US-CERT collects phishing email messages and website locations so that we can help people avoid becoming victims of phishing scams.
You can report phishing to us by sending email to
Comodo Internet Security (Free) Earns 100% Protection Rating by AV-Test.org openPR (press release) Comodo earned a perfect score with 100% protection against zero-day malware attacks during November and December and a near-perfect score for … http://www.openpr.com/news/281297/Comodo-Internet-Security-Earns-100-Protection-Rating-by-AV-Test-org.html?SID=5c1baaa02711b0ebc68227122cd0b1c6
[GREAT NEWS FOR THE THRIFTY, COMODO IS FREE ! ]
By bluecollarpc – Last updated: Saturday, August 3, 2013 – Save & Share – Leave a Comment
Great Test News for Comodo Free Antivirus Comodo Shows Biggest Improvement in Antivirus Tests PC Magazine Malware writers keep working to make their nasty products evade detection by … To evaluate an antivirus product’s protection against malware attack, AV-Test … http://securitywatch.pcmag.com/security-software/314185-comodo-shows-biggest-improvement-in-antivirus-tests
MORE INFORMATION: Comodo Free Anti Virus Software Internet Security 5* (FULL) http://antivirus.comodo.com/ (Genuine Freeware) Free Antivirus Software from Comodo eliminates viruses, spyware, and other malware from desktops and networks fighting against Internet security threats. Full Real Time Protection !
PRESS: Great News ! Comodo Internet Security Earns the Prestigious VB100 Virus Certification HostReview.com (press release) April 14, 2011 http://www.hostreview.com/news/110414-comodo-internet-security-earns-prestigious-vb100-virus-certification
By bluecollarpc – Last updated: Sunday, April 17, 2011 – Save & Share – Leave a Comment
Comodo Internet Security Earns the Prestigious VB100 Virus Certification HostReview.com (press release) Jersey City, NJ, April 14, 2011 To earn the VB100 award a product must have been tested by Virus Bulletin and in those tests it must have demonstrated, in its default mode, 100 percent detection of In the Wild test samples and no false positives in a selection of clean files. … http://www.hostreview.com/news/110414-comodo-internet-security-earns-prestigious-vb100-virus-certification [This is great news. They have been a free community product service for a couple years (free Comodo Antivirus, Firewall) and already had a high detection rate, though could have been higher. We applaud their obvious intensive work and in winning the VB 100 Award ! ]
-- SENDER: gerald309 -- Have A Safe Computing Day! Webmaster: Malware Removal/Amateur Forensics HOME http://bluecollarpc.us/ Alternate https://sites.google.com/site/pcsecurityhelper/ HELP http://tech.groups.yahoo.com/group/BlueCollarPCSecurity/ Membership/Join List: Subscribe: BlueCollarPCSecurityfirstname.lastname@example.org Free Malware Removal Help / A Community Website Since 2005
Challenges extending protection afforded to computer programs?
An actual good question put forth I fielded…. (handle “antibotnet” is a secondary one I use at Yahoo)
Q. What are some challenges with extending the extent of the protection afforded to computer programs? http://answers.yahoo.com/question/index?qid=20130418173109AALNJvq
Malware has become quite sophisticated over the years because of antimalware programs becoming the more. Briefly, the point is that cyber crimewares and their malicious users (generally for illicit profit) oft times seek “softer targets” then the usual drive-by infection or malware laced email attachments etc.
Some of these have been softwares installed on the PC affording a break in to the system and even install many malwares and to even attempt to disable existing antimalware installed to take over the computer for nefarious reasons.
Those creating software have had to include adding security to them – to create safer programs by code hardening etc.
There is a security company that has offered free to the community (for several years now) a program that completely automates updating softwares installed on the computer. Many times newer established software programs have Update buttons in them to manually check for and apply important updates. These may also include a program Upgrade to a newer version which will be safer security wise, and may include cosmetics/features upgrades or additions.
The “challenges” you ask, to me, would be learning about the computer system and all the many Settings it contains which includes Recommended Security Settings. In short, if you want to really get serious and tweak the system and softwares installed – you may ultimately run into a 100 settings to observe and change to preferences – security minded preferences as recommended.
The challenges as to keeping all installed softwares up to date with patch/fix/update/upgrade has been automated by a very durable program from Secunia – millions of users now. The PSI scans softwares and their creators for any issued. You can choose to automatically or manually update any available. You can choose to run it at start up or manually once every two weeks or monthly etc. Those challenges would be to comb every website the softwares were downloaded from – the product company – to see if there are any messages/notices about Updates available as opposed to Upgrades. These are issued time to time and not always posted on their websites. It becomes all too tedious unless using only a couple wares. Most users end up trying everything under the sun to have fun or productivity on their PCs – what you can do with them. That results in a too painstaking search for keeping things up to date.
I TOTALLY RECOMMEND …. (to automate the challenges safely) …..
Secunia Personal Software Inspector (PSI) The Secunia PSI is a free security tool designed to detect vulnerable and out-dated programs and plug-ins which expose your PC to attacks. http://secunia.com/vulnerability_scanning/personal/
“Free computer security Stay secure by updating insecure programs on your computer with the Secunia PSI
The Secunia Personal Software Inspector (PSI) is a free computer security solution that identifies vulnerabilities in non-Microsoft (third-party) programs which can leave your PC open to attacks. Simply put, it scans software on your system and identifies programs in need of security updates to safeguard your PC against cybercriminals. It then supplies your computer with the necessary software security updates to keep it safe. The Secunia PSI even automates the updates for your insecure programs, making it a lot easier for you to maintain a secure PC. Using a scanner like Secunia PSI 3.0 is complementary to antivirus software, and as a free computer security program, is essential for every home computer.”
There is a total ongoing maintenance you learn by habit of manually “looking under the hood” – inspecting areas like Program Files, System32, Windows Registry, etc. Manually looking for malware entries. After first time spring cleaning of the PC and ongoing use of quality antimalware, this becomes a time to time task. It is good to know the PC like the back of your hand eventually.
Windows Updates of course are most times critical and important to install when issued. This should be set to automatic as recommended for the average user. You can check for missing Windows Updates with a click and quick scan using….
Microsoft Baseline Security Analyzer http://www.microsoft.com/en-us/download/details.aspx?id=19892
There are many more “power tools” to make you a “power user” . here are a few more….
Belarc Advisor http://www.belarc.com/free_download.html
jv16 PowerTools / PowerTools Lite http://www.macecraft.com/powertoolslite2011/
Microsoft Malware Prevention troubleshooter http://support.microsoft.com/kb/2534555
You will find a good short list here http://bluecollarpc.us/pc-help/ of the security technologies Microsoft has developed over the years and incorporated into the Windows Operating System.
We JUST got this up today …. a little patience. Just basically pinned will shortly be cleaning up the various pages and content for more pleasing look !
Stop back shortly, need another day or two !
Welcome all, archived blog installed….. We have imported our archived blog posts from our original BlueCollarPC @ WordPress security blog. This is located at https://bluecollarpcwebs.wordpress.com/
We will keep the free version and continue to post to it, as has been linked for years. I am the original webmaster of the BlueCollarPC .Net and .Org and lastly .US . The BlueCollarPC .Net originally began about year 2005 as a help and information site dealing with spyware as main course. There were many video help tutorials for download in several formats. This became a huge site trafficking about 2,700 to 3,000 Visitors monthly, and tolled in at just over 6 million by 2009. Those kinds of numbers are usually seen at small business sites, but I had just a simple personal website !
Being able to help that many people who found our site as a primary or a main additional site for help and instruction in PC security and malware removal outweighed any personal pride or egotism in hits counters. That is what it was launched for, genuine informed help – not a personality contest. It was humbling to see those kinds of numbers though.
Push come to shove, our site was attacked and there were several behind the scenes personal attacks against myself and equipment – attempts at destroying computers and mobile computer. These attacks were sophisticated dreaded botnet payload attacks and another as attempting circumventing Vista technology and destruction. So, my site theme being “BlueCollarPC” as a spyware removal site originally, now was upgraded to a full blown malware removal help and instruction site – all malware with heavy concentration into botnet detection and removal and restoration of damaged systems and I graduated through this all into Amateur Forensics (Computer Forensics). What did not kill us makes us stronger, and so it goes. All but the BlueCollarPC .US were closed with this new full malware removal site including information and help against all malware now as viruses, worms, trojans, rootkits, adware, spyware, botnets and bootkits. etc etc etc.
At the end of the decade (2000 to 2010) and into the new one, things seemed to be a ghost town at many help destinations as groups, forums, and lists, others. It seemed the whole “XP Generation” of the “XP Years” (Windows XP) had graduated and learned it all or enough to carry them through. Of course I invested into a Vista PC which was the actual crown jewel of the decade in security software – unprecedented as an operating system itself being the best security software available. To this day Windows Users are unaware that viruses could not run on Vista and neither the dreaded rootkit malware. UAC User Account Control was just one of these new security technologies in Vista. First hand, no lie, two or three times I saw a virus execute to install on my Vista (drive by hit – bad website, tried to install scareware fake antivirus programs). Sure enough and word for word from Microsoft – “viruses are not able to write to the disk in Vista”. They the payloads were in Temporary Internet Files. All I had to do was close the browser with the settings I had clicked to “Delete All Temporary Internet Files” etc. I also use and ran CCleaner offering a little more clean up. That was it. The virus was gone ! I then scanned with high quality antimalware to prove it. Zero infection. The point was, or joke, you did not even need antivirus with Vista – like “you’re kidding, you actually purchased antivirus for Vista ? What for ? ” Seeing is believing.
Windows 7 was the first time in history an operating system (Windows, Linux, Apple/Mac etc) was actually downgraded security wise. Users screamed about UAC. The security world kind of went with – what idiots, sorry to say. This did not make sense. It did not make sense worst, that Microsoft themselves accomadated them. LOL. You get what you pay for. They seemed to love no intrusion whatsoever on having a good time on the Net – utterly regardless of the dangers. It was like handing drunk teenagers the keys to the sports car. We all know how that ended. Many never made it home.
Enter Windows 8 with the new anti-rootkit / anti-bootkit technologies – the ‘secure boot’ Windows 8. Windows 8 is a gigantic leap forward from XP as blocking rootkits/bootkits from running before antimalware programs are able to boot to begin detecting malware attempting to run in the session. With XP, we all know if a rootkit was suspected it meant reinstalling Windows as the ONLY cure. The trouble was most anti-rootkit softwares were crap at detecting them and even worst at attempting to remove them. Enter Windows 8 new security technologies. THOSE DAYS are over with forever. Just before Windows 8 hit the streets there was hint at they could crack this. But as well there is new anti-malware softwares that can “cold boot” to detect this. Somewhat as being able to scan the system without even starting the computer and as it does start up. Bye bye, covered anyway.
Well back to re-launching BlueCollarPC.US – now in the WordPress format rather than the traditional website. Kind of all in one – blog and content, links. Spread the word – “We are back !” (StarTrekkies – Romulans and Enterprise Captain Picard in the Neutral Zone Confontation over Borg encroachments).
From our alternate back up website at https://sites.google.com/site/pcsecurityhelper/
Internet Explorer continual long running script error – malware or fix available ?
This has been edited from an actual help question/answer I made here: Re: [Windows_Vista] in Internet explorer 9 http://tech.groups.yahoo.com/group/Windows_Vista/message/3879 Mon Apr 1, 2013 1:20 pm
The symptoms were that the user was getting the ‘long running script error’ (or similar) error messages at multiple websites – not just one….
One common cause can be this…..
Stack buffer overflow http://en.wikipedia.org/wiki/Stack_buffer_overflow From Wikipedia, the free encyclopedia
“In software, a stack buffer overflow (also known as stack smashing) occurs when a program writes to a memory address on the program’s call stack outside of the intended data structure; usually a fixed length buffer. Stack buffer overflow bugs are caused when a program writes more data to a buffer located on the stack than there was actually allocated for that buffer. This almost always results in corruption of adjacent data on the stack, and in cases where the overflow was triggered by mistake, will often cause the program to crash or operate incorrectly. This type of overflow is part of the more general class of programming bugs known as buffer overflows.…..” FULL http://en.wikipedia.org/wiki/Stack_buffer_overflow
That is somewhat to the opposite what a crafted malware can do – flooding, injecting lengthy nonsense to the point it starts overwriting in the memory and overtakes or destroys, whatever the malicious intent.
INFO LINKS Error message: “A script on this page is causing Internet Explorer to … http://support.microsoft.com/kb/175500 Some tests and benchmarks may use scripts that take a long time to run and may want to increase the amount of time before the message box appears.
How to troubleshoot script errors in Internet Explorer http://support.microsoft.com/kb/308260 Describes how to troubleshoot the following script error: “Problems with this Web … FIX: You may receive a script error when you try to run a script on a computer …
Since you are saying the symptoms are “dang near every page” – it seems this certainly is not just some bug at any website that has some new content they uploaded but was flawed in language causing a bug or two and they were not aware of it yet to fix it. So, to me, it seems it leans toward the internet connected browser – Internet Explorer.
Many times you get that message and there also would be a pop up to click to “Stop the script” and end of story, you go on with what you were doing. Apparently this is not happening.
QUICK FIX….. For a quick fix you can use the “magic” in Internet Explorer many users are unaware of. Lots of Firefox users say they like it more because it does not allow Active X to run and you an install plug ins to stop scripts from running at every website and give temporary permission etc etc etc. Seems to run faster. (You can click not to allow Active X to run in IE too) THAT is very messy and not necessary in Internet Explorer. You simply shove the Security setting all the way to HIGH…..
So that you do not encounter the error first change your Homepage in IE (Internet Explorer nic) to a known good site (you can change back later anytime). A good fast loader is Google.com (white page, not full of graphics etc). GO TO…. Start > Control Panel > click Classic View ( upper left) > Internet Options > panel opens and change the Homepage to http://www.google.com/ ….. click > Apply
NEXT click the Security Tab in the same panel, Internet Options. It is probably at Default settings – ‘Medium High’. If it says “Custom” then first click Default and Apply. NOW slide that Settings bar all the way up to “High” and click Apply / OK / close the Internet Options panel.
Okay, open Internet Explorer and you are now going to experience Internet Explorer running even safer and faster than the similar Firefox set up without having to click nothing for each individual site. HIGH Security settings in Internet Explorer stops all kinds of website add ons and scripts and java and auto runs and embedded players and on and on and on. It stops all the crap kind of like Plain Text email does. This setting should stop whatever was running and try going to a few familiar sites to see how it performs. (Don’t forget after all said and done to click Default again in Internet Options IE for normal browsing).
NEXT if IE is browsing okay I would absolutely want to run a good scan with a quality antimalware program. I am assuming you probably have one installed as a veteran Windows user. There is possibly a malware that is failing in attempt to rifle the Internet Explorer browser – hijack it – but is a flawed malware and can not execute properly for its nefarious intents.
A common attack at rigged websites is…..
Cross-site scripting Wikipedia, the free encyclopedia http://en.wikipedia.org/wiki/Cross-site_scripting Cross-site scripting (XSS) is a type of computer security vulnerability typically found in Web applications. XSS enables attackers to inject client-side script into …
….BUT again you are saying it is not an individual website but is occurring everywhere. So if there is no malware present – ruled out by full scan by quality amtimalware as Symantec, Trend Micro, Emsisoft, Bit Defender, NOD32 etc etc – I would move to a more advanced solution.
RUN WINDOWS UPDATES AND APPLY ALL IMPORTANT UPDATES. IF YOU STILL EXPERIENCE PROBLEMS AFTER APPLYING ALL HELP — CONSIDER UPGRADING TO INTERNET EXPLORER VERSION 10 – ALWAYS ALWAYS ALWAYS UPGRADE TO LATEST BROWSER UPGRADE VERSIONS ! THESE ALWAYS CONTAIN IMPORTANT SECURITY UPGRADES.
Most users are oblivious to Java exploits and zero days in security news. This is a REAL worldwide event and many entities are completely disabling Java. As recommended and as I do ( I am in pc security since 2005 anyway) – I uninstalled Java from my computers and have disabled ALL Java plug ins in ALL browsers.
READ UP / Seeing is believing…. (my security blog) Catch Up With Java Malware Information March 3, 2013 — bluecollarpc https://bluecollarpcwebs.wordpress.com/2013/03/03/catch-up-with-java-malware-information/
You can now see the horrific extent and nightmarish ongoing continual cyber crime attacks to circumvent Java and security to take over computers worldwide. I don’t remember ANY such event in this magnitude since I have been online from 1999. For users unaware, the only possible defense was quality Real Time Protection antimalware. Additionally, this does not apply in your case – the recent Internet Explorer Zero Day….
US-CERT – Microsoft Releases Security Advisory for Internet Explorer http://tech.groups.yahoo.com/group/BlueCollarPCSecurity/message/2539 Microsoft has released Security Advisory 2794220 to address a vulnerability in Microsoft Internet Explorer 6, 7, and 8.
RECAP…. (my advice) ….
# Regain control of navigation of the system by placing Internet Explorer in ultimate High Security Settings. Note, Internet Explorer is not a separate software but is part of the Windows OS (operating system) – Unix Certified.
# Perform a complete full scan of the system and files with a quality antimalware product and have installed same with Real Time Protection activated. Quarantine any malware found, should be automatic. Try installing ….. / run it…. (clean scan will also rule out botnet activity) BitDefender Launches Free 60-Second Virus Scanner http://www.bitdefender.com/solutions/60-second-virus-scanner.html
# Restart the computer and perform a quick scan by quality antimalware program without internet connection.
# Uninstall Java from the computer at Control Panel > Programs/Features. (Optional, I would). As well, disable Java in ALL browsers in their Tools/Settings.
# Clean ? Connect to the internet and run Windows Updates and apply ALL security and Important Updates.
# Upgrade ALL browsers to their latest versions. Firefox > Click About Firefox… will scan instantly to see if latest version is installed. Same/similar in Google Chrome browser, others. (Little known fact, Opera and Firefox along with a handful of other softwares received the ultimate disgrace as being rated “Riskware” in 2009 or 2010 by respected institutes worldwide ! )
# If still experiencing trouble, I would reconsider an informed choice as to “quality” antimalware. Many users believe hype and paid advertising good reviews by like magazine type destinations rather than the real world truth from independent labs and word of mouth from experienced advanced users. For instance, you may have heard raves over free MalwareBytes. This product has not even achieved the simplest certifications yet…..
West Coast Labs http://www.westcoastlabs.org/
Malware Research Group http://malwareresearchgroup.com/
Welcome to the independent and renowned ProtectStar Test Lab http://www.protectstar-testlab.org/
Welcome to AV-Comparatives.org http://www.av-comparatives.org/
# ADVANCED…. TRY DIAGNOSTICS IF STILL EXPERIENCING SAME PROBLEM BEFORE REINSTALLING WINDOWS…. DOWNLOAD / INSTALL…… these can help identify malware undetected…..
HiJackFree (Genuine Freeware) [wrkx w/ Netbooks] Freeware! HiJackFree helps advanced users to detect and remove Malware manually. With HiJackFree you can manage all active processes, services, drivers, autoruns, open ports, hosts file entries and many more. For your full control over your system. http://www.hijackfree.com/en/
Alternatively you may want to install…. HiJackThis http://sourceforge.net/projects/hjt Description. HijackThis is a free utility that generates an in depth report of registry and file settings from your computer. HijackThis – Wikipedia, the free encyclopedia http://en.wikipedia.org/wiki/Hijackthis HijackThis (also HiJackThis or HJT) is an open source enumerating tool for Microsoft Windows originally created by Merijn Bellekom, and later sold to Trend Micro. ….. and post the HiJackThis Log for analysis. IN THESE DIAGNOSTICS DO NOT CLICK “FIX” ANYWHERE ! Generally for advanced use or may render software or even Windows itself inoperable with a wrong removal or fix !
# Last resort, if this continues as mentioned, I would have to consider reinstalling Windows and bring ALL things up to speed security-wise as mentioned…. Run Windows Updates apply all, upgrade all browsers, uninstall Java and disable Java plug ins in all browsers, install quality antimalware with Real Time Protection enabled.
— Gerald309-> (for reference) HOME: https://sites.google.com/site/pcsecurityhelper/ (webmaster bluecollarpc.us, down for the moment)
Additional Follow Up (these are just my opinions, suggestions I am no expert LOL) http://tech.groups.yahoo.com/group/Windows_Vista/message/3880
In the one Microsoft Information/Help link, Microsoft suggests diminshing the time out time so that in these events it would not seem to be an endless looping hung application or frozen scenario or crashing abrubtly intermittingly.
To do this, they give the Windows Registry keys to edit or insert – writing into the Windows Registry. …..jv16 PowerTools http://www.macecraft.com/ and http://en.wikipedia.org/wiki/Jv16_powertools is about best in world for well over 10 years. The free version (registry clean up) does not have the registry write in / modification features. You can do this manually but the paid version just makes it easier to do. Apparently, Microsoft is instructing to cut short the time-out to avoid the hung application scenario (meaning the browser in this case) or frozen browser. Apparently the fix will cut short the script etc running and then with in seconds or whatever the browser is normal again without these running. The FIX there is for versions 8 down though.
In other words look at…. “Let me fix it myself” http://support.microsoft.com/kb/175500
This would be a high tech solution as the average user has never even opened the Windows Registry or even know that user access exists. Of course this is where all the warnings come in to “NEVER touch anything in the Windows Registry unless you know what you are doing or you may damage Windows and/or other softwares. ”
I am not suggesting you alter your registry. I am offering the information to read between the lines as to what the problem actually is. Then to go from there in any possible solution as easy as possible.
SAMPLE MALWARE POSSIBILITY AS PROBLEM…..
Internet Timeout Virus http://www.ehow.com/facts_7559067_internet-timeout-virus.html
“Timeout Virus Sends Different Messages Web Scanners Bundled with certain Anti-Virus Packages can cause Time out
The Internet Time Out Virus sends out varying messages. Some include:”A Run time error has occurred. Do you want to debug? Line 34 Error: Permission denied” or “Runtime Error! Program:E\Program Files\Internet Explorer\iexplore.exe. This application has requested the Runtime to terminate it in an unusual way”. Microsoft Support offers a fix for this you can download. Some Causes Viruses are a fact of life online.
A family of programs called Vundo Trojan can cause some Web browsers to have problems loading certain high traffic sites such as search engines and social media. It spreads through network drives and uses different methods to reside on your computer. It is not easy to detect. Firewalls Selectively block Internet Access Run a full system spyware scan daily.
Sometime the problem occurs because a timeout limit to return data has been imposed on the server by your Web browser. The default timeout limit could be five minutes to 60 minutes. In case of server problems, the browser will keep waiting. A solution is to reset or change the default time out setting. Incorrect firewall settings may also give a timeout message.”
I added this to maybe help identify what I suggested as problems and how to fix easily.
The bottom line here would be that reinstalling Windows is such the overkill and unnecessary if a simple registry edit was the cure. I am going to look for this for IE version 9 to see if they posted a fix.
Addditionally if you want to skim over some Windows Registry information help to get a little familiar to what is being said you can look at a help page I have \up here form my web (Google Sites) https://sites.google.com/site/pcsecurityhelper/windows-registry-help
I would just review things mentioned in the several help answers and wait a little for maybe more and keep posting, hang in there to get it fixed.
gerald philly pa usa Home https://sites.google.com/site/pcsecurityhelper/PCSecurityHelper
PS….TIP: If you move towards editing the registry, a paid software with registry Back Up features is not necessary. Simply open the Windows Registry and click Export and then Save to like My Documents with any File name you want to give it like “Registry Back Up Jan 2013” example.
Click Start > Run > type in “regedit” without the parenthesis > click OK > … the Windows Registry Opens…. > click File > Export
Note that this takes about 10 to 20 seconds to complete before ready to save it as a file. NOW if there has be any mistake made then you simply close everything running (browsers, email, software program, etc etc) and Go To the back up file you saved in like My Documents. YOU SIMPLY DOUBLE CLICK THE BACK UP FILE AND WINDOWS REGISTRY REINSTALLS TO THAT SAVED FILE WHEN IT WAS WORKING. It will over write the entire registry and write in the registry as it was saved. Of course you do not do other things as install new softwares, Windows Updates, etc in between time while working on the registry. You do your fix task and confirm it is okay by navigating the pc a bit and maybe open afew softwares one at at time and close them. things working ? try a reboot and try again to confirm the registry edit is okay and everything is working.
The reinstallation of the Windows Registry is like System Restore. The System Restore Point is a snaphot of the entire system at that instant. Same thing in the Windows Registry back up file. It can only rewrite that “snapshot’ in time of what was in it. If you were to make changes (as installations and updates/upgrades) before checking the edit was okay – then these new registry keys from the changes would NOT be in the back up and would not then work no doubt until uninstalled and reinstalled if possible. A manual uninstall may be necessary of these as would be “corrupted” due to missing registry keys and entries.
CLEAN UP TIPS……. http://tech.groups.yahoo.com/group/Windows_Vista/message/3881?l=1
As Microsoft mentioned to clean up Temporary Internet Files, the easiest wy to do this is with a very popular safe durable software called CCleaner (nic crap cleaner) used by millions and millions of Windows users. It is Genuine Freeware meaning NO ads, ad pop ups, etc etc.
Here is the normal settings used in it for entire safe clean up of junk temporary internte files etc….
Recommended Settings and use of CCleaner – Temporary Internet Files Clean Up Browsers, Applications January 14, 2012 — bluecollarpc https://bluecollarpcwebs.wordpress.com/2012/01/14/recommended-settings-and-use-of-ccleaner-temparary-internet-files-clean-up-browsers-applications/
NOTE it is recommended NOT to keep any cookies stored on the PC as malware now can break into a PC and take it over through stored cookies. This was happening at Facebook users. SEE:
Delete ALL cookies ALL the time EVERY time Facebook malware reminds us December 27, 2011 — bluecollarpc https://bluecollarpcwebs.wordpress.com/2011/12/27/236/
TIP: You rarely hear about cleaning up Java temporary files. Malware tries to reside and hide here from detection and removal. You can achieve this by opening the Java Panel…..
Start > Control Panel > Java …. double click the Java panel icon to open it.
In settings there, go to the Temporary Files and click delete all. This affects nothing and is safe to perform anytime. There can be age old files there and a mini malware payload. It is better to even choose “Do Not Store Java Temporary Files On This Computer”. This blocks Java based malware from executing a payload from these files. This is a safe setting or they would not offer it. May slow navigation a nanon second if that. I did this 5 years ago or more before actually uninstalling Java due to current ongoing crisis with it.
gerald philly pa usa https://sites.google.com/site/pcsecurityhelper
US-CERT collects phishing email messages and website locations so that we can help people avoid becoming victims of phishing scams.
You can report phishing to us by sending email to
You can also use Microsoft tools to report a suspected phishing scam. Internet Explorer. While you are on a suspicious site, click the gear icon and then point to Safety.
These are excellent seemless well known and used programs. The free ones work best the more “aggressive” the settings you use. These are not going to work with your normal ISP Subscription (AOL, MSN, Earthlink, Juno, etc) – they work with POP Mail you can set up with the accounts you have and not with the ISP software. The free ones are spam filters that will strike through the known spam subject line of the message with (*****) the five asterik stars in front of and in back of the spam subject line. I have used everything here and they generally do not miss or make mistakes. The shareware (buy) ones create a small toolbar and a seperate folder not allowing the spam into the Inbox. They all have quick settings and are very , very quick to set up.
Cactus Spam Filter FREE! [working-freeware] http://www.codeode.com/spamfilter/ Cactus Spam Filter is a free easy-to-use spam blocker. It protects your inbox by learning to detect spam as it’s being used. After a short while it has adapted to your personal mailbox and blocks out most of the junk e-mail. Since the filter becomes personal, spammers will not be able to fool it. Even though this is a brutal, merciless spam killer, no e-mails will get lost unless you delete them. Installation is very simple. No setup is required in your e-mail client; this spam stopper integrates seamlessly with all e-mail clients that use POP3. It has been successfully tested with Microsoft Outlook, Microsoft Outlook Express, Netscape, Opera, Mozilla, Mozilla Thunderbird, Eudora, Pegasus Mail, IncrediMail, Foxmail, POP Peeper, Command Line POP Client, The Bat!, and Phoenix Mail.
CA (Computer Associates) Anti-Spam [shareware] http://home3.ca.com/STContent/Products/All_Products.aspx?sc_lang=en-US CA Anti-Spam is the effective and easy-to-use spam filter that makes sure you get messages from people you know, while redirecting messages from people you don’t. There are no complicated rules or filters to create or manage: CA Anti-Spam does it for you. And it works seamlessly with Microsoft Outlook and Outlook Express to stop unwanted junk mail and fraudulent phishing scams, letting you take control of your Inbox. PC Magazine Editors’ Choice Award 3 years running!
Catch Up With Java Malware Information….. Day after day seemingly, week after week, for about 100 days or more it seems cyber crime has declared war on Java a handful of ‘zero days’ as well have been suffered. For security reasons it has been actually advised to disable Java in ALL browsers and even uninstall Java from the computer. This has been no joke if you have not been keeping up with all the security warnings and actual INFECTIONS occurring via exploiting Java ! READ ON TO CATCH UP IF YOU MUST ! ! ! FOLLOW THE TIMELINE TO DATE….
CLICK THE MESSAGE LINKS TO GO TO THE WEBSITE AND FULL STORY DETAILS….
Aug 29, 2012
US-CERT Alert – Oracle Java 7 Security Manager Bypass Vulnerability
Fw: US-CERT Alert TA12-240A – Oracle Java 7 Security Manager Bypass Vulnerability…System US-CERT Alert TA12-240A Oracle Java 7 Security Manager Bypass Vulnerability…Yet * Let’s start the week with a new Java 0-day in Meta…..
Critical Java 0-day flaw exploited in the wild
Critical Java 0-day flaw exploited in the wild Posted on Aug 27, 2012 06:11 pm Researchers…security firm FireEye have discovered targeted attacks exploiting a zero-day Java vulnerability to deliver the Poison Ivy RAT onto the unsuspecting victims…
Aug 30, 2012
Unpatched Java exploit spreads like wildfire
Unpatched Java exploit spreads like wildfire Naked Security Sophos customers are proactively protected against the malware payload as Troj/Agent-XNE and the malicious Java applet as Mal/JavaKnE-H. Sophos endpoint customers using our web protection…
Java 7 Under Attack: Researchers Advise It Be Disabled During The Interim
Java 7 Under Attack: Researchers Advise It Be Disabled During The Interim CRN…thereof. “IT administrators’ only defense at the moment is to limit the use to Java,” wrote Wolfgang …
Disable Java NOW, users told, as 0-day exploit hits
Disable Java NOW, users told, as 0-day
exploit hits web Register The vulnerability allows…keylogger or some other
type of malware . The payload does not need to be a Java app itself. In
the form in which it …
Java 0-day exploit added to Blackhole kit, still no news
Java 0-day exploit added to Blackhole kit,
still no news about patch Posted on Aug 29, 2012 12:20 pm The recently
discovered Java zero-day flaw that has been spotted being used in limited
targeted attacks in…
Aug 31, 2012
Zero-day Java flaw exploited in targeted tax email malware attack
Zero-day Java flaw exploited in targeted tax email malware attack by Paul Baccas on August…cybercriminals have taken advantage of the critical zero-day flaw vulnerability in Java, sending out malicious emails which pretend to come from an accountancy firm…
Java Zero-Day Malware Attack: 6
Java Zero-Day Malware Attack: 6 Facts
InformationWeek Businesses are growing worried about drive-by infections by
malware that exploits two zero-day Java vulnerabilities. Attackers,
apparently operating from China, chained the two…
Java is Insecure and Awful, It’s Time to Disable It, and
Java is Insecure and Awful, It’s Time to
Disable It, and Here’s How As usual, there’s yet another security hole in the
Java Runtime Environment, and if you don’t disable your Java
plugin, you’re at risk for being infected with malware. Here…
Sep 1, 2012
Java 0-day exploit served from over 100 sites
Java 0-day exploit served from over 100 sites Posted on Aug 30, 2012 03:23 pm The problem of the two unpatched Java zero-day vulnerabilities that are actively exploited in the wild by attackers…
US-CERT Releases Oracle Java JRE 1.7 Security Advisory
Fw: US-CERT Current Activity – US-CERT Releases Oracle Java JRE 1.7 Security Advisory —–Original Message—– From…Awareness System US-CERT Current Activity US-CERT Releases Oracle Java JRE 1.7 Security Advisory Original release date: Tuesday…
Oracle releases patches for Java vulnerability CVE-2012-4681
hours ago – Oracle has released a new patch which kills off a
in Java 7 that was being exploited by malware developers. “Due
to the high
severity of these …
Exploit:Java/CVE-2012-4681.DM – Learn more
hours ago – Summary. This threat is detected by the Microsoft
engine. Technical details are not currently available for this
Unpatched Java Vulnerability Exploited in Targeted
Attacks, Researchers Say
Unpatched Java Vulnerability Exploited in
Targeted Attacks, Researchers Say PCWorld (blog…has been …
Oracle fixes Java 7 web browser flaw
Oracle fixes Java 7 web browser flaw IT PRO Software giant Oracle has finally released a patch…malware . The US government warned end users to be on their guard against Java 7 zero-day vulnerabilities …
Oracle provides early patch for
Oracle provides early patch for Java iTWire
The next Java update was scheduled for October 16…also includes fixes
for two other vulnerabilities affecting Java running …
Update Java in Control Panel ! Oracle releases security
patch for Java vulnerability
Oracle releases security patch for
Java vulnerability Siliconrepublic.com Before now, the only way to
protect computers from potential malware attacks exploiting this…
Sep 3, 2012
Oracle patches Java 0-day, researchers say there is
Oracle patches Java 0-day, researchers say
there is another one Posted on Aug 31, 2012 02:09 pm Oracle has finally issued
an update for Java 7 (v 1.7.0_07) which solves the problem of the
After patch, researchers find another Java vulnerability
After patch, researchers find another Java vulnerability SC Magazine Australia Hours after the company that maintains…
Oh No Not Again! New Java Vulnerability Uncovered In
Latest Java Update
Oh No Not Again! New Vulnerability Uncovered In
Latest Java Update Forbes Adam Gowdiak, CEO and founder of Security
Sep 5, 2012
Fake Amazon emails open the way for
Fake Amazon emails open the way for malware Posted
on Sep 04, 2012 01:15 pm The CVE-2012-4681 Java zero-day vulnerability
might have been patched, but because it was added to the popular Blackhole
exploit kit and because most…
Fw: Another Java Security Flaw Appears After Oracle Patch
Another Java Security Flaw Appears After Oracle Patch TechWeekEurope…Researchers have uncovered another potentially Java security flaw, which could be used by hackers…Current Activity – US-CERT Releases Oracle Java JRE 1.7 Security Advisory ….
Rogue Microsoft Services Agreement emails lead to latest Java exploit
Rogue Microsoft Services Agreement emails lead to latest Java exploit Computerworld IDG News Service – Hackers are distributing…
Article: Thanks ever so much Java, for that biz-wide
Thanks ever so much Java, for that biz-wide
rootkit infection Register Shortly after I awoke to…client called to inform me
his computer had contracted some malware . Java has, if you’ll forgive
the anthropomorphization of a bytecode virtualization…
Sep 14, 2012
Oracle confirms existence of another critical Java
Oracle confirms existence of another critical
Java flaw Posted on Sep 11, 2012 03:45 pm When Oracle finally patched the
CVE-2012-4681 Java 0-day that was being actively exploited…
Nov 2, 2012
Jacksbot Java malware can take control of Windows, Mac,
and Linux systems
Jacksbot Java malware can take control of
Windows, Mac, and Linux systems The Next Web…software company Intego
discovered malware which it classified as “a new Java backdoor trojan
called Java/Jacksbot.A.” New threats are discovered all…
Nov 24, 2012
Warning out vs new cross-platform
…vendors warned computer users over the weekend
against a new malware that can potentially affect various platforms that support
Java. In a blog post, Trend Micro pointed out …
Jan 3, 2013
Java server malware targets Windows systems
Java server malware targets Windows systems SC Magazine Researchers have discovered a backdoor delivered by a malicious JavaServer Page (JSP), which targets vulnerable Java-based HTTP servers and allows an attacker to hijack infected systems. The malware…
Jan 12, 2013
New malware exploiting Java 7 in Windows and Unix systems
New malware exploiting Java 7 in Windows and Unix systems CNET The malware has currently been seen…OS X, may be able to do so given OS X is largely similar to Unix and Java is cross-platform. Additionally, the exploit is currently being …
Java flaw poses malware threat to PC users
Java flaw poses malware threat to PC users Financial Times A serious flaw in the Java software found on most personal computers could expose the machines to being…
New Java 0-day exploited in the wild
New Java 0-day exploited in the wild Posted on Jan 10, 2013 04:45 pm A new Java zero-day being exploited in the wild has been found. With the files we were…
Disable Java! Recent 0-day exploit is included in exploit kits
Disable Java! Recent 0-day exploit is included in exploit kits Posted on Jan 11, 2013 06:00 pm The Java zero-day that has recently been spotted being exploited in the wild has turned…
Jan 13, 2013
US-CERT Releases Oracle Java 7 Security
Fw: US-CERT Current Activity – CERT Releases Oracle
Java 7 Security Advisory…Vulnerability Note VU#625617 to address a
vulnerability in Oracle Java Runtime Environment (JRE) 7 and earlier that
Jan 15, 2013
Week in review: Java 0-day wreaking havoc, hiding
messages in Skype silences, Apple prevents popular app scam
Week in review: Java 0-day wreaking havoc,
hiding messages in Skype silences, Apple prevents popular app scam tactic Posted
on Jan 14, 2013 06:00 am…
US-CERT – Out-of-Band Patch to Address Java 7
…Current Activity – Oracle Releases Out-of-Band
Patch to Address Java 7 Vulnerability…band patch to address the
recently announced vulnerability in Java Runtime Environment (JRE) 7.
US-CERT encourages users and…
Security: Homeland Security Warns About Java
Homeland Security Warns About Java Malware
DrJays.com Live A newly-discovered vulnerability
How To disable Java in my web
How do I disable Java in my web browser?
http://www.java.com/en/download/help/disable_browser…Macintosh OS X
•Browser(s): Internet Explorer, Firefox, Chrome, Safari •Java version(s):
7.0, 7u10+ FULL INSTRUCTIONS (easy) …..
Jan 16, 2013
Oracle patches critical 0-day with new Java
Oracle patches critical 0-day with new Java
update Posted on Jan 14, 2013 01:05 pm Oracle has released Java 7 Update
11, the computing platform’s newest version that patches…
Oracle delivers 86 security
…fixes Posted on Jan 16, 2013 10:06 am Oracle has
had two major updates in the last 2 days. On Sunday, Jan. 13 a new version of
Java 7 was released that addresses the 0-day vulnerability that has been
exploited in the wild. The Oracle C…
Surprised? Old Java exploit helped spread Red October
Surprised? Old Java exploit helped spread Red October spyware Register Unpatched Java installations…October on
Malware masquerades as patch for
Malware masquerades as patch for Java
ITworld.com Hackers often disguise their malware as a legitimate…
Jan 21, 2013
Java Security ‘Fix’ Is Disguised Malware
Java Security ‘Fix’ Is Disguised Malware
Attack InformationWeek The malware may be…against browsers. The attack begins
with a Web page warning that a newer version of Java is required to …
Newest Java update doesn’t fix fresh critical
Newest Java update doesn’t fix fresh
critical vulnerabilities Posted on Jan 21, 2013 03:26 pm Another week, another
zero-day threatening millions of Java users. As you might remember, last
week Oracle released Java 7 Update 11, which…
Jan 28, 2013
Beware of fake Java
Beware of fake Java updates CNET January 22,
2013 9:30 AM PST. Following recent security vulnerabili…vulnerabilities in
Java, malware developers are taking a new approach to exploit the
Java platform by issuing false updates that pose as legitimate updates
Java’s new “very high” security mode can’t protect you
Java‘s new “very high” security mode can’t
protect you from malware Ars Technica Security researchers have uncovered a
newly discovered bug in Oracle’s Java framework that allows attackers to
bypass important security protections designed…
Feb 2, 2013
US-CERT- Oracle Releases Out-of-Band Patch to Address
Java 7 Vulnerabilities
…Current Activity – Oracle Releases Out-of-Band
Patch to Address Java 7 Vulnerabilities —–Original Message—– From:
Current…out-of-band patch to address multiple vulnerabilities in the
Java Runtime Environment (JRE) 7 Update 11 and earlier. These
Security: Firefox will block by default nearly all
Firefox will block by default nearly all plugins
Posted on Jan 30, 2013 08:08 pm Following the recent debacle of the critical
Java 0-day that was being actively exploited in the wild, in an attempt
to minimize its users’ attack surface Mozilla has enabled “Click…
Feb 6, 2013
Oracle rushes out emergency Java
Oracle rushes out emergency Java patch
Posted on Feb 04, 2013 01:44 pm If you’re still among the users…computer, be
advised that Oracle has released a critical patch update for Java SE
(Java 7 Update 13) on Friday. …
Feb 18, 2013
Facebook disables Java after
Facebook disables Java after hack
VentureBeat The malware came through another issue with Java…Department
of Homeland Security even recommended that people uninstall Java since
hackers were finding new …
Feb 20, 2013
Apple issues malware removal tool today,
…tool today The Verge “Apple has identified
malware which infected a limited number of Mac systems through a vulnerability
in the Java plug-in for browsers,” the company said in its statement.
“The malware was employed in an attack against Apple and other companies…
Apple victim of malware
…malware attack. A small number of systems inside
the company were compromised. The malware attack was tied to a vulnerability in
a Java plug-in for browsers, Apple said in a statement sent via email.
“There is …
Feb 22, 2013
US-CERT Updated Release of the February 2013 Oracle Java
SE Critical Patch Update
…Current Activity – Updated Release of the
February 2013 Oracle Java SE Critical Patch Update —–Original
Message—– From…an updated February 2013 Critical Patch Update for Oracle
Java SE to address a vulnerability. This vulnerability could allow…
Apple Releases Code To Remove Java Hack
Apple Releases Code To Remove Java Hack
Malware Fast Company In the wake of this attack Apple…malware. The Apple hacks
happened when a vulnerability in Java, …
Latest Mac malware attack shows that Windows 8 is more
…blog) Apple has admitted that Macs inside the
company were recently victimized by a malware attack. They were hacked in a
drive-by Java exploit. In response, Apple patched the security hole in
older systems vulnerable to the attack, and also released a tool …
Uninstalling the Terrible Ask
…your computer, don’t be ashamed – it could
happen to anybody. Especially considering that is bundled with the equally awful
Java runtime. Those people should be ashamed of themselves. ….
Mar 2, 2013
Java malware sets its sights on your Minecraft
Java malware sets its sights on your
Minecraft passwords Geek This piece of malware is quite a bit more
sophisticated, too. It’s made of multiple Java applets that are hidden
after being dropped onto a compromised system. The tool…
New Java 0-day exploited in ongoing
New Java 0-day exploited in ongoing attacks
Posted on Mar 01, 2013 03:48 pm FireEye has detected yet another Java
zero-day vulnerability being exploited in attacks in the wild. Affected