Asked too many times “What is best free antivirus” – without knowing….

Asked too many times “What is best free antivirus” – without knowing….

What you have failed to understand is that a ‘stand alone’ reactive free scanner has NO real time protection. They do NOT protect the computer from infection. At best, they can only be used as ‘on demand’ scanning after infections have ocurred and all the damages they can do including many viruses and worms that are specifically designed to damage computers and networks. It is too late then – much too late then – to fix damages and specifically to Windows itself.

Other malwares (botnets) and much of spyware installations like to keep your pc running so they can use it to clandestinely send out mass spams and even crimeware sending piracy softwares, media files, music files, etc.

Todays cyber criminal underground goes after the “free line” big time and their crimewares are so sophisticated today that theyare able to COMPLETELY disable ALL free antivirus and antispyware software programs installed – the free stand alone scanners (free home versions).

EXAMPLE (just one of a zillion)

Security software disabler Trojan

http://www.webopedia.com/TERM/S/security_software_disabler_Trojan.html

Free home versions without Real Time Protection (heuristics) can NOT stop these type threats that can install ‘drive by installations’ at any malicious or infected website on the world wide web – just by visiting them unknowing of the infection – or from malicious emails carrying these infections or files already infected, or downloads of infected softwares. Real Time Protection immediately blocks and quarantines all threats before they can do any damages or installations – the free products DO NOT. There are a couple of exceptions – as have been offered to the community graciously….

GET (first, add other free scanners after)

[best free]

Microsoft Essentials http://www.microsoft.com/security_essentials

Windows OneCare Antivirus is now Free from Microsoft and very highly rated, West Coast Labs Certified and has won the VB100 Award ! Now called Microsoft Essentials….. (highly recommended ! Includes antispyware ! Full shields)

About Microsoft Security Essentials (5* Stars!) (FULL) [wrkx w/ Netbooks]

http://www.microsoft.com/security_essentials/

Microsoft Security Essentials provides real-time protection for your home PC that guards against viruses, spyware, and other malicious software. Microsoft Security Essentials is a free* download from Microsoft that is simple to install, easy to use, and always kept up to date so you can be assured your PC is protected by the latest technology. It’s easy to tell if your PC is secure — when you’re green, you’re good. It’s that simple.

Microsoft Security Essentials runs quietly and efficiently in the background so that you are free to use your Windows-based PC the way you want—without interruptions or long computer wait times.

ThreatFire AntiVirus 4-5* (Full)

ThreatFire AntiVirus – Behavioral Virus and Spyware Protection

http://www.threatfire.com/

ThreatFire features innovative real-time behavioral technology that provides powerful protection against both known and unknown viruses, worms, trojans, …

DO NOT install two or more products with Real Time Protection or they may damage the computer or cancel each other out via corruption, but in the least will terrbly bog down the system navigation (navigating the computer by opening files, work multi tasking, playing media etc)

OTHERS / VERY FAIR

Spyware Terminator [working-freeware] (Antispyware and antivirus. Real time protection added ! ) 4* (Full) [wrkx w/ Netbooks, tad heavy]

http://www.spywareterminator.com/

Millions of users worldwide rely on Spyware Terminator, winner of many awards and high ratings from industry experts and users. Its free comprehensive protection is comparable to competitors’ paid versions!

Spyware Terminator includes: http://www.spywareterminator.com/

* Fast spyware scanning

* 100% real-time protection

* HIPS protection

* Antivirus protection

* Multilanguage Support

http://www.spywareterminator.com/

View List of All Features »

http://www.spywareterminator.com/features/antispyware-features.aspx

Note free Comodo has problems you can see in any security news area on the Net. It is frowned upon in some security forums by advanced users….

Make SURE you have a firewall installed to block direct hackers from taking over the pc…

PC Tools Firewall Plus – Free Edition 5* [wrkx w/Netbooks]

http://www.pctools.com/firewall/

Easy-to-use, free software firewall for PC users to protect your computer from intruders and malicious network traffic.

(PC Tools is maker of famous Spyware Doctor)

Online Armor Personal Firewall Free [new/advanced users] [wrkx w/Netbook] 5+*

http://www.tallemu.com/  (best)

Online Armor Free provides both a firewall and a whitelist approach to program security for Windows NT, 2000 and XP. It does not show pop-ups for many known good programs, and it scans all your installed programs when it first runs so that you can quickly tell it what to do with apps it doesn’t know about.

Operating Systems: Windows XP, Windows 2000, Windows Vista

ZoneAlarm Free Firewall 4-5* (popular)

Protect your PC with #1 Free Firewall

http://www.zonealarm.com/security/en-us/zonealarm-pc-security-free-firewall.htm

Source(s):

http://bluecollarpc.us/malwareremovers.php

Posted in BlueCollarPC WordPress Blog. Tags: , , , , , , , , , . Comments Off on Asked too many times “What is best free antivirus” – without knowing….

Lavasoft Ad-Aware back in the News

Lavasoft Ad-Aware back in the News….

Lavasoft Ad-Aware was one of the pioneers in antispyware defense program software applications. I remember it well and was one of the ‘first loves’ way back in the beginning of the Windows XP years. Originally it was obviously among the top defenders. Graciously they offered a free home version to the public along with gaining more defenses by purchasing the full version. Along the way, the industry leaders kind of left it in the dust – among some Trend Micro Antispyware,  Spysweeper, CounterSpy, to name the few. Surprisingly, they are back in the news but I rely on independent labs results rather than ‘newbie hype’ or perhaps tainted news editors departments ‘test results’. ….for what it is worth…

ARTICLE: Lavasoft’s Ad-Aware Awarded PC Magazine Editors’ Choice

Zawya (press release)

Respected PC Magazine lead security analyst Neil Rubenking, who recently reviewed both versions of Ad-Aware said, “This latest Ad-Aware remains very effective at keeping malware out of a clean system and adds new technology that improves its ability to …

http://www.zawya.com/story.cfm/sidZAWYA20110327064724

___Next they will have to catch up to “Cloud Computing” products as industry leaders Trend Micro and Webroot have innovated…. I have a short blog blast here on that subject…

Desktop/Laptop Cloud Computing – new “super antivirus” for the New Decade

March 8, 2011 — bluecollarpc

https://bluecollarpcwebs.wordpress.com/2011/03/08/desktoplaptop-cloud-computing-new-super-antivirus-for-the-new-decade/

ALWAYS OBSERVE BAD PRODUCTS LISTS

Title: The Spyware Warrior List of Rogue/Suspect Anti-Spyware Products & Web Sites

Description: Bad, False, Fake products

URL: http://www.spywarewarrior.com/rogue_anti-spyware.htm

LavaSoft — The Rogue Gallery

http://www.lavasoft.com/mylavasoft/rogues/latest

The Rogue Gallery, powered by the Malware Labs at Lavasoft, is a resource dedicated to keeping computer users safe from rogue security software. By providing a comprehensive database of current rogue security applications, you have the ability to clearly see what programs are considered rogue – and avoid them.

Partial list of rogue security software

http://en.wikipedia.org/wiki/Rogue_security_software

Scareware / From Wikipedia, the free encyclopedia

http://en.wikipedia.org/wiki/Scareware

Rogue security software / From Wikipedia, the free encyclopedia

http://en.wikipedia.org/wiki/Rogue_software

For reference I am webmaster http://BlueCollarPC.US/  (Windows – Community Help malware removal/info)

Since 2005

Do Not Loose Your Windows 7 Password, Solution?

Do Not Loose Your Windows 7 Password, Solution?

What to do if you forget your Windows password
http://windows.microsoft.com/en-US/windows-vista/What-to-do-if-you-forget-your-Windows-password
If you’ve forgotten your Windows password and you’re on a domain, you should contact your system administrator to reset your password. If you’re not on a domain, you can reset your password by using a password reset disk or by using an administrator account. If you forget the administrator password and don’t have a password reset disk or another administrator account, you won’t be able to reset the password. If there are no other user accounts on the computer, you won’t be able to log on to Windows and will need to re-install Windows

POSSIBLE SOLUTIONS
Top 7 Free Windows Password Recovery Tools
http://pcsupport.about.com/od/toolsofthetrade/tp/passrecovery.htm
A List of the Best Free Password Recovery & Reset Tools for Windows
“Windows password recovery tools are used to recover or reset lost user and administrator passwords used to log on to Windows operating systems. Password recovery tools are often called “password cracker” tools because they are sometimes used to “crack” passwords by hackers. Legally cracking your own Windows password is certainly a legitimate practice! “

Posted in BlueCollarPC WordPress Blog. Tags: , , , . Comments Off on Do Not Loose Your Windows 7 Password, Solution?

Many times asked “Best Easiest Free Registry Cleaner/Fixer

Many times asked “Best Easiest Free Registry Cleaner/Fixer….

Our Answer…

Whole list here… http://bluecollarpc.us/windowsregistry.php
Uniblue Registry Cleaner Comparison Chart
LINKS/Soure: http://www.liutilities.com/products/registrybooster/comparisions/

For free the two best in the world are ….

(ADVANCED)
RegSeeker 1.55:
http://www.hoverdesk.net/freeware.htm
RegSeeker is a perfect companion for your Windows registry !
RegSeeker includes a powerful registry cleaner and can display various informations like your startup entries, several histories (even index.dat files), installed applications and much more ! With RegSeeker you can search for any item inside your registry, export/delete the results, open them in the registry. RegSeeker also includes a tweaks panel to optimize your OS ! Now RegSeeker includes a file tool to search for duplicate files, bad shortcuts
and more ! RegSeeker is FREE for personal use only !

GREAT FOR NOVICE AND ADVANCED – ALL …. (Use safest user settings)
RECOMMENDED:
PowerTools Lite – The Freeware Registry Cleaner
http://www.macecraft.com/ptlite/
Key Features

•Detects and fixes registry errors
•Finds and cleans unneeded registry junk
•Finds leftover temp files
•Clears History and MRU data
•Safe to use – automatic backup feature
•Multilingual user interface
•Based to the same award-winning engine as jv16 PowerTools

jv16 PowerTools by Macecraft has been consistently about the world’s best for a decade. Very, very, very well known by power users and that trusted. Costs bucks, however, they recently have given back to the community by releasing their Free Home Version no catches for real for all users. It has like four different settings of intensity for cleaning/fixing. Use simply the safest and at most one more click up in a scan/fix. Very fast, very safe. Best !

Also has back up one click button to restore anything deleted. You may want to get a little more familiar, but you can perform the full Registry Back Up BEFORE proceeding to ANY changes by opening the Windows Registry and make a COPY of it before change that can reinstall the full registry in a click.

HowTo….
Click > Start > Run and type in “regedit” without the parenthesis.
This opens the Windows Registry and don’t dare touch anything or you can render Windows/other softwares inoperable by a mistake !
NOW Click > File > Export…. (top left tabs). It will open the dialouge as if you were saving a file or media or software. NAME the file you wish to call it like “Reg_Back_up_Today” or anything you wish to call it so you remember and then Click > Save ….and usually to My Documents.
NOW WAIT about 30 to 60 seconds as it will then copy the ENTIRE Registry to the restore file. It can take even up to 90 seconds if ypou havea lot of stuff installed. Hover your mouse cursor over it to see progress. DO NOT DARE INTERRUPT THE PROCESS UNTIL COMPLETED !!! or you may cause dreaded Registry Damage ! Do NOT mess up with impatience or doubt !

IF USED TO RESTORE THE REGISTRY… you Double Click the Registry back up file created and DON’T DARE INTERRUPT THE PROCESS and can take even up to five minutes for it to rewrite in the Registry.

Note, after any changes to the PC you need to Export the Registry again in a new back up file to restore to current state of the PC such as new softwares added etc. Recommended to do this like weekly or monthly as how many times in a lifetime will this ever need to be done. Every blue moon – but you need the back up like to restore the computer if hit by malware plus files back up correspondingly.

Source(s):
http://bluecollarpc.us/windowsregistry.php

Webmaster, http://BlueCollarPC.US 

Posted in BlueCollarPC WordPress Blog. Tags: , , , , , , . Comments Off on Many times asked “Best Easiest Free Registry Cleaner/Fixer

Home/Small Business areas of Security in Online Communications

Home/Small Business areas of Security in Online Communications

Security of communications in a Home/Small Business endeavor or existentially. (I had to add this to my blog ! )

SOURCE — I am member Gerald309 – http://www.theeldergeek.com/forum/index.php?showtopic=43544  )

Of course this is the core in the security and IT industry with all the products available, and of course all the many departments in those products and general security in all communications on the world wide web. I could only scratch the surface and perhaps point you to some beginning areas that can expand into the “learning curve” knowledge – and since you are alert enough to consider security itself, you are well on your way to that simply by reading a post as this. Securing communications products and appliances are involved in secure communications. This is a very vast area of world wide web security itself and can be easily perceived in the many zero days and continual security alerts as vulnerabilities discovered and their solutions – generally patches, updates.

The two sides are all the communications from the client side (home/business network of computers) and all the communications to and from the server side (hosted on the world wide web). If I guessed right – you are concerned with the basics of secure communications against “leaks” which can occur on both sides of the equation in many areas. Some of the basics are like digital secure email for example.

Digital IDs for Secure Email

http://www.verisign.com/authentication/digital-id/index.html

Compare Digital IDs – Authentication, Secure Email & Secure Office

http://www.globalsign.com/authentication-secure-email/digital-id/compare-digital-id.html

Above are just two items of a vast array of security points of a vast industry with a vast amount of products. The learning curve can occur with introduction of communications and the security aspects which can involve all the threats exploiting them continually.

Just one aspect of this is generally called “sanitization” and as a search term…

Sanitization

http://en.wikipedia.org/wiki/Sanitization_%28classified_information%29

Same ballpark…. (even a corruption source and malicious use of hiding)

Data cleansing

Not to be confused with Sanitization (classified information).

http://en.wikipedia.org/wiki/Data_cleansing

In threats, there is the spyware area of “data mining” (which becomes much more aggressive for nefarious uses – cyber thefts)…

data miner (spyware)

http://www.webopedia.com/TERM/D/data_miner.html

I can not locate it handily, but I wrote a first “paper” about deceitful data scraping ….

Data scraping

http://en.wikipedia.org/wiki/Data_scraping

And so even these very, very few items are not even a surface scratch of all involved and are a part apparently addressed by the product mentioned <http://www.anonymizer.com/ > . There are a zillion as such now and it takes first understanding the scope of dangers – and then what addresses that as a confident determination in a security solution. Much of all things are simply “cured” by keeping all machines fully patched and all softwares and add ons. That basically gets rid of 90 percent of the ills and of course this is all assumed as installing the cutting edge quality products of antivirus, antispyware, and software and hardware firewalls and employing with severe prejudice – Safe Practices. As mentioned, adding any remote type connectivity to the home/business computer network introduces and multiplies dangers such as here – what has become a deplorable wireless security connection anywhere now with virtually all wireless signal encryption hacked.

One more point of all this is the actual webhosting and their server side security and reputations which need be observed obviously. One item here is the infamous…

Cross-site scripting

http://en.wikipedia.org/wiki/Cross-site_scripting

There are so many, many instances now of website break in worldwide in all – .com, .org, .gov, etc. . The obvious beginning is securing the home/business side of network computers (non-corporation) to at least determine any leaks and infections are not coming from the client side as example, uploading infectious files or photos, etc. Then, with this “forensics” if you will, it can be determined any malware and data ills and break ins are indeed occurring on the server side – webhost and servers. This is out of the hands on the client though they may work with you in any instances (not rare anymore). One example of this was that I suffered what is called “defacement” of my personal security theme website a couple years ago. This is that too familiar scenario whereby a cyber criminal hacks into the webhost and/or servers and places the defacement with the message “…if you want your site back, contact me with money at so and so…” – a typical extortion plot generally aimed at business. Unfortunately, the client has to wait until the webhost remedies the infection. This is where much research should be employed into the security aspects of the webhosting security reputation as well as all applications used on the website. C-Panel hosting really gives the client hands on in many areas.

The only bottom line is that I have not heard yet that WPA Enterprise is compromised For business, there is enough free information available but generally no one will get involved in actual security solution without price – IT Security. I do advise to look around a bit ‘yellow pages’ in your exact local regional area for these services for Home/Small Corporate business. In the least if hired, you will have among the best bondable security solution available. And again, there are a zillion products for a zillion things much as the medical industry churning out specialism in treatment – one for this one for that and so on. This can be completely counter productive and even damaging (much like the ills of using two antiviruses on a desktop ignorantly) and whereas IT Security will indeed deal with the entire over all picture.

I mentioned Trend Micro as well known and of course is one of the handful of these top quality products on the cutting edge of defense and not as hype but fact proven by independent lab testings. I am testing out their new netbook edition, but going back a year or two they did actually have four or five different security level settings for their laptop/notebook edition included firewall which included defending against direct attack while on Wi Fi wireless internet. I assume they still had that. This product virtually assures your machine (s) are defended and not infected. One side of the equation confidently secure. A basic beginning and they have almost all these communications protections incorporated aside from others the client can install like document type stuffs and secure email and so on.

Simply, trying to point you to data areas that you seemed interested in securing. Massive isn’t it ! The more you become involved in security you will see there is indeed a split in the area across the board and IT. Many just advise quickly for a sale not caring – profit driven, taking advantage of consumer ignorance. Many adjust security for convenience – whatever is least interaction for the client for their irresponsible praise which many times involves data theft resulting in massive ID Thefts of their customers which they will be both responsible for in a court of law – usually the business owner blaming IT.

Just mentioning things that do not even scratch the surface, I think you can appreciate this is not a one liner response subject. Quite the opposite. Costs are always a target, but to even make money on the Net – security should never be a target of the axe obviously to even be solvent in today’s marketplace online.

Not being professionals and experts and programmers in the industry, the consumer business person can easily rely on responsible user input (what’s hot – what’s not, what worked – what didn’t) from experience the best teacher to add as additional, but not sole source, for “Informed Decisions” in security solutions.

Forgive the answer if I entirely misjudged that you are a simple home laptop/desktop user looking for wireless security as opposed to a business owner. No, then, that product is not for this – it is a business enterprise solution type product.

EDIT… just looking I did see they actually indeed have a Home User Version. My apologies in advance. The WPA is encryption of what is in the air – the communications undecipherable. This is what has been hacked and there is no solution for that except a new upgraded WPA as they did with former WEP. What is in the air over the wireless internet (Wi Fi) is everything your are seeing and doing. Breaking into this, hacking WEP and WPA, the cyber criminal is basically seeing an entire text version of all to easily see sites visited, emails and documents and files opened an so on. It does not matter at all what is on client or server side. This is not what is being hacked.

More, see….

End-to-end principle

http://en.wikipedia.org/wiki/End-to-end_principle

Wireless Intercept & “Wiphishing”

http://technology.pitt.edu/security/risks/wiphishing.html

Webmaster, http://BlueCollarPC.US/

Desktop/Laptop Cloud Computing – new “super antivirus” for the New Decade

Desktop/Laptop Cloud Computing – new “super antivirus” for the New Decade

The newer cloud computing antimalware softwares have arrived which may replace all known traditional antivirus, and generally combined with antispyware (as a suite or combo package) , as we know it – towards the middle or even end of the decade. They are here and are being used. Originally I viewed Cloud Computing as just a complete re-write of IT Security with a new guy on the block stealing business and aimed at simplification for “computer and security dummies” – whether average desktop users or actual business owners with a network of machines. It was appearing that all features for all settings in antivirus and antispyware were being hid from the user – apparently assuming a too vast amount of them were messing up navigation by using extreme hard settings not anticipating the extra time – or not using enough secure settings as circumventing their security available just for convenience beyond annoyance.

For veteran users, it presents the problem of “hands on” with the products. Features become unaccessible that are traditional. It is becoming hard to find a quality product without this newer overhaul. It becomes harder to simply give a defense product blind faith to protect the computer system and files without mistakes. They always declare “as is” and “no one is perfect”. But the upside is that they are the newer “super antimalware” with a decade of experience in the top companies. They add protection that did not exist years ago, or may have been found by adding layers of protection with add ons – but now in the one package by trusted proven companies.

Naturally this invited the dreaded “learning curve” in all areas…. cloud computing – what is it and how will it effect me ? I found the easiest way to understand this is by looking at one of the products. Take a look at a quality product of the well known and rated Trend Micro …..

Trend Micro Titanium Internet Security 2011

Trend Micro Titanium Internet Security revolutionises Internet Security. Proven Cloud-based technology automatically stops Viruses & Spyware before they …

http://emea.trendmicro.com/emea/products/personal/titanium-internet-security/

This will really help in an orientation with the new trend toward cloud computing defense products by many major companies in the security software industry (antivirus, antispyware). Read and browse over the newer features and how they are integrated into protection. This should help in new decisions down the road or right now as an upgrade. You should easily understand they are indeed the new super antimalware products now available. Note that Webroot acquired Prevx as their move towards cloud computing for the average user.

Hope this helps !

Posted in BlueCollarPC WordPress Blog. Tags: , , , , , . Comments Off on Desktop/Laptop Cloud Computing – new “super antivirus” for the New Decade
%d bloggers like this: