Free Security Stuff Worth It? Complete Package Recommended Here Is!

Free Security Stuff Worth It? Complete Package Recommended Here Is!

NOTE: I am/was Webmaster of the BlueCollarPC .net/.org/.us [all retired] now at permanent BlueCollarPC Security Helper Google Site https://sites.google.com/site/pcsecurityhelper/
Since 2005 we have been graced to help over 12 Million User/Visitors and have maintained honest free best information sharing with integrity expected by the Community at such Help Sites across the web, as expected and demanded. For continual help and information ongoing, stop into our site anytime and even find more stuff to use ! HOME: https://sites.google.com/site/pcsecurityhelper/

You wanted a free package, here you go. A Good Free Package of Security Softwares you can add FREE FREE FREE!

BUT READ THIS FIRST FIRST FIRST !!!!

You will have to understand what is said here. The reasons over 12 million Users/Visitors of my security site trust it/me is that I have always maintained the honesty of NEVER giving bad advice as unresearched and proven. NEVER posting links that lead to malicious infectious websites. NEVER posted any softwares that were bundled with malware or that were other than “Genuine Freeware” – which is the term I invented as meaning no continual or intermittent pop ups or ads or connected to any ad networks or “nagware” they now call it. Of course it is understood that “trialware” is known that it is a free version for a set time that maybe one week, fifteen or thirty days. I have NEVER promoted any “feel good” false sense and environment of computer security – which many commercial sites do for gain such as online magazines etc. One of our Creeds……

“NOTES…..
FUD “Fear, Uncertainty and Doubt, a marketing or political strategy” …
FUD (definition) http://en.wikipedia.org/wiki/FUD
There are many, many idiots and the corrupt in computer security calling all things FUD (or snake oil – worthless product, does nothing – such as industry wide security products as antivirus, antispyware, personal firewalls etc.) . Some of the count are actual cyber criminals socially engineering you ! Some advocate never using a registry cleaner (which can not pass legal compliance in IT Security) – yet they will advise you to use antivirus and antispyware that does indeed remove malware Windows Registry keys. We as intermediate and advanced users have known for years and have used for years Registry products that are an invaluable help to manually locate malware items and as well identify reported malware by security products (antivirus. antimalware, firewalls). These others are telling you ‘feel-good’ false security lies as ‘sugar daddies’ or ease-of-use ‘candy man’ tactics to be your “security guru” at many forums. We do not promote any false sense of security or environment. Those wishing to profit from calling security FUD are what we use to call Judas Iscariot and are NOT welcomed here or anywhere there is intelligence. ”

Originally, a “free package” as a handful of security softwares put together as “layers of security” used to be posted by just about all helpers. BUT this was the early days from 2002 on a few. Many products were not near 100 percent protection (antispyware) so it began to then download some extra free versions as stand alone on demand scanners without Real Time Protection activated (but upon purchase). These were added to one you would buy. What one didn’t get – the others would was the logic and advice. You put together your “security solution”.

This dramatically changed forever now and is no longer good advice to any user. The reason is that the cyber crime threatscape changed for the worst years ago. First they added to payloads malwares that would disable ANY free version on the computer. They could not be used. Then they also added malwares that would attack a paid version on the computer as not all antivirus/antispyware products were best quality that repelled easily these attacks upon them to disable them. Weaker or less than quality premium version (pay for) antimalware products (antivirus and antispyware) were successfully attacked and disabled by the newer malware payloads, which then installed at will the rest of their payloads being successful to disable security products – that would be trojans, spyware, rootkits, viruses, etc.

Here is just one example of this as a common threat nowadays (zillions) :
Security software disabler Trojan
http://www.webopedia.com/TERM/S/security_software_disabler_Trojan.html
Through less than quality firewalls like butter….
Tunneling to circumvent firewall policy
http://en.wikipedia.org/wiki/Tunneling_protocol#Tunneling_to_circumvent_firewall_policy
“Users can also use tunneling to “sneak through” a firewall, using a protocol that the firewall would normally block, but “wrapped” inside a protocol that the firewall does not block, such as HTTP. If the firewall policy does not specifically exclude this kind of “wrapping”, this trick can function to get around the intended firewall policy.”

So in good conscience, there is no way to give the older advice of building some free package of security softwares and tell someone they are good to go. It is now plainly a LIE !!! And big BUT…. There are so many that do not have credit cards to buy products online. There are those that simply will not pay for protection like your thrifty Uncle example. So with these – they still need anything as beating a blank. It HAS to be drilled into their heads that a free version is only a scanner with NO protection and the pay product is necessary for Real Time Protection. This is Reactive and Proactive Security. Reactive security is using free scanners like AVG Free etc. with no Real Time Protection and are used AFTER a threat to the PC is perceived by the user. You scan and attempt to detect any threats and remove them. However, the damages are ALREADY done such as a destructive worm or virus and spyware as well, that all files they wished to get have already been copied and sent to the cyber criminals. TOO LATE NOW ! Proactive is using the product with Real Time Protection running 24/7. This BLOCKS infections before they occur – thus NO loss of personal data and/or actual destruction of the operating system or motherboard or chipsets or disk itself leaving the PC “bricked” – like a brick, doesn’t do anything and makes for a paperweight now. (Bricked is generally the term they use for mobiles toasted by malware).

There are just the FEW free products that offer Real Time Protection. If they refuse to pay or can’t, you have to then offer the “free package” and wish them good luck with the instructions to them about dangers. The free ones with Real Time Protection (heuristics) are simply no where near any best product is the problem aside trying to get something for free. You get what you pay for is the advice and of course you explain and add “Best Practices” advice for safe surfing as best possible (stay away from dark side of internet which is full of infections, etc) and not opening or clicking spam emails or attachments etc.

Having all this in mind, and not simply listing a package as my advice without explanation in full above (what I put my hand to), let’s go ahead and put together that free package…..

FIRST the user needs a product with Real Time Protection. This is ALWAYS the first move/installation.
BEST FREE:
Comodo Free Anti Virus Software Internet Security
http://antivirus.comodo.com/ (Genuine Freeware)
Free Antivirus Software from Comodo eliminates viruses, spyware, and other malware from desktops and networks fighting against Internet security threats. Full Real Time Protection !
PRESS: Great News !
Comodo Internet Security Earns the Prestigious VB100 Virus Certification
HostReview.com (press release) April 14, 2011
http://www.hostreview.com/news/110414-comodo-internet-security-earns-prestigious-vb100-virus-certification

NEXT: (may be tad advanced for newbie)
Spyware Terminator [Genuine Freeware] (Antispyware and antivirus. Real time protection added!)
http://www.spywareterminator.com/
Millions of users worldwide rely on Spyware Terminator, winner of many awards and high ratings from industry experts and users. Its free comprehensive protection is comparable to competitors’ paid versions! Originally with enterprise level Clam Antivirus now has F-Prot Antivirus.
Spyware Terminator includes: http://www.spywareterminator.com/
* Fast spyware scanning
* 100% real-time protection
* HIPS protection
* Antivirus protection
* Multilanguage Support
http://www.spywareterminator.com/
View List of All Features »
http://www.spywareterminator.com/features/antispyware-features.aspx

LAST PLACE:
Microsoft Security Essentials…..(only recommended for Real Time Protection and is now very weak product)
http://www.microsoft.com/security_essentials/
Microsoft Security Essentials provides real-time protection for your home PC, antivirus and antispyware real time shields.

SPECIAL NOTE / BASIC SECURITY….Microsoft: Security Essentials is designed to be bottom of the antivirus rankings. Microsoft has admitted Windows users should install antivirus above and beyond its own Security Essentials, describing its protection as merely a “baseline” that will “always be on the bottom” of antivirus software rankings.
http://www.pcpro.co.uk/news/security/384394/microsoft-security-essentials-is-designed-to-be-bottom-of-the-antivirus-rankings

HOWEVER it must be explained…. Generally, Do not use two antimalware products that have real time protection technology. These generally will conflict and worst. You can use these with free stand alone products that just scan, safely. DO NOT INSTALL ALL THREE OUT OF PARANOIA!!!! Pick one only that has Real Time Protection. These are that Proactive Defense.

BEST FREE STAND ALONE SCANNER – SCAN ON DEMAND (means open it and click scan)…..
Emsisoft Antimalware
http://www.emsisoft.com/en/software/antimalware/
Full antivirus and antispyware combined. This is the best premium product in the world IMO (In My Opinion) beating all others as Norton, ESET NOD32, Sophos etc. Download it and choose either full version free for 30 days to try, or simply click Free Version (without Real Time Protection). With one of the above Real Time Protection products, you can then use the Emsisoft free version to perform a full scan at least once a week. Heavy surfers – scan every or every other day! Great scan options, you can do the quick scan check for malware running right now on the PC (think you may got hit at a site) which takes only a moment. You can choose Smart Scan which checks the usual suspects in the usual places. And then Full Scan which will scan the entire computer system and files. This takes over a half hour with any product, the full scan, but should be done even by advanced users at least once a week or bi-monthly.
http://www.emsisoft.com/en/software/antimalware/

ALSO GET THIS TOO FOR USB DRIVE / USE IF PC IS LOCKED UP, CAN’T NAVIGATE – JUST PLUG IN AND LAUNCH EEK AND SCAN
Emsisoft Emergency Kit 2.0 [genuine freeware, best, recommended]
http://www.emsisoft.com/en/software/eek/
Your emergency kit for infected PCs! Detects and removes Malware > 5 million known dangers. World class dual-scan-engine. 100% portable – perfect for USB sticks. HiJackFree and BlitzBlank included. Self made Emergency USB Drive stick (or purchase) – Expand the content of the Emsisoft Emergency Kit to an USB stick and make your own universal tool to scan and clean infected PCs.

MORE …

ANTIVIRUS:
Avast AntiVirus Home Edition [working-freeware]
http://www.avast.com/eng/avast_4_home.html
Free avast! 4 Home Edition. avast! 4 Home Edition is a full-featured antivirus package designed exclusively for home users and non-commercial use.

BitDefender Free Edition
BitDefender Free Edition is an on-demand virus scanner, which is best used in a system recovery or forensics role. If you are on an “always-on” Internet connection, we strongly advise you to consider using a more complex antivirus solution.
http://www.bitdefender.com/PRODUCT-14-en–BitDefender-Free-Edition.html

AVG – Free Antivirus
http://www.avg.com/us-en/free-antivirus-download
AVG Anti-Virus Free is virus and anti-spyware available for free.

ANTISPYWARE:

SUPERAntiSpyware [working-freeware version]
http://www.superantispyware.com/
SUPERAntiSpyware scans your computer for known Spyware, Adware, Malware, Trojans, Dialers, Worms, KeyLoggers, HiJackers and many other types of threats, and allows you to remove or quarantine them. The free version lacks real-time blocking and protection as well as several other advanced options.

Lavasoft Ad-Aware [working-freeware version]
http://www.lavasoftusa.com/software/adaware/
Ad-Aware Personal provides advanced protection from known data-mining, aggressive advertising, Trojans, dialers, malware, browser hijackers, and tracking components. This software is downloadable free of charge for personal use. (Lavasoft Ad-Aware is one of the pioneers in antispyware as we know it today along with Webroot Spysweeper)

Malwarebytes [working-freeware version]
http://www.malwarebytes.org/
Free anti-malware (Has become popular, detection rates have greatly improved ! )

INSTALL QUALITY FIREWALL ASAP! (Microsoft includes a basic firewall now in all editions)
ZoneAlarm Free Firewall (BEST FREE – SET AND FORGET!]
Protect your PC with #1 Free Firewall
http://www.zonealarm.com/security/en-us/zonealarm-pc-security-free-firewall.htm

Comodo Personal Firewall [tad advanced for newbies]
(Genuine Freeware, and rated by international tests as about world’s best – now includes antivirus real time)
http://www.personalfirewall.comodo.com/

***Now there is a free security solution with even more to add, below a couple more tools. You get antimalware with Real Time Protection installed for real time protection and then add the free scanner versions to get what that misses – both antivirus and antispyware. With the free scanners, you can download/install all of themwill not conflict with the Real Time Protection product (Comodo etc) installed.

SECURITY TOOLS / UTILITIES

Internet Tracks Cleaners Recommended (Privacy and Security)
CCleaner – Wikipedia, the free encyclopedia (very popular, safe, freeware/donate)
CCleaner supports the cleaning of temporary and unneeded files from certain …
http://en.wikipedia.org/wiki/CCleaner
CCleaner http://www.ccleaner.com/
NOTE FOR AVERAGE USER SETTINGS PLEASE SEE THESE ON MY BLOGPOST HERE:
https://bluecollarpcwebs.wordpress.com/2012/01/14/recommended-settings-and-use-of-ccleaner-temparary-internet-files-clean-up-browsers-applications/
[You should have browsers Settings to delete all internet history each time it closes. Do NOT keep cookies on your computer at all. They have been broken into by crimewares now. Cookies should only be given session cookies permissions as a privacy and security issue (cookies have been broken into by malwares) and only if necessary.

Secunia Personal Software Inspector (PSI) [MILLIONS OF DOWNLOADS]
The Secunia PSI is a free security tool designed to detect vulnerable and out-dated programs and plug-ins which expose your PC to attacks. Set to automatic or manual Update for all, will not install the purchase Upgrade versions – just Updates released by the software companies.
http://secunia.com/vulnerability_scanning/personal/

ESET (NOD32) Stand-alone malware removal tools
http://kb.eset.com/esetkb/index?page=content&id=SOLN2372

ADD FOR FIREFOX….
BetterPrivacy :: Add-ons for Firefox
https://addons.mozilla.org/en-US/firefox/addon/6623
Remove or manage a new and uncommon kind of cookies, better known as LSO’s.The BetterPrivacy safeguard offers various ways to handle Flash-cookies set by Google, YouTube, Ebay and others… Go through Settings and click to always delete all when browser closes or paranoid – check to give permission to these on case to case basis.

EULAlyzer 1.1 [freeware]
http://www.javacoolsoftware.com/eulalyzer.html
EULAlyzer can analyze license agreements in seconds, and provide a detailed listing of potentially interesting words and phrases. Discover if the software you’re about to install displays pop-up ads, transmits personally identifiable information, uses unique identifiers to track you, or much much more.

RESET PC WHEN INFECTED AFTER CLEANING UP:
Microsoft Malware Prevention troubleshooter
http://support.microsoft.com/kb/2534555
The Microsoft Malware Prevention trouble shooter is designed to scan your computer and make recommended changes based on your current settings to provide you with the most up to date security for your Windows operating system. Building up your computer’s defenses helps secure your computer against viruses and other malicious software.

The Microsoft Malware Prevention troubleshooter does the following:
•Turns on your Windows Firewall. Enabling your Windows Firewall will protect your computer by blocking communication to your PC that may be malicious software.
•Antivirus software: Checks your Antivirus protection status. You will be prompted to update your Antivirus program if it is not up to date or enable Real-time protection. If you don’t have an anti-virus program installed it will offer you to use Microsoft Security Essentials or learn more about other security software partners.
•Turns on Automatic Update. Windows Update helps keep your PC current, secure and enhance performance by automatically downloading and installing the latest security and feature updates from Microsoft. This helps ensure that both Important and Recommended updates are downloaded.
•Pop-blocker: Enabling Pop-up Blocker will make browsing the web safer by helping prevent malicious or unsafe pop-ups from automatically appearing.
•Remote Registry: The Windows Remote Registry service enables remote users to modify registry settings on this computer. If this service is stopped the registry can be modified only by users on this computer as opposed to over the network.
•Internet Explorer: The package will inform you if you have the latest version of Internet Explorer installed. It will also modify your current privacy settings to ensure you have a safe browsing experience. The package will delete your internet cache and browsing history, which will help protect against malicious threats attempting to access your computer while you’re online.
•Enables User Account Control (UAC). User Account Control (UAC) will prevent malicious software from modifying your computer settings without your consent.
•Proxy Settings: If malicious software has modified your Internet Proxy settings, therefore making it difficult to get online, the package will reset your settings so you can browse the internet normally.

ADVANCED:

ProcessQuickLink [Genuine Freeware]
http://www.processlibrary.com/quicklink/
For your PC to function Windows needs to run and manage many different processes. While many processes run by Windows are essential and legitimate, most PCs get bogged down with processes that are useless or downright harmful. ProcessQuickLink gives you an easy way to analyze each process running on your PC. Is it a resource hog? Could it be part of a virus infection? Or maybe a sign of spyware? ProcessQuickLink will give you the answer. How it works….. Once you install ProcessQuickLink access the Task Manager. Near each process you will see an button. Click on the button and you will be linked to the process page as listed on processlibrary.com.

HiJackFree (freeware)
Freeware! HiJackFree helps advanced users to detect and remove Malware manually. With HiJackFree you can manage all active processes, services, drivers, autoruns, open ports, hosts file entries and many more. For your full control over your system.
http://www.hijackfree.com/en/

BEST MOST TRUSTED REGISTRY CLEANER:
PowerTools Lite – The Freeware Registry and System Cleaner
https://www.macecraft.com/slides/powertools-lite-2013/
PowerTools Lite 2011 is a freeware edition of jv16 PowerTools – the ultimate Windows optimization and tuneup utility suite. PowerTools Lite 2011 allows you to easily clean up your computer from unneeded data, unused temp files, registry left overs and automatically fix registry errors.
NOTE: jv16 PowerTools has been about the best registry cleaner loaded with extra advanced features including registry editor for years and years since the beginning. Recently over a year ago they released the above free edition which has four levels of intensity clean for beginner to advanced. Very safe. Very trusted .
PREMIUM jv16 PowerTools:
http://www.macecraft.com/
http://en.wikipedia.org/wiki/Jv16_powertools

Belarc Advisor (Freeware)
The Belarc Advisor builds a detailed profile of your installed software and hardware, missing Microsoft hotfixes, anti-virus status, …
ABOUT BELARC
http://www.belarc.com/about.html
Belarc, located in Maynard, MA, develops and licenses Internet based products which help make personal computers easier to use and maintain by large enterprises, small businesses and individual consumers. Our products are used for software license compliance, hardware upgrade planning, cyber security status, information assurance audits, IT asset management, configuration management, and more. Belarc’s products are in use on well over twenty million computers and are licensed by numerous customers including: AIG, Dana, Kindred Healthcare, NASA, National Park Service, U.S. Air Force, U.S. Army, U.S. Census Bureau, U.S. Coast Guard, U.S. Marine Corps, U.S. Navy, Unilever, WebMD/Emdeon, and many more.

Trend Micro RUBotted (free)
http://www.trendsecure.com/portal/en-US/tools/security_tools/rubotted
Malicious software called Bots can secretly take control of computers and make them participate in networks called “Botnets.” These networks can harness massive computing power and Internet bandwidth to relay spam, attack web servers, infect more computers, and perform other illicit activities.
Security experts believe that millions of computers have already joined Botnets without the knowledge of their owners. By using remotely-controlled computers, the criminals in charge of the Botnets try to remain anonymous and elude authorities seeking to prosecute them. RUBotted monitors your computer for suspicious activities and regularly checks with an online service to identify behavior associated with Bots. Upon discovering a potential infection, RUBotted prompts you to scan and clean your computer.

Reading Blue Screen of Death Codes
http://www.howtogeek.com/97093/ask-htg-reading-blue-screen-codes-cleaning-your-computer-and-getting-started-with-scripting/?utm_source=newsletter&utm_medium=email&utm_campaign=081111
Generally IRQL errors are hardware or driver related. We’d suggest
checking to see if any drivers have been updated recently and either
roll them back to the old driver or see if an even newer driver is
available (the vendor may have released a driver to fix the crashes). If
that doesn’t help you’ll find BlueScreenView, a crash dump analyzer,
rather helpful. We have a guide to using BlueScreenView to help get you
started……
BlueScreenView v1.40 – View BSOD (blue screen) crash information stored in dump files.
Copyright (c) 2009 – 2011 Nir Sofer
http://www.nirsoft.net/utils/blue_screen_view.html

GO PORTABLE! PUT TOGETHER PORTABLE SECURITY PACKAGE! I really recommend you install this for the USB Drive and then add the portable versions below….
GET: PortableApps.com software for USB Drive…. (has all kinds of portable apps listed you can install at will, plus you can check to get updates from each app (security updates, bug fix, etc) automatically or manually….
PortableApps.com
http://portableapps.com/
Provides packaged software suitable for use on portable media, without leaving settings files on the host computer. Includes developer information, discussion …

ADD SECURITY TOOLS PORTABLE APPS
Try clean up with portable products when access/download blocked or getting dreaded Blue Screen Of Death……

How to Remove Boot Block Malware
http://www.ehow.com/how_5941797_remove-boot-block-malware.html
Boot block malware is malicious software that settles into your computer’s hard
drive in the first sector and replaces the boot block instructions with malware
instructions. When you start, or boot up, your computer, the malware is loaded
into your computer’s memory and from there it can spread to any other part of
your computer. ….
http://www.ehow.com/how_5941797_remove-boot-block-malware.html

USE THE FOLLOWING TO REMOVE MALWARE – ROOTKIT/BOOTKIT BOOT-BLOCK TYPE MALWARES ….. EMSISOFT EMERGENCY KIT AND/OR MICROSOFT WINDOWS DEFENDER OFFLINE

Emsisoft Emergency Kit 2.0 [genuine freeware, best, recommended]
http://www.emsisoft.com/en/software/eek/
Your emergency kit for infected PCs! Detects and removes Malware > 5 million known dangers. World class dual-scan-engine. 100% portable – perfect for USB sticks. HiJackFree and BlitzBlank included.
Emsisoft BlitzBlank
BlitzBlank is a tool for experienced users and all those who must deal with Malware on a daily basis. Malware infections are not always easy to clean up. These days the software pests use clever techniques to protect themselves from being deleted. In more and more cases it is almost impossible to delete a Malware file while Windows is running. BlitzBlank deletes files, registry entries and drivers at boot time before Windows and all other programs are loaded.
Self made Emergency USB stick – Expand the content of the Emsisoft Emergency Kit to an USB stick and make your own universal tool to scan and clean infected PCs.

Microsoft Standalone System Sweeper (Beta) [FREE]
http://connect.microsoft.com/systemsweeper
NOW CALLED Windows Defender Offline
http://windows.microsoft.com/en-US/windows/what-is-windows-defender-offline
NEWS:
Microsoft ships free malware cleaner that boots from CD or USB
ZDNet (blog)
June 1, 2011, 10:15am PDT In a move aimed at cutting down on support call costs, Microsoft has released a malware recovery tool that boots from a CD or USB stick. Ryan Naraine is a journalist and social media enthusiast specializing …
http://www.zdnet.com/blog/security/microsoft-ships-free-malware-cleaner-that-boots-from-cd-or-usb/8712

Windows Defender Offline Beta
(Free from Microsoft, Scan with Windows Defender Offline Betafrom CD/DVD or USB Drive at Start Up to remove blocking malwares)
http://windows.microsoft.com/en-US/windows/what-is-windows-defender-offline

What is Windows Defender Offline Beta?
http://windows.microsoft.com/en-US/windows/what-is-windows-defender-offline
Windows Defender Offline Beta: frequently asked questions
http://windows.microsoft.com/en-US/windows/windows-defender-offline-faq
How to Create a Bootable Offline Version of Windows Defender
http://www.howtogeek.com/100289/how-to-create-a-bootable-offline-version-of-windows-defender/?utm_source=newsletter&utm_medium=email&utm_campaign=221211

We should point out that you can also scan your PC with a
BitDefender boot disk
http://www.howtogeek.com/howto/36677/how-to-use-the-bitdefender-rescue-cd-to-clean-your-infected-pc/
Kapersky boot disk
http://www.howtogeek.com/howto/36403/how-to-use-the-kaspersky-rescue-disk-to-clean-your-infected-pc/
Avira boot disk
http://www.howtogeek.com/howto/38889/how-to-use-the-avira-rescue-cd-to-clean-your-infected-pc/
or even an Ubuntu Live CD,
http://www.howtogeek.com/howto/14434/scan-a-windows-pc-for-viruses-from-a-ubuntu-live-cd/
this is one more tool to add into your toolkit.

ClamWin Portable (Antivirus, more) [FREE]
http://portableapps.com/apps/utilities/clamwin_portable
Antivirus to go…. ClamWin Portable is the popular ClamWin antivirus packaged as a portable app, so you can take your antivirus with you to scan files on the go. You can place it on your USB flash drive, iPod, portable hard drive or a CD and use it on any computer, without leaving any personal information behind.
NEWS: ClamWin Portable 0.97.1 (anti-virus) Released | PortableApps.com …
ClamWin Portable 0.97.1 (anti-virus) Released. Submitted by John T. Haller on June 17, 2011 – 7:46pm. logo ClamWin Portable 0.97.1 has been released. …
http://portableapps.com/news/2011-06-17_-_clamwin_portable_0.97.1_released

SUPERAntiSpyware Portable Scanner (Antispyware) [FREE]
http://www.superantispyware.com/portablescanner.html
Follow the instructions below to download the SUPERAntiSpyware Portable Scanner. The scanner features our complete scanning and removal engine and will detect AND remove over 1,000,000 spyware/malware infections. The scanner does NOT install anything on your Start Menu or Program Files and does NOT need to be uninstalled. The scanner contains the latest definitions so you DO NOT need Internet Access on the infected system to scan.

Comodo Cleaning Essentials
Comodo Cleaning Essentials is a set of portable antivirus tools
that will help you to detect and remove malware from an infected PC.
http://www.comodo.com/business-security/network-protection/cleaning_essentials.php
(DESKTOP http://www.comodo.com/ )

ESET SysInspector is a powerful, portable security tool that will inspect your system’s files, running processes, Registry keys and more, looking for and highlighting anything that could be a sign of malware.
(Makers of famous Eset NOD32 Antivirus – most awarded in history)
http://www.downloadcrew.com/article/20672-eset_sysinspector_12026_32-bit
(DESKTOP http://www.eset.com/us/ )

Norman Malware Cleaner is an interesting portable antivirus tool which will scan your PC, detecting and removing any malware that it uncovers.
http://www.downloadcrew.com/article/23283-norman_malware_cleaner
(DESKTOP http://www.norman.com/en-us )

The AVG Rescue CD is a portable environment that comes with a range of tools to help you clean up a virus-infected PC, fix hard drive problems, and get an unbootable system working again. This variant of the rescue CD is intended for installation on a USB flash drive. After downloading, you should extract the archive contents directly to the root folder of the USB drive you’d like to use. (If you don’t have a tool that can read RAR files, then try 7-ZIP).
http://www.downloadcrew.com/article/4650-avg_rescue_cd_usb_flash_drive_edition
(DESKTOP http://www.avg.com/us-en/homepage

CCleaner Portable
CCleaner Portable is a compact version of CCleaner that you can store on a CD, USB flash drive, microSD, or even two floppy disks if you still use those.
http://www.softpedia.com/get/PORTABLE-SOFTWARE/Security/Secure-cleaning/Windows-Portable-Applications-CCleaner-Portable.shtml
(DESKTOP http://www.piriform.com/ccleaner )

Emsisoft Emergency USB Stick (Antivirus + Antispyware) [BUY]
http://www.emsisoft.com/en/software/stick/ (USB Drive / Installed)
Emsisoft Anti-Malware Personal Edition. Malware, adware and spyware removal and scanning. Plug in an run – It is that easy to clean an infected computer with the Emsisoft Emergency USB Stick!
How it works: The Emsisoft Emergency USB Stick contains two useful programs which can be used to scan and clean an infected computer
quickly without a required software installation

How to Make a Bootable Antivirus Cd
How to Make a Bootable Antivirus Disc This document will teach you how to make a bootable anti-malware ( bootable antivirus ) cd/dvd step-by-step. … This is the best free way to remove any piece of malware with a 100% success rate. Steps: … Get Free Ultimate Boot CD
http://windows7themesxp.com/2011/09/how-to-make-a-bootable-antivirus-cd.html

HAPPY AND SAFE COMPUTING FROM THE WEBMASTER !
ONLINE HELP 24/7 BlueCollarPC Security Helper Website:
HOME: https://sites.google.com/site/pcsecurityhelper/PCSecurityHelper
HELP CENTER: https://sites.google.com/site/pcsecurityhelper/malware-removal-center
THREATS FAQS: https://sites.google.com/site/pcsecurityhelper/contact
BLOG: https://bluecollarpcwebs.wordpress.com


SENDER: gerald309 —
Have A Safe Computing Day!
Webmaster: Malware Removal/Amateur Forensics
HOME http://bluecollarpc.us/
Alternate https://sites.google.com/site/pcsecurityhelper/
HELP http://tech.groups.yahoo.com/group/BlueCollarPCSecurity/
Membership/Join List:
Subscribe: BlueCollarPCSecurity-subscribe@yahoogroups.com
Free Malware Removal Help / A Community Website Since 2005
MOBILES: http://pdamobilecafe.wordpress.com/
Alerts: pdamobilecafemobilealertlist-subscribe@yahoogroups.com
RSS: https://groups.google.com/forum/feed/pdamobilecafe-mobilealerts/msgs/rss.xml?num=15

25th anniversary of the firewall for computers

The 25th anniversary of the firewall: Celebrating a new generation
Posted on Jul 24, 2014 10:40 am
This month marks the 25th anniversary of the firewall and, like a parent looking back on the life of his children, I wonder where the time went. The McAfee Infographic that depicts the ‘lifetime’ of t…
Read in browser »
http://www.net-security.org/article.php?id=2079

MORE INFO: https://sites.google.com/site/pcsecurityhelper/windows-registry-help/pc-help
Firewalls / Information Links:

Comodo Personal Firewall [new, advanced users]
(Genuine Freeware, and rated by international tests as about world’s best – now includes antivirus real time)
http://www.personalfirewall.comodo.com/

Sygate Personal Firewall Free 5.6.2808 [Not supported, extinct]
(Old favorite now owned by Symantec)
http://www.softpedia.com/get/Security/Firewall/Sygate-Personal-Firewall-Free.shtml

ZoneAlarm Free Firewall
Protect your PC with #1 Free Firewall
http://www.zonealarm.com/security/en-us/zonealarm-pc-security-free-firewall.htm

Ashampoo FireWall Free 1.2 (popular) [wrkx w/ Netbooks]
http://www.download.com/Ashampoo-FireWall-Free/3000-10435_4-10575187.html

Online Armor Personal Firewall Free [new/advanced users]
http://www.tallemu.com/
Online Armor Free provides both a firewall and a whitelist approach to program security for Windows NT, 2000 and XP. It does not show pop-ups for many
known good programs, and it scans all your installed programs when it first runs so that you can quickly tell it what to do with apps it doesn’t know about.
Operating Systems:  Windows XP, Windows 2000, Windows Vista
What is firewall? – A Word Definition From the Webopedia Computer …
http://www.webopedia.com/TERM/f/firewall.html
This page describes the term firewall and lists other pages on the Web where you can find additional information.

Internet Firewalls: Frequently Asked Questions
http://www.interhack.net/pubs/fwfaq/
3.1 What are some of the basic design decisions in a firewall? … Can’tI just poke a hole in the firewall and tunnel that port? …

Windows Firewall in Windows XP Service Pack 2
http://www.microsoft.com/windowsxp/%20using/security/internet/sp2_wfintro.mspx
Learn the basics about the new Windows Firewall in Windows XP Service Pack 2, plus find out hot to adjust your firewall settings if you need to.

Firewall Builder
http://www.fwbuilder.org/
Firewall Builder is multi-platform object oriented firewall configuration and management tool. It consists of a GUI and set of policy compilers for iptables …

Firewall Net.com
http://www.firewall-net.com/en/
Guide to install & configure for Windows Mac or …Firewall Net is a guide for installation and configuration of firewall with windows 95 98 NT 2000 Me Millenium
XP, linux or mac , using : conseal atguard …

Firewall Q&A (Questions & Answers)
http://www.vicomsoft.com/knowledge/reference/firewalls1.html
A whitepaper on relevant firewall questions and answers. The knowledge of this subject relates to firewalls in general use, and stems from NAT and proxy …

Home PC Firewall Guide
http://www.firewallguide.com/
Learn how to protect home computers and networks from Internet outlaws by using personal firewall, antivirus and anti-spyware software plus low-cost …

Howstuffworks “How Firewalls Work”
http://www.howstuffworks.com/firewall.htm
An introductory explanation of how a firewall works and the various filtering methods used, with related links.

IPCop Firewall
http://www.ipcop.org/
A secure Linux distribution managed through a web-interface. It turns an old PC into a firewall and VPN gateway. Features an Intrusion Detection System.

OpenOffice (comparable to Microsoft products)
http://www.openoffice.org/
OpenOffice.org is the leading open-source office software suite  for word processing, spreadsheets, presentations, graphics, databases and more. It is available
in many languages  and works on all common computers. It stores all your data in an international open standard format and can also read and write files from
other common office software packages. It can be downloaded and used completely free of charge for any purpose.

 

-- 
SENDER: gerald309 -- 
Have A Safe Computing Day!
Webmaster: Malware Removal/Amateur Forensics
HOME http://bluecollarpc.us/
Alternate https://sites.google.com/site/pcsecurityhelper/
HELP http://tech.groups.yahoo.com/group/BlueCollarPCSecurity/
Membership/Join List:
Subscribe: BlueCollarPCSecurity-subscribe@yahoogroups.com
Free Malware Removal Help / A Community Website Since 2005 

Botnets: Everything Afraid To Ask Answered

Botnets: Everything Afraid To Ask Answered ….

This is a really good article covering about all the bases:

HTG Explains: What is a Botnet?
Botnets are networks made up of remote-controlled computers, or “bots.” These computers have been infected with malware that allows them to be remotely controlled. Some botnets consist of hundreds of thousands — or even millions — of computers. ….
http://www.howtogeek.com/183812/htg-explains-what-is-a-botnet/

Windows 8 and 8.1 gives malicious code the boot

Windows 8 and 8.1 gives malicious code the boot….

The following article needs some updating about today’s quality antimalware that has the new protections working with Windows 8 and 8.1….

Windows 8.1 gives malicious code the boot(s) TechRepublic The Windows operating system has a number of security controls, and most users have some sort of anti-malware security suite installed on their …
http://www.techrepublic.com/article/windows-81-gives-malicious-code-the-boots/

FOLLOW UP:

Threats/infection that launch before system:

Rootkit (definition) http://en.wikipedia.org/wiki/Rootkit

BOOTKITS Bootkits http://en.wikipedia.org/wiki/Bootkit#bootkit
A kernel-mode rootkit variant called a bootkit can infect startup code like the Master Boot Record (MBR), Volume Boot Record (VBR) or boot sector, and in this way, can be used to attack full disk encryption systems. An example is the “Evil Maid Attack”, in which an attacker installs a bootkit on an unattended computer, replacing the legitimate boot loader with one under his control.  Typically the malware loader persists through the transition to protected mode when the kernel has loaded, and is thus able to subvert the kernel. For example, the “Stoned Bootkit” subverts the system by using a compromised boot loader to intercept encryption keys and passwords. More recently, the Alureon rootkit has successfully subverted the requirement for 64-bit kernel-mode driver signing in Windows 7 by modifying the master boot record.

Today’s quality Antimalware products:

Early Launch Anti-Malware http://www.techopedia.com/definition/29079/early-launch-anti-malware-elam-windows-8?utm_source=tod_newsletter&utm_medium=email&utm_content=tod_more&utm_campaign=newsletter
What does it mean? Early Launch Anti-Malware (ELAM) is a Windows 8 security technology that evaluates non-Microsoft Windows boot time device/application drivers for malicious code. It is the first system kernel driver that starts in Windows 8 operating mode, before any third party software or driver. Techopedia Explains As a component of Secure Boot – also introduced in Windows 8 – ELAM is a detection driver used to identify malware, root kits or other malicious code/drivers initiated at system Read more »

(((Note …. newer technology for Windows 8 in antimalware (antivirus plus antispyware). Some additional links….)))

Windows 8 Early Launch Anti-Malware from Third-Party AV Vendors http://news.softpedia.com/news/Windows-8-Early-Launch-Anti-Malware-from-Third-Party-AV-Vendors-226789.shtml

Managing early launch anti-malware (ELAM) detections http://www.symantec.com/business/support/index?page=content&id=HOWTO81107

Windows 8 ELAM: too late, too little! http://www.virusbtn.com/conference/vb2012/abstracts/KulkarniJagdale.xml

How to configure Early Launch Anti-Malware Protection in Windows 8 http://www.bleepingcomputer.com/tutorials/configure-early-launch-antimalware-protection/

How to disable Early Launch Anti-Malware Protection http://www.bleepingcomputer.com/tutorials/disable-early-launch-antimalware-protection/

Understanding Early Launch Anti-Malware (ELAM) technology in Windows 8 http://www.thewindowsclub.com/earlylaunch-antimalware-elam-technology-windows-8

[Hot Fix] B0006 – The Early Launch Anti-Malware of Titanium 2013 does not load properly http://esupport.trendmicro.com/solution/en-US/1095123.aspx

Windows 8: Trusted Boot: Secure Boot – Measured Boot http://blogs.msdn.com/b/olivnie/archive/2013/01/09/windows-8-trusted-boot-secure-boot-measured-boot.aspx

-- 
SENDER: gerald309 -- 
Have A Safe Computing Day!
Webmaster: Malware Removal/Amateur Forensics
HOME http://bluecollarpc.us/
Alternate https://sites.google.com/site/pcsecurityhelper/
HELP http://tech.groups.yahoo.com/group/BlueCollarPCSecurity/
Membership/Join List:
Subscribe: BlueCollarPCSecurity-subscribe@yahoogroups.com
Free Malware Removal Help / A Community Website Since 2005

Report: Softwares responsible for 76% of vulnerabilities – install Secunia PSI

Report: Softwares responsible for 76% of vulnerabilities – install Secunia PSI

Third-party programs responsible for 76% of vulnerabilities in popular software Posted on Feb 27, 2014 11:28 am Third-party programs are responsible for 76% of the vulnerabilities discovered in the 50 most popular programs in 2013, say the results of Secunia’s Vulnerability Review 2014, which is based on a samp… Read in browser » http://www.net-security.org/secworld.php?id=16448  

NOTE this was the great efforts and design and reasons for Microsoft creating Windows Vista, as it was shown and proven that Windows was NOT the reason for so much malware as an inadequately safe operating system. It was the third party – or simply all other softwares users installed on their computers that were the causes of malware infections via poor inadequate security coding and mainly always using Administrator Privileges were it was not necessary which gave malware administrator rights to run on the system. UAC – User Account Control was born in Vista which mitigated this. Bill Gates and Microsoft addressed ALL software creators worldwide to design safer hard coded softwares security-wise and not using administrator rights continually where not appropriate or necessary to run.

The security re-designed Windows Vista was on the heels of the Windows XP launch and years – where much of today’s malware was created and invented such as spyware itself, which did not exist before Windows XP. Here we are again with this reliable, credible, and well respected Secunia report. Malware is infecting systems thru weak softwares and NOT because of the Windows Operating System design. 

It is more than highly recommended for all users to install this free software for Home Users from Secunia (which I use too) which is a reliable durable software program that will scan the web for software updates that get issued for all softwares you may have installed. It can be set to automatically update them or manually. It can set to run with each computer start up in the background or to manually start and run a scan periodically as once a week or twice monthly. Now to do this manually can take hours and hours going to the software home website to check if updates are available, which many times are too hard to find at the site or not even posted there. Many softwares today finally added a Check For Updates button, which again can take all the time to continually open and close each software to check for Updates. The Secunia PSI automates these tasks ! HIGHLY RECOMMENDED AND IS FREE TO HOME USERS !

INSTALL THIS TO KEEP ALL YOUR INSTALLED SOFTWARES UP TO DATE !
(NOTE this will not install software Upgrades to next versions like on paid-for softwares were it will cost more for an upgrade. It scans for updates to your existing version.)

Secunia Personal Software Inspector (PSI)
(Download at website)
http://secunia.com/vulnerability_scanning/personal/  
The Secunia PSI explained
The Secunia Personal Software Inspector (PSI) is a free computer security solution that identifies vulnerabilities in non-Microsoft (third-party) programs which can leave your PC open to attacks. Simply put, it scans software on your system and identifies programs in need of security updates to safeguard your PC against cybercriminals. It then supplies your computer with the necessary software security updates to keep it safe. The Secunia PSI even automates the updates for your insecure programs, making it a lot easier for you to maintain a secure PC. Using a scanner like Secunia PSI 3.0 is complementary to antivirus software, and as a free computer security program, is essential for every home computer.  

YOUTUBEs:
(From Secunia) :

PSI 3.0 Walkthrough
http://www.youtube.com/watch?v=iUmaLmO0gx0&feature=youtu.be  

Tim and Dave
Short animated story about security and why Tim is happier than Dave. http://www.youtube.com/watch?v=h5rZkCnKMCM&feature=youtu.be  

WHO IS SECUNIA?
Secunia
http://en.wikipedia.org/wiki/Secunia  
From Wikipedia, the free encyclopedia

-- 

SENDER: gerald309 -- 
Have A Safe Computing Day!
Webmaster: Malware Removal/Amateur Forensics
HOME http://bluecollarpc.us/ 
Alternate https://sites.google.com/site/pcsecurityhelper/ 
HELP http://tech.groups.yahoo.com/group/BlueCollarPCSecurity/ 
Membership/Join List:
Subscribe: BlueCollarPCSecurity-subscribe@yahoogroups.com 
Free Malware Removal Help / A Community Website Since 2005

 

Horizon threats, Here already! Direct Memory Access Malware – GPU others

HORIZON THREATS? Here already! DMA and RDMA Threats
Malware could be hiding in your GPU
(Let us become familiar by browsing the DMA Direct Memory Access links below)
Direct memory access
From Wikipedia, the free encyclopedia
What is DMA? – A Word Definition From the Webopedia
What is Direct Memory Access (DMA)? – Definition from Techopedia
Remote direct memory access (RDMA)
From Wikipedia, the free encyclopedia
Introduction to direct memory access
Implementing direct memory access is straightforward, once you know how it works and how to configure your DMA controller. Here’s a primer on this most efficient means of moving data around in a system.
“Malware writers have worked out ways of hiding trojan horses in places where viruses checkers can’t look, according to one security researcher.
Patrick Stewin has demonstrated a a detector which can be built to find sophisticated malware that runs on dedicated devices and attacks direct memory access (DMA).
This will mean that it will finally tell us how effective crackers have been at getting malware into graphics and network cards.
The code has managed to find attacks launched by the malware, dubbed DAGGER, which targeted host runtime memory using DMA provided to hardware devices.
DAGGER attacked 32bit and 64bit Windows and Linux systems and could bypass memory address randomisation. It has now been developed to a point where the host cannot detect its presence, Stewin said.”….
memory address randomisation / Address space layout randomization
http://en.wikipedia.org/wiki/Address_space_layout_randomization
“Address space randomization hinders some types of security attacks by making it more difficult for an attacker to predict target addresses. For example, attackers trying to execute return-to-libc attacks must locate the code to be executed, while other attackers trying to execute shellcode injected on the stack have to find the stack first. In both cases, the system obscures related memory-addresses from the attackers. These values have to be guessed, and a mistaken guess is not usually recoverable due to the application crashing.”
NOW READ THIS…
Direct Memory Access | Security Architect
Sep 5, 2013 – … when someone mentioned “HBGary Direct Memory Access tools. … as well as use tools to protect against malware delivered remotely. ….
“You ask, “Can they really do that?” and you may be thinking “Only in the movies”  but all along I would have told you “Yeah, they probably can.” The other day I got confirmation when someone mentioned “HBGary Direct Memory Access tools.” That was enough of a lead to spawn a Google search and soon I confirmed such tools aren’t just in the movies.
Of course, if you’ve got great contacts in law enforcement and defense/intel you probably knew that already. But for the rest of us, you don’t have to watch the detectives anymore, there’s a considerably better source for such secret knowledge. I pulled up an old Ars Technica titled “Black ops: how HBGary wrote backdoors for the government.” This was written in the wake of the Anonymous attack on Federal contractor HBGary which led to a Wikileaks-style puke out of the company’s email data banks. Per the article:
“In 2009, HBGary…partnered with…General Dynamics to work on a project euphemistically known as ‘Task B.’ The team had a simple mission: slip a piece of stealth software onto a target laptop…they focused on the ‘direct access’ ports [PCMCIA, ExpressCard and Firewire] that provide ‘uninhibited electronic direct memory access’…[allowing] a custom piece of hardware delivered by a field operative to interact directly with the laptop [and] write directly to the computer’s memory…The [USB and wifi ports] needed “trust relationships” or relied on ‘buffer overflows…”
From the email records it seems HBGary wrote multiple exploits including so-called “rootkits,” a type of malware that installs deep in the OS to become undetectable to anti-virus scanners using standard I/O interfaces. The DMA rootkit was the malware of choice on “Task B” because it was thought to have the lowest risk of detection. And it could be used in physical access scenarios such as a spy accessing a laptop left on a desk or in the hotel room. ….”
PRESS:
Hacker Defeats Hardware-based Rootkit Detection – Slashdot
Mar 4, 2007 … And that’s what hardware-based rootkit detection is about. Use hardware with DMA (which you trust) to access memory instead of letting the …
Researchers Find Way to Detect Direct Memory Access Malware
September 27th, 2013, 08:11 GMT · By Eduard Kovacs
http://news.softpedia.com/news/Researchers-Find-Way-to-Detect-Direct-Memory-Access-Malware-386671.shtml
RELATED:
How to Enable Direct Memory Access (DMA) – Microsoft Support
This article describes how to enable Direct Memory Access (DMA) on your Windows 98-based, Windows 95-based or Windows Millennium Edition-based…

Q: Computer trouble please help – MyPC backup

Fw: Yahoo! Answers: Your answer has been chosen as the best answer

http://tech.groups.yahoo.com/group/BlueCollarPCSecurity/message/3260

Q: COMPUTER TROUBLE PLEASE HELP?
http://answers.yahoo.com/question/index?qid=20130722185843AA2oMp9
ok so ever since this MyPC backup thing has been on my computer my computer has been messing up lately iv been getting ads on every website that i have been on and this hasnt happened before it all started when the pc thing came and its been making me really angry and i downloaded adobe flash player so i could watch videos and it says i downloaded it and then it says you need adobe flash player to watch this video and i downloaded the latest one and then ads just come up everywhere like now on yahoo there are alot of ads just popping up all over my computer and on youtube and on every website please help me i dont know what to
do
http://answers.yahoo.com/question/index?qid=20130722185843AA2oMp9

MY ANSWER AS ANTIBOTNET YAHOO ID

Best Answer – Chosen by Asker
You will probably be shocked to find it that it is malware itself…
MyPC Backup.exe Description
http://www.enigmasoftware.com/mypcbackupexe-removal/
MyPC Backup.exe is a dangerous executable file, which is related to malware, specifically adware programs. MyPC Backup.exe can cause data loss on an affected computer system or even damage the whole PC. MyPC Backup.exe is installed on the infected computer  without the PC user’s permission and knowledge. MyPC Backup.exe makes the targeted computer vulnerable to other security threats. MyPC Backup.exe can steal valuable confidential information and information about the browsing history of the victim. MyPC Backup.exe may change search results in any legitimate search engine with web addresses of sponsored websites and and divert victims to these doubtful websites. MyPC Backup.exe may also replace the homepage and default search egnine with the suspicious URL. MyPC Backup.exe repeatedly displays numerous bogus alerts/ warning messages on the screen of the corrupted PC about a variety of security threats and even advertise rogue security programs in order to remove supposed malware infections.
Type: Malware

Because you were able to install and run this it means you do not have quality antimalware (antivirus plus antispyware) installed on the computer or it would have immediately quarantined it to keep it from running and spying on you and running adware.

TYPE INTO SEARCH ENGINE…. “MyPC backup adware malware” and you will see valid reports fom known legitimate security sites reporting it as malwar as well as other sites such as security forums etc were other users have same problems.

RECOMMENDED you immediately install quality antimalware program and perform a full scan of the computer and remove all threats found in results. Becasue “MyPC backup” is rated as a high risk malware it may even block you from installing antimalware. The way around that is to either set the computer into Safe Mode With Networking and try installing and then perform scans. In Safe Mode only the few neccessary Windows processes load and nothing else which as well stops malware from running and allows for it to be removed. There is also the portable antimalware you can install on a USB Drive (not USB media stick – DRIVE – that is same price). You then run the antimalware from that to remove malware. SAFE MODE …. TURN OFF PC OR HIT RESTART. AS IT IS STARTING UP – KEEP TAPPING THE F-8 KEY TOP OF KEYBOARD. The PC will produce the black screen with options and choose Safe Mode. Do what you need to do – install scan, remove – and simply Restart the PC and will automatically start up in Normal Mode as regular use.

Check Threats and what they are here… http://bluecollarpc.us/threats-faqs/
Check all kinds of good well known and trusted antimalware products here …
http://bluecollarpc.us/help-center/
There are the many Genuine Freeware home versions of antivirus and antispyware but they do not have Real Time Protection (Sometimes called HIPS) activated like the full pay program which is about 40-50 USD (US Dollars) yearly. However there are just a couple free ones with Real Time Protection activated like pay products if money is issue. Real Time Protection (heuristics) blocks all malware from installing on the computer in the first place 24/7 – always running.
Malware is the term for all threats as virus, worm, trojan, adware, spyware, rootkit etc. Antivirus blocks/deletes viruses, worms, rootkits and most trojans. Antispyware blocks/deletes adware, spyware, keyloggers, dialers, etc and many other trojans antivirus misses. Spyware itself can have in its payload (malware package installed) – keyloggers which record all keystrokes on the keyboard. It can perform snapshots of your computer screen – what you are looking at. It can copy make copies of your files (photos, media, documents, etc) and altogether all things it is recording is broadcasted out to cyber criminals owning it which in turn generally go right to trying to perform an IDTheft from gathered stolen data from the PC including even financial stuff like logging into pay bills or buy stuff with cards etc any like passwords and pin numbers stored on the computer or recorded by keyloggers when signing in.

TRY ….
30 day fully working free Eset Antimalware (about best in world)
Free 30-day Trial of ESET NOD32 Antivirus 6
http://www.eset.com/us/download/home/detail/family/2/?trl=ea
After 30 days it will stop working. You can buy it or then uninstall it after 30 days.

ALSO Emergency tries if things are blocked….
MalAware 1.0 http://www.emsisoft.com/en/software/malaware/
Emsisoft Emergency Kit 2.0
http://www.emsisoft.com/en/software/eek/

FULL PROTECTION FREE ONES:
http://antivirus.comodo.com/
http://www.microsoft.com/security_essentials/

Source(s):
http://www.enigmasoftware.com/mypcbackupexe-removal/
http://en.wikipedia.org/wiki/ESET_NOD32
http://www.betterantivirus.com/nod32-and-virus-news/archives/1456-December-2009-ESET-antivirus-scoops-59th-VB100-Award.html
http://www.microsoft.com/security_essentials/
http://antivirus.comodo.com/

— On Tue, 7/23/13, Yahoo! Answers <answers-alert@…> wrote:

> From: Yahoo! Answers <answers-alert@…>
> Subject: Yahoo! Answers: Your answer has been chosen as the best answer
> To: antibotnet@…
> Date: Tuesday, July 23, 2013, 12:54 PM
>
> Take me to
> Yahoo! Answers. I want to answer more questions!
> Hey,
> AntiBotnet, look what you got!
> Congratulations,
> you’ve got a best answer and 10 extra points!
> Your answer to the following question really hit the spot and has been chosen as the best answer:
> COMPUTER TROUBLE PLEASE HELP?
> Go ahead, do your
> victory dance. Celebrate a little. Brag a little.
> Then come back and answer a few more questions!
> Thanks for sharing what you know and
> making someone’s day.

trimmed!

%d bloggers like this: