McAfee product(s) for the reinstallation purpose or due to unwanted technical issues or meddling with third-party programs or hardware among other reasons. Though it is easy to uninstall the McAfee products, you may still run into problems that might prompt you to contact your <a href="http://www.vtechsquad.com/mcafee-support.html">McAfee Technical support</a><b> </b>services. However, the below mentioned guide will help you get rid of the McAfee product(s) on your own. <o:p></o:p></span></div><div class="MsoNormal"><b><u><span style="font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 115%;"><br />
</span></u></b></div><div class="MsoNormal"><b><u><span style="font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 115%;">Instructions:<o:p></o:p></span></u></b></div><div class="MsoNormal"><span style="font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 115%;"><br />
</span></div><div class="MsoNormal"><span style="font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 115%;">Click on the <b>Start</b> menu, go to <b>Control Panel</b>, and then double click on the <b>Add or Remove Programs</b> icon to open it. Wait until the window populates with all the programs. Locate the particular McAfee product or suite like McAfee Internet Security etc. and then click on the <b>Change/Remove</b> button. When prompted, click on the <b>Yes</b> or <b>OK</b> button to proceed. If you see that only some files are being offered to remove, click on <b>Yes, for all</b> to remove all the files. When prompted, reboot the computer to let the removal procedure complete and save changes. <o:p></o:p></span></div><div class="MsoNormal"><span style="font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 115%;"><br />
</span></div><div class="MsoNormal"><span style="font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 115%;">Windows Vista/7 users click on the <b>Start</b> menu and type ‘programs and features’ (without quotes and as is) in the <b>Start Search</b> menu and hit <b>Enter</b> on the keyboard. When the window opens, click <b>Uninstall a program</b>, select the particular McAfee product like McAfee Internet Security etc., and click on the <b>Uninstall</b> button. When prompted, click on the <b>Yes</b> button or whatever option you see there to proceed. Wait until the process completes and prompts you to reboot the computer. You must reboot your computer when prompted to let the changes save. <o:p></o:p></span></div><div class="MsoNormal"><span style="font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 115%;"><br />
</span></div><div class="MsoNormal"><span style="font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 115%;">Finally download and run a free or paid registry cleaner, an automated tool, to clean up the empty and/or damaged registry entries of the uninstalled McAfee program. Make a backup of the registry (the automatic tool will let you create a restore point) before running the registry cleaner. This shall completely remove the desired product along with its traces from your computer.<o:p></o:p></span></div><div class="MsoNormal"><span style="font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 115%;"><br />
</span></div><div class="MsoNormal"><span style="font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 115%;">If the abovementioned method doesn’t completely remove the desired McAfee program(s), then download the MCPR.exe tool from McAfee’s website to download the tool. Click on the <b>Save File</b> button and save the file to a desired location where it is easily accessible from. When done, locate the file, and double click on it to open. Run the file (run as an administrator in Windows Vista/7) and wait until the process completes. When you receive the message <b>Cleanup Successful</b>, reboot your computer. If you want you can view logs of the uninstalled program and save these to a Notepad. When done, contact your McAfee technical support and give them the log details to confirm that McAfee products have been fully removed from your computer. <o:p></o:p></span></div><div class="MsoNormal"><span style="font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 115%;">If everything else fails, then go to the McAfee website, login to your McAfee account by entering the username and password, and unsubscribe to your product by clicking on the <b>Deactivate</b> button. <o:p></o:p></span></div><div class="MsoNormal"><b><span style="font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 115%;"><br />
</span></b></div><div class="MsoNormal"><b><span style="font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 115%;">Additional Tips:-<o:p></o:p></span></b></div><div class="MsoNormal"><b><span style="font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 115%;"><br />
</span></b></div><div class="MsoNormal"><span style="font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 115%;">The MCPR.exe (McAfee Consumer Product Removal) tool will uninstall all the versions (from 2005 to 2011) of McAfee consumer products. The tool doesn’t support Windows ME and 98. <o:p></o:p></span></div></div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com0tag:blogger.com,1999:blog-5161550258128518969.post-72717876727405708422011-08-09T05:19:00.000-07:002011-08-09T05:19:06.589-07:00Chinese Hackers Spreading Virus through HC Replica Websites?<div dir="ltr" style="text-align: left;" trbidi="on"><br />
Chinese hackers may be using websites similar to those of 19 high courts in the country to spread computer virus which can convert the user's system into a virtual zombie, a security expert has claimed before the CBI.<br />
<br />
Commander (Retd.) Mukesh Saini, former naval officer who is a cyber security consultant, brought the nefarious designs of these alleged hackers to the notice of Cybercrime wing of the CBI recently, which is looking into it.<br />
<br />
In his report, Saini highlighted the modus operandi of these web sites which have addresses similar to the original ones - for example Delhi high court address is 'http://delhihighcourt.nic.in' while the phishing website address is 'http://delhi.highcourt.in'.<br />
<br />
"When we analysed the website script, we found that the server had a '.cn' location. Also we found that script used in the website was a declared malware program. These sites are dangerous because even if a user accidentally accesses them the malware spreads in his or her system.<br />
<br />
"The program is designed in such a way that user's system functions normally but hackers can use it to extract any information without the user knowing it," he claimed.<br />
<br />
Such websites came to the notice of Saini, founder of cyber security firm 'Xcyss', when he was following a news report on an employment scam running through the fake website of Patna High Court. Further analysis revealed that there were identical websites of 19 high courts in the country.<br />
<br />
The design of these replica websites was curious because it did not seek any information, such as financial details from the visitor, which prevents them of being suspicious.<br />
<br />
Source:- <a href="http://articles.economictimes.indiatimes.com/">http://articles.economictimes.indiatimes.com</a><br />
</div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com0tag:blogger.com,1999:blog-5161550258128518969.post-14711369372837295522011-08-04T05:13:00.000-07:002011-08-04T05:14:28.156-07:00Steps to Remove Microsoft Security Malware<div dir="ltr" style="text-align: left;" trbidi="on"><br />
<div class="MsoNormal">Rogue Security Malicious malware designed to get you to buy the full version of the program. Microsoft Malware masks itself as Microsoft Security Essentials application. A common symptom of this infection is to show warnings Trojan detection. Avoid clicking a button on the malware, because it will lead to exposure to several other dangerous malware such as antivirus Red Cross, and Major Defense Kit AntiSpy backup. Remove malware manually.</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><b>Kill the Processes :-</b></div><div class="MsoNormal"></div><div class="MsoNormal"></div><ul style="text-align: left;"><li>Click the "Start" button in the bottom left corner of the screen.</li>
</ul><ul style="text-align: left;"><li>Open the "Computer" or "My Computer" folder, depending on your operating system.</li>
</ul><ul style="text-align: left;"><li>Navigate the following folder paths:</li>
</ul><div class="MsoNormal">C >> Users (Documents and Settings) >> Application Data >> PAV</div><div class="MsoNormal">C >> Users (Documents and Settings) >>Application Data >> antispy.exe</div><div class="MsoNormal">C >> Users (Documents and Settings) >> Application Data >> defender.exe</div><div class="MsoNormal">C >> Users (Documents and Settings) >> Application Data >> tmp.exe</div><div class="MsoNormal">C >> Users (Documents and Settings) >> Local Settings >> Temp >> kjkkklklj.bat</div><div class="MsoNormal"></div><ul style="text-align: left;"><li>Right-click each of the files at the end of the folder path and click "Delete."</li>
</ul><ul style="text-align: left;"><li>Open the Recycle Bin on the desktop and click "Empty the Recycle Bin."</li>
</ul><br />
<div class="MsoNormal"></div><div class="MsoNormal"><b>Run Registry Editor</b></div><div class="MsoNormal"></div><div class="MsoNormal"></div><ul style="text-align: left;"><li>Click the "Start" button in the bottom left corner of the screen.</li>
</ul><ul style="text-align: left;"><li>Click "Run" if you are running Windows XP. Type "regedit" in the dialog box and click "OK." Type "regedit" in the "Search" field if you are running Vista or Windows 7. Press "Enter."</li>
</ul><ul style="text-align: left;"><li>Navigate the following registry paths and delete the subkeys:</li>
</ul><div class="MsoNormal">HKEY_CURRENT_USER >> Software >> PAV</div><div class="MsoNormal">HKEY_CURRENT_USER >> Software >> Microsoft >> Windows >> CurrentVersion >> Internet Settings "WarnonBadCertRecving" = "0"</div><div class="MsoNormal">HKEY_CURRENT_USER >> Software >> Microsoft >> Windows >> CurrentVersion >> Internet Settings "WarnOnPostRedirect" = "0"</div><div class="MsoNormal">HKEY_CURRENT_USER >> Software >> Microsoft >> Windows >> CurrentVersion >> Run "tmp"</div><div class="MsoNormal">HKEY_CURRENT_USER >> Software >> Microsoft >> Windows >> CurrentVersion >> RunOnce "SelfdelNT"</div><div class="MsoNormal">HKEY_CURRENT_USER >> Software >> Microsoft >> Windows >> CurrentVersion >> Winlogon "Shell" = "%UserProfile%\Application Data\antispy.exe"</div><div class="MsoNormal"></div><ul style="text-align: left;"><li>Exit the Registry Editor once you remove the harmful entries.</li>
</ul></div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com0tag:blogger.com,1999:blog-5161550258128518969.post-18898868201459493152011-08-03T05:35:00.000-07:002011-08-03T05:35:09.122-07:00Essential Steps for your PC Security<div dir="ltr" style="text-align: left;" trbidi="on"><br />
Technology is the real gift of science to the mankind. Right from the morning when we are awakened by the alarm to the time we go off to sleep at night, we utilize technology several times in a day. On such gift of technology is the computer which is used in every sphere of life. However, security of data and information stored in any computer system remains an area of concern for most users.<br />
<br />
Keyloggers remain the primary threat to the security of a computer. Generally, a keylogger refers to a computer application which is capable of monitoring the computer activities. These include websites visited, chat sessions as well as personal information. As the application can send the keystrokes to a third party, an individual can easily spy on your computer. However, such an application is most dangerous if someone tries to steal personal information like credit-card information or bank accounts. Certain keyloggers are capable of capturing your computer screen frequently thereby making it easier for hackers to invade your private space completely.<br />
<br />
So the all-important question is “How to detect keyloggers?” Unless you are well-versed with the technical features of a computer, you cannot detect keyloggers on your own. The commonly available anti-virus software might not be capable of detecting keyloggers, particularly those which can completely hide themselves from the virus scans. As keyloggers are considered to be legitimate computer applications, the antivirus software might lack the capability of detecting keyloggers running in a computer.<br />
<br />
Your computer would show certain symptoms when it has been installed with any keylogger. These include getting unnecessary pop-ups consistently, being redirected to unneeded websites or the computer shutting down without a reason.<br />
<br />
The ideal solution which can be utilized for keeping away from keyloggers is the installation of efficient anti-spyware software. The tool would easily detect keyloggers which have invaded you computer. Moreover, such software is also capable of detecting the hidden keyloggers. The software can be easily downloaded and utilized for scanning purposes. Besides this, you can also avoid the time-consuming process of manual detection. The installation of a reliable software security program assures unmatched security to your computer.<br />
</div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com0tag:blogger.com,1999:blog-5161550258128518969.post-4962521305413985392011-08-02T04:09:00.000-07:002011-08-02T04:09:39.427-07:00McAfee Email Protection<div dir="ltr" style="text-align: left;" trbidi="on"><a href="http://microsoft-security-essential.blogspot.com/2011/08/mcafee-email-protection.html">McAfee Email Protection</a> includes E-mail content management to the prevention of data leakage and compliance standards. This product can be used with access to McAfee's cloud-based service added scanning features to stop spam and other problems by e-mail before it gets even society. This gives solid content management for even very large organizations with high policy standards.<br />
<br />
The deployment is done by installing the virtual appliance on VMware ESX. Once the server is implemented, all management is done through the web interface of the device. This interface is quite large, but very easy to navigate, organized by design. In addition, the interface includes a complete control panel, which can quickly and easily view e-mail statistics and other useful information about the system.<br />
<br />
This solution offers a robust e-mail content and management practice. And 'possible to use comply with a built-in templates and dictionaries and data leakage prevention fingerprinting techniques document. Custom policies are also easy to configure, and the device offers flexible options that can be very granular in nature.<br />
Documentation includes installation guide and the manager. The installation guide provides steps to install the virtual application and start work on VMware Infrastructure. All documentation was well organized, with many screenshots, diagrams and configuration examples.<br />
<br />
Customers have already subscribed to the rescue to get the support of the McAfee Protection McAfee Gold at no additional cost. This includes access to online resources, as well as 24 / 7 phone and email technical support.</div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com0tag:blogger.com,1999:blog-5161550258128518969.post-72582024353650118852011-08-01T05:18:00.000-07:002011-11-16T23:17:08.159-08:00Trojan Virus Remover Program<div dir="ltr" style="text-align: left;" trbidi="on"><br />
Protecting your system is in fact a crucial thing for people to do to ensure that their computer will last them for numerous years, running at its best levels. No one wants a slow computer, let alone a computer that crashes and loses all information saved to it. This is where defense like a <a href="http://www.vtechsquad.com/virus-removal.html">Trojan virus remover</a> would be handy. I will also be introducing high quality virus, adware and spyware software that speed up my PC significantly.<br />
<br />
You need to understand that these pieces of damaging software are very serious business because you rarely see them coming. They are named after the infamous Trojan horse, including the city of Troy could have told you all about.<br />
<br />
These bits of software are very harmful to your computer. You have to understand that you can actually choose these up a bit 'wherever you are online, so you must be aware of what you download and download it. Untrusted sources are never a good time to download files.<br />
<br />
Now the common misconception about viruses and the like is that only those who visit sites that are not often discussed in the company of all are the ones to get these bits of malicious software. Although there are a lot of malicious software from these sites, these infected files are present everywhere on the Internet, so that no one is completely safe, without a little help.<br />
<br />
Assistance would be in the form of material removal of these files. You can look through all the files on your computer right now and delete all the files that cause problems and create problems for the rest of the PC. In addition to this, you will find that these programs can prevent future infected files disguised as other things to do on the computer, because he knows what to look for and can keep your computer safe.<br />
<br />
You will find that the great scheme of things, not a lot of things to know and appreciate a trojan virus remover. But you will see that if you go wrong and there is such a program, you may regret it. Why not save yourself the trouble may be just something to lose from the computer when the computer is still running well. I'm glad all the spyware, adware, Trojans and viruses</div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com0tag:blogger.com,1999:blog-5161550258128518969.post-27323587513485294292011-07-29T12:24:00.000-07:002011-07-31T20:57:22.152-07:00Features of microsoft security essentials<div dir="ltr" style="text-align: left;" trbidi="on">Microsoft offers free antivirus software named <a href="http://www.vtechsquad.com/virus-removal.html">Microsoft security essentials</a>, if you have a genuine copy of Windows operating system you can use this antivirus software program. Microsoft security essentials was Designed to protect computers from viruses, spyware, trojans and other malicious programs. Microsoft Security Essentials replaces Microsoft's Live OneCare and Windows Defender solutions, and is targeted at consumers. Businesses with less than 10 systems can use Microsoft security essentials, but governments, academic institutions and enterprises cannot use this.<br />
<br />
Users with genuine Microsoft operating system Windows XP, Windows Vista or Windows 7 can download Microsoft Security Essentials. If you have Windows XP operating system, your computer must have a CPU clock speed of 500 megahertz or high and at least 256MB of RAM. If you have a Vista or Windows 7 operating system, your CPU clock speed has to be 1 gigahertz or higher and have at least 1GB of RAM.<br />
You need a VGA display of 800X600 or higher and 20MB of free hard drive space to run Microsoft Security Essentials, as well as an Internet connection to install the antivirus program.<br />
<br />
The consent from reviewers is that Microsoft Security Essentials is simple to download and fast to install. Microsoft security essentials runs in the background smoothly so you can continue to use your system without any interruptions.<br />
<br />
Mostly users concerned that Microsoft Security Essentials may not measure up to other software solutions, independent labs have tested the product. According to Neil J. Rubenking, writing for "PC Magazine", West Coast Labs, AV-Test, Virus Bulletin, ICSA Labs, VB100 and AV-Comparatives.org have certified Security Essentials as an anti-malware solution on Windows 7.</div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com0