Temporary Internet Files – Windows Temp Files, Safe To Delete ?

Temporary Internet Files – Windows Temp Files, Safe To Delete ?

Now here we go – needed is the quick computing lesson about what Temporary Files are safe to delete and not. The one piece of information in all my years around forums and personal websites (Community Help) was about software Temporary Files via software programs created was never mentioned or explained. This is by people that don’t know and never asked yet have great looking websites with plenty of other great information. How they all seem to miss this simplicity is a mystery and for all these years.

To clean up and why….. All the “clean up your tracks” and the “clean up your browsing history” and the “clean up your temporary computer history files” and all the like (and for personal security reasons) are all these various clean up utilities and many free for download and how to get to and clean up in a click the Windows / Temp files. HOWEVER, please read and for a trusted safe utility for these – I am only going to mention one of the most trusted and used and is actually Genuine Freeware (no ads, not ad-driven) and that is CCleaner HERE:

CCleaner – Home CCleaner created by Piriform authors of the hugely popular
freeware tools CCleaner, Recuva and Defraggler.

 What is always safe to delete are “Internet Temporary Files” like when you open Internet Explorer (others – Firefox, Chrome) > Click Tools > Internet Options > Browsing History……
These are Windows magic, which makes computing fast (like a nano second actually) . These are all the like graphics images and pictures an gif (cartoon/animated) stored on the PC from each website you visit -continually but not doubles – and with each visit these are about instantly pulled up rather than re-downloading them which really has helped with Dial Up connection computing. If these are not deleted, they just keep piling up and  piling up and are literally trash files – worthless other than for the speed afforded. Security wise if these are tapped by some spyware etc, they can see  browsing history like financial logos or even password protected sites visited just by the graphics and pictures, images from the visit. You can plainly  see this in their several folders – click View these. Also you may come across Windows Media movie files if you downloaded to view or there may have been an embedded player play one – but the entire copy of the movie is here (may have changed with newer versions of browsers) . You are not going to see all the text on pages here.

PART TWO….. is the software and Windows temporary files. WINDOWS TEMP FILES ARE TO BE TREATED LIKE SOFTWARE INSTALLATION TEMPORARY FILES WHICH ARE NOT TO BE IMMEDIATELY DELETED ! The software temporary files from installations are found when using Disk Clean Up (part of Windows). If you run Windows Disk Cleanup these will be presented as a menu item. You never delete these as you will see by highlighting them and click once to show the information about these at bottom and Windows explains like “these are safe to delete…. not used in 2 weeks or so…”.  Softwares may or may not use these but after installation and after first usage. If the software is working just fine and on your way – that is when these are safe to delete. They are kind of like the “Repair Software” process many softwares have built into then rather than delete/reinstall a software with problem. These are usually special type or shareware software programs with Repair – not like little free utilities or Solitaire games etc.
These softwares have built into them to bug fix and restore missing program files in Repair (saves the time of uninstall / reinstall). This is why you wait for new softwares to convince themselves they are installed correctly and working properly before deleting their Temporary files. THIS is how Windows TEMP files are to be treated. DO NOT simply click Delete in clean up utilities and certainly NEVER manually delete their Folders and make sure these  are NOT included in clean up utilities that have the “Delete All Zero Content (empty) Folders” – uncheck this – it is VERY irresponsible as there can even be Log Files Folders as part of an installation that just happened to be empty (zero content) or security Log folders and so on. Uninstalled software  many, many times leaves an empty folder in Windows / Program Files. These are trash and is what those utilities features were referring to but will delete the others being part of the software.

To delete Windows / TEMP files best practices are to be in a low/no lot of activity going on with softwares and the internet and on and on. If you are
going to run this clean up it should after like when you are shutting down for the day – everything closed and after a fresh reboot from this. Let the PC  sit for at least 5 minutes after it has started and all loaded ready to go – and observe any scheduled feature you may have (calendar reminder etc).  Close down all programs you can from start up tray. Keep it calm and wait a minute and more with these actions. You don’t want Windows running to  perform this. You have things shut down NOTHING running and waiting a few moments and your PC is on and very still and quiet….. NOW run the  Windows TEMP clean up. Otherwise there may be mistaken deletions or rather error messages that certain of these files are in use – “can not delete  the selected files” and the bang noise (fatal error bang) even.

Along all these clean up lines there all also the Windows Logs and Error Reporting etc. Do not delete these unless any bug or glitch or notification of
Windows sending out an error report and so on is days past like at least a week or so. Over cleaning can actually back fire and slow down the computer  if and when replacement files need to be created. Certainly after cleaning up the Temporary Internet Files – the first couple clicks to websites take that  nano second extra because it can not fetch the temporaries and has to download them.

RANT: Said all that to say this….. some groups or forums or people would have just answered “yeah, they are definitely trash and safe to delete – just click delete all” . There was nothing further from the truth. You then go to the next one to see the person asking how to fix missing files. Two, three  paragraphs are necessary to answer most security and computer help questions …. not a text messaging group with one liners that grew out of pay per  minute internet from Usenet days before Windows 95.

As well in security it is also recommended to go to Start > Control Panel > Java and open the Java panel and click “Do Not Store  Temporary Files On This Computer” ….Malware as well has used Java to infect computers and can hide in these temporary files in the  system. This will not affect navigation at all. These are like Temporary Internet Files and are stored for re-visit to a website to load it just a tad faster as the Temporary Internet Files are used for and stored for those reasons. These are junk/trash files completely safe  to delete. (In other words when going to a website – any images and pictures and some text items are stored on the computer as well as the cookies files. When re-visiting that same website – these are uploaded from the computer rather than re-downloading then over the internet each time which makes the loading of the website page a tad faster. In real world – it is like nano seconds of no real noticeable speed to the naked eye.) 


Posted in BlueCollarPC WordPress Blog. Tags: , , , , , . Comments Off on Temporary Internet Files – Windows Temp Files, Safe To Delete ?

TIP: How does a computer become a zombie computer in botnet ?

TIP: How does a computer become a zombie computer in botnet ?

Clicking the “You need to install a codec for player to view – click ”

Beware Fake Codecs – it could be a trojan

OR – Attempting to retrieve illegal software …..

Warez – Wikipedia, the free encyclopedia
The word warez is intended as a plural of “ware”, short for computer
software. Thus it is intended to be pronounced like the word wares,
/’w??rz/, …

….at places like this….

P2P Dangers (Peer to Peer file swapping)
Summary: A peer network used primarily for music file sharing. In an
organization, can degrade network performance and consume vast amounts of
storage. Is bundled with many spyware/adware products. Category: P2P… Any
peer-to-peer file swapping program, such as Audiogalaxy, Bearshare,
Blubster, E-Mule, Gnucleus, Grokster, Imesh, KaZaa, KaZaa Lite, Limewire,
Morpheus, Shareaza, WinMX and Xolox. In an organization, can degrade network
performance and consume vast amounts of storage. May create security issues
as outsiders are granted access to internal files. Often bundled with Adware
or Spyware.

…… will leave your computer NEVER seeing the light of day again as being

World computers hijacked into botnets went from estimates in 2007 at 7 to 11
percent to a year later at 25 percent.
They are now reported as high as 40 percent of the 800,000,000 (800 million)
world computers…..
Understanding and Defending against Botnets and Stealthy Malware
Dr. Dobb’s Journal Thu, 16 Jul 2009 09:35 AM PDT
Developing anti-botnet defense strategies Sponsored Topics: Botnet –
Security –
Federal Trade Commission – Spyware – Law

Who are responsible for catastrophic damage to one and attempt on another of my computers and who are also responsible for up to 90 percent of world spam (UCE) and is why these people are hated by everyone who engages this and software piracy.

Business Software Alliance – Software Piracy Prevention
Informing the public of the effects of software piracy, and of action
that can be taken to curb this ongoing activity.

Genuine Microsoft Software
One of the many benefits of owning genuine Microsoft software is gaining
access to Microsoft Support Services. Below are two ways to help you
determine whether your version of Windows is genuine.

Software Piracy Protection
Information on piracy as well as tips on how to protect yourself against it.

Microsoft Security Center fake warnings in your task bar…
Briefly: “How to Remove SpyFalcon” (Review in full at website)
SpyFalcon is a anti-spyware program that is known to issue fake warnings on
your computer in order to manipulate you into buying its full commercial
version. If you are infected with this program you may receive warnings in
your task bar that appear to be from Microsoft Security Center stating that
you are infected with spyware and to run its special anti-spyware tool. This
tool turns out to be the commercial version of SpyFalcon. These warnings are fake and are a goad to have you buy the commercial version of this

World computers hijacked into botnets went from estimates in 2007 at 7 to 11 percent to a year later at 25 percent. They are now (ending 2009) reported as high as 40 percent of the 800,000,000 (800 million) world computers…..

Read up a great article here….

Understanding and Defending against Botnets and Stealthy Malware
Dr. Dobb’s Journal Thu, 16 Jul 2009 09:35 AM PDT
Developing anti-botnet defense strategies Sponsored Topics: Botnet – Security –
Federal Trade Commission – Spyware – Law

PLAY))) Malware Botnet Cartel (BCPCNet-Modcasts) 26.2M
www. bluecolla rpc. net/d ownloadsMOVED—  /Des troyBotnetC  artel.mp3
RELOCATED: http://gerald60606.spaces.live.com/default.aspx
January 18, 2007 – Size 26.2M AUDIO MP3
Malware Botnet Cartel
This Modcast contains my personal blunt observations about the actual greatest threat today – what is called in slang the “zombie networks” in the world. Plainly, zombie networks are made up of hijacked average user computers that are infested with malware and are called zombie computers individually. The other term mostly used is Botnets – meaning the same thing – but jargon here as malware botnets rather than any other valid use type ones – but here meaning with nefarious or extremely wicked or villainous use. I propose a new term to describe what possibly may be an alarming truth – a nefarious Botnet Cartel – and the dawn of a Magna Carta to destroy the evil Botnot Cartel worldwide. This is a challenge in discussion for every user, new an old, as a last ditch campaign to free every user from the “Botnet Cartel” as it is my opinion that the World Raid on them may result in wholesale arrests even against the average user that neglected security or simply refused to purposely. The current reports in January 2007 right off the presses are estimates of 7 to 11 percent of world computers are in a malware botnet either by choice or neglect and directly responsible for up to 4 percent of the United States population that are suffering Identity Theft annually and up to 60 to 70 percent of all world (UCE) Unsolicited Commercial Email – “Spam”. The challenge… listen up and join in the proposal. “Malware Botnet Cartel”.

An Uptick on the Council of Europe Treaty on Cybercrime……

Hacker-Tool Law Still Does Little
On August 10, 2007, a new section of the German Penal code went into effect. The statute, intended to implement certain provisions of the Council of Europe Treaty on Cybercrime, could be interpreted to make the creation or distribution of computer security software a criminal offense.

Differences – sharware, freeware, donate Security products

Differences – sharware, freeware, donate Security products

We are at such a late date in malware today – but a new decade in the Security horizon. In the years I have been a Helper in the community I have found generally the greatest threat is actually someone not aware of the dangers. Of course I finally got rid of my almost humiliating “newbie” tag days and then the computer jargon of it all comes into play – learnong how to even pose an intelligent question. Like learning finally there are viruses and worms – but these are not adware and spyware which are different and antivirus products do not get rid of them and is why they created antispyware products. And then the “Orson Wells” of it all – is it all “snake oil” (worthless products) or the industry itself infects and “milk money” (mafia protection fee) is collected through anti this and anti that.

Unfortunately all malware is exactly as described in any publication you will find – meaning the horror of computer damage or the horror of cyber criime as far as IDTheft and the like areas there as corporate extortion and so on. What to do ?

Just becoming aware of threats has won the ballgame, believe me.  In discovering the dangers of malware – virus and worm can destroy, adware and spyware can spy copy and broadcast data, trojans and rootkits can control – in the simple act of becoming aware of threats to computers and personal data today has put you on the road to Computing Safety. This is because the next logical step one takes is to find out how to get protected if possible. This next step is to today’s security solution products – security softwares antivirus, antispyware, and a personal firewall for each computer.

Now, you soon find out about “Real Time Protection” which is as heuristics or intrusion protection or any tag name for these universal technologies protecting everything 24/7. Everywhere you browse, all email attachments and emails themselves (embedded threat as a jpeg photo virus) , downloading and opening softwares and files and documents etc – all is monitored for infection ready to execute to either mess up your computer or financial life.

If you just caught up with that – you have found out the free home versions traditionally have no Real Time Protection activated which is after purchase, though there have been a couple high quality products offered free to the Community such as former award winning (West Coast Labs Certification, VB100 award) Microsoft Windows One Care antivirus which is now free to the community from them and renamed “Microsoft Essentials”. Of course there has been popular and very effective Windows Defender which began as Microsoft Antispyware and is not part of Windows in Vista and after (can use or not). Windows Defender is one of two antispyware programs in all the world I know of that indeed has Real Time Protection as pay products do. The other of course is popular Spyware Terminator with enterprise Clam antivirus which apparently removed offenses from the old Crawler toolbar listed as malware and now is clear of the red flagging in the industry. Sometimes they call that a “rebranded” toolbar. Many times crimeware is changed a little, repackaged, and reused to infect to get past detection which has been laughable to the security industry.

So bottom line and closing message is the point of this post – the difference in realizing you were not protected if you used a free or donate home version product that does not have Real Time Protecion activated traditionally in shareware (purchased) products. The free home versions offered by many top companies are called stand alone scanners and are “reactive” protection – scanning for and removing after infections. The real time products are called the proactive security solution.

(originally at our aol answer blog)

Posted in BlueCollarPC WordPress Blog. Tags: , , , , , , , , . Comments Off on Differences – sharware, freeware, donate Security products

New Amatuer Forensics Build in Progress – “Nimrod Botnet”

New Amatuer Forensics Build in Progress – “Nimrod Botnet”

This is the preliminary notes of the build with an important Estimate.


Amatuer Forensics Build – Nimrod Botnet

History: Is Grisoft AVG Free Reverse Engineered by Botnets? By bluecollarpc http://bluecollarpc.wordpress.com/2009/04/15/is-grisoft-avg-free-reverse-enginee\ red-by-botnets/

(((Forensics Build – Nimrod Botnet))) Date: July 30 2009



Title: “Nimrod Botnet” (Nimrod was a hunter)

Infection Date:

a-squared Anti-Malware – Version 4.0 Last update: 4/13/2009 9:45:09 AM

Entry Threat: Win32.Outbreak!IK

(Adding report on trojan found in Windows Error Reporting)

ESTIMATE: Virtualization Comprimise


NON SAMPLE…. US labs virtualise 1m Linux kernels (anti-botnet research) ZDNet UK Wed, 29 Jul 2009 08:37 AM PDT Sandia National Labs have simultaneously run more than a million Linux kernels on a single cluster, an accomplishment that could prove useful for anti-botnet research…. http://news.zdnet.co.uk/software/0,1000000121,39698952,00.htm

 TARGET: Windows Server 2008 http://en.wikipedia.org/wiki/Windows_Server_2008  

Windows Server 2008 is the most recent release of Microsoft Windows’ server line of operating systems. Released to manufacturing on February 4, 2008 and officially released on February 27, 2008, it is the successor to Windows Server 2003, released nearly five years earlier. A second release, named Windows Server 2008 R2, was released to manufacturing on July 22, 2009.

Like Windows Vista and Windows 7, Windows Server 2008 is built on Windows NT 6.x. Self-healing NTFS In previous Windows versions, if the operating system detected corruption in the file system of an NTFS volume, it marked the volume “dirty”; to correct errors on the volume, it had to be taken offline.

With self-healing NTFS, an NTFS worker thread is spawned in the background which performs a localized fix-up of damaged data structures, with only the corrupted files/folders remaining unavailable without locking out the entire volume and needing the server to be taken down. The operating system now features S.M.A.R.T. detection techniques to help determine when a hard disk may fail. This feature was first presented within Windows Vista.[10]

Best guess….. with Disk Defragger and Disk Check inoperative (begins and moment later progress vanishes – reboot unable to run), and with System Restore corupted – this seemed the target is to hide a dirty disk.

Apparently trial runs on personal Vista PCs (Ho Prem) through the “reverse engineering” of the anitvirus product broken into. Why would they do that…. to install counterfiet components of Unix-Like for example to even run dual server communication undetected.

In other words Windows Server 2008 and Self-healing NTFS are “cracked” and thus the Windows Server 2008 R2 was released to manufacturing on July 22, 2009.

Recommendation – upgrade.


Additional sources… news.admin.net-abuse.sightings http://groups.google.com/group/news.admin.net-abuse.sightings/msg/c26324447d0f23ef  

Webmaster BlueCollarPC.Org http://www.BlueCollarPC.Org

and now I know my Vista like the back of my hand.

AmatuerForensics-Mobile: USB stick MP3 Player (apparent cross infection)

AmatuerForensics-Mobile: USB stick MP3 Player (apparent cross infection – PC /Mobile PC)……

NOTE this threat installation had tell tale signs of perhaps even the first
Windows Mobile mobile botnet. It was successfully blocked from establishing connection and detected before ever causing any damages and safely removed.

Mobile Threat: FlashMates_(v1[1].0.4)_Setup.exe / which is identified as
Email-Worm.Win32.Apbost!IK [Ikarus antivirus = IK]

PDA Mobile Cafe’s Blog
Mobile PC and everything wireless – cell, pda, laptop

USB stick MP3 Player labled Nextar (apparent cross infection – PC / Mobile PC) July 24, 2009 by pdamobilecafe
A USB stick MP3 Player labled Nextar (apparent cross infection – PC / Mobile PC)

Funny thing happened when plugging in (to desktop pc) a USB stick MP3 Player labled Nextar (cross infection) from a friend. Read on.

Possibly a black market relabled fake and there are apparent even criminal
“clone” or “phisher” or “pharmer” sites around emusic.com. Suddenly, an apparent “cross infection” ocuured in the Pocket PC Windows Mobile – a mass emailing worm ! Isn’t that fun (sarcasm).

eMusic – Wikipedia, the free encyclopedia eMusic is an online music store that operates by subscription. It is headquartered in New York City and owned by Dimensional Associates, LLC. … http://en.wikipedia.org/wiki/EMusic

Press Releases – Mi5 Networks Secure Web Gateway Feb 2, 2009 … Detailed reports enable eMusic to quickly identify infected machines on the network, understand the specific types of malware involved and …

Apparent Open Source Project: eMusic/J 0.25

Uh Oh…….

Name: Adware.Win32.eMusic Toolbar


FILES Detected…. (apparently instantly – inserting USB MP3 Player)

DESKTOP: (windows xp home)



#Trys to connect to “malicious host” emusic.com / apparent back door threat ? Blocked. USB Stick removed. Still attempts to connect after PC restarted or using media player(s). Seems a registry hook possible ? Scanned, not found. Looking manually.


Stick in and out (on desktop). The continuing attempt to re-connect to
“emusic.com” indicates either a registry hook of some sort or worst is a rootkit as not visual in the registry. See the Sony Rootkit nightmare.

#SCANNED – FOUND: MOBILE PC (Windows CE 3.0 / Pocket PC 2002)

Installs apparent mass emailing worm as possible part of “cross infection”:

#FlashMates_(v1[1].0.4)_Setup.exe / which is identified as
Email-Worm.Win32.Apbost!IK [Ikarus antivirus = IK]

SEE Analyzing the Crossover Virus: The First PC to Windows Handheld
Cross-infector http://www.informit.com/articles/article.asp?p=458169&rl=1

NOTES: Adding more if found

The Exercise ? Watch out you didn’t get the real product




a-squared Anti-Malware v.
(C) 2003-2009 Emsi Software GmbH –

ID Object
0 C:\Program Files\Uniblue\System Tweaker\System Tweaker.exe
1 C:\Documents and

NOTES: The “Email-Worm.Win32.Apbost!IK” is the worm and file name is
(location “POCKETPC-DOXX” caught in dummy folder. It takes two to play games. IK is symbol for Ikarus antivirus)

New start up after quarantine and emusic connect attempt blocked again
(antimalware program). A registry hook (originally suspected as cause) generally is involved with one entity (unless multiple), here media players, that is easily detected and deleted. This did show files in two media players (with premium features) and now has jumped to Windows Media Player – which symptomology is as a self replicating worm does, but apparently here – as indeed a rootkit does – is as like a matrix that continually can give various commands (more powerful than a trojan and can continually install more software) and is best best guess of the symptoms experienced. The activity shows the “matrix” (several) commands severally or mutiple times after deletions which is almost as the self replicating worm does when deleted and is reinstalled elsewhere but finally gets deleted by antivirus. This indicates the rootkit activity as quite posible and the infection.


Visit: PDA Mobile Cafe Homepage
Mobile Portal: http://mysite.verizon.net/gerald_309/id16.html
Forums: http://pdamobilecafe.freeforums.org/

Posted in PDAMobileCafe Blog Alerts, PDAMobileCafe Blog Announcements,
PDAMobileCafe BlogPosts


PDA Antivirus solutions available – shop!
By pdamobilecafe
Security Software: PDA Antivirus solutions available….. shop !

Try a trialware of the products where available. The Mobile Computer is now NO different then the Desktop – all the same threats are now out here. Symbian gets slammed.


Security Software: PDA Antivirus solutions available….. shop !

Try a trialware of the products where available. The Mobile Computer is now NO different then the Desktop – all the same threats are now out here. Symbian gets slammed.


Air Scanner.com AntiVirus (Free/Private Use, and Company/Corporate License)
http://www.airscanner.com (Also sells PDA Firewall ! )
Online Updates through Active Sync ! From the company that wrote the
best-selling technical book Maximum Wireless Security comes a professional strength virus scanner for the Pocket PC.

BullGuard Mobile for PPC
Protect yourself against malware when online with your PPC.

ExoVirusStop 1.0.4
Protect your Symbian series 60 phone against viruses and Trojans, with this
antivirus product. ExoVirusStop brings some new and innovative features, which make this software unique. The file size is small, so it won’t use up your phone’s storage space. Very fast scanning engine takes a few seconds to check your phone for viruses. Virus dictionary allows you to read useful information and details on the viruses that exist for the Symbian OS. Known viruses and their variants: Caribe, Skulls, Mosquitos, Gavno.

F-Secure.com (Pocket PC, Pocket PC 2002, Windows Mobile and PocketPC 2003)
F-Secure is the forerunner in creating security applications that are optimized for wireless devices and offer reliable and automatic on-device protection. F-Secure Anti-Virus ensures complete protection for your handheld devices. F-Secure also offers security solutions for mobile operators and service providers. Microsoft ActiveSync 3.5 or later to install. The virus definitions of F-Secure Anti-Virus for Pocket PC can also be updated over a wireless connection, such as GSM/GPRS phone, WLAN or Bluetooth connectivity.

ESET Mobile Antivirus for Smartphones
(Eset makes the famed NOD32 Antivirus for PCs)
Mobile devices like Smartphones and PocketPCs are exploding in numbers. Malware that targets them is bound to follow. Detecting and disabling these emerging threats requires sophistication beyond signature-based antivirus. ESET’s heuristics engine is the best protection for individuals and businesses that depend on mobile communication. Fast and thorough scanning keeps your files free of malware and our SMS spam filter keeps your text message folder uncluttered.

Kaspersky Security for PDAs (Palm, PocketPC)
Today, most of us own not only PCs and laptops, but handhelds as well. They
provide convenient, portable data storage. But this convenience may come at a price. The down side is that handhelds are just as subject to virus infections and data theft as PCs and laptops. They also offer viruses entry to home and business networks alike.

SMobileSystems (FB-4 Virus Guard)
Formerly, FB-4 Virus Guard http://www.fb-4.com
About SMobile Systems….
SMobile is the world leader in providing comprehensive software
security solutions for all major mobile device platforms, including
BlackBerry,Windows Mobile, Symbian, Palm, iPhone and Android.

Avira AntiVir Mobile
Professional virus and malware defense for Pocket PCs and smartphones
Operating systems: Windows Mobile 2003 for Pocket PC, Windows Mobile
2003 Second Edition, Windows Mobile 5 and Windows Mobile 6.1 (Classic
and Professional Edition) Processors: ARM or Intel x86
Nokia 3230, 6260, 6600, 6620, 6630, 6670, 6680, 6681, 6682, 7610, N70 and N72 Panasonic X700 and X800 Samsung SGH-Z600, SGH-D720 and SGH-D730 Nokia Communicator 9300 and 9500

PC-cillin Virus Protection (Full Services- All Downloads ARM,etc.)
WebClip: ” Protect your computer and PDA from viruses at home or on the go with PC-Cillin 2003. PC-Cillin combines advanced virus detection and cleaning with an integrated firewall to safeguard your system from hackers and malicious code threats in e-mail and instant messaging and while surfing the Internet. New features such as Wi-Fi protection help secure your computer when connecting to a wireless LAN network, and Outbreak Alert gives you early warning about new viruses.”

PC-cillin Virus/ Wireless2.0 – PalmOS 3.1-up [32k]
Freeware version. Scans all files and identifies any infected. Log report

PC-cillin Virus/ Wireless2.0[MIPS]Windows3.0 [612k]
Freeware version. Scans all files and identifies any infected. Log report (1k,
each scan, deleteable) includes Virus list.

PC-cillin Virus/ Wireless2.0[SH3] Windows3.0[561k]
Freeware version. Scans all files and identifies any infected. Log report (1k,
each scan, deleteable) includes Virus list.

PC-cillinVirus/ Wireless2.0[ARM] Windows3.0 [535k] (PocketPC)
Freeware version. Scans all files and identifies any infected. Log report (1k,
each scan, deleteable) includes Virus list.

Symantec AntiVirusT for Handhelds – Norton
Annual subscription anti-virus protection with live Updates for PDA /Palm and PocketPC, others, versions. Works through Sync (HotSync , ActiveSync, etc.). Protects Device and also over wireless internet like WiFi 802.11. Check out Live Updates downloads wirelessly as well. Protects Beam Infrared!

Anti-virus for Symbian Series 60 – now free (ExoVirusStop.com) !!!
Current IT news from heise online – London,UK
Exosyphen Studios has made it’s ExoVirusStop anti-virus software for Symbian Series 60 mobiles
running variants of S60 1st and 2nd Edition free to download. …
Anti-virus for Symbian Series 60 – now free
Exosyphen Studios has made it’s ExoVirusStop anti-virus software for Symbian Series 60 mobiles running variants of S60 1st and 2nd Edition free to download –
The older S60 1st and 2nd Edition phones include those up to the Nokia N70 and N90. According to the companies blog “there are no strings attached and no catches.”… FULL STORY



PDA Mobile Cafe Members Area:
PDA Mobile Cafe AvantGo Channel (view online):
Wireless Help Links:
PDA Mobile Café
Vista: http://www.bluecollarpc.net/myvistapc.html
BlueCollarPC.Net: http://www.bluecollarpc.net/allwireless1.html
Philly-WiFi Philadelphia Wireless Club:
Yahoo! Groups Links

Tags: airborne, mobile antimalware, mobile antivirus, mobile malware, mobile security

An Uptick on the Council of Europe Treaty on Cybercrime

An Uptick on the Council of Europe Treaty on Cybercrime……

Hacker-Tool Law Still Does Little
On August 10, 2007, a new section of the German Penal code went into effect. The statute, intended to implement certain provisions of the Council of  Europe Treaty on Cybercrime, could be interpreted to make the creation or distribution of computer security software a criminal offense.

Posted in ANNOUNCE, BlueCollarPC WordPress Blog. Tags: , , , , , . Comments Off on An Uptick on the Council of Europe Treaty on Cybercrime

Rogue Gallery Helps IDentify Scam Software

Rogue Gallery Helps IDentify Scam Software

If you’re trying to figure out whether that “MalwareDefender2009” program is a legit app or a scam, a new listing of the known scams can help. …..


LavaSoft (makers of Ad-Aware, more)
The Rogue Gallery
The Rogue Gallery, powered by the Malware Labs at Lavasoft, is a resource
dedicated to keeping computer users safe from rogue security software. By
providing a comprehensive database of current rogue security applications, you have the ability to clearly see what programs are considered rogue – and avoid them. Navigate the Rogue Gallery by displaying the latest threats or by searching for specific programs, listed in alphabetical order. Use the “Submit a Rogue” link to quickly and easily send any suspicious programs directly to Malware Labs to be analyzed.

Title: The Spyware Warrior List of Rogue/Suspect Anti-Spyware Products & Web Sites 
Description: Bad, False, Fake products 
URL:  http://www.spywarewarrior.com/rogue_anti-spyware.htm 
About This Page – Please Read:
Those who have followed the development of this page since 2004 will have noted that the list of “rogue/suspect” anti-spyware products has not been updated since May 2007. Unfortunately, other time commitments have precluded our efforts to keep that list up to date. Since the last update dozens of “new” rogue anti-spyware programs have hit the ‘Net. The vast majority of them, however, are not really new, but are simply re-branded clones and knockoffs of the same rogue applications that have been around from years. In most cases, they are being pushed through the same deceptive practices by the same parties responsible for earlier versions. See in particular these “families” of anti-spyware products, which continue to live on through shameless re-branding: 15, 18, 19, 21, 22, & 23. 
If you are looking for information on the most recent rogue anti-spyware applications, we recomend visiting these sites:

BleepingComputer.com: Spyware & Malware Removal Guides
MalwareBytes: Newest Rogue Threats
MalwareBytes Blog
Bharath’s Security Blog
Sunbelt Blog



FBI Releases Warning about Scareware (US-CERT) http://www.us-cert.gov/current/index.html#fbi_releases_warning_about_scareware

Rating the best anti-malware solutions

Here are the results of this particular test:

1.G DATA Antivirus 2010: 99.8 percent
2.Trustport Antivirus 2010: 99.8 percent
3.AVIRA AntiVir Premium 9.0: 98.9 percent
4.McAfee VirusScan Plus 2010: 98.9 percent
5.BitDefender Antivirus 2010: 98.6 percent
6.eScan AntiVirus 10.0: 98.6 percent
7.F-Secure Anti-Virus 2010: 98.6 percent
8.Symantec Norton Antivirus 2010: 98.6 percent
9.Kaspersky Anti-Virus 2010: 96.7 percent
10.ESET NOD32 Antivirus 4.0: 96.5 percent
11.avast! Free 5.0: 96.3 percent
12.Sophos Antivirus 9.0.1: 95.4 percent
13.Microsoft Security Essentials 1.0: 94.6 percent
14.AVG Anti-Virus 9.0: 93.9 percent
15.Norman Antivirus & Anti-Spyware 7.30: 88.5 percent
16.Kingsoft AntiVirus 9 Plus: 87.1 percent

VB100 Award = Perfect scores ! (Top AntiVirus World Prize)
About the Virus Bulletin 100% award
The Virus Bulletin 100% awards recognise those products best able to detect viruses known to be ‘in the wild’. Unlike some other similar-sounding schemes, Virus Bulletin uses the most up-to-date WildList in its tests. This means that products that are ‘up with the game’ are the ones most likely to be granted VB100 awards. More information about Virus Bulletin can be found on its website: www.virusbtn.com.

ESET NOD32 Currently 59 VB100 awards !
This brings the ESET Antivirus VB100 award total to 59 – still
the highest of any antivirus vendor!
December 2009 – ESET antivirus scoops 59th VB100 Award

Sophos Antivirus (UK)
Sophos’s anti-virus engine and identities are now packaged into
Webroot Spy Sweeper with Anti-Virus (Webroot Spysweeper one of world’s best)
Sophos wins VB100 on Windows XP
…..the 46th VB100 that Sophos has received !
(Note, Sophos is a corporate business application only available to Home Desktop in the new “marriage” combo suite created recently with industry leader Webroot Spysweeper.)

F-Secure Awards – Award-Winning Antivirus and Protection Products

Advanced +++ in AV-Comparatives Performance test
Dec 23, 2009
Anti-virus (Award)
F-Secure Internet Security 2010 receives VB100 award in the latest Virus Bulletin comparative review.
VB100 award
Dec 01, 2009
Internet Security (Award)

Kaspersky (Russia)
Kaspersky Lab’s antivirus solutions win prestigious VB100 award in testing on Windows 7 platform
One of the most popular anti-virus solutions among computer users, Kaspersky Anti-Virus 2009, won a VB100 award from Virus Bulletin on Windows Vista Business Edition.


PC Tools Spyware Doctor with AntiVirus (PC Tools Spyware Doctor one of world’s best)
PC Tools receives prestigious Virus Bulletin VB100 awards
for Spyware Doctor and PC Tools AntiVirus

Desktop Products
 Avira AntiVir Premium
 Avira Premium Security Suite
 Avira AntiVir Professional

CounterSpy (antispyware) with Vipre Antivirus (CounterSpy one of world’s best)
VIPRE® Antivirus + Antispyware from Sunbelt Software Wins VB100 Award for Malware Detection on Windows 7 Platform

Kingsoft Internet Security
Kingsoft Internet Security 2009 obtains VB100 award from Virus Bulletin for April 2009
Kingsoft Internet Security 9 Plus
Internet security suite that contains anti-virus, anti-malware, a vulnerability scanner and personal firewall.
Find and fix rootkits, spyware, trojans, virus and malware infections. Protect your PC for less!
Forefront Client Security
Forefront Client Security wins VB100 award for Windows Server 2008 anti-malware

%d bloggers like this: