Bloggers From Pemalang City, Indonesia
Join 4Shared Now! Get 4Shared Premium!

Senin, 14 Juni 2010

Remove Internet Security 2010 (Uninstall Guide)

Alert! Have a problem and would like to ask us for help? To learn how to ask your question Click Here!
Stop! Do you have popups or other malware infecting your computer? If so, Start Here!
Question? Are you having trouble using this site? Then you should visit the New User Orientation Center!

What this programs does:

Internet Security 2010 is a rogue anti-spyware program that is installed through the use of malware. Once installed, Internet Security will be configured to start automatically when you login to Windows. It will then scan your computer and display numerous infections, but will not remove anything until you purchase the program. These infections, though, are all fake and are only being shown to trick you into thinking you are infected so that you then purchase the program. It goes without saying that you should definitely not purchase this program.

Internet Security 2010
Internet Security 2010
For more screen shots of this infection click on the image above.
There are a total of 8 images you can view.

Internet Security 2010 is typically bundled with numerous Trojans that display fake security alerts on your computer. For example, one Trojan will display a message when you login into Windows before you see your desktop. This message will state:

Security Warning!
Worm.Win32.NetSky detected on your machine.

It will then recommend that you purchase the program to remove the infection. When you start certain programs, another Trojan will display a message and then terminate the program. The message it will display is:

Application cannot be executed. The file is infected. Please activate your antivirus software.

Some of the programs that will cause this message to be shown include Notepad, the CMD prompt, Freecell, Minesweeper, Nero, Windows Messenger, Microsoft Word, Microsoft Excel, Window calculator, Skype, and PowerPoint. This same Trojan will also display a warning when you try to run programs, such as Windows Media Player or WinAmp, that play audio and video files. This error message is:

Windows can`t play the folowing media formats: AVI;WMV;AVS;FLV;MKV;MOV;3GP;MP4;MPG;MPEG;MP3;AAC;WAV;WMA;CDA;FLAC;M4A;MID. Update your video and sound codec to resolve this issue.

It will then prompt you to purchase VSCodec Pro, which is another rogue program, to fix the supposed problem. Just like the scan results, these security warnings are fake and are only being shown to try and convince you that your computer has a security problem.

As you can see, Internet Security 2010 was created to scare you into purchasing the program. Without a doubt, you should definitely not do so, and if you have, you should contact your credit card company and dispute the charges stating that the program is a scam. Finally, to remove Internet Security 2010 and any related malware please use the removal guide to remove it for free.

Threat Classification:

Advanced information:

View Internet Security 2010 files.
View Internet Security 2010 Registry Information.

Tools Needed for this fix:

Symptoms that may be in a HijackThis Log:

F2 - REG:system.ini: UserInit=C:\WINDOWS\system32\winlogon86.exe
O4 - HKLM\..\Run: [winupdate86.exe] C:\WINDOWS\system32\winupdate86.exe
O4 - HKCU\..\Run: [Internet Security 2010] C:\Program Files\InternetSecurity2010\IS2010.exe
O10 - Unknown file in Winsock LSP: c:\windows\system32\winhelper86.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\winhelper86.dll

Automated Removal Instructions for Internet Security 2010 using Malwarebytes' Anti-Malware:

  1. Print out these instructions as we may need to close every window that is open later in the fix.

  2. Before we can do anything we must first end the processes that belong to Internet Security 2010 so that it does not interfere with the cleaning procedure. To do this, download the following file to your desktop.

    rkill.com Download Link

  3. Once it is downloaded, double-click on the rkill.com in order to automatically attempt to stop any processes associated with Internet Security 2010 and other Rogue programs. Please be patient while the program looks for various malware programs and ends them. When it has finished, the black window will automatically close and you can continue with the next step. If you get a message that rkill is an infection, do not be concerned. This message is just a fake warning given by Internet Security 2010 when it terminates programs that may potentially remove it. If you run into these infections warnings that close Rkill, a trick is to leave the warning on the screen and then run Rkill again. By not closing the warning, this typically will allow you to bypass the malware trying to protect itself so that rkill can terminate Internet Security 2010 . So, please try running Rkill until the malware is no longer running. You will then be able to proceed with the rest of the guide. If you continue having problems running rkill.com, you can download iExplore.exe or eXplorer.exe, which are renamed copies of rkill.com, and try them instead.

    Do not reboot your computer after running rkill as the malware programs will start again.


  4. Now you should download Malwarebytes' Anti-Malware, or MBAM, from the following location and save it to your desktop:

    Malwarebytes' Anti-Malware Download Link


  5. Once downloaded, close all programs and Windows on your computer, including this one.

  6. Double-click on the icon on your desktop named mbam-setup.exe. This will start the installation of MBAM onto your computer.

  7. When the installation begins, keep following the prompts in order to continue with the installation process. Do not make any changes to default settings and when the program has finished installing and is at the last screen, make sure you uncheck both of the Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware check boxes. Then click on the Finish button. If Malwarebytes' prompts you to reboot, please do not do so.

    If you receive a code 2 error while installing Malwarebytes's, please press the OK button to close these errors as we will resolve them in future steps. The code 2 error will look similar to the image below.


    Malwarebytes Anti-Malware Screen

  8. As this infection deletes a core executable of Malwarebytes' we will need to download a new copy of it and put it in the C:\program files\Malwarebytes' Anti-Malware\ folder. To download the file please click on the following link:

    Malwarebytes' EXE Download
    When your browser prompts you where to save it to, please save it to the C:\program files\Malwarebytes' Anti-Malware\ folder. When downloading the file, it will have a random filename. Please leave the filename the way it is as it is important that it is not changed. You may want to write down the name of the file as you will need to know the name in the next step.

  9. Once the file has been downloaded, open the C:\program files\Malwarebytes' Anti-Malware\ folder and double-click on the file you downloaded in step 8. MBAM will now start and you will be at the main program screen as shown below.


    Malwarebytes Anti-Malware Screen

  10. Before you can perform a scan, you must first update the program. To do this click on the Update tab, and that at the new screen click on the Check for Updates button. Malwarebytes' will now check for new updates and download and install them as necessary. When the update is completed, you will be prompted with a message stating either that you already have the latest updates or that they have been updated. Either way, you should now click on the OK button to continue.

  11. Now click on the Scanner tab and make sure the the Perform full scan option is selected. Then click on the Scan button to start scanning your computer for Internet Security 2010 related files.

  12. MBAM will now start scanning your computer for malware. This process can take quite a while, so we suggest you go and do something else and periodically check on the status of the scan. When MBAM is scanning it will look like the image below.


    Malwarebytes Anti-Malware Scanning Screen

  13. When the scan is finished a message box will appear as shown in the image below.


    Malwarebytes Anti-Malware Scan Finished Screen

    You should click on the OK button to close the message box and continue with the Internet Security 2010 removal process.

  14. You will now be back at the main Scanner screen. At this point you should click on the Show Results button.

  15. A screen displaying all the malware that the program found will be shown as seen in the image below. Please note that the infections found may be different than what is shown in the image.


    Malwarebytes Scan Results


    You should now click on the Remove Selected button to remove all the listed malware. MBAM will now delete all of the files and registry keys and add them to the programs quarantine. When removing the files, MBAM may require a reboot in order to remove some of them. If it displays a message stating that it needs to reboot, please allow it to do so. Once your computer has rebooted, and you are logged in, please continue with the rest of the steps.

  16. When MBAM has finished removing the malware, it will open the scan log and display it in Notepad. Review the log as desired, and then close the Notepad window.

  17. You can now exit the MBAM program.

  18. Due to the fact that this infection deletes certain MalwareBytes' files, and we had to work around this, if you wish to continue using MalwareBytes' Anti-Malware, which we suggest you do, then you should uninstall and then install it again so that the files are created properly.

Your computer should now be free of the Internet Security 2010 program. If your current anti-virus solution let this infection through, you may want to consider purchasing the PRO version of Malwarebytes' Anti-Malware to protect against these types of threats in the future.

If you are still having problems with your computer after completing these instructions, then please follow the steps outlined in the topic linked below:

Preparation Guide For Use Before Using Malware Removal Tools and Requesting Help


Associated Internet Security 2010 Files:

c:\s
c:\Program Files\InternetSecurity2010
c:\Program Files\InternetSecurity2010\IS2010.exe
c:\WINDOWS\system32\41.exe
c:\WINDOWS\system32\winhelper86.dll
c:\WINDOWS\system32\winlogon86.exe
c:\WINDOWS\system32\winupdate86.exe
%UserProfile%\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Security 2010.lnk
%UserProfile%\Desktop\Internet Security 2010.lnk
%UserProfile%\Start Menu\Internet Security 2010.lnk

Associated Internet Security 2010 Windows Registry Information:

HKEY_CURRENT_USER\Software\IS2010
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "Internet Security 2010"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run "winupdate86.exe"


Continue reading...

Kamis, 10 Juni 2010

Computer viruses: description, prevention, and recovery

This article was previously published under Q129972

To continue receiving security updates for Windows, make sure you're running Windows XP with Service Pack 3 (SP3). For more information, refer to this Microsoft web page: Support is ending for some versions of Windows.

This article discusses the following:
  • How to determine whether your computer is infected with a computer virus, a worm, or a trojan
  • How to recover from an infection
  • How to prevent future infections from a computer virus

What is a computer virus?

A computer virus is a small software program that spreads from one computer to another computer and that interferes with computer operation. A computer virus may corrupt or delete data on a computer, use an e-mail program to spread the virus to other computers, or even delete everything on the hard disk.

Computer viruses are most easily spread by attachments in e-mail messages or by instant messaging messages. Therefore, you must never open an e-mail attachment unless you know who sent the message or unless you are expecting the e-mail attachment. Computer viruses can be disguised as attachments of funny images, greeting cards, or audio and video files. Computer viruses also spread by using downloads on the Internet. Computer viruses can be hidden in pirated software or in other files or programs that you may download.

Symptoms of a computer virus

If you suspect or confirm that your computer is infected with a computer virus, obtain the current antivirus software. The following are some primary indicators that a computer may be infected:
  • The computer runs slower than usual.
  • The computer stops responding, or it locks up frequently.
  • The computer crashes, and then it restarts every few minutes.
  • The computer restarts on its own. Additionally, the computer does not run as usual.
  • Applications on the computer do not work correctly.
  • Disks or disk drives are inaccessible.
  • You cannot print items correctly.
  • You see unusual error messages.
  • You see distorted menus and dialog boxes.
  • There is a double extension on an attachment that you recently opened, such as a .jpg, .vbs, .gif, or .exe. extension.
  • An antivirus program is disabled for no reason. Additionally, the antivirus program cannot be restarted.
  • An antivirus program cannot be installed on the computer, or the antivirus program will not run.
  • New icons appear on the desktop that you did not put there, or the icons are not associated with any recently installed programs.
  • Strange sounds or music plays from the speakers unexpectedly.
  • A program disappears from the computer even though you did not intentionally remove the program.
Note These are common signs of infection. However, these signs may also be caused by hardware or software problems that have nothing to do with a computer virus. Unless you run the Microsoft Malicious Software Removal Tool, and then you install industry-standard, up-to-date antivirus software on your computer, you cannot be certain whether a computer is infected with a computer virus or not.

Symptoms of worms and trojan horse viruses in e-mail messages

When a computer virus infects e-mail messages or infects other files on a computer, you may notice the following symptoms:
  • The infected file may make copies of itself. This behavior may use up all the free space on the hard disk.
  • A copy of the infected file may be sent to all the addresses in an e-mail address list.
  • The computer virus may reformat the hard disk. This behavior will delete files and programs.
  • The computer virus may install hidden programs, such as pirated software. This pirated software may then be distributed and sold from the computer.
  • The computer virus may reduce security. This could enable intruders to remotely access the computer or the network.
  • You receive an e-mail message that has a strange attachment. When you open the attachment, dialog boxes appear, or a sudden degradation in system performance occurs.
  • Someone tells you that they have recently received e-mail messages from you that contained attached files that you did not send. The files that are attached to the e-mail messages have extensions such as .exe, .bat, .scr, and .vbs extensions.

Symptoms that may be the result of ordinary Windows functions

A computer virus infection may cause the following problems:
  • Windows does not start even though you have not made any system changes or even though you have not installed or removed any programs.
  • There is frequent modem activity. If you have an external modem, you may notice the lights blinking frequently when the modem is not being used. You may be unknowingly supplying pirated software.
  • Windows does not start because certain important system files are missing. Additionally, you receive an error message that lists the missing files.
  • The computer sometimes starts as expected. However, at other times, the computer stops responding before the desktop icons and the taskbar appear.
  • The computer runs very slowly. Additionally, the computer takes longer than expected to start.
  • You receive out-of-memory error messages even though the computer has sufficient RAM.
  • New programs are installed incorrectly.
  • Windows spontaneously restarts unexpectedly.
  • Programs that used to run stop responding frequently. Even if you remove and reinstall the programs, the issue continues to occur.
  • A disk utility such as Scandisk reports multiple serious disk errors.
  • A partition disappears.
  • The computer always stops responding when you try to use Microsoft Office products.
  • You cannot start Windows Task Manager.
  • Antivirus software indicates that a computer virus is present.
Note These problems may also occur because of ordinary Windows functions or problems in Windows that are not caused by a computer virus.

How to remove a computer virus

Even for an expert, removing a computer virus can be a difficult task without the help of computer virus removal tools. Some computer viruses and other unwanted software, such as spyware, even reinstall themselves after the viruses have been detected and removed. Fortunately, by updating the computer and by using antivirus tools, you can help permanently remove unwanted software.

To remove a computer virus, follow these steps:
  1. Install the latest updates from Microsoft Update on the computer.
  2. Update the antivirus software on the computer. Then, perform a thorough scan of the computer by using the antivirus software.
  3. Download, install, and then run the Microsoft Malicious Software Removal Tool to remove existing viruses on the computer. To download the Malicious Software Removal Tool, visit the following Microsoft Web site:
For more information about how to remove a computer virus, visit the following Microsoft Web site:
http://www.microsoft.com/protect/computer/viruses/remove.mspx

How to protect your computer against viruses

To protect your computer against viruses, follow these steps:
  1. On the computer, turn on the firewall.
  2. Keep the computer operating system up-to-date.
  3. Use updated antivirus software on the computer.
  4. Use updated antispyware software on the computer.
For more information about how to protect a computer against viruses, visit the following Microsoft Web site:
http://www.microsoft.com/protect/computer/default.mspx

How to obtain computer virus and security-related support

For United States and Canada

The computer safety team is available for computer virus and for other security-related support 24 hours a day in the United States and in Canada.

To obtain computer virus and security-related support, follow these steps:
  1. Before you contact a support engineer, make sure that you run updated antivirus software and updated spyware removal software on the infected computer.

    For more information about how to obtain a free computer safety scan, visit the following Microsoft Web site: For more information about antispyware software, visit the following Microsoft Web site:
  2. Call 1-866-PCSAFETY or call 1-866-727-2338 to contact security support.

For locations outside North America

To obtain computer virus and security-related support for locations outside North America, visit the following Microsoft Web site:
http://support.microsoft.com/common/international.aspx?rdpath=4

APPLIES TO
  • Microsoft Windows Server 2003, Datacenter Edition (32-bit x86)
  • Microsoft Windows Server 2003, Enterprise Edition (32-bit x86)
  • Microsoft Windows Server 2003, Standard Edition (32-bit x86)
  • Microsoft Windows Server 2003, Web Edition
  • Microsoft Windows Server 2003, 64-Bit Datacenter Edition
  • Microsoft Windows Server 2003, Enterprise x64 Edition
  • Microsoft Windows Small Business Server 2003 Premium Edition
  • Microsoft Windows Small Business Server 2003 Standard Edition
  • Microsoft Windows XP Home Edition
  • Microsoft Windows XP Professional
  • Microsoft Windows XP Media Center Edition 2005 Update Rollup 2
  • Microsoft Windows XP Tablet PC Edition
  • Microsoft Windows 2000 Server
  • Microsoft Windows 2000 Advanced Server
  • Microsoft Windows 2000 Professional Edition
  • Microsoft Windows 2000 Datacenter Server
  • Microsoft Windows NT 4.0
  • Microsoft Windows Millennium Edition
  • Microsoft Windows 98 Second Edition
  • Microsoft Windows 95
  • Microsoft Outlook 2002 Standard Edition
  • Microsoft Outlook Express 6.0
Keywords:
kbmsccsearch kbpubtypekc kbfirewall kbvirus kbhowto kbenv kbinfo KB12997


Continue reading...

Win32/Sality Remover description

A useful tool for deleting the Win32/Sality virus from your computer

Win32/Sality Remover will allow you to easily clean the virus infection from your PC. All you need to do is download the three files and run the executable.

You can also specify the disks (or partitions) to heal as a command parameters, e.g.: "rmsality C: D:". If the command is used without parameters, it heals all disks (partitions) on computer.

Note:
Successful running of the remover requires administrator rights. For proper functionality of the remover it is necessary to save the rmsality.nt and rmsality.dos into the same folder as rmsality.exe. After the healing process please run the AVG Complete Test to make sure your computer is virus-free.

DOWNLOAD Win32/Sality Remover 1.1.0.153

Continue reading...

Selasa, 08 Juni 2010

avast! antivirus Home Edition 5.0.545

Avast Free 5, an A-list freeware antivirus app, provides the same steadfast protection of well-known, pricier antivirus programs. Avast is remarkable for both its effectiveness and arguably providing the most complete free antivirus on the market.

Avast Free 5, formerly known as the Home Edition, protects you with multiple guards. The antivirus, antispyware, and heuristics engines form a security core that also includes multiple real-time shields. The adjustable mail and file system shields join the pre-existing behavior, network, instant messaging, peer-to-peer, and Web shields. The behavioral shield is a common-sense feature, as security software publishers leverage their large user bases to detect threats early and warn others. Other new features include a silent-gaming mode and an "intelligent scanner" that only looks at changed files after establishing a baseline. The biggest change in Avast 5, though, is the interface. Gone is the music player default look, which was skinnable but confusing. In its place is a sleek UI that new users should find far more manageable. It's also Aero-friendly, with Explorer-style navigation buttons in case you can't remember where you tweaked a particular setting.

Avast's recent independent third-party testing has been notably solid, able to hold its own against better-known programs from Symantec and Microsoft. Avast 5 Free lacks features in the paid upgrade including antispam measures, a testing sandbox, a Script shield, and a firewall. Even without those, Avast Free 5 is probably the strongest, free antivirus currently available.

DOWNLOAD

Continue reading...

Detailed Description of Ansav 2.0.40

Ansav Ansav is a free antivirus utility designed to identify, thwart and eliminate computer viruses and other malicious software (malware).

ANSAV, abbreviation from Ans AntiVirus, ANSAV is an application that run on Windows XP, was made especially to handle various mallware like virus, Trojan and Spyware.

ANSAV was not the same as commercial Antivirus, ANSAV only designed as portable software and could be undertaken without needing the installation, because ANSAV not resident and only treated.

At this time ANSAV could have detected various newest local virus (Indonesia Viruses) and several foreign viruses that often circulated in Indonesia, but ANSAV could not be relied on as personal Antivirus because quite few viruses that could be detected by other Antivirus and was not detected by ANSAV, this was caused of the limitations Antivirus database (the virus definition signature).

ANSAV was developed in the Indonesian scope (local support only) although could have detected several foreign viruses, therefore your role to always send the sample of the newest virus that still could not be detected by ANSAV was really needed, so that ANSAV always became your mainstay weapon to eradicate the virus especially the local virus.

D0WNLOAD NOW

File size : 0.68 MB


Continue reading...
 

Patron Computers And Mobile Phones From Viruses Copyright © 2009 Not Magazine 4 Column is Designed by Ipietoon Sponsored by Dezigntuts